Symantec eLibrary

Symantec eLibrary

Get free access to hundreds of web-based training modules.


Symantec eLibrary OUTAGE ADVISORY

The Symantec eLibrary will be offline and unavailable from Friday, February 26, 8AM Pacific Time to Monday February 29, 8AM Pacific Time as we move all content to a new platform.
On February 29  the Symantec eLibrary will come back online with a new look and feel on the new platform. Current subscribers will be able to log in with their existing user id and password.
Questions? Contact sesystems@symantec.com
Register » Login »
Note: You must have subscribed to the Symantec eLibrary to log in as a Member. If not, click the Register button to subscribe.

Welcome to the Symantec eLibrary.

Members of the Symantec eLibrary receive free access to hundreds of regularly updated on-demand web-based training modules covering the breadth and depth of the Symantec product portfolio. Modular topics cover installation, configuration, deployment, administration, maintenance, and troubleshooting of Symantec products in detail. The eLibrary is ideal for supplementing classroom training, accessing as a just-in-time reference, and/or providing training to those who cannot travel or afford time away from the office.

To view modules check your browser settings and disable all pop-up blockers. Contact us for more help.


Announcing the New Veritas eLibrary going live October 6.

For access to the Veritas eLibrary click here.

All current Veritas content has been migrated to the Veritas eLibrary. All new Veritas content will be populated there. If you have a current subscription to the Symantec eLibrary, that subscription has been migrated to the Veritas eLibrary with the same user credentials.

Loading the training modules below... Please wait...
Error: Please disable Internet Explorer Compatibility View for this website. Please see the FAQ for further assistance.
Training Modules
Expand All Collapse All
Updating Symantec eLibrary results... Please wait...
New Content added Oct 2015-Jan 2016

Three new modules added to the Control Compliance Suite 11.0 Add-on Modules category

Five new modules added to the Data Center Security Server 6.5 category

Thirty one new modules added to the Data Loss Prevention 14.0 Administration category

