Proofpoint Targeted Attack Protection (TAP) 2.0.0
App Vendor: Proofpoint
App Category: Data Enrichment & Threat Intelligence, Analytics & SIEM
Connector Version: 2.1.1
API Version: API: V2
About App
Proofpoint Targeted Attack Protection (TAP) helps you stay ahead of attackers with an innovative approach that detects, analyzes, and blocks advanced threats before they reach your inbox. This includes ransomware, zero-day threats, polymorphic malware, weaponized documents, phishing attacks, in-cloud apps, connecting email attacks related to credential theft, and other advanced email threats delivered through malicious attachments and URLs. Proofpoint TAP offers unique visibility into these threats so you can optimize your response.
The Proofpoint Targeted Attack Prevention (TAP) app is configured with the Orchestrate application to perform the following actions:
Action Name | Description |
---|---|
Decode URLs | This action decodes URLs that have been rewritten by Proofpoint TAP to their original URLs. |
Get List of Very Attacked People | This action identifies the most attacked users in your organization. |
Get Campaign Details | This action retrieves details of the specified campaign. |
Get Forensic Details by ID | This action retrieves forensic information for the specified threat or campaign. |
Get All SIEM Events | This action retrieves all clicks and messages related to known threats within the specified time period. |
Get Issues | This action retrieves details of all clicks to malicious URLs permitted and messages delivered containing a known attachment threat within the specified time period. |
Get Delivered Messages | This action retrieves all delivered messages that contained a known threat in the specified time period. |
Get Blocked Messages | This action retrieves details of all blocked messages that contained a known threat in the specified time period. |
Get Permitted Clicks | This action retrieves details of all clicks to malicious URLs (permitted by you) in the specified time period. |
Get Blocked Clicks | This action retrieves a list of all clicks to malicious URLs (blocked by you) in the specified time period. |
List Campaign IDs | This action retrieves a list of active campaign IDs. |
Generic Action | This is a generic action to perform any additional use case on Proofpoint Targeted Attack Prevention (TAP). |
Configuration Parameters
The following configuration parameters are required for the Proofpoint Targeted Attack Protection (TAP) app to communicate with the Proofpoint Targeted Attack Protection (TAP) enterprise application. The parameters can be configured by creating instances in the app.
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Cloud Domain | Enter your Proofpoint TAP cloud domain Example: "https://tap-api-v2.proofpoint.com" | Text | Required | |
Service Principal | Enter the Proofpoint TAP service principal. Example: 34dccdd26c5c99ceb3af22f392b708bf | Text | Required | |
Service Secret | Enter the Proofpoint TAP service secret. Example: a8c7b7523b02xxxxf5a89bd21883e832 | Password | Required | |
SSL Verification | Specify if you want to verify the server SSL certificate when connecting to the Proofpoint TAP APIs. Example: True | Boolean | Optional | Allowed values:
Default value: False |
Action: Decode URLs
This action decodes URLs that Proofpoint TAP has rewritten to their original, target URLs.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
URLs | Enter the URLs that you want to decode. Example: $LIST[SampleURL1, SampleURL2, SampleURL3] | List | Required |
Example Request
{ "urls": [ "https://sample.domain.com/v2/url?u=http-3A__links.mkt3337.com_ctt-3Fkn-3D3-26ms-3DMzQ3OTg3MDQS1-26r-3DMzkxNzk3NDkwMDA0S0-26b-3D0-26j-3DMTMwMjA1ODYzNQS2-26mt-3D1-26rt-3D0&d=DwMFaQ&c=Vxt5e0Osvvt2gflwSlsJ5DmPGcPvTRKLJyp031rXjhg&r=MujLDFBJstxoxZI_GKbsW7wxGM7nnIK__qZvVy6j9Wc&m=QJGhloAyfD0UZ6n8r6y9dF-khNKqvRAIWDRU_K65xPI&s=ew-rOtBFjiX1Hgv71XQJ5BEgl9TPaoWRm_Xp9Nuo8bk&e=", "https://sample.domain.com/v1/url?u=http://www.bouncycastle.org/&k=oIvRg1%2BdGAgOoM1BIlLLqw%3D%3D%0A&r=IKM5u8%2B%2F%2Fi8EBhWOS%2BqGbTqCC%2BrMqWI%2FVfEAEsQO%2F0Y%3D%0A&m=Ww6iaHO73mDQpPQwOwfLfN8WMapqHyvtu8jM8SjqmVQ%3D%0A&s=d3583cfa53dade97025bc6274c6c8951dc29fe0f38830cf8e5a447723b9f1c9a", "https://sample.domain.com/v3/__https://google.com:443/search?q=a*test&gs=ps__;Kw!-612Flbf0JvQ3kNJkRi5Jg!Ue6tQudNKaShHg93trcdjqDP8se2ySE65jyCIe2K1D_uNjZ1Lnf6YLQERujngZv9UWf66ujQIQ$" ] }
