logo

Sophos Course

course overview

Click to View dates & book now

Overview

This course provides an in-depth study of Sophos Enduser Protection, designed for experienced technical professionals who will be planning, installing, configuring and supporting deployments in production environments. The course will be delivered in a classroom setting, and consists of presentations and practical lab exercises to reinforce the taught content. Printed copies of the supporting documents for the course will be provided to each trainee. Due to the nature of delivery, and the varying experiences of the trainees, open discussion is encouraged during the training. This course provides an in-depth study of Sophos Enduser Protection, designed for experienced technical professionals who will be planning, installing, configuring and supporting deployments in production environments. The course will be delivered in a classroom setting, and consists of presentations and practical lab exercises to reinforce the taught content. Printed copies of the supporting documents for the course will be provided to each trainee. Due to the nature of delivery, and the varying experiences of the trainees, open discussion is encouraged during the training. This course provides an in-depth study of Sophos Enduser Protection, designed for experienced technical professionals who will be planning, installing, configuring and supporting deployments in production environments. The course will be delivered in a classroom setting, and consists of presentations and practical lab exercises to reinforce the taught content. Printed copies of the supporting documents for the course will be provided to each trainee. Due to the nature of delivery, and the varying experiences of the trainees, open discussion is encouraged during the training. Target audience Target audience Target audience Target audience This course is designed for technical professionals who will be planning, installing, configuring and supporting deployments in production environments. And for indivudials wishing to obtain the Enduser Protection Certified Architect certification. This course is designed for technical professionals who will be planning, installing, configuring and supporting deployments in production environments. And for indivudials wishing to obtain the Enduser Protection Certified Architect certification. This course is designed for technical professionals who will be planning, installing, configuring and supporting deployments in production environments. And for indivudials wishing to obtain the Enduser Protection Certified Architect certification.

