Visão Geral
Este curso proporciona um conhecimento profundo sobre a componente essencial da implementação de uma estratégia bem sucedida de prevenção de intrusões.
Através de uma mistura de laboratórios práticos e palestras interativas, aprenderá como implementar e configurar uma solução de Plataforma de Segurança de Rede para proteger contra ataques do mundo real.
Conteúdo Programatico
Welcome
- Course Logistics
- McAfee Product Training
- ServicePortal
- About the Course
- McAfee Foundstone Security Education
- Security Content Release Notes
- Acronyms and Terms
- Locating Resources on McAfee Business Website
- Helpful Links
- Business Community
- Product Enhancement Request
- Classroom Lab Topology
Introduction to Network Intrusion Preventio
- Attack Detection Framework
- Solution Components
- Types of Intrusion Prevention Systems
- Motivation and Contributing Factors for Attacks
- Comparing Intrusion Detection and Prevention
- Traffic Normalization
- Beyond Intrusion Prevention
- What are Threats and Attacks?
- Ten Steps to Using NSP
- Why a Network IPS is Important
- Common Attack Types
- Security Threats: The Increasing Risks
- Network Security Platform Overview
Planning a McAfee Network Security Platform Deployment
- NSP Server Ports
- NSP 8X Sensor Suppor
- Determining Sensor Placement
- Determining Database Requirements
- Desktop Firewall Requirements
- NSM Server Requirements
- Deployment Requirements and Recommendations
- Using Anti-virus Software with the NSM
- Virtual Machine Requirements
- NSM Client Requirements
- Virtual Server Minimum Requirements
- Windows Display and Browser Settings
- Sensor Deployments
- Determining Number of Sensors
- Single and Central NSM Deployment
- Wireshark
- Choosing a Deployment Option
Getting Started
- Central Manager Overview
- Setting up Basic Features
- Defining Trust with Central Manager Proxy Server
- Fault Notification Overview
- Configuring Common Settings for Fault
- Access Events Notification Overview
- Syslog Notification Overview
- Security Monitors
- Enabling GTI Integration
- Operational Monitors
- E-mail Server and Notification Overview
- GTI Integration Requirements
- Viewing Summary of IPS Events
- User Activity Overview
- Configuring E-mail Server and Notification
- Simple Network Management Protocol (SNMP) Overview
- Navigating Manager Interface
- Logging into Manager Interface
- Configuring User Activity: SNMP
- Configuring SNMP Notification
- Configuring MDR Pair
- Configuring Script Notification
- Global Threat Intelligence Overview
- Configuring Fault Notification
- Verifying Access to Manager Interface
- Configuring User Activity: Syslog
- Configuring Syslog Notification
- Configuring Proxy Server
- Manager Installation Wizard
- IPS Event Notification Overview
- Manager Disaster Recovery (MDR) Overview
- Managing Dashboard Monitors
User Management
- Role Assignment Overview
- LDAP External Authentication
- Minimum Account Configuration
- Creating a Custom Role
- Configuring RADIUS External Authentication
- Managing GUI Access
- Verifying User Credentials
- Editing the Default Root Admin User
- Viewing User Activity
- Managing My Account
- Summary of Authentication Configuration
- Specifying Audit Settings
- Assigning LDAP Authentication
- Configuring LDAP (Up to 4 Servers)
- Assigning Domains and Roles
- Adding, Editing, and Deleting Users
- Configuring Session Controls
- User Management Overview
- Configuring Banner Text and Image
- Viewing Roles and Privileges
- RADIUS External Authentication
- Assigning RADIUS Authentication
Administrative Domains
- Admin Domain’s Hierarchical Structure
- Adding Users to a Child Domain
- Administrative Domains Overview
- Adding a Child Admin Domain
- Managing Admin Domains
- How Admin Domains Work
- Editing the Root Admin Domain
Network Security Sensor Overview
- Inspect
- Operating Modes
- Acceleration and Operation
- NS-Series Sensor Portfolio
- Multi-Port Monitoring
- Primary Function of Sensor
- Respond