Four new modules added to the Endpoint Protection 12.1.6 category

One new module added to the Ghost Solution Suite 3.0 category

How to Contact Support
  • How to Contact Support
    This module discusses how to obtain technical support from Symantec, what self-help resources are available, and what information to gather before calling support.
Brightmail Gateway
Brightmail Gateway 9.0
  • Brightmail Gateway 9.0 - Introduction to Brightmail Gateway 9.0
    This module provides an introduction to Brightmail Gateway 9.0. It also describes its features and architecture.
  • Brightmail Gateway 9.0 - Installation and Configuration
    This module covers how to install and configure Brightmail Gateway 9.0.
  • Brightmail Gateway 9.0 - Adaptive Reputation Management
    This module describes Adaptive Reputation Management in Brightmail Gateway 9.0
  • Brightmail Gateway 9.0 - Antispam Policies
    This module covers how to create antispam policies in Brightmail Gateway 9.0. It also introduces bounce attack prevention.
  • Brightmail Gateway 9.0 - Antivirus Policies
    This module covers how to create antivirus policies in Brightmail Gateway 9.0. It also covers configuration of LiveUpdate and scan settings.
  • Brightmail Gateway 9.0 - Content Compliance Policy
    This module covers how to setup content compliance scanning. It also describes how to use content compliance policy for structured data matching.
  • Brightmail Gateway 9.0 - Managing User and Host Configuration
    This module covers how to manage user and host configuration in Brightmail Gateway 9.0.
  • Brightmail Gateway 9.0 - Managing Control Center Settings
    This module covers how to configure control center settings of Brightmail Gateway 9.0.
  • Brightmail Gateway 9.0 - Managing Instant Messaging Settings
    This module covers how to manage instant messaging filtering in Brightmail Gateway 9.0.
Brightmail Gateway 8.0
  • Brightmail Gateway 8.0 - Introduction
    This module provides an introduction to Brightmail Gateway 8.0. It also covers key features and architecture in detail.
  • Brightmail Gateway 8.0 - Installation and Configuration
    This module describes how to install and configure Brightmail Gateway 8.0. Overview of Brightmail Gateway Control Center is also discussed.
  • Brightmail Gateway 8.0 - Adaptive Reputation Management
    This module describes Adaptive Reputation Management feature introduced in Brightmail Gateway 8.0. You learn how to configure good and bad senders policies. You also learn to configure connection classification.
  • Brightmail Gateway 8.0 - Antispam Policies
    This module describes how to configure Email Spam Policies in Brightmail Gateway 8.0. You learn to configure spam quarantine and spam scan settings. You also learn to configure sender authentication.
  • Brightmail Gateway 8.0 - Antivirus Policies
    This module describes how to configure Email Virus Policies in Brightmail Gateway 8.0. You learn how to configure settings for LiveUpdate and virus quarantine.
  • Brightmail Gateway 8.0 - Content Compliance Policy
    This module describes how to set up content compliance scanning in Brightmail Gateway 8.0. You also learn to use content compliance policies for structured data matching.
  • Brightmail Gateway 8.0 - Managing User and Host Configuration
    This module describes how to manage user and host configuration through Brightmail Gateway 8.0 Control Center.
  • Brightmail Gateway 8.0 - Managing Control Center Settings
    This module describes how to manage Brightmail Gateway 8.0 settings through Brightmail Gateway 8.0 Control Center.
  • Brightmail Gateway 8.0 - Using LDAP for Brightmail Gateway 8.0
    This module covers different LDAP services supported by Brightmail Gateway 8.0. You learn how to create and manage LDAP-based group policies.
  • Brightmail Gateway 8.0 - Managing Instant Messaging Filtering
    This module provides an introduction to IM filtering in Brightmail Gateway 8.0. You learn to create IM virus and IM spam policies.
Control Compliance Suite
Control Compliance Suite 11
Control Compliance Suite 11.0 Add-on Modules
  • Control Compliance Suite 11 Policy Manager (1 of 1)
    This Control Compliance Suite 11 Policy Manager eLearning training covers policies and the policy lifecycle and their use within the organization, as well as how you are able to use CCS 11 to manage a policy through all its lifecycle stages.
  • CCS 11 for Risk Management: (1 of 1)
    The Symantec Control Compliance Suite (CCS) 11.0 Risk Manager Course is designed for professionals who are tasked with aligning security and compliance operations with business priorities. This course focuses on defining risk according to business thresholds and mapping risks to assets, controls and owners. This course also provides a deep dive into how to best use the risk score methodology within Risk Manager to measure and track performance of compliance and risk reduction programs.
  • Control Compliance Suite 11.0 - Assessment Manager (1 of 1)
    After viewing this training, you should be able to, Describe the importance of procedural controls for securing and evaluation your security posture, understand the deployment and configuration of the Assessment Manager Solution, how to use Assessment Manager for procedural controls and integrate Assessment Manager with Control Compliance Suite.
Control Compliance Suite 11.0 Administration
  • CCS 11 Administration: Introduction to CCS 11.0 (1 of 9)
    In this lesson, you learn about the current IT security and compliance challenges today and how to use CCS 11 to be proactive in meeting those challenges.
  • CCS 11 Administration: Installing the CCS Suite (2 of 9)
    In this lesson, you learn how to plan for and install Control Compliance Suite. This includes information about pre-deployment considerations along with details security and network considerations. We also go over the privileges required for the account used for installation.
  • CCS 11 Administration: Initial configuration (3 of 9)
    In this lesson, you learn the tasks required for the initial configuration of CCS. This includes requirements for data collection and evaluations. You will also learn about how to use LiveUpdate to update the solution.
  • CCS 11 Administration: Getting started with CCS 11.0 (4 of 9)
    In this lesson, you learn how to configure reconciliation rules and import assets, configure UNIX assets, agent based assets, Standards Manager asset discovery, and perform data collection and evaluation.
  • CCS 11 Administration: Standards Manager/CVSS and Risk Score (5 of 9)
    In this lesson, you learn how to create standards and checks, understand how compliance and risk scores are calculated, create data collection jobs and evaluation jobs, and describe the exception lifecycle and function.
  • CCS 11 Administration: Controls Studio (6 of 9)
    In this lesson, you learn how to manage and customize content.
  • CCS 11 Administration: Ad hoc queries (7 of 9)
    In this lesson, you learn about Ad Hoc Queries and how to use them in your organization.
  • CCS 11 Administration: External data integration (8 of 9)
    In this lesson, you learn about the external data integration capabilities within CCS 11.0.
  • CCS 11 Administration: Reporting and dashboards (9 of 9)
    In this lesson, you learn to create dashboards and reports.
Control Compliance Suite 11.0 Vulnerability Manager
  • CCS 11.0: Vulnerability Manager- Introducing Vulnerability Manager (1 of 2)
    In this module, you learn what Vulnerability Manager is, how it can help you ensure the security of your enterprise by discovering assets and detecting, reporting, and managing vulnerabilities. You also learn how to install, configure, manage, and update Vulnerability Manager.
  • CCS 11.0: Vulnerability Manager- Working with Vulnerability Manager (2 of 2)
    In this module, you learn to configure sites and asset groups, perform discovery and vulnerability scans, manage reports, remediation ticketing, and exceptions within your networks.
Control Compliance Suite 10
Control Compliance Suite 10.5 Administration
  • CCS 10.5 Administration: Introduction
    The Symantec Control Compliance Suite (CCS) 10.5 Administration e-learning modules are designed for professionals who are tasked with supporting, architecting, implementing, and monitoring of the Control Compliance Suite 10.5 product. These self-paced e-learning modules cover installing and managing Control Compliance Suite 10.5 and its data collectors that interface with the Control Compliance Suite 10.5. These modules also include demonstrations that enable you to test your new skills and begin to transfer those skills into your working environment.
  • CCS 10.5 Administration: Introducing Compliance (1 of 16)
    This module describes compliance concepts and how challenges to compliance are managed using CCS 10.5. You also describe some of the core functions and view how CCS 10.5 is architected logically.
  • CCS 10.5 Administration: Symantec Data Collectors (2 of 16)
    This module introduces you to the Symantec data collectors that integrate with Symantec Control Compliance Suite 10.5. Data collectors include Symantec Risk Management System (RMS), Symantec Enterprise Security Manager (ESM), Symantec Response Assessment Manager (RAM), Symantec Data Loss Prevention (DLP) Connector, and Symantec Altiris Service Desk 7 Connector.
  • CCS 10.5 Administration: Installing and Configuring the Risk Management System (3 of 16)
    This module describes best practices for planning an RMS deployment that includes the RMS console and Information server with various bv-Control product snap-ins. The module also describes how to install the RMS console, Information server, and bv-Control products.
  • CCS 10.5 Administration: Configuring RMS Components (4 of 16)
    This module describes how to configure bv-Control products and use bv-config to help manage your Windows environment. bv-Control products include bv-Control for Windows, bv-Control for Microsoft Exchange, bv-Control for Microsoft SQL Server, and bv-Control for UNIX.
  • CCS 10.5 Administration: Using RMS (5 of 16)
    This module describes how to navigate the RMS console and use the features provided by the RMS console, such as running queries, performing baselines, and managing tasks.
  • CCS 10.5 Administration: RMS Queries (6 of 16)
    This module describes how to build and use queries. You also learn how to run and fine tune queries using advanced query features.
  • CCS 10.5 Administration: Using bv-Control (7 of 16)
    This module describes how to audit your environment using one or more bv-Control products.
  • CCS 10.5 Administration: Installing and Configuring Enterprise Security Manager (8 of 16)
    This module describes how to install and configure Enterprise Security Manager (ESM) and ESM agent for use with CCS 10.5. The module also describes how to create and execute batch files to semi-automate and streamline ESM processes.
  • CCS 10.5 Administration: Installing Control Compliance Suite 10.5 (9 of 16)
    This module describes general predeployment considerations and preinstallation requirements. You also learn how to install or upgrade to CCS 10.5 and describe how to perform a silent installation.
  • CCS 10.5 Administration: Configuring Control Compliance Suite (10 of 16)
    This module describes how to perform the initial Control Compliance Suite 10.5 configuration. Initial tasks include registering the DPS, creating asset folders, creating reconciliation rules, creating asset import jobs, creating collection, evaluation, and reporting jobs, and viewing reports.
  • CCS 10.5 Administration: Administering Control Compliance Suite (11 of 16)
    This module describes how to navigate and manage the CCS 10.5 console and the CCS 10.5 Web console. You also learn how to create tiered and dynamic dashboards. In addition, you learn how to create and customize reports.
  • CCS 10.5 Administration: Intefacing with Symantec Products (12 of 16)
    This module describes how to interface with the CSV and ODBC data collectors. The module also describes how to interface with Symantec Protection Center, Symantec Data Loss Prevention, and Symantec Altiris Service Desk.
  • CCS 10.5 Administration: Advanced Integration (13 of 16)
    This module describes the Integration Services Subsystem (ISS) and Integration Service APIs. The module also shows you how to use PowerShell cmdlets and perform advanced data management.
  • CCS 10.5 Administration: Managing Standards (14 of 16)
    This module describes how to create standards and checks, provides an overview of the Security Content Automation Protocol (SCAP), and describes SCAP features. The module also shows you how to configure and use FDCC.
  • CCS 10.5 Administration: Policies, Entitlements, and Procedural Compliance (15 of 16)
    This module describes how to manage policies, entitlements, and procedural compliance.
  • CCS 10.5 Administration: Vulnerability Manager (16 of 16)
    This module introduces Vulnerability Manager, shows you how to prepare for installation, and install and configure the product. The module also shows you how to use Vulnerability Manager to assess your network security.
Control Compliance Suite 10.0 Administration
  • CCS 10.0 Vulnerability Manager
    This module introduces Vulnerability Manager, shows you how to prepare for installation, and install and configure the product. The module also shows you how to use Vulnerability Manager to assess your network security.
  • CCS 10.0 - Introduction
    The Symantec Control Compliance Suite (CCS) 10.0 Administration e-learning modules are designed for professionals who are tasked with supporting, architecting, implementing, and monitoring of the Control Compliance Suite 10.0 product. These self-paced e-learning modules cover installing and managing Control Compliance Suite 10.0 and its data collectors that interface with the Control Compliance Suite 10.0. These modules also include demonstrations that enable you to test your new skills and begin to transfer those skills into your working environment.
  • CCS 10.0 - Introducing Compliance
    In this module, you learn about compliance concepts and how challenges to compliance are managed using CCS 10.0. You also describe some of the core functions and view how CCS 10.0 is architected logically.
  • CCS 10.0 - Symantec Data Collectors
    This module introduces you to the Symantec data collectors that integrate with Symantec Control Compliance Suite 10.0. Data collectors include Symantec Risk Management System (RMS), Symantec Enterprise Security Manager (ESM), Symantec Response Assessment Manager (RAM), Symantec Data Loss Prevention (DLP) Connector, and Symantec Altiris Service Desk 7 Connector.
  • CCS 10.0 - Installing and Configuring the Risk Management System
    This module describes best practices for planning an RMS deployment that includes the RMS console and Information server with various bv-Control product snap-ins. The module also describes how to install the RMS console, Information server, and bv-Control products.
  • CCS 10.0 - Configuring bv-Control Products
    In this module, you learn how to configure bv-Control products and use bv-config to help manage your Windows environment. bv-Control products include bv-Control for Windows, bv-Control for Microsoft Exchange, bv-Control for Microsoft SQL Server, and bv-Control for UNIX.
  • CCS 10.0 - Using RMS
    This module describes how to navigate the RMS console and use the features provided by the RMS console, such as running queries, performing baselines, and managing tasks.
  • CCS 10.0 - RMS Queries
    In this module, you learn how to build and use queries. You also learn how to run and fine tune queries using advanced query features.
  • CCS 10.0 - Using bv-Control
    This module describes how to audit your environment using one or more bv-Control products.
  • CCS 10.0 - Installing and Configuring ESM
    This module describes how to install and configure Enterprise Security Manager (ESM) and ESM agent for use with CCS 10.0. The module also describes how to create and execute batch files to semi-automate and streamline ESM processes.
  • CCS 10.0 - Installing CCS 10.0
    This module describes general predeployment considerations and preinstallation requirements. You also learn how to install or upgrade to CCS 10.0 and describe how to perform a silent installation.
  • CCS 10.0 - Configuring CCS 10.0
    This module describes how to perform the initial Control Compliance Suite 10.0 configuration. Initial tasks include registering the DPS, creating asset folders, creating reconciliation rules, creating asset import jobs, creating collection, evaluation, and reporting jobs, and viewing reports.
  • CCS 10.0 - Administering CCS 10.0
    In this module, you learn how to navigate and manage the CCS 10.0 console and the CCS 10.0 Web console. You also learn how to create tiered and dynamic dashboards. In addition, you learn how to create and customize reports.
  • CCS 10.0 - Advanced Administration
    This module shows you how to collect data from Symantec and third-party products and import the data into CCS 10.0. Data collectors include Symantec Data Loss Prevention (DLP) Connector, Symantec Altiris Service Desk 7 Connector, comma-separated values (CSV), and open database connectivity (ODBC).
  • CCS 10.0 - Managing Compliance with CCS 10.0
    This module shows you how to collect data from Symantec and third-party products and import the data into CCS 10.0. Data collectors include Symantec Data Loss Prevention (DLP) Connector, Symantec Altiris Service Desk 7 Connector, comma-separated values (CSV), and open database connectivity (ODBC).
  • Integrating Symantec Products with Control Compliance Suite 10.0
    This module describes how to integrate Control Compliance Suite 10.0 with Symantec Data Loss Prevention and the Altiris Service Desk Connector. The module also shows you how to acquire third-party data using the comma-separated values (CSV) and open database connectivity (ODBC) data collectors.
Critical System Protection
Critical System Protection 5
Critical System Protection 5.2
  • SCSP 5.2 Admin: Intro to CSP (1 of 10)
    In this module you will learn about security threats that organizations face against their critical infrastructure and the types of technologies used to protection them. You will also learn about the different components of CSP and how they are used to protect servers.
  • SCSP 5.2 Admin: Install & Deploy (2 of 10)
    In this module you will learn how to install CSP and the different deployment methods.
  • SCSP 5.2 Admin: Install & Deploy - Demo (3 of 10)
    This module provides a demonstration on how to install CSP and the different deployment methods.
  • SCSP 5.2 Admin: Prevention & Detection (4 of 10)
    In this module you will learn about the different prevention and detection policies. You will learn about the components of a policy how to create your own policies.
  • SCSP 5.2 Admin: Prevention - Demo A (5 of 10)
    This module is a demonstration on how prevention policies work. You will see the policy in action and learn how to tune the policies to work with your applications. You will also learn how to build a policy for Apache Webserver for Windows. The knowledge from this exercise can be used in developing policies for other applications.
  • SCSP 5.2 Admin: Detection - Demo B (6 of 10)
    This module is a demonstration on how detection policies work. You will see how to create your own detection policies to monitor files, logs, registry keys for changes. You will also learn about the out of the box Baseline policies.
  • SCSP 5.2 Admin: Manage & Troubleshoot (7 of 10)
    This module you will learn about configurations that are used to determine certain aspects of how agents communicate and send events that are generated by policy violations. You will also learn how to troubleshoot agent issues. You will also learn how to create users and roles, and how CSP uses Active Directory for pass through authentication.
  • SCSP 5.2 Admin: Manage, Troubleshoot & Asset Manage - Demo (8 of 10)
    In this module is a demonstration on how to create configurations, filters, configuration groups and asset groups. You will also learn about creating asset groups and how to assign and apply policies and systems to these groups.
  • SCSP 5.2 Admin: Asset Manage (9 of 10)
    In this module you will learn about creating asset groups, assigning systems and policies to these groups and how to manage assets.
  • SCSP 5.2 Admin: Policies for VMware VSphere (10 of 10)
    In this module you will learn about the Vsphere Prevention and Detection policies that ship with CSP. These polices can be used to lockdown the Vsphere environment and provide monitoring of the ESXi host.
Data Center Security
Data Center Security Server 6.5
  • SDCS Server 6.5: Software Defined Data Center Overview (1 of 5)
    This module describes the need for data center virtualization and reviews some of the common obstacles organizations face when securing virtual data centers. This module also provides an overview of VMware components which are used to create the software defined data center.
  • SDCS Server 6.5: Introducing Symantec Data Center Security: Server and Unified Management Console (2 of 5)
    In this module, you learn about the architecture and features of Symantec Data Center Security. You are also provided an overview of the Unified Management Console and how REST APIs can be used for custom functionality.
  • SDCS Server 6.5: Installing Symantec Data Center Security: Server v 6.5 (3 of 5)
    This module reviews the software and hardware requirements for deploying Symantec Data Center Server along with best practices, guidelines and details needed for a successful deployment. You will also experience a simulation of the installation and initial configuration of the solution.
  • SDCS Server 6.5: Managing Policies (4 of 5)
    In this module, you learn about the different types of policies used within Symantec Data Center Security Server for malware and network threat protection and how to manage those policies using the policy workspace.
  • SDCS Server 6.5: Working with NSX Service Composer (5 of 5)
    This module introduces the concept of using VMware NSX Security Tags to allow for applying security policies using Symantec Data Center Security.
Data Center Security: Server & Server Advanced 6.x
  • Symantec Data Center Security: Server Advanced Cheat Sheet v2.0
    The SDCSSA Cheat sheet is a 2 page document that should be avaialble to partners and customer to quickly reference some of the most common definitions and features of the Symantec Data Center Security: Server Advanced product.
Data Center Security: Server & Server Advanced 6.0
  • DCS SA 6.0: Introduction to Security Risks (1 of 12)
    In this lesson you will learn about different types of security risks and how to identify common targets and transmission methods. You will also learn about different methods used to prevent security risks and to ways to recover in case of impact. We will also go over the importance of security assessments and aspects of a basic corporate security policy. From there you will learn the challenges facing today’s host-based security systems and how solutions from Symantec can help you manage and protect your environment.
  • DCS SA 6.0: Server Advanced Overview (2 of 12)
    In this lesson you will learn about SDCS: Server Advanced features and offerings, We will go over the product architecture and the different types of policies and platforms supported. We will then bring up the solution within a demo environment and show how to navigate the management console and the windows agent user interface.
  • DCS SA 6.0: Installation and Deployment (3 of 12)
    In this lesson you will learn to plan the installation taking into consideration high level deployment and sizing options. You will then learn how to install each of the major components to include the management server and console as well as agents for both Windows and UNIX platforms.
  • DCS SA 6.0: Configuring Assets (4 of 12)
    In this lesson you will learn to differentiate between an asset and an agent and you will learn how agents work, you also learn how to view agent properties and management those agents from the management console and from the command line.
  • DCS SA 6.0: Policy Overview (5 of 12)
    In this lesson, you will learn about the different policy components and functions, policy management, and policy deployment. We will also examine some different ways in which Server advanced is used to help secure organizations.
  • DCS SA 6.0: Windows Prevention Policies (6 of 12)
    In this lesson we will go over the prevention policy structure and how using these policies work to proactively protect your systems from threats. We then go into the Server Advanced console and learn the options used when creating a new prevention policy. From there we go into the advanced settings of a policy and dive into the global policy options and different sandboxes. We will also look at how to use resource lists to define specific controls based on lists of resources such as network rules, files and registry lists.
  • DCS SA 6.0: Unix and Legacy Prevention Policies (7 of 12)
    In this lesson you will learn about the common components and functionality of the legacy prevention policy for both Windows and UNIX. This includes policy settings at different levels, resource lists, and sandbox options.
  • DCS SA 6.0: Advanced Prevention (8 of 12)
    In this lesson we will cover five topics. First we will look at profiling applications, and then we will look at how to edit predefined policies. From there we will cover how to create custom controls for third party applications. Then we will look at best practices for developing new policies and different approaches for policy deployment.
  • DCS SA 6.0: Detection Policies (9 of 12)
    In this lesson you will learn about the components and functionality of detection policies.
  • DCS SA 6.0: Event Management (10 of 12)
    In this lesson we will cover in detail what events are and how to view event properties and best practices for handling events. You will also learn how to create queries, reports and alerts.
  • DCS SA 6.0: Agent Management and Troubleshooting (11 of 12)
    In this lesson you will learn how to collect and view logs and use diagnostic policies and command line tools for agent troubleshooting.
  • DCS SA 6.0: System Management (12 of 12)
    In this lesson we will cover how to manage the SDCS: SA database. We will then go over how to manage console logins for users and assigning users to roles. And we will go over system settings, how to access the Tom Cat server and some of the diagnostic policies that can be applied to the SDCS: SA Server. Then we will view the different logs available and their locations.
Data Loss Prevention
Data Loss Prevention 14.0
Data Loss Prevention 14: Administration
  • DLP 14.0 Admin: Introduction to Symantec Data Loss Prevention (1 of 31)
    This module provides an Introduction to Symantec Data Loss Prevention.
  • DLP 14.0 Admin: Navigation and Reporting (2 of 31)
    This module is on Navigation and Reporting.
  • DLP 14.0: Dashboard Creation and Distribution– Demo (3 of 31)
    This demonstration steps through Dashboard Distribution and Creation.
  • DLP 14.0: Incident Remediation and Workflow (4 of 31)
    This module covers Incident Remediation and Workflow.
  • DLP 14.0: Incident Remediation – Demo (5 of 31)
    This demonstration is on Incident Remediation.
  • DLP 14.0: Policy Management (6 of 31)
    This module covers Policy Management
  • DLP 14.0: Exporting and importing policy templates and creating a policy– Demo (7 of 31)
    This demonstration steps through exporting and importing policy templates and creating a policy.
  • DLP 14.0: Response Rule Management (8 of 31)
    This module covers Managing Response Rules.
  • DLP 14.0: Creating Automated Response Rules–Demo (9 of 31)
    This demonstration shows how to create Automated Response Rules.
  • DLP 14.0: Described Content Matching (10 of 31)
    This module covers Described Content Matching.
  • DLP 14.0: Creating a DCM Policy using Data Identifiers–Demo (11 of 31)
    This module shows how to use Data Identifiers in a policy.
  • DLP 14.0: Exact Data Matching and Directory Group Matching (12 of 31)
    This module covers Exact Data Matching and Directory Group Matching.
  • DLP 14.0: Creating an EDM Index for a Directory Group Match–Demo (13 of 31)
    This demonstration shows using an EDM Index for Directory Group Matching.
  • DLP 14.0: Indexed Document Matching (14 of 31)
    This module covers Indexed Document Matching.
  • DLP 14.0: Creating an IDM Index – Demo (15 of 31)
    This demonstration shows creating an IDM Index
  • DLP 14.0: Vector Machine Learning (16 of 31)
    This module covers Vector Machine Learning.
  • DLP 14.0: Creating a VML Profile and Policy - Demo (17 of 31)
    This demonstration steps through creating a VML Profile and using it in a policy.
  • DLP 14.0: Network Monitor (18 of 31)
    This module covers Network Monitor.
  • DLP 14.0: Creating and Applying L7 Filters - Demo (19 of 31)
    This demonstration steps through creating and applying L7 Filters.
  • DLP 14.0: Network Prevent (20 of 31)
    This module covers Network Prevent.
  • DLP 14.0: Blocking an SMTP Message - Demo (21 of 31)
    This demonstration steps through blocking an SMTP message using Network Prevent.
  • DLP 14.0: Mobile Email Monitor and Mobile Prevent (22 of 31)
    This module reviews Mobile Email Monitor and Mobile Prevent.
  • DLP 14.0: Using Mobile Prevent - Demo (23 of 31)
    This demonstration steps through using Mobile Prevent.
  • DLP 14.0: Network Discover and Network Protect (24 of 31)
    This module covers Network Discover and Network Protect.
  • DLP 14.0: Scheduling incremental scans, viewing the resulting reports and quarantining at-risk data- Demo (25 of 31)
    This demonstration steps through running Network Discover scans, viewing the reports, and quarantining at-risk data.
  • DLP 14.0: Endpoint Prevent (26 of 31)
    This module covers Endpoint Prevent.
  • DLP 14.0: Creating Endpoint Response Rules and using Endpoint Prevent to block an attempt to copy data to a USB device- Demo (27 of 31)
    This demonstration steps through blocking confidential data from being copied to a USB device using Endpoint Prevent.
  • DLP 14.0: Endpoint Discover (28 of 31)
    This module introduces Endpoint Discover.
  • DLP 14.0: Adding and running an Endpoint Discover scan and viewing incident and scan details- Demo (29 of 31)
    This demonstration steps through adding and running an Endpoint Discover scan and viewing incident data and scan details.
  • DLP 14.0: Enterprise Enablement (30 of 31)
    This module covers Enterprise Enablement.
  • DLP 14.0: System Administration (31 of 31)
    This module covers System Administration.
Data Loss Prevention 14.0 Differences
  • DLP 14.0 Diffs: Endpoint features (1 of 3)
    This module covers Endpoint enhancements available in the new 14.0 release.
  • DLP 14.0 Diffs: Detection features (2 of 3)
    This module covers detection enhancements available in the new release.
  • DLP 14.0 Diffs: Storage features (3 of 3)
    This module covers storage enhancements available in the new release.
Data Loss Prevention 12.5
Data Loss Prevention 12.5 Administration
  • DLP 12.5: Admin: Introduction to Symantec Data Loss Prevention (1 of 32)
    This module introduces the Symantec Data Loss Prevention suite.
  • DLP 12.5: Admin: Navigation and Reporting (2 of 32)
    This module describes the navigation and reporting features common to the Symantec Data Loss Prevention products.
  • DLP 12.5: Admin: Dashboard creation and distribution - Demo (3 of 32)
    This demonstration steps through the creation of a dashboard report and how to send it using email and steps through configuring a user's reporting preferences.
  • DLP 12.5: Admin: Incident Remediation and Workflow (4 of 32)
    This module describes the incident remediation and workflow features common to the Symantec Data Loss Prevention products.
  • DLP 12.5: Admin: Incident Remediation - Demo (5 of 32)
    This demonstration steps through remediating incidents based on specific users and roles and steps through configuring new roles and users.
  • DLP 12.5: Admin: Policy Management (6 of 32)
    This module covers information related to Policy Management as it pertains to Symantec Data Loss Prevention.
  • DLP 12.5: Admin: Exporting and importing policy templates, and creating a policy - Demo (7 of 32)
    This demonstration steps through how to export and import policy templates and steps through the creation of a policy based on a template.
  • DLP 12.5: Admin: Response Rule Management (8 of 32)
    This module presents the details of Response Rule Management as it applies to Symantec Data Loss Prevention.
  • DLP 12.5: Admin: Creating Automated Response Rules - Demo (9 of 32)
    This demonstration steps through the creation of Automated Response rules and how to add automated response rules to a policy.
  • DLP 12.5: Admin: Described Content Matching (10 of 32)
    This module covers the DCM detection method, which you can use to define confidential data in your policies and then to detect that data in your enterprise.
  • DLP 12.5: Admin: Creating a DCM policy (Data identifiers) - Demo (11 of 32)
    This demonstration steps through the creation of a DCM policy using Data Identifiers.
  • DLP 12.5: Admin: Exact Data Matching and Directory Group Matching (12 of 32)
    This module covers the EDM and DGM detection methods, which you can use to define confidential data in your policies and then to detect that data in your enterprise.
  • DLP 12.5: Admin: Creating an EDM index for a Directory Group Match - Demo (13 of 32)
    This demonstration steps through creating an EDM index for a Directory Group Match.
  • DLP 12.5: Admin: Indexed Document Matching (14 of 32)
