ForeScout CounterACT


ForeScout CounterACT training is a four-day course featuring instruction and hands-on lab experiences in a simulated IT environment. Students learn and practice how to establish security policies using all of our available tools. Students will classify and control network assets in a network environment to observe first-hand how CounterACT monitors and protects an enterprise network. A typical four-day course includes the following.

  • Security Administrators
  • Security designers and architects
  • Network Administrators


Chapter 1 – Introduction
This is a brief introduction to ForeScout’s vision and concepts of Network Access Control.

Chapter 2 – Terms and Architecture
This lesson introduces students to the commonly used terms such as plugin, segment, channel, organisational unit, and networking terms. We also cover the pre-requisites for a notional CounterAct deployment.

Chapter 3 – CounterACT installation
Participants configure CounterACT for installation in a practical network environment including configuring switch connectivity, Active Directory integration, and account management.

Chapter 4 – Console overview
This is a tour of the console to illustrate features and demonstrate navigation.


Chapter 5 – CounterACT configuration
Detailed instructions for configuring CounterACT independent from first-time login. Plugins, Channel, Host Property Scanner, Switch Observe and the configuration of CounterACT options.

Chapter 6 – CounterACT deployment
Students learn the best practices for a successful CounterACT deployment: including appliance locations, layer 2 versus layer 3 installation and network integration.

Chapter 7 – Policy overview
Students get a foundational overview of how policies are created and function within the CounterACT console.

Chapter 8 – Classification
Students learn how to classify network assets in CounterACT.

Chapter 9 – Clarification
The clarification chapter shows how to identify the management capabilities of the hosts, starting with established Classification groups.


Chapter 10 – Compliance
Students create policies to establish a network and endpoint compliance posture for a typical corporate environment.

Chapter 11 – Threat protection
Threat protection introduces students to the concept of ForeScout threat protection and deployment options for any CounterACT installation.

Chapter 12 – Control
Students enforce a compliance posture by assigning network devices to VLANs and ACLs, updating asset anti-virus and patch levels, and enabling guest registration.

Chapter 13 – CounterACT host management
Students configure Windows, Linux, and network endpoints with CounterACT. In addition, the student will perform housekeeping tasks such as backups and appliance updates.


Chapter 14 – CounterACT administration
Students work with CounterACT appliance and CounterACT enterprise manager administration; as well as console user management.

Chapter 15 – Inventory, Assets, Reporting, Dashboard
Students learn to use the inventory, assets portal, reporting, and dashboard.

Chapter 16 – Troubleshooting
This lesson introduces common troubleshooting methods used in a typical CounterACT deployment.

It is assumed that attendees possess background knowledge moderate of TCP/IP fundamentals

Duration: 4 Days

Campus Contern
Bâtiment Colibri
19 Rue Edmond Reuter
L - 5326 Contern
Phone : +352 267 469 200