Takaisin

PaloAlto Traps 4.2 (PAN-EDU-281): Install, configure, manage

Palo Alto Networks® Traps™ Advanced Endpoint Protection prevents sophisticated vulnerability exploits and unknown malware-driven attacks. Successful completion of this twoday, instructor-led course helps prepare students to install on-premise Traps in basic configurations.

Course Objectives
Students should learn how Traps protects against exploits and malware-driven attacks. In hands-on lab exercises, students will install and configure the Endpoint Security Manager (ESM) and Traps endpoint components, build rules, enable and disable process protections, and integrate Traps with Palo Alto Networks WildFire®, which provides protection from known and unknown malware.


Scope
• Course level: Introductory
• Course duration: 2 days
• Course format: Combines instructor-facilitated lecture with hands-on labs
• Software version: Palo Alto Networks Traps Advanced Endpoint Protection ESM 4.2

Target Audience
• Security Engineers, System Administrators, and Technical Support Engineers

Prerequisites
• Students must have Windows system administration skills and familiarity with enterprise security concepts.

 

 

 

Module 1: Traps Overview

  • How sophisticated attacks work today
  • The design approach of Traps
  • Traps components and resources

Module 2: Installing Traps

  • Planning the installation
  • Installing ESM Server and Console
  • Installing Windows agents
  • Installing Mac Agents
  • Managing content updates
  • Upgrading Traps

Module 3: Malicious Software Overview

  • Basics of computer architecture
  • Exploitation techniques and their prevention
  • Malware techniques and their prevention

Module 4: Consoles Overview

  • Introduction to ESM Console
  • Introduction to the Traps Agent Console

Module 5: Traps Protection Against Exploits

  • Architecture and EPMs
  • Configuring exploit protection

Module 6: Traps Protection Against Malware

  • Malware protection process flow and components
  • Trusted signer management
  • Post-detection malware analysis

Module 7: Prevention Event Exceptions

  • Prevention events
  • Malware/Exploit Protection Module (MPM/EMP) events
  • Execution Restriction events
  • WildFire® hash control events
  • Post-Detection events

Module 8: Managing Traps

  • System monitoring
  • Traps Server and Agent license administration
  • Server settings, users, and roles
  • Agent settings and Agent actions

Module 9: Traps Forensics Capabilities

  • Forensics workflow and policies
  • Responding to prevention events, and logging

Module 10: Basic Traps Troubleshooting

  • DIReC methodology and troubleshooting resources
  • Working with the technical support
  • Troubleshooting installation, connectivity, and upgrades
Näytä lisää Sulje
Exclusive Networks

Kurssi järjestetään yhteistyössä Exclusive Networksin kanssa Spektri Business Parkissa.

Ilmoittaudu kurssille

Tietosuoja

Palvelussa voidaan käsitellä Elisan tietosuojaperiaatteissa kuvattuja henkilötietoja, kuten esimerkiksi nimi, yhteystiedot ja palvelun käyttöön liittyvät tiedot. Elisa on palvelussa käsiteltävien henkilötietojen osalta tietosuojalainsäädännössä tarkoitettu henkilötietojen rekisterinpitäjä.

Elisa käsittelee rekisterinpitäjänä henkilötietoja kulloinkin voimassaolevien tietosuojaperiaatteiden mukaisesti (https://elisa.fi/sopimusehdot) ja (https://elisa.fi/tietosuoja).

Elisalla on oikeus käyttää palveluiden tuottamisessa ja henkilötietojen käsittelyssä alihankkijoita.

English:

When using the service, the following types of personal information may be handled; name and contact information, employee information and other information from the client company, end user information, information related to use of the service and customer satisfaction information. This information is needed for the maintenance and development of the service. In terms of the personal information being handled, the customer is the controller as intended in information protection legislation and the service provider is the handler.

The customer's personal information is to be handled in the manner outlined in the agreement and this service description in order to provide and develop the services. Any other handling of the customer's personal information and its effect on costs in accordance with the General Data Protection Regulation are to be agreed upon separately between the parties to the agreement.

The provider or their subcontractor may collect data for the maintenance, improvement or analysis of the service. The provider reserves the right to use subcontractors in the production of their services and sub-handlers in the handling of personal information. The customer has the right to receive information on the provider's subcontractors and sub-handlers upon request.