Lesson Tag: System Administrators

Introduction to Containment

This lesson covers containment and containment settings for Trellix Endpoint Security (HX). Objectives: After completing this lesson, you will be able to: Contain a compromised host following the recommended containment process Customize containment settings, such as excluding key hosts in your network from containment Assign the correct user roles for users that need to contain …

Introduction to Containment Read More »

Threat Management

This lesson covers the basics of detection and alerting for System Administrators, so they can support their team members in the analyst and response work. Objectives: After completing this lesson, you will be able to: Differentiate the three threat sources for Endpoint Security (HX) rules Distinguish exploit, presence, and execution indicator types Create custom threat …

Threat Management Read More »

Introduction to Host Management

In the last lesson, you configured agent communication and policies using host sets. In this lesson, you’ll take a closer look at creating host sets, defining high value hosts, and backing up agent certificates for hosts. Objectives: After completing this lesson, you will be able to: Create hosts sets Define high-value hosts in your network …

Introduction to Host Management Read More »

Introduction to Agent Management

After the Endpoint Security (HX) and HXD servers are deployed and configured, the next step is to configure the agent. This lesson describes how to configure and provision the agent to hosts on your network. Objectives: After completing this lesson, you will be able to: Install the agent on a test system Configure and install …

Introduction to Agent Management Read More »

Endpoint Security (HX) Deployment

This lesson covers the key components of Trellix Endpoint Security (HX), deployment options, and appliance configuration. Objectives: After completing this lesson, you will be able to: Identify the components needed to deploy Endpoint Security (HX) Identify the key phases of Endpoint Security (HX) operation Describe how alerts are generated Explain the interplay between Endpoint Security …

Endpoint Security (HX) Deployment Read More »

File Protect Scan Results and Analysis

In the last lesson, you learned how to configure storage and file shares, run on-demand scans, and schedule recurrent scans on the File Protect appliance. In this lesson, you will learn how to review the high-level scan results as well as the scan results in detail. Lesson Objective Review the file scan results.

File Protect Administration

You have reviewed the deployment options for the FX and have taken the initial appliance configuration lesson. In this lesson, you will learn to add and configure storage. Objectives: At the end of this lesson, you will be able to: Add and configure storage. Check the status of the storage. Use the scan wizard. Preview …

File Protect Administration Read More »

Deployment Options

File Protect Deployment Options The first step in installing a File Protect appliance is selecting the deployment mode that best meets your needs. Lesson Objectives At the end of this lesson, you will be able to: Research and identify the right File Protect deployment options for your organization. Differentiate between standard and integrated modes of …

Deployment Options Read More »

Scroll to Top