Action Response Parameters
Parameter | Type | Description |
---|---|---|
{app_instance} | Object | Indicates the ID of the app instance configured in Orchestrate from which the response is retrieved. |
app_instance.urls | Array | An array containing URL objects. |
app_instance.urls.encodedUrl | String | The original, rewritten URL supplied to the endpoint. |
app_instance.urls.decodedUrl | String | The target URL embedded inside the rewritten link. |
app_instance.urls.messageGuid | String | The PPS GUID of the message which originally contained the URL. |
app_instance.urls.clusterName | String | The name of the PPS cluster which rewrote the message. |
app_instance.urls.recipientEmail | String | The email address of the message's original recipient. |
app_instance.urls.success | Boolean | Indicates whether the URL could successfully be decoded. |
Action: Get List of Most Attacked Users
This action fetches the identities and attack index breakdown of Very Attacked People within your organization for a given period.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Window | Enter an integer indicating for how many days the data should be retrieved. Example: 30 | Integer | Optional | Allowed values:
Default value: 14 |
Size | Enter the maximum number of VAPs to be returned in the response. The attackIndex value determines the order of results. Example: 50 | Integer | Optional | Default value: 1000 |
Page | Enter the page of results to return, in multiples of the specified size (or 1000, if no size is explicitly chosen). Example: 5 | Integer | Optional | Default value: 1 |
Example Request
[ { "windows": 30, "size": 50, "page": 5 } ]
Action Response Parameters
Parameter | Type | Description |
---|---|---|
{app_instance} | Object | This parameter indicates the ID of the app instance configured in Orchestrate from which the response is retrieved. |
app_instance.users | Array of Objects | List of users with their identity and threat statistics. |
app_instance.users.identity | Object | The identity information of the user. |
app_instance.users.identity.guid | String | The unique identifier (GUID) for the user. Example: "dc8766cd-39b2-c5a0-b008-849502c50323" |
app_instance.users.identity.customerUserId | String | The customer user ID. Example: "01232336319812225987" |
app_instance.users.identity.emails | Array | List of email addresses for the user. Example: ["johndoe@exampledomain.com"] |
app_instance.users.identity.name | String | The name of the user. Example: "John Doe" |
app_instance.users.identity.department | String | The department of the user. Example: "InfoSec" |
app_instance.users.identity.location | String | The location of the user. Example: "San Fransisco" |
app_instance.users.identity.title | String | The job title of the user. Example: "Security Analyst" |
app_instance.users.identity.vip | Boolean | Indicates if the user is a VIP. Example: true |
app_instance.users.threatStatistics | Object | Threat statistics for the user. |
app_instance.users.threatStatistics.attackIndex | Integer | The attack index value for the user. Example: 18558 |
app_instance.users.threatStatistics.families | Array | List of threat families with scores. |
app_instance.users.threatStatistics.families.name | String | The name of the threat family. Example: "phishing" |
app_instance.users.threatStatistics.families.score | Integer | The score for the threat family. Example: 2619 |
app_instance.totalVapUsers | Integer | Total number of Very Attacked People (VAP) users. Example: 150 |
app_instance.interval | String | The time interval for the report. Example: "2019-10-01T00:00:00Z/2019-11-01T00:00:00Z" |
app_instance.averageAttackIndex | Integer | The average attack index value. Example: 371 |
app_instance.vapAttackIndexThreshold | Integer | The threshold value for the VAP attack index. Example: 1520 |
