Building on the Trellix Endpoint Security Platform, ENS Expert rules allow the advanced ENS administrator to add deeper security to their ENS Deployment.
This course provides insights into Trellix proprietary syntaxes and an advanced view into Operating System concepts and references needed to better understand how ENS works and fully comprehend how ENS Expert Rules can provide a more customized and secure environment.
Days 1-4: Concepts, Technologies, and Expert Rules
Day 5: Practical Application
This course is intended for system and network administrators, security personnel, auditors, and/or consultants concerned with system endpoint security.
Students taking this course should have a basic knowledge of ENS, the user-interface and functionality, and Windows Operating Systems. Students should have completed the Endpoint Security Administration Course. Priorexperience or working knowledge of ePolicy Orchestrator is also required.
Building on the Trellix Endpoint Security Platform, ENS Expert rules allow the advanced ENS administrator to add deeper security to their ENS Deployment.
This course provides insights into Trellix proprietary syntaxes and an advanced view into Operating System concepts and references needed to better understand how ENS works and fully comprehend how ENS Expert Rules can provide a more customized and secure environment.
Days 1-4: Concepts, Technologies, and Expert Rules
Day 5: Practical Application
This course is intended for system and network administrators, security personnel, auditors, and/or consultants concerned with system endpoint security.
Students taking this course should have a basic knowledge of ENS, the user-interface and functionality, and Windows Operating Systems. Students should have completed the Endpoint Security Administration Course. Priorexperience or working knowledge of ePolicy Orchestrator is also required.