SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
Symantec Data Loss Prevention 10.5 Administration

COURSE DESCRIPTION
                                                               Prerequisites
The Symantec Data Loss Prevention 10.5 Administration          You must have a working knowledge of windows server-class
course is designed to provide you with the fundamental         operating systems and commands, as well as networking and
knowledge and hands-on lab experience to configure and         network security concepts.
administer the Symantec Data Loss Prevention Enforce
platform. The hands-on labs include exercises for              Hands-On
reporting, workflow, and incident response management,         This course includes practical exercises that enable you to test
policy management and detection, response                      your new skills and begin to transfer them into your working
management, user and role administration, directory            environment.
integration, and filtering. Additionally, you are introduced
to the following Symantec Data Loss Prevention
products: Network Monitor, Network Prevent, Network
Discover, Network Protect, Endpoint Prevent, and
Endpoint Discover, as well as deployment best practices.       COURSE OUTLINE
Note that this course is delivered on a Microsoft Windows      Introduction to Symantec Data Loss Prevention
platform and does not include installation and initial         •    Symantec Data Loss Prevention overview
configuration for each server.                                 •    Symantec Data Loss Prevention architecture
Delivery Method                                                Navigation and Reporting
Instructor-led                                                 •   Navigating the user interface
                                                               •   Reporting and analysis
Duration
                                                               •   Report navigation, preferences, and features
Four days
                                                               •   Report filters
Course Objectives                                              •   Report commands
This course provides instruction on Symantec Data Loss         •   Incident snapshot
Prevention 10.5. At the completion of the course, you will     •   Hands-On Labs: Become familiar with navigation and tools
be able to:                                                        in the user interface. Create, filter, summarize, and
•   Describe the features, concepts, components, and               distribute reports. Create users, roles, and attributes.
    terminology of Symantec Data Loss Prevention 10.5.
                                                               Incident Remediation and Workflow
•   Configure reports and remediate incidents.
•   Create and modify policies and response rules.             •   Incident remediation and workflow
•   Leverage policy and response management best               •   Managing users and attributes
    practices.                                                 •   Hands-On Labs: Remediate incidents and configure a
•   Create and modify Discover targets.                            user’s reporting preferences.
•   Create and manage roles and users.
                                                               Policy Management
•   Carry out system administration tasks including
                                                               •   Policy overview
    performance management.
                                                               •   Creating policy groups
•   Describe enterprise enablement best practices.
                                                               •   Using policy templates
•   Perform diagnostics.
                                                               •   Building policies
•   Leverage deployment best practices.
                                                               •   Hands-On Labs: Use policy templates and policy builder to
Who Should Attend                                                  configure and apply new policies.
This course is intended for those responsible for the
application configuration, maintenance, and                    Response Rule Management
troubleshooting of Symantec Data Loss Prevention.              •  Response rule overview
Additionally, this course is applicable for the technical      •  Creating Automated Response rules
users responsible for creating and maintaining Symantec        •  Creating Smart Response rules
Data Loss Prevention policies and the incident response        •  Response rule best practices
structure.                                                     •  Hands-On Labs: Create and use Automated and Smart
                                                                  Response rules.



VERSION 3                                                                                                                         1
                                                                                                                 E:MC20091208
TrueMatch Detection Methods
•   Overview of TrueMatch detection methods                                                       Introduction to Endpoint Discover
•   Described Content Matching (DCM)                                                              •    Endpoint Discover overview
•   Exact Data Matching (EDM)                                                                     •    Creating and running Endpoint Discover targets
•   Directory Group Matching (DGM)                                                                •    Using Endpoint Discover reports and reporting features
•   Indexed Document Matching (IDM)                                                               •    Hands-On Labs: Create Endpoint Discover targets, run
•   Hands-On Labs: Create policies that include DCM,                                                   Endpoint Discover targets, and view Endpoint Discover
    EDM, DGM, and IDM rules (including policies that                                                   incidents.
    combine these methods) and then use those policies
    to capture incidents.                                                                         Enterprise Enablement
                                                                                                  •   Preparing for risk reduction
Advanced EDM                                                                                      •   Policy development best practices
Advanced EDM                                                                                      •   Risk reduction