    This module covers the IDM detection method, which you can use to define confidential data in your policies and then to detect that data in your enterprise.
  • DLP 12.5: Admin: Creating an IDM index - Demo (15 of 32)
    This demonstration steps through creating an IDM index.
  • DLP 12.5: Admin: Vector Machine Learning (16 of 32)
    This module covers the VML detection method, its use cases, and how to use it in policies.
  • DLP 12.5: Admin: Creating a VML profile and policy - Demo (17 of 32)
    This demonstration steps through the creation of a VML profile and using it in a VML policy.
  • DLP 12.5: Admin: Network Monitor (18 of 32)
    This module reviews Symantec Data Loss Prevention Mobile Email Monitor features and Network Monitor features.
  • DLP 12.5: Admin: Creating and applying L7 filters - Demo (19 of 32)
    This demonstration steps through configuring L7 filters and applying them to a policy.
  • DLP 12.5: Admin: Network Prevent (20 of 32)
    This module introduces the Network Prevent products including Network Prevent (Email) and Network Prevent (Web).
  • DLP 12.5: Admin: Blocking a SMTP message - Demo (21 of 32)
    This demonstration steps through configuring Network Prevent for Email to block a SMTP message.
  • DLP 12.5: Admin: Mobile Email Monitor and Mobile Prevent (22 of 32)
    This module introduces Mobile Prevent and its features and capabilities.
  • DLP 12.5: Admin: Using Mobile Prevent - Demo (23 of 32)
    This demonstration steps through configuring a Mobile Prevent policy and response rule, and how it is used.
  • DLP 12.5: Admin: Network Discover and Network Protect (24 of 32)
    This module introduces the Network Discover and Network Protect products, including creating targets, scanning various repositories, managing the scans, and configuring Data Insight integration.
  • DLP 12.5: Admin: Scheduling incremental scans and viewing the resulting reports, and quarantining at-risk data - Demo (25 of 32)
    This demonstration steps through scheduling an incremental scan, viewing the reports that are generated and steps through configuring and using the Quarantine feature.
  • DLP 12.5: Admin: Endpoint Prevent (26 of 32)
    This module introduces the Endpoint Prevent product including event coverage, reporting, management options of the Symantec Data Loss Prevention Endpoint agent, and best practices.
  • DLP 12.5: Admin: Creating Endpoint Response Rules, and using Endpoint Prevent to block an attempt to copy data to a USB device - Demo (27 of 32)
    This demonstration steps through creating Endpoint specific response rules, and steps through configuring Endpoint Prevent to block an attempt to copy sensitive data to an undefined USB device.
  • DLP 12.5: Admin: Endpoint Discover (28 of 32)
    This module introduces the Endpoint Discover product including creating Endpoint Discover targets and reporting.
  • DLP 12.5: Admin: Adding and running an Endpoint target scan and viewing incidents and scan details - Demo (29 of 32)
    This demonstration steps through the configuration of adding an Endpoint target, running the scan, and viewing the incidents and scan details.
  • DLP 12.5: Admin: Enterprise Enablement (30 of 32)
    This module details the strategies and best practices for reducing risk and enabling Symantec Data Loss Prevention customers.
  • DLP 12.5: Admin: System Administration (31 of 32)
    This module details the server administration aspects of the Symantec Data Loss Prevention product suite.
  • DLP 12.5: Admin: Using the Log Collection and Configuration tool - Demo (32 of 32)
    This demonstration steps through how to use the Log Collection and Configuration tool.
Data Loss Prevention 12.5 Install and Deploy
  • DLP 12.5: Install and Deploy: Installing Symantec Data Loss Prevention (1 of 2)
    This lesson describes how to install Symantec Data Loss Prevention. There are three demos within the module which step through installing on Oracle 11g, Enforce server, and the installation of DLP agents on endpoint machines.
  • DLP 12.5: Install and Deploy: Upgrading to Symantec Data Loss Prevention 12.5 (2 of 2)
    This lesson details the upgrade process for the Symantec Data Loss Prevention system. There is a demo included which steps through using the Upgrade Wizard.
Data Loss Prevention 12.5 Differences
  • DLP 12.5: Diffs: Platform and reporting features (1 of 4)
    This module covers platform and reporting enhancements available in the new release.
  • DLP 12.5: Diffs: Detection features (2 of 4)
    This module covers detection enhancements available in the new release.
  • DLP 12.5: Diffs: Network and Mobile features (3 of 4)
    This module covers enhancements available on the Network Monitor and Email Mobile Monitor in the new release.
  • DLP 12.5: Diffs: Storage features (4 of 4)
    This module covers storage enhancements available in the new release. Specifically the Data Owner Portal feature.
  • Symantec Data Loss Prevention 12.5: Differences Update-Endpoint Features
    This module covers Endpoint enhancements available in the new 12.5 release. It is an adjunct to the four modules in the Data Loss Prevention 12.5: Differences course.
Data Loss Prevention 12.0
Data Loss Prevention 12.0 Administration
  • DLP 12: Admin: Introduction to Symantec Data Loss Prevention (1 of 32)
    This module introduces the Symantec Data Loss Prevention suite.
  • DLP 12: Admin: Navigation and Reporting (2 of 32)
    This module describes the navigation and reporting features common to the Symantec Data Loss Prevention products.
  • DLP 12: Admin: Dashboard creation and distribution - Demo (3 of 32)
    This demonstration steps through the creation of a dashboard report and how to send it using email and steps through configuring a user's reporting preferences.
  • DLP 12: Admin: Incident Remediation and Workflow (4 of 32)
    This module describes the incident remediation and workflow features common to the Symantec Data Loss Prevention products.
  • DLP 12: Admin: Incident Remediation - Demo (5 of 32)
    This demonstration steps through remediating incidents based on specific users and roles and steps through configuring new roles and users.
  • DLP 12: Admin: Policy Management (6 of 32)
    This module covers information related to Policy Management as it pertains to Symantec Data Loss Prevention.
  • DLP 12: Admin: Exporting and importing policy templates, and creating a policy - Demo (7 of 32)
    This demonstration steps through how to export and import policy templates and steps through the creation of a policy based on a template.
  • DLP 12: Admin: Response Rule Management (8 of 32)
    This module presents the details of Response Rule Management as it applies to Symantec Data Loss Prevention.
  • DLP 12: Admin: Creating Automated Response Rules - Demo (9 of 32)
    This demonstration steps through the creation of Automated Response rules and how to add automated response rules to a policy.
  • DLP 12: Admin: Described Content Matching (10 of 32)
    This module covers the DCM detection method, which you can use to define confidential data in your policies and then to detect that data in your enterprise.
  • DLP 12: Admin: Creating a DCM policy (Data identifiers) - Demo (11 of 32)
    This demonstration steps through the creation of a DCM policy using Data Identifiers.
  • DLP 12: Admin: Exact Data Matching and Directory Group Matching (12 of 32)
    This module covers the EDM and DGM detection methods, which you can use to define confidential data in your policies and then to detect that data in your enterprise.
  • DLP 12: Admin: Creating an EDM index for a Directory Group Match - Demo (13 of 32)
    This demonstration steps through creating an EDM index for a Directory Group Match.
  • DLP 12: Admin: Indexed Document Matching (14 of 32)
    This module covers the IDM detection method, which you can use to define confidential data in your policies and then to detect that data in your enterprise.
  • DLP 12: Admin: Creating an IDM index - Demo (15 of 32)
    This demonstration steps through creating an IDM index.
  • DLP 12: Admin: Vector Machine Learning (16 of 32)
    This module covers the VML detection method, its use cases, and how to use it in policies.
  • DLP 12: Admin: Creating a VML profile and policy - Demo (17 of 32)
    This demonstration steps through the creation of a VML profile and using it in a VML policy.
  • DLP 12: Admin: Mobile Email Monitor and Network Monitor (18 of 32)
    This module reviews Symantec Data Loss Prevention Mobile Email Monitor features and Network Monitor features.
  • DLP 12: Admin: Creating and applying L7 filters - Demo (19 of 32)
    This demonstration steps through configuring L7 filters and applying them to a policy.
  • DLP 12: Admin: Network Prevent (20 of 32)
    This module introduces the Network Prevent products including Network Prevent (Email) and Network Prevent (Web).
  • DLP 12: Admin: Blocking a SMTP message - Demo (21 of 32)
    This demonstration steps through configuring Network Prevent for Email to block a SMTP message.
  • DLP 12: Admin: Mobile Prevent (22 of 32)
    This module introduces Mobile Prevent and its features and capabilities.
  • DLP 12: Admin: Using Mobile Prevent - Demo (23 of 32)
    This demonstration steps through configuring a Mobile Prevent policy and response rule, and how it is used.
  • DLP 12: Admin: Network Discover and Network Protect (24 of 32)
    This module introduces the Network Discover and Network Protect products, including creating targets, scanning various repositories, managing the scans, and configuring Data Insight integration.
  • DLP 12: Admin: Scheduling incremental scans, viewing resulting reports, and quarantining at-risk data - Demo (25 of 32)
    This demonstration steps through scheduling an incremental scan, viewing the reports that are generated and steps through configuring and using the Quarantine feature.
  • DLP 12: Admin: Endpoint Prevent (26 of 32)
    This module introduces the Endpoint Prevent product including event coverage, reporting, management options of the Symantec Data Loss Prevention Endpoint agent, and best practices.
  • DLP 12: Admin: Creating Endpoint Response Rules, and using Endpoint Prevent to block an attempts to copy to USB devices - Demo (27 of 32)
    This demonstration steps through creating Endpoint specific response rules, and steps through configuring Endpoint Prevent to block an attempt to copy sensitive data to an undefined USB device.
  • DLP 12: Admin: Endpoint Discover (28 of 32)
    This module introduces the Endpoint Discover product including creating Endpoint Discover targets and reporting.
  • DLP 12: Admin: Adding and running an Endpoint target, and viewing incidents and scan details - Demo (29 of 32)
    This demonstration steps through the configuration of adding an Endpoint target, running the scan, and viewing the incidents and scan details.
  • DLP 12: Admin: Enterprise Enablement (30 of 32)
    This module details the strategies and best practices for reducing risk and enabling Symantec Data Loss Prevention customers.
  • DLP 12: Admin: System Administration (31 of 32)
    This module details the server administration aspects of the Symantec Data Loss Prevention product suite.
  • DLP 12: Admin: Using the Log Collection and Configuration tool - Demo (32 of 32)
    This demonstration steps through how to use the Log Collection and Configuration tool.
Data Loss Prevention 11.5
Data Loss Prevention 11.5 Administration
  • DLP 11.5: Admin: Introduction to Symantec Data Loss Prevention (1 of 47)
    This module introduces the Symantec Data Loss Prevention suite.
  • DLP 11.5: Admin: Navigation and Reporting (2 of 47)
    This module describes the navigation and reporting features common to the Symantec Data Loss Prevention products.
  • DLP 11.5: Admin: Dashboard creation and distribution - Demo (3 of 47)
    This demonstration steps through the creation of a dashboard report and how to send it using email.
  • DLP 11.5: Admin: Reporting preferences - Demo (4 of 47)
    This demonstration steps through configuring a user's reporting preferences.
  • DLP 11.5: Admin: Web Archive - Demo (5 of 47)
    This demonstration steps through configuring a user's reporting preferences.
  • DLP 11.5: Admin: Incident Remediation and Workflow (6 of 47)
    This module describes the incident remediation and workflow features common to the Symantec Data Loss Prevention products.
  • DLP 11.5: Admin: Incident Remediation - Demo (7 of 47)
    This demonstration steps through remediating incidents based on specific users and roles.
  • DLP 11.5: Admin: Creating roles and users - Demo (8 of 47)
    This demonstration steps through configuring new roles and users.
  • DLP 11.5: Admin: Policy Management (9 of 47)
    This module covers information related to Policy Management as it pertains to Symantec Data Loss Prevention.
  • DLP 11.5: Admin: Exporting and importing policy templates - Demo (10 of 47)
    This demonstration steps through how to export and import plicy templates.
  • DLP 11.5: Admin: Creating a policy based on a template - Demo (11 of 47)
    This demonstration steps through the creation of a policy based on a template.
  • DLP 11.5: Admin: Using Severity in a policy - Demo (12 of 47)
    This demonstration steps through how to use severity settings in a policy.
  • DLP 11.5: Admin: Response Rule Management (13 of 47)
    This module presents the details of Response Rule Management as it applies to Symantec Data Loss Prevention.
  • DLP 11.5: Admin: Creating Automated Response Rules - Demo (14 of 47)
    This demonstration steps through the creation of Automated Response rules.
  • DLP 11.5: Admin: Adding automated responses to a policy - Demo (15 of 47)
    This demonstration steps through how to add automated response rules to a policy.
  • DLP 11.5: Admin: Described Content Matching (16 of 47)
    This module covers the DCM detection method, which you can use to define confidential data in your policies and then to detect that data in your enterprise.
  • DLP 11.5: Admin: Creating a DCM policy (Data identifiers) - Demo (17 of 47)
    This demonstration steps through the creation of a DCM policy using Data Identifiers.
  • DLP 11.5: Admin: Creating a policy from the PCI template - Demo (18 of 47)
    This demonstration steps through creating a DCM policy using the PCI policy template.
  • DLP 11.5: Admin: Exact Data Matching and Directory Group Matching (19 of 47)
    This module covers the EDM and DGM detection methods, which you can use to define confidential data in your policies and then to detect that data in your enterprise.
  • DLP 11.5: Admin: Creating an EDM index for a Directory Group Match - Demo (20 of 47)
    This demonstration steps through creating an EDM index for a Directory Group Match.
  • DLP 11.5: Admin: Indexed Document Matching (21 of 47)
    This module covers the IDM detection method, which you can use to define confidential data in your policies and then to detect that data in your enterprise.
  • DLP 11.5: Admin: Creating an IDM index - Demo (22 of 47)
    This demonstration steps through creating an IDM index.
  • DLP 11.5: Admin: Vector Machine Learning (23 of 47)
    This module covers the VML detection method, its use cases, and how to use it in policies.
  • DLP 11.5: Admin: Creating a VML profile and policy - Demo (24 of 47)
    This demonstration steps through the creation of a VML profile and using it in a VML policy.
  • DLP 11.5: Admin: Network Monitor Review (25 of 47)
    This module reviews Symantec Data Loss Prevention Network Monitor features and includes filtering and best practices.
  • DLP 11.5: Admin: Introduction to Network Prevent (26 of 47)
    This module introduces the Network Prevent products including Network Prevent (Email) and Network Prevent (Web).
  • DLP 11.5: Admin: Blocking a SMTP message - Demo (27 of 47)
    This demonstration steps through configuring Network Prevent for Email to block a SMTP message.
  • DLP 11.5: Admin: Introduction to Symantec Data Loss Prevention for Tablets (28 of 47)
    This module introduces the Symantec Data Loss Prevention for Tablets, or Tablet Prevent product.
  • DLP 11.5: Admin: Using Tablet Prevent - Demo (29 of 47)
    This demonstration steps through configuring a Tablet Prevent policy and how it is used.
  • DLP 11.5: Admin: Introduction to Network Discover and Network Protect (30 of 47)
    This module introduces the Network Discover and Network Protect products, including creating targets, scanning various repositories, managing the scans, and configuring Data Insight integration.
  • DLP 11.5: Admin: Performing an Exchange scan - Demo (31 of 47)
    This demonstration steps through configuring and performing an Exchange scan.
  • DLP 11.5: Admin: Scheduling incremental scans and viewing the resulting reports - Demo (32 of 47)
    This demonstration steps through scheduling an incremental scan and viewing the reports that are generated.
  • DLP 11.5: Admin: Quarantining at risk data - Demo (33 of 47)
    This demonstration steps through configuring and using the Quarantine feature.
  • DLP 11.5: Admin: Scanning a file-system target - Demo (34 of 47)
    This demonstration steps through configuring and performing a file-system scan.
  • DLP 11.5: Admin: Introduction to Endpoint Prevent (35 of 47)
    This module introduces the Endpoint Prevent product including event coverage, reporting, and best practices.
  • DLP 11.5: Admin: Agent configuration management - Demo (36 of 47)
    This demonstration steps through how to manage and apply agent configurations.
  • DLP 11.5: Admin: Defining Endpoint Devices - Demo (37 of 47)
    This demonstration steps through how to define authorized Endpoint devices.
  • DLP 11.5: Admin: Using Endpoint Prevent to block an attempt to copy data to a USB device - Demo (38 of 47)
    This demonstration steps through configuring Endpoint Prevent to block an attempt to copy sensitive data to an undefined USB device.
  • DLP 11.5: Admin: Creating Endpoint Response Rules - Demo (39 of 47)
    This demonstration steps through creating Endpoint specific response rules.
  • DLP 11.5: Admin: Managing Endpoint DLP Agents (40 of 47)
    This module covers the management options of the Symantec Data Loss Prevention Endpoint agent.
  • DLP 11.5: Admin: Using SMP to manage the DLP Agent - Demo (41 of 47)
    This demonstration steps through how to use Symantec Management Platform to manage the DLP Agent.
  • DLP 11.5: Admin: Introduction to Endpoint Discover (42 of 47)
    This module introduces the Endpoint Discover product including creating Endpoint Discover targets and reporting.
  • DLP 11.5: Admin: Adding and running an Endpoint target and viewing incidents and scan details - Demo (43 of 47)
    This demonstration steps through the configuration of adding an Endpoint target, running the scan, and viewing the incidents and scan details.
  • DLP 11.5: Admin: Enterprise Enablement (44 of 47)
    This module details the strategies and best practices for reducing risk and enabling Symantec Data Loss Prevention customers.
  • DLP 11.5: Admin: System Administration (45 of 47)
    This module details the server administration aspects of the Symantec Data Loss Prevention product suite.
  • DLP 11.5: Admin: Credential Management - Demo (46 of 47)
    This demonstration steps through how to configure and use the Credential Management feature.
  • DLP 11.5: Admin: Using the Log Collection and Configuration tool - Demo (47 of 47)
    This demonstration steps through how to use the Log Collection and Configuration tool.
Data Loss Prevention 11.0
Data Loss Prevention 11.0 Administration
  • DLP 11: Administration— Complementary Symantec Products
    This appendix lesson describes the complementary Symantec products that can integrate with Symantec Data Loss Prevention 11.
  • DLP 11: Administration— Introduction to DLP (1 of 15)
    This module introduces the Symantec Data Loss Prevention suite.
  • DLP 11: Administration— Navigation and Reporting (2 of 15)
    This module describes the navigation and reporting features common to the Symantec Data Loss Prevention products.
  • DLP 11: Administration— Incident Remediation and Workflow (3 of 15)
    This module describes the incident remediation and workflow features common to the Symantec Data Loss Prevention products.
  • DLP 11: Administration— Policy Management (4 of 15)
    This module covers information related to Policy Management as it pertains to Symantec Data Loss Prevention.
  • DLP 11: Administration— Response Rule Management (5 of 15)
    This module presents the details of Response Rule Management as it applies to Symantec Data Loss Prevention.
  • DLP 11: Administration— Described Content Matching (6 of 15)
    This module covers the DCM detection method, which you can use to define confidential data in your policies and then to detect that data in your enterprise.
  • DLP 11: Administration— Exact Data Matching and Directory Group Matching (7 of 15)
    This module covers the EDM and DGM detection methods, which you can use to define confidential data in your policies and then to detect that data in your enterprise.
  • DLP 11: Administration— Indexed Document Matching (8 of 15)
    This module covers the IDM detection method, which you can use to define confidential data in your policies and then to detect that data in your enterprise.
  • DLP 11: Administration— Network Monitor Review (9 of 15)
    This module reviews Symantec Data Loss Prevention Network Monitor features and includes filtering and best practices.
  • DLP 11: Administration— Introduction to Network Prevent (10 of 15)
    This module introduces the Network Prevent products including Network Prevent (Email) and Network Prevent (Web).
  • DLP 11: Administration— Introduction to Network Discover and Network Protect (11 of 15)
    This module introduces the Network Discover and Network Protect products, including creating targets, scanning various repositories, managing the scans, and configuring Data Insight integration.
  • DLP 11: Administration— Introduction to Endpoint Prevent (12 of 15)
    This module introduces the Endpoint Prevent product including event coverage, agent management, reporting, and best practices.
  • DLP 11: Administration— Introduction to Endpoint Discover (13 of 15)
    This module introduces the Endpoint Discover product including creating Endpoint Discover targets and reporting.
  • DLP 11: Administration— Enterprise Enablement (14 of 15)
    This module details the strategies and best practices for reducing risk and enabling Symantec Data Loss Prevention customers.
  • DLP 11: Administration— System Administration (15 of 15)
    This module details the server administration aspects of the Symantec Data Loss Prevention product suite.
Data Loss Prevention 10.5
Data Loss Prevention 10.5 Administration
  • DLP 10.5 Standard Ed. Admin - Intro to DLP
    This module introduces the Symantec Data Loss Prevention Standard.
  • DLP 10.5 Standard Ed. Admin - Navigation and Reporting
    This module describes the navigation and reporting features common to the Symantec Data Loss Prevention Standard.
  • DLP 10.5 Standard Ed. Admin - Incident Response and Workflow
    This module describes the incident response methodology and workflow features common to the Symantec Data Loss Prevention Standard.
  • DLP 10.5 Standard Ed. Admin - TrueMatch Detection Method
    This module covers the TrueMatch detection method, which you can use to define confidential data in your policies and then to detect that data in your enterprise.
  • DLP 10.5 Standard Ed. Admin - Policy Management
    This module covers information related to Policy Management as it pertains to Symantec Data Loss Prevention Standard.
  • DLP 10.5 Standard Ed. Admin - Response Rule Management
    This module presents the details of Response Rule Management as it applies to Symantec Data Loss Prevention Standard.
  • DLP 10.5 Standard Ed. Admin - Deployment Best Practices
    This module details the strategies and best practices for reducing risk and enabling Symantec Data Loss Prevention Standard customers.
  • DLP 10.5 Standard Ed. Admin - System Administration
    This module details the server administration aspects of the Symantec Data Loss Prevention Standard product.
  • DLP 10.5 Admin - Intro to DLP
    This module introduces the Symantec Data Loss Prevention suite.
  • DLP 10.5 Admin - Navigation and Reporting
    This module describes the navigation and reporting features common to the Symantec Data Loss Prevention products.
  • DLP 10.5 Admin - Incident Remediation and Workflow
    This module describes the incident remediation and workflow features common to the Symantec Data Loss Prevention products.
  • DLP 10.5 Admin - Policy Management
    This module covers information related to Policy Management as it pertains to Symantec Data Loss Prevention.
  • DLP 10.5 Admin - Response Rule Management
    This module presents the details of Response Rule Management as it applies to Symantec Data Loss Prevention.
  • DLP 10.5 Admin - TrueMatch Detection Methods
    This module covers the TrueMatch detection methods, which you can use to define confidential data in your policies and then to detect that data in your enterprise.
  • DLP 10.5 Admin - Advanced EDM
    This module provides a deeper explanation of EDM, covering data source preparation, secure transport of data sources, strategies for refreshing data sources and indexes, and advanced use of EDM.
  • DLP 10.5 Admin - Network Monitor Review
    This module reviews Symantec Data Loss Prevention Network Monitor features and includes filtering and best practices.
  • DLP 10.5 Admin - Intro to Network Prevent
    This module introduces the Network Prevent products including Network Prevent (Email) and Network Prevent (Web).
  • DLP 10.5 Admin - Intro to Network Discover and Network Protect
    This module introduces the Network Discover and Network Protect products, including creating targets, scanning various repositories, and managing the scans.
  • DLP 10.5 Admin - Intro to Endpoint Prevent
    This module introduces the Endpoint Prevent product including event coverage, agent management, reporting, and best practices.
  • DLP 10.5 Admin - Intro to Endpoint Discover
    This module introduces the Endpoint Discover product including creating Endpoint Discover targets and reporting.
  • DLP 10.5 Admin - Enterprise Enablement
    This module details the strategies and best practices for reducing risk and enabling Symantec Data Loss Prevention customers.
  • DLP 10.5 Admin - System Administration
    This module details the server administration aspects of the Symantec Data Loss Prevention product suite.
Data Loss Prevention 9.0
Data Loss Prevention 9.0 Administration
  • DLP 9.0 - Administration Overview
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
  • DLP 9.0 - Introduction to Data Loss Prevention
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
  • DLP 9.0 - Introduction to Endpoint Prevent
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices. Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
  • DLP 9.0 - Introduction to Symantec Data Loss Prevention
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
  • DLP 9.0 - Reporting, Incident Remediation and Workflow
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
  • DLP 9.0 - Policy Management
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
  • DLP 9.0 - Response Rule Management
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
  • DLP 9.0 - TrueMatch Detection Methods
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
  • DLP 9.0 - Advanced EDM
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
  • DLP 9.0 - Policy Best Practices
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
  • DLP 9.0 - Network Monitor Review
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
  • DLP 9.0 - Introduction to Network Prevent
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
  • DLP 9.0 - Introduction to Network Discover and Protect
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
  • DLP 9.0 - Introduction to Endpoint Prevent
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
  • DLP 9.0 - Introduction to Endpoint Discover
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
  • DLP 9.0 - Enterprise Enablement
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
  • DLP 9.0 - System Administration
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
Encryption
Endpoint Encryption 11
Endpoint Encryption 11.0.1 Install, Configure and Deploy
  • Symantec Endpoint Encryption 11.0.1: Install, Configure, and Deploy: Introduction (1 of 26)
    In this module, you learn about the core benefits to SEE 11. There is a review of the software and environment architecture. Learners are introduced to a scenario describing why encryption is needed. You also have an introduction to the installation process and sequence including scalability option
  • Management Server (2 of 26)
    In this module, you learn about the system requirements, and overview of the required account types and roles used in the environment, a look at the needed protocols and ports and finally a look at connecting to the SQL database for user and policy record storage.
  • Prerequisite Software (3 of 26)
    In this module, you learn the step-by-step instructions for installing and configuring the prerequisite software including IIS and .NET. You have a detailed look at installing the SQL server installation and initial configuration. Followed by verifying the installation and settings.
  • Server Installation (4 of 26)
    In this module, you are introduced to an overview of the Symantec Endpoint Encryption Management Server installation. There are additional details about configuring the SQL account required to interface with SEE 11. Lastly you are introduced to the Management Password.
  • Server Installation (5 of 26)
    In this module, you will have a step-by-step installation process for the Symantec Endpoint Encryption Management Server. You will learn how to connect to the database and the various authentication methods available. More information is provided about the database configuration. You will also have an introduction to installing the software using command line.
  • Post Installation (6 of 26)
    In this module, you will learn about the initial configuration of SEE 11 after installation has completed. You will have an overview of different processes, directory synchronization, Web service configuration, and verifying the installations.
  • Backup and Recover (7 of 26)
    In this module, you will learn about the importance of backups, which data needs to be backed up, and the recovery process of restoring your SEE 11 installation
  • Management Console (8 of 26)
    In this module, you will learn how to use the Management Console for administration. There is a comparison of the Configuration Manager vs. the Management Console. There is an introduction to using the Configuration Manager. The module ends with an overview of the roles and installation.
  • Management Console - Details (9 of 26)
    In this module, you will have a step-by-step installation process of the Management Console. The administrative roles are discussed in detail. There is a look at the back-end configuration, system requirements, protocols and ports, and overview of the various accounts available on the Management Console and finally a look at connecting to the database.
  • Server Roles (10 of 26)
    In this module, you will have an overview of the roles used in SEE 11. There are details about assigning and editing the administrative roles.
  • Configuring Policy (11 of 26)
    In this module, you learn about the types of administrative policies available, the types of policies, policy options, and Group Policy Management. There are also details about policy precedence order and a comparison of the different policies available
  • Configuring Policy - Details (12 of 26)
    In this module, you will have step-by-step instructions for policy creation. There are details about linking Group Policy Objects. Followed by creating Managed Computers groups.
  • Drive Encryption (13 of 26)
    In this module, you are introduced to an overview of Drive Encryption. You will have an introduction to the Autologon feature. You will learn about supported smart cards and tokens and supported disk types. You will learn various details about encryption. The final topics include end user registration from the client computers.
  • Drive Encryption - Details (14 of 26)
    In this module, you will learn details about setting up Autologon features. There is a step-by-step installation process of the Drive Encryption client. You will also receive details about generating Help Desk recovery keys. There is a detailed look at configuring client administrators. You learn about configuring pre-boot options. Mac FileVault client creation is covered in detail. Followed by enabling encryption on the client computers.
  • Drive Encryption Recovery (15 of 26)
    In this module, you learn about the various Drive Encryption recovery methods available. Including Self Recovery, Help Desk Recovery, and the WinPE Recovery utility.
  • Removable Media Encryption (16 of 26)
    In this module, you are introduced to the purpose and features of Removable Media Encryption. There is a look at the encryption policy settings and recovery certificates. You will also learn about the RME portability options.
  • Removable Media Encryption - Details (17 of 26)
    In this module, you will learn the step-by-step instructions for creating a Removable Media Encryption installation package and installing the client software.
  • Reporting (18 of 26)
    In this module, you will learn about the reporting options in SEE 11 along with customizing report appearance, viewing and generating reports, and creating and editing custom reports.
  • DLP Integration (19 of 26)
