Symantec Encryption Management Server 3.3 and Desktop 10.3: Administration
Course Description
The Symantec Encryption Management Server 3.3 and Desktop 10.3 Administration course is designed to provide you with the fundamental knowledge and hands-on lab experience to install, administer, and troubleshoot the Symantec Encryption Management Server 3.3 and primary client product. The hands-on labs include exercises for installation and configuration of the Symantec Encryption Management Server and Symantec Encryption Desktop products, including policy-based messaging security, manual and directory-style user and group management, and Symantec Encryption Desktop policy and usage, including for the Symantec Encryption Whole Disk Encryption product.
The course also covers troubleshooting of Symantec Encryption Desktop, including installation and enrollment problems, Symantec Encryption Whole Disk Encryption, and common files and services that may need to be manipulated or repaired.
Additionally, you are introduced to the following Symantec Encryption products: Key Management Services, Symantec Encryption Mobile, Symantec Encryption iOS Viewer and Endpoint Device Control.
Delivery Method
Instructor-led
Duration
Five days
Course Objectives
This course provides instruction on Symantec Encryption Management Server 3.3 and Symantec Encryption Desktop 10.3. At the completion of the course, you will be able to:
• Describe the features, concepts, components, and terminology of both the Symantec Encryption Management Server 3.3 and Symantec Encryption Desktop 10.3 products.
• Install Symantec Encryption Management Server 3.3 and complete setup using the most commonly configured options.
• Install a managed and customized Symantec Encryption Desktop 10.3 client.
• Configure, complete administration tasks for, and use Symantec Encryption Whole Disk Encryption and other Symantec Encryption Desktop features.
• Configure policy-based messaging security for internal and external recipients.
• Create and modify users, user policies, and groups using either manual or directory integration methods.
• Combine two or more Symantec Encryption Management Server into a cluster.
Who Should Attend
This course is intended for those responsible for the installation, configuration, maintenance, or troubleshooting of Symantec Encryption Management Server or Symantec Encryption Desktop.
Prerequisites
An understanding of information security concepts and terminology helps you succeed in this course. Also, this course requires familiarity with networking and computing concepts. Symantec recommends that students taking this course have at least one year of information technology experience.
Hands-On
This course includes practical exercises that enable you to test your new skills and begin to transfer them into your working environment, as well as several review exercises to help you remember what you have learned.
INSTALL, CONFIGURE, AND DEPLOY COURSE OUTLINE
Cryptography Essentials
• Cryptography defined
• Caesar cipher
• Symmetric-key cryptography
• Public-key cryptography
• Symantec public-key cryptography
• Digital signatures
• Trust models
• Keys and key signatures
• Passphrases
• Certificates
Symantec Encryption Product Introduction
• Symantec Encryption Security products
• Symantec Encryption Management Server
• Symantec Encryption Desktop
• Symantec Encryption Command Line
• Symantec Encryption Mobile
• Symantec Encryption iOS Viewer
Installing Symantec Encryption Management Server
• Symantec Encryption Management Server installation steps
• System requirements
• Installing Symantec Encryption Management Server
• Configuring the Symantec Encryption Management Server
• Installing updates and upgrading the Encryption Server
Lab: Post installation tasks
Consumers and Groups
• Introducing consumers, users and devices
• Introducing groups and policy
Lab: Creating groups and users
Administrative Keys
• The Organization Key
• Additional Decryption Key (ADK)
• SSL/TLS and X.509 certificates
• Ignition key
Lab: Manage administrative keys
Server Messaging
• Learn mode
• Mail proxies
• Server placement
• Mail flow
Monitoring and Reporting
• Server monitoring and logging
• Protecting your Symantec Encryption Management Server
Lab: Create a backup and review logs and daily status email
Mail Policy
• Definition of policy chains and rules
