McAfee Endpoint Security 10.7 Administration (EPS) Course Overview

Enroll for our 4-day McAfee Endpoint Security 10.7 Administration (EPS) from Koenig Solutions. This course provides in-depth introduction to the tasks crucial to set up and administer McAfee Endpoint Security. 

Through a blend of hands-on labs and interactive lectures, you will learn uses of McAfee Endpoint Security which combines Threat Prevention, Adaptive Threat Protection, Firewall, and Web Control to take immediate action against potentially dangerous applications, downloads, websites, and files.

Target Audience:

This course is intended for system and network administrators, security personnel, auditors, and/or consultants concerned with system endpoint security.


This is a Rare Course and it can be take up to 3 weeks to arrange the training.

The 1-on-1 Advantage


Flexible Dates

  • • Choose Start Date
  • • Reschedule After Booking
  • • Weekend / Evening Option

4-Hour Sessions

You will learn:

Module 1: Course Welcome
  • Introduce the course and course agenda.
  • Introduce the training organization.
  • Show common resources.
  • Describe the lab environment and how to use the Lab Guide.
  • Describe the solution and its key features.
  • Identify new features and enhancements for this release.
  • Identify the components in a basic deployment architecture.
  • Explain how the solution works.
  • Identify considerations for defining business
  • requirements or objectives.
  • Identify supported operating systems and platform hardware for endpoints. Identify the components included with McAfee Endpoint Security.
  • Identify legacy McAfee solutions you can migrate to McAfee Endpoint Security.
  • Describe the key parts of a deployment plan.
  • Identify key differences between McAfee ePO OnPremises, McAfee® ePO™ Cloud, and McAfee® MVISION™ ePO™.
  • Identify the purpose of the McAfee Agent.
  • Identify and distinguish between the menu bar options.
  • Identify and explain the purpose of commonly used pages, such as the System Tree, Permissions Sets, and Users pages.
  • Navigate through the interface and access commonly used pages.
  • Packages and Extensions
  • Explain how to obtain the required software components.
  • Identify the steps to install McAfee Endpoint Security for use in McAfee ePO and standalone or selfmanaged environments
  • Identify and distinguish between the required software components
  • Add the required extensions and packages software to the McAfee ePO server
  • Verify the extensions and packages were added successfully to the McAfee ePO server.
  • Explain the purpose of Migration Assistant.
  • Identify situations where manual or automatic migration is useful.
  • Identify the steps to complete a manual migration.
  • Identify the steps to complete an automatic migration.
  • Identify which policy settings migrate.
  • Identify the key features of the Endpoint Upgrade Assistant (EUA)
  • Describe the differences between using the automatic upgrades and manual upgrades.
  • Identify the products that can be migrated with the EUA.
  • Identify limitations of EUA.
  • Describe the supported command-line options.
  • Describe how EUA works.
  • Define what happens during the upgrade.
  • Identify how to use the Package Creator to customize
  • the McAfee Endpoint Security installation package.
  • Security Client to the Endpoints
  • Identify the different ways to deploy the required software components to endpoint systems.
  • Deploy the required software components to the client endpoints.
  • Verify the success of the deployment.
  • Client
  • Identify two ways to manage McAfee Endpoint Security clients.
  • Open the McAfee Endpoint Security client interface.
  • Log in as an administrator.
  • Navigate through the client interface.
  • Identify the default settings.
  • Management Overview
  • Explain the purpose of policies
  • Identify the various actions performed from the Policy Catalog page.
  • Explain how policy inheritance works, as well as how to break inheritance.
  • Explain policy ownership, as well as how to give other users permissions to control selected policy types.
  • Configure common settings that apply to all McAfee Endpoint Security modules and features, such as:
  • − Client interface
  • − Language
  • − Logging
  • − Proxy server for McAfee® Global Threat Intelligence (GTI) reputation
  • − Update configuration
