McAfee Data Loss Prevention Endpoint

McAfee Data Loss Prevention Endpoint Course Description

Duration: 4.00 days (32 hours)

The McAfee Data Loss Prevention Endpoint Administration course from Intel Education Services provides in-depth training on the tools you need to design, implement, configure, and use McAfee Data Loss Prevention Endpoint to safeguard intellectual property and ensure compliance. The course details how this solution uses McAfee ePolicy Orchestrator for centralized management. It also explains how to monitor and address day-to-day enduser risky actions such as emailing, web posting, printing, clipboards, screen captures, device control, uploading to the cloud, and more.

Next Class Dates

Contact us to customize this class with your own dates, times and location. You can also call 1-888-563-8266 or chat live with a Learning Consultant.

Back to Top

Intended Audience for this McAfee Data Loss Prevention Endpoint Course

  • » This course is intended for system and network administrators, security personnel, auditors, and/ or consultants concerned with network and system security.

Back to Top

McAfee Data Loss Prevention Endpoint Course Objectives

  • » Plan the deployment
  • » Install and configure McAfee Data Loss Prevention Endpoint software on the McAfee ePolicy Orchestrator server
  • » Install the McAfee Data Loss Prevention Endpoint client endpoints
  • » Use classification, tagging, and protection rules to safeguard sensitive information
  • » Locate information with endpoint discovery rules
  • » Monitor incidents and events and generate queries and reports

