/
Proofpoint TAP

Proofpoint TAP

Proofpoint TAP (Targeted Attack Protection) detects and prevents threats in email.

Connect Proofpoint TAP with Devo SOAR

  1. Navigate to Automations > Integrations.

  2. Search for Proofpoint TAP.

  3. Click Details, then the + icon. Enter the required information in the following fields.

  4. Label: Enter a connection name.

  5. Reference Values: Define variables here to templatize integration connections and actions. For example, you can use https://www.{{hostname}}.com where, hostname is a variable defined in this input. For more information on how to add data, see 'Add Data' Input Type for Integrations.

  6. Verify SSL: Select option to verify connecting server's SSL certificate (Default is Verify SSL Certificate).

  7. Remote Agent: Run this integration using the Devo SOAR Remote Agent.

  8. API User: API User name for Proofpoint's SIEM API.

  9. API Key: The API key to connect to the Proofpoint TAP.

  10. After you've entered all the details, click Connect.

Actions for Proofpoint TAP

Get TAP Events

Get events from Proofpoint TAP via Proofpoint's SIEM API.

Input Field

Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.

Input Name

Description

Required

Input Name

Description

Required

Event Type

Type of events to query.

Required

Threat Type

Type of threat to query.

Required

Threat Status

Status of threat to query.

Required

Query Window

Window of time to query, from one minute ("1m") to 24 hours ("24h").

Required

Release Notes

  • v3.0.0 - Updated architecture to support IO via filesystem

  • v2.1.6 - Added documentation link in the automation library.

Related content

Proofpoint Tap collector
Proofpoint Tap collector
More like this
Proofpoint on Demand collector
Proofpoint on Demand collector
More like this
Activeboard: Proofpoint email protection
Activeboard: Proofpoint email protection
More like this
FireEye ETP
FireEye ETP
More like this
Proofpoint Isolation collector
Proofpoint Isolation collector
More like this
Abnormal Security
More like this