McAfee EPO Course Overview

This course is structured to provide ePO administrators with a complete introduction to ePO console. Knowing to be updated with the latest versions of software, for a IT department it is required to maintain its productivity and efficiency. This course will maximize your talents, techniques and performance by providing a solution

Audience

  • Anyone who requires to gain knowledge in ePO certification

This is a Rare Course and it can be take up to 3 weeks to arrange the training.

The 1-on-1 Advantage
Methodology
Flexible Dates
  • • Choose Start Date
  • • Reschedule After Booking
  • • Weekend / Evening Option
4-Hour Sessions

You will learn:

Module 1: Welcome
  • About this course
  • Locating Resources
  • Lab Environment
  • Introducing McAfee Security Connected
  • Manifestation of Security Connected
  • Security Connected Framework
  • Integration with Third-Party Products
  • Security Connected Solution Platform
  • Solution Overview
  • New for this Release
  • Basic Solution Components
  • Web Interface
  • Menu Pages
  • Customizing the User Interface
  • Architecture and Communication
  • User Interface
  • Functional Process Logic
  • Data Storage
  • Planning Overview
  • Server Hardware Estimates
  • ePO Server Hardware Requirements
  • ePO Server Operating Systems
  • Translated Languages
  • Microsoft Prerequisite Software
  • SQL Server Database Requirements
  • Supported Web Browsers
  • Virtual Infrastructure Requirements
  • Port Requirements
  • Deployment Considerations
  • Deployment Scenarios
  • Configuration
  • Storage Area Network (SAN) Devices
  • Managing Scalability
  • Environmental Factors
  • Implementation Process Checklist
  • Change Control
  • Platform Requirements
  • Communication Ports
  • Deployment Guidelines
  • Change Control
  • Database Sizing
  • Managing Scalability
  • Environmental Factors
  • Planning Your Installation
  • Express, Custom, and Cluster Installation Workflows
  • SQL Server Installation
  • Installing ePO Software
  • Post-Installation Tasks
  • Logging into ePO for the First Time
  • Importing the Root Certificate
  • Using Automatic Product Configuration Tool
  • Using Guided Configuration
  • Viewing/Editing Port Assignments in ePO
  • Maintaining the SQL Database
  • Purging the Database
  • Basic Troubleshooting
  • Configuring ePO for Multiple NICs
  • Upgrading ePO
  • Permission Sets Overview
  • Default Permission Sets
  • Configuration Guidelines
  • Duplicating or Adding Permission Set
  • Editing or Deleting Permission Sets
  • Exporting All or Importing
  • User Account Overview
  • Guidelines for Authentication Types
  • Creating User Account
  • Personal Settings Overview
  • Changing Personal Settings
  • Editing Default Session Timeout Interval
  • Managing Users with AD
  • Registering LDAP Server
  • Enabling Active Directory User Login
  • Mapping Permission Sets
  • System Tree Overview
  • Planning System Tree: Considerations
  • Planning System Tree: Borders
  • Planning System Tree: Ways to Build Tree
  • Planning System Tree: Agent Install
  • Adding Groups Manually
  • Importing System Tree Structure
  • AD and NT Domain Synchronization Overview
  • NT Domains Synchronization Overview
  • Synchronizing NT Domains
  • Configuring Agent Push Settings
  • AD Synchronization Overview
  • Registering LDAP Server
  • Synchronizing AD
  • Maintaining Synchronization
  • Moving Groups and Systems
  • Best Practices
  • Tag Catalog
  • Who Can Use Tags?
  • Working with Tag Groups
  • Adding Tags with New Tag Builder
  • Applying and Clearing Tags from Systems
  • Excluding Systems from Automatic Tagging
  • Viewing Systems Excluded from Tag
  • Applying Criteria-based Tags
  • Managing Tags
  • System Tree Sorting
  • How ePO Determines Placement
  • Criteria-based Sorting
  • How IP Address Filtering Works
  • Checking IP Integrity
