Methodology

This guide is designed to help you evaluate Forcepoint Email Security Cloud after you’ve performed the initial setup. For setup instructions, see Forcepoint Email Security Cloud Getting Started Guide.

This guide demonstrates how an IT administrator can easily configure, monitor, and analyze inbound and outbound mail delivery while taking into account the varying requirements of specific users and departments within an organization.

The guide is organized into the task areas most beneficial to the IT administrator:
  • Dashboard – View up-to-date graphical data for email volumes, inbound email composition, and spam detection rates.
  • Directory synchronization – Simplify user management and prevent directory harvest attacks by synchronizing Active Directory or Lotus Domino data with Forcepoint Email Security Cloud.
  • Policies and fine-tuning – Create policies for users to enable them to use email as a productive business tool, while restricting unwanted or undesirable messages or those that pose security risks.
  • Reporting – Examine trends and statistics for messages passing through Forcepoint Email Security Cloud.
  • Message Center – Review quarantined messages and choose whether to deliver, forward, or discard them.
  • After Setup – Administer the service after the initial configuration, and enable end users to manage their email.
  • Integration with Forcepoint Web Security Cloud – The advantages of an integrated email and web protection solution.

For detailed information on any aspect of Forcepoint Email Security Cloud, refer to Forcepoint Cloud Security Gateway Portal Help. You can click the Help menu in the cloud portal to access this guide at any time.