Action: Get Campaign Details
This action retrieves details of the specified campaign.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Campaign ID | Enter the campaign ID for which you want to retrieve details. Example: 12345 | Text | Required |
Example Request
[ { "campaign_id": "12345" } ]
Action Response Parameters
Parameter | Type | Description |
---|---|---|
{app_instance} | Object | This parameter indicates the ID of the app instance configured in Orchestrate from which the response is retrieved. |
app_instance.id | String | The campaign ID. |
app_instance.name | String | The name of the campaign. |
app_instance.description | String | A description of the campaign written by one of Proofpoint's threat analysts. |
app_instance.startDate | String | An ISO8601-formatted datetime corresponding to the time the campaign's first threat variants were first observed. |
app_instance.campaignMembers | Array | An array of CampaignMember objects, containing details about each member of the campaign. |
app_instance.campaignMembers.id | String | The threat identifier. |
app_instance.campaignMembers.threat | String | The attachment hash or URL fragment of the threat. |
app_instance.campaignMembers.type | String | The type of the threat: "attachment" or "url". |
app_instance.campaignMembers.subType | String | The sub-type of the threat: "ATTACHMENT", "COMPLETE_URL", "NORMALIZED_URL", "HOSTNAME", or "DOMAIN". |
app_instance.campaignMembers.threatTime | String | An ISO8601-formatted datetime corresponding to when the threat variant was first recognized as malicious. |
app_instance.actors | Array | An array of Actor objects, containing details about each actor involved in the campaign. |
app_instance.actors.name | String | The name of the actor. |
app_instance.actors.id | String | The actor identifier. |
app_instance.malware | Array | An array of Malware objects, containing details about each malware family associated with the campaign. |
app_instance.malware.name | String | The name of the malware family. |
app_instance.malware.id | String | The malware family identifier. |
app_instance.techniques | Array | An array of Technique objects, containing details about each technique associated with the campaign. |
app_instance.techniques.name | String | The name of the technique. |
app_instance.techniques.id | String | The technique identifier. |
app_instance.notable | Boolean | Returns true when the campaign is marked as notable by Proofpoint's Threat Analyst team. |
Action: Get Forensic Details by ID
This action retrieves forensic details for the specified threat or campaign.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Campaign ID or Threat ID | Enter the campaign ID or threat ID for which you want to retrieve forensic details. Example: 12345 | Text | Required | |
Is threat ID | Specify if the ID provided against the Campaign ID or Threat ID parameter is the threat ID or campaign ID. Example: True | Boolean | Optional | Allowed values:
Default value: False |
Include Campaign Forensics | Specify if you want to retrieve aggregate forensics for the specified thread ID or the entire campaign. This parameter can only be used if you enter a thread ID against the Campaign ID or Threat ID parameter. Example: True | Boolean | Optional | Allowed values:
Default value: False |
Example Request
[ { "id": "12345", "is_threat_id": "true", "include_campaignforensics": "true" } ]
Action Response Parameters
Parameter | Type | Description |
---|---|---|
{app_instance} | Object | This parameter indicates the ID of the app instance configured in Orchestrate from which the response is retrieved. |
app_instance.generated | String | An ISO8601-formatted datetime corresponding to the time this report was generated. |
app_instance.reports | Array | An array of report objects. |
app_instance.reports.name | String | The malicious URL, SHA256 hash of the malicious attachment, or campaign name. |
app_instance.reports.scope | String | Whether the report scope covers a campaign or an individual threat. |
app_instance.reports.type | String | The threat type: attachment, URL, or hybrid. |
