Securing Workstations using ZENworks Endpoint Security Management (8520)

In this course you learn how to use ZENworks Endpoint Security Management (ZESM) to secure your company's workstations by configuring and publishing Security Policies that control access to USB ports and removable media devices, and provide for data encryption and application control. Although no previous experience with ZESM is required, you should have a background in managing Windows d...

YOU MUST LOGIN TO VIEW THIS COURSE
  • Course Overview

  • Section 1: Product History and Architectural Changes

  • Section 2: ESM Related Concepts

  • Section 3: ESM Policies

  • Section 4: ESM Utilities

  • Section 5: ESM Best Practices

  • Course Overview

    Course Description

    In this course you learn how to use ZENworks Endpoint Security Management (ZESM) to secure your company’s workstations by configuring and publishing Security Policies that control access to USB ports and removable media devices, and provide for data encryption and application control. Although no previous experience with ZESM is required, you should have a background in managing Windows desktops in a networked environment and be familiar with Active Directory.

    The following topics are covered in this course:

    • Product History and Architectural Changes
    • ESM Related Concepts
    • ESM Policies
    • ESM Utilities
    • ESM Best Practices

    Preview

    Introduction