    In this module, you will learn about Data Loss Prevention and how it can be integrated with Symantec Endpoint Encryption.
  • Management Agent (20 of 26)
    In this module, you will have an overview of the Management Agent communication and settings options. You will learn about Client Administrator accounts. There are details about configuring Self Recovery options, building on information from the Drive Encryption Recovery module. Finally there is a look at Logon history settings.
  • Client Management (21 of 26)
    In this module, you will learn how an administrator can access Client Management settings. You will learn about client administrators and checking the drive encryption status from the client computer.
  • Server Based Command (22 of 26)
    In this module, you will learn about a few Server based commands which can be issued to client computers and the available actions to administrators.
  • Virtual Desktops (23 of 26)
    In this module, you will have an overview of managing Symantec Endpoint Encryption policies on virtual desktops such as Citrix XenDesktop.
  • Removable Media Encryption Burner Application (24 of 26)
    In this module, you will learn how users of the RME client software can encrypt and burn files and folders on to CD/DVD/Blu-Ray media.
  • Symantec Endpoint Encryption and Symantec Encryption Management Server (25 of 26)
    In this module, you will learn how to interface with a Symantec Encryption Management Server in order to obtain Whole Disk Recovery Tokens from the Help Desk console.
  • Symantec Endpoint Encryption Serverless Mode (26 of 26)
    In this module, you will learn about a special use case scenario where Symantec Endpoint Encryption can be installed in Serverless Mode.
Endpoint Encryption 11 Special Topics
This video lesson is intended for those who are already familiar with the features of the 11.0 release of Symantec Endpoint Encryption and who want to learn about the 11.0.1 release features.
  • Symantec Endpoint Encryption 11.0.1 Differences Module
  • Symantec Endpoint Encryption (SEE) 11 Course Introduction (1 of 20)
    In this module, you learn how Symantec Endpoint Encryption can protect laptop and desktop systems, and about the content of these course videos.
  • SEE 11 Opening Quiz (2 of 20)
    In this quiz you will test your knowledge of Symantec Endpoint Encryption and be tested on various aspects of the product that you will learn about during this course.
  • SEE 11 Technical Introduction (3 of 20)
    This course video offers a brief overview of Symantec Endpoint Encryption, along with features, benefits and architecture.
  • SEE 11 Management Server Installation (4 of 20)
    In this module, you review the purpose of the management server, look at system requirements, see an overview of the account types and roles needed, protocols and ports used, and learn about connecting to the SQL database.
  • SEE 11 Installation Quiz (5 of 20)
    In this quiz you will test your knowledge of the previous courseware. The quiz also reinforces and allows review of topics covered.
  • SEE 11 Management Server Post Installation Steps (6 of 20)
    In this module, you will look at the initial configuration of the management server after installation. Includes a process overview, directory synchronization, web service configuration, and verification of the installation.
  • SEE 11 Management Server Quiz (7 of 20)
    In this module, you learn about setting up security in Process Manager. You also learn how to set up reporting in Workflow Designer, how to add reporting components to the Vacation Request project, and how to process a task in Process Manager.
  • SEE 11 SEEMS Management Console (8 of 20)
    In this module, you will look at using the Management Console for administration, and the Configuration Manager vs. the Management Console. You will also explore using the Configuration Manager, roles overview and installation overview.
  • SEE 11 SEEMS Installation Lab (9 of 20)
    In this lab you will have an opportunity to install the management server and various client agents.
  • SEE 11 Policy Options (10 of 20)
    In this module you will configure Symantec Endpoint Encryption policy options, enabling and accessing policy options for the Management Agent, Drive Encryption, and Removable Media Encryption. The module also includes best practices for using recovery certificates and the background images for the drive encryption login screen.
  • SEE 11 SEEMS Policy Lab (11 of 20)
    In this lab you will configure Active Directory Group Policy and Native Policy in preparation for the client rollout. You will configure MMC snap-in restrictions so users will only have access to the necessary snap-ins.
  • SEE 11 Reporting (12 of 20)
    This module introduces you to Symantec Endpoint Encryption reports. You will learn how to customize report appearance, view reports on the console, and create and edit custom reports.
  • SEE 11 Administration Quiz (13 of 20)
    In this quiz you will test your knowledge of the previous courseware. The quiz also reinforces and allows review of topics covered.
  • SEE 11 Drive Encryption (14 of 20)
    This module will give you an overview of drive encryption. You will get an introduction to the auto-logon feature, smart cards and tokens, supported disk types, encryption details, and user registration.
  • SEE 11 Drive Encryption Lab (15 of 20)
    In this lab you will create and install the endpoint Management Agent and Drive Encryption clients. You will also experience the pre-boot authentication and user experience as well as the help desk experience.
  • SEE 11 SEE Removable Media Encryption (16 of 20)
    This training module introduces you to the purpose and features of Symantec Endpoint Encryption’s Removable Media Encryption. It also discusses recovery certificates and portability options.
  • SEE 11 Removable Media Encryption Lab (17 of 20)
    In this lab you will create and install the Removable Media Encryption (RME) client. You will also copy files to and from a USB drive, as well as manually encrypt and decrypt files.
  • SEE 11 Data Loss Prevention Integration with Symantec Endpoint Encryption (18 of 20)
    In this module you will use Symantec Endpoint Encryption Removable Media Encryption with Data Loss Prevention to evaluate files that users attempt to copy over to removable drives and determine whether the user is permitted to actually copy this material or if the data should be encrypted when moved to removable media.
  • SEE 11 Client Management Lab (19 of 20)
    In this lab you will administer the endpoint. You will install\enable auto logon and simulate the user experience. You will also experience different aspects of the drive encryption administrator tasks, including Remote Decryption, Admin User authentication. Finally, you will view a variety of reports available in Symantec Endpoint Encryption.
  • SEE 11 Reporting and Recovery Quiz (20 of 20)
    In this final activity for this courseware you will test your knowledge of recovery and reporting for Symantec Endpoint Encryption.
Encryption Basics
  • Encryption Basics-1 of 3: Definitions and Caesar's Cipher
    This core module introduces encryption basics, discussing Caesar's Cypher, and defining cryptography terms.
  • Encryption Basics-2 of 3: Keys, Encryption Types, and Digital Signatures
    In this module you will learn about the different types of encryption, such as: symmetric-key, public-key, private key, and PGP public key. Digital signatures are examined.
  • Encryption Basics-3 of 3: Cyphers, Keys, Encryption Types, and Certificates
    This module describes trust models, such as direct trust, hierarchical trust and web of trust. Keys and their algorithms are explained, as well as signing and trusting keys. Certificates are compared to keys.
PGP Universal Server 3.2 & Desktop 10.2
PGP Universal Server 3.2 & Desktop 10.2 Special Topics
  • PGP US 3.2 & Desktop 10.2: Name Changes (1 of 4)
    This module offers an introduction to name changes introduced with the 10.3 and 3.3 releases of the encryption products.
  • PGP US 3.2 & Desktop 10.2: SEMS DLP Integration (2 of 4)
    In this module you learn about integration of PGP Universal Server with Data Loss Prevention and Symantec Messaging Gateway.
  • PGP US 3.2 & Desktop 10.2: Mobile Encryption (3 of 4)
    This lesson looks at the mobile encryption offering for iOS devices.
  • PGP US 3.2 & Desktop 10.2: File Share Dropbox (4 of 4)
    In this module, you learn how to configure Universal Server and PGP Desktop to integrate with Dropbox. Also a look at using File Share Encryption for iOS with Dropbox.
PGP Universal Server 3.2 & Desktop 10.2 Install and Configure
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Course Introduction (1 of 38)
    This module offers an introduction to the lesson which will be covered in the Install, Configure, and Deploy section of this training.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Cryptography Essentials (2 of 38)
    In this module you learn about early cryptography along with many terms and definitions required to understand modern cryptography. We also look at different encryption methods and standards.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: PGP Product Introduction (3 of 38)
    This lesson looks at the various PGP Encryption products available. Including PGP Universal Server, PGP Desktop, PGP Command line, and the PGP Mobile products.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Installing PGP Universal Server (4 of 38)
    In this module, you learn how to prepare for and install PGP Universal Server. This module also introduces PGP Universal Server administrative user interfaces.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Installing Universal Server – Demo A (5 of 38)
    This demonstration steps through the installation tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Installing Universal Server – Demo B (6 of 38)
    This demonstration steps through some of the key configuration tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Consumers and Groups (7 of 38)
    This module provides an overview of how the Universal Server separates users and devices into consumer groups for policy enforcement. Also a look at creating Internal User accounts on the Universal Server and generating keypairs for these users.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Consumers and Groups - Demo A (8 of 38)
    This demonstration steps through some of the key configuration tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Administrative Keys (9 of 38)
    In this module you learn about the various high-level administrative keys on the Universal Server for enabling services or securing data.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Administrative Keys - Demo A (10 of 38)
    This demonstration steps through creating an Additional Encryption Key (ADK) in PGP Desktop to add to a Universal Server.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Administrative Keys - Demo B (11 of 38)
    This demonstration steps through some of the configuration tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Server Messaging (12 of 38)
    In this lesson, you learn how to recognize the use and purpose of Learn mode and cover the configuration of the lower level mail flow on the Universal Server. Also, we will be discussing Mail Proxies and learn how the proxies change based on the placement of the Universal Server.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Monitoring and Reporting (13 of 38)
    In this lesson, you learn how to maintain and backup the PGP Universal Server. The focus of this lesson is administrative tasks and how to monitor and maintain the Universal Server. Explaining how to locate the various logs available and filter them for information. Configuring remote backups.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Monitoring and Reporting - Demo A (14 of 38)
    This demonstration steps through some of the configuration tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Mail Policy (15 of 38)
    In this lesson, you learn how to explain default mail processing, define conditions, actions and key searches, describe the key lookup process and how to create custom chains and rules.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Mail Policy - Demo A (16 of 38)
    This demonstration steps through some of the configuration tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Key Not Found (17 of 38)
    In this lesson, you learn how to understand differences between internal and external users and manage the options available when you do not find a key for recipients.
  • PGP US 3.2 & Desktop 10.2: Install & Config: Web Messenger (18 of 38)
    In this lesson, you learn how to use and configure Web Messenger and other external delivery options.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Web Messenger - Demo A (19 of 38)
    This demonstration steps through some of the configuration tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Preparing Universal Server for PGP Desktop Clients (20 of 38)
    This lesson defines and discusses the importance of directory synchronization, which is the method by which a PGP Universal Server can take advantage of your existing LDAP infrastructure to create users and groups.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Preparing Universal Server for PGP Desktop Clients - Demo A (21 of 38)
    This demonstration steps through some of the configuration tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Keys (22 of 38)
    In this lesson, you learn about key settings, key modes, and properties for the users. We will look at the different modes available, subkeys, key usage flags, and smart cards. These are all very important settings as they determine what the users are allowed to do, how secure the data is, and how accessible it is by the organization.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Configuring Client Enrollment (23 of 38)
    In this lesson, you learn how to use the three different types of enrollment available for users. Enrollment is designed to allow the administrator to choose a method which best fits within the organization.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Configuring Client Enrollment - Demo A (24 of 38)
    This demonstration steps through some of the configuration tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Installing PGP Desktop (25 of 38)
    In this lesson, we introduce the PGP Desktop features and discuss the requirements for installing and licensing PGP Desktop.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Create General Policy Settings (26 of 38)
    In this lesson, we talk about the settings on the General tab of a Consumer Policy.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: PGP Desktop Messaging (27 of 38)
    In this lesson, you discuss how PGP Desktop interacts with PGP Universal Server and then the desktop settings stored in the Messaging tab of a consumer policy and other messaging features for PGP Desktop.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: PGP Desktop Messaging - Demo A (28 of 38)
    This demonstration steps through some of the configuration tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Configuring PGP Whole Disk Encryption (29 of 38)
    In this module we will start to look at Whole Disk Encryption. It is very important that administrators know which options are available to limit or empower the users.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Configuring PGP Whole Disk Encryption - Demo A (30 of 38)
    This demonstration steps through some of the configuration tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: PGP Whole Disk Encryption Management and Recovery (31 of 38)
    There are many options available for Whole Disk Encryption. This module covers the settings and how they allow you to administer WDE.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: PGP Whole Disk Encryption Management and Recovery - Demo A (32 of 38)
    This demonstration steps through some of the configuration tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Configuring PGP Netshare (33 of 38)
    In this lesson you will see how to create Netshare encrypted directories. Configuration of policy and a PGP Netshare Group Key are also covered.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Configuring PGP Netshare - Demo A (34 of 38)
    This demonstration steps through some of the configuration tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Other PGP Desktop Features (35 of 38)
    This lesson looks at the other PGP Desktop features available such as Virtual Disk, PGP Zip, and the PGP Shredder.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Other PGP Desktop Features - Demo A (36 of 38)
    This demonstration steps through some of the configuration tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Clustering (37 of 38)
    This lesson covers Universal Server Clustering which is mentioned in a few of the previous modules. Clustering is used for redundancy and load balancing. A basic understanding of the functionality is necessary for administrators who will need to do deployments of the encryption products which will require multiple Universal Servers.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Clustering - Demo A (38 of 38)
    This demonstration steps through some of the configuration tasks learned in the corresponding lesson.
PGP Universal Server 3.2 & Desktop 10.2 Maintain and Troubleshoot
  • PGP Universal Server 3.2 & Desktop 10.2: Maintain & Troubleshoot: Course Introduction (1 of 15)
    This module offers an introduction to the lesson which will be covered in the Maintain and Troubleshoot section of this training.
  • PGP Universal Server 3.2 & Desktop 10.2: Maintain & Troubleshoot: PGP Support Tools (2 of 15)
    In this lesson, you learn how to use the Support Knowledge Base and documentation library and are introduced to the Universal Server services.
  • PGP Universal Server 3.2 & Desktop 10.2: Maintain & Troubleshoot: PGP Universal Server Command Line Administration (3 of 15)
    In this lesson, you learn how to access the command line to view settings, services, logs and processes. Also enable debug logging and install VMware Tools.
  • PGP Universal Server 3.2 & Desktop 10.2: Maintain & Troubleshoot: PGP Universal Server Command Line Administration - Demo A (4 of 15)
    This demonstration steps through some of the configuration tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Maintain & Troubleshoot: PGP Universal Server Troubleshooting (5 of 15)
    In this lesson, you learn about the common troubleshooting commands and services.
  • PGP Universal Server 3.2 & Desktop 10.2: Maintain & Troubleshoot: PGP Universal Server Database Access and Reporting (6 of 15)
    In this lesson, you learn how to access the database the database and run reports using SQL queries.
  • PGP Universal Server 3.2 & Desktop 10.2: Maintain & Troubleshoot: PGP Universal Server Common Problems (7 of 15)
    In this lesson, you learn how to recognize and manage common PGP Universal Server problems.
  • PGP Universal Server 3.2 & Desktop 10.2: Maintain & Troubleshoot: PGP Universal Server Common Problems - Demo A (8 of 15)
    This demonstration steps through some of the configuration tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Maintain & Troubleshoot: PGP Universal Server Common Clustering Issues (9 of 15)
    In this lesson, you learn how to recognize some common cluster problems and troubleshoot them.
  • PGP Universal Server 3.2 & Desktop 10.2: Maintain & Troubleshoot: PGP Universal Server Common Messaging Issues (10 of 15)
    In this lesson, you learn how to recognize common messaging issues such as mail queuing, open relay, and mail routing issues.
  • PGP Universal Server 3.2 & Desktop 10.2: Maintain & Troubleshoot: PGP Universal Web Messenger Issues (11 of 15)
    In this lesson, you learn how to recognize and manage user login problems and other common Web Messenger errors.
  • PGP Universal Server 3.2 & Desktop 10.2: Maintain & Troubleshoot: PGP Desktop Services, Files and Folders (12 of 15)
    In this lesson, you learn how to understand the function of the managing services and to recognize and manage common PGP Desktop problems
  • PGP Universal Server 3.2 & Desktop 10.2: Maintain & Troubleshoot: PGP Desktop Installation and Enrollment Issues (13 of 15)
    In this lesson, you learn how to understand the enrollment process, to recognize and manage common Desktop installation, credentials and missing keyring problems.
  • PGP Universal Server 3.2 & Desktop 10.2: Maintain & Troubleshoot: PGP Desktop Installation and Enrollment Issues - Demo A (14 of 15)
    This demonstration steps through some of the configuration tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Maintain & Troubleshoot: PGP Whole Disk Encryption Troubleshooting (15 of 15)
    In this lesson, you learn how to recognize and manage PGP Desktop WDE issues with recovery options and the boot drive encryption process.
Email Security.cloud
Email Security Service Encryption
  • Configuring Customer Domain Enforcements and Testing Inbound TLS: Video (1 of 5)
    This short training module will walk you through how to setup your domains in order to follow compliance or company mandated encryption within the Encryption module of the Management Portal
  • Enforcing TLS Encryption Between You and the Email Security Service: Video (2 of 5)
    This short training module will walk you through how to configure your services to ensure that all emails sent between you and the Email Security Service will pass through an encrypted TLS channel.
  • Moving Domains from one Business Partner to Another: Video (3 of 5)
    This short module will walk you through how to move a domain from under the remit of one Business Partner to the remit of another.
  • Setting Up a New Business Partner, Adding Domains and Testing Them: Video (4 of 5)
    This short module will walk you through how to setup a new Business Partner in the Encryption module of the Management Portal
  • Getting Visibility into your Enhancements: Video (5 of 5)
    This short module will demonstrate how you can review your Encryption settings and will highlight some key information points.
Email Security Service & Web Security Service: Administration
  • ESS WSS Admin: Introduction (1 of 30)
    This module provides background information regarding the training course.
  • ESS WSS Admin: Symantec.cloud management portal (2 of 30)
    This module introduces the Symantec.cloud management portal.
  • ESS WSS Admin: Navigating Symantec.cloud management portal – Demo (3 of 30)
    This demonstration steps through Navigating Symantec.cloud management portal.
  • ESS WSS Admin: Introduction to Email Security Service (4 of 30)
    This module covers an overview of the Email Security Service and infrastructure.
  • ESS WSS Admin: Setting up the Email Security Service – Demo (5 of 30)
    This demonstration examines Email service settings, verifies the DNS records for a customer domain, and runs through a simulation of outbound settings in office365.
  • ESS WSS Admin: Email Protect Service (6 of 30)
    This module covers a detailed view of the multi-layered protection.
  • ESS WSS Admin: Configuring and testing the Email Protect Service – Demo (7 of 30)
    This demonstration steps through configuring Anti-spam and Anti-virus settings using the management portal.
  • ESS WSS Admin: Image Control Service Overview (8 of 30)
    This module covers the overview of the Email Image Control service.
  • Data Protection Services (9 of 30)
    This module presents an overview of Data Protection Services.
  • ESS WSS Admin: Data Protection Services - Demo (10 of 30)
    This demonstration steps through the configuration for Data Protection.
  • ESS WSS Admin: Email Data Protection (11 of 30)
    This module presents an introduction to Email Data Protection.
  • ESS WSS Admin: Administering Email Data Protection - Demo (12 of 30)
    This demonstration steps through configuring Email Data Protection default settings.
  • ESS WSS Admin: Email Encryption Service (13 of 30)
    This module covers an overview of email encryption.
  • ESS WSS Admin: Email troubleshooting (14 of 30)
    This module covers delivery Issues and connectivity issues.
  • ESS WSS Admin: Email troubleshooting – Creating and Running Reports – Demo (15 of 30)
    This demonstration reviews the steps that need to be taken to generate reports for troubleshooting purposes.
  • ESS WSS Admin: Synchronization Tool (16 of 30)
    This module is an introduction to the Synchronization Tool.
  • ESS WSS Admin: Configuring the Synchronization Tool - Demo (17 of 30)
    This demonstration steps through importing users from Microsoft Office 365 and configuring the Synchronization of users and Groups from Active Directory.
  • ESS WSS Admin: Introduction to the Web Security Service (18 of 30)
    This module covers the IDM detection method, which you can use to define confidential data in your policies and then to detect that data in your enterprise.
  • ESS WSS Admin: Setting up the Web Security Service using Manual Browser Configuration - Demo (19 of 30)
    This demonstration steps through using a manual browser configuration to set up the Web Security Service.
  • ESS WSS Admin: Implementing HTTPS inspection (20 of 30)
    This module covers the implementation of HTTPS inspection.
  • ESS WSS Admin: Enabling HTTPS Inspection - Demo (21 of 30)
    This demonstration steps through how to enable HTTPS inspection.
  • ESS WSS Admin: User-level granularity control and reporting (22 of 30)
    This module reviews user-level granularity control and reporting.
  • ESS WSS Admin: Manual routing through the standalone Client Site Proxy - Demo (23 of 30)
    This demonstration steps through configuring manual routing using the Client Site Proxy.
  • ESS WSS Admin: Roaming User support (24 of 30)
    This module reviews the support for roaming users.
  • ESS WSS Admin: Remote Connect Option and the Smart Connect Agent - Demo (25 of 30)
    This demonstration steps through configuring the Remote Connect option and the Smart Connect Agent.
  • ESS WSS Admin: URL Filtering service (26 of 30)
    This module covers the URL Filtering service.
  • ESS WSS Admin: Configure URL Filtering Rules - Demo (27 of 30)
    This demonstration steps through configuring URL filtering rules.
  • ESS WSS Admin: Web Data Protection (28 of 30)
    This module introduces Web Data Protection.
  • ESS WSS Admin: Configuring Web Data Protection Policies - Demo (29 of 30)
  • ESS WSS Admin: Web troubleshooting (30 of 30)
    This module covers basic troubleshooting processes specifically for the Web Security Service.
Email Security Special Topics
  • Symantec Email Data Protection- Customer Demonstration
    A walkthrough of the specific features and functionality of Email Data Protection. Upon completion of this course you will be better prepared to articulate the features of Email Data Protection and be able to create policies, rules, and actions to enforce company email policies.
  • Symantec Email Data Protection- Customer Migration Training
    For Partners and Customers who need to provide technical support. In this module you will learn about the Customer migration from the Email Content Control service to Email Data Protection.
  • Symantec Email Data Protection- Support Training
    For Partners and Customers who need to provide technical support. In this module you will learn about Email Data Protection, how to configure it in the Management Portal, new options in reporting, and how to troubleshoot it.
  • Symantec Email Security.cloud Supporting DMARC Validation
    This video will walk you through the DMARC addition to the inbound email scanning stack of technologies; including: —What it is; —Why it's been added; —How to enable the feature; —Where to find troubleshooting assistance.
  • Supporting Two-factor Authentication to the Administration Portal for Symantec.cloud
    This video will walk you through the Two Factor Authentication (2FA) and IP restriction enhancements to the .cloud administration portal. The session will specifically focus on: —What the functionality is for ; —Why it's been added; — How to enable the features ; —What the user experience will be like ; —Where to find troubleshooting assistance.
Endpoint Management powered by Altiris
Asset Management Suite
Asset Management Suite 7.5
  • Asset Management Suite 7.5: Administration- Course Introduction (1 of 15)
    This module provides an overview of the lessons, course objectives, and intended audience for the Symantec Asset Management Suite 7.5: Administration course.
  • AMS 7.5: Product Overview (2 of 15)
    This module provides a high-level overview of the purpose and components of Asset Management Suite.
  • AMS 7.5: Installing AMS (3 of 15)
    This module discusses the system requirements and steps required for installing Asset Management Suite in the Symantec Management Platform environment.
  • AMS 7.5: The Symantec Management Platform Resource Model (4 of 15)
    This module discusses the elements of the Symantec Management Platform’s resource model and explores the relationships among these elements.
  • AMS 7.5: Migrating, Discovering and Importing Asset (5 of 15)
    This module discusses how to migrate assets and resource associations from Service and Asset Management Suite 6.5 to Asset Management Suite 7.5, and how to discover and import network assets.
  • AMS 7.5: Security and Organizational Views and Groups (6 of 15)
    This module provides an overview of security in the Symantec Management Platform environment and discusses how to use Asset Management Suite’s scope-based security to safely and efficiently manage assets.
  • AMS 7.5: Setting Up the Organizational Structure (7 of 15)
    This module discusses the different organizational resources you can create in Asset Management Suite, and shows how to use these resources to build out your organizational structure in the Symantec Management Console.
  • AMS 7.5: Creating Assets (8 of 15)
    This module discusses how to manually create assets and run preconfigured asset reports in Asset Management Suite.
  • AMS 7.5: Importing Assets with CMDB Solution and Data Connector (9 of 15)
    This module explores CMDB Solution and Data Connector and discusses how to use these components to define data sources for performing CMDB import and export operations; create and schedule data transfer rules; create CMDB rules to clean up, normalize, or make bulk changes to CMDB data; and create custom resource types, resource association types, and data classes.
  • AMS 7.5: Maintaining Assets (10 of 15)
    This module discusses how to perform a number of useful asset housekeeping tasks and how to use Asset Management Suite to retire and dispose of assets.
  • AMS 7.5: Working with Contracts (11 of 15)
    This module discusses how to create and manage contract resources in Asset Management Suite and how to run preconfigured contract reports.
  • AMS 7.5: Working with Software Licensing (12 of 15)
    This module discusses the software license compliance model used in Asset Management Suite, how to set up software license management, and how to run preconfigured software licensing reports.
  • AMS 7.5: Working with Procurement (13 of 15)
    This module discusses how to set up and manage the procurement process in Asset Management Suite and how to run preconfigured procurement reports.
  • AMS 7.5: Working with Barcode Solution (14 of 15)
    This module discusses how to set up and use barcode functionality in Asset Management Suite to receive and create new assets, and to track and manage inventory.
  • AMS 7.5: Reporting Asset Management Information Using IT Analytics (15 of 15)
    This module discusses how to configure and use IT Analytics to review Key Performance Indicator, dashboard, detailed, and cube reports.
Asset Management Suite 7.1
  • AMS 7.1 Administration: Course Introduction
    This module provides an overview of the lessons, course objectives, and intended audience for the Asset Management Suite 7.1 Administration course.
  • AMS 7.1 Administration: Product Overview (1 of 15)
    This module provides a high-level overview of the purpose and components of Asset Management Suite.
  • AMS 7.1 Administration: Installing Asset Management Suite (2 of 15)
    This module discusses the system requirements and steps required for installing Asset Management Suite in the Symantec Management Platform environment.
  • AMS 7.1 Administration: The Symantec Management Platform Resource Model (3 of 15)
    This module discusses the elements of the Symantec Management Platform’s resource model and explores the relationships among these elements.
  • AMS 7.1 Administration: Migrating, Discovering and Importing Asset (4 of 15)
    This module discusses how to migrate assets and resource associations from Service and Asset Management Suite 6.5 to Asset Management Suite 7.1, and how to discover and import network assets.
  • AMS 7.1 Administration: Security and Organizational Views and Groups (5 of 15)
    This module provides an overview of security in the Symantec Management Platform environment and discusses how to use Asset Management Suite’s scope-based security to safely and efficiently manage assets.
  • AMS 7.1 Administration: Setting Up the Organizational Structure (6 of 15)
    This module discusses the different organizational resources you can create in Asset Management Suite, and shows how to use these resources to build out your organizational structure in the Symantec Management Console.
  • AMS 7.1 Administration: Creating Assets (7 of 15)
    This module discusses how to manually create assets and run preconfigured asset reports in Asset Management Suite.
  • AMS 7.1 Administration: Importing Assets with CMDB Solution and Data Connector (8 of 15)
