Forcepoint DLP Administrator Course

3 Day Course
Hands On
Official Curriculum

Book Now - 1 Delivery Method Available:

Classroom Virtual Classroom Private Group - Virtual Self-Paced Online


During the three days, you will learn how to test an existing deployment, how to administer policies and reports, handle incidents and endpoints, upgrade and manage the Forcepoint DLP system. You will develop skills in creating data policies, building custom classifiers and using predefined policies, incident management, reporting, and system maintenance.


Understand simple Forcepoint DLP product deployments
•    Create and use custom classifiers
•    Use predefined classifiers, rules and policies
•    Control various channels of potential data leaks – in TCP networking, discovery and by endpoint
•    Manipulate incidents and reports
•    Configure incident workflows using TRITON GUI or email
•    Perform the backup and restore

Target Audience

End-User/Customers: System administrators, network security administrators, IT staff
•    Channel Partners: Sales Engineers, consultants, implementation specialists

Training Partners

We work with the following best of breed training partners using our bulk buying power to bring you a wider range of dates, locations and prices.


Hide all

AP-DATA Product and Basic Deployment (9 topics)

  • Forcepoint product overview
  • What is DLP
  • What is new in the 8.x versions
  • Simple Forcepoint DLP deployments, network topology before and after
  • Management consoles
  • Forcepoint DLP key configurations
  • Registering CG and Forcepoint Email Security
  • ICAP-mode Protector
  • Data security in cloud deployments

Forcepoint DLP Components, Transaction Processing (7 topics)

  • Involved machines, OS, virtualization, processes
  • Load Balancing and Policiy Engine Interface (PEI)
  • Processing data transactions, Policy Engine (PE)
  • Testing DLP channels
  • CLI tools to extract plaintext and test policies
  • Custom logic in rule conditions
  • Testing limits of file size, large ZIPs and timeouts.

Custom and Predefined Classifiers (7 topics)

  • Keyphrases and dictionaries
  • Regular expressions
  • File classifiers
  • Script overview. "Supporting terms" near sensitive data; context analysis
  • Credit cards: PCI audit rules, CCN classifiers, Luhn check, prefixes (BINs)
  • Policy exceptions for custom LDAP groups, domains, etc.
  • Cumulative rules (Drip DLP)

Fingerprinting and ML (4 topics)

  • File fingerprinting; possibly with ignored sections
  • Database fingerprinting
  • Scheduling, exporting and synchronizing fingerprints
  • Machine Learning

Data Endpoint (9 topics)

  • Data Endpoint Initial setup
  • EP statuses and disabling them
  • EP profiles, updates and incident reporting
  • Endpoint support for browsers
  • Endpoint support for email clients
  • Hooking application OS calls
  • Unhooking/excluding applications
  • Encryption with User-Defined Key and Profile Key
  • EP and printer drivers, screenshots, optical media, LAN control

Discovery Policies (7 topics)

  • Custom and predefined discovery policies
  • Scheduling file scans, incremental scanning
  • Scheduling scans of SharePoint Online, Outlook PST, etc.
  • Responding to discovery incidents
  • Configuring file discovery on EP
  • Incremental scans
  • FPNE - fingerprint classifiers on EP

Incidents and Reporting (7 topics)

  • Incident manipulation: release, escalation, severity change, assignment, deletion
  • Action plans and notifications
  • Force-release feature
  • Email-based workflow
  • Create a Delegated Admin (DA) with limited permissions
  • Incident reports - exporting from TRITON GUI or with a script
  • Traffic and audit logs

Diagnostics, Backups, Upgrades (8 topics)

  • Inspecting PEI and PE logs; issues with timeouts and load balancing
  • Mega-breaches and performance
  • Gathering diagnostics for issue escalation
  • Archiving incident DB partitions and forensics
  • Full backup and restore of a AP-DATA Forcepoint DLP configuration
  • Semi-automatic failover
  • Forcepoint DLP Manager and system module upgrades, backward compatibility
  • Endpoint upgrades, backward and forward compatibility


It is recommended that the students should have a working knowledge of Windows administration, System Administration concepts, a basic understanding of computer security concepts, and a general understanding of viruses and anti-virus technologies.

Course PDF


Share this Course


Recommend this Course