Professional Documents
Culture Documents
5
Administration
COURSE DESCRIPTION Hands‐On
This course includes practical hands‐on
The Symantec Data Loss Prevention 15.5 exercises that enable you to test your new skills
Administration course is designed to provide and begin to use those skills in a working
you with the fundamental knowledge to environment.
configure and administer the Symantec Data
Loss Prevention Enforce platform. The hands‐on
labs include exercises for configuring Enforce COURSE OUTLINE
server, detection servers, and DLP agents as Module 1: Data Loss Prevention Landscape
well as performing policy creation and incident
Data Loss Prevention landscape
detection, incident response, incident
reporting, and user and role administration. Data loss risk management
Additionally, you are introduced to deployment Data Loss Prevention real‐world use
best practices and the following Symantec Data cases
Loss Prevention products: Network Monitor,
Network Prevent, Cloud Service for Email, Module 2: Overview of Symantec Data Loss
Network Discover, Network Protect, Cloud Prevention
Storage, Endpoint Prevent, and Endpoint Symantec Data Loss Prevention Suite
Discover. Note that this course is delivered on a Symantec Data Loss Prevention
Microsoft Windows platform. architecture
Delivery Method Module 3: Identifying and Describing
Instructor‐led Confidential Data
Duration Identifying confidential data
Five days Configuring Symantec Data Loss
Prevention to recognize confidential
Course Objectives data
By the end of this course, you will be able to configure
Described Content Matching (DCM)
and use Symantec Data Loss Prevention 15.5.
Exact Data Matching (EDM)
Who Should Attend Indexed Document Matching (IDM)
This course is intended for anyone responsible for
Vector Machine Learning (VML)
configuring, maintaining, and troubleshooting
Symantec Data Loss Prevention. Additionally, this Sensitive Image Recognition
course is intended for technical users responsible for Custom file type detection
creating and maintaining Symantec Data Loss Hands‐On Labs: Tour the Enforce
Prevention policies and the incident response console, create policy groups, configure
structure. a policy for Personally Identifiable
Information (PII) detection, configure a
Prerequisites policy for PCI compliance, configure a
You must have a working knowledge of
policy to protect confidential
Windows server‐class operating systems and
documents, configure a policy to
commands, as well as networking and network
protect source code, configure a policy
security concepts.
© 2019 Symantec Corporation. All Rights Reserved. Symantec, the Symantec Logo and the Checkmark Logo are trademarks or registered trademarks of
Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
for Form Recognition, use a template to Protecting confidential data at rest
add a DLP policy, export policies for use Hands‐On Labs: Configure SMTP
at a Disaster Recovery (DR) site, blocking, test Optical Character
configure Optical Character Recognition Recognition (OCR) and the “HIPAA and
(OCR) HITECH (including PHI)” policy,
configure endpoint blocking, configure
Module 4: Locating Confidential Data endpoint User Cancel, scan and
Stored on Premises and in the Cloud quarantine files on a server file share
Determining where to search for target, scan and quarantine files on an
confidential data endpoint target
Locating confidential data on corporate
repositories Module 8: Remediating Data Loss Incidents
Locating confidential data in the Cloud
and Tracking Risk Reduction
Locating confidential data on endpoint Reviewing risk management
computers frameworks
Hands‐On Labs: Run a Content Using incident reporting options to
Enumeration Scan, scan a Windows identify and assess risk
target, scan endpoint computers for Creating tools that support the
confidential data. organization’s risk reduction process
Module 5: Understanding How Communicating risk to stakeholders
Confidential Data is Being Used Understanding advanced reporting
Monitoring confidential data moving options and analytics
across the network Hands‐On Labs: Configure roles and
Monitoring confidential data being used users, use reports to track risk exposure
on endpoint computers and reduction, define incident statuses
and status groups, configure and use
Hands‐On Labs: Configure Network
Smart Responses, schedule and send
Prevent for Email to monitor SMTP
reports
messages, use Network Prevent for
Email to monitor SMTP messages, Module 9: Enhancing Data Loss Prevention
monitor Endpoint activity with Integrations
Module 6: Educating Users to Adopt Data Symantec DLP integration mechanisms
Protection Practices Symantec Information Centric Security
Implementing corporate training on Additional integrations with Symantec
data protection policies Enterprise solutions
Providing notifications of user policy Hands‐On Labs: Create the views
violations schema and user, run the incident data
Hands‐On Labs: Configure the Active view setup script, verify incident data
Directory lookup plugin, configure email views creation, use incident data views
notifications, configure onscreen
notifications
Module 10: Course Review
Module 7: Preventing Unauthorized Review of Symantec DLP products and
Exposure of Confidential Data architecture
Using response rules to prevent the Review of the stages in a Data Loss
exposure of confidential data Prevention implementation
Protecting confidential data in motion
Protecting confidential data in use
© 2019 Symantec Corporation. All Rights Reserved. Symantec, the Symantec Logo and the Checkmark Logo are trademarks or registered trademarks of
Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.