Description

This course focuses on how Endpoint Security Management can be used to secure your company's workstations and provides an extensive discussion of the product's features. The hands-on exercises teach you how to use the ZENworks Control Center (ZCC) to configure and publish Security Policies that control access to USB ports and removable media devices, provide for data encryption and application control, and demonstrate the location awareness capability of ZENworks 11.x Configuration Management.

Audience Summary:

This course is for Help Desk, Network Administrators, and Desktop Support personnel responsible for supporting users' laptops and desktops. It is also appropriate for Technical Management employees. The course is designed to help these types of IT personnel understand the risks and costs associated with unmanaged endpoints and how ZENworks Endpoint Security Management (ZESM) can prevent data breaches, help get control of endpoint hardware, and enforce company policy regarding the use of external storage devices.

Suggested courses

Suggested courses are based on product compatibility, popularity, and newness.

Details

Course
COURSE 8520
More info Less info
Related products
1.0
Course outline

Course Outline:

SECTION 1: ZESM Background and Product Positioning

Objective 1: History of ZENworks Endpoint Security Management
Objective 2: Architectural Differences: "Then" and "Now"
Objective 3: Product Positioning: "Then" and "Now"


SECTION 2: Understanding Important ZESM Concepts and Terminology

Objective 1: Understanding Location Awareness
Objective 2: Defining Network Environments
Objective 3: Determining the Endpoint's Closest Servers in ZCM 11.x
Objective 4: Understanding Configuration and Security Locations


SECTION 3: Understanding Endpoint Security Management (ZESM) Policies

Objective 1: Application Control Policy
Objective 2: Communications Hardware Policy
Objective 3: Data Encryption Policy
Objective 4: Firewall Policy
Objective 5: Storage Device Control Policy
Objective 6: USB Connectivity Policy
Objective 7: VPN Enforcement Policy
Objective 8: Wi-Fi Policy
Objective 9: Security Settings Policy
Objective 10: Location Assignment Policy

SECTION 4: Making ZESM Policy Assignments

Objective 1: Assigning ZESM Policies to Objects
Objective 2: Understanding ZESM Policy Conflict Resolution

SECTION 5: Using ZESM Utilities

Objective 1: Using the ZESM Device Scanner
Objective 2: Using ZESM File Encryption Utilities
Objective 3: Generating ZESM Policy Override Passwords

SECTION 6: Understanding ZESM Best Practices

Pre-Requisites:

No previous experience with ZESM is required or expected. You must have a background in managing Windows desktops in a networked environment and be familiar with Active Directory.

Languages
English

Unsubscribe from notifications

You are receiving release updates for this course because you have subscribed to the following products:
If you unsubscribe, you will no longer receive any notifications for these products.
Tip: to update your subscription preferences, go to Manage Subscriptions from your Dashboard, uncheck the products you no longer want to receive notifications for, and click 'Save'.

Marketplace Terms of Service

In order to continue, you must accept the updated Marketplace Terms of Service
Since you are downloading an app from the OpenText Marketplace, you need to accept the updated Marketplace Terms of Service before you can continue. Use the link to review the Marketplace Terms of Service. Once complete check the, "I accept the Marketplace Terms of Service" box below and click accept to continue your download.


Your download has begun...

Your download has begun

Related content and resources

Your browser is not supported!

Please upgrade to one of the following broswers: Internet Explorer 11 (or greater) or the latest version of Chrome or Firefox

release-rel-2024-3-2-6097 | Wed Mar 27 04:29:56 PDT 2024