Skills Gained

On completion of this course, trainees will be able to: On completion of this course, trainees will be able to: On completion of this course, trainees will be able to: Design a complex installation considering all variables Undertake a multi-server installation appropriate for a customer environment Understand the function of core components, and how they are configured Gain understanding of how core components work, and how to troubleshoot Trainees should complete the course being confident in the design, implementation and basic support of customer environments. Design a complex installation considering all variables Design a complex installation considering all variables Design a complex installation considering all variables Undertake a multi-server installation appropriate for a customer environment Undertake a multi-server installation appropriate for a customer environment Undertake a multi-server installation appropriate for a customer environment Understand the function of core components, and how they are configured Understand the function of core components, and how they are configured Understand the function of core components, and how they are configured Gain understanding of how core components work, and how to troubleshoot Gain understanding of how core components work, and how to troubleshoot Gain understanding of how core components work, and how to troubleshoot Trainees should complete the course being confident in the design, implementation and basic support of customer environments. Trainees should complete the course being confident in the design, implementation and basic support of customer environments. Trainees should complete the course being confident in the design, implementation and basic support of customer environments. Modules Modules Modules Modules Module 0 : Introduction Module 0 : Introduction Module 0 : Introduction Module 0 : Introduction Module 1 : Enduser Protection deployment scenarios Module 1 : Enduser Protection deployment scenarios Module 1 : Enduser Protection deployment scenarios Module 1 : Enduser Protection deployment scenarios Review of Enduser Protection features and components Factors to consider when designing solutions Single site deployments Multi site deployments Air-gapped network Roaming users Selecting the right solution for a customer's requirements Review of Enduser Protection features and components Review of Enduser Protection features and components Review of Enduser Protection features and components Factors to consider when designing solutions Factors to consider when designing solutions Factors to consider when designing solutions Single site deployments Single site deployments Single site deployments Multi site deployments Multi site deployments Multi site deployments Air-gapped network Air-gapped network Air-gapped network Roaming users Roaming users Roaming users Selecting the right solution for a customer's requirements Selecting the right solution for a customer's requirements Selecting the right solution for a customer's requirements Lab Lab Lab Lab Obtain a username and password for a trial installation Obtain a username and password for a trial installation Obtain a username and password for a trial installation Obtain a username and password for a trial installation Module 2 : Sophos Enterprise Console deployment Module 2 : Sophos Enterprise Console deployment Module 2 : Sophos Enterprise Console deployment Module 2 : Sophos Enterprise Console deployment Factors to consider when designing SEC deployments Management server requirements Database design considerations Remote console requirements Firewall configuration High availability The installation process Troubleshooting installation Factors to consider when designing SEC deployments Factors to consider when designing SEC deployments Factors to consider when designing SEC deployments Management server requirements Management server requirements Management server requirements Database design considerations Database design considerations Database design considerations Remote console requirements Remote console requirements Remote console requirements Firewall configuration Firewall configuration Firewall configuration High availability High availability High availability Selecting the right solution for a customer's requirements Selecting the right solution for a customer's requirements Selecting the right solution for a customer's requirements The installation process The installation process The installation process Troubleshooting installation Troubleshooting installation Troubleshooting installation Lab Lab Lab Lab Configure Active Directory Organizational Units Configure firewall rules using an Active Directory Group Policy Install the Sophos Enterprise Console database role on a SQL Server Verify connectivity from SEC to the database on the SQL Server Perform an installation of the Management Server and Management Console Perform an installation of the Management Console on a workstation Use RDP to connect to the Management Console on another host View setup logs Backup the Management Server and master certificates Configure Active Directory Organizational Units Configure Active Directory Organizational Units Configure Active Directory Organizational Units Configure firewall rules using an Active Directory Group Policy Configure firewall rules using an Active Directory Group Policy Configure firewall rules using an Active Directory Group Policy Install the Sophos Enterprise Console database role on a SQL Server Install the Sophos Enterprise Console database role on a SQL Server Install the Sophos Enterprise Console database role on a SQL Server Verify connectivity from SEC to the database on the SQL Server Verify connectivity from SEC to the database on the SQL Server Verify connectivity from SEC to the database on the SQL Server Perform an installation of the Management Server and Management Console Perform an installation of the Management Server and Management Console Perform an installation of the Management Server and Management Console Perform an installation of the Management Console on a workstation Perform an installation of the Management Console on a workstation Perform an installation of the Management Console on a workstation Use RDP to connect to the Management Console on another host Use RDP to connect to the Management Console on another host Use RDP to connect to the Management Console on another host View setup logs View setup logs View setup logs Backup the Management Server and master certificates Backup the Management Server and master certificates Backup the Management Server and master certificates Module 3 : Deploying Enduser Protection Module 3 : Deploying Enduser Protection Module 3 : Deploying Enduser Protection Module 3 : Deploying Enduser Protection Determining the information required to plan endpoint deployment Supported platforms Deployment strategy Removing other endpoint products Setup.exe command line parameters Protecting computers automatically Deployment packager Installation log files Mac deployment Linux deployment Endpoint Defense – Advanced Tamper Protection Determining the information required to plan endpoint deployment Determining the information required to plan endpoint deployment Determining the information required to plan endpoint deployment Supported platforms Supported platforms Supported platforms Deployment strategy Deployment strategy Deployment strategy Removing other endpoint products Removing other endpoint products Removing other endpoint products Setup.exe command line parameters Setup.exe command line parameters Setup.exe command line parameters Protecting computers automatically Protecting computers automatically Protecting computers automatically Deployment packager Deployment packager Deployment packager Installation log files Installation log files Installation log files Mac deployment Mac deployment Mac deployment Linux deployment Linux deployment Linux deployment Endpoint Defense – Adv

Prerequisites

Prior to attending this course, trainees should: Prior to attending this course, trainees should: Prior to attending this course, trainees should:

  • Complete the Sophos Certified Engineer Enduser Protection course and should have passed the Certified Engineer exam
  • Have a strong working knowledge of network configuration and troubleshooting before attending this course.
  • Have a good understanding of IT security

Complete the Sophos Certified Engineer Enduser Protection course and should have passed the Certified Engineer exam Complete the Sophos Certified Engineer Enduser Protection course and should have passed the Certified Engineer exam Complete the Sophos Certified Engineer Enduser Protection course and should have passed the Certified Engineer exam

Have a strong working knowledge of network configuration and troubleshooting before attending this course. Have a strong working knowledge of network configuration and troubleshooting before attending this course. Have a strong working knowledge of network configuration and troubleshooting before attending this course.

