McAfee Data Loss Prevention Endpoint

Similar documents
McAfee Host Data Loss Prevention Administration Intel Security Education Services Administration Course

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

McAfee Application Control / Change Control Administration Intel Security Education Services Administration Course

McAfee VirusScan and epolicy Orchestrator Administration Course

McAfee Certified Product Specialist McAfee epolicy Orchestrator

About Help Desk. McAfee Help Desk 2.0 Software. Product Guide. Functions of McAfee Help Desk software. Quarantine release.

McAfee Network Security Platform Administration Course

McAfee Data Loss Prevention Endpoint 9.4.0

McAfee Network Data Loss Prevention Administration Intel Security Education Services Administration Course

McAfee Data Loss Prevention Endpoint

McAfee Data Loss Prevention Endpoint

McAfee Security Information Event Management (SIEM) Administration Course 101

McAfee Endpoint Encryption for PC 7.0

McAfee Data Loss Prevention 9.3.0

Product Guide Revision A. McAfee Data Loss Prevention Endpoint 9.3.0

Data Protection McAfee s Endpoint and Network Data Loss Prevention

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

McAfee Public Cloud Server Security Suite

McAfee Client Proxy 2.0

Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release)

McAfee Client Proxy Software

McAfee Data Loss Prevention Endpoint

McAfee Data Loss Prevention Endpoint


McAfee Cloud Single Sign On


Data Center Connector for vsphere 3.0.0

McAfee Endpoint Security Software

WatchDox Administrator's Guide. Application Version 3.7.5

McAfee Content Security Reporter 2.0.0

Polar Help Desk Installation Guide

Intel Security Certified Product Specialist Data Loss Prevention Endpoint (DLPe)

Data Center Connector for OpenStack

Release Notes for McAfee epolicy Orchestrator 4.5

VERITAS Backup Exec TM 10.0 for Windows Servers

CMB 207 1I Citrix XenApp and XenDesktop Fast Track

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2

VMware Identity Manager Administration

McAfee epolicy Orchestrator Software

Installation Guide. McAfee VirusScan Enterprise for Linux Software

Configuring and Managing Microsoft System Center Essentials 2010

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

Product Guide. McAfee Endpoint Security for Mac Threat Prevention

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

AWS Service Catalog. User Guide

Intel Security Certified Product Specialist

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and October 2013

Setting up Microsoft Office 365

Product Guide Revision A. McAfee Total Protection for Data Loss Prevention 9.2 Software

McAfee MOVE AntiVirus Multi-Platform 3.5.0

McAfee Database Activity Monitoring 5.0.0

McAfee Asset Manager Console

McAfee Web Gateway 7.4.1

Managed Antivirus Quick Start Guide

Implementing and Maintaining Microsoft SQL Server 2008 Integration Services

Cloud & Datacenter Monitoring with System Center Operations Manager

Sophos for Microsoft SharePoint startup guide

McAfee Firewall Enterprise System Administration Intel Security Education Services Administration Course

Release Notes for McAfee(R) VirusScan(R) Enterprise for Linux Version Copyright (C) 2014 McAfee, Inc. All Rights Reserved.

Xcalibur Global Version 1.2 Installation Guide Document Version 3.0

Citrix XenApp-7.6 Administration Training. Course



McAfee Directory Services Connector extension

Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Microsoft DirectAccess


Windows Server Update Services 3.0 SP2 Step By Step Guide

McAfee SiteAdvisor Enterprise 3.5 Patch 2

GFI Product Manual. Administration and Configuration Manual

McAfee VirusScan Enterprise for Linux Software

Interworks. Interworks Cloud Platform Installation Guide

Setting up Microsoft Office 365

Product Guide. McAfee epolicy Orchestrator Software

Setup Guide. Archiving for Microsoft Exchange Server 2007

Vector HelpDesk - Administrator s Guide

IDENTIKEY Appliance Administrator Guide

McAfee Security Architectures for the Public Sector

Course 55115: Planning, Deploying and Managing Microsoft Project Server 2013

How To Encrypt Files And Folders With A Password Protected By A Password Encrypted By A Safesafe (Mafee) (Eeff) 4

User Guide. Version R91. English

Endpoint Security for DeltaV Systems

Best Practices Guide. McAfee Endpoint Protection for Mac 1.1.0

Copyright 2012 Trend Micro Incorporated. All rights reserved.

