In the Assess Phase of the Symantec Endpoint Security Complete (SESC) Implementation Framework,
two key stages are critical to establishing a thorough understanding of the environment and defining
requirements. These stages are:
Planning: This initial stage involves creating a strategic approach to assess the organization’s current
security posture, defining objectives, and setting the scope for data collection. Planning is essential
to ensure the following steps are organized and targeted to capture the necessary details about the
current environment.
Data Gathering: This stage follows planning and includes actively collecting detailed information
about the organization’s infrastructure, endpoint configurations, network topology, and existing
security policies. This information provides a foundational view of the environment, allowing for
accurate identification of requirements and potential areas of improvement.
Reference in SES Complete Documentation highlight that successful execution of these stages results
in a tailored security assessment that aligns with the specific needs and objectives of the
organization. Detailed instructions and best practices for conducting these stages are covered in the
Assessing the Customer Environment and Objectives section of the SES Complete Implementation
Curriculum.