Module 1: Features & Components
1. Forcepoint solution overview
- Forcepoint solution introduction
- Forcepoint Email Security key features and new features
2. Understanding the deployment solution
- Communicate the Email Security key features.
- Articulate Email Security key benefits and differentiators from other email security products.
- Describe the Email Security Hardware Platform and Virtualization options.
- Identify the appropriate installation method and sizing requirements to follow.
- Describe the components of the Email Security and its supported platforms.
- Administer the Appliance management tools.
3. Understanding the Product Deployment
- Describe a high-level overview of email delivery with the security appliance.
- Plan for appliance and email server network integration.
- Configure physical and/or virtual appliance settings and plan for network host name and routing.
- Review and Configure Appliance Internal Daemons.
- Identify and Configure Communication Points With External Services.
- Review Planned Hardware Resources and User Loads.
4. Getting started with Forcepoint Email Security
- Describe the Fundamental Email Security Concepts and System Usage Models.
- Setup the Email Security System and Review First Boot procedures.
- Customize the Forcepoint Manager Console and Integrate the Email Module.
- Complete Initial V-Series Appliance Configuration and Install Manager Console.
5. Setting up users and defining email routing
- Configure User Directories and Customized User Groups.
- Describe Domain Group Integration with Active Directory server.
- Define User Directories for Authentication within Domain.
- Define a User Directory filter for specific users and groups.
- Direct Outbound Emails To Email Security via Smart Host.
- Verify Outbound Email delivery to Remote Recipients.
Module 2: Traffic & Policies
6. Managing Traffic – Antispam Related Configurations
- Explain the Pre-Filtering Concept and Bulk Email Elimination Tools.
- Describe the Message Processing Flow for an SMTP system.
- Create a Global IP Block List and edit the Trusted Host List.
- Configure usage model for Real-Time Black List and Reputation Service checks.
- Integrate Reverse DNS Lookup and Sender Policy Framework checks.
- Verify Recipient Validation and Implement Directory Harvest Attack Prevention.
- Determine whether SMTP Authentication is a suitable resource for your organization.
- Compare trusted IP group and Allow Access List.
7. Managing Traffic – Advanced Configurations
- Identify supported SMTP Port usage for appliance and hybrid modes.
- Configure IP Address Group for Trusted and Allowed systems.
- Enable SMTP VRFY command on the test system.
- Explain how the System Administrator manages the Message Quarantine.
- Describe the differences in permissions between Trusted IP and Allow Access List.
- Enable and Monitor the Appliance Quarantine system.
- Enable the Archive queue and move it to a remote SAMBA share.
8. Configuring Email Security Policies
- Understand how Email Policy Flow, Types, and Conditions affect message flow.
- Describe the Policies combine Rules, Filters and Actions in the Email Security appliance.
- Configure default Action Types and Options.
- Configure the Integration and Merging of Message Action Options.
- Integrate Data Loss Protection (DLP) Tools with Email Security appliance.
- Configure the Global IP and Global Address Permit Lists.
- Verify policy behavior with test message generation tool.
- Configure Email Security Antivirus and Antispam policy and verify detection.
- Configure Email Data Loss Protection (DLP) action and policy rules.
- Confirm Email DLP functionality with test message capture and log reviews.
Module 3: PEM & Advanced Configurations & Maintenance
9. Personal Email Manager (PEM) operations
- Understand Personal Email Manager (PEM) architecture and use cases.
- Configure the PEM portal and complete PEM configurations.
- Describe Admin vs end user PEM and Quarantine activities.
- Customize PEM Notification message and schedule.
- Differentiate between Personal and Global address block/permit lists.
- Perform Advanced PEM Configuration for key user accounts.
- Manage Multiple Mailboxes within PEM portal.
10. Traffic shaping and threat protection
- Configure the Email Sandbox Module and test its performance on test messages.
- Analyze how Secure Message Delivery and Transport Layer Security increase message security.
- Identify Traffic Shaping parameters and customize URL Sandbox solutions.
- Configure Threat Protection Cloud.
- Five parameters of traffic shaping, and how they function.
11. Transfer Layer Security (TLS)
- Configure Secure Message Delivery for Email and DLP modules.
- Verify Secure Message Delivery via Secure Portal message pickup.
- Describe the Secure Message Delivery End User Experience for an external recipient.
- Enforced/Mandatory TLS vs opportunistic TLS.
- Enable enforced TLS for incoming/outgoing connections.
- Enforced TLS security level and encryption strength.
- Describe the TLS certification process.
- Enable mandatory TLS and opportunistic TLS.
12. Email Security Reporting and Maintenance
- Describe the overall requirements for Log Database Rollover and Maintenance.
- Identify how Dashboard tools, Health Alerts, and Logs indicate appliance performance.
- Activate and customize the Email Security Real-Time Monitor.
- Manage the Presentation Reports and the Reporting Engine tools.
- Explore Log Server Architecture and Database Partition Rollover and Deployment