RSA Authentication Manager 8.1 Virtual Appliance Getting Started

DameWare Server. Administrator Guide

McAfee Enterprise Mobility Management 11.0 Software

How To Buy Nitro Security

IBM WebSphere Partner Gateway V6.2.1 Advanced and Enterprise Editions

Setup Guide Revision B. McAfee SaaS Archiving for Microsoft Exchange Server 2010

NTP Software VFM Administration Web Site for Azure

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3

MS-55115: Planning, Deploying and Managing Microsoft Project Server 2013

NetWrix USB Blocker. Version 3.6 Administrator Guide

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

McAfee Network Security Platform 8.2

Administration Guide Revision E. Account Management. For SaaS and Web Security

Embedded Document Accounting Solution (edas) for Cost Recovery. Administrator's Guide

ADMINISTRATOR GUIDE VERSION

Course Agenda: Managing Active Directory with NetIQ Directory and Resource Administrator and NetIQ Exchange Administrator

Transcription:

McAfee Data Loss Prevention Endpoint Intel Security Education Services Administration Course Training The McAfee Data Loss Prevention Endpoint Administration course from Intel Education Services provides in-depth training on the tools you need to design, implement, configure, and use McAfee Data Loss Prevention Endpoint to safeguard intellectual property and ensure compliance. The course details how this solution uses McAfee epolicy Orchestrator for centralized management. It also explains how to monitor and address day-to-day enduser risky actions such as emailing, web posting, printing, clipboards, screen captures, device control, uploading to the cloud, and more. Course Goals Plan the deployment. Install and configure McAfee Data Loss Prevention Endpoint software on the McAfee epolicy Orchestrator server. Install the McAfee Data Loss Prevention Endpoint client endpoints. Use classification, tagging, and protection rules to safeguard sensitive information. Locate information with endpoint discovery rules. Monitor incidents and events and generate queries and reports. Agenda At A Glance Day 1 Welcome Solution Overview Planning the Deployment McAfee epo Review Preparing the Enterprise Environment Installing McAfee DLPe Software Permission Sets Audience This course is intended for system and network administrators, security personnel, auditors, and/ or consultants concerned with network and system security. Register Now for Training

Agenda At A Glance Continued Day 2 Day 3 Day 4 Deploying the McAfee DLPe Client Software DLP Policy Overview and Client Configuration DLP Policy Manager Overview and Initial Configuration DLP Privileged Users and End-User Group Device Control Content Protection Overview Classification and Tagging Removable Storage Protection Email Protection Web Protection Printing Protection Screen Capture Protection Clipboard Protection Cloud Protection Application File Access Protection McAfee Device Rule Sets and Rules Bring it All Together Endpoint Discovery Monitoring and Reporting Basic Troubleshooting Recommended Pre-Work It is recommended that students have working knowledge of network, system, and security administration is recommended. Prior experience with McAfee epo is also recommended. Course Outline Module 1: Welcome Welcome About the Course Acronyms and Terms in This Course Locating Helpful Resources Intel Security Expert Center Lab Environment Module 2: McAfee Data Loss Prevention Endpoint Solution Overview Sources of Data Loss Causes of Data Loss McAfee Data Loss Prevention (DLP) Portfolio Choosing a Data Loss Prevention Solution McAfee DLP Endpoint Overview New/Enhanced for DLP 9.4X How McAfee DLPe Works Classify Track Protect Monitor Module 3: Planning a McAfee epolicy Data Loss Prevention Endpoint Deployment Planning Overview Strategy and Goals: Internal Assessment Strategy and Goals: Role Assessment Strategy and Goals: Technical Assessment Strategy and Goals: Risk Assessment Strategy and Goals: Privacy Laws Classification: Sensitivity Classification: Methods Classification Scenario: Organizational Level

