Symantec Endpoint Protection 12.x: Install, Configure and Deploy
The Symantec Endpoint Protection 12.x: Install, Configure, and Deploy course is designed for the network, IT security, and systems administration professional tasked with architecting and implementing Symantec Endpoint Protection. This class covers how to design, deploy, install, configure, manage, and monitor Symantec Endpoint Protection 12.x in a Windows, Mac, and Linux environment.
- Skills Gained
- Who Can Benefit
By the completion of this course, you will be able to:
- Describe Symantec Endpoint Protection products, components, dependencies, and system hierarchy.
- Install and configure Symantec Endpoint Protection management and client components.
- Deploy Symantec Endpoint Protection Windows, Windows Embedded, Mac and Linux clients.
- Manage the client user interface.
- Manage content updates for Windows, Mac, and Linux.
- Perform server and database management
- Configure replication and load balancing.
- Design a Symantec Endpoint Protection environment
This course is for network managers, resellers, systems administrators, client security administrators, systems professionals, and consultants who are charged with the installation, configuration, and day-to-day management of Symantec Endpoint Protection in a variety of network environments, and who are responsible for troubleshooting and tuning the performance of this product in the enterprise environment.
You must have working knowledge of advanced computer terminology, including TCP/IP networking terms and Internet terms, and an administrator-level knowledge of Microsoft Windows operating systems.
This course includes practical hands-on exercises that enable you to test your new skills and begin to use those skills in a working environment
- Course overview
- The classroom lab environment
- Symantec Endpoint Protection Product Solution
Why use Symantec Endpoint Protection?
- Symantec Endpoint Protection technologies
- Symantec Endpoint Protection services
- Symantec Endpoint Protection components
- Symantec Endpoint Protection policies and concepts
- Extending Symantec Endpoint Protection
- Installing the Symantec Endpoint Protection Manager
Identifying system requirements
- Preparing servers for installation
- Installing and configuring the Symantec Endpoint Protection Manager
- Describing Symantec Endpoint Protection upgrades and version compatibility
- Configuring the Symantec Endpoint Protection Environment
Starting and navigating the SEPM
- Describing policy types and components
- Console authentication
- Licensing the SEP environment
- Deploying Windows and Windows Embedded Clients
Planning the client deployment
- Configuring client deployment package
- Deploying packages to clients
- Maintaining the client environment
- Upgrading Symantec Endpoint Protection clients
- Deploying Mac and Linux Clients
- Linux deployment
- Mac prerequisites
- Mac deployment
- Client and Policy Management
Describing SEPM and client communications
- Administering clients
- Configuring groups
- Configuring locations
- Active Directory integration with SEP 12.1
- Client configuration modes
- Configuring domains
- General client settings and Tamper Protection
- Configuring Content Updates for Windows Clients
- Configuring the SEPM for LiveUpdate
- Configuring the LiveUpdate Settings and Content policies
- Configuring multiple group update providers (GUPs)
- Manually updating virus definitions
- Configuring Content Updates for Mac and Linux Clients
Describing content update methods
- Configuring the LiveUpdate policy
- Configuring the SEPM as a reverse proxy
- Monitoring updates
- Performing Server and Database Management
Managing SEPM servers
- Maintaining server security
- Communicating with other servers
- Managing administrators
- Managing the database
- Disaster recovery techniques
- Configuring Replication and Failover and Load Balancing
About sites and replication
- How replication works
- Symantec Endpoint Protection replication scenarios
- Configuring replication
- Failover and load balancing
- Designing a Symantec Endpoint Environment
- Architecture constraints
- Component placement
- Content delivery
- Determining client to SEPM ratios
- SEPM and database sizing best practices