Contact Us
We would love to hear from you. Please complete this form to pre-book or request further information about our delivery options.

4 Days

(Online and onsite)

Price Upon Request
- Access, find, and modify key user interface options to accomplish administrative tasks.
- Customize and manage Web Security policies to meet your organization’s filtering needs.
- Extend and combine available reporting options to gain actionable insights related to Web Security detections.
- Leverage Web Security
Module 1: Understanding and Getting Started with Web Security
- Describe features, components, and key integrations that enable Web Security functionalities.
- Articulate the licensing structure for Web Security and related Modules.
- Distinguish key settings in Security Manager, Content Gateway Manager, Forcepoint Security Appliance Manager, and other available user interfaces.
- Describe the differences between Super Administrators and delegated administrators.
Module 2: Policy Enforcement and Filtering
- Describe the full scope and workflow of policy planning.
- Identify standard and custom policies, including related filters.
- Distinguish key settings in Security Manager.
- Compare user identification and proxy authentication.
- Explain how Web Security analyses user requests and enforces policies.
Module 3: Monitoring Web Security Activities
- Itemize Web Security notifications and alerts.
- Diagram the reporting flow.
- Describe various reporting options to gain important insights about your environment.
- Identify suspicious network activity using threats dashboard.
- Compare reporting tools, including legacy and Report Center features.
Module 4: Disaster Response and Recovery
- Explain how Web Security responds to incidents.
- Compare and contrast Web Security update options.
- Distinguish guidelines related to incident management and disaster recovery.
- Identify system health monitoring capabilities.
- Complete various tasks that help maintain a healthy Web Security environment.
- Define best practice procedures for disaster recovery.
- System administrators, network security administrators, IT staff, consultants
- Forcepoint channel partners, integrators, and planners who help customers with Forcepoint Web Security implementations
- Basic knowledge of Active Directory/User Directory concepts
- Basic knowledge of networking concepts (IP addresses, protocols, URLs, proxies, gateways, firewalls)
- User experience with platforms on which Forcepoint Web Security will be deployed
- Access, find, and modify key user interface options to accomplish administrative tasks.
- Customize and manage Web Security policies to meet your organization’s filtering needs.
- Extend and combine available reporting options to gain actionable insights related to Web Security detections.
- Leverage Web Security
Module 1: Understanding and Getting Started with Web Security
- Describe features, components, and key integrations that enable Web Security functionalities.
- Articulate the licensing structure for Web Security and related Modules.
- Distinguish key settings in Security Manager, Content Gateway Manager, Forcepoint Security Appliance Manager, and other available user interfaces.
- Describe the differences between Super Administrators and delegated administrators.
Module 2: Policy Enforcement and Filtering
- Describe the full scope and workflow of policy planning.
- Identify standard and custom policies, including related filters.
- Distinguish key settings in Security Manager.
- Compare user identification and proxy authentication.
- Explain how Web Security analyses user requests and enforces policies.
Module 3: Monitoring Web Security Activities
- Itemize Web Security notifications and alerts.
- Diagram the reporting flow.
- Describe various reporting options to gain important insights about your environment.
- Identify suspicious network activity using threats dashboard.
- Compare reporting tools, including legacy and Report Center features.
Module 4: Disaster Response and Recovery
- Explain how Web Security responds to incidents.
- Compare and contrast Web Security update options.
- Distinguish guidelines related to incident management and disaster recovery.
- Identify system health monitoring capabilities.
- Complete various tasks that help maintain a healthy Web Security environment.
- Define best practice procedures for disaster recovery.
- System administrators, network security administrators, IT staff, consultants
- Forcepoint channel partners, integrators, and planners who help customers with Forcepoint Web Security implementations
- Basic knowledge of Active Directory/User Directory concepts
- Basic knowledge of networking concepts (IP addresses, protocols, URLs, proxies, gateways, firewalls)
- User experience with platforms on which Forcepoint Web Security will be deployed