TRENDS delivers Symantec courses in partnership with Red Education.

Symantec Endpoint Encryption 11.x – Install Configure Deploy Course

Schedule

Start End Duration Location Details

Course Details

Symantec Endpoint Encryption 11.x – Install Configure Deploy Course

Course Code: SEEICDC11.x 

Duration: 3 Days

Prerequisite:

You must have working knowledge of advanced computer terminology, including TCP/IP networking terms and Internet terms, and administrator-level knowledge of Microsoft Windows 2000/XP/2003 operating systems and IIS, as well as knowledge about configuring SQL.

Course Description:

The Symantec Endpoint Encryption 11.x: Install, Configure, and Deploy course is designed for the network, IT security, systems administration, and support professional tasked with maintaining and troubleshooting a Symantec Endpoint Encryption environment. This class covers ongoing maintenance and troubleshooting from an administrative perspective, including installation, configuration, reporting, logging, and product maintenance. Students also learn how to install and use Symantec Endpoint Encryption Management Console, installing and configuring the drive encryption client and removable media encryption client, using the CD/DVD burning utility, and integrating with Symantec Data Loss Prevention and Symantec Encryption Management Server. This course is designed as an Install, Configure, and Deploy course which can be run Instructor Led or Virtual Academy.

Course Objectives:

• Perform Symantec Endpoint Encryption server and client installations.

• Configure connection to an SQL database.

• Configure drive and removable media policies.

• Explain details about drive encryption.

• Perform configuration of the various administrative roles.

• Integrate Symantec Data Loss prevention.

• Integrate Symantec Encryption Management Server for encrypted drive recovery.

• Manage client installations and user settings.

• Troubleshoot server and client issues.

Intended Audience:

This course is for customers, support engineers, consultants, and partners who need to maintain and troubleshoot Symantec Endpoint Encryption.

Course Outline:

Introduction

• Core benefits

• Architecture overview

• Why we need encryption

• Installation process and sequence

• Scalability

Management Server

• System requirements

• Overview of account types and roles

• Protocols and ports

• Connecting to the database

Prerequisite Software

• Installing prerequisite software

• Installing and configuring IIS

• Installing and configuring .NET

• SQL server installation

• Verifying installation

Server Installation

• The Symantec Endpoint Encryption Management Server installation

• SQL account configuration

• Management password

Server Installation

• Step-by-step installation process for the Symantec Endpoint Encryption Management Server

• Connecting to the database

• Authentication methods

• Database configuration

• Command line installation

Post Installation

• Initial configuration after installation

• Process overview

• Directory Synchronization

• Web service configuration

• Verifying the installation

Backup and Recovery

• Importance of backups

• Data to be backed up

• Recovery process

Management Console

• Using the Management Console for administration

• Configuration Manager vs. Management Console

• Using the Configuration Manager

• Roles and installation overview

Management Console in Detail

• Step-by-step installation process

• Roles • Back-end configuration

• System requirements

• Protocols and ports

• Account overview

• Connecting to the database

Server Roles

• Roles overview

• Assigning roles

• Editing roles

Configuring Policy

• About administrative policies

• Types of policies

• Policy options

• Group Policy Management

• Policy precedence order

• Policy comparisons

Configuring Policy in Detail

• Step-by-step policy creation

• Linking Group Policy Objects

• Creating Managed Computers groups

Drive Encryption

• Overview of Drive Encryption

• Autologon

• Smart cards and tokens

• Supported disk types

• Encryption details

• User registration

Drive Encryption in Detail

• Autologon setup

• Step-by-step installation process

• Generating Help Desk recovery keys

• Configure Client Administrators

• Preboot configuration

• Mac FileVault client creation

• Enabling encryption

Drive Encryption Recovery

• Self Recovery

• Help Desk Recovery

• WinPE Recovery Utility

Removable Media Encryption

• Purpose and features

• Encryption policy

• Recovery certificates

• Portability options

Removable Media Encryption in Detail

• Creating a Removable Media Encryption installation package

• Step-by-step installation process

Reporting

• About reports

• Customizing report appearance

• Viewing reports

• Creating and editing custom reports

DLP Integration

• Using Symantec Endpoint Encryption with Data Loss Prevention

Management Agent

• Overview of communication

• Settings

• Client Administrators

• Configuring Self Recovery

• Logon history

Client Management

• Settings

• Client Administrators

• Checking encryption status from the client

Server Based Commands

• Server based commands

• Available actions Virtual Desktops

• Overview of managing Symantec Endpoint Encryption policies on virtual desktops

RME Burner

• Encrypt and burn files and folders onto CD type media

SEE and SEMS

• Interfacing with Symantec Encryption Management Server

SEE in Server-less mode

• Server-less mode for Symantec Endpoint Encryption