Course Details

Your Growth, Our Mission

SYMANTEC DATA LOSS PREVENTION 14.6 ADMINISTRATION
Course Description
The Symantec Data Loss Prevention 14.X: Administration course is designed to provide you with the fundamental knowledge to configure and administer the Symantec Data Loss Prevention Enforce platform. The hands-on labs include exercises for configuring Enforce server, detection servers, and DLP agents as well as performing policy creation and incident detection, incident response, incident reporting, and user and role administration. Additionally, you are introduced to deployment best practices and the following Symantec Data Loss Prevention products: Network Monitor, Network Prevent, Cloud Service for Email, Network Discover, Network Protect, Cloud Storage, Endpoint Prevent, and Endpoint Discover. Note that this course is delivered on a Microsoft Windows platform.

After you complete this course, you should be able to:

Configure and use Symantec Data Loss Prevention 14.X

This course is intended for anyone responsible for configuring, maintaining, and troubleshooting Symantec Data Loss Prevention as well as technical users responsible for creating and maintaining Symantec Data Loss Prevention policies and the incident response structure

Lesson 1: Data Loss Prevention Landscape

  1. Data Loss Prevention landscape
  2. Data loss risk management
  3. Data Loss Prevention real-world use cases

Lesson 2: Overview of Symantec Data Loss Prevention

  1. Symantec Data Loss Prevention Suite
  2. Symantec Data Loss Prevention architecture

Lesson 3: Identifying and Describing Confidential Data

  1. Identifying confidential data
  2. Configuring Symantec Data Loss Prevention to recognize confidential data
  3. Described Content Matching (DCM)
  4. Exact Data Matching (EDM)
  5. Indexed Document Matching (IDM)
  6. Vector Machine Learning (VML)
  7. Form Recognition
  8. Custom file type detection
  9. Hands-On Labs Tour the Enforce console, create policy groups, configure a policy for Personally Identifiable Information (PII) detection, configure a policy for PCI compliance, configure a policy to protect confidential documents, configure a policy for source code protection, configure a policy for Form Recognition, use a template to add a DLP policy

Lesson 4: Locating Confidential Data at Rest

  1. Determine Where to Search for Confidential Data
  2. Locate Confidential Data on Corporate Repositories
  3. Locate Confidential Data in the Cloud
  4. Locate Confidential Data on Endpoint Computers
  5. Hands-On Labs Run a Content Enumeration Scan, scan a Windows target, scan endpoint computers.

Lesson 5: Understanding How Confidential Data is Being Used

  1. Monitoring confidential data moving across the network
  2. Monitoring confidential data being used on endpoint computers
  3. Hands-On Labs Configure Network Prevent for Email to monitor SMTP messages, use Network Prevent for Email to monitor SMTP messages, monitor Endpoint activity

Lesson 6: Educating End Users to Adopt Data-Protection Practices

  1. Implementing corporate training on data protection policies
  2. Providing notifications of user policy violations
  3. Hands-On Labs Configure the Active Directory lookup plugin, configure email notifications, configure onscreen notifications

Lesson 7: Preventing Unauthorized Exposure of Confidential Data

  1. Using response rules to prevent the exposure of confidential data
  2. Protecting confidential data in motion
  3. Protecting confidential data in use
  4. Protecting confidential data at rest
  5. Hands-On Labs Configure SMTP blocking, configure Endpoint blocking, configure Endpoint User Cancel, scan and quarantine files on a server file share target, scan and quarantine files on an Endpoint target

Lesson 8: Remediating Data Loss Incidents and Tracking Risk Reduction

  1. Reviewing risk management frameworks
  2. Using incident reporting options to identify and assess risk
  3. Creating tools that support the organization’s risk reduction process
  4. Communicating risk to stakeholders
  5. Understanding advanced reporting options and analytics
  6. Hands-On Labs Configure roles and users, use reports to track risk exposure and reduction, define incident statuses and status groups, configure and use Smart Responses, schedule and send reports

Lesson 9: Enhancing Data Loss Prevention Through Third-Party Integrations

  1. Symantec DLP integration mechanisms
  2. Symantec Enterprise Security solutions
  3. Overview of commercial third-party ecosystem for augmenting data protection programs
  4. Hands-On Labs Create the views schema and user, run the incident data view setup script, verify incident data views creation, use incident data views

Lesson 10: Review of Symantec Data Loss Prevention

  1. Review of Symantec DLP products and architecture
  2. Review of the stages in a Data Loss Prevention implementation

 

Request Info

Course Rounds

5 Days
Code Date Venue Fees Action

Prices don't include VAT

Related Courses

Your Growth, Our Mission

Contact Us

Contact us to meet all your inquiries and needs, as our professional team is pleased to provide immediate support and advice to ensure you achieve your goals and facilitate your experience with us in the best possible way.

UAE
1st floor, Incubator Building, Masdar City, Abu Dhabi, UAE
Office
00971-2-6446633
Mobile
00971-50-5419377
E-mail
info@btsconsultant.com
Working Hours
Sun to Fri 09:00 AM to 06:00 PM