    This module explores CMDB Solution and Data Connector and discusses how to use these components to define data sources for performing CMDB import and export operations; create and schedule data transfer rules; create CMDB rules to clean up, normalize, or make bulk changes to CMDB data; and create custom resource types, resource association types, and data classes.
  • AMS 7.1 Administration: Maintaining Assets (9 of 15)
    This module discusses how to perform a number of useful asset housekeeping tasks and how to use Asset Management Suite to retire and dispose of assets.
  • AMS 7.1 Administration: Working with Contracts (10 of 15)
    This module discusses how to create and manage contract resources in Asset Management Suite and how to run preconfigured contract reports.
  • AMS 7.1 Administration: Working with Software Licensing (11 of 15)
    This module discusses the software license compliance model used in Asset Management Suite, how to set up software license management, and how to run preconfigured software licensing reports.
  • AMS 7.1 Administration: Working with Procurement (12 of 15)
    This module discusses how to set up and manage the procurement process in Asset Management Suite and how to run preconfigured procurement reports.
  • AMS 7.1 Administration: Working with Barcode Solution (13 of 15)
    This module discusses how to set up and use barcode functionality in Asset Management Suite to receive and create new assets, and to track and manage inventory.
  • AMS 7.1 Administration: Reporting Asset Management Information Using IT Analytics (14 of 15)
    This module discusses how to configure and use IT Analytics to review Key Performance Indicator, dashboard, detailed, and cube reports.
  • AMS 7.1 Administration: Working with the Asset Management Workflows (15 of 15)
    This module discusses the optional asset management workflows that can be deployed in an organization to enable users to perform some common asset management functions.
Asset Management Suite 7.0
  • AMS 7.0 — Course Introduction
    This lesson provides an overview of the lessons, course objectives, and intended audience for the Asset Management Suite 7 Administration course.
  • AMS 7.0 — Lesson 1: Product Overview
    This lesson provides a high-level overview of the purpose and components of Asset Management Suite.
  • AMS 7.0 — Lesson 2: Installing Asset Management Suite 7
    This lesson discusses the system requirements and steps required for installing Asset Management Suite in the Symantec Management Platform environment.
  • AMS 7.0 — Lesson 3: The Symantec Management Platform Resource Model
    This lesson discusses the elements of the Symantec Management Platform’s resource model and explores the relationships among these elements.
  • AMS 7.0 — Lesson 4: Migrating, Discovering and Importing Asset
    This lesson discusses how to migrate assets and resource associations from Service and Asset Management Suite 6.5 to Asset Management Suite 7, and how to discover and import network assets.
  • AMS 7.0 — Lesson 5: Security and Organizational Views and Groups
    This lesson provides an overview of security in the Symantec Management Platform environment and discusses how to use Asset Management Suite’s scope-based security to safely and efficiently manage assets.
  • AMS 7.0 — Lesson 6: Setting Up the Organizational Structure
    This lesson discusses the different organizational resources you can create in Asset Management Suite, and shows how to use these resources to build out your organizational structure in the Symantec Management Console.
  • AMS 7.0 — Lesson 7: Creating Assets
    This lesson discusses how to manually create assets and run preconfigured asset reports in Asset Management Suite 7.
  • AMS 7.0 — Lesson 8: Importing Assets with CMDB Solution and Data Connector
    This lesson explores CMDB Solution and Data Connector and discusses how to use these components to define data sources for performing CMDB import and export operations; create and schedule data transfer rules; create CMDB rules to clean-up, normalize, or make bulk changes to CMDB data; and create custom resource types, resource association types, and data classes.
  • AMS 7.0 — Lesson 9: Maintaining Assets
    This lesson discusses how to perform a number of useful asset housekeeping tasks and how to use Asset Management Suite to retire and dispose of assets.
  • AMS 7.0 — Lesson 10: Working with Contracts
    This lesson discusses how to create and manage contract resources in Asset Management Suite 7 and how to run preconfigured contract reports.
  • AMS 7.0 — Lesson 11: Working with Software Licensing
    This lesson discusses the software license compliance model used in Asset Management Suite 7, how to set up software license management, and how to run preconfigured software licensing reports.
  • AMS 7.0 — Lesson 12: Working with Procurement
    This lesson discusses how to set up and manage the procurement process in Asset Management Suite 7 and how to run preconfigured procurement reports.
  • AMS 7.0 — Lesson 13: Working with Barcode Solution
    This lesson discusses how to set up and use barcode functionality in Asset Management Suite 7 to receive and create new assets, and to track and manage inventory.
  • Service and Asset Management and CMDB 6.5
    The Service and Asset Management Suite and CMDB online course covers how to properly setup and manage your asset environment. If you are tasked with entering asset information, importing data from active directory or other locations, tracking purchased or leased hardware and associating your assets with users and locations, this course will demonstrate the proper way to accomplish your goals. Other topics include managing software purchases and lease agreements to insure you are compliant.
Client Management Suite
Client Management Suite 7.5
  • CMS 7.5 SP1: Course Introduction (1 of 18)
    This module discusses the intended audience of the course, an overview of the lessons and topics and tips and tricks to accessing the course videos.
  • CMS 7.5 SP1: Understanding the Symantec Client Management Suite (2 of 18)
    This module discusses the relationships between the Symantec Management Platform and the Symantec Client Management Suite (CMS) software. It also illustrates the relationships between the key platform components and concepts that are used by CMS and describes the basic workings of the platform and CSM.
  • CMS 7.5 SP1: The Symantec Management Console (3 of 18)
    This module describes how to start the Symantec Management Console. It identifies the areas of the console and describes the tasks performed from the console. It also identifies the ITMS Management Views.
  • CMS 7.5 SP1: Symantec Management Platform Basics (4 of 18)
    This module discusses how to use the Microsoft Active Directory Import and how to create, configure and run a network discovery task. It describes how resources can be grouped in organizational views and groups and also in resource filters. It discusses how to use the Quick apply option and the drag-and-drop method to apply policies to resource targets.
  • CMS 7.5 SP1: Deploying the Symantec Management Agent (5 of 18)
    This module discusses how to: push the Symantec Management Agent to computers; install the Symantec Management Agent on a computer by browsing to a web page; give additional functionality to the Symantec Management Agent; and use the Symantec Management Agent GUI on Windows computers and agent tools on UNIX, Linux and Mac computers.
  • CMS 7.5 SP1: Gathering Inventory from Managed Computers (6 of 18)
    This module presents the process of collecting inventory information on managed computers. It discusses how to create and configure inventory policies and how to create and configure inventory tasks. It presents other inventory capabilities including custom, baseline and stand-alone inventories. It discusses how to use inventory reports.
  • CMS 7.5 SP1: Managing the Software Catalog (7 of 18)
    This module presents how to configure the Software Library, perform other Software Catalog housekeeping items and craft a strategy for managing the Software Catalog. It discusses how to populate the Software Catalog and how to configure software components. It presents how to classify software components as managed to create and configure software products.
  • CMS 7.5 SP1: Delivering Software to Managed Computers (8 of 18)
    This module discusses how to: choose a method of delivering software; locate and create software items in the ITMS Management Views; quickly deliver software using a task; create and configure a managed software delivery policy; and find and use software reports.
  • CMS 7.5 SP1: Managing Software with Application Metering (9 of 18)
    This module discusses how Application Metering tracks, monitors and meters software usage. It presents how to: enable software usage tracking and review software usage information; create and configure Application Metering policies; and find and use Application Metering reports.
  • CMS 7.5 SP1: Managing Organizational Views and Groups (10 of 18)
    This module describes the structure, security and location of organizational views and groups. It presents how to create custom organizational views and groups and assign resources to an organizational group. It discusses how to manage organizational views and groups by removing and deleting resources, assigning management rights, reviewing reports and configuring resource membership updates.
  • CMS 7.5 SP1: Managing Resource Filters and Resource Targets (11 of 18)
    This module discusses in detail what resource filters and resource targets are and how to use them. It also presents how to create and modify resource filters and resource targets.
  • CMS 7.5 SP1: Managing Software Updates on Windows Computers (12 of 18)
    This module discusses how Patch Management Solution inventories computers, downloads software update bulletin information, creates installation packages and creates policies to install the updates. It presents the steps to prepare your Patch Management environment, how to distribute software updates and how to use Patch Management reports.
  • CMS 7.5 SP1: Managing Virtualized Software (13 of 18)
    This module discusses what Symantec Workspace Virtualization is and how it works. It presents how to install the Symantec Workspace Virtualization agent and how to capture virtual software and deliver it to CMS managed computers.
  • CMS 7.5 SP1: Remotely Managing Computers (14 of 18)
    This module describes the pcAnywhere components and how to use them to manage computers remotely. It discusses how Real-Time System Manager uses network protocols to perform its management operations. It presents how to use remote management reports.
  • CMS 7.5 SP1: Managing Policies (15 of 18)
    This module describes the purpose and types of policies and how to configure common policy settings. It presents user based policies, maintenance windows policies and automation policies. IT discusses how to create and modify shared schedules.
  • CMS 7.5 SP1: Managing Jobs and Tasks (16 of 18)
    This module defines task management and how to create and manage client and server tasks and jobs.
  • CMS 7.5 SP1: Overview of Deployment Solution (17 of 18)
    This module discusses Understand the management tasks that can be performed by Deployment Solution and PC Transplant. It presents how to configure Deployment Solution to use automation folders and network boot services. It discusses the many deployment task types and supporting platform task types. It Understand what a computer image is and the types of images that can be created and deployed.
  • CMS 7.5 SP1: Reporting (18 of 18)
    This module describes the source of the information found in reports and identifies the two major families of reports. It presents the location of standard reports and report features how to create custom reports. It presents how to configure and use IT Analytics solution reports.
Client Management Suite 7.1
  • CMS 7.1 Administration - Course Introduction
    In this module, you learn the course objectives, intended audience, and contents of the course.
  • CMS 7.1 Administration: Lesson 1 - Understanding Client Management Suite
    In this module, you learn the benefits of Client Management Suite, which solutions and components comprise Client Management Suite, how it can automate and streamline business processes in an organization, and how it can integrate with other products.
  • CMS 7.1 Administration: Lesson 2 - Installing Client Management Suite
    In this module, you learn about installation prerequisites and then learn the three-fold installation process: installing Symantec Installation Manager (SIM), installing Client Management Suite with Symantec Installation Manager.
  • CMS 7.1 Administration: Lesson 2 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • CMS 7.1 Administration: Lesson 3 - Symantec Management Console
    In this module, you learn how to access the console, become familiar with the different views of the console, navigating the console to locate computers, policies, tasks and software, and view detailed information in each view.
  • CMS 7.1 Administration: Lesson 3 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • CMS 7.1 Administration: Lesson 4 - Software Management Framework
    In this module, you learn how Client Management Suite leverages the Symantec Management Platform’s Software Management Framework to ensure that the correct software gets installed, how the Software Management Framework was designed to promote integration between solutions by providing a common way to identify, organize, and detect software, and what components make up the Software Management Framework.
  • CMS 7.1 Administration: Lesson 4 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • CMS 7.1 Administration: Lesson 5 - Overview of Inventory Solution
    In this module, you learn about the different methods to gather inventory using Inventory Solution, and how to install and configure the necessary plug-ins needed to gather inventory.
  • CMS 7.1 Administration: Lesson 5 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • CMS 7.1 Administration: Lesson 6 - Managing Inventory with Tasks and Policies
    In this module, you are introduced to the Inventory Portal. In addition, you learn how to create an Inventory Task and Policy to collect detailed and targeted inventory from managed computers.
  • CMS 7.1 Administration: Lesson 6 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • CMS 7.1 Administration: Lesson 7 - Custom Inventory
    In this module, you learn how to create custom inventory data classes, tasks, scripts, and policies to view and report custom inventory. You also learn that custom inventory scripts use application programming interface objects and routines to create NSE files to pass information to the agent.
  • CMS 7.1 Administration: Lesson 7 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • CMS 7.1 Administration: Lesson 8 - Using Baselines to Manage Computers
    In this module, you learn how to create and configure file and registry baseline tasks, use the Configuration Editor and Snapshot Editor, and view baseline inventory in the Resource Manager.
  • CMS 7.1 Administration: Lesson 8 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • CMS 7.1 Administration: Lesson 9 - Software Delivery
    In this module, you learn the about the different methods to deliver software, how managed delivery is a policy-based delivery method that can be used to deliver multiple software resources with different tasks. You also learn the benefits of Quick Delivery and when to use it.
  • CMS 7.1 Administration: Lesson 9 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • CMS 7.1 Administration: Lesson 10 - Managing and Delivering Software with other Tasks
    In this module, you learn how to update Windows Installer source paths and perform repairs. You also learn how to install applications into virtual layers with a managed software delivery policy and manage the layers with a task.
  • CMS 7.1 Administration: Lesson 10 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • CMS 7.1 Administration: Lesson 11 - Using Application Metering to Manage Computers
    In this module, you learn how to create Application Metering policies and view and report Application Metering data. You also learn that Application Metering policies define the actions to perform when an application is started, and add applications to the Blacklisted Applications policy.
  • CMS 7.1 Administration: Lesson 11 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • CMS 7.1 Administration: Lesson 12 - Software Portal
    In this module, you learn the benefits of the Software Portal for user self-service, how to request software using the software Portal and manage those requests. You also learn how to publish software to the portal and process user requests.
  • CMS 7.1 Administration: Lesson 12 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • CMS 7.1 Administration: Lesson 13 - Patch Management
    In this module, you learn about Patch Management and how it works (Patch Management Workflow), and how to configure Patch Management Solution. You also learn install and manage the Software Update Agent.
  • CMS 7.1 Administration: Lesson 13 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • CMS 7.1 Administration: Lesson 14 - Software Bulletins and Updates
    In this module, you learn about the importance of the Patch Remediation Center and its main functions, how to create and deploy updates using the Software Update policies, and what the responsibilities of the Software Update agent are and how to access this from the Symantec Management Agent.
  • CMS 7.1 Administration: Lesson 14 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • CMS 7.1 Administration: Lesson 15 - Deployment Solution 7.1 SP1 Overview
    In this module, you become familiar with the purpose of Deployment Solution, how to configure Deployment Solution, and how to install the Deployment Solution Plug-in and automation folders.
  • CMS 7.1 Administration: Lesson 15 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • CMS 7.1 Administration: Lesson 16 - Remote Assistance
    In this module, you learn how to install the Symantec pcAnywhere Solution and the plug-in on managed computers, the different methods to initiate a pcAnywhere session, and how pcAnywhere interacts with a remote computer. You also learn about Out of Bound Management and Real-Time System Manager to help manage computers.
  • CMS 7.1 Administration: Lesson 16 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • CMS 7.1 Administration: Lesson 17 - Reporting and Basic Troubleshooting
    In this module, you learn how to access reports, how to configure IT Analytics to view reports, create a custom report, and identify common reports. You also learn basic troubleshooting of Client Management Suite using common tools such as Event Viewer, the Log Viewer, and the log file.
  • CMS 7.1 Administration: Lesson 17 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
Client Management Suite 7.0
  • Client Management Suite 7.0: Core Administration - Overview of Client Management Suite 7
    This module provides an overview of Client Management Suite 7, including the benefits, system requirements, installation requirements and how CMS can provide IT services to end users.
  • Client Management Suite 7.0: Core Administration - Software Management Framework
    This module discusses how the Software Management Framework promotes integration between solutions by providing a common way to identify, organize, and detect software and how it works within the Symantec Management Platform.
  • Client Management Suite 7.0: Core Administration - Installing and Configuring Software Management Solution
    This module describes the components of Software Management and the process to install and configure Software Management, its agents and plug-ins.
  • Client Management Suite 7.0: Core Administration - Managed Delivery
    This module will discuss the different methods to deliver software.
  • Client Management Suite 7.0: Core Administration - Quick Delivery
    This module covers Quick Delivery features including several delivery methods for deploying software packages to workstations.
  • Client Management Suite 7.0: Core Administration - Managing Software with Other Tasks
    This module will discuss managing software with other tasks including Quick Delivery and how to update Windows Installer source paths and perform repairs on Windows Installer applications. It also covers Installing applications into virtual layers with a managed software delivery policy and managing layers with tasks.
  • Client Management Suite 7.0: Core Administration - User Requests and Reports
    This module discusses user requests, reports and the steps to request and manage software using the Software Portal.
  • Client Management Suite 7.0: Core Administration - Installing and Configuring Inventory Solution
    This module covers installing and configuring Inventory Solution including components, activities, collection methods and data classes.
  • Client Management Suite 7.0: Core Administration - Managing and Using Inventory Tasks and Policies
    This module will discuss managing and using Inventory Tasks and Policies and covers key parts of the Inventory Portal that are used to gather a basic inventory. It also covers how to run detailed file Inventories, targeted software inventory policies and stand-alone inventory packages.
  • Client Management Suite 7.0: Core Administration - Managing Computers with Custom Inventory
    This module covers Custom Inventory and how to create and modify the custom inventory data classes used to store data. It also shows how to create and run a custom inventory task and how to set advanced options.
  • Client Management Suite 7.0: Core Administration - Using Baselines to Manage Computers
    This module describes Baseline Inventory and two strategies used in performing baseline inventories. It also covers how to create, configure and file baseline tasks using the File Baseline Configuration Editor and the File and Registration Baseline Snapshot Editors.
  • Client Management Suite 7.0: Core Administration - Using Application Metering to Manage Computers
    This module discusses how Application Policies are used to monitor and deny application. It also covers the types of data sent by Application Metering, how to view the data in the Resource Manager, and how to run Application Metering reports.
  • Client Management Suite 7.0: Core Administration - Patch Management Overview
    This module covers the main functions of Patch Management Solution. It also lists the prerequisites for upgrading or performing a new install and describes the flow of data Patch Management Solution uses.
  • Client Management Suite 7.0: Core Administration - Patch Management Configuration
    This module discusses Patch Management Configuration for the core, Microsoft Server Tasks, and the Software Update Agent. It also shows how to configure replication between multiple Notification Servers for Patch Management Solution.
  • Client Management Suite 7.0: Core Administration - Software Bulletins and Updates
    This module covers the Patch Remediation Center and the Software Update Wizard used to deploy Microsoft bulletins. It also shows how to create a Software Update Policy and how to access plug-ins using the Altiris Agent.
  • Client Management Suite 7.0: Core Administration - Reporting
    This module covers reports including the Patch Management for Windows compliance reports.
Deployment Solution
Deployment Solution 7.1
  • Client Management Suite 7.0: Deployment and Imaging - Deployment Solution 6.9 Basics
    This course focuses on the daily tasks students perform to manage computers using Deployment Solution 7.0 for Clients and will demonstrate how to use core processes including collecting inventory and delivering software.
  • DS 7.1 Administration: Deployment Solution Overview (1 of 9)
    In this module, you become familiar with the software and services offered by Symantec. You also learn what the overall purpose and functions of Deployment Solution are.
  • DS 7.1 Administration: Installing Deployment Solution (2 of 9)
    In this module, you learn about installation prerequisites and then learn the three-fold installation process: installing Symantec Installation Manager (SIM), installing Deployment Solution with (SIM), and installing the Deployment Solution plug-n on managed clients. You also learn about Symantec Boot Services and how to configure these after the installation.
  • DS 7.1 Administration: Configuring Deployment Solution (3 of 9)
    In this module, you learn about the many parts of Deployment Solution, such as configuring Sysprep image, configuring PXE Server, and adding operating system licenses, that are needed to create and deploy images.
  • DS 7.1 Administration: Symantec Management Console Fundamentals (4 of 9)
    In this module, you learn how to access the console, become familiar with the different views of the console, navigating the console to locate computers, policies, tasks and software, and view detailed information in each view. You also learn how to create manage jobs and tasks using the console.
  • DS 7.1 Administration: Creating Images & Deploying Software (5 of 9)
    In this module, you learn about the different types of computer images and how to create and deploy these images. In addition, you learn how to import predefined computers into Deployment Solution and use tasks to install software on the managed computers.
  • DS 7.1 Administration: PC Transplant with Deployment Solution (6 of 9)
    In this module, you are introduced to PC Transplant. In PC Transplant, you learn how to create template files that collect specific information regarding applications and user settings. In addition, you learn how to deploy tasks that create personality packages. Finally, you learn about the A2i Builder and how to edit personality packages.
  • DS 7.1 Administration: Computer Migrations and Deploying Operating Systems (7 of 9)
    In this module, you learn about computer migrations and deploying computer images with unicast and multicast methods. You also learn about Initial Deployment imaging, how to change a computer’s system configuration, and how to perform a scripted OS installation.
  • DS 7.1 Administration: Installing Deployment Site Servers (8 of 9)
    In this module, you learn about Deployment Site Server Components and how to install the components. You also learn how site servers affect imaging and PC Transplant.
  • DS 7.1 Administration: Remote control with pcAnywhere Solution (9 of 9)
    In this module, you learn about pcAnywhere and how to install pcAnywhere Solution and the plug-in. You then learn how to configure settings for making a remote connection, start a remote session, and manage a session.
Deployment Solution 7.0
  • Client Management Suite 7.0: Deployment and Imaging - Deployment Solution Product Overview
    This course focuses on the daily tasks students perform to manage computers using Deployment Solution 7.0 for Clients and will demonstrate how to use core processes including collecting inventory and delivering software.
  • Client Management Suite 7.0: Deployment and Imaging - Installation
    This course focuses on the daily tasks students perform to manage computers using Deployment Solution 7.0 for Clients and will demonstrate how to use core processes including collecting inventory and delivering software.
  • Client Management Suite 7.0: Deployment and Imaging - Deployment Solution Agents
    This course focuses on the daily tasks students perform to manage computers using Deployment Solution 7.0 for Clients and will demonstrate how to use core processes including collecting inventory and delivering software.
  • Client Management Suite 7.0: Deployment and Imaging - PXE and Automation
    This course focuses on the daily tasks students perform to manage computers using Deployment Solution 7.0 for Clients and will demonstrate how to use core processes including collecting inventory and delivering software.
  • Client Management Suite 7.0: Deployment and Imaging - Managing Images
    This course focuses on the daily tasks students perform to manage computers using Deployment Solution 7.0 for Clients and will demonstrate how to use core processes including collecting inventory and delivering software.
  • Client Management Suite 7.0: Deployment and Imaging - Managing Software Virtualization Solution
    This course focuses on the daily tasks students perform to manage computers using Deployment Solution 7.0 for Clients and will demonstrate how to use core processes including collecting inventory and delivering software.
  • Client Management Suite 7.0: Deployment and Imaging - PC Transplant
    This course focuses on the daily tasks students perform to manage computers using Deployment Solution 7.0 for Clients and will demonstrate how to use core processes including collecting inventory and delivering software.
  • Client Management Suite 7.0: Deployment and Imaging - Deployment Solution 7.0 for Client
    This course focuses on the daily tasks students perform to manage computers using Deployment Solution 7.0 for Clients and will demonstrate how to use core processes including collecting inventory and delivering software.
  • Client Management Suite 7.0: Deployment and Imaging - Deployment Solution 6.9 SP1
    This course focuses on the daily tasks students perform to manage computers using Deployment Solution 7.0 for Clients and will demonstrate how to use core processes including collecting inventory and delivering software.
Deployment Solution 6.9
  • Deployment Solution 6.9 - Agents
    This course demonstrates how powerful Deployment Solution is in managing the computers in your network. You will learn about the different Deployment Solution components and how they work together to create a Deployment System.
  • Deployment Solution 6.9 - DS Basics
    This course demonstrates how powerful Deployment Solution is in managing the computers in your network. You will learn about the different Deployment Solution components and how they work together to create a Deployment System.
  • Deployment Solution 6.9 - Installation
    This course demonstrates how powerful Deployment Solution is in managing the computers in your network. You will learn about the different Deployment Solution components and how they work together to create a Deployment System.
  • Deployment Solution 6.9 - Managing Images
    This course demonstrates how powerful Deployment Solution is in managing the computers in your network. You will learn about the different Deployment Solution components and how they work together to create a Deployment System.
  • Deployment Solution 6.9 – Managing SVS
    This course demonstrates how powerful Deployment Solution is in managing the computers in your network. You will learn about the different Deployment Solution components and how they work together to create a Deployment System.
  • Deployment Solution 6.9 - Overview
    This course demonstrates how powerful Deployment Solution is in managing the computers in your network. You will learn about the different Deployment Solution components and how they work together to create a Deployment System.
  • Deployment Solution 6.9 – PC Transplant
    This course demonstrates how powerful Deployment Solution is in managing the computers in your network. You will learn about the different Deployment Solution components and how they work together to create a Deployment System.
  • Deployment Solution 6.9 - PXE & Automation
    This course demonstrates how powerful Deployment Solution is in managing the computers in your network. You will learn about the different Deployment Solution components and how they work together to create a Deployment System.
  • Install and Configure DAgent for Vista
    This course demonstrates how powerful Deployment Solution is in managing the computers in your network. You will learn about the different Deployment Solution components and how they work together to create a Deployment System.
  • Imaging with Ghost and ImageX
    Deployment Solution version 6.8 SP2 or higher, supports many different imaging engines, letting you select the imaging tool that best meets the needs of your company and environment. However, the only imaging engine that ships with Deployment Solution is RapiDeploy. In this course you will learn how to configure Deployment Solution to support the additional “Symantec Ghost” and “Microsoft ImageX” imaging engines.
  • Vista Migration with Deployment Solution
    The difficult task of migrating a computer from a previous version of Windows to Vista, is simplified through the power of Deployment Solution. In this course, you will learn how to use Deployment Solution to migrate a computer from XP to Vista. To get the most out of this course, you must have a working knowledge of Deployment Solution, including how to create Deployment jobs and a basic understanding of PC Transplant. If needed, please view the other Deployment Solution courses first.
IT Management Suite
  • Managing Software Licenses with Symantec IT Management Suite-Overview and Strategy (1 of 5)
    This module presents an overview of the components of ITMS that can be synergized to manage software licensing. It also provides a set of steps that can be used to manage software license compliance.
  • Managing Software Licenses with Symantec IT Management Suite-Configuring Inventory Solution to Gather Software Information (2 of 5)
    This module provides an understanding of how Inventory Solution policies support the strategy of managing software licenses and gives detailed instructions on creating and configuring Inventory Solution policies.
  • Managing Software Licenses with Symantec IT Management Suite-Creating and Associating Software Products to Software Components (3 of 5)
