- 1 Minute to read
- Print
- PDF
Proofpoint
- 1 Minute to read
- Print
- PDF
About this document
This document provides a step-by-step procedure to configure the Proofpoint Targeted Attack Protection (TAP) in SAFE.
Introduction
The SAFE - Proofpoint integration helps you measure employee behavior more effectively. This integration allows SAFE to pull the threat intel details on the employees of your organization. It includes the details such as the Threat index, VAP (Very attacked person), VIP, and Top Clickers.
Using Proofpoint service credentials and a secret key, you can configure Proofpoint in SAFE from SAFE Hooks.
Prerequisites
You need the following connector details:
- Service Credential
- Secret Key
Refer to Proofpoint TAP documentation to generate the service credential.
Configure Proofpoint
Follow the below step-by-step procedure to configure Proofpoint in SAFE:
- Navigate to the SAFE Hooks.
- Click the Proofpoint card.
- On the Proof point configuration page, enter the Service Credential and Secret Key.
- Click the Test Connection button.
- Once the connection is validated, click the Save button. The system automatically enables the Proofpoint TAP toggle button.