Back to Top

McAfee Data Loss Prevention Endpoint Course Outline

      1. Welcome
        1. Welcome
        2. About the Course
        3. Acronyms and Terms in This Course
        4. Locating Helpful Resources
        5. Intel Security Expert Center
        6. Lab Environment
      2. McAfee Data Loss Prevention Endpoint Solution Overview
        1. Sources of Data Loss
        2. Causes of Data Loss
        3. McAfee Data Loss Prevention (DLP)
        4. Portfolio
        5. Choosing a Data Loss Prevention
        6. Solution
        7. McAfee DLP Endpoint Overview
        8. New/Enhanced for DLP 9.4X
        9. How McAfee DLPe Works
          1. Classify
          2. Track
          3. Protect
          4. Monitor
      3. Planning a McAfee ePolicy Data Loss Prevention Endpoint Deployment
        1. Planning Overview
        2. Strategy and Goals: Internal Assessment
        3. Strategy and Goals: Role Assessment
        4. Strategy and Goals: Technical Assessment
        5. Strategy and Goals: Risk Assessment
        6. Strategy and Goals: Privacy Laws
        7. Classification: Sensitivity
        8. Classification: Methods
        9. Classification Scenario: Organizational Level
      4. Planning a McAfee ePolicy Data Loss Prevention Endpoint Deployment (Continued)
        1. Classification Scenario: Applications
        2. Classification Scenario: End Users and Clients
        3. Classification: Find, Apply, and Enforce
        4. Deployment Planning
        5. Solution Requirements: ePO Platform
        6. Solution Requirements: Database
        7. Solution Requirements: Clients
        8. Supported Third-party Software
        9. Pilot Plan
        10. Post Pilot Validation and Enterprise Rollout
        11. Other Planning Considerations
        12. Resource: Deployment Planning Questionnaire
          1. ePO Server and Infrastructure Credentials
          2. Product-specific Questions
          3. Network Requirements
          4. McAfee ePO and McAfee Agent
          5. Microsoft SQL Server Requirements
          6. Client Requirements
      5. Preparing the Enterprise Environment
        1. Adding Active Directory Security Groups
        2. Adding Users to Active Directory Security Groups
        3. Verifying Active Directory Group Membership
        4. Preparing Resource Folders
        5. Configuring Sharing for Resource Folders
        6. Configuring Permissions for Resource Folders
        7. Verifying Sharing Settings
        8. Configuring Custom Permission Entries
        9. Changing Folder Permissions
        10. Removing Inheritable Permissions from Parent
        11. Check Point
        12. Adding Permission Entries
        13. Verifying New Permission Entries
      6. McAfee ePolicy Orchestrator Review
        1. McAfee ePO Solution Overview
        2. McAfee ePO Platform Requirements
        3. Default Ports
        4. Communications: Tomcat Service
        5. Logging into the McAfee ePO Web Interface
        6. Quick Tour of the McAfee ePO Web
        7. Interface
        8. Reporting Options
        9. Systems Options
        10. Policy Options
        11. Software Options
        12. Automation Options
        13. User Management Option
      7. Installing McAfee Data Loss Prevention Endpoint Software
        1. Obtaining McAfee DLPe Software
        2. McAfee DLPe Software Overview
        3. Checking in the McAfee DLPe Package
        4. Installing the McAfee DLPe Extension
        5. Installing the McAfee DLPe License
        6. Verifying the McAfee DLPe Installation
      8. Permission Sets
        1. Viewing and Editing DLP Server Settings
        2. Permission Sets Overview
        3. Adding New DLP Permission Sets
        4. Default DLP Permissions: Policy Catalog
        5. Default DLP Permissions: DLP Policy Manager
        6. Default DLP Permissions: Classifications
        7. Default DLP Permissions: Definitions
        8. Default DLP Permissions: Operational Events
        9. Default DLP Permissions: Case Management
        10. Help Desk Permissions
        11. Case Study: DLPe Group Admin
        12. Case Study: Incident Reviewer
        13. Case Study: Redaction Reviewer
        14. Creating Help Desk Permission Sets
        15. Permissions Exclusive to Administrator
        16. User Management Review
        17. Guidelines for Authentication Types
        18. Creating DLPe Users
      9. Deploying the McAfee Data Loss Prevention Endpoint Clients
        1. McAfee DLPe Client Overview
        2. Deploying Client Software from McAfee ePO Console
        3. Comparing Client Software Deployment Methods
        4. Creating Product Deployment Project
        5. Creating Client Deployment Task
        6. DLP Endpoint Console
      10. McAfee DLP Policy Overview and Initial Configuration
        1. Review:
          1. DLP Policies
          2. Rules and Rule Sets
          3. Definitions
          4. Policy Architecture
          5. Classification and Tagging
        2. Policy Overview
        3. McAfee DLP Client Configuration Policy Operational Modes
          1. Device Control and full content protection versus Device Control only
        4. Data Protection Modules
        5. Protection Settings: Whitelist
        6. Content Tracking
        7. Corporate Connectivity
        8. Debugging and Logging
        9. Evidence Copy Service
        10. Quarantine
        11. Removable Storage Protection
        12. Screen Capture Protection
        13. Web Post Protection
        14. User Interface Components
        15. McAfee DLP Policy
        16. Assigning Active Rule Sets
        17. Configuring Endpoint Discovery Scan
        18. Defining Global Settings
      11. McAfee DLP Policy Manager Overview
        1. McAfee DLP Policy Manager Review
        2. Rule Sets Tab
        3. Types of Rules
        4. Policy Assignment Tab
        5. Definitions Tab
        6. Supported Definitions
        7. Example Data Definitions
        8. Example Device Control Definition
        9. Example Definitions: Notification
        10. Example Definitions: Other
        11. Example Definitions: Source / Destination
        12. Other Features
      12. Privileged Users and End-User Group Definitions
        1. Overview: Privileged Users, EndUser
        2. Group Definitions, and Active Directory
        3. Registering an LDAP Server
        4. Active Directory Considerations
        5. Creating Privileged Users
        6. Example Privileged User
        7. Defining End-User Group Definitions
        8. Example End-User Group Definitions
        9. Multiple User Sessions
      13. Device Control
        1. Device Control Overview
        2. Device Management Overview
        3. Device Management Overview:
        4. Device Classes
        5. Device Management Overview:
        6. Device Definitions
        7. Device Management Overview: PnP Devices
        8. Device Management Overview: Removable Storage
        9. Device Management Overview: Fixed Hard Drive
        10. Working with Device Classes
        11. Built-in Device Classes (Read-only)
        12. Adding New Device Class
        13. Locating Device GUI
        14. Working with Device Definitions
        15. Built-in Device Definitions (Readonly)
        16. Adding New Device Definition
        17. Example Conventions: Device Definitions
        18. Example: File System Definition
        19. Example: Plug and Play Device Definition
        20. Example: Removable Storage Device Definition
        21. Example: Whitelisted Plug and Play Devices
        22. Overriding Device Class Settings in DLP Policy
        23. Viewing Incidents
      14. McAfee Device Rule Sets and Rules
        1. Device Rule Sets and Rules Overview
        2. Built-in Device Rule Sets and Rules
        3. Working with Device Rules
        4. Device Control Rule Tab
        5. Adding a Device Rule
        6. Example Conventions: Device Definitions
        7. Naming Conventions: Device Rules
        8. Citrix Device Rule Overview
        9. Citrix Device Rule Configuration
        10. Fixed Hard Drive Device Rule Overview
        11. Fixed Hard Drive Device Rule Configuration
        12. Plug and Play Device Rule Overview
      15. McAfee Device Rule Sets and Rules (Continued)
        1. Plug and Play Device Rule Configuration
        2. Example Removable Storage File Access Device Rule
        3. Removable Storage File Access Device Rule Configuration
        4. Removable Storage File Access Device Rule Configuration
        5. TrueCrypt Device Rule Overview
        6. TrueCrypt Device Rule Configuration
        7. Case Studies
      16. Content Protection Overview
        1. Data Protection Overview
        2. Defining a Protection Strategy
        3. Business Requirements
        4. Rule Architecture
          1. Is Classification Criteria Sufficient?
          2. Is Tagging Criteria Needed?
          3. What are the Rule Parameters?
          4. What is the Desired Result or Outcome?
        5. Review: Definitions
        6. Example Conventions
        7. Data - File Extension Definition
        8. Notification – Justification Definition
        9. Notification – User Notification Definition
        10. Configuring Notification Placeholders
        11. Application Template Definition
        12. Email Address Definition
        13. Local Folder Definition
        14. Network Address (IP address) Definition
        15. Network Port Definition
        16. Network Printer Definition
        17. Network Share Definition
        18. Process Name Definition
        19. URL List Definition
        20. Window Title Definition
        21. Bringing it All Together
          1. Creating a Protection Rule
          2. Naming Conventions: Data Protection Rules
      17. Content Classification and Tagging
        1. Classification Review
        2. Tag Propagation
        3. Tagging Rules
        4. More on Tagging
        5. Creating Classification Criteria
        6. Example Classifications and Criteria
        7. Creating Tagging Criteria
        8. Manual Classification
        9. Register Documents
        10. Whitelisted Text
      18. Removable Storage Protection
        1. Removable Storage Protection Overview
        2. Removable Storage Protection Advanced Options
        3. Protect TrueCrypt Local Disks Mounts
        4. Portable Devices Handler (Media Transfer Protocol)
        5. Advanced File Copy Protection Deletion Mode
        6. Removable Storage Protection Use Case
        7. Example Configuration
        8. User Notification
      19. Email Protection
        1. Email Protection Overview
        2. Client Configuration Guidelines
        3. Third-party Email Classification
        4. Use Case
        5. Example Configuration
      20. Web Protection
        1. Web Protection Overview
        2. Browsers
        3. Client Configuration Guidelines
        4. Use Case
        5. Example Configuration
      21. Printer Protection
        1. Printer Protection Overview
        2. Client Configuration Guidelines
        3. Use Case
        4. Example Configuration
      22. Screen Capture Protection
        1. Screen Capture Protection Overview
        2. Applications Protected
        3. Use Case
        4. Example Configuration
      23. Clipboard Protection
        1. Clipboard Protection Overview
        2. Use Case
        3. Example Configuration
      24. Cloud Protection
        1. Cloud Protection Overview
        2. Use Case
        3. Example Configuration
      25. Application File Access Protection
        1. Application File Access Protection Overview
        2. Use Case
        3. Example Configuration
      26. Endpoint Discovery
        1. Endpoint Discovery Overview
        2. Running the Discovery Crawler
        3. Verifying Discovery Settings
        4. Discovery Rule Sets and Rules
        5. Demonstration
        6. Creating a Discovery Rule
        7. Scheduler Definition
        8. Creating Scheduler Definition
        9. Example Scheduler Definition
        10. Scheduler Definition Fields
        11. Naming Conventions: Endpoint Discovery Rules
        12. Setting up a Discovery Scan
        13. Example Endpoint Scan Configuration
        14. Quarantined Files or Email Items
      27. Monitoring and Reporting
        1. DLP Incident Manager
        2. DLP Incident Manager: Incident List
        3. DLP Incident Manager: Incident Tasks
        4. DLP Incident Manager: Incident History
        5. DLP Operational Events
        6. Creating Set Reviewer Rule
        7. Creating Automatic Mail Notification Rule
        8. DLP Case Management
        9. Creating Cases
        10. Create a Set Reviewer Task
        11. DLP Server Tasks
        12. Working with Server Tasks
        13. Queries Overview
        14. Data Loss Prevention Queries
        15. Creating Queries
        16. Data Loss Prevention Reports
      28. Monitoring and Reporting (Continued)
        1. Creating Reports
        2. Working with Reports
        3. DLP Dashboards
        4. DLP Dashboards
        5. Working with Dashboards and Monitors
      29. Basic Troubleshooting
        1. Diagnostic Tool Overview
        2. Generating Client Bypass Key
        3. Diagnostic Tool Layout and Design
        4. General Information Tab
        5. DLPE Modules Tab
        6. Data Flow Tab
        7. Tools Tab
        8. Process List
        9. Devices Tab
        10. Active Policy Tab
        11. Policy Tuning: High CPU Use
        12. Policy Tuning: Tagging
        13. Debug Logging