Module 3: Planning a McAfee epolicy Data Loss Prevention Endpoint Deployment (Continued) Classification Scenario: Applications Classification Scenario: End Users and Clients Classification: Find, Apply, and Enforce Deployment Planning Solution Requirements: epo Platform Solution Requirements: Database Solution Requirements: Clients Supported Third-party Software Pilot Plan Post Pilot Validation and Enterprise Rollout Other Planning Considerations Resource: Deployment Planning Questionnaire epo Server and Infrastructure Credentials Product-specific Questions Network Requirements McAfee epo and McAfee Agent Microsoft SQL Server Requirements Client Requirements Module 4: Preparing the Enterprise Environment Adding Active Directory Security Groups Adding Users to Active Directory Security Groups Verifying Active Directory Group Membership Preparing Resource Folders Configuring Sharing for Resource Folders Configuring Permissions for Resource Folders Verifying Sharing Settings Configuring Custom Permission Entries Changing Folder Permissions Removing Inheritable Permissions from Parent Check Point Adding Permission Entries Verifying New Permission Entries Module 5: McAfee epolicy Orchestrator Review McAfee epo Solution Overview McAfee epo Platform Requirements Default Ports Communications: Tomcat Service Logging into the McAfee epo Web Interface Quick Tour of the McAfee epo Web Interface Reporting Options Systems Options Policy Options Software Options Automation Options User Management Option Module 6: Installing McAfee Data Loss Prevention Endpoint Software Obtaining McAfee DLPe Software McAfee DLPe Software Overview Checking in the McAfee DLPe Package Installing the McAfee DLPe Extension Installing the McAfee DLPe License Verifying the McAfee DLPe Installation

Module 7: Permission Sets Viewing and Editing DLP Server Settings Permission Sets Overview Adding New DLP Permission Sets Default DLP Permissions: Policy Catalog Default DLP Permissions: DLP Policy Manager Default DLP Permissions: Classifications Default DLP Permissions: Definitions Default DLP Permissions: Operational Events Default DLP Permissions: Case Management Help Desk Permissions Case Study: DLPe Group Admin Case Study: Incident Reviewer Case Study: Redaction Reviewer Creating Help Desk Permission Sets Permissions Exclusive to Administrator User Management Review Guidelines for Authentication Types Creating DLPe Users Module 8: Deploying the McAfee Data Loss Prevention Endpoint Clients McAfee DLPe Client Overview Deploying Client Software from McAfee epo Console Comparing Client Software Deployment Methods Creating Product Deployment Project Creating Client Deployment Task Module 9: McAfee DLP Policy Overview and Initial Configuration Review: DLP Policies Rules and Rule Sets Definitions Policy Architecture Classification and Tagging Policy Overview McAfee DLP Client Configuration Policy Operational Modes Device Control and full content protection versus Device Control only Data Protection Modules Protection Settings: Whitelist Content Tracking Corporate Connectivity Debugging and Logging Evidence Copy Service Quarantine Removable Storage Protection Screen Capture Protection Web Post Protection User Interface Components McAfee DLP Policy Assigning Active Rule Sets Configuring Endpoint Discovery Scan Defining Global Settings DLP Endpoint Console

Module 10: McAfee DLP Policy Manager Overview McAfee DLP Policy Manager Review Rule Sets Tab Types of Rules Policy Assignment Tab Definitions Tab Supported Definitions Example Data Definitions Example Device Control Definition Example Definitions: Notification Example Definitions: Other Example Definitions: Source / Destination Other Features Module 11: Privileged Users and End-User Group Definitions Overview: Privileged Users, End- User Group Definitions, and Active Directory Registering an LDAP Server Active Directory Considerations Creating Privileged Users Example Privileged User Defining End-User Group Definitions Example End-User Group Definitions Multiple User Sessions Module 12: Device Control Device Control Overview Device Management Overview Device Management Overview: Device Classes Device Management Overview: Device Definitions Device Management Overview: PnP Devices Device Management Overview: Removable Storage Device Management Overview: Fixed Hard Drive Working with Device Classes Built-in Device Classes (Read-only) Adding New Device Class Locating Device GUI Working with Device Definitions Built-in Device Definitions (Readonly) Adding New Device Definition Example Conventions: Device Definitions Example: File System Definition Example: Plug and Play Device Definition Example: Removable Storage Device Definition Example: Whitelisted Plug and Play Devices Overriding Device Class Settings in DLP Policy Viewing Incidents Module 13: McAfee Device Rule Sets and Rules Device Rule Sets and Rules Overview Built-in Device Rule Sets and Rules Working with Device Rules Device Control Rule Tab Adding a Device Rule Example Conventions: Device Definitions Naming Conventions: Device Rules Citrix Device Rule Overview Citrix Device Rule Configuration Fixed Hard Drive Device Rule Overview Fixed Hard Drive Device Rule Configuration Plug and Play Device Rule Overview