app_instance.reports.id | String | The identifier associated with the campaign or individual threat. |
app_instance.reports.forensics | Array | An array of forensic evidence objects. |
app_instance.reports.forensics.type | String | The evidence type. |
app_instance.reports.forensics.display | String | A friendly display string describing the evidence. |
app_instance.reports.forensics.malicious | String | Whether the evidence was used to reach a malicious verdict. |
app_instance.reports.forensics.time | String | [Unsupported] This field is currently unsupported and it's expected to always return 0. |
app_instance.reports.forensics.what | Object | A map of values associated with the specific evidence type. |
app_instance.reports.forensics.platforms | Array | An array of platform objects describing the platforms affected by the threat. |
app_instance.reports.forensics.platforms.name | String | The name of the affected platform. |
app_instance.reports.forensics.platforms.os | String | The operating system of the affected platform. |
app_instance.reports.forensics.platforms.version | String | The version of the operating system of the affected platform. |
Action: Get All SIEM Events
This action retrieves details of all SIEM events related to known threats within the specified time period.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Interval | Enter the time interval (in ISO 8601 format) for which you want to retrieve information. Example:
| Text | Optional | Enter the time in the ISO 8601 format. Minimum interval: 30 seconds Maximum interval: 1 hour |
Since Seconds | Enter the time interval in seconds from when you want to retrieve details. Start time: Current API server time, rounded to the nearest minute, less the entered value. End time: Current API server time rounded to the nearest minute. Example: 300 | Integer | Optional | |
Since Time | Enter the date (in ISO 8601 format) from when you want to retrieve details. Start time: Entered value. End time: Current API server time rounded to the nearest minute. Example: 2016-05-01T12:00:00Z | Text | Optional | |
Extra Parameters | Enter the required parameters as key-value pairs. Example: {"threatStatus": "active"} | Key Value | Optional | Allowed keys:
|
Example Request
[ { "interval": " 2020-05-01T12:00:00Z/2020-05-01T13:00:00Z", "extra_params": { "threatStatus": "active" } } ]
Action Response Parameters
Parameter | Type | Description |
---|---|---|
{app_instance} | Object | This parameter indicates the ID of the app instance configured in Orchestrate from which the response is retrieved. |
app_instance.clicksPermitted | Array | An array of objects containing details of all clicks to URL threats that were permitted. |
app_instance.clicksPermitted.campaignId | String | An identifier for the campaign of which the threat is a member, if available at the time of the query. Threats can be linked to campaigns even after these events are retrieved. Example: "46e01b8a-c899-404d-bcd9-189bb393d1a7" |
app_instance.clicksPermitted.classification | String | The category of threat found in the message. Example: "MALWARE" |
app_instance.clicksPermitted.clickIP | String | The external IP address of the user who clicked on the link. If the user is behind a firewall performing network address translation, the IP address of the firewall will be shown. Example: "192.0.2.1" |
app_instance.clicksPermitted.clickTime | String | The timestamp when the user clicked the URL. Example: "2016-06-24T19:17:44.000Z" |
app_instance.clicksPermitted.GUID | String | The globally unique identifier for the message. Example: "b27dbea0-87d5-463b-b93c-4e8b708289ce" |
app_instance.clicksPermitted.id | String | The unique identifier for the click. Example: "8c8b4895-a277-449f-r797-547e3c89b25a" |
app_instance.clicksPermitted.messageID | String | Message ID extracted from the headers of the email message. It can be used to look up the associated message in PPS and is not unique. Example: "8c6cfedd-3050-4d65-8c09-c5f65c38da81" |
app_instance.clicksPermitted.recipient | String | The recipient of the email. Example: "john.doe@exampledomain.com" |
