SCN GmbH

Broadcom Symantec Endpoint Protection

Seminar / Training Broadcom Symantec Endpoint Protection

Installing Symantec Endpoint Protection

System requirements - Preparing the servers for installation - Installing and configuring Symantec Endpoint Protection

Symantec Endpoint Protection Migration and Version Compatibility

Configuring Symantec Endpoint Protection

Starting and navigating SEPM - Policy types and components - Console authentication - Licensing

Deploying Clients

Client requirements and deployment methods - Preparing for client deployment - Client installation packages, settings, and features - Installing managed clients - Configuring a managed detector - Upgrading Symantec Endpoint Protection clients

Client and Policy Management

Describing SEPM and client communications - Managing clients - Configuring groups - Configuring sites - Active Directory - Client configuration types - Configuring domains - General client settings and tamper protection

Configuring content updates

Introduction to Liveupdate - Configuring the SEPM for Liveupdate - Configuring Liveupdate Settings and Content

Policies

Configuring multiple Group Update Providers (GUPS) - Manually updating virus definitions

Designing a Symantec Endpoint Environment

Architecture and sizing - Designing the architecture - Client-to-SEPM connection types - Content distribution methods - SEPM and database sizing - Completing the deployment

Introduction to Antivirus, Insight and SONAR

Viruses and Spyware - Reputation and Insight - On demand Scans - Auto-Protect - Download Insight - SONAR

Managing virus and spyware protection policies in Symantec Endpoint Protection

Administrator Defined Scans - Settings - Email Scans - Advanced Options - Mac Client Detection - Managing Scanned Clients - Configuring Mac Virus and Spyware Policy Settings

Manage exception policies

Exceptions and exclusions - Configuring exceptions

Network Threat Protection and Application and Device Control

Network Protection Basics - Firewall - Intrusion Prevention - Application Access Protection

Firewall policy management

Firewall Overview - Defining and Changing Rules - Integrated Rules - Stealth Settings Windows Integration Settings

Managing Intrusion Prevention Policies

Configuring intrusion prevention - Managing individual signatures

Managing application and device control policies

Application and device control - Application control - Device control

Network Threat Protection and Application and Device Control

Tools - Policy components - Learned applications - System lockdown

Virtualization

Virtualization Features - Shared Insight Cache - Virtual Client Tagging - Offline Image Scanner

Replication and failover and load balancing

Sites and Replication - How Replication Works - Symantec Endpoint Protection Replication Scenarios - Configuring Replication - Failover and Load Balancing

Server and database management

Master SEPM server - Server security - Communicating with other servers - Managing administrators - Managing the database - Disaster recovery techniques

Monitoring and reporting

Monitoring startup and monitors side - Analyzing and managing logs - Notifications - Creating reports - Introduction to IT Analytics

Connecting SEPM to the Protection Center

Overview of Protection Center - Protection Center Appliance - Configuring Protection Center - Using Protection Center

Requirements

Windows skills

This seminar has the level "Administration / Basic and Advanced".

If you are not sure whether this course is the right level for you, you can check this with the trainer in advance.

We conduct this seminar online for you. You can book the training as a public seminar or as a company seminar. The practical exercises are carried out in our Remotelab and make up 40-50 percent of the seminar.

Your contacts

We offer seminars with a high practical relevance. The contents and exercises are geared to your daily tasks in the company and completely dispense with advertising references to other products of the software manufacturer.

All our training courses are manufacturer-independent. This enables us to offer critical considerations of the products themselves and comparisons with competitors of the manufacturer in the seminar. The course contents are our own and derived from the practical experience of our trainers in projects.

Of course, the contents of company seminars can be individually adapted to your needs. Please do not hesitate to contact us.
Oops, an error occurred! Code: 20241121122426d475be1a