Course Details
Yleiskatsaus
The McAfee® Policy Auditor Administration course from McAfee University provides attendees with in-depth training on the full benefits of this product. This course provides a firm foundation and hands-on experience in the installation, configuration, maintenance and troubleshooting of the McAfee Policy Auditor solution. This training also focuses on understanding the internal Policy Auditor architecture and how to build custom remedies. At the end of this course, attendees should understand the capabilities of the McAfee solution and have the capability of installing McAfee Policy Auditor.
Tavoitteet
- Learn how to install and administer policies.
- Create and edit benchmark checks.
- Use the new Content Creator Tool to create and edit benchmark checks.
- Import checks, create scripts, and set auditing periods.
- Configuring file integrity monitoring.
- View & customize dashboards and queries.
- McAfee Vulnerability Manager and Policy Auditor Integration.
- McAfee Risk Advisor and Policy Auditor Integration.
Sisältö
Module 1: Introduction to Security Connected and Policy Auditor
- Introduction to Security Risk Management
- Introduction to Policy Auditor
- Summary of Differences From Version 3
Module 2: ePolicy Orchestrator Administrative Overview
- Function
- Components
- Architecture and Communication
- Repositories
Module 3: ePO Server Installation
- Requirements
- Tips and Best Practices
- Installation
- Post Installation
- Product Documentation
Module 4: ePO Navigation and Policies
- Navigation
- System Tree
- Policies
Module 5: The McAfee Agent
- Overview
- Components
- Agent-Server Communication
- Using the System Tray
- Troubleshooting
- SuperAgents
- Directories and Files
- Non-Windows Operating Systems
Module 6: Installing the Policy Auditor Server
- ePO Extensions
- Policy Auditor Extension
- Policy Auditor Installation Requirements
- Policy Auditor Server Installation
- Upgrading Policy Auditor
- Removing Policy Auditor
Module 7: Policy Auditor Server Configuration
- What is Policy Auditor?
- Components
- Server Settings
- Permission Sets
- Tasks
- Performance Improvements in PA 0
Module 8: Policy Auditor Agent
- Overview
- Localization
- Support Operating Systems
- Installation
- Log Files
- Troubleshooting
- Displaying System Tray Icon
Module 9: Introduction to Audits
- Audit Overview
- Industry Standards
- Policy Auditor and Standards
Module 10: Benchmark Editor
- Introduction
- Viewing
- Status Types
- Configuration
- Tailoring
- Editing
- Labels
Module 11: Configuring Audits
- Include Systems in an Audit
- Choose a Benchmark
- Activate Benchmark
- Create a new Audit
- McAfee Agent Role in Audits
- Process Audit Results
- View the Audit Results
- Server Task Log
- Audit Whiteout and Blackout Periods
- Verify Audit at the System
- Tips and Tricks
Module 12: Creating Checks
- Rules and Checks Introduction
- Creating Checks
- Creating Rules
Module 13: Content Creator Tool
- Introduction
- Installation
- GUI
- Templates
- Creating a Benchmark Using the PACC Tool
Module 14: Patches and Scripts
- Importing Benchmarks
- Patches
- Service Level Agreement
- Scripts
Module 15: Waivers
- Waivers Introduction
- Configuring Waivers
Module 16: Issues and Tickets
- Issues and Tickets
- Managing Issues
- Ticketing Integration
Module 17: File Integrity Monitoring
- What is File Integrity Monitoring
- Defining FIM Policies
- Reports
- Protection
- Maintenance
- Basic Troubleshooting and FAQs
- Solving Memory Discrepancies
- Helpful Resources
Module 18: Dashboards and Reporting
- Dashboard Overview
- New Queries & Reports
- Customizing Dashboards
- Roll-up Reporting
- Generate a Report
Module 19: Support and Troubleshooting
- Support
- Best Practices
- PA Agent Debug Tool
Module 20: Integration
- Purpose of Integration
- Example of Need
- Compliance Solutions
Module 21: Introduction to Vulnerability Manager
- Overview
- Components
- Architecture
- Communication
- Installation
Module 22: Vulnerability Manager and Policy Auditor Integration
- Integration Architecture
- Configuration
- Performing an Audit Using Vulnerability Manager
Module 23: Introduction to Risk Advisor
- Overview
- Product Integration
- Architecture
- Installation
Module 24: Risk Advisor and Policy Auditor Integration
- Configuration
- Permissions
- Integration
Kohdeyleisö
- System and network administrators, security personnel, auditors, and/or consultants concerned with network and system security should take this course.
Esivaatimukset
- It is recommended that the students have a working knowledge of Microsoft Windows administration, system Administration concepts, a basic understanding of computer security concepts, and a general understanding of viruses and anti-virus technologies.