Professional Documents
Culture Documents
Forcepoint - DLP - Sentinelone SOW
Forcepoint - DLP - Sentinelone SOW
1
2
3
4
5
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
Forcepoint || Endpoint DLP
Work Milestones
Initial Tasks and Pre-requisites
License Delivery
Pre-deployment preparation
Project Kickoff meeting
Getting all the Technical Information from the customer (Windows, MAC & Linux) versions etc.,
Phase1: Migration / Implementation KT to customer
HLD Document Preparation
Other documents as required
Signoff for acceptance of activities
Phase2: Configuration of Appliance /Server
Installation of Management Server and its softwate
Setting up AD or other Domain Integration
Configuring Local Discovery policies
Configuring Removable Media Security Policies
Configuring Application Controls for Copu/paste, print, print screen, file access security policies
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Sr.
No.
1
2
3
4
5
7
8
9
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
SentinelONE || XDR
Work Milestones
Initial Tasks and Pre-requisites
License Delivery
Pre-deployment preparation
Project Kickoff meeting
Getting all the Technical Information from the customer (Windows, MAC & Linux) versions etc.,
Phase1: Migration / Implementation KT to customer
HLD Document Preparation
Other documents as required
Signoff for acceptance of activities
Phase2: Configuration of Server
Installation of Management Server and its softwate
Adding admin users with MFA Authentication
Configuring Removable Media Security Policies
Configure the Allow and block the files and applications
Configure the policies whether the incident to be detected , block and quarantine , block and remediate state
Fine-tune detection and response capabilities based on evolving threats and attack trends.
Generate regular reports for threat trends, and incident response metrics
Emergency support for critical incidents(24/7)
Response times for various support requests.
Phase4: Validation of configuration & Test run in UAT environment
Roll out the Agent for Tesing users
Enforing all the policies to the test users
Pilot testing sign-off
Phase5: Go-to-Live & Observation
Mass roll out of endpoint clients
Troubleshooting if any communication or agent related issues
Phase6: Fine tuning & Sign-off
Fine tuning of policies based on customer need
Installation Sign-off
Documentation Sign-off
Action
Time required Status Remarks
Owner
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start
Yet to Start