Network Monitor Review                                                                            System Administration
•   Review of Network Monitor                                                                     •   Architecture
•   Protocols                                                                                     •   Server administration
•   Traffic filtering                                                                             •   Custom attribute lookup
•   Network Monitor best practices                                                                •   Troubleshooting
•   Hands-On Labs: Apply IP and L7 Filters.                                                       •   Hands-On Labs: Interpret event reports and traffic
                                                                                                      Reports. Configure alerts and custom attribute look-ups
Introduction to Network Prevent                                                                       using a .csv file.
•    Network Prevent overview
•    Introduction to Network Prevent (Email)
•    Introduction to Network Prevent (Web)
•    Hands-On Labs: Configure Network Prevent (Email)
     response rules, incorporate them into policies, and
     use the policies to capture incidents.

Introduction to Network Discover and Network
Protect
•    Network Discover and Network Protect overview
•    Configuring Discover targets
•    Protecting data
•    FlexResponse platform
•    Running and managing scans
•    Reports and remediation (Includes Data Insight
     integration configuration)
•    Network Discover and Network Protect best
     practices
•    Hands-On Labs: Create and run a file system target
     using various response rules, including quarantining.

Introduction to Endpoint Prevent
•    Endpoint Prevent overview
•    Configuring Endpoint Prevent
•    Detection capabilities at the Endpoint
•    Managing agents
•    Creating Endpoint response rules
•    Capturing Endpoint Prevent incidents and viewing
     them in reports
•    Endpoint Prevent best practices
•    Hands-On Labs: Create Endpoint response rules,
     monitor and block Endpoint actions, and view
     Endpoint Incidents.




Copyright © 2009 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Veritas are trademarks or registered trademarks of Symantec Corporation or its affiliates in   2
the U.S. and other countries. Other names may be trademarks of their respective owners. Specifications and product offerings are subject to change without notice.

Más contenido relacionado

Destacado

A new polymer-free drug-eluting stent with nanocarriers eluting sirolimus fro...
A new polymer-free drug-eluting stent with nanocarriers eluting sirolimus fro...A new polymer-free drug-eluting stent with nanocarriers eluting sirolimus fro...
A new polymer-free drug-eluting stent with nanocarriers eluting sirolimus fro...Paul Schoenhagen
 
Cdc crmp hbbr_crm_for_homebuildingandrealestate_us
Cdc crmp hbbr_crm_for_homebuildingandrealestate_usCdc crmp hbbr_crm_for_homebuildingandrealestate_us
Cdc crmp hbbr_crm_for_homebuildingandrealestate_usPivotal CRM
 
Case Study The Pinky Show Reproducible I Completed Pdf
Case Study The Pinky Show Reproducible I Completed PdfCase Study The Pinky Show Reproducible I Completed Pdf
Case Study The Pinky Show Reproducible I Completed PdfIvy Waite
 
Case study r4 sg_051914_m
Case study r4 sg_051914_mCase study r4 sg_051914_m
Case study r4 sg_051914_mJames Gill
 
Cct slide final
Cct slide finalCct slide final
Cct slide finalFaez Irfan
 
CDC and Aflatoxin: The Human Health Perspective
CDC and Aflatoxin: The Human Health PerspectiveCDC and Aflatoxin: The Human Health Perspective
CDC and Aflatoxin: The Human Health PerspectiveFrancois Stepman
 
casey vaught Resume
casey vaught Resumecasey vaught Resume
casey vaught ResumeCasey Vaught
 
Código Menu. (Cibernauta)
Código Menu. (Cibernauta)Código Menu. (Cibernauta)
Código Menu. (Cibernauta)rosani
 
Código ambiental de una bahia - capa
Código ambiental de una   bahia - capaCódigo ambiental de una   bahia - capa
Código ambiental de una bahia - capaDi Rusciolelli
 
CDB Resume
CDB ResumeCDB Resume
CDB Resumecdbehrle
 

Destacado (11)

A new polymer-free drug-eluting stent with nanocarriers eluting sirolimus fro...
A new polymer-free drug-eluting stent with nanocarriers eluting sirolimus fro...A new polymer-free drug-eluting stent with nanocarriers eluting sirolimus fro...
A new polymer-free drug-eluting stent with nanocarriers eluting sirolimus fro...
 
