Who should attend
The course is aimed at Microsoft Windows system administrators, security professionals and administrators, technical and pre-sale support engineers.
Prerequisites
- Basic understanding of networking technologies: TCP/IP, DNS, email, web.
- Basic Windows administrator skills.
- Basic knowledge of information security principles.
Course Objectives
The main aim is to provide all know-how required to deploy, configure, and manage the solution. The course instructs how to design, deploy and maintain protection systems based on Kaspersky Endpoint Security and centrally manage them via Kaspersky Security Center. It describes products designed to protect a network of up to 1000 endpoints in a single location. Endpoints in this course are servers and workstations running Windows.
The theoretical part of the course and hands-on labs provide students with knowledge and skills needed to:
- Describe the capabilities of Kaspersky Endpoint Security for Windows and Kaspersky Security Center
- Design and deploy an optimal protection solution based on Kaspersky Endpoint Security in a Windows network and manage it via Kaspersky Security Center
- Maintain the deployed system
Course Content
1. Introduction
- 1.1. Basics of Kaspersky Endpoint Security for Business
- 1.2. How to deploy Kaspersky Endpoint Security for Business
- 1.3. How to install Kaspersky Security Center
- Lab 1. Install Kaspersky Security Center
- 1.4. How to install Kaspersky Endpoint Security on computers
- Lab 2. Deploy Kaspersky Endpoint Security
- 1.5. How to organize computers into groups
- Lab 3. Create a structure of managed computers
2. Protection management
- 2.1. How Kaspersky Endpoint Security protects computers
- 2.2. How to configure file protection
- Lab 4. Test File Threat Protection
- 2.3. How to configure protection against network threats
- Lab 5. Configure Mail Threat Protection
- Lab 6. Test Web Threat Protection
- 2.4. How to configure protection against sophisticated threats
- Lab 7. How to test protection of network folders against ransomware
- Lab 8. Test protection against exploits
- Lab 9. Test protection against fileless threats
- Lab 10. Improve workstations' protection against ransomware
- 2.5. How to control network connections
- Lab 11. Test Network Threat Protection
- 2.6. How to protect computers outside the network
- 2.7. What else is there in protection and why?
- Lab 12. How to configure exclusions from self-defense
- Lab 13. Configure password protection
3. Control
- 3.1. General
- 3.2. Application Control
- Lab 14. Configure Application Control
- Lab 15. Block start of unknown applications in the network
- 3.3. Device Control
- Lab 16. Block USB flash drives
- Lab 17. Configure access rights for USB flash drives
- 3.4. Web Control
- Lab 18. Configure Web Control
- 3.5. Adaptive Anomaly Control
- Lab 19. Configure Adaptive Anomaly Control
4. Maintenance
- 4.1. How to maintain protection
- Lab 20. Configure the dashboard
- 4.2. What to do daily
- 4.3. What to do if something has happened
- Lab 21. Configure maintenance tools
- Lab 22. Collect diagnostic information
- 4.4. What to do from time to time