OTA YHTEYTTÄ

Ora Hanttu

Tuoteryhmäpäällikkö, ICT

040 582 6008 Lähetä viesti

Kesto: 3 päivää
Veroton hinta (+ alv 24 %): 2 195 €
Voit maksaa:
Koulutuskortti

Haluatko koulutuksen asiakaskohtaisena? Jätä yhteystietosi, niin palaamme asiaan. 

Jaa

Lataa pdf-muodossa

Trend Micro OfficeScan (OSCE) 11

In this course, you will learn how OfficeScan 11 works. This course provides information about the product architecture, internal processes, how it addresses threats on the desktop, and troubleshooting information that a technical support engineer would need to know to support the product.

Kohderyhmä

Technical Support Engineers and resellers that provide technical support to their customers.

Esitiedot

Trend Micro recommends that you have a good working knowledge of OfficeScan administration, Trend Micro products and services as well as basic networking concepts and principles. You should also have a working knowledge of the following products:
-    Windows 2003/2008 Servers & Clients
-    Microsoft Internet Information Server (IIS)

Sertifikaatti

An exam is available to take on the last afternoon of the course and is included in the price of the training. 

Goals

-    Enable debug functions for different OfficeScan Components.
-    Understand debug logs and become familiar with how logs appear when the product is functioning properly. This facilitates identification of log entries that are the result of problems.
-    Design implantation solutions for various network conditions, organizational structures, administrative preferences, and management plans.
-    Use debugging tools to troubleshoot common problems in OfficeScan.
 
Chapter 1: Course Overview
1.1 > Target Audience and Prerequisites
1.2 > How to use this material

Chapter 2: OfficeScan Overview
2.1 > Changes in this Release
2.2 > Architecture Overview
        2.2.1 OfficeScan Server
        2.2.2 OfficeScan Agent
2.3 > Footprint
        2.3.1 Services and Major Components
        2.3.2 Configuration Repository
        2.3.3 Database
        2.3.4 ofcscan.ini

Chapter 3: Deployment
3.1 > OfficeScan Server Deployment
        3.1.1 Installation Log
        3.1.2 Installation Flow
        3.1.3 Upgradeable Versions
        3.1.4 Upgrade Options
        3.1.5 Database migration
        3.1.6 Processes and Services
        3.1.7 SVRSVCSETUP
        3.1.8 Install / Upgrade Debug Log
3.2 > OfficeScan Agent Deployment
        3.2.1 Agent Prerequisites
        3.2.2 Installation Methods
        3.2.3 Migrating from Other Endpoint Security Software
        3.2.4 Password Protection for Agent Removal
        3.2.5 Installation Logs

Chapter 4: Communication and Administration
4.1 > Agent-to-Server communication
4.2 > Server-to-Agent communication
        4.2.1 Heartbeat and Server Polling
4.3 > Authentication of Server-initiated Communications
4.4 > Management Console Communication
        4.4.1 Timeout Mechanism
4.5 > Ports Used
4.6 > Console Access
        4.6.1 Root
        4.6.2 Other Accounts
        4.6.3 Changing Passwords
        4.6.4 Recovering from Forgotten Passwords
4.7 > Console Access using Active Directory Accounts
        4.7.1 Active Directory Integration Basics
        4.7.2 OfficeScan Active Directory Integration Service
        4.7.3 Importing AD Accounts
        4.7.4 Password Storage and Recovery
4.8 > Roles
        4.8.1 Built-in Roles
        4.8.2 Custom Roles
        4.8.3 Roles and Active Directory Groups
4.9 > Unmanaged Endpoints
4.10 > Agent Grouping
        4.10.1 Manual Grouping
        4.10.2 Automatic Grouping
        4.10.3 Prioritizing Agent Grouping
4.11 > Agent Settings
        4.11.1 Pre-assigning Domains
4.12 > Offline Agents
4.13 > Roaming Agents