Cdc crmp hbbr_crm_for_homebuildingandrealestate_us
Cdc crmp hbbr_crm_for_homebuildingandrealestate_usCdc crmp hbbr_crm_for_homebuildingandrealestate_us
Cdc crmp hbbr_crm_for_homebuildingandrealestate_us
 
Case Study The Pinky Show Reproducible I Completed Pdf
Case Study The Pinky Show Reproducible I Completed PdfCase Study The Pinky Show Reproducible I Completed Pdf
Case Study The Pinky Show Reproducible I Completed Pdf
 
Case study r4 sg_051914_m
Case study r4 sg_051914_mCase study r4 sg_051914_m
Case study r4 sg_051914_m
 
Cct slide final
Cct slide finalCct slide final
Cct slide final
 
CDC and Aflatoxin: The Human Health Perspective
CDC and Aflatoxin: The Human Health PerspectiveCDC and Aflatoxin: The Human Health Perspective
CDC and Aflatoxin: The Human Health Perspective
 
Case StudyOwnership
Case StudyOwnershipCase StudyOwnership
Case StudyOwnership
 
casey vaught Resume
casey vaught Resumecasey vaught Resume
casey vaught Resume
 
Código Menu. (Cibernauta)
Código Menu. (Cibernauta)Código Menu. (Cibernauta)
Código Menu. (Cibernauta)
 
Código ambiental de una bahia - capa
Código ambiental de una   bahia - capaCódigo ambiental de una   bahia - capa
Código ambiental de una bahia - capa
 
CDB Resume
CDB ResumeCDB Resume
CDB Resume
 

Similar a Cdesc dlp 105_ef_ilt

Metrics, Risk Management & DLP
Metrics, Risk Management & DLPMetrics, Risk Management & DLP
Metrics, Risk Management & DLPRobert Kloots
 
Top 5 Java Performance Metrics, Tips & Tricks
Top 5 Java Performance Metrics, Tips & TricksTop 5 Java Performance Metrics, Tips & Tricks
Top 5 Java Performance Metrics, Tips & TricksAppDynamics
 
Manage and Monitor Oracle Applications in the Cloud
Manage and Monitor Oracle Applications in the CloudManage and Monitor Oracle Applications in the Cloud
Manage and Monitor Oracle Applications in the CloudBob Rhubart
 
Software Engineering The Multiview Approach And Wisdm
Software Engineering   The Multiview Approach And WisdmSoftware Engineering   The Multiview Approach And Wisdm
Software Engineering The Multiview Approach And Wisdmguestc990b6
 
How to bake in quality in agile scrum projects
How to bake in quality in agile scrum projectsHow to bake in quality in agile scrum projects
How to bake in quality in agile scrum projectsSantanu Bhattacharya
 
Tony Hsu軟體專業課程簡介
Tony Hsu軟體專業課程簡介Tony Hsu軟體專業課程簡介
Tony Hsu軟體專業課程簡介Tony Hsu
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsAlgoSec
 
Zero to ten million daily users in four weeks: sustainable speed is king
Zero to ten million daily users in four weeks: sustainable speed is kingZero to ten million daily users in four weeks: sustainable speed is king
Zero to ten million daily users in four weeks: sustainable speed is kingplumbee
 
Track and Trace Solution Details
Track and Trace Solution DetailsTrack and Trace Solution Details
Track and Trace Solution DetailsPropix Technologies
 
Detection of Seed Methods for Quantification of Feature Confinement
Detection of Seed Methods for Quantification of Feature ConfinementDetection of Seed Methods for Quantification of Feature Confinement
Detection of Seed Methods for Quantification of Feature ConfinementAndrzej Olszak
 
Application Assessment Techniques
Application Assessment TechniquesApplication Assessment Techniques
Application Assessment TechniquesDenim Group
 
Online performance modeling and analysis of message-passing parallel applicat...
Online performance modeling and analysis of message-passing parallel applicat...Online performance modeling and analysis of message-passing parallel applicat...
Online performance modeling and analysis of message-passing parallel applicat...MOCA Platform
 
IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant Saravanan Purushothaman
 
Collaborative Lifecycle Managmenent - an Introduction
Collaborative Lifecycle Managmenent - an IntroductionCollaborative Lifecycle Managmenent - an Introduction
Collaborative Lifecycle Managmenent - an IntroductionStrongback Consulting
 
software configuration management
software configuration managementsoftware configuration management
software configuration managementFáber D. Giraldo
 
