Menu Icon

Courses & certifications

Home > Symantec Training > Security Training > Endpoint Protection Training > Symantec End point protection 12.x : Administration

Symantec End point protection 12.x : Administration

The Symantec Endpoint Protection 12.1: Administration course is designed for the network, IT security, and systems administration professional tasked with architecting, implementing, and monitoring virus and spyware protection, zero-day protection, and network threat protection solutions. This class covers how to design, deploy, install, configure, manage, and monitor Symantec Endpoint Protection 12.1 (SEP 12.1). Students learn how to create and implement the client firewall, intrusion prevent ion, application and device control, and behavioral protection policies that guard the enterprise from viruses and hackers. In addition, students learn how to perform server and database management, expand the management environment , use virtualization features for virtual clients, and interface the Symantec Endpoint Protect ion Manager with Protection Center.

  • Skills Gained
  • Who Can Benefit
  • Prerequisites
  • Syllabus
Describe Symantec Endpoint Protection products, components, dependencies, and system hierarchy.
Install and configure Symantec Endpoint Protection management and client components.
Deploy Symantec Endpoint Protection clients.
Manage the client user interface.
Manage product content updates.
Design a Symantec Endpoint Protection environment.
Manage Virus and Spyware Protection policies.
Manage SONAR scans.
Manage Firewall and Intrusion Prevention policies.
Manage Application and Device Control policies.
Manage virtualized clients.
Configure replication and load balancing.
Monitor and maintain the Symantec Endpoint Protection environment.
Interface the Symantec Endpoint Protection Manager with Protection Center.
Who Can Benefit
This course is for network managers, resellers, systems administrators, client security administrators, systems professionals, and consultants w ho are charged with the installation, configuration, and day-to-day management of Symantec Endpoint Protection in a variety of network environments, and who are responsible for troubleshooting and tuning the performance of this product in the enterprise environment.
You must have working knowledge of advanced computer terminology, including TCP/ IP networking terms and Internet terms, and an administrator-level know ledge of Microsoft Windows 2000/XP/2003 operating systems.


Course overview
The classroom lab environment

Symantec Endpoint Protection Product Solution

Why use Symantec Endpoint Protection?
Symantec Endpoint Protection technologies
Symantec Endpoint Protection services
Symantec Endpoint Protection components
Symantec Endpoint Protection policies and concepts
Symantec Endpoint Protection product tiers

Installing Symantec Endpoint Protection

Identifying system requirements
Preparing servers for installation
Installing and configuring the Symantec Endpoint Protection Manager
Describing Symantec Endpoint Protection migration and version compatibility

Configuring the Symantec Endpoint Protection Environment

Starting and navigating the SEPM
Describing policy types and components
Console authentication
Licensing the SEP environment

Deploying Clients

Client requirements and deployment methods
Preparing for client deployment
Client installation packages, settings, and features
Installing managed clients
Configuring an unmanaged detector
Upgrading Symantec Endpoint Protection clients

Client and Policy Management

Describing SEPM and client communications
Administering clients
Configuring groups
Configuring locations
Active Directory integration with SEP 12.1
Client configuration modes
Configuring domains
General client settings and Tamper Protection

Configuring Content Updates

Introducing LiveUpdate
Configuring the SEPM for LiveUpdate
Configuring the LiveUpdate Settings and Content policies
Configuring multiple group update providers (GUPs)
Manually updating virus definitions

Designing a Symantec Endpoint Environment

Architecture and sizing considerations
Designing the architecture
Determining client-to-SEPM ratios
Content distribution methods
SEPM and database sizing
Completing the deployment

Introducing Antivirus, Insight, and SONAR

Virus and spyware protection needs and solutions
Reputation and Insight
Administrator-defined scans
Download Insight
Included Virus and Spyware Protection policies

Managing Virus and Spyware Protection Policies

Configuring administrator-defined scans
Configuring protection technology settings and scans
Configuring e-mail scans
Configuring advanced options
Configuring Mac client detection
Managing scanned clients
Configuring Mac Virus and Spyware Protect ion policy settings

Managing Exception Policies

Exceptions and exclusions
Configuring the Exceptions policy

Introducing Network Threat Protection and Application and Device Control

Network threat protection basics
The firewall
Intrusion prevention
Application access protection

Managing Firewall Policies

Firewall policy overview
Defining rule components
Modifying firewall rules
Configuring built- in rules
Configuring protect ion and stealth settings
Configuring Windows integration settings

Managing Intrusion Prevention Policies

Configuring intrusion prevention
Managing custom signatures

Managing Application and Device Control Policies

Creating application and device control policies
Defining application control
Modifying policy rules
Defining device control

Customizing Network Threat Protection and Application and Device Control

Tools for customizing network threat protection
Managing policy components
Configuring learned applications
Configuring system lockdown


Introducing virtualization features
Virtual image exception
Shared Insight Cache
Virtual client tagging
Off line image scanner

Configuring Replication and Failover and Load Balancing

About sites and replication
How replication works
Symantec Endpoint Protection replication scenarios
Configuring replication
Failover and load balancing

Performing Server and Database Management

Managing SEPM servers
Maintaining server security
Communicating with other servers
Managing administrators
Managing the database
Disaster recovery techniques

Advanced Monitoring and Reporting

Monitoring the Home and Monitors page
Analyzing and managing logs
Configuring and viewing notifications
Creating and reviewing reports
Introducing IT Analytics

Interfacing the SEPM with Protection Center

Describing Protection Center
Describing the Protection Center appliance
Configuring Protection Center
Using Protection Center
  • Course Code: SEP12-ADMIN
  • Duration : 5 days
  • Certified by: Symantec

The Symantec Endpoint Protection 12.1: Administration course is designed for the network, IT security, and systems administration professional tasked with architecting, implementing, and monitoring virus & spyware protection, zero-day protection, & network threat protection solutions.

RPS Travel & Stay

Worried about travel and Stay to our centers?

We can take care of that Find out more
Enquiry Image

India: +91 9148592716

International: +91 9883305050

Frequently Asked Questions


Students Certified


Keep me Updated

Get tips, latest Courses and Offers