- Duration: 10 weeks
Categories: Trend Micro
1. Product Overview
- Introduction to Deep Security
- Deep Security protection modules
- Deep Security deployment options
- Deep Security components
2. Trend Micro™ Deep Security™ Manager
- Server, operating system, and database requirements
- Deep Security Manager architecture
- Installing and upgrading Deep Security Manager
3. Deploying Deep Security Agents
- Deep Security agent architecture
- Deploying Deep Security agents
4. Managing Deep Security Agents
- Command line operations
- Resetting agents
- Protecting agents
- Viewing computer protection status
- Upgrading Deep Security agents
- Organizing computers using groups and Smart Folders
5. Keeping Deep Security Up to Date
- Security updates
- Software updates
- Deep Security relays
6. Trend Micro™ Smart Protection™
- Smart Protection services used by Deep Security
- Configuring the Smart Protection source
7. Policies
- Policy inheritance and overrides
- Creating new policies
- Running recommendation scans
8. Protecting Servers from Malware
- Anti-malware scanning techniques
- Enabling anti-malware protection
- Smart Scan
9. Blocking Malicious Websites
- Enabling web reputation
- Setting the security level
10. Filtering Traffic Using the Firewall
- Enabling the Deep Security firewall
- Firewall rules
- Traffic analysis
- Traffic order of analysis
- Port scan
11. Protecting Servers from Vulnerabilities
- Virtual patching
- Detecting suspicious network activity
- Web application protection
- Enabling intrusion prevention
- Intrusion prevention rules
- Security Sockets Layer (SSL) filtering
- Protecting web applications
12. Detecting Changes to Protected Servers
- Enabling integrity monitoring
- Running recommendation scans
- Detection changes to baseline objects
13. Blocking Unapproved Software
- Enforcement modes
- Enabling application control
- Detecting software changes
- Creating an inventory of approved
14. Inspecting Logs on Protected Servers
- Enabling log inspection
- Running recommendation scans
15. Events and Alerts
- Event forwarding
- Alerts
- Event tagging
- Reporting
16. Protecting Containers
- Continuous integration/continuous deployment
- Software development using containers
- Protecting containers with Deep Security
17. Automating Deep Security Operations
- Scheduled tasks
- Event-based tasks
- Quick start templates
- Baking the Deep Security agent into an Amazon® Machine Image
- Application programming interface
18. Detecting Emerging Malware Through Connected Threat Defense
- Connected Threat Defense phases
- Trend Micro™ Deep Discovery™ Analyzer
- Trend Micro Apex Central™
- Configuring Deep Security for Connected Threat Defense
- Tracking submissions
19. Appendix Topics
- Activating and managing multiple tenants
- Protecting virtual machines using the Deep Security virtual appliance
- Troubleshooting common Deep Security issues
Leave feedback about this
You must be logged in to post a comment.