Configuring the Proofpoint Integration for Security Operations
Configure your implementation of the Proofpoint Integration for Security Operations.
Configuration overview
- Install and configure the Proofpoint Integration.
Download, install and activate the integration application.
- Create an event profile for the Proofpoint Integration for Security Operations.
Create an event profile to identify the events you want to import from the Proofpoint product and the conditions you want to use to create security incidents from the imported data.
- Configuring the Proofpoint Integration for Security Operations
Review the integration settings for creating the event profiles.