Forcepoint Email Security Administrator Course

2 Day Course
Hands On
Official Curriculum

Book Now - 1 Delivery Method Available:

Classroom Virtual Classroom Private Group - Virtual Self-Paced Online


During the two days, you will learn the features, components, and key integrations that enable Forcepoint Email Security functionalities; how to administer policies, handle incidents, upgrade, manage and assess the health of the Forcepoint Email Security system. You will develop skills in creating email policies, configure email encryption, incident management, reporting, and system architecture and maintenance.


Describe the key capabilities of Forcepoint Email Security
•    Understand the required and add-on components of Forcepoint Email Security
•    Understand multiple deployment scenarios
•    Perform initial setup configurations
•    Configure connection level controls and message properties
•    Create policies to fulfill various organization needs
•    Understand the difference between various block/permit lists
•    Configure email DLP policies
•    Configure and customize PEM portal
•    Understand email encryption methods
•    Run and interpret reports and configure logs
•    Understand how to upgrade the system and disaster recovery procedures

Certification requirements

•    Completion of all course sessions
•    Configured lab exercises
•    Certification exam (multiple choice)

Target Audience

End-User/Customers: System administrators, network security administrators, IT staff
•    Channel Partners: Sales Engineers, consultants, implementation specialists

Training Partners

We work with the following best of breed training partners using our bulk buying power to bring you a wider range of dates, locations and prices.


Hide all

Forcepoint solution overview (1 topic)

  • Forcepoint solution introduction

Forcepoint Email Security features and new features (2 topics)

  • Key features
  • What's new

Understanding the deployment (9 topics)

  • Forcepoint Email Security appliances
  • V-Series appliance interfaces
  • Network without Forcepoint Email Security
  • Network with Forcepoint Email Security
  • Required components
  • Internal daemons
  • Communications with external services
  • Supported V-Series and X-Series models and total resources
  • Hardware allocation

Getting started with Forcepoint Email Security (2 topics)

  • Fundamental email security concepts: protected domain and email relay
  • Setting up Forcepoint Email Security

Setting up users (2 topics)

  • Domain group
  • User directory

Defining email routing (2 topics)

  • Domain-based route
  • Directory-based route

Traffic (12 topics)

  • Message processing flow
  • Setting connection properties (simultaneous connection per IP)
  • Configuring message properties (size, volume)
  • RBL & Reputation service
  • SMTP greeting delay
  • Recipient validation
  • DHA prevention
  • SPF check
  • SMTP authentication
  • Global IP block list
  • IP address group
  • Compare trusted IP group and Allow Access List

Quarantine system (3 topics)

  • Quarantine system overview
  • Queue monitor
  • Message queues

Policy (10 topics)

  • Policy flow
  • Policy type
  • Policy condition
  • Rules, filters, actions
  • Action options merge
  • Global IP and address permit list
  • Dynamic permit list
  • Built-in DLP
  • DLP integration
  • Registered with data security server

Personal Email Manager (PEM) (3 topics)

  • PEM architecture
  • Enabling PEM
  • End user block/permit list

Threat Projection Cloud (2 topics)

  • Threat Protection Cloud introduction
  • Configure Threat Protection Cloud

Traffic shaping (2 topics)

  • 5 parameters
  • How traffic shaping works

Transfer Layer Security (TLS) (6 topics)

  • Enforced/Mandatory TLS vs opportunistic TLS
  • Enable enforced TLS for incoming/outgoing connections
  • Enforced TLS security level & encryption strength
  • CA issued or self-signed TLS certification process
  • Enable mandatory TLS
  • Enable opportunistic TLS

Secure Message Delivery (5 topics)

  • Secure Message Delivery scenario 1
  • Secure Message Delivery scenario 2
  • Enable Secure Message Delivery
  • Secure encryption queue
  • Secure Message Delivery end user experiences

Maintenance (11 topics)

  • Reporting
  • Log and reporting system overview
  • Log server and database deployment
  • Dashboard & alert & logs
  • Presentation reports
  • Real-time monitor
  • Log database partition & rollover & maintenance
  • System administration & maintenance
  • Manage appliances
  • Delegated administration
  • Backup and restore

Course PDF


Share this Course


Recommend this Course