Search for Training

RSA Data Loss Prevention Administration

Course Overview


The RSA Data Loss Prevention Administration training course provides comprehensive instruction in the administration and configuration of the RSA Data Loss Prevention (DLP) Suite. Theory and product basics such as the RSA DLP Suite architecture, integration of RSA DLP components, and the importance of various configuration parameters are discussed. Participants participate in hands-on exercises that build on the basic concepts and allow practical experience in building an RSA DLP system.

Course Content


Introduction to Data Loss Prevention   

  • List the key features of the RSA DLP Suite
  • Identify the key components of the RSA DLP Suite
  • Describe the role of RSA DLP Enterprise Manager
  • Explain the differences between RSA DLP Network, Datacenter, and Endpoint
  • Define how policy violations are handled by RSA DLP Endpoint Enforce

Enterprise Manager Administration   

  • Login to the Enterprise Manager for the first time
  • List the key features of Enterprise Manager
  • Access and license the Enterprise Manager
  • List new dashboard features
  • Review the Enterprise Manager tabs
  • Enter LDAP configuration settings
  • Perform user and group administration
  • Configure an email server and notifications
  • Delete incidents and events
  • Display device status

Network Appliance Configuration   

  • Identify the main components of RSA DLP Network
  • Re-install an RSA DLP Network appliance
  • Login to an RSA DLP Network appliance
  • Perform an initial configuration of an appliance
  • Perform basic configuration for a RSA DLP Network Interceptor
  • Describe the Email Self Release feature
  • Evaluate sensor capacity needs
  • Diagram the ICAP server event flow
  • Perform a basic configuration of an ICAP server

Introduction to Policies   

  • Explain the function of the RSA DLP Content Classification and Analysis system
  • Describe the use and purpose of policies in the DLP Suite
  • Explain how content blades are used in policies to detect sensitive information
  • Create policies using a supplied template
  • Configure DLP Network policies in a virtual network environment

DLP Datacenter   

  • List key features and components of DLP Datacenter
  • Install the Enterprise Coordinator
  • Configure the Enterprise Coordinator
  • Describe the scan types available in DLP Datacenter
  • Install and configure a site coordinator
  • Create a grid scan group
  • View scan status and history

Creating Content Blades   

  • Compare fingerprinting and describing content
  • List the detection accuracy methods available
  • Discuss the importance of weight, score and count
  • Discuss the importance of accuracy and precision
  • Explain how a risk score determines severity
  • Manage and create content blades

Working with Fingerprinted Content   

  • Describe fingerprinting and hashes
  • Define fingerprinting terminology
  • Configure a file crawler
  • Configure a database crawler

Agent and Repository Scans   

  • Analyze agent scan status
  • Configure an agent scan group
  • Schedule an agent scan
  • Analyze agent scan history
  • Configure a repository database scan

DLP Endpoint   

  • Explain how DLP Endpoint Enforce works
  • List the components that comprise DLP Endpoint
  • Configure policy settings relevant to DLP Endpoint
  • Install DLP Endpoint Enforce agents
  • Create a DLP Endpoint Enforce group
  • Manually deploy a DLP Endpoint Enforce agent

Workflow and Remediation   

  • Describe incident and event workflow within RSA DLP
  • Compare DLP remediation actions
  • Describe how manual remediation functions
  • View policy, incident, and transmission details
  • View incident history and notifications

Reports   

  • Describe the main DLP reporting features
  • Navigate the Enterprise Manager dashboard
  • View and edit reports
  • Customize a report
  • Export report data
  • Create DLP Asset Heat Map reports

Basic Operations   

  • Export and import DLP configuration files
  • Review backup options for DLP
  • Discuss high availability options for DLP components
  • Describe how to configure Enterprise Manager failover
  • Review Patching and upgrade operations for DLP
  • List the benefits of integrating DLP and RMS
  • Select and associate an RMS template for use with DLP

Customer Reviews


Thanks to Xpertised and the tutor who walked me through all the topics with Practical exposure which is helping me in my current project.
-Waseem

Course was quite helpful in terms of understanding of concepts and practicality. Its really a very friendly environment to learn. The timing were mutually chosen, as we both are working professional. I am quite satisfied with the course.
-Tanmoy

...more
Share:

For Batch Details
Call us at: +91 7259222234

Not sure? Consult Our Experts

What is the sum of 0 + 2? (security question)

Looking for a Training for

Myself

My Team/Organization

I agree to be contacted over mail or phone

or
Call us at: +91 7259222234

Subscribe to our weekly newsletter