Call : (+91) 968636 4243
Mail : info@EncartaLabs.com
EncartaLabs

BeyondTrust Privileged Management for Windows

( Duration: 2 Days )

This BeyondTrust Privileged Management for Windows training course is ideal for security professionals who need to learn on how to deploy, configure, and utilize Privilege Management for Windows in their unique environment. During the course, you will learn best practices for installing and administering Privileged Management for Windows.

By attending BeyondTrust Privileged Management for Windows workshop, delegates will learn:

  • Deploying the Software – walkthrough the process of installing the client & console and deploying the software.
  • Configuration and Control – learn how to configure policies and applying application control through workstyles and application groups.
  • Achieve Least Privilege – Remove excessive end user privileges on Window, Mac, Unix, Linux, and network devices without hindering productivity.
  • Elevate Applications, not Users – Maintain security, user productivity, and IT operational efficiency by enforcing least privilege across the desktop environment.
  • Troubleshooting – apply a logical troubleshooting process to resolve and understand the root cause of issues.

The BeyondTrust Privileged Management for Windows class is ideal for:

  • Security professionals who need to learn how to deploy, configure, and utilize Privilege Management for Windows in their unique environment.

COURSE AGENDA

1

Welcome & Course Overview

  • What is Privilege Management?
  • Server Overview
  • Client Overview
  • Policy Overview
2

Configuring Core Policies

  • Creating Workstyles
  • Defining Applications
  • Configuring End-User Messages
  • Applying Application Rules
  • Reviewing Access Tokens
3

Exploring Use Cases

  • Exploring Specific and Automatic Elevations
  • Replacing UAC Messaging
  • Enabling On-Demand Elevation
  • Applying the Whitelist
  • Blocking Specific Applications
  • Discovering Unknown Applications
4

Enabling Advanced Features

  • Using Workstyle Filters
  • Collecting User and Host Data
  • Using Remote Powershell
  • Utilizing Advanced Application Definitions
  • Enabling Content Control
  • Using Audit Scripts
  • Enabling Rule Scripts
  • Trusted Application Protection (TAP)
  • Configuring Trusted Application Protection
  • Creating Custom Tokens
5

Understanding the Protected Environment

  • Examining the Client Architecture
  • Exploring the Client Footprint
  • Applying Anti-Tamper Protection
  • Prohibiting Privilege Account Management
6

Solving Configuration Issues

  • Examining the Troubleshooting Workflow
  • Using Basic Troubleshooting Steps
  • Examining Policy Conflicts
  • Resolving Compatibility Issues
  • Utilizing Troubleshooting Tools

Encarta Labs Advantage

  • One Stop Corporate Training Solution Providers for over 6,000 various courses on a variety of subjects
  • All courses are delivered by Industry Veterans
  • Get jumpstarted from newbie to production ready in a matter of few days
  • Trained more than 50,000 Corporate executives across the Globe
  • All our trainings are conducted in workshop mode with more focus on hands-on sessions

View our other course offerings by visiting https://www.encartalabs.com/course-catalogue-all.php

Contact us for delivering this course as a public/open-house workshop/online training for a group of 10+ candidates.

Top
Notice
X