    This module presents the steps to create software products from software components and if needed, associate other software components to these software products.
  • Managing Software Licenses with Symantec IT Management Suite-Configuring Application Metering to Gather Software Usage Information (4 of 5)
    This module presents the steps to configure software products to collect software usage on managed computers.
  • Managing Software Licenses with Symantec IT Management Suite-Creating and Managing Software License and Software Purchase Resources (5 of 5)
    This module presents the steps to create and configure software license and software purchase resources from both the Software License Portal and the Software Blade. IT also reviews the reports that display software compliance and software usage.
Management Platform
Management Platform 7.1
  • SMP 7.1 Administration: Course Introduction
    In this module, you learn the course objectives, intended audience, and contents of the course.
  • SMP 7.1 Administration: Lesson 01 Understanding the Symantec Management Platform
    In this module you receive an introduction to the Symantec Management Platform (SMP), and learn about the SMP components, components, and how SMP works.
  • SMP 7.1 Administration: Lesson 02 Installing Symantec Management Platform
    In this module, you learn about architecture considerations, installation requirements, and using Symantec Installation Manager to install Symantec Management Platform. You also learn how to access the Symantec Management Console and configure settings after installation.
  • SMP 7.1 Administration: Lesson 02 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • SMP 7.1 Administration: Lesson 03 Symantec Management Console
    In this module, you learn how to navigate the Symantec Management Console and use the enhanced console views.
  • SMP 7.1 Administration: Lesson 03 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • SMP 7.1 Administration: Lesson 04 Discovering Resources
    In this module, you learn how to import computers and users using Active Directory, perform network discovery, and discover computers using domain membership.
  • SMP 7.1 Administration: Lesson 04 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • SMP 7.1 Administration: Lesson 05 Resource Manager
    In this module, you learn about resources and using the Resource Manager.
  • SMP 7.1 Administration: Lesson 05 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • SMP 7.1 Administration: Lesson 06 Installing and Setting Up the Symantec Management Agent
    In this module, you learn how to install the Symantec Management Agent, and then verify it installed properly. You also set the Symantec Management Agent installation options.
  • SMP 7.1 Administration: Lesson 06 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • SMP 7.1 Administration: Lesson 07 Configuring Symantec Management Agent
    In this module, you learn how to configure the Symantec Management Agent settings and determine when to use unicast and multicast. You also learn how to install and view Symantec Management Agent plug-ins.
  • SMP 7.1 Administration: Lesson 07 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • SMP 7.1 Administration: Lesson 08 Agent Communication with Notification Server
    In this module, you learn how the Symantec Management Agent and Notification Server communicate, and how data flows between them.
  • SMP 7.1 Administration: Lesson 08 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • SMP 7.1 Administration: Lesson 09 Creating and Managing Organizational Views and Groups
    In this module, you learn how to create and manage organizational views and groups.
  • SMP 7.1 Administration: Lesson 09 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • SMP 7.1 Administration: Lesson 10 Creating and Managing Filters
    In this module, you learn how to work with existing filters and create new filters using the Query Builder.
  • SMP 7.1 Administration: Lesson 10 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • SMP 7.1 Administration: Lesson 11 Creating and Managing Targets
    In this module, you learn how to create and manage targets. You also learn how to apply resource scoping to filters and targets. In this module you learn to work with targets and apply resource scoping to filters and targets.
  • SMP 7.1 Administration: Lesson 11 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • SMP 7.1 Administration: Lesson 12 Creating and Managing Policies
    In this module, you learn about user-based policies, maintenance policies, and automation policies. You also learn how the Symantec Management Agent receives policies and how to manage shared schedules.
  • SMP 7.1 Administration: Lesson 12 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • SMP 7.1 Administration: Lesson 13 Creating and Managing Tasks
    In this module, you learn about task management, including task management communication and processing. You also learn how to create and schedule tasks, create jobs, and use a workflow.
  • SMP 7.1 Administration: Lesson 13 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • SMP 7.1 Administration: Lesson 14 Security
    In this module, you learn about security and resource scoping. You also learn how to manage user accounts, roles, privileges, and permissions.
  • SMP 7.1 Administration: Lesson 14 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • SMP 7.1 Administration: Lesson 15 Reporting
    In this module, you learn about reporting and IT Analytics Solution. You also learn how to create a custom report and work with the report results.
  • SMP 7.1 Administration: Lesson 16 Site Management
    In this module, you learn how to manage sites, site servers and subnets. You will also learn how to work with task service and package service.
  • SMP 7.1 Administration: Lesson 17 Replication
    In this module, you learn how to set up, configure, and run replication.
  • SMP 7.1 Administration: Lesson 18 Hierarchy
    In this module, you receive an overview of hierarchy, and then learn how to set up a Notification Server hierarchy, configure hierarchy replication, and change the hierarchy topology.
  • SMP 7.1 Administration: Lesson 19 Troubleshooting
    In this module, you learn what Symantec Management Platform troubleshooting tools tools are available and how to use them. You also learn how to use NSConfigurator and Remote Altiris Agent Diagnosticis. Finally, you learn how to troubleshoot the Symantec Management Agent and Event inboxes.
  • SMP 7.1 Administration: Lesson 20 Backing up the Server and Database
    In this module, you learn which Symantec Management Platform components are needed for recovery. You also learn how to backup the IIS default Web Site Virtual Directories and the Configuration Management Database.
  • SMP 7.1 Administration: Lesson 21 Migrating Versions of Symantec Management Platform
    In this module, you learn how to migrate Symantec Management Platform from version 6.x to 7.0, and from version 7.0 to 7.1.
Management Platform 7.0
  • Management Platform 7.0 with Notification Server: Install, Configure, & Deploy - Understanding the Symantec Management Platform (1 of 8)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Install, Configure, & Deploy-Planning and Designing the Symantec Management Platform (2 of 8)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Install, Configure, & Deploy - Installing Symantec Management Platform (3 of 8)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Install, Configure, & Deploy - Symantec Management Console (4 of 8)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Install, Configure, & Deploy - Installing and Setting Up the Altiris Agent (5 of 8)
    Management Platform 7.0 with Notification Server: Installing and Setting Up the Altiris Agent.
  • Management Platform 7.0 with Notification Server: Install, Configure, & Deploy - Configuring the Altiris Agent Settings and Tabs (6 of 8)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Install, Configure, & Deploy - Resource Management (7 of 8)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Install, Configure, & Deploy - Site Management (8 of 8)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Manage and Administer - Creating and Managing Organizational Views and Groups (1 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Manage and Administer - Creating and Managing Filters (2 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Manage and Administer - Creating and Managing Targets (3 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Manage and Administer - Managing Policies (4 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Manage and Administer - Managing Tasks (5 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Manage and Administer - Resource Scoping and Security (6 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Manage and Administer - Reporting and the Report Wizard (7 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Manage and Administer - Replication between Notification Servers (8 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Manage and Administer - Hierarchy Design and Configuration (9 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Manage and Administer - Migrating from Notification Server 6 (10 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Manage and Administer - SQL Basics and Resource Partitioning (11 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Manage and Administer - Symantec Management Platform Troubleshooting (12 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Notification System Foundation 6
    The Notification Systems Foundation course focuses on the daily tasks you perform with your Altiris Solutions. In this class, you will learn the essential setup and configuration options available with Notification Server™ 6.0 as well as best practices for network design, package server configuration, and Web report generation.
  • Philips SmartManage 4.0
    Learn to remotely manage Philips monitors as part of your corporate asset management environment through the Symantec Notification Server.
Server Management Suite
Server Management Suite 7.0
  • Server Management Suite 7.0 Administration - Overview of Monitor Solution
    Learn to use the many features and functions of Server Management Suite 7.0 including how to identify the health of your environment, analyzing trends, isolate recurring issues, and locate problems, determine their cause, and take automated actions to resolve them. You will also learn how to effectively manage, configure and report software, patches and inventory data through interactive simulations.
  • Server Management Suite 7.0 Administration - Overview of Server Management Suite 7
    Learn to use the many features and functions of Server Management Suite 7.0 including how to identify the health of your environment, analyzing trends, isolate recurring issues, and locate problems, determine their cause, and take automated actions to resolve them. You will also learn how to effectively manage, configure and report software, patches and inventory data through interactive simulations.
  • Server Management Suite 7.0 Administration - Software Management Framework
    Learn to use the many features and functions of Server Management Suite 7.0 including how to identify the health of your environment, analyzing trends, isolate recurring issues, and locate problems, determine their cause, and take automated actions to resolve them. You will also learn how to effectively manage, configure and report software, patches and inventory data through interactive simulations.
  • Server Management Suite 7.0 Administration - Inventory Solution and Inventory for Network Devices
    Learn to use the many features and functions of Server Management Suite 7.0 including how to identify the health of your environment, analyzing trends, isolate recurring issues, and locate problems, determine their cause, and take automated actions to resolve them. You will also learn how to effectively manage, configure and report software, patches and inventory data through interactive simulations.
  • Server Management Suite 7.0 Administration - Managing and Using Inventory Tasks and Policies
    Learn to use the many features and functions of Server Management Suite 7.0 including how to identify the health of your environment, analyzing trends, isolate recurring issues, and locate problems, determine their cause, and take automated actions to resolve them. You will also learn how to effectively manage, configure and report software, patches and inventory data through interactive simulations.
  • Server Management Suite 7.0 Administration - Network Discovery
    Learn to use the many features and functions of Server Management Suite 7.0 including how to identify the health of your environment, analyzing trends, isolate recurring issues, and locate problems, determine their cause, and take automated actions to resolve them. You will also learn how to effectively manage, configure and report software, patches and inventory data through interactive simulations.
  • Server Management Suite 7.0 Administration - Patch Management Overview
    Learn to use the many features and functions of Server Management Suite 7.0 including how to identify the health of your environment, analyzing trends, isolate recurring issues, and locate problems, determine their cause, and take automated actions to resolve them. You will also learn how to effectively manage, configure and report software, patches and inventory data through interactive simulations.
  • Server Management Suite 7.0 Administration - Patch Management Configuration
    Learn to use the many features and functions of Server Management Suite 7.0 including how to identify the health of your environment, analyzing trends, isolate recurring issues, and locate problems, determine their cause, and take automated actions to resolve them. You will also learn how to effectively manage, configure and report software, patches and inventory data through interactive simulations.
  • Server Management Suite 7.0 Administration - Software Bulletins and Updates
    Learn to use the many features and functions of Server Management Suite 7.0 including how to identify the health of your environment, analyzing trends, isolate recurring issues, and locate problems, determine their cause, and take automated actions to resolve them. You will also learn how to effectively manage, configure and report software, patches and inventory data through interactive simulations.
  • Server Management Suite 7.0 Administration - Managing Monitor Solution
    Learn to use the many features and functions of Server Management Suite 7.0 including how to identify the health of your environment, analyzing trends, isolate recurring issues, and locate problems, determine their cause, and take automated actions to resolve them. You will also learn how to effectively manage, configure and report software, patches and inventory data through interactive simulations.
ServiceDesk
ServiceDesk 7.5
  • Symantec ServiceDesk 7.5: Administration--Introducing ServiceDesk (1 of 12)
    This module describes ServiceDesk 7.5, the Process Manager Portal, and the Incident, Problem, Change, and Knowledge Base modules.
  • Symantec ServiceDesk 7.5: Administration--Installing ServiceDesk (2 of 12)
    This module describes installation prerequisites and how to ensure a successful ServiceDesk 7.5 installation. This module also shows you how to install the Symantec Workflow platform, ServiceDesk modules, and Screen Capture Utility.
  • Symantec ServiceDesk 7.5: Administration--Managing Groups and Users (3 of 12)
    This module shows you how to log on and navigate the Process Manager Portal, manage Active Directory connections, and add Active Directory users. The module also shows you how to manage groups and permissions and add users to ServiceDesk.
  • Symantec ServiceDesk 7.5: Administration--Configuring Incident Management (4 of 12)
    This module introduces Incident Management rulesets and how to configure Incident Management, create data mapping routing tables, and manage email templates.
  • Symantec ServiceDesk 7.5: Administration--Using Incident Management (5 of 12)
    This module describes how to submit incidents from a user and support technicians’ perspective. The module also describes how users can download the Screen Capture Utility.
  • Symantec ServiceDesk 7.5: Administration--Using Incident Management (continued) (6 of 12)
    This module is a continuation of using Incident Management. This module describes how to use email to submit an incident and resolve and escalate incidents. This module also describes how to use and customize the Customer Service Survey form.
  • Symantec ServiceDesk 7.5: Administration--Using Problem Management (7 of 12)
    This module provides an overview of Problem Management, shows you how to create, review, and request a change from a problem ticket.
  • Symantec ServiceDesk 7.5: Administration--Configuring Change Management (8 of 12)
    This module provides an overview of Change Management, change requests sources and states, and how to configure Change Management. The module also describes Change Management rulesets.
  • Symantec ServiceDesk 7.5: Administration--Using Change Management (9 of 12)
    This module shows you how to work with change templates and how to request a change. The module also describes the process of reviewing and implementing a change.
  • Symantec ServiceDesk 7.5: Administration--Managing the Service Catalog and Quick Services Links (10 of 12)
    In this module, you learn how to configure administrator-defined scans, protection technology settings and scans, e-mail scans, and advanced scanning options for Windows and Mac clients.
  • Symantec ServiceDesk 7.5: Administration--Working with Reports (11 of 12)
    This module provides an overview of ServiceDesk reporting including IT Analytics and how to schedule and view reports.
  • Symantec ServiceDesk 7.5: Administration--Using the Knowledge Base and Document Management (12 of 12)
    This module provides an overview of the Knowledge Base, how to submit, accept, or reject knowledge base articles and how to add documents to the ServiceDesk Document Management System.
ServiceDesk 7.1
  • SD 7.1 Administration - Overview of Symantec ServiceDesk 7.1 (1 of 18)
    In this module, you learn what you can do with ServiceDesk, how ServiceDesk is a process-driven paradigm, and how it differs from products that are data-driven. You also learn how ServiceDesk uses ITIL Service processes, how ServiceDesk integrates with other Symantec products, and how ServiceDesk can be customized in your environment.
  • SD 7.1: Administration - Installing ServiceDesk 7.1 (2 of 18)
    In this module, you learn about the ServiceDesk prerequisite components, how to install ServiceDesk 7.1 on the ServiceDesk server, and how to perform the post-installation configuration steps that are required before launching the ServiceDesk application for the first time.
  • SD 7.1: Administration - Migrating from Helpdesk 6.5 (3 of 18)
    In this module, you learn how to migrate Helpdesk 6.5 incidents, categories, and Knowledge Base articles to ServiceDesk, and how to work migrated incidents from the ServiceDesk portal.
  • SD 7.1: Administration - Introduction to Workflow (4 of 18)
    In this module, you learn about Workflow Solution, learn how Workflow Solution works with ServiceDesk, and identify what you can do with the Workflow Designer. You also learn about the basic Workflow components that ServiceDesk uses and how to customize and publish Workflow changes to ServiceDesk.
  • SD 7.1: Administration - Working in the ServiceDesk Portal (5 of 18)
    In this module, you learn how to navigate the ServiceDesk portal and define portal pages, sub-portal pages, and Web parts. You also learn how to set up users, groups, and permissions in ServiceDesk. Other topics include how to modify the ServiceDesk Portal master settings and how to use the process view.
  • SD 7.1: Administration - Using Incident Management (6 of 18)
    In this module, you learn about the workflow process commonly used in business to manage incident creation and resolution, and how to create and submit a ServiceDesk incident from the user and technician perspectives. You also learn how to use ServiceDesk to monitor an e-mail inbox, how to escalate incidents, and the Customer Service Survey process.
  • SD 7.1: Administration - Incident Management Settings and Rules (7 of 18)
    In this module, you learn about ServiceDesk's Incident Management process and the various software packages associated with the process. You also set up categories, data hierarchy, incident templates, and customize the rules ServiceDesk uses to determine how incidents are assigned to support queues. In addition, you learn about Automation Rules.
  • SD 7.1: Administration - Customizing Incident Management (8 of 18)
    In this module, you learn how to customize default incident impact and urgency values in ServiceDesk, extend data types, and add input items to the user Submit Incident form.
  • SD 7.1: Administration - Using Problem Management (9 of 18)
    In this module, you learn about Problem Management as well as how to create a problem ticket from an incident and the service catalog. You also learn the process for reviewing and working problem tickets, adding an incident ticket to a problem ticket, and generating a request for change from a problem ticket.
  • SD 7.1: Administration - Customizing Problem Management (10 of 18)
    In this module, you learn the Problem Management process, how to customize problem management categories, and review the root cause of classification values in the portal. You also learn how to add a new group to perform the analysis step in Problem Management and how to add customized data fields to the submit problem form.
  • SD 7.1: Administration- Using Change Management (11 of 18)
    In this module, you learn about Change Management, the roles of Change Management, and the Change Management business model. You also learn about the default change templates, and the process for creating, reviewing, implementing, and verifying a change.
  • SD 7.1: Administration - Customizing Change Management (12 of 18)
    In this module, you learn about the different aspects of the Change Management process, how to establish the default Change Advisory Board, and how to create other Change Advisory Boards. You also learn how to customize change types, modify the change type form, and use the CAB approval process.
  • SD 7.1: Administration - Service Requests and Quick Services Links (13 of 18)
    In this module, you learn how to use the Reset Password and Request Access to Shared Folder Service Catalog items. You also learn how to configure and use the Quick Service links.
  • SD 7.1: Administration - Working with E-mail Notifications (14 of 18)
    This module describes how e-mail notifications work in ServiceDesk including how to add, edit, and disable notifications in Symantec Workflow Manager. You also learn how incoming e-mails are processed and understand where e-mail settings are stored after installation.
  • SD 7.1: Administration - Working with Reports (15 of 18)
    In this module, you learn about ServiceDesk's reporting capabilities as well as how to automatically populate reports on schedules, view reports in the ServiceDesk portal, set permissions on reports, and create and customize reports. You also learn how to monitor current and active licenses.
  • SD 7.1: Administration - Using the Knowledge Base and Document Management (16 of 18)
    In this module, you learn about the types of items you can create in the ServiceDesk Knowledge Base and how to use the ServiceDesk portal to submit Knowledge Base articles for the Knowledge Base editor to consider. You also learn how to set permissions for users, groups, and organizations to access the Knowledge Base.
  • SD 7.1: Administration - Creating Custom Web Parts (17 of 18)
    In this module, you learn how to create a custom Web part to use in the ServiceDesk Portal.
  • SD 7.1: Administration - Advanced Customization Using Workflow (18 of 18)
    In this module, you learn how to publish a Workflow process to the Service Catalog, maintain customizations by using versioning, and various ways to scale ServiceDesk. You also learn how to compare new Workflow processes to previous versions and ServiceDesk best practices.
ServiceDesk 7.0
  • ServiceDesk 7.0 Administration - Working with Reports
    Learn how to install, configure, and operate Symantec ServiceDesk 7; and learn how ServiceDesk implements the ITIL processes of incident management, problem management, and change management.
  • ServiceDesk 7.0 Administration - Overview: Symantec ServiceDesk 7 (1 of 8)
    Learn how to install, configure, and operate Symantec ServiceDesk 7; and learn how ServiceDesk implements the ITIL processes of incident management, problem management, and change management.
  • ServiceDesk 7.0 Administration - Introduction to Workflow (2 of 8)
    Learn how to install, configure, and operate Symantec ServiceDesk 7; and learn how ServiceDesk implements the ITIL processes of incident management, problem management, and change management.
  • ServiceDesk 7.0 Administration - Installing ServiceDesk 7 (3 of 8)
    Learn how to install, configure, and operate Symantec ServiceDesk 7; and learn how ServiceDesk implements the ITIL processes of incident management, problem management, and change management.
  • ServiceDesk 7.0 Administration - Migrating from Helpdesk 6.5 (4 of 8)
    Learn how to install, configure, and operate Symantec ServiceDesk 7; and learn how ServiceDesk implements the ITIL processes of incident management, problem management, and change management.
  • ServiceDesk 7.0 Administration - Working in the ServiceDesk Portal (5 of 8)
    Learn how to install, configure, and operate Symantec ServiceDesk 7; and learn how ServiceDesk implements the ITIL processes of incident management, problem management, and change management.
  • ServiceDesk 7.0 Administration - Using Incident Management (6 of 8)
    Learn how to install, configure, and operate Symantec ServiceDesk 7; and learn how ServiceDesk implements the ITIL processes of incident management, problem management, and change management.
  • ServiceDesk 7.0 Administration - Using Problem Management (7 of 8)
    Learn how to install, configure, and operate Symantec ServiceDesk 7; and learn how ServiceDesk implements the ITIL processes of incident management, problem management, and change management.
  • ServiceDesk 7.0 Administration - Using Change Mangement (8 of 8)
    Learn how to install, configure, and operate Symantec ServiceDesk 7; and learn how ServiceDesk implements the ITIL processes of incident management, problem management, and change management.
  • Helpdesk Solution 6
    Learn to use the many features, functions, and processes of Altiris Helpdesk Solution including how to create and integrate business rules that let you devise a consistent response to help desk incidents and establish and maintain help desk service levels. You will also learn how to effectively manage, report, and resolve help desk issues. This product is now known as ServiceDesk.
Workflow
Workflow 7.1
  • Lesson 01 - Introducing Symantec Workflow 7.1 Administration
    In this module, you learn about Workflow, how to analyze business processes, how Workflow integrates with other products, and how to access Workflow resources.
  • Lesson 02 - Installing and Configuring Workflow
    In this module, you learn about the installation requirements, how to install Workflow in the Symantec Management Platform (SMP) console, how to manage servers in SMP, and how to configure credentials.
  • Demo 02 - Installing and Configuring Workflow
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Lesson 03 - Getting Started in Workflow
    In this module, you learn about using Workflow Manager, how to navigate in Workflow Designer, and become familiar with Process Manager.
  • Lesson 04 - Creating a Simple Form Project
    In this module, you learn how to identify the stages of a project and how to determine which project type to use. You also learn how to work with components, how to create a project using component types, how to use demo components to start a project, and how to debug a project.
  • Demo 04 - Creating a Simple Form Project
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Lesson 05 - Saving and Deploying
    In this module, you learn how to package and publish a project.
  • Demo 05 - Saving and Deploying
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Lesson 06 - Building a Workflow Project
    In this module, you learn about models and how to add form components. You also learn how to configure processes in a Dialog Workflow component and how to debug the Workflow project type.
  • Demo 06 - Building a Workflow Project
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Lesson 07 - Enabling Process Reporting
    In this module, you learn about how to configure security for Process Manager and how to set up reporting in Workflow Designer. You also learn how to work with reporting components and how to look at component data in Process Manager.
  • Demo 07 - Enabling Process Reporting
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Lesson 08 - Expanding a Project’s Functionality
    In this module, you learn how to add variables and property components, how to insert them in a project, and how to initialize the data. You also learn about looping and branching and how to view values while debugging.
  • Demo 08a - Expanding a Project’s Functionality (1)
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Demo 08b - Expanding a Project’s Functionality (2)
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Lesson 09 - Creating a Secondary Model
    In this module, you learn about Secondary models and how to use them.
  • Demo 09 - Creating a Secondary Model
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Lesson 10 - Integration
    In this module, you learn about integrations, how to connect to data sources, how to work with custom data types, and how to add the integration to a project.
  • Demo 10 - Integration
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Lesson 11 - Mapping to Data Types
    In this module, you learn how to map to data types and how to map the Secondary model to the Primary model.
  • Demo 11 - Mapping to Data Types
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Lesson 12 - Applying Advanced Customizations to Forms
    In this module, you learn how to apply themes, how to format dialog boxes, and how to design acknowledgement forms.
  • Demo 12 - Applying Advanced Customizations to Forms
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Lesson 13 - Verifying User Input
    In this module, you learn about regular expressions and how to use the library with a project.
  • Demo 13 - Verifying User Input
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Lesson 14 - Escalation
    In this module, you learn how to create escalations and Timeouts.
  • Demo 14 - Escalation
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Lesson 15 - Exception Handling
    In this module, you learn how to prevent failures by using the Exception Trigger component and applying exception handling throughout the project.
  • Demo 15 - Exception Handling
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Lesson 16 - Versioning
    In this module, you learn about why it is important to use versioning, how to implement versioning, and how to compare projects.
  • Demo 16 - Versioning
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Lesson 17 - Publishing
    In this module, you learn how to prepare a project for publishing to production, how to publish, and which post-publishing steps must be completed.
  • Demo 17 - Publishing
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Lesson 18 - Working in Process Manager
    In this module, you learn how to access process data in Process Manager, how to set application properties, how to enhance tasks in Process Manager, how to create a page for the project, and how to create reports in Process Manager.
  • Demo 18 - Working in Process Manager
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
Workflow 7.0
  • Workflow 7.0 - Introducing Symantec Workflow 7.0
    In this module, you learn what Workflow Solution is, how it can automate and streamline business processes in an organization, and how it can integrate with other products. You also learn about useful Workflow resources.
  • Workflow 7.0 - Installing and Configuring Workflow
    In this module, you learn about installation prerequisites and then learn the three-fold installation process: installing Symantec Installation Manager (SIM), installing Workflow Solution with (SIM), and installing Workflow Solution in the Symantec Management Console. You also learn which credentials to configure after installation and how to configure them.
  • Workflow 7.0 - Getting Started in Workflow
    This module provides details on the parts of Workflow Designer and how to navigate in it. In this module, you also learn about the parts of Process Manager, what they do, and how to navigate among them.
  • Workflow 7.0 - Creating a Simple Form Project
    In this module, you learn about the stages of a project, various types of projects, components, and the Debugger. You then combine this information to create a simple project and use the Debugger to test the project.
  • Workflow 7.0 - Using Demo Components to Start a Project
    In this module, you learn about the types of demo components that are available and how to import the demo component library into a project. Then you use demo components to begin building a Vacation Request project. In succeeding modules, you add functionality and to the Vacation Request project to produce a comprehensive process that can be used in your organization.
