TRENDS delivers Symantec courses in partnership with Red Education.
Symantec Endpoint Encryption 11.x – Install Configure Deploy Course
Schedule
Start | End | Duration | Location | Details |
---|
Course Details
Symantec Endpoint Encryption 11.x – Install Configure Deploy Course
Course Code: SEEICDC11.x
Duration: 3 Days
Prerequisite:
You must have working knowledge of advanced computer terminology, including TCP/IP networking terms and Internet terms, and administrator-level knowledge of Microsoft Windows 2000/XP/2003 operating systems and IIS, as well as knowledge about configuring SQL.
Course Description:
The Symantec Endpoint Encryption 11.x: Install, Configure, and Deploy course is designed for the network, IT security, systems administration, and support professional tasked with maintaining and troubleshooting a Symantec Endpoint Encryption environment. This class covers ongoing maintenance and troubleshooting from an administrative perspective, including installation, configuration, reporting, logging, and product maintenance. Students also learn how to install and use Symantec Endpoint Encryption Management Console, installing and configuring the drive encryption client and removable media encryption client, using the CD/DVD burning utility, and integrating with Symantec Data Loss Prevention and Symantec Encryption Management Server. This course is designed as an Install, Configure, and Deploy course which can be run Instructor Led or Virtual Academy.
Course Objectives:
• Perform Symantec Endpoint Encryption server and client installations.
• Configure connection to an SQL database.
• Configure drive and removable media policies.
• Explain details about drive encryption.
• Perform configuration of the various administrative roles.
• Integrate Symantec Data Loss prevention.
• Integrate Symantec Encryption Management Server for encrypted drive recovery.
• Manage client installations and user settings.
• Troubleshoot server and client issues.
Intended Audience:
This course is for customers, support engineers, consultants, and partners who need to maintain and troubleshoot Symantec Endpoint Encryption.
Course Outline:
Introduction
• Core benefits
• Architecture overview
• Why we need encryption
• Installation process and sequence
• Scalability
Management Server
• System requirements
• Overview of account types and roles
• Protocols and ports
• Connecting to the database
Prerequisite Software
• Installing prerequisite software
• Installing and configuring IIS
• Installing and configuring .NET
• SQL server installation
• Verifying installation
Server Installation
• The Symantec Endpoint Encryption Management Server installation
• SQL account configuration
• Management password
Server Installation
• Step-by-step installation process for the Symantec Endpoint Encryption Management Server
• Connecting to the database
• Authentication methods
• Database configuration
• Command line installation
Post Installation
• Initial configuration after installation
• Process overview
• Directory Synchronization
• Web service configuration
• Verifying the installation
Backup and Recovery
• Importance of backups
• Data to be backed up
• Recovery process
Management Console
• Using the Management Console for administration
• Configuration Manager vs. Management Console
• Using the Configuration Manager
• Roles and installation overview
Management Console in Detail
• Step-by-step installation process
• Roles • Back-end configuration
• System requirements
• Protocols and ports
• Account overview
• Connecting to the database
Server Roles
• Roles overview
• Assigning roles
• Editing roles
Configuring Policy
• About administrative policies
• Types of policies
• Policy options
• Group Policy Management
• Policy precedence order
• Policy comparisons
Configuring Policy in Detail
• Step-by-step policy creation
• Linking Group Policy Objects
• Creating Managed Computers groups
Drive Encryption
• Overview of Drive Encryption
• Autologon
• Smart cards and tokens
• Supported disk types
• Encryption details
• User registration
Drive Encryption in Detail
• Autologon setup
• Step-by-step installation process
• Generating Help Desk recovery keys
• Configure Client Administrators
• Preboot configuration
• Mac FileVault client creation
• Enabling encryption
Drive Encryption Recovery
• Self Recovery
• Help Desk Recovery
• WinPE Recovery Utility
Removable Media Encryption
• Purpose and features
• Encryption policy
• Recovery certificates
• Portability options
Removable Media Encryption in Detail
• Creating a Removable Media Encryption installation package
• Step-by-step installation process
Reporting
• About reports
• Customizing report appearance
• Viewing reports
• Creating and editing custom reports
DLP Integration
• Using Symantec Endpoint Encryption with Data Loss Prevention
Management Agent
• Overview of communication
• Settings
• Client Administrators
• Configuring Self Recovery
• Logon history
Client Management
• Settings
• Client Administrators
• Checking encryption status from the client
Server Based Commands
• Server based commands
• Available actions Virtual Desktops
• Overview of managing Symantec Endpoint Encryption policies on virtual desktops
RME Burner
• Encrypt and burn files and folders onto CD type media
SEE and SEMS
• Interfacing with Symantec Encryption Management Server
SEE in Server-less mode
• Server-less mode for Symantec Endpoint Encryption