  • 5 McAfee Endpoint Security 10.7 Administration
  • Describe the purpose of Access Protection policies.
  • Identify types of McAfee-defined rules.
  • Describe situations where user-defined rules are useful.
  • Describe similarities and differences between McAfeedefined and user-defined rules.
  • Describe how to enable and disable rules.
  • Identify supported wildcards and syntax for exclusions.
  • Customize a McAfee-defined rule.
  • Create a user-defined rule.
  • Exploit Prevention
  • Describe the key features of McAfee Endpoint Security Exploit Prevention.
  • Configure Exploit Prevention policies to meet customer requirements.
  • Describe what happens if a system has both the Host Intrusion Prevention System and McAfee Endpoint Security installed.
  • Describe how to configure the Network Intrusion feature of McAfee Endpoint Security.
  • List the severities of the Exploit signatures
  • Define the types of expert rules.
  • Define the application protection rules and how they work.
  • Define how to create an exception for the signatures.
  • Identify the different types of scanners that McAfee Endpoint Security provides.
  • Explain how the on-access scanner works
  • Configure on-access scan settings to meet customer requirements.
  • Identify the different types of on-demand scans that McAfee Endpoint Security provides.
  • Explain how the on-demand scanners work.
  • Configure on-demand scanner settings to meet customer requirements.
  • Identify the purpose of the Quarantine Manager, Exclusions by Detection Name, and Potentially Unwanted Program (PUP) Detection.
  • Describe some ways to manage quarantined items.
  • Configure Quarantine Manager, Exclusions by Detection Name, and PUP Detection settings as necessary to meet customer requirements.
  • Identify the purpose of the Adaptive Threat Protection module.
  • Deploy Adaptive Threat Protection.
  • Identify the different policies available for Adaptive Threat Protection, as well as their default settings.
  • Configure Adaptive Threat Protection policies to meet customer requirements.
  • Configure Adaptive Threat Protection Server Settings.
  • Identify the purpose of the Firewall module.
  • Distinguish between the two types of Firewall policies.
  • Configure settings in the Firewall Options policy to meet customer requirements.
  • Identify the purpose of Firewall rule and groups.
  • Distinguish between settings for Firewall rules and groups.
  • Identify considerations for rule design.
  • Identify the purpose of location awareness, connection isolation, and timed groups.
  • Describe best practices for Firewall configuration and rule design.
  • Configure Firewall rules and groups to meet customer requirements.
  • Identify the purpose of the Web Control module.
  • Identify key features that Web Control provides
  • Identify the different policies available for Web Control, as well as their default settings.
  • Configure Web Control policies to meet customer requirements.
  • Access, navigate, and interpret dashboards.
  • Describe situations where customized dashboards are useful.
  • Generate and interpret queries and reports.
  • View threat event detail.
  • List the elements of the Protection Workspace user interface.
  • Use the Protection Workspace dashboard to monitor your environment.
  • Describe the Smart Scheduler of McAfee Endpoint Security for Servers.
  • Describe how to create resource-intensive tasks and a time slot for smart scheduling in the UI of the Smart Scheduler Catalog and Smart Scheduler.
  • Describe the components and benefits of McAfee Endpoint Security for Servers.
  • Describe how the CPU load is calculated.
  • Describe how Smart Scheduler decides the number of instances that can run the ondemand scan while maintaining the CPU Utilization value below the threshold value.
  • List the benefits of McAfee Endpoint Security for Servers.
  • Threat Intelligence Exchange Overview
  • Describe the Data Exchange Layer Overview (DXL) solution and its key features.
  • Describe the McAfee Threat Intelligence Exchange (TIE) solution and its key features.
Live Online Training (Duration : 32 Hours) 1850 + If you accept merging of other students. Per Participant
We Offer :
  • 1-on-1 Public - Select your own start date. Other students can be merged.
  • 1-on-1 Private - Select your own start date. You will be the only student in the class.

