During the two days, you will learn the features, components, and key integrations that enable the AP-EMAIL functionalities; how to administer policies, handle incidents, upgrade, manage and assess the health of the AP-EMAIL system. You will develop skills in creating email policies, configure email encryption, incident management, reporting, and system architecture and maintenance.

Course objectives

  • Describe the key capabilities of AP-EMAIL
  • Understand the required and add-on components of AP-EMAIL
  • Understand multiple deployment scenarios
  • Perform initial setup configurations
  • Configure connection level controls and message properties
  • Create policies to fulfill various organization needs
  • Understand the difference between various block/permit lists
  • Configure email DLP policies
  • Configure and customize PEM portal
  • Understand email encryption methods
  • Run and interpret reports and configure logs
  • Understand how to upgrade the system and disaster recovery procedures

Course Outline

Day 1

1) TRITON APX overview

2) AP-EMAIL overview and what’s new

3) Understanding the deployment

  • a) V-series appliance
  • b) Network interfaces
  • c) Required components
  • d) V-series modules
  • e) Hardware resources
  • f) Internal daemons and components
  • g) Communication points with external services

4) Getting started with AP-EMAIL

  • a) Fundamental email security concepts: protected domain and email relay
  • b) Setting up AP-EMAIL
  • c) Setting up users
  • d) Setting email routing

5) Traffic

  • a) Message processing flow
  • b) Setting connection controls I. Connection properties II. RBL & WRS c) Configuring message properties I. Message size, volume II. Recipient validation
  • d) True source IP detection
  • e) Managing message queues

6) Policies

  • a) Configuring policies I. Policy components and flows II. Policy directions III. Policy conditions IV. Rules
  • b) Built-in DLP I. DLP integration II. Registering with data security server
Day 2

1) Users

  • a) Working with users I. Enabling PEM II. End user block/permit list III. IP list comparison

2) Advanced Configurations

  • a) Hybrid
  • b) Sandbox I. URL Sandbox II. File sandbox III. Phishing education
  • c) Traffic shaping
  • d) Enforce TLS

3) Maintenance

  • a) Reporting I. Configuring log DB options II. Log server III. Reporting preferences IV. Presentation reports V. RTM
  • b) System administration & maintenance I. Managing appliances II. Delegated administrator accounts III. Back up and restore

 

  • End-User/Customers: System administrators, network security administrators, IT staff
  • Channel Partners: Sales Engineers, consultants, implementation specialists

 

Certification

Certification requirements

  • Completion of all course sessions
  • Configured lab exercises
  • Certification exam (multiple choice)

Prerequisite

None

Singapore

  • 07 - 08 Dec 2017