• Rule conditions, actions, and key searches
• Default policy chains
• Adding custom chains to mail flow
• Custom chains and rules
Lab: Manage mail flow and work with mail policies
Key Not Found
• External users
• Key Not Found and direct actions
Web Email Protection
• Introducing Web Messenger
• Configuring Web Messenger
• PDF email protection
• Out of Mail Stream
• X.509 delivery
• External delivery options
Lab: Configure and work with Web Email protection
Preparing Symantec Encryption Desktop Clients
• What is directory synchronization
• How to use directory synchronization
Keys
• Managed key configuration
• Key usage and tokens
Configuring Client Enrollment
• Definition of enrollment
• Methods of client enrollment
Lab: Configuring client enrollment
Installing Symantec Encryption Desktop
• System requirements
• Symantec Encryption Desktop installer
• Licensing Symantec Encryption Desktop
• Modifying the Symantec Encryption Desktop
Lab: Download and install Symantec Encryption Desktop
Configuring General Policy Settings
• General Symantec Encryption Desktop options in Consumer policy
• Updating policy settings
Symantec Encryption Desktop Messaging
• How Symantec Encryption Desktop affects messaging infrastructure
• MAPI buttons
Configuring Symantec Drive Encryption
• What is Drive Encryption
• Drive Encryption for Mac OS X
• Drive Encryption for Linux
Lab: Configuring Symantec Drive Encryption
Symantec Drive Encryption Management and Recovery
• Logon failure and reporting
• The WDE-ADMIN group
• The pgpwde command-line tool
• Recovery options
Lab: Recover hard drive manually
Configuring Symantec File Share Encryption
• Encrypted folder creation
• How to configure Symantec File Share
• Symantec File Share Encryption Group Key
• Miscellaneous information about Symantec Encryption
Lab: Configuring Symantec File Share Encryption
Other Symantec Encryption Desktop Features
• PGP Zip
• PGP Shredder
• Shred Free Space
• PGP Virtual Disk
• PGP Portable
Lab: Create and use a virtual disk. Use PGP Zip and PGP Shredder
Clustering
• How Symantec Encryption Management Server Clustering works
• DMZ settings
Copyright © 2011 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Veritas are trademarks or registered trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Other names may be trademarks of their respective owners. Specifications and product offerings are subject to change without notice.
• Cluster failover
• Web Email Protection inbox replication
Lab: Configuring a cluster
MAINTAIN AND TROUBLESHOOT COURSE OUTLINE
Symantec Encryption Support Tools
• Introduction to the Support Knowledgebase and documentation library
• Symantec Encryption Management Server services and general overview
Symantec Encryption Management Server Command Line Administration
• Accessing the Command Line
• Debug logging
• VMWare Tools
Lab: Configure a super user account to allow for SSH access
Symantec Encryption Management Server Troubleshooting
• Common commands and services
• Common services, problems and solutions
Symantec Encryption Management Server Database Access and Reporting
• Database access
• Database reporting
Symantec Encryption Management Server Common Problems
• Common installation problems
• General issues
Lab: Simulate errors on Encryption Server
Symantec Encryption Management Server Common Clustering Issues
• Synchronization and Replication
• Cluster debug mode
Symantec Encryption Management Server Common Messaging Issues
• Failure to encrypt mail messages
• Mail queuing
• Open relay
• Mail routes
• Certificate issues
Symantec Encryption Web Email Protection Issues
• Login problems
• Web Email Protection errors
Symantec Encryption Desktop Services, Files and Folders
• Managing services
• Symantec Encryption Desktop common problems
More Courses
Veritas NetBackup 8.2: Administration
Veritas NetBackup 8.2: Advanced Administration
Veritas NetBackup Maintenance and Troubleshooting
Veritas Backup Exec 20.1
Veritas Enterprise Vault 12.x: Administration I
Veritas NetBackup Appliances 3.1: Configuration and Management
Veritas Backup Exec 20.1: Administration
Symantec Endpoint Protection 14.2: Administration
Symantec Messaging Gateway 10.6: Administration Workshop
Symantec Data Loss Prevention 15.5: Administration
Symantec Endpoint Protection 14.2: Maintain and Troubleshooting
Symantec Encryption Management Server 3.3 and Desktop 10.3 Administration