4 Hours
8 Hours
Ultra-Fast Track
Week Days

Start Time : At any time

12 AM
12 PM

1-On-1 Training is Guaranteed to Run (GTR)
Group Training
12 - 15 Dec
09:00 AM - 05:00 PM CST
(8 Hours/Day)
16 - 19 Jan
09:00 AM - 05:00 PM CST
(8 Hours/Day)
Course Prerequisites
  • Knowledge of Windows and system administration, network technologies
  • Basic understanding of computer security, command line syntax, malware/anti-malware, virus/antivirus, and web technologies
  • Knowledge of McAfee ePO


Request More Information

Add Name and Email Address of participant (If different from you)


In both, you choose the schedule. In public, other participants can join, Private other participants want to join.
Yes, course requiring practical include hands-on labs.
You can buy online from the page by clicking on "Buy Now". You can view alternate payment method on payment options page.
Yes, you can pay from the course page and flexi page.
Yes, the site is secure by utilizing Secure Sockets Layer (SSL) Technology. SSL technology enables the encryption of sensitive information during online transactions. We use the highest assurance SSL/TLS certificate, which ensures that no unauthorized person can get to your sensitive payment data over the web.
We use the best standards in Internet security. Any data retained is not shared with third parties.
You can request a refund if you do not wish to enroll in the course.
To receive an acknowledgment of your online payment, you should have a valid email address. At the point when you enter your name, Visa, and other data, you have the option of entering your email address. Would it be a good idea for you to decide to enter your email address, confirmation of your payment will be emailed to you.
After you submit your payment, you will land on the payment confirmation screen.It contains your payment confirmation message. You will likewise get a confirmation email after your transaction is submitted.
We do accept all major credit cards from Visa, Mastercard, American Express, and Discover.
Credit card transactions normally take 48 hours to settle. Approval is given right away; however,it takes 48 hours for the money to be moved.
Yes, we do accept partial payments, you may use one payment method for part of the transaction and another payment method for other parts of the transaction.
Yes, if we have an office in your city.
Yes, we do offer corporate training More details
Yes, we do.
Yes, we also offer weekend classes.
Yes, Koenig follows a BYOL(Bring Your Own Laptop) policy.
It is recommended but not mandatory. Being acquainted with the basic course material will enable you and the trainer to move at a desired pace during classes.You can access courseware for most vendors.
Buy-Now. Pay-Later option is available using credit card in USA and India only.
You will receive the digital certificate post training completion via learning enhancement tool after registration.
Yes you can.
Yes, we do. For details go to flexi
You can pay through debit/credit card or bank wire transfer.
Dubai, Goa, Delhi, Bangalore.
Yes you can request your customer experience manager for the same.
No, the published fee includes all applicable taxes.
Yes, we do.
The Fee includes:
  • Courseware
  • Testing Via Qubits
Schedule for Group Training is decided by Koenig. Schedule for 1-on-1 is decided by you.
In 1-on-1 you can select your own schedule, other students can be merged but you select the schedule. Choose 1-on-1 if published schedule do not meet your requirement. If you also want a private session, opt for 1-on-1 Public.
No, it is not included.

Prices & Payments

Yes of course.
Yes, We are

Travel and Visa

Yes we do after your registration for course.

Food and Beverages



Says our CEO-
“It is an interesting story and dates back half a century. My father started a manufacturing business in India in the 1960's for import substitute electromechanical components such as microswitches. German and Japanese goods were held in high esteem so he named his company Essen Deinki (Essen is a well known industrial town in Germany and Deinki is Japanese for electric company). His products were very good quality and the fact that they sounded German and Japanese also helped. He did quite well. In 1970s he branched out into electronic products and again looked for a German name. This time he chose Koenig, and Koenig Electronics was born. In 1990s after graduating from college I was looking for a name for my company and Koenig Solutions sounded just right. Initially we had marketed under the brand of Digital Equipment Corporation but DEC went out of business and we switched to the Koenig name. Koenig is difficult to pronounce and marketeers said it is not a good choice for a B2C brand. But it has proven lucky for us.” – Says Rohit Aggarwal (Founder and CEO - Koenig Solutions)
All our trainers are fluent in English . Majority of our customers are from outside India and our trainers speak in a neutral accent which is easily understandable by students from all nationalities. Our money back guarantee also stands for accent of the trainer.
Medical services in India are at par with the world and are a fraction of costs in Europe and USA. A number of our students have scheduled cosmetic, dental and ocular procedures during their stay in India. We can provide advice about this, on request.
Yes, if you send 4 participants, we can offer an exclusive training for them which can be started from Any Date™ suitable for you.