  • Changing the Sort Order
  • Initiating Sort Now
  • Initiating Test Sort
  • Initiating Move Systems
  • Solution Overview
  • McAfee Agent and SuperAgent
  • Managed Systems
  • New This Release
  • Planning the Installation or Deployment
  • Platform Requirements
  • Installation vs. Deployment
  • Update vs. Upgrade
  • Communications
  • Installation Overview
  • Agent Deployment Overview
  • Pushing Agent
  • Deploying Agent
  • Using Agent Install Package
  • Creating Client-side Download URL
  • Using Smart Installer
  • Using Windows Login Script
  • Using Agent Image (Windows)
  • Converting Agent to Managed Mode
  • Removing McAfee Agent
  • Using the Command-Line for Customization
  • Using System Tray Icon
  • Viewing Agent Activity Logs
  • Systems Tab Overview
  • Customizing the Systems Tab
  • Choosing Columns
  • Filtering Data
  • Viewing System Information
  • Using System Information Monitors
  • Customizing Summary Monitor
  • Customizing Properties Monitor
  • Customizing Chart Monitor
  • Using System Information Tables
  • System Properties Tab Overview
  • Client Tasks Overview
  • Using Client Tasks
  • Creating Client Task
  • Editing Client Task
  • Deleting Client Task
  • Duplicating Client Task
  • Assigning Client Task
  • Task Inheritance
  • Editing Task to Block Inheritance
  • Other Client Tasks
  • VirusScan On-Demand Scan Task
  • McAfee Agent Statistics Client Task
  • McAfee Agent Wakeup (Windows only)
  • McAfee Agent: Mirror Repositories (Windows)
  • Product Deployment
  • Policies Overview
  • Policy Catalog
  • Duplicating, Creating, and Editing Policy
  • Changing the Owner of a Policy
  • Exporting and Importing a Policy
  • Renaming or Deleting Policy
  • Locking Assignment and Enforcement
  • Policy Assignment and Enforcement
  • Viewing and Resetting Broken Inheritance
  • Policy Comparison
  • Acquiring Software Components
  • Software Manager
  • Using the Software Manager
  • Manually Installing Extensions
  • Manually Checking in Packages
  • Checkpoint: ePO Summary Dashboard
  • Product Deployment Overview
  • Product Deployment Project
  • Creating a Product Deployment Project
  • Managing Deployment Projects
  • Viewing Details for Product Deployments
  • Client Task Catalog
  • Product Update Considerations
  • Master Repository
  • Source Repositories
  • Fallback Site
  • Distributed Repositories
  • Default Repositorie
  • Repository Platforms and Roles
  • Repository Branches
  • Adding Source Site
  • Ensuring Access to Source Site
  • Enabling or Disabling Fallback Site
  • Editing or Deleting Site
  • Adding Distributed Repository
  • Enabling Folder Sharing
  • Creating SuperAgent Distributed Repository
  • SuperAgent LazyCaching
  • Creating a Hierarchy of SuperAgents
  • Agent Relay Capability
  • Collecting McAfee Agent Statistics
  • Adding Unmanaged or Local Repository
  • Permission Sets
  • Export and Import
  • Global Updating Overview
  • Requirements for Global Update
  • SuperAgent Repositories and Global Updating
  • Enabling Global Updating
  • CommonUpdater
  • AutoUpdate Process
  • Incremental Updating
  • Update Progress Dialog
  • Server Tasks Log
  • Drill-down on Log Entries
  • Permission Set for Server Tasks
  • Updating Repositories
  • Creating a Repository Pull Task
  • Creating Repository Replication Task
  • Pull and Replication Task Guidelines
  • Troubleshooting Task Failure
  • Default Dashboards
  • Dashboard Actions
  • Assigning Dashboard Permissions
  • Dashboards Guidelines
  • Monitor Guidelines
  • Adding, Editing, Removing Monitor
  • Dashboards Server Settings
  • Specifying Default Dashboards
  • Editing Default Dashboard Refresh Interval
  • Designing Dashboard
  • Performance Optimizer
  • Types of Assessments
  • Server Assessment Task
  • Queries and Reports Overview
  • Working with Queries
  • Basic Query Page Controls
  • Using Queries as Dashboard Monitors