Have a good understanding of IT security Have a good understanding of IT security Have a good understanding of IT security

Outline

On completion of this course, trainees will be able to: On completion of this course, trainees will be able to: On completion of this course, trainees will be able to:

  • Design a complex installation considering all variables
  • Undertake a multi-server installation appropriate for a customer environment
  • Understand the function of core components, and how they are configured
  • Gain understanding of how core components work, and how to troubleshoot
  • Trainees should complete the course being confident in the design, implementation and basic support of customer environments.

Design a complex installation considering all variables Design a complex installation considering all variables Design a complex installation considering all variables

Undertake a multi-server installation appropriate for a customer environment Undertake a multi-server installation appropriate for a customer environment Undertake a multi-server installation appropriate for a customer environment

Understand the function of core components, and how they are configured Understand the function of core components, and how they are configured Understand the function of core components, and how they are configured

Gain understanding of how core components work, and how to troubleshoot Gain understanding of how core components work, and how to troubleshoot Gain understanding of how core components work, and how to troubleshoot

Trainees should complete the course being confident in the design, implementation and basic support of customer environments. Trainees should complete the course being confident in the design, implementation and basic support of customer environments. Trainees should complete the course being confident in the design, implementation and basic support of customer environments. Modules Modules Modules Modules Module 0 : Introduction Module 0 : Introduction Module 0 : Introduction Module 0 : Introduction Module 1 : Enduser Protection deployment scenarios Module 1 : Enduser Protection deployment scenarios Module 1 : Enduser Protection deployment scenarios Module 1 : Enduser Protection deployment scenarios

  • Review of Enduser Protection features and components
  • Factors to consider when designing solutions
  • Single site deployments
  • Multi site deployments
  • Air-gapped network
  • Roaming users
  • Selecting the right solution for a customer's requirements

Review of Enduser Protection features and components Review of Enduser Protection features and components Review of Enduser Protection features and components

Factors to consider when designing solutions Factors to consider when designing solutions Factors to consider when designing solutions

Single site deployments Single site deployments Single site deployments

Multi site deployments Multi site deployments Multi site deployments

Air-gapped network Air-gapped network Air-gapped network

Roaming users Roaming users Roaming users

Selecting the right solution for a customer's requirements Selecting the right solution for a customer's requirements Selecting the right solution for a customer's requirements Lab Lab Lab Lab

  • Obtain a username and password for a trial installation

Obtain a username and password for a trial installation Obtain a username and password for a trial installation Obtain a username and password for a trial installation Module 2 : Sophos Enterprise Console deployment Module 2 : Sophos Enterprise Console deployment Module 2 : Sophos Enterprise Console deployment Module 2 : Sophos Enterprise Console deployment

  • Factors to consider when designing SEC deployments
  • Management server requirements
  • Database design considerations
  • Remote console requirements
  • Firewall configuration
  • High availability
  • The installation process
  • Troubleshooting installation

Factors to consider when designing SEC deployments Factors to consider when designing SEC deployments Factors to consider when designing SEC deployments

Management server requirements Management server requirements Management server requirements

Database design considerations Database design considerations Database design considerations

Remote console requirements Remote console requirements Remote console requirements

Firewall configuration Firewall configuration Firewall configuration

High availability High availability High availability

Selecting the right solution for a customer's requirements Selecting the right solution for a customer's requirements Selecting the right solution for a customer's requirements

The installation process The installation process The installation process

Troubleshooting installation Troubleshooting installation Troubleshooting installation Lab Lab Lab Lab

  • Configure Active Directory Organizational Units
  • Configure firewall rules using an Active Directory Group Policy
  • Install the Sophos Enterprise Console database role on a SQL Server
  • Verify connectivity from SEC to the database on the SQL Server
  • Perform an installation of the Management Server and Management Console
  • Perform an installation of the Management Console on a workstation
  • Use RDP to connect to the Management Console on another host
  • View setup logs
  • Backup the Management Server and master certificates

Configure Active Directory Organizational Units Configure Active Directory Organizational Units Configure Active Directory Organizational Units

