Course Description This course is designed for the network, IT security, and systems administration professional tasked with architecting, implementing, and monitoring virus and spyware protection, zero-day protection, and network threat protection solutions. Monitor and maintain the Symantec Endpoint Protection environment.This class covers how to design, deploy, install, configure, manage, and monitor Symantec Endpoint Protection 12.1 (SEP 12.1). Interface the Symantec Endpoint Protection Manager with Protection Center.
Course Objectives By the completion of this course, you will be able to: Describe Symantec Endpoint Protection products,components, dependencies, and system hierarchy. Course Outline Symantec Endpoint Protection Product Solution Why use Symantec Endpoint Protection?
Install and configure Symantec Endpoint Protection management and client components. Symantec Endpoint Protection technologies Symantec Endpoint Protection services Symantec Endpoint Protection components Symantec Endpoint Protection policies and concepts Symantec Endpoint Protection product tiers Installing Symantec Endpoint Protection Identifying system requirements Preparing servers for installation Installing and configuring the Symantec Endpoint Protection Manager Describing Symantec Endpoint Protection migration and version compatibility Configuring the Symantec Endpoint Protection Environment Starting and navigating the SEPM Describing policy types and components Console authentication Licensing the SEP environment Deploying Clients Client requirements and deployment methods Preparing for client deployment Client installation packages, settings, and features Installing managed clients Configuring an unmanaged detector Upgrading Symantec Endpoint Protection clients Client and Policy Management Describing SEPM and client communications Administering clients Configuring groups Configuring locations Active Directory integration with SEP 12.1 Client configurat ion modes Configuring domains General client settings and Tamper Protection Configuring Content Updates Introducing Live Update Configuring the SEPM for Live Update Configuring the Live Update Settings and Content policies Configuring multiple group update providers (GUPs) Manually updating virus definitions Designing a Symantec Endpoint Environment Architecture and sizing considerations Designing the architecture Determining client-to-SEPM ratios Content distribution methods SEPM and database sizing Completing the deployment Introducing Antivirus, Insight, and SONAR Virus and spyware protection needs and solutions Reputation and Insight Administrator-defined scans Auto-Protect Download Insight SONAR Included Virus and Spyware Protection policies Managing Virus and Spyware Protection Policies Configuring administrator-defined scans Configuring protect ion technology settings and scans Configuring e-mail scans Configuring advanced opt ions Configuring Mac client detect ion Managing scanned clients Configuring Mac Virus and Spyware Protection policy settings Managing Exception Policies Exceptions and exclusions Conf guring the Exceptions policy Introducing Network Threat Protection and Application and Device Control Network threat protection basics The firewall Intrusion prevention Application access protection Managing Firewall Policies Firewall policy overview Defining rule components Modifying firew all rules Configuring built- in rules Configuring protect ion and stealth settings Configuring Windows integration settings Managing Intrusion Prevention Policies Configuring intrusion prevention Managing custom signatures Managing Application and Device Control Policies Creating application and device control policies Defining application control Modifying policy rules Defining device control Customizing Network Threat Protection and Application and Device Control Tools for customizing network threat protection Managing policy components Configuring learned applications Configuring system lockdown Virtualization Introducing virtualization features Virtual image exception Shared Insight Cache Virtual client tagging Offline image scanner Configuring Replication and Failover and Load Balancing About sites and replication How replication works Symantec Endpoint Protection replication scenarios Configuring replication Failover and load balancing Performing Server and Database Management Managing SEPM servers Maintaining server security Communicating with other servers Managing administrators Managing the database Disaster recovery techniques Advanced Monitoring and Reporting Monitoring the Home and Monitors page Analyzing and managing logs Configuring and viewing notifications Creating and reviewing reports Introducing IT Analytics Interfacing the SEPM with Protection Center Describing Protection Center Describing the Protection Center appliance Configuring Protection Center Using Protection Center View outline in Word Attend hands-on, instructor-led Symantec Endpoint Protection 12.x: Administration training classes at ONLC's more than 300 locations. Attend these same live classes from your home/office PC via our Remote Classroom Instruction (RCI) technology.
Users connected to Casper (Macs) can get the update in Casper's Self Service. It is recommended that Macs be enrolled in Casper to receive automatic updates in the future.
Those not connected to the MESA or Casper will have to manually download the new client, which is now available on the IT Services web site at edu/downloads/or at edu.
All the traffic from the server to the client was flowing smoothly, quickly, without tcp resets, without delays.
The most interesting thing was from the client side trace.
The client was in one office building with one domain and the Share Point farm was in a datacenter that was part of another domain. So of course we took some network monitor traces to try to see where the latency really was.
To my surprise, everything from the server side traces (WFEs, DCs, SQL) looked good.
If you are a Systems Administrator, please contact the IT Security Office at 703-993-2906 or [email protected] additional information.