0% found this document useful (0 votes)
110 views7 pages

Enterprise Protection For The Administrator

This 2-hour online course provides an overview of the protection tools in the Proofpoint security suite, including the newest Targeted Attack Protection module. The course covers topics such as installation, filtering, rule creation, spam and virus modules, email firewall, and reporting. It is intended for system administrators responsible for managing Proofpoint systems and recommends additional follow-up courses for more advanced training. Registration requires a training account which can be requested from an existing CTS contact or sales representative.

Uploaded by

Hariom Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
110 views7 pages

Enterprise Protection For The Administrator

This 2-hour online course provides an overview of the protection tools in the Proofpoint security suite, including the newest Targeted Attack Protection module. The course covers topics such as installation, filtering, rule creation, spam and virus modules, email firewall, and reporting. It is intended for system administrators responsible for managing Proofpoint systems and recommends additional follow-up courses for more advanced training. Registration requires a training account which can be requested from an existing CTS contact or sales representative.

Uploaded by

Hariom Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Enterprise Protection for the

Administrator
Overview
The Proofpoint Protection course covers the protection tools
that are available as part of the Proofpoint Suite, including
our newest module, Targeted Attack Protection. It also
includes topics such as master-agent architecture,
installation and deployment, filtering and rule creation.

Format
Web-based training (WBT)

Duration
2 hours

Price
Free for Proofpoint customers

Intended Audience
This course is recommended for system administrators,
network managers, and information security managers
responsible for ongoing management of Proofpoint systems.
Prerequisites
Experience with Enterprise Protection/Privacy and familiarity
with the interface is helpful, but not required.

Recommended Follow-up Courses

After successfully completing this course, you may wish to


explore the courses below:

Enterprise Privacy for the Administrator


Enterprise Protection/Privacy Professional Engineer

Registration

To access this course, you need a training account. A


training account can be requested through CTS by any
existing CTS contact at your company (select Other –
Training in the Component field), or you can contact your
sales representative for help getting a training account set
up.

Course Outline
Welcome and Email

• History of Email
• SMTP Protocol
• Simple SMTP Session
Architecture

• Protection server characteristics


• Server hardware
• Master / Agent Deployment Appliance types
• Physical Appliance Deployment
• Virtual Machine Deployment
• Software Based Deployment
• Alternate Appliance Types

Installation and Deployment

• Setting up a cluster
• Operating system
• Proofpoint specific software
• 3rd party software
• Building / Re-imaging
• Activating
• Simulation: The Activation Process

Navigation

• Getting started
• How to navigate the management GUI
• Appliance administrators
• Simulation: Creating a new admin account

Filtering
• The Filter
• Order of arrival
• Module precedence order
• Delivery precedence order
• Filter data flow

Rule Creation

• Introduction to rule creation


• Policy routes
• Simulation: Updating an outbound policy route
• Conditions
• Quarantine
• Disposition types
• Create efficient rules
• Custom spam rules
• Simulation: Creating an email firewall rule
• Creating rules
• Tips on creating rules
• Dictionaries

User Repository

• The User Repository


• Introducing users
• Introducing groups
• Assigning attributes for users and groups
• Import/Authentication profiles
• Simulation: Set up an LDAP import profile and test
LDAP

Spam Module

• Spam detection module overview


• Spam module classifiers
• Suspected spam
• Safe/Blocked lists
• Reporting false negatives and positives
• Simulation: Enabling the Audit Quarantine folder

Virus Module

• Multi-layer virus protection


• The zero-hour virus problem
• Simulation: Creating a virus policy that allows a group
to send encrypted files

Targeted Attack Protection

• Targeted threats
• TAP process flow
• ReDirector 101 – what it does
• Rewritten links
• Blocked sites
• TAP in PPS – Dashboard overview
• Viewing timeline data
• Viewing a threat
• Drilling down for more information
• TAP in PPS – Settings
• TAP in PPS – URL Defense
• Rewrite options

Email Firewall, PDR, RV, Rate Control

• Email Firewall
• Proofpoint Dynamic Reputation (PDR)
• Simulation: Configuring and enabling PDR and the
email firewall rule for PDR
• Recipient verification (RV)
• SMTP Rate Control
• Simulation: Turning on SMTP rate control

End User Experience

• End user digest


• Enabling and configuring digest messages
• Sample end user digest
• Who receives the digest?
• Simulation: Send a digest to a user
• End user web application
• Self-service in end user web application
• End user authentication
• Authentication sources and options

Reports
• Available reports
• Scheduling and publishing
• Reporting
• Simulation: Publish a report to email automatically

You might also like