About this Course

Duration 2 Days

During the two days, you will learn the features, components, and key integrations that enable the AP-EMAIL functionalities; how to administer policies, handle incidents, upgrade, manage and assess the health of the AP-EMAIL system. You will develop skills in creating email policies, configure email encryption, incident management, reporting, and system architecture and maintenance.

Delegates will learn how to

  • Describe the key capabilities of AP-EMAIL
  • Understand the required and add-on components of AP-EMAIL
  • Understand multiple deployment scenarios
  • Perform initial setup configurations
  • Configure connection level controls and message properties
  • Create policies to fulfill various organization needs
  • Understand the difference between various block/permit lists
  • Configure email DLP policies
  • Configure and customize PEM portal
  • Understand email encryption methods
  • Run and interpret reports and configure logs
  • Understand how to upgrade the system and disaster recovery procedures


Day 1

  • TRITON APX overview
  • AP-EMAIL overview and what's new
  • Understanding the deployment
  • V-series appliance
  • Network interfaces
  • Required components
  • V-series modules
  • Hardware resources
  • Internal daemons and components
  • Communication points with external services
  • Getting started with AP-EMAIL
  • Fundamental email security concepts: protected domain and email relay
  • Setting up AP-EMAIL
  • Setting up users
  • Setting email routing
  • Traffic
  • Message processing flow
  • Setting connection controls
  • Connection properties
  • RBL & WRS
  • Configuring message properties
  • Message size, volume
  • Recipient validation
  • True source IP detection
  • Managing message queues
  • Policies
  • Configuring policies
  • Policy components and flows
  • Policy directions
  • Policy conditions
  • Rules
  • Built-in DLP
  • DLP integration
  • Registering with data security server

Day 2

  • Users
  • Working with users
  • Enabling PEM
  • End user block/permit list
  • IP list comparison
  • Advanced Configurations
  • Hybrid
  • Sandbox
  • URL Sandbox
  • File sandbox
  • Phishing education
  • Traffic shaping
  • Enforce TLS
  • Maintenance
  • Reporting
  • Configuring log DB options
  • Log server
  • Reporting preferences
  • Presentation reports
  • RTM
  • System administration & maintenance
  • Managing appliances
  • Delegated administrator accounts
  • Back up and restore

2 Days


This is a QA approved partner course

Delivery Method

Delivery method


Face-to-face learning in the comfort of our quality nationwide centres, with free refreshments and Wi-Fi.

Find dates and prices

Online booking is currently not available for this course, to find out more please call us on 0113 220 7150 or email us at info@qa.com to discuss how we can help.

Trusted, awarded and accredited

Fully accredited to ensure we provide the highest possible standards in learning

All third party trademark rights acknowledged.