  • Workflow 7.0 - Building a Workflow Project
    In this module you are introduced to models. In the Vacation Request project, you add Embedded and Embedded Rule models and add a Dialog Workflow component. You then learn how to use the Debugger to test each model.
  • Workflow 7.0 - Creating an Audit Trail
    In this module you learn about setting up security in Process Manager. You also learn how to set up reporting in Workflow Designer, how to add reporting components to the Vacation Request project, and how to process a task in Process Manager.
  • Workflow 7.0 - Expanding a Project’s Functionality
    In this module you learn about variables, properties, and data types, and how to add these development items to the Vacation Request project. You also learn how to initialize data and how to use looping and branching. Finally, you learn how to view values in the Debugger.
  • Workflow 7.0 - Creating a Secondary Model
    In this module you learn the advantages Secondary models have in a project. Then you create a Secondary model for the Vacation Request project and populate the model with components.
  • Workflow 7.0 - Integration
    In this module you learn the types of integrations that can be created in Workflow Designer. You also learn how to create a multiple container integration. Then you build custom components and data types and add these elements to the Vacation Request project.
  • Workflow 7.0 - Mapping to Data Types
    In this module you learn about mapping and components used to map data. You then apply this knowledge to the Vacation Request project, mapping to data types and mapping the Secondary model to the Primary model.
  • Workflow 7.0 - Applying Advanced Customizations to Forms
    In this module you enhance the appearance and functionality of forms in the Vacation Request project. You learn how to create and apply themes; how to add and format labels, check boxes, and grids; and how to add images to create a polished form.
  • Workflow 7.0 - Verifying User Input
    In this module you learn about regular expressions and the regular expression components. Then you apply a regular expression component to find an e-mail address in the project. You also learn how to add an e-mail component to the project and how to save an e-mail component to the library to use in current or future projects.
  • Workflow 7.0 - Escalation
    In this module you learn about escalations, time outs, and delegations. Then you add a time out to the Vacation Request project.
  • Workflow 7.0 - Exception Handling
    In this module you learn how to identify potential failure points in a project and how to create an exception handling process that addresses them. You then implement the exception handling process throughout the Vacation Request project and customize it for each model.
  • Workflow 7.0 - Versioning
    In this module you learn what versioning is and the recommended method of versioning a project. You also learn how to address versioning when upgrading from Workflow 6.x to Workflow 7.0.
  • Workflow 7.0 - Publishing and Packaging
    In this module you learn how to move the Vacation Request project from a test environment to a production environment. You learn important pre-publishing steps to prepare the project for deployment, and then you deploy the project. Finally, you learn about the post-publishing steps that are needed to be able to create a secure and accessible deployed project.
  • Workflow 7.0 - Working in Process Manager
    In this module you learn how to create a page for the project in the Process Manager Portal to make the completed Vacation Request project available to other users. You also learn how to run reporting on the project.
  • Workflow Solution
    This training course will demonstrate how Workflow Solution can help automate business processes by using the Altiris Workflow Designer and Workflow Server to effectively design and build workflow projects.
Workspace Virtualization and Streaming
Workspace Virtualization and Streaming 7.5
  • Workspace Virtualization 7.5 Administration (1 of 2)
    In this module, you learn what Symantec Workspace Virtualization is, how to install it, and how to create virtualized packages using the Admin tool and Virtual Composer. You also learn about application layers, data layers, and how to manage resources in these layers. Finally, you learn how to add scripts, events, and how to create upgrade packages using Virtual Composer. This module also includes demos and simulations.
  • Workspace Streaming 7.5 Administration (2 of 2)
    In this module, you learn what Workspace Streaming is and how to install it. You learn about the different components that comprise a streaming system and how to configure them. You also learn how to load, unload, and provision packages to the Streaming Server, and provision packages to users. You also learn how to use Network Application Streaming to stream applications without a streaming system in place. You learn about license management and configuring licenses for applications both metering applications and virtual applications. Finally, you learn about troubleshooting and workflow of the streaming system. This module also includes demos and simulations.
Workspace Virtualization and Streaming 6.x
  • Workspace Virtualization and Streaming 6.x Admin: Software Virtualization Agent Overview (1 of 10)
    In this module, you are provided with an overview of Symantec Workspace Virtualization and the structure of layers, and you learn about how virtualization solves software issues and how to obtain Symantec Workspace Virtualization.
  • Workspace Virtualization and Streaming 6.x Admin: Creating a Workspace Virtualization Packager (2 of 10)
    In this module, you learn about application packaging, installing and configuring the Symantec Virtual Composer, and managing applications with Virtual Composer.
  • Workspace Virtualization and Streaming 6.x Admin: Creating Workspace Virtualization Layers (3 of 10)
    In this module, you learn how to create and manage application layers, identify the available layer types and the information they contain, and create a virtual software layer and edit it in the file system or registry. You also learn how to export and import application layers to an archive file.
  • Workspace Virtualization and Streaming 6.x Admin: Managing Application Layers and Data (4 of 10)
    In this module, you learn about layer dependency and how to modify layer visibility. You also learn about adding exclusions, using the "autorun in layer" option, and handling data in layers.
  • Workspace Virtualization and Streaming 6.x Admin: Advanced Virtual Layer Creation (5 of 10)
    In this module, you learn how to capture print drivers with Symantec Workspace Virtualization, and how to create events and scripts to use with virtual layers.
  • Workspace Virtualization and Streaming 6.x Admin: Configuring Workspace Streaming (6 of 10)
    In this module, you learn about Application Streaming, Symantec Workspace Server components, Symantec Workspace Server architecture, installing Symantec Workspace Server, and configuring the server.
  • Workspace Virtualization and Streaming 6.x Admin: Managing Users in Workspace Streaming (7 of 10)
    In this module, you learn how to use the control and management console, add users to the console, provision users and user groups, and manage users within the streaming console.
  • Workspace Virtualization and Streaming 6.x Admin: Preparing Applications for Streaming (8 of 10)
    In this module, you learn how to manage applications; provision users; and set offline access for packages, users, and user groups.
  • Workspace Virtualization and Streaming 6.x Admin: Application Management Policies (9 of 10)
    In this module, you learn how to identify which license descriptor to use, and then configure and allocate the package licenses.
  • Workspace Virtualization and Streaming 6.x Admin: Understanding the Streaming Agent (10 of 10)
    In this module, you learn how to open the Streaming Portal, install an agent, and view the available options.
  • Software Virtualization Solution
    In this course, you will learn the features and benefits SVS offers for your organization including using virtual layers allowing you to instantly activate, deactivate or reset applications and to avoid conflicts between applications, without altering the base Windows installation. This product is now part of the Workspace family of products.
Package Studio
Package Studio 8
  • Wise Package Studio 8 - Platform Support and Installation Changes
    This course covers the enhancements and changes in Wise Package Studio 8.0, including platform support and installation changes.
  • Wise Package Studio 8 - Workbench Tool Changes
    This course covers the enhancements and changes in Wise Package Studio 8.0, including changes to Workbench tools.
Patch Management
Patch Management 6.2
  • Patch Management Solution 6.2
    This course provides an overview of the patch management process, including deploying the software update agent, installing patches and running vulnerability reports.
Endpoint Protection
Endpoint Protection Small Business Edition
Endpoint Protection Small Business Edition 2013
  • Creating and Using Groups in Symantec.cloud (Symantec Endpoint Protection Small Business Edition 2013 (SEPSBE)
    How groups are created and used within the Symantec.cloud management console.
  • Tips For a First Endpoint Protection Firewall Policy (SEPSBE)
    This video describes the changes necessary to the default Smart Firewall rule to enable File and Printer sharing and ping responses from local network computers.
  • Configuring Endpoint Protection Smart Firewall Rules (SEPSBE)
    This video describes how Smart Firewall works and how to configure outbound and inbound rules, protocols & ports, and blocking rules.
  • Creating Policies to Manage Endpoint Computers (SEPSBE)
    This program introduces Symantec.cloud global and service policies.
  • Using the SEPSBE 2013 Set Up Wizard
    Using the Symantec Endpoint Protection Small Business Edition 2013 set up Wizard. This program shows how to activate a new account, enter account information, how to use the cloud deployment options and how to download the On-Premises version.
  • Deploying SEPSBE 2013 with Active Directory on Windows Server 2003
    This video describes the basic steps of deploying Symantec Endpoint Protection Small Business Edition 2013 with Active Directory on Windows Server 2003.
  • Deploying SEPSBE 2013 with Active Directory on Windows Server 2008
    This video shows the basic steps for an Active Directory deployment of Symantec Endpoint Protection Small Business Edition 2013 on Windows Server 2008.
  • Configuring and Using Program Control (SEPSBE)
    This video provides a simple demonstration of configuring and using Program Control on your endpoints.
Endpoint Protection Small Business Edition Administration
  • SEP SBE Admin Lesson 1 Overview (1 of 4)
    This training program provides an overview of the cloud version of Symantec Endpoint Protection Small Business Edition. It also provides a close look at cloud deployment options, policies, and reporting.
  • SEP SBE Admin Lesson 2 Cloud Deployments (2 of 4)
    This training program provides an overview of the cloud version of Symantec Endpoint Protection Small Business Edition. It also provides a close look at cloud deployment options, policies, and reporting.
  • SEP SBE Admin Lesson 3 Cloud Policy (3 of 4)
    This training program provides an overview of the cloud version of Symantec Endpoint Protection Small Business Edition. It also provides a close look at cloud deployment options, policies, and reporting.
  • SEP SBE Admin Lesson 4 Reporting (4 of 4)
    This training program provides an overview of the cloud version of Symantec Endpoint Protection Small Business Edition. It also provides a close look at cloud deployment options, policies, and reporting.
Endpoint Protection 12
Symantec Endpoint Protection 12.x: Administration
  • SEP 12.X ICD: The Symantec Endpoint Protection Product Solution (1 of 20)
    In this module, you learn how to describe the Symantec Endpoint Protection security technologies, product architecture, and components. You are also introduced to site, domain, policy, group, and location concept
  • SEP 12.X ICD: Installing the Symantec Endpoint Protection Manger (2 of 20)
    In this module, you learn how to identify system requirements, prepare servers for installation, and install and configure the Symantec Endpoint Protection Manager (SEPM), and how to upgrade Symantec Endpoint Protection 12.x managers and clients to SEP 12.X.6.
  • SEP 12.X ICD: Configuring the Symantec Endpoint Protection Manager (3 of 20)
    In this module, you learn how to start and navigate the SEPM, describe policy types and policy components, authenticate to the console, and license the SEP 12.X environment.
  • SEP 12.X ICD: Deploying Windows Clients (4 of 20)
    In this module, you learn the hardware and software requirements for SEP 12.X clients and how to prepare those clients for deployments. You also learn the different SEP 12.X deployment methods, and how to create installation packages, settings, and features for managed and unmanaged clients
  • SEP 12.X ICD: Deploying Mac and Linux Clients (5 of 20)
    You learn how to choose the best methods to deploy SEP for Mac and Linux clients.
  • SEP 12.X ICD: Client and Policy Management (6 of 20)
    In this module, you learn how the client communicates with the SEPM and how to perform client administration. You also learn how to configure groups, locations, client configuration modes, and domains. In addition, you learn how to integrate SEP 12.X with Active Directory.
  • SEP 12.X ICD: Configuring Content Updates for Windows Clients (7 of 20)
    In this module, you learn how to configure the SEPM and clients for content updates using LiveUpdate. You also learn how to configure single and multiple group update providers (GUPs), and how to manually update virus definitions
  • SEP 12.X ICD: Configuring Content Updates for Mac and Linux Clients (8 of 20)
    In this module, you learn how to keep Mac and Linux clients up to date with the latest available content. You also learn how to configure how and when the Mac and Linux clients retrieve content. In addition, you learn how to configure the SEPM’s Apache Web server as a proxy server so that Mac and Linux clients can retrieve content from the SEPM
  • SEP 12.X ICD: Performing Server and Database Management (9 of 20)
    In this module, you learn how to manage SEPM servers, maintain server security, communicate with other servers, and manage administrators and the database. This module also covers disaster recovery technique
  • SEP 12.X ICD: Configuring Replication and Failover and Load Balancing (10 of 20)
    In this module, you learn how replication works. You also learn how to configure replication and failover and load balance
  • SEP 12.X IC: Designing a Symantec Endpoint Protection Environment (11 of 20)
    In this module, you learn how to architect a SEP 12.X environment. This module describes how to determine client-to-SEPM ratios, determine content distribution methods, and size the database
  • SEP 12.X MA: Introducing Antivirus, Insight, and SONAR (12 of 20)
    In this module, you learn how protection technologies are used to protect your clients. This module describes file repuation, and Download Insight, Auto-Protect, and SONAR scans.
  • SEP 12.X MA: Managing Virus and Spyware Protection Policies for Windows (13 of 20)
    In this module, you learn how to configure the Virus and Spyware policy, including Download Protection, Insight, AutoProtect, and SONAR.
  • SEP 12.X MA: Managing Virus and Spyware Protection Policies for Mac and Linux (14 of 20)
    In this module, you learn how to configure scheduled scans, Auto-Protect, and Miscellaneous settings for Mac and Linux clients
  • SEP 12.X MA: Managing Exception Policies (15 of 20)
    In this module, you learn how to create exceptions for Windows and Mac clients
  • SEP 12.X MA: Introducing Network Threat Protection (16 of 20)
    In this module, you describe the OSI model (networking) and learn where in the model attacks are targeted. You also learn how attacks occur and how Symantec Endpoint Protection mitigates those attacks.
  • SEP 12.X MA: Managing Firewall Policies (17 of 20)
    In this module, you learn how to configure the firewall, define rule components, configure built-in rules, protection, and stealth settings, and Windows integration.
  • SEP 12.X MA: Managing Intrusion Prevention Policies (18 of 20)
    In this module, you configure network and browser intrusion prevention to prevent network and browser attacks using Symantec signatures. You also learn how to create custom signatures.
  • SEP 12.X MA: Compliance Management (19 of 20)
    In this module, you learn how to restrict access to applications and devices using the Application and Device Control and System Lockdown. You also learn how to keep your client’s security polices compliant using Host Integrity.
  • SEP 12.X MA: Virtualization (20 of 20)
    In this module, you learn how SEP 12. 1 manages virtual servers and clients. You also learn about virtual image exception, network and vShield shared insight cache, virtual client tagging, and the offline image scanner
Endpoint Protection 12.1.6
  • Protecting the Endpoint with Application and Device Control (1 of 4)
    This module describes how to protect your endpoint with Application and Device Control and why Application and Device Control is an important part of your Symantec Endpoint Protection environment.
  • Configuring Application and Device Control (2 of 4)
    This module describes how to configure Application and Device Control to block peer-to-peer software usage, disable Auto Run and allow only approved USB drives and block all other USB devices.
  • Protecting the Endpoint with System Lockdown (3 of 4)
    This module describes how to use System Lockdown to protect different types of endpoints, such as ATMs, Servers, Point-of-Sale devices and secured desktops. The module also describes file fingerprint concepts and the difference between whitelisting and blacklisting mode and how to determine which mode is best suited for your environment.
  • Configuring System Lockdown (4 of 4)
    This module shows you how to create file fingerprint lists used by System Lockdown to protect unwanted applications from being installed on embedded or desktop systems. You also learn how to configure System Lockdown in test only mode and after testing, enable system lockdown in production mode.
  • Preparing your server for the Endpoint Protection Manager installation (1 of 3)
    In this video, you learn how to ensure that your Symantec Endpoint Protection Manager (SEPM) server meets the installation requirements, locate and register your Symantec Endpoint Protection software license, and download the Symantec Endpoint Protection software. .
  • Installing Endpoint Protection Manager (2 of 3)
    In this video, you learn how to install the Symantec Endpoint Protection Manager (SEPM), activate your SEPM license, and create groups for deploying software to Symantec Endpoint Protection (SEP) clients.
  • Deploy Endpoint Protection client software using the Client Deployment Wizard (CDW) (3 of 3)
    In this video, you learn how to prepare client computers for deployment, deploy SEP client software using the CDW, and ensure that clients are communicating with the SEPM.
  • Resetting the Endpoint Protection Manager (SEPM) password (1 of 1)
    In this video, you learn which authentication methods the SEPM supports and how to reset the administrator password using the Forget Password link shown on the SEPM logon page.
  • Benefits of IT Analytics (1 of 3)
    In this video, you learn how IT Analytics can benefit your organization through customized reporting. This video describes the reporting solution and its benefits.
  • Implementing IT Analytics (2 of 3)
    In this video, you learn the installation requirements and how to install IT Analytics.
  • Configuring IT Analytics (3 of 3)
    In this video, you learn how configure IT Analytics to retrieve events from the SEPM and how to customize reports and views.
Endpoint Protection 12.1.5 Power Eraser
  • Introducing Power Eraser Part 1 of 2
    In this short video, you learn what Power Eraser is and why you run Power Eraser. You also learn the differences between running Power Eraser from the SEPM and SymHelp and how Power Eraser differs from Virus and Spyware Scans.
  • Running PowerEraser Part 2 of 2
    In this short video, you learn when to run Power Eraser and the tasks to perform before running PowerEraser. You also learn from where you can run PowerEraser.
Endpoint Protection 12.1.5 Monitoring and Reporting
  • SEP 12.1.5 Monitoring Reports (1 of 3)
    This module describes which reports are useful and how to generate quick and scheduled reports.
  • SEP 12.1.5 Monitoring Notifications (2 of 3)
    This module describes how to set conditions for security events, such as when client definitions are out date. You also learn how to configure your email so that when events occur, notifications are sent immediately.
  • SEP 12.1.5 Configuring Reports and Notifications (3 of 3)
    This module describes how to set thresholds that trigger notifications. For example, if the SEPM is offline for more than x number of hours a notification is sent, or if 50 or more of your clients have definitions that are more than five days out of date, a notification is sent.
  • Monitoring SEPM Logs Part 1 of 2
    In this short video, you learn how to use logs to troubleshoot client problems, perform daily and weekly health checks, collect granular data from endpoints and use logs for Security incidence monitoring. You also learn the different logs types, log retention, and log handling settings.
  • Analyzing SEPM Logs Part 2 of 2
    In this short video, you learn why it is useful to review logs to identify frequent offenders during a virus outbreak, check security status, and provide meaningful data to management. You also learn how to export logs to Excel and analyze the results.
Endpoint Protection 12.1.5 Host Integrity
  • Introducing Host Integrity (1 of 3)
    In this short video, you learn how Host Integrity, using a series of checks, ensures that endpoints are protected and compliant. You also learn when a client is not compliant, how the client performs self remediation.
  • Configuring Host Integrity (2 of 3)
    In this short video, you learn how to identify Host Integrity requirements,configure a Host Integrity policy, and describe the Host Integrity process flow.
  • Troubleshooting Host Integrity (3 of 3)
    In this short video, you learn why a client may fail a Host Integrity check and how to use a systematic troublehsooting approach to a provide a solution.
Endpoint Protection 12.1.5 and 12.1.6 Differences and What's New
  • Symantec Endpoint Protection 12.1.5 Differences
    In this presentation, you learn new Symantec Endpoint Protection 12.1.5 features. Features include LiveUpdate content optimization and the addition of Host Integrity and IT Analytics to SEP 12.1.5.
  • What is New in Symantec Endpoint Protection 12.1.6
    In this presentation, you learn new Symantec Endpoint Protection 12.1.6 features. Features include additional support for embedded operating systems and new write filter drivers. New System Lockdown features and smaller SEP client installation packages are also supported in SEP 12.16.
Endpoint Protection 12.1.4 Administration
  • SEP 12.1 Install, Configure, & Deploy: Course Introduction (1 of 26)
    This module introduces you to the Symantec Endpoint Protection 12.1: Administration course.
  • SEP 12.1 Install, Configure, & Deploy: The Symantec Endpoint Protection Product Solution (2 of 26)
    In this module, you learn how to describe the Symantec Endpoint Protection security technologies, product architecture, and components. You are also introduced to site, domain, policy, group, and location concepts.
  • SEP 12.1 Install, Configure, & Deploy: Installing the Symantec Endpoint Protection Manger (3 of 26)
    In this module, you learn how to identify system requirements, prepare servers for installation, and install and configure the Symantec Endpoint Protection Manager (SEPM), and how to upgrade Symantec Endpoint Protection 11.x managers and clients to SEP 12.1.
  • SEP 12.1 Install, Configure, & Deploy: Configuring the Symantec Endpoint Protection Manager (4 of 26)
    In this module, you learn how to start and navigate the SEPM, describe policy types and policy components, authenticate to the console, and license the SEP 12.1 environment.
  • SEP 12.1 Install, Configure, & Deploy: Deploying Windows Clients (5 of 26)
    In this module, you learn the hardware and software requirements for SEP 12.1 clients and how to prepare those clients for deployments. You also learn the different SEP 12.1 deployment methods, and how to create installation packages, settings, and features for managed and unmanaged clients.
  • SEP 12.1 Install, Configure, & Deploy: Deploying Mac Clients (6 of 26)
    This module identifies critical SEPM reports for use during a virus outbreak. It also introduces IT Analytics and describes how to create reports in ITA.
  • SEP 12.1 Install, Configure, & Deploy: Client and Policy Management (Part 1) (7 of 26)
    In this module, you learn how the client communicates with the SEPM and how to perform client administration. You also learn how to configure groups, locations, client configuration modes, and domains. In addition, you learn how to integrate SEP 12.1 with Active Directory.
  • SEP 12.1 Install, Configure, & Deploy: Client and Policy Management (Part 2) (8 of 26)
    In this module, you learn how the client communicates with the SEPM and how to perform client administration. You also learn how to configure groups, locations, client configuration modes, and domains. In addition, you learn how to integrate SEP 12.1 with Active Directory.
  • SEP 12.1 Install, Configure, & Deploy: Configuring Content Updates for Windows Clients (Part 1) (9 of 26)
    SEP 12.1 Install, Configure, & Deploy: Configuring Content Updates for Windows Clients (Part 1) (9 of 26)
  • SEP 12.1 Install, Configure, & Deploy: Configuring Content Updates for Windows Clients (Part 2) (10 of 26)
    This module continues Configuring Content Updates for Windows Clients (Part 1) with Configuring the Live Update Policy for Clients.
  • SEP 12.1 Install, Configure, & Deploy: Configuring Content Updates for Mac Clients (11 of 26)
    In this module, you learn how to keep the SEP for Mac client up to date with the latest available content. You also learn how to configure how and when the SEP for Mac client retrieves content. In addition, you learn how to configure the SEPM’s Apache Web server as a proxy server so that clients can retrieve content from the SEPM.
  • SEP 12.1 Install, Configure, & Deploy: Performing Server and Database Management (12 of 26)
    In this module, you learn how to manage SEPM servers, maintain server security, communicate with other servers, and manage administrators and the database. This module also covers disaster recovery techniques.
  • SEP 12.1 Install, Configure, & Deploy: Configuring Replication and Failover and Load Balancing (13 of 26)
    In this module, you learn how replication works. You also learn how to configure replication and failover and load balancing.
  • SEP 12.1 Install, Configure, & Deploy: Designing a Symantec Endpoint Protection Environment (Part 1) (14 of 26)
    In this module, you learn how to architect a SEP 12.1 environment. This module describes how to determine client-to-SEPM ratios, determine content distribution methods, and size the database.
  • SEP 12.1 Install, Configure, & Deploy: Designing a Symantec Endpoint Protection Environment (Part 2) (15 of 26)
    This modules continues Designing a Symantec Endpoint Protection Environment Part 1 with Replication Principles: Content and Backend
  • SEP 12.1 Manage & Administer: Introducing Antivirus, Insight, and SONAR (16 of 26)
    In this module, you learn how protection technologies are used to protect your clients. This module describes file reputation, Download Insight, Auto-Protect, and SONAR scans.
  • SEP 12.1 Manage & Administer: Managing Virus and Spyware Protection Policies for Windows (Part 1) (17 of 26)
    In this module, you learn how protection technologies are used to protect your clients.This module also describes file reputation, Download Insight, Auto-Protect, and SONAR scans.
  • SEP 12.1 Manage & Administer: Managing Virus and Spyware Protection Policies for Windows (Part 2) (18 of 26)
    This module continues Managing Virus and Spyware Protection Policies Part 1 with Configuring SONAR.
  • SEP 12.1 Manage & Administer: Managing Virus and Spyware Protection Policies for Mac (19 of 26)
    In this module, you learn how to configure scheduled scans, Auto-Protect, and Miscellaneous settings for Mac clients.
  • SEP 12.1 Manage & Administer: Managing Exception Policies (20 of 26)
    In this module, you learn how to create exceptions for Windows and Mac clients.
  • SEP 12.1 Manage & Administer: Introducing Network Threat Protection (21 of 26)
    In this module, you describe the OSI model (networking) and learn where in the model attacks are targeted. You also learn how attacks occur and how Symantec Endpoint Protection mitigates those attacks.
  • SEP 12.1 Manage & Administer: Managing Firewall Policies (Part 1) (22 of 26)
    In this module, you learn how to configure the firewall, define rule components, configure built-in rules, protection, and stealth settings, and Windows integration.
  • SEP 12.1 Manage & Administer: Managing Firewall Policies (Part 2) (23 of 26)
    This module continues Managing Firewall Policies Part 1 with Built-in rules: Smart DHCP, DNS, and WINS.
  • SEP 12.1 Manage & Administer: Managing Intrusion Prevention Policies (24 of 26)
    In this module, you configure network and browser intrusion prevention to prevent network and browser attacks using Symantec signatures. You also learn how to create custom signatures.
  • SEP 12.1 Manage & Administer: Managing Application and Device Control Policies (25 of 26)
    In this module, you learn how to restrict access to applications and devices using the Application and Device Control policy.
  • SEP 12.1 Manage & Administer: Virtualization (26 of 26
    In this module, you learn how SEP 12.1 manages virtual servers and clients. You also learn about virtual image exception, network and vShield shared insight cache, virtual client tagging, and the offline image scanner.
Endpoint Protection 12.1 Maintain and Troubleshoot
  • SEP 12.x Maintain and Tbshoot: Introduction (1 of 9)
    This module provides an introduction to the “SEP 12.x Maintain and Troubleshoot” course.
  • SEP 12.x Maintain and Tbshoot: Troubleshooting Techniques and Tools (2 of 9)
    This module presents an overview of the tools and techniques which are helpful when troubleshooting Symantec Endpoint Protection problems. It also describes which SEPM and SEP logs to use when troubleshooting specific issues and also how to use the Symantec Knowledge Base and interact with Symantec Technical Support.
  • SEP 12.x Maintain and Tbshoot: Console Troubleshooting (3 of 9)
    This module describes the main SEPM processes, components and ports. It also outlines common problems when logging onto the SEPM console and how to troubleshoot database, certificate and passwords issues.
  • SEP 12.x Maintain and Tbshoot: Installation and Migrations Issues (4 of 9)
    This module provides an overview of common issues when installing and upgrading the SEPM and SEP clients. This module also includes troubleshooting Windows, Mac, and Linux client deployments.
  • SEP 12.x Maintain and Tbshoot: Client Communication issues (5 of 9)
    This module describes the interaction between the client and the SEPM. The module also details the heartbeat process and the logs required to troubleshoot communication issues.
  • SEP 12.x Maintain and Tbshoot: Content Distribution Issues (6 of 9)
    This module describes the LiveUpdate process, which ensures the SEPM and clients have up-to-date content. The module also describes the logs to reference when troubleshooting content distribution problems. In addition, this module describes how to manage and monitor Group Update Providers (GUP)s.
  • SEP 12.x Maintain and Tbshoot: Reporting (7 of 9)
    This module identifies critical SEPM reports for use during a virus outbreak. It also introduces IT Analytics and describes how to create reports in ITA.
  • SEP 12.x Maintain and Tbshoot: Incident Handling (8 of 9)
    This module describes the best approach to handling a virus outbreak and how identify, handle, and submit false positives to support.
  • SEP 12.x Maintain and Tbshoot: Performance Issues (9 of 9)
    This module describes useful tools and methods to assess and optimize performance on the SEPM and client.
Endpoint Protection 12.1.5 Troubleshooting Topics
  • Video: Troubleshooting Console Issues (1 of 8)
    In this short video, you learn how to troublehoot a SEPM console connection issue with an MS SQL database.
  • Video: Troubleshooting LiveUpdate Configuration Issues (2 of 8)
    In this short video, you learn how to troubleshoot a LiveUpdate content download issue on a poorly configured SEPM.
  • Video: Troubleshooting LiveUpdate Connection Issues (3 of 8)
    This module describes how to deploy SEP client packages using the single executable method.
  • Troubleshooting Client Installation Issues (4 of 8)
    In this short video, you learn how to troubleshoot a failed SEP client installation by reviewing key logs and running SymHelp and Windows Installer. You also learn how to successfully re-deploy the client.
  • Troubleshooting Client Communication Issues (5 of 8)
