<?php the_title_attribute(); ? data-src=
Admin bar avatar

Bodhi IT

 4 (5 Reviews)

Course Duration

40 hour

Course Description

Proofpoint Email Protection provides multiple layers of security to stop malware and non-malware threats, such as email fraud. It can control all aspects of inbound and outbound email to detect and block threats and prevent confidential information from getting into the wrong hands.

Mail Flow Architecture:

Inbound Mail-Flow

Outbound Mail-Flow

How do Proofpoint works?

Email Monitoring Procedure

Monitoring the Health Status

How to investigate the Quarantined Spam email

How to Release/Block the Sender domain

How to Report the Spam email

Smart search

Logs and Reports

Policies:             

List Of Inbound Policies

List Of Outbound Policies

Create New Policies

Prerequisites:

Types of email frauds

PROOFPOINT

1. Introduction to proofpoint

2. Protection server Foundation

3. Message flow

4. SMTP filtering and outbound threats

5. Protection server Administration
  • Clusters and modules
  • Navigation
  • User management
  • End user services

6. Protection server Configuration
  • Policy Routes
  • Rules
  • Dispositions
  • Quarantine
  • Delivery Method

7. Targeted Attack Protection:

Targeted attack protection is a part of advance email protection in our Proofpoint solution. We can use this to analyzing a content and analyzing an emails that incoming into our organization. We can use this TAP to looking at


8. Malicious URL’s.

9. Malicious Attachments.

10. Imposter Email.

Once we receive an URL phishing or attachment defense alert in TAP below are the things SOC team should investigate in TAP console.


11.1. Header

11.2. Description

11.3. Spread & Targeting

11.4. Attack Progression

11.5. Affected VIP’s

11.6. Forensics

11.7. At Risk Users

11.8. Impacted User

11.9. Intended User

12. Threat response AutopullFOundation TRAP

13. Purpose of TRAP and how TRAP detects and pulls threats from mailbox

14. Email fraud defense Foundation

15. Email fraud defense Authentication
  • SPF
  • DKIM
  • DMARC
  • Email Protection

    PROOFPOINT

    • Clusters and modules
    • Navigation
    • User management
    • End user services

    • Policy Routes
    • Rules
    • Dispositions
    • Quarantine
    • Delivery Method

    Targeted attack protection is a part of advance email protection in our Proofpoint solution. We can use this to analyzing a content and analyzing an emails that incoming into our organization. We can use this TAP to looking at

    Once we receive an URL phishing or attachment defense alert in TAP below are the things SOC team should investigate in TAP console.

    • SPF
    • DKIM
    • DMARC
    • Email Protection

0.0
0 total
5
0
4
0
3
0
2
0
1
0

Course Features

  • Students Limited
  • Certificate Yes
  • Skill Advance
  • Category Instrumentation

Request for Free Demo

    Training Features

    Live Online Training

    Live online training session will be given by our trainers and are available to answer your queries.

    Time flexibility

    We conduct classes in most of the day. We are flexible to train you according to your schedule.

    Real time scenario

    All of our trainers are come from different industry they are experts in explaining scenarios that are happening in real time.

    Best IT Leading Software Training Institute

    Talk with Bodh IT