Alert Analysis with Email Security Cloud

Training Overview

This training provides an overview of Trellix Email Security – Cloud core functionality & covers administration procedures & alert analysis.

Duration: 1 day

Prerequisites

A working understanding of networking & network security & Windows operating & file systems

Audience Profile

Analysts (primary) & administrators responsible for the setup & management of Email Security – Cloud & use Email Security – Cloud to detect, investigate, & prevent cyber threats.

Learning Objectives:

After completing this training, learners should be able to:

  • Describe how Email Security detects & protects against malware
  • Demonstrate knowledge of the email analysis process
  • Configure Email Security settings, policies & notifications
  • Describe the various queues used for email management & processing
  • Identify alerts correlated with Trellix Network Security with & without Trellix Central Management
  • Find critical alert information on the dashboard
  • Access & manage alerts & quarantined emails
  • Examine OS & file changes in alert details to identify malware behaviours & triage alerts

Content Outline

  • Malware overview & definition
  • Attack motivations
  • Targeted attack lifecycle
  • Types of malware
  • Emerging threat actors
  • Email Security internal flow
  • Malicious email campaigns
  • Email threats
  • Email hunting
  • Email alerts summary & message details
  • Quarantine
  • Malware objects
  • Email trace
  • Email executive summary report
  • APIs
  • File & folder actions
  • Code injection
  • Processes
  • Mutexes
  • Windows registry events
  • Network access
  • User account access (UAC)
  • Setting up & testing a new domain
  • Policy configuration
  • Remediation
  • Custom rules & YARA
  • End-user reporting & notifications
  • Email analysis status
  • Advanced configurations
  • YARA hexadecimal
  • Regular expressions
  • Conditions
  • YARA rule resources
  • YARA in Trellix Email
  • Security – Cloud

FAQs

Trellix Endpoint Security (ENS) protects the productivity of users with a common service layer & our new anti-malware core engine that helps minimize the number of resources & power required by a user's system.

YARA rules analyze & detect potentially malicious textual or binary patterns within an email body, header, or attachment. Rules you write in a YARA file can be uploaded to the Email Cloud Web UI & assigned to a domain. YARA rules can be configured to monitor, alert, or alert & quarantine when email matches the patterns you specify in a YARA file.

After completing this training, learners should be able to:

  • Describe how Email Security detects & protects against malware
  • Demonstrate knowledge of the email analysis process
  • Configure Email Security settings, policies & notifications
  • Describe the various queues used for email management & processing
  • Identify alerts correlated with Trellix Network Security with & without Trellix Central Management
  • Find critical alert information on the dashboard

Trellix Email Security – Cloud offers industry-leading detection to identify, isolate, & immediately stop ransomware, business email compromise, spear phishing, impersonation, & attachment-based attacks before they enter your environment.

It is recommended but not mandatory. Being acquainted with the primary training material will enable professionals & the trainer to move at the desired pace during classes. You can access training for most vendors.

You can buy online from the page by clicking on "Buy Now". You can view alternate payment methods on the payment options page.

Yes, professionals can pay from the training page.

The training completion certification will be awarded to all the professionals who've completed the training program & the project assignment given by your instructor. You may use the certificate in your future job interviews will certainly help you to get your dream job.

Radiant believes in a practical & creative approach to training & development, which distinguishes it from other training & developmental platforms. Moreover, training is undertaken by some experts with a range of experience in their domain.

Send a Message.


  • Enroll