CI-CCEAA
Tel: +971 (4) 42 89 440
FT-FML-ADM
FortiMail Administrator

Price:
Duration:
USD 2,700 excl. VAT
3 Days

Who Should Attend
Security professionals involved in the management, configuration, administration,
and monitoring of FortiMail in small to medium enterprise deployments should attend this course.
What you will Learn
1. Email Concepts
2. Basic Setup
3. Access Control and Policies
4. Authentication
5. Session Management
6. Antivirus and Antispam
7. Content Inspection
8. Securing Communications
9. High Availability
10. Server Mode
11. Transparent Mode
12. Maintenance
13. Troubleshooting
Prerequisites
You must have an understanding of the topics covered in the FCP - FortiGate Administrator course,
or have equivalent experience.
You must have an understanding of the topics covered in the FCP - FortiGate Administrator course,
or have equivalent experience.
Course Objectives
After completing this course, you will be able to:
• Position FortiMail in an existing or new email infrastructure using any of the flexible
deployment modes
• Understand the system architecture of FortiMail: how email flows through its modules; how it
applies intelligent routing and policies to email; and how it can protect the reputation of your
mail transfer agent (MTA)
• Use your existing LDAP server to manage and authenticate users
• Secure email transmission using best-in-class technologies, such as SMTPS, SMTP over
TLS, and identity-based encryption (IBE)
• Throttle client connections to block MTA abuse
• Block spam using sophisticated techniques, such as deep header inspection, spam outbreak,
heuristics, and the FortiGuard antispam service
• Eliminate spear phishing and zero-day viruses
• Prevent accidental or intentional leaks of confidential and regulated data
• Archive email for compliance
• Deploy high availability (HA) and redundant infrastructure for maximum uptime of missioncritical
email
• Diagnose common issues related to email and FortiMail
Course Outline
1. Email Concepts
2. Basic Setup
3. Access Control and Policies
4. Authentication
5. Session Management
6. Antivirus and Antispam
7. Content Inspection
8. Securing Communications
9. High Availability
10. Server Mode
11. Transparent Mode
12. Maintenance
13. Troubleshooting
