Lesson Category: FireEye Network Security

Configuring FireEye Integrations

Both Network Forensics appliances integrate with a list of FireEye appliances and services. The Packet Capture integrations covered in this lessons include: FireEye Helix FireEye Threat Intelligence FireEye Network Security The Investigation Analysis integrations covered in this lesson include: FireEye Packet Capture FireEye Threat Intelligence Alert Aggregation from various FireEye appliances FireEye Malware Analysis FireEye …

Configuring FireEye Integrations Read More »

Endpoint Security Deployment

This lesson covers the key components of FireEye Endpoint Security, deployment options, and appliance configuration. Objectives: After completing this lesson, you will be able to: Identify the components needed to deploy Endpoint Security Identify the key phases of Endpoint Security operation Describe how alerts are generated Explain the interplay between Endpoint Security and other FireEye …

Endpoint Security Deployment Read More »

Deployment Options

The first step in installing an FX appliance is selecting the deployment mode that best meets your needs. Objective: Research FX deployment options and differentiate between standard and integrated modes of deployment.

Central Management Deployment Options

In the previous lesson, you reviewed the benefits of managing your appliances with a FireEye Central Management versus individually. The Central Management provides real-time correlation and data sharing with your FireEye appliances. Objectives: Research the Central Management to learn more about product suite integration, communication between Central Management and other FireEye appliances in the network, …

Central Management Deployment Options Read More »

Malware Analysis Deployment

The first step in installing an FireEye Malware Analysis is selecting the deployment mode that best meets your needs. Then, you can configure the appliance properly in your existing network setup. Lesson Objectives: At the end of this lesson, you will be able to: Identify the appropriate deployment configuration for your organization. Differentiate among Sandbox, …

Malware Analysis Deployment Read More »

Scroll to Top