0345 4506120

Traps 4.2: Deploy and Optimize

Palo Alto Networks® Traps™ Advanced Endpoint Protection prevents sophisticated vulnerability exploits and unknown malware-driven attacks. Successful completion of this two-day, instructor-led course equips the student to deploy Traps in large-scale or complex configurations and optimize its configuration.

Who should attend

Security Engineers, System Administrators, and Technical Support Engineers.

We don't currently have any courses listed for Traps 4.2: Deploy and Optimize, would you like to view all courses for Information & Cyber Security?

Learning Objectives

Students will learn how to design, build, implement, and optimize large-scale Traps deployments: those with multiple servers and/or thousands of endpoints. In hands-on lab exercises, students will distribute Traps endpoint software in an automated way; prepare master images for VDI deployment; build multiESM deployments; design and implement customized policies; test Traps with exploits created using Metasploit; and examine prevention dumps with windbg.


Students should have completed Traps 4.2: Install, Configure and Manage or (for Palo Alto Networks employee and partner SEs) “PSE: Endpoint Associate” training. Windows system administration skills and familiarity with enterprise security concepts also are required.

Course Content

Module 1: Scaling Server Infrastructure

Small site architectures

Large site architectures

TLS/SSL deployment considerations

Module 2: Scaling Agent Deployment

Distributing Traps via GPO

Configuring Virtual Desktop Infrastructure with Traps

Module 3: ESM Tuning

Tuning ESM settings

External logging and SIEM integration

Role-based access control (RBAC)

Defining conditions

Tuning policies

Implementing ongoing maintenance

Module 4: Windows Migrations for Traps

SQL database migration

SSL certificate migration

Module 5: Advanced Traps Forensics

Best practices for managing forensic data

Agent queries

Resources for malicious software testing

Exploit challenge testing with Metasploit

Exploit dump analysis with windbg

Module 6: Advanced Traps Troubleshooting

ESM and Traps architecture

Troubleshooting scenarios using dbconfig and Cytool

Troubleshooting application compatibility and BITS connectivity

Privacy Notice

In order to provide you with the service requested we will need to retain and use your contact information in accordance with our Privacy Notice. If you choose to provide us with this information you explicitly consent to us using the information as necessary to provide the requested service to you. If you do not agree please do not proceed to request the service from us.

Marketing Permissions

Would you like to receive our newsletter and other information on products and services which we think will be of interest to you by email. We will always treat your information with care and in accordance with our Privacy Notice. You are free to withdraw this permission at any time.


Online Courses

You may prefer an online course if you are looking for a flexible and cost-effective solution. Online courses allow you to study at your own pace, at a time that suits you.

We have the following eLearning options available:

Our Customers Include