Symantec Endpoint Protection 12.X: Administration

Symantec Endpoint Protection 12.X: Administration Course Description

Duration: 5.00 days (40 hours)

The Symantec Endpoint Protection 12.1: Administration course is designed for the network, IT security, and systems administration professional tasked with architecting, implementing, and monitoring virus and spyware protection, zero-day protection, and network threat protection solutions. This class covers how to design, deploy, install, configure, manage, and monitor Symantec Endpoint Protection 12.1 (SEP 12.1). Students learn how to create and implement the client firewall, intrusion prevent ion, application and device control, and behavioral protection policies that guard the enterprise from viruses and hackers. In addition, students learn how to perform server and database management, expand the management environment , use virtualization features for virtual clients, and interface the Symantec Endpoint Protect ion Manager with Protection Center.

Next Class Dates

Contact us to customize this class with your own dates, times and location. You can also call 1-888-563-8266 or chat live with a Learning Consultant.

Back to Top

Intended Audience for this Symantec Endpoint Protection 12.X: Administration Course

  • » This course is for network managers, resellers, systems administrators, client security administrators, systems professionals, and consultants w ho are charged with the installation, configuration, and day-to-day management of Symantec Endpoint Protection in a variety of network environments, and who are responsible for troubleshooting and tuning the performance of this product in the enterprise environment.

Back to Top

Symantec Endpoint Protection 12.X: Administration Course Objectives

  • » By the completion of this course, you will be able to:
  • » Describe Symantec Endpoint Protection products, components, dependencies, and system hierarchy.
  • » Install and configure Symantec Endpoint Protection management and client components.
  • » Deploy Symantec Endpoint Protection clients.
  • » Manage the client user interface.
  • » Manage product content updates.
  • » Design a Symantec Endpoint Protection environment.
  • » Manage Virus and Spyware Protection policies.
  • » Manage SONAR scans.
  • » Manage Firewall and Intrusion Prevention policies.
  • » Manage Application and Device Control policies.
  • » Manage virtualized clients.
  • » Configure replication and load balancing.
  • » Monitor and maintain the Symantec Endpoint Protection environment.
  • » Interface the Symantec Endpoint Protection Manager with Protection Center.

