This course focuses on a step-by-step framework for completing initial configuration tasks and getting Cisco Stealthwatch System up and running in the network. You will experience lab- intensive activities that focus on critical initial configuration steps that allow the Cisco Stealthwatch System to monitor flows and network behavior, and provide you with data you can use to determine next steps, such as what policies (tuning) are necessary to put in place to manage the amount of data presented.
Cisco Stealthwatch for System Administrators (SSA)
Schedule
- No schedule events found for this course.
- PC
Private Class
Privately train a group of your employees at your facility, virtually, or any of our locations.
- PC
- LCLive Classroom
Live Classroom
Learn and interact with your instructor and peers in-person in our classrooms. - VCVirtual Classroom
Virtual Classroom
Attend any of our instructor-led classes virtually regardless of your physical location. - PCPrivate Class
Private Class
Privately train a group of your employees at your facility, virtually, or any of our locations. - GTRGuaranteed to Run
Guaranteed to Run
GTR classes are guaranteed to run as promised and delivered.
Course Summary
Show All
Description
Objectives
Upon completing this course, you will be able to:
- Validate network configuration of Cisco Stealthwatch appliances.
- Set base SMC configuration values.
- Use SMC documents and reports, to determine if exporters are properly setup.
- Use SMC documents and reports, to determine IP addresses that belong to your organization.
- Properly place hosts into appropriate host groups.
- Define services and applications.
- Organize network devices into the BY Function host group.
- Define basic concepts of policy management and apply policy to host groups.
- Add Cisco Stealthwatch users with specific roles.
- Create custom documents.
- Establish response management rules, triggers and actions.
Prerequisites
- Flow Basics
- Cisco Stealthwatch Overview and Components
- Cisco Stealthwatch SMC Web App Interface Overview
- Cisco Stealthwatch SMC Client Interface Overview
Who Should Attend
- Customers whose role is to complete the initial configuration of the Cisco Stealthwatch System into their network.
- Channel partners responsible for completing the initial configuration of the Cisco Stealthwatch System into a customer network
- Employees responsible for completing the initial configuration of the Cisco Stealthwatch System into a customer network.
Outline
Day One
- Welcome
- Why Stealthwatch?
- The Many User Inter"Faces” of Stealthwatch
- Stealthwatch Appliance Validation
- Demo: Stealthwatch Appliance Validation
- Lab: Validate/Change Appliance Configuration
- Management Console: Basic Setup
- Lab: SMC Basic Setup
- Lunch
- Demo: Host Groups
- Lab: Host Groups
- Demo: Classify Services and Applications
- Lab: Classify Services and Applications
- Demo: Classify Network Scanners
- Lab: Network Devices and the By Function Host Group
- Demo: Policy Management
- Lab: Policy Management
- Hosts and Host Groups
- Classify Services and Applications
- Network Devices and the By Function Host Group
- Policy Management
Day Two
- Day One Review
- User and Role Management
- Demo: User and Role Management
- Lab: User and Role Management
- Custom Documents
- Demo: Custom Document
- Lab: Custom Documents
- Demo: Response Management
- Lab: Response Management
- Response Management
- Lunch
- Review the Web Application: What’s New?
- Wrap Up