Symantec Endpoint Protection 14.x: Configure and Protect (SEPCP) – Outline

Detailed Course Outline

Introduction

  • Course environment
  • Lab environment

Securing Endpoints against Network-Based Attacks Introducing Network Threats

  • Describing how Symantec Endpoint Protection protects each layer of the network stack
  • Discovering the tools and methods used by attackers
  • Describing the stages of an attack
  • Protecting against Network Attacks and Enforcing Corporate Policies using the Firewall Policy
  • Preventing network attacks
  • Examining Firewall Policy elements
  • Evaluating built-in rules
  • Creating custom firewall rules
  • Enforcing corporate security policy with firewall rules
  • Blocking network attacks using protection and stealth settings
  • Configuring advanced firewall feature
  • Blocking Threats with Intrusion Prevention
  • Introducing Intrusion Prevention technologies
  • Configuring the Intrusion Prevention policy
  • Managing custom signatures
  • Monitoring Intrusion Prevention events

Securing Endpoints against File-Based Threats Introducing File-Based Threats

  • Describing threat types
  • Discovering how attackers disguise their malicious applications
  • Describing threat vectors
  • Describing Advanced Persistent Threats and a typical attack scenario
  • Following security best practices to reduce risks Preventing Attacks with SEP Layered Security
  • Virus and Spyware protection needs and solutions
  • Describing how Symantec Endpoint Protection protects each layer of the network stack
  • Examining file reputation scoring
  • Describing how SEP protects against zero-day threats and threats downloaded through files and email
  • Describing how endpoints are protected with the Intelligent Threat Cloud Service
  • Describing how the emulator executes a file in a sandbox and the machine learning engine’s role and function

Securing Windows Clients

  • Platform and Virus and Spyware Protection policy overview
  • Tailoring scans to meet an environment’s needs
  • Ensuring real-time protection for clients
  • Detecting and remediating risks in downloaded files
  • Identifying zero-day and unknown threats
  • Preventing email from downloading malware
  • Configuring advanced options
  • Monitoring virus and spyware activity

Securing Mac Clients

  • Touring the SEP for Mac client
  • Securing Mac clients
  • Monitoring Mac clients

Securing Linux Clients

  • Navigating the Linux client
  • Tailoring Virus and Spyware settings for Linux clients
  • Monitoring Linux clients

Controlling endpoint integrity and compliance Providing Granular Control with Host Integrity

  • Ensuring client compliance with Host Integrity
  • Configuring Host Integrity
  • Troubleshooting Host Integrity
  • Monitoring Host Integrity

Controlling Application and File Access

  • Describing Application Control and concepts
  • Creating application rulesets to restrict how applications run
  • Monitoring Application Control events

Restricting Device Access for Windows and Mac Clients

  • Describing Device Control features and concepts for Windows and Mac clients
  • Enforcing access to hardware using Device Control
  • Discovering hardware access policy violations with reports, logs, and notifications

Hardening Clients with System Lockdown

  • What is System Lockdown?
  • Determining to use System Lockdown in Whitelist or Blacklist mode
  • Creating whitelists for blacklists
  • Protecting clients by testing and Implementing System Lockdown.
  • Enforcing Adaptive Security Posture
  • Customizing Policies based on Location
  • Creating locations to ensure the appropriate level of security when logging on remotely
  • Determining the criteria and order of assessment before assigning policies
  • Assigning policies to locations

Managing Security Exceptions

  • Creating file and folder exceptions for different scan types
  • Describing the automatic exclusion created during installation
  • Managing Windows and Mac exclusions
  • Monitoring security exceptions