The SCEP (System Center Endpoint Protection) engine required period updates. Because threats are constantly changing, virus, spyware and network inspection signatures databases also need to be update either through SCCM (System Center Configuration Manager), WSUS, directly online, of from a UNC file share.
- [Instructor] After deploying the end point clients…the next consideration is how to get updates…sent to them effectively.…In this video we'll talk about planning an update strategy.…The two update categories we should think about here…are the end point client engine updates,…or if you're using Windows 10 that would be the…Windows Defender Engine,…and then there are the definition updates…for spyware and viruses themselves.…So we need to get those deployed in a reliable way…to end point clients.…
Within an anti-malware policy,…we've got a number of update settings…that control how definition updates…get deployed and when.…So for instance we've got the client check interval,…the default of which is eight hours…that determines how often clients will check…to see if there are any new updates.…We can specify update sources from which…those updates are pulled down to the clients.…We've got settings available for offline…clients and deadlines in terms of…when they come online, when the updates should be applied.…
But where are these exactly?…
- Malware types
- Getting Endpoint Protection up and running
- Deploying the SCEP Windows client
- Removing malware on a SCEP client
- Configuring custom policies
- Planning an update strategy
- Windows firewall settings
- Using PowerShell cmdlets for monitoring
Skill Level Beginner
1. Defining Malware Types
2 Getting Endpoint Protection Up and Running
3. Endpoint Protection Policies
4. Monitoring Endpoint Protection
Next steps1m 11s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.