Introduction to Symantec Cloud SOC
- Benefits and Challenges of Cloud Applications
- Problems Cloud SOC Solves
- Cloud SOC tools, information sources, and traffic flows
Configuring the Symantec Cloud SOC Portal
- Basic Navigation
- Managing Users, Groups, and Access Profiles
- Administrative Actions in the Settings Menu
- Auditing administrative actions
- Configuring Two-Factor Authentication
Identifying and Addressing Potential Risks in Cloud Applications
- Cloud applications and their risks
- The Cloud Application Discovery and Safe Adoption Lifecycle
- The Cloud Application Adoption Workflow
- The Cloud SOC Business Readiness Rating
- Importing firewall/proxy logs
- Using Audit data to inform policy in Proxy SG
Identifying How Data is Used and Shared in Cloud Applications
- Risk of shadow IT and shadow data
- Risk of malware and advanced threats
- Configuring Cloud SOC to collect cloud application log data
- Understanding how Cloud SOC monitors data in motion
- Configuring Cloud SOC to monitor data in motion
Identifying and Remediating Risky Behavior in Cloud Applications
- Identifying and remediating risky behavior in cloud applications: overview
- Understanding and configuring detectors
- Reviewing anomalous or unauthorized user activity
- Creating Threat Score-based policies
Protecting data in Cloud Applications
- Understanding the Cloud SOC data protection workflow
- Using Cloud SOC to control data exposure
- Integrating Cloud SOC with Information Centric Encryption (ICE)
- Integrating Cloud SOC with Symantec DLP
Understanding Reporting Options in Cloud SOC and Third-Party Solutions
- Overview of default Cloud SOC reporting
- Integrating Cloud SOC with SIEM solutions