Chapter 5: Protection
5.1 > Traditional Virus Protection
        5.1.1 Scan Types
        5.1.2 NT Real-time Scan Service
        5.1.3 Scanning
        5.1.4 Scan Caches
        5.1.5 Scan Target
        5.1.6 Scan Action
        5.1.7 Exclusion
        5.1.8 Quarantine
5.2 > Smart Protection Network
        5.2.1 Smart Protection Server Best Practices
5.3 > File Reputation
        5.3.1 CRCs
        5.3.2 Malware Detection with File Reputation
        5.3.3 File Reputation Process
        5.3.4 External CRC Database Operation
        5.3.5 Offline Protection
        5.3.6 CRC CACHE
        5.3.7 Local Scan Server
        5.3.8 Switching between Conventional and File Reputation Methods
5.4 > Spyware/Grayware Protection
        5.4.1 Enabling SSAPI Logs
        5.4.2 Digital Signatures
        5.4.3 Rootkit Common Module
5.5 > Damage Cleanup Services
5.6 > Common Client Solution Platform
        5.6.1 Memory Scanning and Inspection
        5.6.2 Browser Exploit Solution
5.7 > Behavior Monitoring Components
5.8 > Additional Network Protection
5.9 > Suspicious Connection Services
        5.9.1 C&C Contact Alert Services Features
        5.9.2 Suspicious Connections Components
5.10 > Firewall Protection
        5.10.1 Rules
        5.10.2 Access Rules
        5.10.3 Outbreak Prevention Policy (OPP)
        5.10.4 GSS RULES
        5.10.5 Policies and Profiles
        5.10.6 Application Filter
        5.10.7 Intrustion Detection System (IDS)
5.11 > Web Threat Protection
        5.11.1 Integrated Web Reputation Service
        5.11.2 Web Reputation Service
        5.11.3 Web Security Ratings
        5.11.4 Web Reputation Process
        5.11.5 Location Awareness
        5.11.6 Bypassing WRS Analysis
        5.11.7 Intercepting HTTPS Traffic
5.12 > Behavior Monitoring
        5.12.1 Unauthorized Change Protection
        5.12.2 Trend Micro Unauthorized Change Prevention Service
        5.12.3 Security Levels
        5.12.4 Synchronizing Agent-Server Settings
        5.12.5 Protected Agent Components
        5.12.6 Unauthorized Device Access Protection
        5.12.7 Access Control Logs
        5.12.8 Device Permissions
        5.12.9 USB Autorun Prevention
5.13 > Troubleshooting
        5.13.1 Debugging Agents
        5.13.2 Analyzing Agent’s Debug Log
        5.13.3 Determining Virus Detection in Debug Log
        5.13.4 Enabling SSAPI Logs
        5.13.5 Firewall
        5.13.6 Debugging the Integrated Web Reputation Service
        5.13.7 Debugging Unauthorized Change Prevention Service
        5.13.8 Debugging Web Reputation Service

Chapter 6: Update
6.1 > ActiveUpdate Overview
        6.1.1 Updateable Components
        6.1.2 Incremental Update
        6.1.3 Update Logs
6.2 > Update Sources
         6.2.1 Connecting to the Update Server
6.3 > Update Agents
        6.3.1 Promoting Agents into Update Agents
        6.3.2 Update Components
        6.3.3 Bandwidth Requirements
6.4 > Downloading and Deploying Updates
6.5 > Rollback
        6.5.1 Rolling Back Patterns
        6.5.2 Rolling Back Engines
        6.5.3 Rolling Back the Server
 
 
Valmistajan virallinen koulutuskeskus Arrow ECS Finland Oy vastaa kurssin toteutuksesta. Kurssipaikka sijaitsee Stella Business Parkissa, Espoossa.
Vendor’s authorized training center Arrow ECS Finland Oy is responsible for running this course. Course will be held in Espoo, Stella Business Park.

Training card prices or other pricing contracts are not applicable for this course. The course will be held in cooperation with ArrowECS.