Takaisin

PaloAlto Traps 4.1: Install, configure, manage

Palo Alto Networks® Traps™ Advanced Endpoint Protection prevents sophisticated vulnerability exploits and unknown malware-driven attacks. Traps accomplishes this through a highly scalable, lightweight agent that uses an innovative new approach for defeating attacks without requiring any prior knowledge of the threat itself. Successful completion of this two-day, instructor-led course equips the student to build a basic Traps deployment.

Course Objectives
Students should learn how Traps protects against exploits and malware-driven attacks. In hands-on lab exercises, students will install and configure the Endpoint Security Manager (ESM) and Traps endpoint components; build rules; enable and disable process protections; and integrate Traps with Palo Alto Networks WildFire™, which provides prevention and detection of zero-day malware.


Scope
• Course level: Introductory
• Course duration: 2 days
• Course format: Combines instructor-facilitated lecture with hands-on labs
• Software version: Palo Alto Networks Traps Advanced Endpoint Protection 4.1

Target Audience
• Security Engineers, System Administrators, and Technical Support Engineers

Prerequisites
• Students must have Windows system administration skills and familiarity with enterprise security concepts

Module 1: Traps Overview

  • How sophisticated attacks work today
  • The design approach of Traps
  • Traps components
  • Traps resources

Module 2: Installing Traps

  • Planning the installation
  • Installing ESM Server and Console
  • Installing Windows agents
  • Installing Mac Agents
  • Managing content updates
  • Upgrading Traps

Module 3: Malicious Software Overview

  • Basics of computer architecture
  • Exploitation techniques and their prevention
  • Malware techniques and their prevention

Module 4: Consoles Overview

  • Introduction to ESM Console
  • Introduction to the Traps Agent Console

Module 5: Traps Protection Against Exploits

  • Architecture and EPMs
  • Configuring exploit protection

Module 6: Traps Protection Against Malware (including WildFire)

  • Malware protection process flow and components
  • Post-detection malware anaylsis Module 7: Managing Traps
  • System monitoring
  • Traps license administration
  • Agent license administration
  • Server settings, users, and roles
  • Agent settings
  • Agent actions

Module 8: Traps Forensics

  • Forensics workflow and policies
  • Responding to prevention events
  • Logging

Module 9: Basic Traps Troubleshooting

  • DIReC methodology
  • Troubleshooting resources
  • Working with technical support
  • Troubleshooting installation, connectivity, and upgrades
Näytä lisää Sulje
Exclusive Networks

Kurssi järjestetään yhteistyössä Exclusive Networksin kanssa Spektri Business Parkissa.

Ilmoittaudu kurssille

Tietosuoja

Palvelussa voidaan käsitellä Elisan tietosuojaperiaatteissa kuvattuja henkilötietoja, kuten esimerkiksi nimi, yhteystiedot ja palvelun käyttöön liittyvät tiedot. Elisa on palvelussa käsiteltävien henkilötietojen osalta tietosuojalainsäädännössä tarkoitettu henkilötietojen rekisterinpitäjä.

Elisa käsittelee rekisterinpitäjänä henkilötietoja kulloinkin voimassaolevien tietosuojaperiaatteiden mukaisesti (https://elisa.fi/sopimusehdot) ja (https://elisa.fi/tietosuoja).

Elisalla on oikeus käyttää palveluiden tuottamisessa ja henkilötietojen käsittelyssä alihankkijoita.

English:

When using the service, the following types of personal information may be handled; name and contact information, employee information and other information from the client company, end user information, information related to use of the service and customer satisfaction information. This information is needed for the maintenance and development of the service. In terms of the personal information being handled, the customer is the controller as intended in information protection legislation and the service provider is the handler.

The customer's personal information is to be handled in the manner outlined in the agreement and this service description in order to provide and develop the services. Any other handling of the customer's personal information and its effect on costs in accordance with the General Data Protection Regulation are to be agreed upon separately between the parties to the agreement.

The provider or their subcontractor may collect data for the maintenance, improvement or analysis of the service. The provider reserves the right to use subcontractors in the production of their services and sub-handlers in the handling of personal information. The customer has the right to receive information on the provider's subcontractors and sub-handlers upon request.