Configuring the Proofpoint Integration for Security Operations

  • Release version: Zurich
  • Updated July 31, 2025
  • 1 minute to read
  • Configure your implementation of the Proofpoint Integration for Security Operations.

    Configuration overview

    1. Install and configure the Proofpoint Integration.

      Download, install and activate the integration application.

    2. Create an event profile for the Proofpoint Integration for Security Operations.

      Create an event profile to identify the events you want to import from the Proofpoint product and the conditions you want to use to create security incidents from the imported data.

    3. Configuring the Proofpoint Integration for Security Operations

      Review the integration settings for creating the event profiles.