Configure firewall rules using an Active Directory Group Policy Configure firewall rules using an Active Directory Group Policy Configure firewall rules using an Active Directory Group Policy

Install the Sophos Enterprise Console database role on a SQL Server Install the Sophos Enterprise Console database role on a SQL Server Install the Sophos Enterprise Console database role on a SQL Server

Verify connectivity from SEC to the database on the SQL Server Verify connectivity from SEC to the database on the SQL Server Verify connectivity from SEC to the database on the SQL Server

Perform an installation of the Management Server and Management Console Perform an installation of the Management Server and Management Console Perform an installation of the Management Server and Management Console

Perform an installation of the Management Console on a workstation Perform an installation of the Management Console on a workstation Perform an installation of the Management Console on a workstation

Use RDP to connect to the Management Console on another host Use RDP to connect to the Management Console on another host Use RDP to connect to the Management Console on another host

View setup logs View setup logs View setup logs

Backup the Management Server and master certificates Backup the Management Server and master certificates Backup the Management Server and master certificates Module 3 : Deploying Enduser Protection Module 3 : Deploying Enduser Protection Module 3 : Deploying Enduser Protection Module 3 : Deploying Enduser Protection

  • Determining the information required to plan endpoint deployment
  • Supported platforms
  • Deployment strategy
  • Removing other endpoint products
  • Setup.exe command line parameters
  • Protecting computers automatically
  • Deployment packager
  • Installation log files
  • Mac deployment
  • Linux deployment
  • Endpoint Defense – Advanced Tamper Protection

Determining the information required to plan endpoint deployment Determining the information required to plan endpoint deployment Determining the information required to plan endpoint deployment

Supported platforms Supported platforms Supported platforms

Deployment strategy Deployment strategy Deployment strategy

Removing other endpoint products Removing other endpoint products Removing other endpoint products

Setup.exe command line parameters Setup.exe command line parameters Setup.exe command line parameters

Protecting computers automatically Protecting computers automatically Protecting computers automatically

Deployment packager Deployment packager Deployment packager

Installation log files Installation log files Installation log files

Mac deployment Mac deployment Mac deployment

Linux deployment Linux deployment Linux deployment

Endpoint Defense – Advanced Tamper Protection Endpoint Defense – Advanced Tamper Protection Endpoint Defense – Advanced Tamper Protection Lab Lab Lab Lab

  • Use the Competitive Removal Tool (CRT)
  • Import and synchronize computers on the network using Active Directory
  • Deploy via Enterprise Console
  • Perform connection tests between SEC and enduser clients
  • Modify the Sophos Default Firewall and Patch Policies
  • Create and test a deployment package for Windows
  • Deploy Enduser Protection using Active Directory Group Policy
  • Deploy and manage Enduser Protection on a Linux client

Use the Competitive Removal Tool (CRT) Use the Competitive Removal Tool (CRT) Use the Competitive Removal Tool (CRT)

Import and synchronize computers on the network using Active Directory Import and synchronize computers on the network using Active Directory Import and synchronize computers on the network using Active Directory

Deploy via Enterprise Console Deploy via Enterprise Console Deploy via Enterprise Console

Perform connection tests between SEC and enduser clients Perform connection tests between SEC and enduser clients Perform connection tests between SEC and enduser clients

Modify the Sophos Default Firewall and Patch Policies Modify the Sophos Default Firewall and Patch Policies Modify the Sophos Default Firewall and Patch Policies

Create and test a deployment package for Windows Create and test a deployment package for Windows Create and test a deployment package for Windows

Deploy Enduser Protection using Active Directory Group Policy Deploy Enduser Protection using Active Directory Group Policy Deploy Enduser Protection using Active Directory Group Policy

Deploy and manage Enduser Protection on a Linux client Deploy and manage Enduser Protection on a Linux client Deploy and manage Enduser Protection on a Linux client Module 4 : Update Managers and Autoupdate Module 4 : Update Managers and Autoupdate Module 4 : Update Managers and Autoupdate Module 4 : Update Managers and Autoupdate

