You are on page 1of 4

Symantec STS Accreditation Exam Study Guide: Symantec Endpoint Protection 11 Technical Assessment

The following tables list the Symantec Accreditation exam objectives for the Symantec Endpoint Protection 11 Technical Assessment and how these objectives align to the Symantec Endpoint Protection 11.0 MR4 Install Configure & Deploy and Manage & Administer courses. For more information on the Symantec Accreditation Program, visit: https://partnernet.symantec.com/

EXAM SECTION 1
The Symantec Endpoint Protection Products and Concepts Course Topics from Symantec Endpoint Protection 11.0 MR4 Install Configure & Deploy and Manage & Administer

Certification Objectives

Define common threats and security risks to the endpoint as well Not covered in this course. Requires: as the technical controls that can prevent them from spreading On-the-job experience past the endpoint. Describe the components of Symantec Endpoint Protection. Lesson: The Symantec Endpoint Product Solution Topic: Symantec Endpoint Protection Technologies Topic: Symantec Endpoint Protection Components

Describe policies and how policies, groups, subgroups, Lesson: The Symantec Endpoint Product Solution locations, location awareness and policy inheritance relate to the Topic: Symantec Endpoint Protection Policies and Symantec Endpoint Protection architecture. Concepts Lesson: Customizing Network Threat Protection and Application and Device Control Topic: Managing Locations Topic: Managing Policy Components

EXAM SECTION 2
Symantec Endpoint Protection Installation Course Topics from Symantec Endpoint Protection 11.0 MR4 Install Configure & Deploy and Manage & Administer Lesson: Installing Symantec Endpoint Protection Topic: Identifying Installation Requirements Topic: Preparing Computers Topic: Installing SEPM Lesson: Performing Server and Database Management Topic: Communicating with Other Servers Lesson: Installing Symantec Endpoint Protection Topic: Preparing Computers Topic: Installing SEPM Lesson: Deploying Clients Topic: Preparing for Client Deployment Topic: Choosing a Client Deployment Method

Certification Objectives Describe how to prepare, install and configure the Symantec Endpoint Protection management infrastructure.

Describe how to create initial group structure and import users and groups from Active Directory or LDAP. Describe how to create client packages and choose appropriate deployment methods.

Copyright 2008 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Veritas are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. Specifications and product offerings are subject to change without notice.

Certification Objectives Describe how to verify client connectivity and find clients in the console display. Describe the upgrade/migration process from SAV/Sygate.

Course Topics from Symantec Endpoint Protection 11.0 MR4 Install Configure & Deploy and Manage & Administer Topic: Installing Managed Clients

Lesson: Deploying Managed Clients Topic: Installing Managed Clients Topic: Managing the User Environment Not covered in this course. Requires: On-the-job experience Topics from the Migration to Symantec Endpoint Protection 11.x course or on-line modules

EXAM SECTION 3
Configuring Antivirus, Antispyware, and Proactive Threat Scanning Course Topics from Symantec Endpoint Protection 11.0 MR4 Install Configure & Deploy and Manage & Administer Lesson: Configuring Additional Protection Topic: Configuring Centralized Exceptions Lesson: Deploying Clients Topic: Scanning Clients Lesson Configuring Antivirus and Antispyware Policies Topic: Configuring Administrator-Defined Scans Lesson Configuring Antivirus and Antispyware Policies Topic: Configuring Auto-Protect Scans Lesson Configuring Antivirus and Antispyware Policies Topic: Configuring Administrator-Defined Scans Topic: Quarantining Files Topic: Configuring Miscellaneous Settings Lesson: Installing Additional Management Components Topic: Installing and Configuring the Central Quarantine Lesson: Configuring Additional Protection Topic: Configuring Proactive Threat Protection

Certification Objectives Describe how to configure exceptions. Describe how to configure scheduled and on-demand scans.

Describe how to configure Autoprotect for the file system and email clients. Define actions for infected files.

Describe how to configure TruScan (proactive threat protection) scans.

Copyright 2008 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Veritas are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. Specifications and product offerings are subject to change without notice.

EXAM SECTION 4 Define and Configure Firewall, Intrusion Prevention, and Application and Device Control
Course Topics from Symantec Endpoint Protection 11.0 MR4 Install Configure & Deploy and Manage & Administer Lesson: Introduction to Network Threat Protection and Application and Device Control Topic: The Firewall Lesson: Configuring Firewall Policies Topic: Firewall Policy Overview Lesson: Configuring Firewall Policies Topic: Firewall Policy Overview Topic: Defining Rule Components Topic: Modifying Firewall Rules Lesson: Configuring Firewall Policies Topic: Firewall Policy Overview Topic: Modifying Firewall Rules Lesson: Introduction to Network Threat Protection and Application and Device Control Topic: The Firewall Lesson: Configuring Firewall Policies Topic: Firewall Policy Overview Topic: Configuring Smart Traffic Filtering Topic: Configuring Traffic and Stealth Settings Lesson: Introduction to Network Threat Protection and Application and Device Control Topic: Intrusion Prevention Lesson: Managing Intrusion Prevention System Policies Topic: Configuring Intrusion Prevention Topic: Managing Custom Signatures

Certification Objectives Describe the basic function of a desktop/client firewall.

Describe the elements necessary to configure the firewall policy.

Describe the firewall rule processing order.

Describe traffic blocking and stealth settings.

Describe Intrusion Prevention System (IPS) functionality and how to modify policies.

Describe Application and Device Control functionality and how to Lesson: Introduction to Network Threat Protection and modify policies. Application and Device Control Topic: Application and Device Control Lesson: Configuring Application and Device Control Policies Topic: Creating Application and Device Control Policy Topic: Defining Application Control Topic: Modifying Policy Rules Topic: Defining Device Control Describe how to search for client applications. Lesson: Customizing Network Threat Protection and Application and Device Control Topic: Configuring Learned Applications

Copyright 2008 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Veritas are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. Specifications and product offerings are subject to change without notice.

EXAM SECTION 5 Performing Additional Management and Monitoring Tasks


Course Topics from Symantec Endpoint Protection 11.0 MR4 Install Configure & Deploy and Manage & Administer Lesson: Customizing Network Threat Protection and Application and Device Control Topic: Managing Locations Lesson: Monitoring and Reporting Topic: Viewing and Managing Notifications Lesson Configuring Antivirus and Antispyware Policies Topic: Configuring Miscellaneous Settings Lesson: Monitoring and Reporting Topic: Viewing and Managing Logs Topic: Creating and Viewing Reports Lesson: Deploying Clients Topic: Managing the User Environment Lesson: Configuring Additional Protection Topic: Configuring Tamper Protection

Certification Objectives Outline how to manage locations.

Describe how to view and manage notifications.

Describe how to create and view reports and monitors.

Describe how to manage the client user interface control settings. Describe how to configure tamper protection.

Obtaining Symantec Accreditation To become Symantec accredited, candidates must pass exam(s) offered on Symantec PartnerNet. To assist in preparation for the accreditation exams, candidates are strongly encouraged to attend training course(s) available through Symantec, in addition to meeting any necessary prerequisites, on-the-job experience, and study. Be cautioned that, attendance in a training course does not guarantee passage of an accreditation exam. If you have questions about the Symantec Accreditation Program, send an email to Partner_STS@Symantec.com

Copyright 2008 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Veritas are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. Specifications and product offerings are subject to change without notice.

You might also like