Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Setting Up End Users
Setting Up End Users
Introduction
Getting Started Guide | Forcepoint Email Security Cloud
You can set up Forcepoint Email Security Cloud services quickly and easily with minimum disruption to email users. Depending on the services you have licensed, however, users may experience some changes to the email they receive. This document advises you how to best communicate these changes to your end-user community.
What you need to communicate depends on the services you have licensed and your policy configuration. It is not unusual for organizations to change their policy configuration following an initial evaluation stage. Whenever a change affects the end-user community, it is good practice to inform the community in advance.
This document outlines the main policy configuration areas that affect the end user. Also included is sample text that can be pasted directly into a communication to your end users or used as a template.
Please read this document in conjunction with the Forcepoint Email Security Cloud Help. The sample text is intended to supplement, not replace the End User Guide and End User Quick Start Guide
Sample communications
Below is an introduction to the Forcepoint Email Security Cloud services that you can use with your own end users. Some of this text may not be relevant depending upon the services you have chosen.
 
Common considerations
Each Forcepoint Email Security Cloud service has a number of configurable options that can have a direct impact on end users' experience. The main areas that may need to be communicated are discussed in the following sections. Sample text that you can edit and paste into your communications is provided for each option.
Antivirus
1.
2.
If you want an IT staff member to be notified as well, you can configure the service to notify an administrator.
3.
Antispam
The Tag and Deliver option is often used during an evaluation or initial roll-out phase to gain end user confidence. End users should be informed how long this will last, when the switch to quarantine will occur, and what to do if they receive email tagged as spam that they believe is not.
1.
2.
3.
4.
Content Filtering
1.
2.
3.
4.
Enforcing controls using lexical rules could be contentious. Forcepoint recommends that you communicate that they have been implemented.
We suggest you include a link to your computer or email use policy in this message.
Encryption
1.
2.
3.
When using automatic password generation, you should communicate this.
If you are allowing a user-specified password and are using a prefix to trigger the ad hoc encryption process, you should communicate the format.
If you are allowing a user-specified password and are not using a prefix to trigger the ad hoc encryption process, you should communicate the format.
If you have the Forcepoint Email Security Encryption Module, you can set up advanced encryption rules in a similar manner to standard encryption, but the message retrieval process is different. You should communicate something similar to the following:

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Setting Up End Users
Copyright 2022 Forcepoint. All rights reserved.