  • Factors to consider when designing an updating infrastructure
  • Introduction to AutoUpdate
  • SUM updating overview
  • Software subscriptions
  • HTTP Updating
  • Deploying multiple CIDs and Update Managers
  • Installing additional SUMs
  • AutoUpdate components
  • Troubleshooting SUM
  • Troubleshooting AutoUpdate

Factors to consider when designing an updating infrastructure Factors to consider when designing an updating infrastructure Factors to consider when designing an updating infrastructure

Introduction to AutoUpdate Introduction to AutoUpdate Introduction to AutoUpdate

SUM updating overview SUM updating overview SUM updating overview

Software subscriptions Software subscriptions Software subscriptions

HTTP Updating HTTP Updating HTTP Updating

Deploying multiple CIDs and Update Managers Deploying multiple CIDs and Update Managers Deploying multiple CIDs and Update Managers

Installing additional SUMs Installing additional SUMs Installing additional SUMs

AutoUpdate components AutoUpdate components AutoUpdate components

Troubleshooting SUM Troubleshooting SUM Troubleshooting SUM

Troubleshooting AutoUpdate Troubleshooting AutoUpdate Troubleshooting AutoUpdate Lab Lab Lab Lab

  • Configure a preview subscription for use by a test group
  • Install and configure an additional Update Manager
  • Configure IIS to support a Web CID
  • Create a subscription and updating policy for Linux endpoints

Configure a preview subscription for use by a test group Configure a preview subscription for use by a test group Configure a preview subscription for use by a test group

Install and configure an additional Update Manager Install and configure an additional Update Manager Install and configure an additional Update Manager

Configure IIS to support a Web CID Configure IIS to support a Web CID Configure IIS to support a Web CID

Create a subscription and updating policy for Linux endpoints Create a subscription and updating policy for Linux endpoints Create a subscription and updating policy for Linux endpoints Module 5 : Remote Management System Module 5 : Remote Management System Module 5 : Remote Management System Module 5 : Remote Management System

  • Management architecture
  • Remote Management System (RMS)
  • RMS component communication
  • RMS registration
  • RMS troubleshooting
  • Message relays
  • WCF-based management

Management architecture Management architecture Management architecture

Remote Management System (RMS) Remote Management System (RMS) Remote Management System (RMS)

RMS component communication RMS component communication RMS component communication

RMS registration RMS registration RMS registration

RMS troubleshooting RMS troubleshooting RMS troubleshooting

Message relays Message relays Message relays

WCF-based management WCF-based management WCF-based management

  • Configure a message relay
  • Create and test a deployment package for a remote endpoint
  • Verify and troubleshoot remote management system configuration

Configure a message relay Configure a message relay Configure a message relay

Create and test a deployment package for a remote endpoint Create and test a deployment package for a remote endpoint Create and test a deployment package for a remote endpoint

Verify and troubleshoot remote management system configuration Verify and troubleshoot remote management system configuration Verify and troubleshoot remote management system configuration Module 6 - Threat Protection Module 6 - Threat Protection Module 6 - Threat Protection Module 6 - Threat Protection

  • Endpoint Protection Advanced and Exploit Prevention components
  • Preventing a threat before it reaches the device
    • Browser Exploit Prevention
    • Web Protection and Control
    • Sophos Extensible List (SXL)
    • Download Reputation
  • Preventing a threat before it runs on the device
    • Exploit Prevention
      • Configuring exclusions
    • Host Intrusion Prevention (HIPS)
    • On-access scanning
      • Configuring exclusions
  • Detecting threats
    • Malicious Traffic Detection (MTD)
    • CryptoGuard
    • WipeGuard
  • Respond
    • On-demand scanning
    • Clean up
    • Sophos Clean
  • Tamper Protection and Endpoint Defense

Endpoint Protection Advanced and Exploit Prevention components Endpoint Protection Advanced and Exploit Prevention components Endpoint Protection Advanced and Exploit Prevention components

Preventing a threat before it reaches the device Preventing a threat before it reaches the device Preventing a threat before it reaches the device

  • Browser Exploit Prevention
  • Web Protection and Control
  • Sophos Extensible List (SXL)
  • Download Reputation

Browser Exploit Prevention Browser Exploit Prevention Browser Exploit Prevention

Web Protection and Control Web Protection and Control Web Protection and Control

Sophos Extensible List (SXL) Sophos Extensible List (SXL) Sophos Extensible List (SXL)