Nailing It Down: Detailed Design to Preserve the UX Vision
Nailing It Down: Detailed Design to Preserve the UX VisionNailing It Down: Detailed Design to Preserve the UX Vision
Nailing It Down: Detailed Design to Preserve the UX Visionjsokohl
 

Similar a Cdesc dlp 105_ef_ilt (20)

Metrics, Risk Management & DLP
Metrics, Risk Management & DLPMetrics, Risk Management & DLP
Metrics, Risk Management & DLP
 
Top 5 Java Performance Metrics, Tips & Tricks
Top 5 Java Performance Metrics, Tips & TricksTop 5 Java Performance Metrics, Tips & Tricks
Top 5 Java Performance Metrics, Tips & Tricks
 
Manage and Monitor Oracle Applications in the Cloud
Manage and Monitor Oracle Applications in the CloudManage and Monitor Oracle Applications in the Cloud
Manage and Monitor Oracle Applications in the Cloud
 
Managed Services Overview
Managed Services OverviewManaged Services Overview
Managed Services Overview
 
Software Engineering The Multiview Approach And Wisdm
Software Engineering   The Multiview Approach And WisdmSoftware Engineering   The Multiview Approach And Wisdm
Software Engineering The Multiview Approach And Wisdm
 
How to bake in quality in agile scrum projects
How to bake in quality in agile scrum projectsHow to bake in quality in agile scrum projects
How to bake in quality in agile scrum projects
 
Tony Hsu軟體專業課程簡介
Tony Hsu軟體專業課程簡介Tony Hsu軟體專業課程簡介
Tony Hsu軟體專業課程簡介
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation Firewalls
 
Zero to ten million daily users in four weeks: sustainable speed is king
Zero to ten million daily users in four weeks: sustainable speed is kingZero to ten million daily users in four weeks: sustainable speed is king
Zero to ten million daily users in four weeks: sustainable speed is king
 
Track and Trace Solution Details
Track and Trace Solution DetailsTrack and Trace Solution Details
Track and Trace Solution Details
 
Detection of Seed Methods for Quantification of Feature Confinement
Detection of Seed Methods for Quantification of Feature ConfinementDetection of Seed Methods for Quantification of Feature Confinement
Detection of Seed Methods for Quantification of Feature Confinement
 
Mindshare Managed It Services Intro V.1
Mindshare Managed It Services Intro V.1Mindshare Managed It Services Intro V.1
Mindshare Managed It Services Intro V.1
 
leenaaggarwal
leenaaggarwalleenaaggarwal
leenaaggarwal
 
Application Assessment Techniques
Application Assessment TechniquesApplication Assessment Techniques
Application Assessment Techniques
 
Online performance modeling and analysis of message-passing parallel applicat...
Online performance modeling and analysis of message-passing parallel applicat...Online performance modeling and analysis of message-passing parallel applicat...
Online performance modeling and analysis of message-passing parallel applicat...
 
IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant
 
Collaborative Lifecycle Managmenent - an Introduction
Collaborative Lifecycle Managmenent - an IntroductionCollaborative Lifecycle Managmenent - an Introduction
Collaborative Lifecycle Managmenent - an Introduction
 
software configuration management
software configuration managementsoftware configuration management
software configuration management
 
Testing banking apps
Testing banking appsTesting banking apps
Testing banking apps
 
Nailing It Down: Detailed Design to Preserve the UX Vision
Nailing It Down: Detailed Design to Preserve the UX VisionNailing It Down: Detailed Design to Preserve the UX Vision
Nailing It Down: Detailed Design to Preserve the UX Vision
 

