During the two days, you will learn the features, components, and key integrations that enable the AP-EMAIL functionalities; how to administer policies, handle incidents, upgrade, manage and assess the health of the AP-EMAIL system. You will develop skills in creating email policies, configure email encryption, incident management, reporting, and system architecture and maintenance
Ota yhteyttä
Voit olla meihin yhteydessä ja tiedustella koulutuksistamme täydentämällä yhteystietosi ja koulutuksen nimen oheen.

2 päivää

(Online ja paikan päällä)

Hinta pyydettäessä
Upon successful completion of the course, delegates should be able to:
- Describe the key capabilities of AP-EMAIL
- Understand the required and add-on components of AP-EMAIL
- Understand multiple deployment scenarios
- Perform initial setup configurations
- Configure connection level controls and message properties
- Create policies to fulfill various organization needs
- Understand the difference between various block/permit lists
- Configure email DLP policies
- Configure and customize PEM portal
- Understand email encryption methods
- Run and interpret reports and configure logs
- Understand how to upgrade the system and disaster recovery procedures
Day 1
- 1) TRITON APX overview
- 2) AP-EMAIL overview and what’s new
- 3) Understanding the deployment
- a) V-series appliance
- b) Network interfaces
- c) Required components
- d) V-series modules
- e) Hardware resources
- f) Internal daemons and components
- g) Communication points with external services
- 4) Getting started with AP-EMAIL
- a) Fundamental email security concepts: protected domain and email relay
- b) Setting up AP-EMAIL
- c) Setting up users
- d) Setting email routing
- 5) Traffic
- a) Message processing flow
- b) Setting connection controls
- I. Connection properties
- II. RBL & WRS
- c) Configuring message properties
- I. Message size, volume
- II. Recipient validation
- d) True source IP detection
- e) Managing message queues
- 6) Policies
- a) Configuring policies
- I. Policy components and flows
- II. Policy directions
- III.Policy conditions
- IV.Rules
- b) Built-in DLP
- I. DLP integration
- II. Registering with data security server
Day 2
- 1) Users
- a) Working with users
- I. Enabling PEM
- II. End user block/permit list
- III.IP list comparison
- 2) Advanced Configurations
- a) Hybrid
- b) Sandbox
- I. URL Sandbox
- II. File sandbox
- III.Phishing education
- c) Traffic shaping
- d) Enforce TLS
- 3) Maintenance
- a) Reporting
- I. Configuring log DB options
- II. Log server
- III.Reporting preferences
- IV.Presentation reports
- V. RTM
- b) System administration & maintenance
- I. Managing appliances
- II. Delegated administrator accounts
- III.Back up and restore
- End-User/Customers: System administrators, network security administrators, IT staff
- Channel Partners: Sales Engineers, consultants, implementation specialists
None
During the two days, you will learn the features, components, and key integrations that enable the AP-EMAIL functionalities; how to administer policies, handle incidents, upgrade, manage and assess the health of the AP-EMAIL system. You will develop skills in creating email policies, configure email encryption, incident management, reporting, and system architecture and maintenance
Upon successful completion of the course, delegates should be able to:
- Describe the key capabilities of AP-EMAIL
- Understand the required and add-on components of AP-EMAIL
- Understand multiple deployment scenarios
- Perform initial setup configurations
- Configure connection level controls and message properties
- Create policies to fulfill various organization needs
- Understand the difference between various block/permit lists
- Configure email DLP policies
- Configure and customize PEM portal
- Understand email encryption methods
- Run and interpret reports and configure logs
- Understand how to upgrade the system and disaster recovery procedures
Day 1
- 1) TRITON APX overview
- 2) AP-EMAIL overview and what’s new
- 3) Understanding the deployment
- a) V-series appliance
- b) Network interfaces
- c) Required components
- d) V-series modules
- e) Hardware resources
- f) Internal daemons and components
- g) Communication points with external services
- 4) Getting started with AP-EMAIL
- a) Fundamental email security concepts: protected domain and email relay
- b) Setting up AP-EMAIL
- c) Setting up users
- d) Setting email routing
- 5) Traffic
- a) Message processing flow
- b) Setting connection controls
- I. Connection properties
- II. RBL & WRS
- c) Configuring message properties
- I. Message size, volume
- II. Recipient validation
- d) True source IP detection
- e) Managing message queues
- 6) Policies
- a) Configuring policies
- I. Policy components and flows
- II. Policy directions
- III.Policy conditions
- IV.Rules
- b) Built-in DLP
- I. DLP integration
- II. Registering with data security server
Day 2
- 1) Users
- a) Working with users
- I. Enabling PEM
- II. End user block/permit list
- III.IP list comparison
- 2) Advanced Configurations
- a) Hybrid
- b) Sandbox
- I. URL Sandbox
- II. File sandbox
- III.Phishing education
- c) Traffic shaping
- d) Enforce TLS
- 3) Maintenance
- a) Reporting
- I. Configuring log DB options
- II. Log server
- III.Reporting preferences
- IV.Presentation reports
- V. RTM
- b) System administration & maintenance
- I. Managing appliances
- II. Delegated administrator accounts
- III.Back up and restore
- End-User/Customers: System administrators, network security administrators, IT staff
- Channel Partners: Sales Engineers, consultants, implementation specialists
None