Visão Geral
O Curso Deep Security for Certified Professionals, para Profissionais Certificados é um curso de três dias, ministrado por instrutor. Os participantes aprenderão a usar o Deep Security Software para segurança avançada em nuvem híbrida em servidores físicos, virtuais e baseados em nuvem. Este curso detalha a arquitetura básica da solução Deep Security Software on-premises, opções de implantação, módulos de proteção, configuração de políticas e administração do sistema. Como parte do curso, os participantes implantarão agentes do Deep Security Software em diversas plataformas Windows Server. Serão discutidas as melhores práticas e detalhes de solução de problemas para a implementação bem-sucedida e a manutenção a longo prazo do sistema. Os participantes também serão apresentados aos recursos de XDR e inteligência contra ameaças do Trend Vision One™.
Conteúdo Programatico
Product Overview
- Introduction to Deep Security Software
- Deep Security Software protection modules
- Deep Security Software deployment options
- Deep Security Software components
Trend Micro™ Deep Security™ Manager
- Server, operating system, and database requirements
- Deep Security Manager architecture
- Installing and upgrading Deep Security Manager
Deploying Deep Security Agents
- Deep Security agent architecture
- Deploying Deep Security agents
Managing Deep Security Agents
- Command line operations
- Resetting agents
- Protecting agents
- Viewing computer protection status
- Upgrading Deep Security agents
- Organizing computers using groups and Smart Folders
- Protecting container hosts
Keeping Deep Security Software Up to Date
- Security updates
- Software updates
- Deep Security Software relays
Global Threat Intelligence
- Global threat intelligence services used by Deep Security Software
- Configuring the global threat intelligence source
Policies
- Policy inheritance and overrides
- Creating new policies
- Running recommendation scans
Protecting Servers from Malware
- Anti-malware scanning techniques
- Enabling anti-malware protection
- Trend Micro™ Smart Scan™
Blocking Malicious Websites
- Enabling web reputation
- Setting the security level
Filtering Traffic Using the Firewall
- Enabling the Deep Security Software firewall
- Firewall rules
- Traffic analysis
- Traffic order of analysis
- Port scan
Protecting Servers from Vulnerabilities
- Virtual patching
- Detecting suspicious network activity
- Protocol control
- Web application protection
- Enabling intrusion prevention
- Intrusion prevention rules
- Security Sockets Layer (SSL) filtering
- Protecting web applications
Detecting Changes to Protected Servers
- Enabling integrity monitoring
- Running recommendation scans
- Detection changes to baseline objects
Blocking Unapproved Software
- Enforcement modes
- Enabling application control
- Detecting software changes
- Creating an inventory of approved software
- Pre-approving software changes
Inspecting Logs on Protected Servers
- Enabling log inspection
- Running recommendation scans
Controlling Access to External Storage Devices
- Enforcement settings
- Enabling device control
Events and Alerts
- Event forwarding
- Alerts
- Event tagging
- Reporting
Automating Deep Security Software Operations
- Scheduled tasks
- Event-based tasks
- Quick start templates
- Baking the Deep Security Software agent into an Amazon Machine Image (AMI)
- Application programming interface
Integrating with Trend Vision One
- Trend Vision One capabilities
- Collecting telemetry
- Connecting Deep Security Software to Trend Vision One
- Endpoint inventory
- Trend Endpoint Basecamp
Introduction to XDR Threat Investigation
- Detection models
- Observed attack techniques
- Navigating within workbenches
- Searching within the data lake
Detecting Emerging Malware Through Threat Intelligence
- Threat Intelligence phases
- Threat Intelligence requirements
- Configuring Deep Security Software for Threat Intelligence
- Tracking submissions
Appendix Topics
- Activating and managing multiple tenants
- Troubleshooting common Deep Security Software issues