Cdesc dlp 105_ef_ilt

  • 1. Symantec Data Loss Prevention 10.5 Administration COURSE DESCRIPTION Prerequisites The Symantec Data Loss Prevention 10.5 Administration You must have a working knowledge of windows server-class course is designed to provide you with the fundamental operating systems and commands, as well as networking and knowledge and hands-on lab experience to configure and network security concepts. administer the Symantec Data Loss Prevention Enforce platform. The hands-on labs include exercises for Hands-On reporting, workflow, and incident response management, This course includes practical exercises that enable you to test policy management and detection, response your new skills and begin to transfer them into your working management, user and role administration, directory environment. integration, and filtering. Additionally, you are introduced to the following Symantec Data Loss Prevention products: Network Monitor, Network Prevent, Network Discover, Network Protect, Endpoint Prevent, and Endpoint Discover, as well as deployment best practices. COURSE OUTLINE Note that this course is delivered on a Microsoft Windows Introduction to Symantec Data Loss Prevention platform and does not include installation and initial • Symantec Data Loss Prevention overview configuration for each server. • Symantec Data Loss Prevention architecture Delivery Method Navigation and Reporting Instructor-led • Navigating the user interface • Reporting and analysis Duration • Report navigation, preferences, and features Four days • Report filters Course Objectives • Report commands This course provides instruction on Symantec Data Loss • Incident snapshot Prevention 10.5. At the completion of the course, you will • Hands-On Labs: Become familiar with navigation and tools be able to: in the user interface. Create, filter, summarize, and • Describe the features, concepts, components, and distribute reports. Create users, roles, and attributes. terminology of Symantec Data Loss Prevention 10.5. Incident Remediation and Workflow • Configure reports and remediate incidents. • Create and modify policies and response rules. • Incident remediation and workflow • Leverage policy and response management best • Managing users and attributes practices. • Hands-On Labs: Remediate incidents and configure a • Create and modify Discover targets. user’s reporting preferences. • Create and manage roles and users. Policy Management • Carry out system administration tasks including • Policy overview performance management. • Creating policy groups • Describe enterprise enablement best practices. • Using policy templates • Perform diagnostics. • Building policies • Leverage deployment best practices. • Hands-On Labs: Use policy templates and policy builder to Who Should Attend configure and apply new policies. This course is intended for those responsible for the application configuration, maintenance, and Response Rule Management troubleshooting of Symantec Data Loss Prevention. • Response rule overview Additionally, this course is applicable for the technical • Creating Automated Response rules users responsible for creating and maintaining Symantec • Creating Smart Response rules Data Loss Prevention policies and the incident response • Response rule best practices structure. • Hands-On Labs: Create and use Automated and Smart Response rules. VERSION 3 1 E:MC20091208
  • 2. TrueMatch Detection Methods • Overview of TrueMatch detection methods Introduction to Endpoint Discover • Described Content Matching (DCM) • Endpoint Discover overview • Exact Data Matching (EDM) • Creating and running Endpoint Discover targets • Directory Group Matching (DGM) • Using Endpoint Discover reports and reporting features • Indexed Document Matching (IDM) • Hands-On Labs: Create Endpoint Discover targets, run • Hands-On Labs: Create policies that include DCM, Endpoint Discover targets, and view Endpoint Discover EDM, DGM, and IDM rules (including policies that incidents. combine these methods) and then use those policies to capture incidents. Enterprise Enablement • Preparing for risk reduction Advanced EDM • Policy development best practices Advanced EDM • Risk reduction Network Monitor Review System Administration • Review of Network Monitor • Architecture • Protocols • Server administration • Traffic filtering • Custom attribute lookup • Network Monitor best practices • Troubleshooting • Hands-On Labs: Apply IP and L7 Filters. • Hands-On Labs: Interpret event reports and traffic Reports. Configure alerts and custom attribute look-ups Introduction to Network Prevent using a .csv file. • Network Prevent overview • Introduction to Network Prevent (Email) • Introduction to Network Prevent (Web) • Hands-On Labs: Configure Network Prevent (Email) response rules, incorporate them into policies, and use the policies to capture incidents. Introduction to Network Discover and Network Protect • Network Discover and Network Protect overview • Configuring Discover targets • Protecting data • FlexResponse platform • Running and managing scans • Reports and remediation (Includes Data Insight integration configuration) • Network Discover and Network Protect best practices • Hands-On Labs: Create and run a file system target using various response rules, including quarantining. Introduction to Endpoint Prevent • Endpoint Prevent overview • Configuring Endpoint Prevent • Detection capabilities at the Endpoint • Managing agents • Creating Endpoint response rules • Capturing Endpoint Prevent incidents and viewing them in reports • Endpoint Prevent best practices • Hands-On Labs: Create Endpoint response rules, monitor and block Endpoint actions, and view Endpoint Incidents. Copyright © 2009 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Veritas are trademarks or registered trademarks of Symantec Corporation or its affiliates in 2 the U.S. and other countries. Other names may be trademarks of their respective owners. Specifications and product offerings are subject to change without notice.