Skip to main content

self-study guide for system center endpoint protection

whether you call it forefront endpoint protection (fep) or system center endpoint protection (scep), you might find these resources valuable as a means of getting up to speed. a good friend of mine created this awesome guide. anyway, sharing is caring. here you go...

 

 


Top Level Site for SCEP: http://www.microsoft.com/fep

 

Forefront Training

Featured Videos

 

Microsoft Forefront Virtual Event (TechNet Edge)

 

Forefront Endpoint Protection 2010 (TechNet)

  • What’s New in FEP 2010 Update Rollup 1
  • Release Notes
  • Overview
  • System Requirements
  • Getting Started
  • Planning and Architecture
  • Performance and Scalability
  • Server Installation
  • Client Deployment
  • Operations
  • Troubleshooting
  • Technical Reference

 

System Center 2012 Endpoint Protection

  • System Center Endpoint Protection 2012
    • What’s new in Forefront Endpoint Protection 2012?
    • Endpoint Protection (TechNet)
      • System Center 2012 Endpoint Protection Privacy Statement
      • Information and Support for System Center 2012 Endpoint Protection
      • Endpoint Protection Client Help
        • Why do I need antivirus and antispyware software?
        • Getting started
        • Scanning for viruses, spyware, and other potentially unwanted software
        • What’s real-time protection?
        • How do I know that Endpoint Protection is running on my computer?
        • What are virus and spyware definitions?
        • How do I remove or restore items quarantined by Endpoint Protection?
        • What is the Microsoft Active Protection Service Community?
        • Troubleshooting
        • Glossary
  • Endpoint Protection in Configuration Manager
    • Introduction to Endpoint Protection in Configuration Manager
    • Planning for Endpoint Protection in Configuration Manager
    • Configuring Endpoint Protection in Configuration Manager
    • Operations and Maintenance for Endpoint Protection in Configuration Manager
    • Security and Privacy for Endpoint Protection in Configuration Manager
    • Technical Reference for Endpoint Protection in Configuration Manager

 

Forefront Webcasts/Podcasts

These videos and audios offer Forefront Endpoint Protection tips, news and interviews that you can listen to at your convenience.

 

Forefront Forums

These forums provide administrators opportunities to engage in discussions related to Forefront Endpoint Protection.  It is a place where questions can be asked/answered, where you can review conversations on relevant topics by other administrators, and where you can interact with other IT professionals.

 

Forefront Endpoint Protection 2010 Support

On this site, you can search an extensive database for answers to technical issues.  This site allows you to locate relevant Knowledge Base (KB) articles, as well as enabling you to search by events or error codes.

 

Downloads

Here, administrators can download both FEP 2010 as well as the FEP 2010 Security Management Pack for use with System Center Operations Manager (SCOM)

 

Useful Blogs

These blogs are where experts in Forefront technologies post their thoughts, relevant information, news, and general guidance.  They are very useful methods for administrators to remain up to date on the latest information related to Forefront Endpoint Protection.

 

Forefront Classroom Training

This section lists the various training classes available for Forefront Endpoint Protection.  These classes are available through Microsoft’s training partners.

  • Course 50509A: Implementing Forefront Endpoint Protection 2010 (2-day instructor led)
    • After completing this course, students will be able to:
      • Articulate the value proposition and key features of FEP 2010.
      • Understand the protection technologies built into the FEP client to protect desktops, laptops and servers from malicious code threats.
      • Understand the fundamental concepts of System Center Configuration Manager 2007.
      • Understand the FEP server components and how they are integrated into a System Center Configuration Manager 2007 infrastructure.
      • Understand how to manage FEP client policy and definition updates.
      • Understand the FEP client architecture and how the client can be deployed across an organization.
      • Understand the various options for monitoring, alerting and reporting on the health and malware activity of FEP clients.
      • Understand how FEP can leverage System Center Operations Manager 2007 to provide real-time monitoring of high value endpoints.

Comments

Popular posts from this blog

using preloadpkgonsite.exe to stage compressed copies to child site distribution points

UPDATE: john marcum sent me a kind email to let me know about a problem he ran into with preloadpkgonsite.exe in the new SCCM Toolkit V2 where under certain conditions, packages will not uncompress.  if you are using the v2 toolkit, PLEASE read this blog post before proceeding.   here’s a scenario that came up on the mssms@lists.myitforum.com mailing list. when confronted with a situation of large packages and wan links, it’s generally best to get the data to the other location without going over the wire. in this case, 75gb. :/ the “how” you get the files there is really not the most important thing to worry about. once they’re there and moved to the appropriate location, preloadpkgonsite.exe is required to install the compressed source files. once done, a status message goes back to the parent server which should stop the upstream server from copying the package source files over the wan to the child site. anyway, if it’s a relatively small amount of packages, you can

How to Identify Applications Using Your Domain Controller

Problem Everyone has been through it. We've all had to retire or replace a domain controller at some point in our checkered collective experiences. While AD provides very intelligent high availability, some applications are just plain dumb. They do not observe site awareness or participate in locating a domain controller. All they want is the name or IP of one domain controller which gets hardcoded in a configuration file somewhere, deeply embedded in some file folder or setting that you are never going to find. How do you look at a DC and decide which applications might be doing it? Packet trace? Logs? Shut it down and wait for screaming? It seems very tedious and nearly impossible. Potential Solution Obviously I wouldn't even bother posting this if I hadn't run across something interesting. :) I ran across something in draftcalled Domain Controller Isolation. Since it's in draft, I don't know that it's published yet. HOWEVER, the concept is based off

sccm: content hash fails to match

back in 2008, I wrote up a little thing about how distribution manager fails to send a package to a distribution point . even though a lot of what I wrote that for was the failure of packages to get delivered to child sites, the result was pretty much the same. when the client tries to run the advertisement with an old package, the result was a failure because of content mismatch. I went through an ordeal recently capturing these exact kinds of failures and corrected quite a number of problems with these packages. the resulting blog post is my effort to capture how these problems were resolved. if nothing else, it's a basic checklist of things you can use.   DETECTION status messages take a look at your status messages. this has to be the easiest way to determine where these problems exist. unfortunately, it requires that a client is already experiencing problems. there are client logs you can examine as well such as cas, but I wasn't even sure I was going to have enough m