Forcepoint Triton AP-Email Administrator Eğitimi

Eğitim Hakkında

During the two days, you will learn the features, components, and key integrations that enable the APEMAIL functionalities; how to administer policies, handle incidents, upgrade, manage and assess the health of the AP-EMAIL system. You will develop skills in creating email policies, configure email encryption, incident management, reporting, and system architecture and maintenance.

Eğitim Konuları

  • Describe the key capabilities of AP-EMAIL
  • Understand the required and add-on components of AP-EMAIL
  • Understand multiple deployment scenarios
  • Perform initial setup configurations
  • Configure connection level controls and message properties
  • Create policies to fulfill various organization needs
  • Understand the difference between various block/permit lists
  • Configure email DLP policies
  • Configure and customize PEM portal
  • Understand email encryption methods
  • Run and interpret reports and configure logs
  • Understand how to upgrade the system and disaster recovery procedures

Eğitim Süresi:

FORCEPOINT Triton AP-Email Administrator Eğitimi 2 gün sürmektedir.

Eğitim İçeriği

1. Gün

  • TRITON APX overview
  • AP-EMAIL overview and what’s new
  • Understanding the deployment
    • V-series appliance
    • Network interfaces
    • Required components
    • V-series modules
    • Hardware resources
    • Internal daemons and components
    • Communication points with external services
  • Getting started with AP-EMAIL
    • Fundamental email security concepts:
    • protected domain and email relay
    • Setting up AP-EMAIL
    • Setting up users
    • Setting email routing
  • Traffic
    • Message processing flow
    • Setting connection controls
      • Connection properties
      • RBL & WRS
    • Configuring message properties
    • Message size, volume
    • Recipient validation
    • True source IP detection
    • Managing message queues
  • Policies
    • Configuring policies
    • Policy components and flows
    • Policy directions
    • Policy conditions
    • Rules
    • Built-in DLP
    • DLP integration
    • Registering with data security server

2. Gün

  • Users
    • Working with users
    • Enabling PEM
    • End user block/permit list
    • IP list comparison
  • Advanced Configurations
    • Hybrid
    • Sandbox
    • URL Sandbox
    • File sandbox
    • Phishing education
    • Traffic shaping
    • Enforce TLS
  • Maintenance
    • Reporting
    • Configuring log DB options
    • Log server
    • Reporting preferences
    • Presentation reports
    • RTM
    • System administration & maintenance
    • Managing appliances
    • Delegated administrator accounts
    • Back up and restore