Proofpoint TAP
  • 01 Nov 2023
  • 1 Minute to read
  • Dark
    Light
  • PDF

Proofpoint TAP

  • Dark
    Light
  • PDF

Article Summary

Proofpoint Targeted Attack Protection (TAP) is an email-based security solution for ransomware prevention and other email-based threats.

Types of Assets Fetched

This adapter fetches the following types of assets:

  • Users

Parameters

  1. Host Name or IP Address (required) - The hostname or IP address of the Proofpoint TAP server, generally tap-api-v2.proofpoint.com.

  2. Principal Name and Secret (required) - The credentials for a user account that has the Required Permissions to fetch assets.

  3. Verify SSL - Select whether to verify the SSL certificate of the server against the CA database inside of Axonius. For more details, see SSL Trust & CA Settings.

  4. HTTPS Proxy (optional) - Connect the adapter to a proxy instead of directly connecting it to the domain.

  5. HTTPS Proxy User Name (optional) - The user name to use when connecting to the value supplied in Host Name or IP Address via the value supplied in HTTPS Proxy.

  6. HTTPS Proxy Password (optional) - The password to use when connecting to the server using the HTTPS Proxy.

  7. To learn more about common adapter connection parameters and buttons, see Adding a New Adapter Connection.

Proofpoint_TAP


APIs

Axonius uses the Proofpoint People API.

Required Permissions

The value supplied in Principal Name must have service credentials to authenticate to the API.

Supported From Version

Supported from Axonius version 4.5



Was this article helpful?

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.