See how Insoft Services is responding to COVID-19

Forcepoint Email Security Administrator Course

X

Contact Us

We would love to hear from you. Please complete this form to pre-book or request further information about our delivery options.

Subscribe

I'd like to receive emails with the latest updates and promotions from Insoft.

Data Protection & Privacy

I hereby allow Insoft Ltd. to contact me on this topic. Further, I authorise Insoft Ltd. processing, using collecting and storing my personal data for the purpose of these activities. All your data will be protected and secured as outlined in our privacy policy.


Upcoming Courses


Dec 7 - Dec 8, 2020
09:00 - 17:00 (CEST)
Online

Forcepoint Email Security Administrator Course
2 days  (Instructor Led Online)  |  Network Security

Course Details

During the Forcepoint Email Security Administrator course, you will learn the features, components, and key integrations that enable Forcepoint Email Security functionalities; how to administer policies, handle incidents, upgrade, manage and assess the health of the Forcepoint Email Security system. You will develop skills in creating email policies, configure email encryption, incident management, reporting, and system architecture and maintenance.

 

See other Forcepoint courses

Objectives

  • Describe the key capabilities of Forcepoint Email Security
  • Understand the required and add-on components of Forcepoint Email Security
  • Understand multiple deployment scenarios
  • Perform initial setup configurations
  • Configure connection level controls and message properties
  • Create policies to fulfill various organization needs
  • Understand the difference between various block/permit lists
  • Configure email DLP policies
  • Configure and customize PEM portal
  • Understand email encryption methods
  • Run and interpret reports and configure logs
  • Understand how to upgrade the system and disaster recovery procedures

Outline

Topic 1: Features & Components

  • Forcepoint solution overview
    • Forcepoint solution introduction
  • Forcepoint Email Security features and new features
    • Key features
    • What’s new
  • Understanding the deployment
    • Forcepoint Email Security appliances
    • V-Series appliance interfaces
    • Network without Forcepoint Email Security
    • Network with Forcepoint Email Security
    • Required components
    • Internal daemons
    • Communications with external services
    • Supported V-Series and X-Series models and total resources
    • Hardware allocation
  • Getting started with Forcepoint Email Security
    • Fundamental email security concepts: protected domain and email relay
    • Setting up Forcepoint Email Security
  • Setting up users
    • Domain group
    • User directory
  • Defining email routing
    • Domain-based route
    • Directory-based route

Topic 2: Traffic & Policies

  • Traffic
    • Message processing flow
    • Setting connection properties (simultaneous connection per IP)
    • Configuring message properties (size, volume)
    • RBL & Reputation service
    • SMTP greeting delay
    • Recipient validation
    • DHA prevention
    • SPF check
    • SMTP authentication
    • Global IP block list
    • IP address group
    • Compare trusted IP group and Allow Access List
  • Quarantine system
    • Quarantine system overview
    • Queue monitor
    • Message queues
  • Policy
    • Policy flow
    • Policy type
    • Policy condition
    • Rules, filters, actions
    • Action options merge
    • Global IP and address permit list
    • Dynamic permit list
    • Built-in DLP
      • DLP integration
      • Registered with data security server

Topic 3: PEM & advanced configurations & Maintenance

  • Personal Email Manager (PEM)
    • PEM architecture
    • Enabling PEM
    • End user block/permit list
  • Threat Projection Cloud
    • Threat Protection Cloud introduction
    • Configure Threat Protection Cloud
  • Traffic shaping
    • 5 parameters
    • How traffic shaping works
  • Transfer Layer Security (TLS)
    • Enforced/Mandatory TLS vs opportunistic TLS
    • Enable enforced TLS for incoming/outgoing connections
    • Enforced TLS security level & encryption strength
    • CA issued or self-signed TLS certification process
    • Enable mandatory TLS
    • Enable opportunistic TLS
  • Secure Message Delivery
    • Secure Message Delivery scenario 1
    • Secure Message Delivery scenario 2
    • Enable Secure Message Delivery
    • Secure encryption queue
    • Secure Message Delivery end-user experiences
  • Maintenance
    • Reporting
      • Log and reporting system overview
      • Log Server and database deployment
      • Dashboard & alert & logs
      • Presentation reports
      • Real-time monitor
      • Log database partition & rollover & maintenance
    • System administration & maintenance
      • Manage appliances
      • Delegated administration
      • Backup and restore

Target Audience

  • End-User/Customers: System administrators, network security administrators, IT staff
  • Channel Partners: Sales Engineers, consultants, implementation specialists

Prerequisites

None