In theAssess Phaseof the Symantec Endpoint Security Complete (SESC) Implementation Framework, two key stages are critical to establishing a thorough understanding of the environment and defining requirements. These stages are:
Planning: This initial stage involves creating a strategic approach to assess the organization’s current security posture, defining objectives, and setting the scope for data collection. Planning is essential to ensure the following steps are organized and targeted to capture the necessary details about the current environment.
Data Gathering: This stage follows planning and includes actively collecting detailed information about the organization’s infrastructure, endpoint configurations, network topology, and existing security policies. This information provides a foundational view of the environment, allowing for accurate identification of requirements and potential areas of improvement.
References in SES Complete Documentationhighlight that successful execution of these stages results in a tailored security assessment that aligns with the specific needs and objectives of the organization. Detailed instructions and best practices for conducting these stages are covered in theAssessing the Customer Environment and Objectivessection of the SES Complete Implementation Curriculum.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit