Takaisin

PaloAlto Traps: Cloud Service Operations (EDU-290)

Palo Alto Networks® Traps™ Advanced Endpoint Protection prevents sophisticated vulnerability exploits and unknown malware-driven attacks. Successful completion of this two-day, instructor-led course helps prepare the student to configure the Traps Management Service and to install Traps onto endpoints.

Course Objectives

Students should learn how Traps protects against exploits and malware-driven attacks. In hands-on lab exercises, students will explore and configure new cloud-based Traps Management Service and install Traps endpoint components; build policy rules and profiles; enable and disable process protections; and integrate Traps with Palo Alto Networks WildFire® cloud service, which provides prevention and detection of zero-day malware.

Scope

  • Course level: Introductory
  • Course duration: 2 days
  • Course format: Combines instructor-facilitated lecture with hands-on labs
  • Software version: Palo Alto Networks Traps Advanced Endpoint Protection

    Target Audience Endpoint Security Engineers, System Administrators, and Technical Support Engineers

    Prerequisites Students must have familiarity with enterprise security concepts.

Module 1: Traps Overview

  • How Sophisticated Attacks Work Today
  • Traps Multi-Method Threat Prevention
  • Traps Components and Resources

Module 2: Cloud Services

  • Application Framework and Cloud Services Portal
  • Shared Services and Traps Onboarding Flow

Module 3: Cloud- Based Management

  • Traps Service Dashboard and Licensing
  • Cross-Platform Agent and Agent Installation
  • Endpoints and Endpoint Groups

Module 4: Policy Rules and Profiles

  • Profiles and Policy Rules
  • Agent Settings Profile

Module 5: Malware Protection Flow

  • Traps Malware Protection Modules Overview
  • Restrictions Profiles, Malware Profiles, and Scanning

Module 6: Exploits and Exploitation Techniques

  • Application Exploit Prevention
  • Exploitation Techniques and Defense Mechanisms
  • Basics of Process Management (Optional)

Module 7: Exploit Protection Modules

  • Architecture and Overview
  • Exploit Protection Modules (EPMs)
  • Exploit Profiles

Module 8: Event Management

  • Security Event Logs and Exceptions
  • Endpoint and Server Logs
  • Manage Quarantined Files

Module 9: Basic Traps Troubleshooting

  • Troubleshooting Methodology and Resources
  • Traps Cytool and Agent Identification
  • Traps Agent Log Files and Agent Persist Databases
  • Working with Technical Support

Module 10: Traps Architecture

  • AWS Services Used by Traps Service
  • Multi-Regional Architecture
  • Agent File Uploads and Downloads
  • Agent-Server Communication

Module 11: Directory Sync Service

  • Directory Sync Service – Activation and Setup
  • Troubleshooting 
Näytä lisää Sulje
Exclusive Networks

Kurssi järjestetään yhteistyössä Exclusive Networksin kanssa Spektri Business Parkissa.

Ilmoittaudu kurssille

Tietosuoja

Palvelussa voidaan käsitellä Elisan tietosuojaperiaatteissa kuvattuja henkilötietoja, kuten esimerkiksi nimi, yhteystiedot ja palvelun käyttöön liittyvät tiedot. Elisa on palvelussa käsiteltävien henkilötietojen osalta tietosuojalainsäädännössä tarkoitettu henkilötietojen rekisterinpitäjä.

Elisa käsittelee rekisterinpitäjänä henkilötietoja kulloinkin voimassaolevien tietosuojaperiaatteiden mukaisesti (https://elisa.fi/sopimusehdot) ja (https://elisa.fi/tietosuoja).

Elisalla on oikeus käyttää palveluiden tuottamisessa ja henkilötietojen käsittelyssä alihankkijoita.

English:

When using the service, the following types of personal information may be handled; name and contact information, employee information and other information from the client company, end user information, information related to use of the service and customer satisfaction information. This information is needed for the maintenance and development of the service. In terms of the personal information being handled, the customer is the controller as intended in information protection legislation and the service provider is the handler.

The customer's personal information is to be handled in the manner outlined in the agreement and this service description in order to provide and develop the services. Any other handling of the customer's personal information and its effect on costs in accordance with the General Data Protection Regulation are to be agreed upon separately between the parties to the agreement.

The provider or their subcontractor may collect data for the maintenance, improvement or analysis of the service. The provider reserves the right to use subcontractors in the production of their services and sub-handlers in the handling of personal information. The customer has the right to receive information on the provider's subcontractors and sub-handlers upon request.