  • Public and Private Queries
  • Using the Query Builder
  • Default and Actionable Queries
  • Using Preconfigured Queries
  • Query Groups and Permissions
  • Multi-Server Data Roll-up Overview
  • Automatic Query Actions
  • Exporting Query Results to Other Formats
  • Making Personal Queries Public
  • Duplicating and Sharing Queries
  • Importing Queries
  • Working with Reports
  • Settings for Print and Export
  • Creating and Editing Reports
  • Adding Elements to Report
  • Configuring Report Elements
  • Customizing Report Headers and Footers
  • Viewing Report Output
  • Moving a Report to Different Group
  • Running Reports
  • Filtering Events
  • How the Automatic Responses Feature Works
  • Enabling Default Rules
  • Automatic Response Builder
  • Configuring Independent Rules
  • Preparing Components and Permissions
  • Assigning Permissions
  • Specifying Email Contacts List
  • Configuring Email Server
  • Determining Events to Forward
  • Configuring Event Interval
  • Specifying SNMP Server
  • Importing .MIB Files
  • Specifying Registered Executables
  • Maintenance Overview
  • Automating Maintenance with Server Tasks
  • Editing Permission Sets for Server Task
  • Using cron Syntax in Schedule
  • Purge Overview
  • Purging Data Manually and Automatically
  • Purging Records Using Queries
  • Editing Event Filtering Settings
  • Backup Overview
  • Manually Initiating a Backup
  • Restore Overview
  • Initiating a Restore
  • Transaction Log Overview
  • Shrinking Transaction Log
  • Using Transact-SQL
  • Managing Server Settings
  • Disaster Recovery Overview
  • How Disaster Recovery Works
  • Using Server Task for Snapshot
  • Taking Snapshot from Dashboard
  • Identifying Server Snapshot Status
  • Determining a Disaster Recovery Plan
  • Scenario: Simple Disaster Recovery Plan
  • Scenario: Server Clusters
  • Scenario: Cold/Hot Spares - One Physical SiteScenario: Cold/Hot Spares - Two Physical Sites
  • Recovery Installation Workflow
  • Performing Recovery Installation
  • Disaster Recovery Best Practices
  • Solution Overview
  • Features and Benefits
  • Basic Components
  • DATs (Signatures)
  • Scan Engine
  • DAT and Scan Engine Updates
  • Artemis and McAfee Labs
  • Optional Components
  • Planning a VSE Deployment
  • Supported Operating Systems
  • Supported Language Choices
  • Guidelines for Special Installation Cases
  • Installation Overview
  • Preconfiguring, Deploying, Updating
  • Using McAfee Installation Designer
  • Using the VirusScan Console
  • Testing VirusScan
  • VSE Removal Options
  • Access Protection Overview
  • Configuring Access Protection
  • Buffer Overflow Protection Overview
  • Configuring Buffer Overflow Protection
  • Potentially Unwanted Programs Overview
  • Configuring PUPs
  • On-Access Scanning Overview
  • Configuring On-Access Scanning
  • On-Delivery Email Scanner Overview
  • Configuring On-Delivery Email Scan Policies
  • Quarantine Manager
  • Configuring Quarantine Manager Policies
  • On-Demand Scanning Overview
  • Configuring On-Demand Scan Task
  • VirusScan Mirror Task
  • Server Tasks
  • Monitoring and Analyzing Protection
  • Fine-tuning Protection
  • Disabling Processes on Enable
  • Configuring Scanning of Trusted Installers
  • Exclusions Overview
  • Adding/Editing Exclusion Items
  • Using Wildcard Exclusions Symbols
  • Managing Exclusions with Hardware Paths
  • Windows File Protection
  • McAfee Agent Exclusions
  • Defining Low / High-Risk Processes Policies
  • Determining Number of Scanning Policies
  • Processes You Can Add as Low-Risk
  • Configuring System Utilization
  • Filtering 1051 and 1059 Events
Live Online Training (Duration : 40 Hours) Fee On Request
We Offer :
  • 1-on-1 Public - Select your own start date. Other students can be merged.
  • 1-on-1 Private - Select your own start date. You will be the only student in the class.