Module 13: McAfee Device Rule Sets and Rules (Continued) Plug and Play Device Rule Configuration Example Removable Storage File Access Device Rule Removable Storage File Access Device Rule Configuration Removable Storage File Access Device Rule Configuration TrueCrypt Device Rule Overview TrueCrypt Device Rule Configuration Case Studies Module 14: Content Protection Overview Data Protection Overview Defining a Protection Strategy Business Requirements Rule Architecture Is Classification Criteria Sufficient? Is Tagging Criteria Needed? What are the Rule Parameters? What is the Desired Result or Outcome? Review: Definitions Example Conventions Data - File Extension Definition Notification Justification Definition Notification User Notification Definition Configuring Notification Placeholders Application Template Definition Email Address Definition Local Folder Definition Network Address (IP address) Definition Network Port Definition Network Printer Definition Network Share Definition Process Name Definition URL List Definition Window Title Definition Bringing it All Together Creating a Protection Rule Naming Conventions: Data Protection Rules Module 15: Content Classification and Tagging Classification Review Tag Propagation Tagging Rules More on Tagging Creating Classification Criteria Example Classifications and Criteria Creating Tagging Criteria Manual Classification Register Documents Whitelisted Text Module 16: Removable Storage Protection Removable Storage Protection Overview Removable Storage Protection Advanced Options Protect TrueCrypt Local Disks Mounts Portable Devices Handler (Media Transfer Protocol) Advanced File Copy Protection Deletion Mode Removable Storage Protection Use Case User Notification

Module 17: Email Protection Email Protection Overview Client Configuration Guidelines Third-party Email Classification Module 18: Web Protection Web Protection Overview Browsers Client Configuration Guidelines Module 19: Printer Protection Printer Protection Overview Client Configuration Guidelines Module 20: Screen Capture Protection Screen Capture Protection Overview Applications Protected Module 21: Clipboard Protection Clipboard Protection Overview Module 22: Cloud Protection Cloud Protection Overview Module 23: Application File Access Protection Application File Access Protection Overview Module 24: Endpoint Discovery Endpoint Discovery Overview Running the Discovery Crawler Verifying Discovery Settings Discovery Rule Sets and Rules Demonstration Creating a Discovery Rule Scheduler Definition Creating Scheduler Definition Example Scheduler Definition Scheduler Definition Fields Naming Conventions: Endpoint Discovery Rules Setting up a Discovery Scan Example Endpoint Scan Configuration Quarantined Files or Email Items Module 25: Monitoring and Reporting DLP Incident Manager DLP Incident Manager: Incident List DLP Incident Manager: Incident Tasks DLP Incident Manager: Incident History DLP Operational Events Creating Set Reviewer Rule Creating Automatic Mail Notification Rule DLP Case Management Creating Cases Create a Set Reviewer Task DLP Server Tasks Working with Server Tasks Queries Overview Data Loss Prevention Queries Creating Queries Data Loss Prevention Reports

Module 25: Monitoring and Reporting (Continued) Creating Reports Working with Reports DLP Dashboards DLP Dashboards Working with Dashboards and Monitors Module 26: Basic Troubleshooting Diagnostic Tool Overview Generating Client Bypass Key Diagnostic Tool Layout and Design General Information Tab DLPE Modules Tab Data Flow Tab Tools Tab Process List Devices Tab Active Policy Tab Policy Tuning: High CPU Use Policy Tuning: Tagging Debug Logging Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or other countries. McAfee and the McAfee logo are registered trademarks or trademarks of McAfee, Inc. or its subsidiaries in the US and other countries. Other marks and brands may be claimed as the property of others. The product plans, specifications and descriptions herein are provided for information only and subject to change without notice, and are provided without warranty of any kind, express or implied. Copyright 2016 McAfee, Inc.