- Virtualization (Sub-Interfaces)
- M-Series Sensor Portfolio
- Classify
- Secure Socket Layer (SSL) Decryption
- Capture
- Fail-close and Fail-Open (In-line Only)
- Virtual IPS-series Sensor Portfolio
- Large Networks: Perimeter, Core, Internal Placement
- Interface Groups (Port Clustering)
Network Security Sensor Overview
- Reviewing Device Summary
- Devices Page: Global Tab
- CLI Logging
- Activity Reports and Logs Review
- IPS Event Logging
- Installing Physical Sensors
- Deploying Pending Changes
- Special Configurations
- Alerting Options
- Managing Sensors
- Devices Page: Device Tab
- ATD Integration Overview
- Installing Sensors in Manager
- Remote Access: TACACS+
- Customizing Logon Banner
- Network Time Protocol (NTP)
- Port Types
- Downloading Signature Sets
- Installing Virtual Sensor
- Deploying Device Software
- Viewing/Editing Physical Ports
- DXL Integration Overview
- Remote Access: NMS Users and Devices
- Establishing Trust
Virtualization
- Configuring CDIR Virtual Interface
- CDIR Sub-Interface Configuration
- CIDR Block Options
- Virtualization (Sub-interfaces) Overview
- Configuring VLAN Virtual Interface
- Valid interface Types
- Determining Direction
- Double-VLAN Tagging
- VLAN and CIDR Logical Configuration
- Configuring Bridge VLAN Virtual Interface
- Bridge VLAN
- Before and After
- VLAN Sub-Interface Configuration
- Policy Application
Policies Configuraion
- Adding IPS Policy for Interface
- Defining Properties
- Viewing Attack Definitions
- Types IPS Policies
- Managing Policy Versions
- Managing Legacy Reconnaissance Policies
- Policy Management Overview
- Adding IPS Policy for Admin Domain
- Using Policy Manager
- Deleting IPS Policy for Admin Domain
- What are Policies?
- Policy Assignment
- Policy Terms and Concepts
- Policy Import and Export
- How Policies are Applied
- Interfaces Tab
- Attack Definitions
- Deploying Changes
- Editing IPS Policy for Interface
- Copying or Editing IPS Policy for Admin Domain
- Assigning Policies
- Deleting Policy
- Using IPS Policies Page
- Reconnaissance Attack Settings Merge Utility
Policy Customization
- Traffic Processing and Analysis
- Attack Definitions Tab
- How Attacks Definitions Work
- Attacks Detail Pane: Description
- Managing Policy Groups
- Attack Definitions Tab: Quick Search, Sort, Columns, Groups, Filters, and Detail
- Benign Trigger Probability (BTP)
- Attack Protection Categories
- Attack Categories and Severity
- Attacks Detail Pane: Settings Tab
- Attack Definitions Tab: Customizing Your View
Threat Explorer
- Top Malware
- Analyzing Source and Destination IP Addresses
- Top Attackers
- Analyzing Threats
- Top Applications
- Customizing Threat Analyzer View
- Top Targets
- Top Attacks
- Top Attack Executables
Advanced Malware Protection
- Gateway Anti-Malware Engine
- Using Advanced Malware Policies Page
- Confidence Level
- Advanced Malware Policies Configuration Overview
- PDF and Flash Analysis Engines
- Top Malware Detections Monitor
- ATD Engine
- TIE/GTI File Reputation Engine
- McAfee Cloud Engine
- Malware Engine Analysis Sequence
- Archiving Malware Files
- File Types
- Malware Analysis Overview
- Blacklist/Whitelist Engine
- Analyzing Malware
- Malware Detections Page
- Malware Engines
- Advanced Malware Detection Overview
- Malware Policy Parameters
- Action Thresholds
Advanced Botnet Detection
- Examples of Implemented Heuristics
- Zero-day and Targeted Botnet Detection
- Inspection Options Policies Configuration Overview
- Assigning Policies to Sensor Resources
- How Inspection Option Policies Work
- Inspection Options Policies
- Active Botnets Page: Organization
- Analyzing Botnets
- Heuristics
- Advanced Botnet Detection Overview
- Example: Blacklist Domain Detection
- Properties Tab
- Legacy Malware Detection Options
- Configuring Advanced Botnet Detection
- Top Active Botnets Monitor
- DNS Response Packet Inspection
- Whitelisted and Blacklisted Domains Detection
- Advanced Botnet Detection Options
- Inspection Options Tab
