Description

The Symantec Data Loss Prevention 12: Administration course is designed to provide fundamental knowledge to configure and administer the Symantec Data Loss Prevention Enforce platform. The hands-on lab include exercises for configuring Enforce server, detection servers, and DLP Agents as well as reporting, workflow, incident response management, policy management and detection, response management, user and role administration, directory integration, and filtering. Additionally, you are introduced to deployment best practices and the following Symantec Data Loss Prevention products: Network Monitor, Mobile Email Monitor, Mobile Prevent, Network Prevent, Network Discover, Network Protect, Endpoint Prevent, and Endpoint Discover. Note that this course is delivered on a Microsoft Windows platform.

Objectives

By the end of this course, you will be able to configure and use Symantec Data Loss Prevention 12.

Audience

This course is intended for anyone responsible for configuring, maintaining, and troubleshooting Symantec Data Loss Prevention. Additionally, this course is intended for technical users responsible for creating and maintaining Symantec Data Loss Prevention policies and the incident response structure.

Prerequisites

You must have basic working knowledge of Microsoft Windows server-class operating systems and commands, as well as networking and network security concepts.

Hands-On

This course includes practical exercises that enable you to test your new skills and begin to transfer them into your working environment.

Topics

Introduction to Symantec Data Loss Prevention

  • Symantec Data Loss Prevention overview
  • Symantec Data Loss Prevention architecture

Navigation and Reporting

  • Navigating the user interface
  • Reporting and analysis
  • Report navigation, preferences, and features
  • Report filters
  • Report commands
  • Incident snapshot
  • IT Analytics

Hands-on lab exercise: Become familiar with navigation and tools in the user interface. Create, filter, summarize, customize, and distribute reports. Create users, roles, and attributes

Incident Remediation and Workflow

  • Incident remediation and workflow
  • Managing users and attributes
  • Custom attribute lookup
  • User Risk Summary

Hands-on lab exercise: Remediate incidents and configure a user’s reporting preferences

Policy Management

  • Policy overview
  • Creating policy groups
  • Using policy templates
  • Building policies
  • Policy development best practices

Hands-on lab exercise: Use policy templates and policy builder to configure and apply new policies

Response Rule Management

  • Response rule overview
  • Creating Automated Response rules
  • Creating Smart Response rules
  • Response rule best practices

Hands-on Lab exercise: Create and use Automated and Smart Response rules

Described Content Matching

  • DCM detection methods
  • Use cases
  • Using DCM in policies

Hands-on lab exercise: Create policies that include DCM and then use those policies to capture incidents

Exact Data Matching and Directory Group Matching

  • • Exact data matching (EDM)
  • • Directory group matching (DGM)
  • • Advanced EDM

Hands-on lab exercise: Create policies that include EDM and DGM, and then use those policies to capture incidents

Indexed Document Matching

  • Indexed document matching (IDM)
  • Using IDM in policies

Hands-on lab exercises: Create policies that include IDM rules and use those policies to capture incidents

Vector Machine Learning

  • Vector Machine Learning (VML)
  • Creating a VML profile

Hands-on lab exercise: Create a VML profile, import document sets, and create a VML policy

Mobile Email Monitor and Network Monitor

  • Introduction to Mobile Email Monitor
  • Installing and configuring Mobile Email Monitor
  • Review of Network Monitor
  • Protocols
  • Traffic filtering
  • Network Monitor best practices

Hands-on Lab exercise : Apply IP and L7 filters

Network Prevent

  • Network Prevent overview
  • Introduction to Network Prevent (Email)
  • Introduction to Network Prevent (Web)

Hands-on Lab exercise: Configure Network Prevent (E-mail) response rules, incorporate them into policies, and use the policies to capture incidents

Mobile Prevent

  • Overview
  • Installation and configuration
  • MDM configuration and integration
  • VPN configuration
  • Policy and response rule configuration
  • Reporting and remediation
  • Logging and troubleshooting

Network Discover and Network Protect

  • Network Discover and Network Protect overview
  • Configuring Discover targets
  • Protecting data
  • FlexResponse platform
  • Running and managing scans
  • Content Root Enumeration (CRE)
  • Reports and remediation
  • Network Discover and Network Protect best practices

Hands-on lab exercise: Create and run a file system target using various response rules, including quarantining

Endpoint Prevent

  • Endpoint Prevent overview
  • Configuring Endpoint Prevent
  • Detection capabilities at the Endpoint
  • Creating Endpoint response rules
  • Capturing Endpoint Prevent incidents and viewing them in reports
  • Managing DLP Agents
  • Endpoint Prevent best practices

Hands-on lab exercise: Create Endpoint response rules, monitor and block Endpoint actions, view Endpoint incidents, and use the Enforce console to manage DLP Agents

Endpoint Discover

  • Endpoint Discover overview
  • Creating and running Endpoint Discover targets
  • Using Endpoint Discover reports and reporting features

Hands-on lab exercise: Create Endpoint Discover targets, run Endpoint Discover targets, and view Endpoint Discover incidents

Enterprise Enablement

  • Preparing for risk reduction
  • Risk reduction
  • DLP Maturity model

System Administration

  • Server administration
  • Language support
  • Credential management
  • Troubleshooting
  • Diagnostic tools
  • Troubleshooting scenario
  • Getting support