Lesson Tag: System Administrators


You have reviewed the deployment options for the Malware Analysis appliance and have taken the initial appliance configuration lesson. Now, you will look at configuring analysis modes and perform additional setup tasks needed for batch malware analysis in unattended mode. Lesson Objectives: At the end of this lesson, you will be able to: Configure Sandbox …

Administration Read More »

Malware Analysis Product Introduction

The Malware Analysis appliance gives you hands-on control over a test environment where you can perform a deeper forensic investigation of advanced malware, zero-day, and targeted APT attacks embedded in common file formats and URLs.

Alert Administration

This lesson includes a tour of the FireEye Email Security portal, and introduces you to the dashboard as well as alerts, email searches, and email quarantine features. After completing this lesson, you should be able to: use the Dashboard to gain an understanding of email threats to your organization and monitor system performance through mail …

Alert Administration Read More »

System Maintenance Checks

Objectives: Use the Summary and Dashboard pages to regularly check system health and performance Perform appliance updates to ensure your system has the latest upgrades, guest images, and security content. Review database backup and restore functions.

Threat Management Configuration

Objectives: Identify the benefits of Riskware and SmartVision threat protection features. Configure Riskware and SmartVision on the Network Security appliance.

Users and Notifications

Objectives: Identify user roles and the privileges assigned to each role type. Configure system and malware event notifications.

Network Security Initial Configuration and Diagnostic Checks

Objectives: Perform first boot of the appliance and complete the configuration wizard on the CLI. Review user notifications. Check DTI Network Settings. Validate appliance licenses. Set up operational modes: TAP and Inline Block/Monitor.

Network Security Overview

Objectives: Explain how the Network Security’s MVX engine analyzes suspicious files and URLs. Describe how infection and callback rules are generated and shared with the Trellix user community via the Trellix Dynamic Threat Intelligence (DTI) Cloud to protect against future attacks. Differentiate between an integrated and distributed deployment. Explain the benefits of response workflow integration …

Network Security Overview Read More »

Scroll to Top