Download Reputation Download Reputation Download Reputation

Preventing a threat before it runs on the device Preventing a threat before it runs on the device Preventing a threat before it runs on the device

  • Exploit Prevention
    • Configuring exclusions
  • Host Intrusion Prevention (HIPS)
  • On-access scanning
    • Configuring exclusions

Exploit Prevention Exploit Prevention Exploit Prevention

  • Configuring exclusions

Configuring exclusions Configuring exclusions Configuring exclusions

Host Intrusion Prevention (HIPS) Host Intrusion Prevention (HIPS) Host Intrusion Prevention (HIPS)

On-access scanning On-access scanning On-access scanning

Detecting threats Detecting threats Detecting threats

  • Malicious Traffic Detection (MTD)
  • CryptoGuard
  • WipeGuard

Malicious Traffic Detection (MTD) Malicious Traffic Detection (MTD) Malicious Traffic Detection (MTD)

CryptoGuard CryptoGuard CryptoGuard

WipeGuard WipeGuard WipeGuard

Respond Respond Respond

  • On-demand scanning
  • Clean up
  • Sophos Clean

On-demand scanning On-demand scanning On-demand scanning

Clean up Clean up Clean up

Sophos Clean Sophos Clean Sophos Clean

Tamper Protection and Endpoint Defense Tamper Protection and Endpoint Defense Tamper Protection and Endpoint Defense Lab Lab Lab Lab

  • Configure exclusions and test Endpoint Defense

Configure exclusions and test Endpoint Defense Configure exclusions and test Endpoint Defense Configure exclusions and test Endpoint Defense Module 7 : Advanced device and data control policies Module 7 : Advanced device and data control policies Module 7 : Advanced device and data control policies Module 7 : Advanced device and data control policies

  • Review of device control
  • Device control event viewer
  • Unique device instance IDs
  • Device exemptions
  • Review of data control
  • Content Control List (CCL)
  • Latest SophosLabs Content Control Lists
  • How to create a custom CCL
  • Data control exclusions

Review of device control Review of device control Review of device control

Device control event viewer Device control event viewer Device control event viewer

Unique device instance IDs Unique device instance IDs Unique device instance IDs

Device exemptions Device exemptions Device exemptions

Review of data control Review of data control Review of data control

Content Control List (CCL) Content Control List (CCL) Content Control List (CCL)

Latest SophosLabs Content Control Lists Latest SophosLabs Content Control Lists Latest SophosLabs Content Control Lists

How to create a custom CCL How to create a custom CCL How to create a custom CCL

Data control exclusions Data control exclusions Data control exclusions Lab Lab Lab Lab

  • Configure a device control policy and add an exemption
  • Configure a data control policy with a rule based on a custom CCL

Configure a device control policy and add an exemption Configure a device control policy and add an exemption Configure a device control policy and add an exemption

Configure a data control policy with a rule based on a custom CCL Configure a data control policy with a rule based on a custom CCL Configure a data control policy with a rule based on a custom CCL Module 8 : Patch assessment Module 8 : Patch assessment Module 8 : Patch assessment Module 8 : Patch assessment

  • Patch assessment components and architecture
  • Patch assessment using a proxy
  • Patch assessment troubleshooting

Patch assessment components and architecture Patch assessment components and architecture Patch assessment components and architecture

Patch assessment using a proxy Patch assessment using a proxy Patch assessment using a proxy

Patch assessment troubleshooting Patch assessment troubleshooting Patch assessment troubleshooting Labs Labs Labs Labs

  • Configured a reverse proxy to cache patch data and proxy the assessment reporting
  • Configure the firewall policy with a secondary location

Configured a reverse proxy to cache patch data and proxy the assessment reporting Configured a reverse proxy to cache patch data and proxy the assessment reporting Configured a reverse proxy to cache patch data and proxy the assessment reporting

Configure the firewall policy with a secondary location Configure the firewall policy with a secondary location Configure the firewall policy with a secondary location Module 9 : Auditing and reporting Module 9 : Auditing and reporting Module 9 : Auditing and reporting Module 9 : Auditing and reporting