- Configuring Traffic Inspection
- C&C Server/Callback Detection
- Known Botnet Detection
Denial of Service Configuration
- Configuring Protocol Settings
- Configuring Rate Limiting Rules
- Rate Limiting (QoS Policies)
- Connection Limiting Policies
- Protocol Settings
- DoS Learning Mode
- Anti-Spoofing
- DoS Threshold Mode
- Configuring Thresholds for Volumebased Attacks
- Managing DoS Learning Profiles
- DoS Learning Attacks
- Types of DoS Attacks
- Adding Connection Limiting Policy
- Adding QoS Policy
- Evolution of DoS Attacks
- Customizing DoS Learning Attack
- QoS and Rate Limiting Configuration Overvie
- DNS Protection Command
- Volume-based Attacks
- Stateful TCP Engine
Endpoint Reputation
- IP Reputation Configuration Overview
- Global Threat Intelligence Review
- Endpoint Reputation Analysis Options
Web Server Protection
- How Web Server Heuristic Analysis Works
- Private SSL certificates
- Prerequisite: Required Attacks
- DoS Protection for Web Servers
- Heuristic Web Application Server Inspection Configuration Overview
- Configuring Web Server – DoS Prevention
- Web Server – DoS Prevention Configuration Overview
- Layer 7 DoS Protection for Web Servers
- Prerequisite: SSL Decryption
- Web Server Protection Overview
- Configuring Web Server Heuristic Analysis
Firewall Policy Configuration
- Firewall Access Logging
- Firewall Policy Definitions Configuration Report
- Firewall Access Events
- Rule Objects Overview
- Stateless Access Rules
- User-based Access Rules
- Policy Export and Policy Import
- Using Firewall Policies Page
- Application Identification
- Adding Rule Object
- Managing Firewall Policies
- Firewall Policy Overview
Threat Analyzer
- Threat Analyzer Overview
- Alerts Page
- Viewing Alert Detail
- Preferences Page
- Adding a Dashboard
- Viewing Details for Pie Slice
- Viewing Details for Pie Slice
- Endpoints Page
- Launching Threat Analyzer
- Adding a Monitor
- Viewing Consolidated Attacks
- Example Ignore Rule
- NTBA Dashboard
- Customizing the Dashboard Tabs
- Forensics Page
- Dashboard Page
- Right-click Options
- Adding Dashboards and Monitors
- Viewing Attacks Over Time
- Applications and GTI View Dashboard
- IPS Dashboard
- NSP Health Dashboard
Policy Tuning
- Sorting by Attack Name
- Steps for Reducing False Positives
- Adding Low Severity Attacks to Process
- High-Level Bottom-up Approach
- Identifying False Positives
- Prior to Tuning
- Preventing False Positives
- Preventing Future False Positives
- False Positives and Noise
- Two Phases of Policy Tuning
- Disabling Attacks and Alerts
- Start with High-Volume Attacks
- What is Tuning?
- Why Implement Tuning?
- Excessive Alerts
- Analyzing Event
- Looking for Patterns
Report Generation
- Next Generation Reports Overview
- Role Assignment
- Reporting Preferences
- Configuration Reports Overview
- Traditional Reports Overview
- Running a Traditional Report
- Running Configuration Report
- Reports Overview
- Adding User Defined Report
- Configuring Report Automation
- Running Default Next Generation Report
- Adding, Duplicating, Editing Next Generation Report
- Viewing Automatically-Generated Reports
Operational Status
- Alert Relevance
- Running Tasks
- Messages from McAfee Monitor
- Manager Summary
- Device Summary Monitor
- System Log
- Viewing Faults from Manage Page
- Viewing Device Faults from Dashboard
- Exporting System Log
- Running Tasks Monitor
- Operational Monitors Overview
- Viewing Manager Faults from Dashboard
- System Health Monitor
- Managing Faults
- Viewing Alert Relevance
- Viewing User Activity Log
- Viewing System Log
Database Maintenance
- Deleting Backup Files
- Database Tuning Overview
- Export Archives
- Automating Database Backup
- Tuning Now
- Calculating Maximum Alert Quantity
- Automating Tuning
- Configuring File and Database Pruning
- Viewing Scheduler Detail
- Enabling and Defining Alert Pruning
- Exporting Backup Files
- Archiving Data Now
- Automating Archiving Data
- Restoring Archive