4 Hours
8 Hours
Week Days
Weekend

Start Time : At any time

12 AM
12 PM

1-On-1 Training is Guaranteed to Run (GTR)
Group Training
Date On Request
Course Prerequisites
  • There is no prerequisite for this course.

But require system requirements as follows:

  • A 64 bit server OS
  • Firefox 3.5/3.6 or Internet explorer 7.0/8.0
  • IPV4/V6 network support
  • Virtual server
  • Data base 32 / 64 bit
  • Free disk space of 1.5GB
  • 2GB RAM
  • IP Address McAfee prefers using a static IP address

Upon completion of this course, you will be able to accomplish

  • Future proof your security infrastructure
  • To streamline security and compliance work force
  • Ensuring wide angle in security and risk management
  • Enforce to secure your security environment

Request More Information

Add Name and Email Address of participant (If different from you)

FAQ's


In both, you choose the schedule. In public, other participants can join, Private other participants want to join.
Yes, course requiring practical include hands-on labs.
You can buy online from the page by clicking on "Buy Now". You can view alternate payment method on payment options page.
Yes, you can pay from the course page and flexi page.
Yes, the site is secure by utilizing Secure Sockets Layer (SSL) Technology. SSL technology enables the encryption of sensitive information during online transactions. We use the highest assurance SSL/TLS certificate, which ensures that no unauthorized person can get to your sensitive payment data over the web.
We use the best standards in Internet security. Any data retained is not shared with third parties.
You can request a refund if you do not wish to enroll in the course.
To receive an acknowledgment of your online payment, you should have a valid email address. At the point when you enter your name, Visa, and other data, you have the option of entering your email address. Would it be a good idea for you to decide to enter your email address, confirmation of your payment will be emailed to you.
After you submit your payment, you will land on the payment confirmation screen. It contains your payment confirmation message. You will likewise get a confirmation email after your transaction is submitted.
We do accept all major credit cards from Visa, Mastercard, American Express, and Discover.
Credit card transactions normally take 48 hours to settle. Approval is given right away; however, it takes 48 hours for the money to be moved.
Yes, we do accept partial payments, you may use one payment method for part of the transaction and another payment method for other parts of the transaction.
Yes, if we have an office in your city.
Yes, we do offer corporate training More details
Yes, we do.
Yes, we also offer weekend classes.
Yes, Koenig follows a BYOL(Bring Your Own Laptop) policy.
It is recommended but not mandatory. Being acquainted with the basic course material will enable you and the trainer to move at a desired pace during classes. You can access courseware for most vendors.
Yes, this is our official email address which we use if a recipient is not able to receive emails from our @koenig-solutions.com email address.
Buy-Now. Pay-Later option is available using credit card in USA and India only.
You will receive the digital certificate post training completion via learning enhancement tool after registration.
Yes you can.
Yes, we do. For details go to flexi
You can pay through debit/credit card or bank wire transfer.
Dubai, Goa, Delhi, Bangalore.
Yes you can request your customer experience manager for the same.
Yes of course. 100% refund if training not upto your satisfaction.

Prices & Payments

Yes of course.
Yes, We are

Travel and Visa

Yes we do after your registration for course.

Food and Beverages

Yes.

Others

Says our CEO-
“It is an interesting story and dates back half a century. My father started a manufacturing business in India in the 1960's for import substitute electromechanical components such as microswitches. German and Japanese goods were held in high esteem so he named his company Essen Deinki (Essen is a well known industrial town in Germany and Deinki is Japanese for electric company). His products were very good quality and the fact that they sounded German and Japanese also helped. He did quite well. In 1970s he branched out into electronic products and again looked for a German name. This time he chose Koenig, and Koenig Electronics was born. In 1990s after graduating from college I was looking for a name for my company and Koenig Solutions sounded just right. Initially we had marketed under the brand of Digital Equipment Corporation but DEC went out of business and we switched to the Koenig name. Koenig is difficult to pronounce and marketeers said it is not a good choice for a B2C brand. But it has proven lucky for us.” – Says Rohit Aggarwal (Founder and CEO - Koenig Solutions)
All our trainers are fluent in English . Majority of our customers are from outside India and our trainers speak in a neutral accent which is easily understandable by students from all nationalities. Our money back guarantee also stands for accent of the trainer.
Medical services in India are at par with the world and are a fraction of costs in Europe and USA. A number of our students have scheduled cosmetic, dental and ocular procedures during their stay in India. We can provide advice about this, on request.
Yes, if you send 4 participants, we can offer an exclusive training for them which can be started from Any Date™ suitable for you.