  • Auditing configuration
  • Granting access to audit data
  • Using external applications for audit reporting
  • Email alerting
  • Sophos Reporting Interface
  • Sophos Log Writer
  • Enhanced reporting with 3rd party tools

Auditing configuration Auditing configuration Auditing configuration

Granting access to audit data Granting access to audit data Granting access to audit data

Using external applications for audit reporting Using external applications for audit reporting Using external applications for audit reporting

Email alerting Email alerting Email alerting

Sophos Reporting Interface Sophos Reporting Interface Sophos Reporting Interface

Sophos Log Writer Sophos Log Writer Sophos Log Writer

Enhanced reporting with 3rd party tools Enhanced reporting with 3rd party tools Enhanced reporting with 3rd party tools Lab Lab Lab Lab

  • Enable auditing and use the database view to review logged actions
  • Configure email alerting from endpoints for Anti-virus and HIPS
  • Install and configure the Sophos Reporting Interface

Enable auditing and use the database view to review logged actions Enable auditing and use the database view to review logged actions Enable auditing and use the database view to review logged actions

Configure email alerting from endpoints for Anti-virus and HIPS Configure email alerting from endpoints for Anti-virus and HIPS Configure email alerting from endpoints for Anti-virus and HIPS

Install and configure the Sophos Reporting Interface Install and configure the Sophos Reporting Interface Install and configure the Sophos Reporting Interface Module 10: Sophos for Virtual Environments (SVE) Module 10: Sophos for Virtual Environments (SVE) Module 10: Sophos for Virtual Environments (SVE) Module 10: Sophos for Virtual Environments (SVE)

  • Supported Platforms
  • SVE Architecture
  • Guest virtual machine (VM) migration
  • Updating architecture
  • Guest VM deployment methods
  • Viewing Guest VMs
  • Upgrading to SVE version 1.2 with Guest VM migration

Supported Platforms Supported Platforms Supported Platforms

SVE Architecture SVE Architecture SVE Architecture

Guest virtual machine (VM) migration Guest virtual machine (VM) migration Guest virtual machine (VM) migration

Updating architecture Updating architecture Updating architecture

Guest VM deployment methods Guest VM deployment methods Guest VM deployment methods

Viewing Guest VMs Viewing Guest VMs Viewing Guest VMs

Upgrading to SVE version 1.2 with Guest VM migration Upgrading to SVE version 1.2 with Guest VM migration Upgrading to SVE version 1.2 with Guest VM migration Module 11 : Server management and upgrades Module 11 : Server management and upgrades Module 11 : Server management and upgrades Module 11 : Server management and upgrades

  • Backup and restore data and configuration
  • PurgeDB
  • Database and server migration
  • Upgrading servers

Backup and restore data and configuration Backup and restore data and configuration Backup and restore data and configuration

PurgeDB PurgeDB PurgeDB

Database and server migration Database and server migration Database and server migration

Upgrading servers Upgrading servers Upgrading servers Lab Lab Lab Lab

  • Backup and restore configuration and the database
  • Create a scheduled task to run PurgeDB
  • Perform a database migration

Backup and restore configuration and the database Backup and restore configuration and the database Backup and restore configuration and the database

Create a scheduled task to run PurgeDB Create a scheduled task to run PurgeDB Create a scheduled task to run PurgeDB

Perform a database migration Perform a database migration Perform a database migration

Talk to an expert

Thinking about Onsite?

If you need training for 3 or more people, you should ask us about onsite training. Putting aside the obvious location benefit, content can be customised to better meet your business objectives and more can be covered than in a public classroom. Its a cost effective option. One on one training can be delivered too, at reasonable rates.

Submit an enquiry from any page on this site, and let us know you are interested in the requirements box, or simply mention it when we contact you.

All $ prices are in USD unless it’s a NZ or AU date

SPVC = Self Paced Virtual Class

LVC = Live Virtual Class

Please Note: All courses are availaible as Live Virtual Classes

Trusted by over 1/2 million students in 15 countries

Our clients have included prestigious national organisations such as Oxford University Press, multi-national private corporations such as JP Morgan and HSBC, as well as public sector institutions such as the Department of Defence and the Department of Health.