![]() Describing the automatic exclusion created during installationĬlasses begin promptly at 9:00 am, and typically end at 5:00 pm.Creating file and folder exceptions for different scan types.Monitoring locations on the SEPM and SEP client.Determining the criteria and order of assessment before assigning policies.Creating locations to ensure the appropriate level of security when logging on remotely.Protecting clients by testing and Implementing System Lockdown.Determining to use System Lockdown in Whitelist or Blacklist mode.Discovering hardware access policy violations with reports, logs, and notifications. ![]() Enforcing access to hardware using Device Control.Describing Device Control features and concepts for Windows and Mac clients.Restricting Device Access for Windows and Mac Clients Creating application rulesets to restrict how applications run.Describing Application Control and concepts.Ensuring client compliance with Host Integrity.Providing Granular Control with Host Integrity Tailoring Virus and Spyware settings for Linux clients. ![]() Preventing email from downloading malware.Identifying zero-day and unknown threats.Detecting and remediating risks in downloaded files.Ensuring real-time protection for clients.Tailoring scans to meet an environment’s needs.Platform and Virus and Spyware Protection policy overview.Describing how the emulator executes a file in a sandbox and the machine learning engine’s role and function.Describing how endpoints are protected with the Intelligent Threat Cloud Service.Describing how SEP protects against zero-day threats and threats downloaded through files and email.Virus and Spyware protection needs and solutions.Preventing Attacks with SEP Layered Security Following security best practices to reduce risks.Describing Advanced Persistent Threats and a typical attack scenario.Discovering how attackers disguise their malicious applications.Configuring the Intrusion Prevention policy.Introducing Intrusion Prevention technologies.Blocking network attacks using protection and stealth settingsīlocking Threats with Intrusion Prevention.Enforcing corporate security policy with firewall rules. ![]() Protecting against Network Attacks and Enforcing Corporate Policies using the Firewall Policy
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
January 2023
Categories |