Symantec Data Loss Prevention 12.5: Administration

Symantec Data Loss Prevention 12.5: Administration Course Description

Duration: 5.00 days (40 hours)

The Symantec Data Loss Prevention 12.5: Administration course is designed to provide you with the fundamental knowledge to configure and administer the Symantec Data Loss Prevention Enforce platform. The hands-on labs include exercises for configuring Enforce server, detection servers, and DLP Agents as well as reporting, workflow, incident response management, policy management and detection, response management, user and role administration, directory integration, and filtering. Additionally, you are introduced to deployment best practices and the following Symantec Data Loss Prevention products: Network Monitor, Mobile Email Monitor, Mobile Prevent, Network Prevent, Network Discover, Network Protect, Endpoint Prevent, and Endpoint Discover. Note that this course is delivered on a Microsoft Windows platform.

Next Class Dates

Contact us to customize this class with your own dates, times and location. You can also call 1-888-563-8266 or chat live with a Learning Consultant.

Back to Top

Intended Audience for this Symantec Data Loss Prevention 12.5: Administration Course

  • » This course is intended for anyone responsible for configuring, maintaining, and troubleshooting Symantec Data Loss Prevention. Additionally, this course is intended for technical users responsible for creating and maintaining Symantec Data Loss Prevention policies and the incident response structure.

Back to Top

Symantec Data Loss Prevention 12.5: Administration Course Outline

      1. Introduction to Symantec Data Loss Prevention
        1. Symantec Data Loss Prevention overview
        2. Symantec Data Loss Prevention architecture
      2. Navigation and Reporting
        1. Navigating the user interface
        2. Reporting and analysis
        3. Report navigation, preferences, and features
        4. Report filters
        5. Report commands
        6. Incident snapshot
        7. Incident Data Access
        8. IT Analytics
        9. Hands-on labs: Become familiar with navigation and tools in the user interface. Create, filter, summarize, customize, and distribute reports. Create users, roles, and attributes
      3. Incident Remediation and Workflow
        1. Incident remediation and workflow
        2. Managing users and attributes
        3. Custom attribute lookup
        4. User Risk Summary
        5. Hands-on labs: Remediate incidents and configure a user--s reporting preferences
      4. Policy Management
        1. Policy overview
        2. Creating policy groups
        3. Using policy templates
        4. Building policies
        5. Policy development best practices
        6. Hands-on labs: Use policy templates and policy builder to configure and apply new policies
      5. Response Rule Management
        1. Response rule overview
        2. Creating Automated Response rules
        3. Creating Smart Response rules
        4. Response rule best practices
        5. Hands-On Labs: Create and use Automated and Smart Response rules
      6. Described Content Matching
        1. DCM detection methods
        2. Use cases
        3. Using DCM in policies
        4. Hands-on labs: Create policies that include DCM and then use those policies to capture incidents
      7. Exact Data Matching and Directory Group Matching
        1. Exact data matching (EDM)
        2. Directory group matching (DGM)
        3. Advanced EDM
        4. Hands-on labs: Create policies that include EDM and DGM, and then use those policies to capture incidents
      8. Indexed Document Matching
        1. Indexed document matching (IDM)
        2. Using IDM in policies
        3. Hands-on labs: Create policies that include IDM rules and then use those policies to capture incidents
      9. Vector Machine Learning
        1. Vector Machine Learning (VML)
        2. Creating a VML profile
        3. Hands-on labs: Create a VML profile, import document sets, and create a VML policy
      10. Network Monitor
        1. Review of Network Monitor
        2. Protocols
        3. Traffic filtering
        4. Network Monitor best practices
        5. Hands-On Labs: Apply IP and L7 filters
      11. Network Prevent
        1. Network Prevent overview
        2. Introduction to Network Prevent (Email)
        3. Introduction to Network Prevent (Web)
        4. Hands-On Labs: Configure Network Prevent
        5. (E-mail) response rules, incorporate them into policies, and use the policies to capture incidents
      12. Mobile Email Monitor and Mobile Prevent
        1. Introduction to Mobile Email Monitor
        2. Installing and configuring Mobile Email Monitor
        3. Mobile Prevent overview
        4. Installation and configuration
        5. VPN configuration
        6. Policy and response rule configuration
        7. Reporting and remediation
        8. Logging and troubleshooting
      13. Network Discover and Network Protect
        1. Network Discover and Network Protect overview
        2. Configuring Discover targets
        3. Protecting data
        4. Auto-discovery of servers and shares
        5. FlexResponse platform
        6. Running and managing scans
        7. Reports, remediation, and Data Owner Portal
        8. Network Discover and Network Protect best practices
        9. Hands-on labs: Create and run a file system target using various response rules, including quarantining
        10. Capturing Endpoint Prevent incidents and viewing them in reports
        11. Managing DLP Agents
        12. Endpoint Prevent best practices
        13. Hands-on labs: Create Agent Groups and Endpoint response rules, monitor and block Endpoint actions, view Endpoint incidents, and use the Enforce console to manage DLP Agents
      14. Enterprise Enablement
        1. Preparing for risk reduction
        2. Risk reduction
        3. DLP Maturity model
      15. System Administration
        1. Server administration
        2. Language support
        3. Incident Deleter
        4. Credential management
        5. Troubleshooting
        6. Diagnostic tools
        7. Troubleshooting scenario
        8. Getting support
        9. Hands-on labs: Interpret event reports and traffic reports, configure alerts, and use the Log Collection and Configuration tool
      16. Endpoint Prevent
        1. Endpoint Prevent overview
        2. Configuring Endpoint Prevent
        3. Detection capabilities at the Endpoint
        4. Creating Endpoint response rules

Back to Top

Do you have the right background for Symantec Data Loss Prevention 12.5: Administration?

Skills Assessment

We ensure your success by asking all students to take a FREE Skill Assessment test. These short, instructor-written tests are an objective measure of your current skills that help us determine whether or not you will be able to meet your goals by attending this course at your current skill level. If we determine that you need additional preparation or training in order to gain the most value from this course, we will recommend cost-effective solutions that you can use to get ready for the course.

Our required skill-assessments ensure that:

  1. All students in the class are at a comparable skill level, so the class can run smoothly without beginners slowing down the class for everyone else.
  2. NetCom students enjoy one of the industry's highest success rates, and pass rates when a certification exam is involved.
  3. We stay committed to providing you real value. Again, your success is paramount; we will register you only if you have the skills to succeed.
This assessment is for your benefit and best taken without any preparation or reference materials, so your skills can be objectively measured.

Take your FREE Skill Assessment test »

Back to Top

Award winning, world-class Instructors

Our instructors are passionate at teaching and are experts in their respective fields. Our average NetCom instructor has many, many years of real-world experience and impart their priceless, valuable knowledge to our students every single day. See our world-class instructors.   See more instructors...

Back to Top

Client Testimonials & Reviews about their Learning Experience

We are passionate in delivering the best learning experience for our students and they are happy to share their learning experience with us.
Read what students had to say about their experience at NetCom.   Read student testimonials...

Back to Top