Getting Started with Policy Enforcement Manager (PEM) big-ip hardware big-ip pem After a brief introduction to BIG-IP Policy Enforcement Manager in lesson one, lesson two describes “subscriber awareness”: how PEM associates data flows with subscribers to enable service providers to monitor data flows and provide subscribers with customized service offerings. Lesson three discusses enforcement policies—what they are, why they are useful, and how to create and apply them. In the final lesson, you go through the entire process of creating a new enforcement policy to implement a new service offering in a hands-on simulation. (Run time is approximately 35 minutes.) To access any of the Getting Started courses, go to F5 University. If you have not visited F5 University before, click on Register for an Account and fill in the required information. An account will be setup immediately. After logging in, click on the F5 University link on the left and then click on the link to the F5 Getting Started Series. Go to F5 Getting Started Series.