Proofpoint
- 1 Minute to read
- Print
- PDF
Proofpoint
- 1 Minute to read
- Print
- PDF
Article Summary
Share feedback
Thanks for sharing your feedback!
About this document
This document provides a step-by-step procedure to configure the Proofpoint Targeted Attack Protection (TAP) in SAFE.
Introduction
The SAFE - Proofpoint integration helps you measure employee behavior more effectively. This integration allows SAFE to pull the threat intel details on the employees of your organization. It includes the details such as the Threat index, VAP (Very attacked person), VIP, and Top Clickers.
Using Proofpoint service credentials and a secret key, you can configure Proofpoint in SAFE from SAFE Hooks.
Prerequisites
You need the following connector details:
- Service Credential
- Secret Key
Refer to Proofpoint TAP documentation to generate the service credential.
Configure Proofpoint
Follow the below step-by-step procedure to configure Proofpoint in SAFE:
- Navigate to the SAFE Hooks.
- Click the Proofpoint card.
- On the Proof point configuration page, enter the Service Credential and Secret Key.
- Click the Test Connection button.
- Once the connection is validated, click the Save button. The system automatically enables the Proofpoint TAP toggle button.
Notes:
- Once the connection is established, SAFE syncs with Proofpoint once every 24 hours to fetch the threat intel details of users.
- You can trigger the on-demand sync by clicking the Sync Now button available on the Proofpoint configuration page.
- The employee's SAFE Score will only be impacted by the threat intel data if the system receives new threat intel data in the last five days.
Was this article helpful?