Back to Top

Do you have the right background for McAfee Data Loss Prevention Endpoint?

Skills Assessment

We ensure your success by asking all students to take a FREE Skill Assessment test. These short, instructor-written tests are an objective measure of your current skills that help us determine whether or not you will be able to meet your goals by attending this course at your current skill level. If we determine that you need additional preparation or training in order to gain the most value from this course, we will recommend cost-effective solutions that you can use to get ready for the course.

Our required skill-assessments ensure that:

  1. All students in the class are at a comparable skill level, so the class can run smoothly without beginners slowing down the class for everyone else.
  2. NetCom students enjoy one of the industry's highest success rates, and pass rates when a certification exam is involved.
  3. We stay committed to providing you real value. Again, your success is paramount; we will register you only if you have the skills to succeed.
This assessment is for your benefit and best taken without any preparation or reference materials, so your skills can be objectively measured.

Take your FREE Skill Assessment test »

Back to Top

Award winning, world-class Instructors

Our instructors are passionate at teaching and are experts in their respective fields. Our average NetCom instructor has many, many years of real-world experience and impart their priceless, valuable knowledge to our students every single day. See our world-class instructors.   See more instructors...

Back to Top

Client Testimonials & Reviews about their Learning Experience

We are passionate in delivering the best learning experience for our students and they are happy to share their learning experience with us.
Read what students had to say about their experience at NetCom.   Read student testimonials...

Back to Top