Curso SIEM McAfee
32hVisão Geral
Este curso proporciona um conhecimento profundo sobre a concepção, configuração, configuração, fluxo de comunicação, e gestão de fontes de dados dos aparelhos SIEM.
Através de uma mistura de laboratórios práticos e palestras interativas, aprenderá como implementar eficazmente os aparelhos num ambiente empresarial complexo.
Objetivo
Após concluir o curso Curso SIEM McAfee, você será capaz de aprender:
- Configurar o McAfee Enterprise Log Manager.
- Instalar e configurar o McAfee Enterprise Security Manager.
- Trabalhar com o receptor.
- Trabalhar com o motor de correlação avançado.
- Adicionar fontes de dados.
- Trabalhar com o editor de políticas.
Publico Alvo
- Administradores de sistema e de rede
- Pessoal de Segurança
- Auditores, e/ou Consultores preocupados com a Segurança de Redes e Sistemas
Informações Gerais
Carga Horária: 32h
- Se noturno este curso é ministrado de Segunda-feira à
sexta-feira, das 19h às 23h
- Se aos sábados este curso é ministrado das 9h às 18h
- Se in-company por favor fazer contato para mais detalhes.
Formato de entrega:
- 100% on-line ao vivo, via Microsoft Teams na presença de um
instrutor/consultor ativo no mercado.
- Nota: não é curso gravado.
Lab:
- Laboratório + Exercícios práticos
Materiais
Português | InglêsConteúdo Programatico
SIEM Overview
- The Big Picture
- McAfee® Enterprise Log Manager (ELM)
- What is SIEM?
- McAfee® Advanced Correlation Engine (ACE)
- Large Centralized Deployment Example
- Risk Correlation
- McAfee® Event Receiver (ERC)
- Elusive Security Events
- McAfee® Application Data Monitor (ADM)
- Application Data Monitor (ADM)
- McAfee® Database Event Monitor (DEM)
- Advanced Correlation Engine (ACE)
- Event Aggregation
- Log Management and Retention
- Event Analysis and Workflow
- Follow Testing Procedures
- First-Time ESM Setup
- FIPS Compliant Mode
- Do Validation Testing
- McAfee SIEM Architecture – “Combo Boxes”
- Configure the Device Properties
- Event Normalization
- Add the Devices to the System
- Event Correlation
- Receiver (ERC)
- Enterprise Security Manager(ESM)
- Ensure end-user communications
- How SIEM is Used
- Apply Software Updates
- Security Information Management
- SIEM Components Overview
- Large Distributed Deployment Example
- Database Event Monitor (DEM)
ESM and Receiver Overview
- ESM Settings – File Maintenance
- ESM – Add User
- Practice 2: SIEM Users and Groups
- McAfee Enterprise Security Manager
- ESM – Profile Management
- ESM – Login Security
- McAfee Receiver
- ESM – Watchlists
- ESM – System Logs
- ESM – Add Privileges
- ESM – Users and Groups
- ESM – Add Group
- ESM – Reports
- Receiver HA
ESMI Views
- McAfee ESMI
- Key Dashboards
- The Data Problem
- Configure User-specific ESM Settings
Filtering, Watchlists, and Variables
- Syntax for contains and regex
- String Normalization
- String Normalization File
- Practice 4: Watchlists
- Points to consider when using contains or regex:
- Watchlists and Variables
Receiver Data Source Configuration
- Data Source Profiles
- Data Sources – WMI Event Logs
- Data Source Grouping
- Time Delta Page
- Real Time Data Enrichment
- Data Sources – Syslog
- Receiver Data Sources
- Data Sources – WMI
- Practice 5: Data Sources
- Data Sources – Auto Learn
- Importing and Exporting Data Sources
- Child Data Sources
- Discovered Assets
- Data Sources – Correlation Engine
- Data Sources – Generic Net Flow
- McAfee ePO
- Data Source Time Problems
Aggregation
- Flow Aggregation – Custom
- How Aggregation Works
- Port Values
- Start at Level Aggregation
- Flow Aggregation Levels
- Flow Aggregation
- Practice 6: Aggregation
- Level Aggregation
- Modify Event Aggregation Settings
- Aggregation Overview
- Flow Aggregation – Ports
Policy Editor
- Practice 2: Using the Syslog Parser – Part 2
- Advanced Syslog Parser Rules
- Copy packet
- The Inheritance Icons
- Severity
- Rollout Policy Correlation
- Field Assignment Tab
- Severity Weights
- Policy Rollout
- Tools Menu
- Practice 1: Using the Syslog Parser – Part 1
- Data Source Rules – Auto Learned
- Rules Display Pane
- Policy Editor Overview
- Rule Properties – Settings
- Policy Change History
- Rule Inheritance
- Operations Menu
- Policy Status
- Action
- To copy a policy, follow the steps
- Export a Policy
- Parsing Tab
- Import a Policy
- Normalization Categories
Correlation
- Event Correlation Engine
- Optimized Risk Management
- Practice 2: Adding an ACE Appliance
- Criteria
- Scanning Single Server (Distributed Dictionary Attack)
- Practice 8.1: Correlation Rules
- Practice 8.3: Historical Correlation
- System penetration scenario
- Rollout Correlation Policy
- Rollout Correlation Policy
Notifications and Reporting
- Alarm Settings – Actions
- New Report Layout
- Email Report Recipients
- HA Failure
- Deviation from Baseline
- Field Match
- Alarm Settings – Escalation
- Device Status Change
- Practice 9.1: Creating Alarms
- Remove a Syslog Recipient
- View Running Reports
- FIPS Failure
- Specified Event Rate
- Device Failure
- Alarms Log
- Practice 9.2: Reporting
- Syslog Report Recipients
- View Report Files
- Section 5
- Designing Report Layout
- Alarm Settings Additional Notes
- Export views and reports
- SNMP Reports Recipients
- Email Report Groups
- Report Conditions
- Document Properties
- Query Wizard
- Triggered Alarms View
- Alarm Settings – Devices
- SMS Report Recipients
- Internal Event Match
- Additional Alarm Options
- UCF Report Filter
- Event Delta
- Add a Syslog Recipient
- Section 6
- Alarm Details
Working with ELM
- Configuring the ELM for Storage
- ELM Overview
Troubleshooting and System Management
- Device Status Alerts
- Reasons for Flags
- How to manually set the time if no NTP server is available
- ESM Login Screen Does Not Come Up on Linux Browser
- How to ensure that the update file is not corrupt
- How to access the terminal via the GUI
- ESM and ESMI Troubleshooting
- Beeping during initial startup
- How to initiate a callhome
- How to export the ESMI login history
- Manual rules updates
- Hardware Issues
- Unable to download rules from the McAfee servers
- The NGCP password for the ESMI desktop has been lost
- User can log in to ESMI but they have no rights
- How to determine if you are getting data from your data source
- Troubleshooting Upgrade to Version 9.5.0
- Unable to SSH or login to the ESM
- Device Status Window
- Update and Upgrade Issues
- Software Upgrade Process
- Operating System and Browser- specific Issues
- McAfee Technical Support
- Export/Download Troubleshooting When Using Windows 7
- McAfee SIEM Sizing Overview
- Login – unable to get the certificate using Firefox using IPv6 address
- How to obtain the serial number from a device
- ESM Settings – Database