Back to Top

Symantec Endpoint Protection 12.X: Administration Course Outline

      1. Introduction
        1. Course overview
        2. The classroom lab environment
      2. Symantec Endpoint Protection Product Solution
        1. Why use Symantec Endpoint Protection?
        2. Symantec Endpoint Protection technologies
        3. Symantec Endpoint Protection services
        4. Symantec Endpoint Protection components
        5. Symantec Endpoint Protection policies and concepts
        6. Symantec Endpoint Protection product tiers
      3. Installing Symantec Endpoint Protection
        1. Identifying system requirements
        2. Preparing servers for installation
        3. Installing and configuring the Symantec Endpoint Protection Manager
        4. Describing Symantec Endpoint Protection migration and version compatibility
      4. Configuring the Symantec Endpoint Protection Environment
        1. Starting and navigating the SEPM
        2. Describing policy types and components
        3. Console authentication
        4. Licensing the SEP environment
      5. Deploying Clients
        1. Client requirements and deployment methods
        2. Preparing for client deployment
        3. Client installation packages, settings, and features
        4. Installing managed clients
        5. Configuring an unmanaged detector
        6. Upgrading Symantec Endpoint Protection clients
      6. Client and Policy Management
        1. Describing SEPM and client communications
        2. Administering clients
        3. Configuring groups
        4. Configuring locations
        5. Active Directory integration with SEP 12.1
        6. Client configuration modes
        7. Configuring domains
        8. General client settings and Tamper Protection
      7. Configuring Content Updates
        1. Introducing LiveUpdate
        2. Configuring the SEPM for LiveUpdate
        3. Configuring the LiveUpdate Settings and Content policies
        4. Configuring multiple group update providers (GUPs)
        5. Manually updating virus definitions
      8. Designing a Symantec Endpoint Environment
        1. Architecture and sizing considerations
        2. Designing the architecture
        3. Determining client-to-SEPM ratios
        4. Content distribution methods
        5. SEPM and database sizing
        6. Completing the deployment
      9. Introducing Antivirus, Insight, and SONAR
        1. Virus and spyware protection needs and solutions
        2. Reputation and Insight
        3. Administrator-defined scans
        4. Auto-Protect
        5. Download Insight
        6. SONAR
        7. Included Virus and Spyware Protection policies
      10. Managing Virus and Spyware Protection Policies
        1. Configuring administrator-defined scans
        2. Configuring protection technology settings and scans
        3. Configuring e-mail scans
        4. Configuring advanced options
        5. Configuring Mac client detect ion
        6. Managing scanned clients
        7. Configuring Mac Virus and Spyware Protect ion policy settings
      11. Managing Exception Policies
        1. Exceptions and exclusions
        2. Configuring the Exceptions policy
      12. Introducing Network Threat Protection and Application and Device Control
        1. Network threat protection basics
        2. The firewall
        3. Intrusion prevention
        4. Application access protection
      13. Managing Firewall Policies
        1. Firewall policy overview
        2. Defining rule components
        3. Modifying firewall rules
        4. Configuring built- in rules
        5. Configuring protect ion and stealth settings
        6. Configuring Windows integration settings
      14. Managing Intrusion Prevention Policies
        1. Configuring intrusion prevention
        2. Managing custom signatures
      15. Managing Application and Device Control Policies
        1. Creating application and device control policies
        2. Defining application control
        3. Modifying policy rules
        4. Defining device control
      16. Customizing Network Threat Protection and Application and Device Control
        1. Tools for customizing network threat protection
        2. Managing policy components
        3. Configuring learned applications
        4. Configuring system lockdown
      17. Virtualization
        1. Introducing virtualization features
        2. Virtual image exception
        3. Shared Insight Cache
        4. Virtual client tagging
        5. Of f line image scanner
      18. Configuring Replication and Failover and Load Balancing
        1. About sites and replication
        2. How replication works
        3. Symantec Endpoint Protection replication scenarios
        4. Configuring replication
        5. Failover and load balancing
      19. Performing Server and Database Management
        1. Managing SEPM servers
        2. Maintaining server security
        3. Communicating with other servers
        4. Managing administrators
        5. Managing the database
        6. Disaster recovery techniques
      20. Advanced Monitoring and Reporting
        1. Monitoring the Home and Monitors page
        2. Analyzing and managing logs
        3. Configuring and viewing notifications
        4. Creating and reviewing reports
        5. Introducing IT Analytics

Back to Top

Do you have the right background for Symantec Endpoint Protection 12.X: Administration?

Skills Assessment

We ensure your success by asking all students to take a FREE Skill Assessment test. These short, instructor-written tests are an objective measure of your current skills that help us determine whether or not you will be able to meet your goals by attending this course at your current skill level. If we determine that you need additional preparation or training in order to gain the most value from this course, we will recommend cost-effective solutions that you can use to get ready for the course.

Our required skill-assessments ensure that:

  1. All students in the class are at a comparable skill level, so the class can run smoothly without beginners slowing down the class for everyone else.
  2. NetCom students enjoy one of the industry's highest success rates, and pass rates when a certification exam is involved.
  3. We stay committed to providing you real value. Again, your success is paramount; we will register you only if you have the skills to succeed.
This assessment is for your benefit and best taken without any preparation or reference materials, so your skills can be objectively measured.

Take your FREE Skill Assessment test »

Back to Top

Award winning, world-class Instructors

Our instructors are passionate at teaching and are experts in their respective fields. Our average NetCom instructor has many, many years of real-world experience and impart their priceless, valuable knowledge to our students every single day. See our world-class instructors.   See more instructors...

Back to Top

Client Testimonials & Reviews about their Learning Experience

We are passionate in delivering the best learning experience for our students and they are happy to share their learning experience with us.
Read what students had to say about their experience at NetCom.   Read student testimonials...

Back to Top