    In this short video, you learn how to troubleshoot a client that is unable to communicate with the SEPM by reviewing settings and running SymHelp. You also learn how to deploy new communication settings to the client.
  • Troubleshooting Group Update Providers (6 of 8)
    In this short video, you learn how to configure a client as a GUP. You also learn how to configure clients to retreive LiveUpdate content from a GUP. In addition you learn how to ensure tha clients are retrieving content from a GUP.
  • Troubleshooting a Replication Issue (7 of 8)
    In this short video, you learn how to troubleshoot and resolve a replication issue by examining Tomcat logs and other areas of the SEPM.
  • Troubleshooting Performance Issues (8 of 8)
    In this short video, you learn how to idenitfy and troubleshoot SEP performance issues with Windows Task Manager and Symantec Help.
Ghost Solution Suite
Ghost Solution Suite 3.0
  • Ghost Solution Suite 3.0 for Administrators eLearning
    The Symantec Ghost Solution Suite 3.0: Administration eLearning course is designed for the professional tasked with installing, configuring, and managing an imaging system. This web based training module covers the basics on how Ghost Solution Suite 3.0 simplifies the routine tasks of setting up new computers, migrating computers to a new operating system, and moving users to new operating systems or hardware. Students will learn how to install, configure, and use Ghost Solution Suite to perform routine imaging related tasks.
Ghost Solution Suite 2.5
  • Ghost Solution Suite 2.5 - Creating Boot Packages
    This module discusses the purpose of boot packages and how to create boot packages in Ghost Solution Suite.
  • Ghost Solution Suite 2.5 - Using Boot Packages
    This module discusses the various methods for using boot packages created with Ghost Solution Suite’s boot package building tools.
  • Ghost Solution Suite 2.5 - Creating and Restoring Images
    This module discusses how to create and restore images using the imaging components in Ghost Solution Suite Ghost and Image Center.
  • Ghost Solution Suite 2.5 - Creating and Restoring Master Images
    This module discusses how to create and restore a hardware independent master image that can be used to deploy computers across an organization.
  • Ghost Solution Suite 2.5 - Deploying Images
    This module discusses how to deploy images using the multicasting technologies included in Ghost Solution Suite.
  • Ghost Solution Suite 2.5 - Automating the Creation and Restoration of Images
    This module discusses the basics of using Ghost and Image Center’s automation features to create and restore images.
Managed Security Services
  • Using the Managed Services Web Portal (1 of 1)
    This course offers a series of interactive simulations that step you through many common tasks in the Symantec Managed Services portal. The course uses a role-based approach that customizes the set of topics presented to you based on the type of network security job you perform in your organization.
  • Symantec Managed Security Services Portal FAQ
    This FAQ provides answers to frequently-asked questions about the functionality and use of the MSS portal from the customer perspective. It also includes a series of interactive simulations that show MSS customers how to perform some common activities in the portal.
Messaging Gateway
Messaging Gateway 10.5
  • Symantec Messaging Gateway 10.5 Administration: What’s New in 10.5
    This module introduces features and functions for the 10.5 release of the Symantec Messaging Gateway.
Messaging Gateway 10.0
  • Messaging Gateway 10.0: Admin - Introduction to Messaging Gateway 10.0 (1 of 9)
    This module provides an introduction to Symantec Messaging Gateway 10.0. It also describes its features and architecture.
  • Messaging Gateway 10.0: Admin - Installation and Configuration (2 of 9)
    This module covers how to install and configure Symantec Messaging Gateway 10.0.
  • Messaging Gateway 10.0: Admin - Adaptive Reputation Management (3 of 9)
    This module describes Adaptive Reputation Management in Symantec Messaging Gateway 10.0.
  • Messaging Gateway 10.0: Admin - Anti-Spam Policies (4 of 9)
    This module covers how to create anti-spam policies in Symantec Messaging Gateway 10.0. It also introduces bounce attack prevention.
  • Messaging Gateway 10.0: Admin - Anti-Malware Policies (5 of 9)
    This module covers how to create antimalware policies in Symantec Messaging Gateway 10.0. It also covers configuration of LiveUpdate and scan settings.
  • Messaging Gateway 10.0: Admin - Content Filtering Policy (6 of 9)
    This module covers how to setup content filtering scanning. It also describes how to use content filtering policy for structured data matching.
  • Messaging Gateway 10.0: Admin - Managing User and Host Configuration (7 of 9)
    This module covers how to manage user and host configuration in Symantec Messaging Gateway 10.0.
  • Messaging Gateway 10.0: Admin - Managing Control Center Settings (8 of 9)
    This module covers how to configure control center settings of Symantec Messaging Gateway 10.0.
  • Messaging Gateway 10.0: Admin - Leveraging Network Prevent for E-mail (9 of 9)
    This module covers how Symantec Messaging Gateway 10.0 and Network Prevent for E-mail interact.
Messaging Gateway 9.5
  • Messaging Gateway 9.5 Admin Lesson 1- Introduction to Messaging Gateway 9.5
    In this module, you receive an introduction to the Messaging Gateway 9.5, learn about its key features, architecture, and deployment.
  • Messaging Gateway 9.5 Admin Lesson 2- Installation and Configuration
    In this module, you learn about the installation prerequisites, an overview of virtualization, how to install and configure Messaging Gateway, and an overview of the Control Center.
  • Messaging Gateway 9.5 Admin Demo- Installation and Configuration -A-
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Messaging Gateway 9.5 Admin Demo- Installation and Configuration -B-
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Messaging Gateway 9.5 Admin Demo- Installation and Configuration -C-
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Messaging Gateway 9.5 Admin Lesson 3- Adaptive Reputation Management
    In this module, you learn about the Reputation tab, how global IP reputation works, configuring bad senders policies, connection classifications, and good senders policies, and how to use the Find Sender and IP Reputation Lookup tools.
  • Messaging Gateway 9.5 Admin Demo- Adaptive Reputation Management -A-
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Messaging Gateway 9.5 Admin Demo- Adaptive Reputation Management -B-
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Messaging Gateway 9.5 Admin Demo- Adaptive Reputation Management -C-
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Messaging Gateway 9.5 Admin Demo- Adaptive Reputation Management -D-
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Messaging Gateway 9.5 Admin Lesson 4- Anti-Spam Policies
    In this module, you learn about the Spam tab, the Email Spam Policy, how to modify spam quarantine and spam scan settings, and how to configure sender authentication.
  • Messaging Gateway 9.5 Admin Demo- Anti-Spam Policies -A-
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Messaging Gateway 9.5 Admin Demo- Anti-Spam Policies -B-
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Messaging Gateway 9.5 Admin Demo- Anti-Spam Policies -C-
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Messaging Gateway 9.5 Admin Demo- Anti-Spam Policies -D-
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Messaging Gateway 9.5 Admin Demo- Anti-Spam Policies -E-
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Messaging Gateway 9.5 Admin Demo- Anti-Spam Policies -F-
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Messaging Gateway 9.5 Admin Demo- Anti-Spam Policies -G-
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Messaging Gateway 9.5 Admin Lesson 5- Anti-Virus Policies
    In this module, you learn about the Virus tab, LiveUpdate settings, the Email Virus Policy, creating a new virus policy, configuring settings for virus quarantine, and viewing the suspect virus message quarantine.
  • Messaging Gateway 9.5 Admin Demo- Anti-Virus Policies -A-
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Messaging Gateway 9.5 Admin Demo- Anti-Virus Policies -B-
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Messaging Gateway 9.5 Admin Demo- Anti-Virus Policies -C-
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Messaging Gateway 9.5 Admin Demo- Anti-Virus Policies -D-
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Messaging Gateway 9.5 Admin Lesson 6- Content Filtering Policy
    In this module, you learn about the Content tab, content filtering scanning, creating a content filtering policy, guidelines for multiple content filtering policies, using content filtering policies for structured data matching, and incident management.
  • Messaging Gateway 9.5 Admin Demo- Content Filtering Policy -A-
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Messaging Gateway 9.5 Admin Demo- Content Filtering Policy -B-
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Messaging Gateway 9.5 Admin Demo- Content Filtering Policy -C-
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Messaging Gateway 9.5 Admin Demo- Content Filtering Policy -D-
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Messaging Gateway 9.5 Admin Demo- Content Filtering Policy -E-
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Messaging Gateway 9.5 Admin Demo- Content Filtering Policy -F-
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Messaging Gateway 9.5 Admin Lesson 7- Managing User and Host Configuration
    In this module, you learn about the Administration tab, the Users section, and the Hosts section.
  • Messaging Gateway 9.5 Admin Demo- Managing User and Host Configuration -A-
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Messaging Gateway 9.5 Admin Demo- Managing User and Host Configuration -B-
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Messaging Gateway 9.5 Admin Lesson 8- Managing Control Center Settings
    In this module, you learn to configure alerts, manage certifications, configure Control Center settings, and manage directory integration and other Control Center settings.
  • Messaging Gateway 9.5 Admin Demo- Managing Control Center Settings -A-
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Messaging Gateway 9.5 Admin Demo- Managing Control Center Settings -B-
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Messaging Gateway 9.5 Admin Demo- Managing Control Center Settings -C-
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Messaging Gateway 9.5 Admin Lesson 9- Leveraging Network Prevent for Email
    In this module, you receive an introduction to Network Prevent for Email, how to configure Network Prevent for Email, failure behavior with Network Prevent for Email, resolving delivery queue backups, and reporting.
Symantec Mail Security 6.5
  • Sym Mail Security 6.5 for MS Exchange: Introduction to SMSMSE (1 of 8)
    In this module, you are given background on e-mail security in general, get a summary on e-mail security available from Symantec, and are introduced to the Symantec Mail Security for Microsoft Exchange product.
  • Sym Mail Security 6.5 for MS Exchange: Antispam and Antivirus Protection (2 of 8)
    This module provides background on the nature of spam and viruses and how Symantec protects your environment against them.
  • Sym Mail Security 6.5 for MS Exchange: Architecture Overview (3 of 8)
    This module looks at the elements of a typical Microsoft Exchange environment and how it integrates with Symantec’s Mail Security for Microsoft Exchange product.
  • Sym Mail Security 6.5 for MS Exchange: Installation and Deployment (4 of 8)
    This module deals with issues and concepts of preparing to install, and then installing, SMSMSE in an organization.
  • Sym Mail Security 6.5 for MS Exchange: Content Enforcement (5 of 8)
    This module shows you how SMSMSE scans and filters e-mail content for threats, as well as how to configure SMSMSE to do this.
  • Sym Mail Security 6.5 for MS Exchange: Management and Administration (6 of 8)
    This module provides background on using SMSMSE to perform management and administrative tasks.
  • Sym Mail Security 6.5 for MS Exchange: Troubleshooting SMSMSE (7 of 8)
    This module provides guidance on how to troubleshoot issues within SMSMSE, including installation and scanning issues.
  • Sym Mail Security 6.5 for MS Exchange: SMSMSE 6.5.5 Differences (8 of 8)
    This lesson provides background on the new features and fixes included in the 6.5.5 release of SMSMSE.
Symantec Web Gateway 5.0
  • Symantec Web Gateway 5.0 Training
    This lesson covers the topics of common architecture, hardware and licensing, preparing for installation, and installation.
Mobile Management Solution
Symantec App Center
  • Symantec App Center: App Policies
    This video covers the different App Policies available in App Center and their functions.
  • Symantec App Center: Add and Distribute Apps using Symantec App Center
    This short training show how to add and distribute Apps to your end user mobile devices using Symantec App Center, the different types of Apps that can be added, and what end-users see on their mobile devices.
  • Symantec App Center and Mobile Device Management
    This short video explains how Symantec App Center utilizes Mobile Device Management (MDM) to more effectively help organizations manage their mobile devices, including some of the key features and abilities MDM provides.
Mobile Management Solution 7.1
  • Sym Mobile Mgmt Solution 7.1- Overview of Sym Mobile Mgmt Solution (1 of 6)
    In this lesson, you will gain an understanding of Symantec Mobile Management solution along with its features and capabilities as well as an understanding of the supported device operating systems.
  • Sym Mobile Mgmt Solution 7.1- Installing Sym Mobile Mgmt 7.1 (2 of 6)
    In this lesson, you will learn the installation prerequisites along with the supported mobile devices that can be managed using Mobile Management Solution. It will also discuss the different required and optional certificates that are used along with where they need to be placed. Next, you will learn about the Licensing model, the architecture of Mobile Management Solution, the possible link of MMS and Exchange ActiveSync and the installation and configuration of Mobile Management Solution.
  • Sym Mobile Mgmt Solution 7.1- Install the Mobile Agent and Enroll iOS Devices (3 of 6)
    In this lesson, you learn how to install the Mobile Management Agent on iOS (Apple) devices and how to complete the mobile enrollment process to add your devices to the Management Server. You also learn how to install the agent on Windows Mobile and Blackberry devices.
  • Sym Mobile Mgmt Solution 7.1- Managing Devices using Profiles and Policies (4 of 6)
    In this lesson, you learn how to create and configuration iOS Configuration Profiles, Mobile Configuration Policies and Exchange ActiveSync Policies.
  • Sym Mobile Mgmt Solution 7.1- Apple iOS, Windows Mobile, and BlackBerry Actions and Software Support (5 of 6)
    In this lesson, you learn about the Mobile Library and it’s usage with iOS devices and about the process of creating new Mobile Library Feeds. You will also learn about the App Store feature on mobile devices and what actions are available for iOS devices and how to initiate them. Next, we will discuss remote management and actions for Windows Mobile and BlackBerry devices and managing software on Window Mobile devices.
  • Sym Mobile Mgmt Solution 7.1- Inventory and Reports (6 of 6)
    In this lesson, you learn how to configure the inventory process schedule used by Mobile management Solution and how to locate, view and refresh reports. You will also learn how to view more detailed data using the ResourceManager.
Security Information Manager
Security Information Manager 4.7
  • SIM 4.7 Administration: Introduction to Symantec Security Information Manager (1 of 10)
    This module discusses current information security challenges; Symantec Security Information Manager’s features, functionality, and hardware and third-party software specifications and recommendations; and the concepts of collection, correlation, normalization, filtering, and event aggregation in Symantec Security Information Manager.
  • SIM 4.7 Administration: Deployment Planning and Installation (2 of 10)
    This module discusses Symantec Security Information Manager’s components and system architecture, deployment strategies in different scenarios, and software installation options for the Symantec Security Information Manager server.
  • SIM 4.7 Administration: Introduction to the SSIM Console (3 of 10)
    This module discusses the main features of the Symantec Security Information Manager Java console and how to install the console.
  • SIM 4.7 Administration: Configuration (4 of 10)
    This module discusses basic Symantec Security Information Manager configurations; different directory configurations, users, groups, and roles; and integrating critical asset information in the Symantec Security Information Manager ecosystem.
  • SIM 4.7 Administration: Event System (5 of 10)
    This module discusses the main concepts and components of the event system; configuring, viewing, and working with events from the Symantec Security Information Manager console; and configuring event forwarding between Symantec Security Information Manager servers.
  • SIM 4.7 Administration: An Incident Life Cycle (6 of 10)
    This module discusses the processes used by Symantec Security Information Manager to filter, normalize, and correlate events into incidents; provides a complete walkthrough of the incidents management process; and describes how to manage help desk tickets processes with Symantec Security Information Manager.
  • SIM 4.7 Administration: Collectors (7 of 10)
    This module discusses the architecture and components of Symantec Security Information Manager’s collectors; registering and activating a collector, and filtering and aggregating events; configuring the Check Point, Cisco ASA, and Juniper NetScreen firewall products to work with their corresponding Symantec Security Information Manager collectors, as well as configuring the collector sensors for these products; configuring Syslog Director to forward syslog events to other collectors; configuring the ISS SiteProtector database collector and the Microsoft Windows Event Collector; the purpose and functionality of the Universal Event Collectors; and installing the Universal Event Collectors.
  • SIM 4.7 Administration: Rules (8 of 10)
    This module discusses basic concepts of Symantec Security Information Manager rules and the correlation manager, complex dynamic rules with DeepSight Attack Database content and asset information, and the possible configurations and customizations of Symantec Security Information Manager rules.
  • SIM 4.7 Administration: Security Monitoring and Reporting (9 of 10)
    This module discusses improve security monitoring capabilities with Symantec Security Information Manager; creating and managing Symantec Security Information Manager reports; and creating, customizing, and managing Symantec Security Information Manager console dashboards.
  • SIM 4.7 Administration: System Maintenance (10 of 10)
    This module discusses best practices for keeping Symantec Security Information Manager updated, performing and monitoring database maintenance tasks, the options available from the Symantec Security Information Manager Web administration home page, troubleshooting techniques, and locating the main Symantec Security Information Manager log files.
Symantec Protection Engine
Symantec Protection Engine 7.5
  • Overview and Architecture (1 of 3)
    In this lesson, you learn about what the solution actually does and the different components of the architecture. From there you will learn specifics about the different product variance to include Cloud Services and Network Attached Storage.
  • SPE 7.5: Installation and Deployment (2 of 3)
    In this lesson, you learn the required hardware and software for installation along with the supported platforms. You will also learn about install steps, deployment options, and sizing and use cases.
  • SPE 7.5: Product installation and demonstration (3 of 3)
    In this lesson, you see the installation and configuration process for the solution.
Symantec Protection Center
Symantec Protection Center 2
  • Protection Center 2.0: Admin: Introduction (1 of 4)
    In this lesson, you examine the major security challenges confronting your organization and how Symantec can help you overcome those obstacles.
  • Protection Center 2.0: Admin: Inside Symantec Protection Center 2.0 (2 of 4)
    In this lesson, you examine the inner workings of Symantec Protection Center 2.0 and how it integrates with security applications.
  • Protection Center 2.0: Admin: Installing Symantec Protection Center 2.0 (3 of 4)
    In this lesson, you learn how to install Symantec Protection Center 2.0 as a Soft Appliance and as a Virtual Appliance.
  • Protection Center 2.0: Admin: Working With Symantec Protection Center 2.0 (4 of 4)
    In this lesson, you learn to configure the Protection Center and work with integrated applications.
User Authentication
Managed PKI
  • Symantec Managed PKI Use-case Demos: Adobe CDS User Document Signing
    Symantec Managed PKI Use-case Demos: Adobe CDS User Document Signing (Job Aid in PDF format – download PDF to launch embedded video)
  • Symantec Managed PKI Use-case Demos: BYOD Apple iOS device connecting to Wi-Fi access point using EAP-TLS authentication protocol
    Symantec Managed PKI Use-case Demos: BYOD Apple iOS device connecting to Wi-Fi access point using EAP-TLS authentication protocol (Job Aid in PDF format – download PDF to launch embedded video)
  • Symantec Managed PKI Use-case Demos: Windows PC VPN auto-configuration using PKI Client auto-enrollment with post-processing
    Symantec Managed PKI Use-case Demos: Windows PC VPN auto-configuration using PKI Client auto-enrollment with post-processing (Job Aid in PDF format – download PDF to launch embedded video)
  • Symantec Managed PKI Use-case Demos: Windows PC SMIME Outlook auto-configuration using PKI Client manual approval with post-processing
    Symantec Managed PKI Use-case Demos: Windows PC SMIME Outlook auto-configuration using PKI Client manual approval with post-processing (Job Aid in PDF format – download PDF to launch embedded video)
  • Public Key Infrastructure (PKI) Basics
    This module contains fundamentals of applied cryptography, X.509 certificates, Public Key Infrastructure fundamentals.
Validation and ID Protection VIP
  • Symantec Validation and ID Protection Services 9.X: VIP 9.X Technical Solution Overviewame: VIP Technical Solution Overview (1 of 4)
    This lesson covers part 1 of technical foundations for Symantec Validation and Identity Protection services. Lesson topics include an understanding of the need for VIP and strong authentication solutions faced by Symantec customers today. Second, this lesson will provide a high level review of the VIP solution. Lastly, this lesson will review the various credential types and options for Symantec customer when deploying VIP services into their environment.
  • VIP 9.X Solution Components and VIP Lifecycle Operations (2 of 4)
    VIP 9.X Solution Components and VIP Lifecycle Operations (2 of 4)
  • VIP 9.X First Administrator Experience (3 of 4)
    This lesson covers the VIP first time administrator experience. Topics covered include: 1) Initial administrator logon, 2) Administrator Security Settings, 3) Reviewing the Account Summary, 4) Downloading Files for VIP Install and Integrations, and 5) Creating Additional Administrators.
  • VIP 9.X Administrator and Helpdesk Training (4 of 4)
    This lesson covers part 2 of technical foundations for Symantec Validation and Identity Protection services. The following topics will be covered as part of this lesson
  • Validation & ID Protection (VIP) Authentication Service 9.0: Install, Configuration, and Deploy: Introduction to VIP (1 of 8)
    In this module, you learn the basics about VIP, including what VIP is, the problems it solves in an enterprise, and how VIP can meet the needs of an enterprise.
  • VIP Install, Configuration, and Deploy: Types of Credentials (2 of 8)
    In this module, you learn about the mobile, desktop, and hardware credentials that VIP supports. You also learn the differences between the credentials and how a user can obtain the credentials.
  • VIP Install, Configuration, and Deploy: VIP Deployment Overview (3 of 8)
    In this module, you learn about the deployment architecture for VIP and the components that compromise the architecture. You then learn how an authentication event flows through the components to validate a user’s identity.
  • VIP Install, Configuration, and Deploy: Configuring VIP Enterprise Gateway (4 of 8)
    In this module, you learn about the requirements to install Enterprise Gateway, the User Store, and logging. Through a series of demonstrations you to learn how to prepare for installation, run the installer, and install a certificate. You also learn how to configure the User Store, Validation Server, and VIP Manager to be able to identify a user, authenticate a user request, and manage user credentials.
  • VIP Install, Configuration, and Deploy: Configuring VIP Manager (5 of 8)
    In this module, you learn how to create and maintain a new administrator account in VIP Manager, and then how to run and view reports about credentials. You also learn how to pre-register credentials for users and confirm those credentials are working properly.
  • VIP Install, Configuration, and Deploy: Overview of the VIP Self Service Portal (6 of 8)
    In this module, you learn what the VIP Self Service Portal is and the basic functions it performs. You also learn how to configure the Enterprise Gateway to use the VIP Self Service Portal, so you can bind users to their credentials.
  • VIP Install, Configuration, and Deploy: Deploying Credentials to Users (7 of 8)
    In this module, you learn how users receive credentials, and then how users can bind and test credentials themselves using VIP Self Serve Portal.
  • VIP Install, Configuration, and Deploy: Additional Deployment Considerations (8 of 8)
    In this module, you learn how to configure Enterprise Gateway to synchronize user identities from the corporate directory to the VIP service. You also learn how to view Enterprise Gateway logs, and additional logging options that Enterprise Gateway supports.
  • Validation & ID Protection (VIP) Authentication Service 9.0: End User Support for Help Desk Personnel: Introduction to VIP (1 of 5)
    In this module, you learn the basics about VIP, including what VIP is, the problems it solves in an enterprise, and how VIP can meet the needs of an enterprise.
  • VIP 9.0 End User Support for Help Desk Personnel: Types of Credentials (2 of 5)
    In this module, you learn about the credentials that VIP supports. You also learn the differences between the credentials and how a user can obtain the credentials.
  • VIP 9.0 End User Support for Help Desk Personnel: Overview of the VIP Manager Support Function (3 of 5)
    In this module, you learn how to perform common administrative tasks in VIP Manager, including binding credentials to users, ensuring those credentials are working properly, issuing temporary credentials, and removing credentials from a user.
  • VIP 9.0 End User Support for Help Desk Personnel: Overview of the VIP Self Service Portal (4 of 5)
    In this module, you learn what the VIP Self Service Portal is and the functionality that is available for users. In addition, you learn how to help users perform common tasks in the Portal, such as registering their own account, and binding and removing credentials from their account.
  • VIP 9.0 End User Support for Help Desk Personnel: Overview of Credential Fulfillment (5 of 5)
    In this module, you learn the process for helping users obtain mobile phone, desktop, and hardware credentials for the first time. You also learn the process for helping users replace their credentials.
Web Security.cloud
Email Security Service & Web Security Service: Administration
  • ESS WSS Admin: Introduction (1 of 30)
    This module provides background information regarding the training course.
  • ESS WSS Admin: Symantec.cloud management portal (2 of 30)
    This module introduces the Symantec.cloud management portal.
  • ESS WSS Admin: Navigating Symantec.cloud management portal – Demo (3 of 30)
    This demonstration steps through Navigating Symantec.cloud management portal.
  • ESS WSS Admin: Introduction to Email Security Service (4 of 30)
    This module covers an overview of the Email Security Service and infrastructure.
  • ESS WSS Admin: Setting up the Email Security Service – Demo (5 of 30)
    This demonstration examines Email service settings, verifies the DNS records for a customer domain, and runs through a simulation of outbound settings in office365.
  • ESS WSS Admin: Email Protect Service (6 of 30)
    This module covers a detailed view of the multi-layered protection.
  • ESS WSS Admin: Configuring and testing the Email Protect Service – Demo (7 of 30)
    This demonstration steps through configuring Anti-spam and Anti-virus settings using the management portal.
  • ESS WSS Admin: Image Control Service Overview (8 of 30)
    This module covers the overview of the Email Image Control service.
  • Data Protection Services (9 of 30)
    This module presents an overview of Data Protection Services.
  • ESS WSS Admin: Data Protection Services - Demo (10 of 30)
    This demonstration steps through the configuration for Data Protection.
  • ESS WSS Admin: Email Data Protection (11 of 30)
    This module presents an introduction to Email Data Protection.
  • ESS WSS Admin: Administering Email Data Protection - Demo (12 of 30)
    This demonstration steps through configuring Email Data Protection default settings.
  • ESS WSS Admin: Email Encryption Service (13 of 30)
    This module covers an overview of email encryption.
  • ESS WSS Admin: Email troubleshooting (14 of 30)
    This module covers delivery Issues and connectivity issues.
  • ESS WSS Admin: Email troubleshooting – Creating and Running Reports – Demo (15 of 30)
    This demonstration reviews the steps that need to be taken to generate reports for troubleshooting purposes.
  • ESS WSS Admin: Synchronization Tool (16 of 30)
    This module is an introduction to the Synchronization Tool.
  • ESS WSS Admin: Configuring the Synchronization Tool - Demo (17 of 30)
    This demonstration steps through importing users from Microsoft Office 365 and configuring the Synchronization of users and Groups from Active Directory.
  • ESS WSS Admin: Introduction to the Web Security Service (18 of 30)
    This module covers the IDM detection method, which you can use to define confidential data in your policies and then to detect that data in your enterprise.
  • ESS WSS Admin: Setting up the Web Security Service using Manual Browser Configuration - Demo (19 of 30)
    This demonstration steps through using a manual browser configuration to set up the Web Security Service.
  • ESS WSS Admin: Implementing HTTPS inspection (20 of 30)
    This module covers the implementation of HTTPS inspection.
  • ESS WSS Admin: Enabling HTTPS Inspection - Demo (21 of 30)
    This demonstration steps through how to enable HTTPS inspection.
  • ESS WSS Admin: User-level granularity control and reporting (22 of 30)
    This module reviews user-level granularity control and reporting.
  • ESS WSS Admin: Manual routing through the standalone Client Site Proxy - Demo (23 of 30)
    This demonstration steps through configuring manual routing using the Client Site Proxy.
  • ESS WSS Admin: Roaming User support (24 of 30)
    This module reviews the support for roaming users.
  • ESS WSS Admin: Remote Connect Option and the Smart Connect Agent - Demo (25 of 30)
    This demonstration steps through configuring the Remote Connect option and the Smart Connect Agent.
  • ESS WSS Admin: URL Filtering service (26 of 30)
    This module covers the URL Filtering service.
  • ESS WSS Admin: Configure URL Filtering Rules - Demo (27 of 30)
    This demonstration steps through configuring URL filtering rules.
  • ESS WSS Admin: Web Data Protection (28 of 30)
    This module introduces Web Data Protection.
  • ESS WSS Admin: Configuring Web Data Protection Policies - Demo (29 of 30)
    This demonstration steps through the configuration of Web Data Protection Policies.
  • ESS WSS Admin: Web troubleshooting (30 of 30)
    This module covers basic troubleshooting processes specifically for the Web Security Service.
Web Security Special Topics
  • Supporting Two-factor Authentication to the Administration Portal for Symantec.cloud
    This video will walk you through the Two Factor Authentication (2FA) and IP restriction enhancements to the .cloud administration portal. The session will specifically focus on: —What the functionality is for ; —Why it's been added; — How to enable the features ; —What the user experience will be like ; —Where to find troubleshooting assistance.
  • Supporting Web Data Protection
    This recording will take a detailed look at the portal functionality for the Web Data Protection services, both in terms of how to create a policy as well as the reporting options and service behaviour. The recording also includes a demonstration of some key administrator use cases for building a policy and how the service responds if a user triggers a policy.
  • Web Data Protection - Demonstration
    This recording will take you through the administrator's experience of policy creation and gives a view of how a block policy will affect the user.