app_instance.clicksPermitted.sender | String | The sender of the email. Example: "9facbf452def2d7efc5b5c48cdb837fa@badguy.zz" |
app_instance.clicksPermitted.senderIP | String | The IP address of the sender. Example: "192.0.x.255" |
app_instance.clicksPermitted.threatID | String | The unique identifier for the threat. Example: "61f7622167144dba5e3ae4480eeee78b23d66f7dfed970cfc3d086cc0dabdf50" |
app_instance.clicksPermitted.threatTime | String | The timestamp when the threat was identified in Proofpoint. Example: "2016-06-24T19:17:46.000Z" |
app_instance.clicksPermitted.threatURL | String | A link to the entry on the TAP Dashboard for the particular threat. Example: "https://threatinsight.proofpoint.com/#/threat/..." |
app_instance.clicksPermitted.threatStatus | String | The current status of the threat. Example: "active" |
app_instance.clicksPermitted.url | String | The URL clicked by the recipient. Example: "http://badguy.zz/" |
app_instance.clicksPermitted.userAgent | String | The user agent string of the browser used to click the URL. Example: "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0)..." |
app_instance.messagesBlocked | Array | An array of objects containing details of blocked messages. Example: messagesBlocked: [{...}] |
app_instance.messagesBlocked.GUID | String | The globally unique identifier for the blocked message. Example: "c26dbea0-80d5-463b-b93c-4e8b708219ce" |
app_instance.messagesBlocked.QID | String | The unique identifier for the queued message. Example: "r2FNwRHF004109" |
app_instance.messagesBlocked.ccAddresses | Array | The CC addresses for the email. Example: ["janesmith@exampledomain.com"] |
app_instance.messagesBlocked.clusterId | String | The identifier for the cluster handling the message. Example: "pharmtech_hosted" |
app_instance.messagesBlocked.completelyRewritten | Boolean | Whether the message was completely rewritten. Example: "true" |
app_instance.messagesBlocked.fromAddress | String | The sender address of the blocked message. Example: "bad.email@domain.zz" |
app_instance.messagesBlocked.headerCC | String | The CC header of the email. Example: “\”Sample Header\" <bruce.wayne@university-of-education.zz>" |
app_instance.messagesBlocked.headerReplyTo | String | The reply-to header of the email. |
app_instance.messagesBlocked.headerTo | String | The to header of the email. Example: "\"Clark Kent\" <clark.kent@pharmtech.zz>; \"Diana Prince\" <diana.prince@pharmtech.zz>" |
app_instance.messagesBlocked.impostorScore | Integer | The impostor score of the message. Higher scores indicate higher certainty. Example: 0 |
app_instance.messagesBlocked.malwareScore | Integer | The malware score of the email. Example: 100 |
app_instance.messagesBlocked.messageID | String | The message identifier. Example: "20160624211145.62086.mail@evil.zz" |
app_instance.messagesBlocked.messageParts | Array | An array of structures that contain details about parts of the message, including both message bodies and attachments. Example: [{"contentType":"text/plain", "filename":"text.txt", ...}] |
app_instance.messagesBlocked.messageTime | String | The timestamp of the message. Example: "2016-06-24T21:18:38.000Z" |
app_instance.messagesBlocked.modulesRun | Array | The modules that were run on the message. Example: ["pdr", "sandbox", "spam", "urldefense"] |
app_instance.messagesBlocked.phishScore | Integer | The phish score of the message. Higher scores indicate higher certainty. Example: 46 |
app_instance.messagesBlocked.policyRoutes | Array | The policy routes for the email. Example: ["default_inbound", "executives"] |
app_instance.messagesBlocked.quarantineFolder | String | The quarantine folder where the email is stored. Example: "Attachment Defense" |
app_instance.messagesBlocked.quarantineRule | String | The quarantine rule applied to the email. Example: "module.sandbox.threat" |
app_instance.messagesBlocked.recipient | Array | The recipients of the email. Example: ["clark.kent@pharmtech.zz", "diana.prince@pharmtech.zz"] |
app_instance.messagesBlocked.replyToAddress | String | The reply-to address of the email. |
app_instance.messagesBlocked.sender | String | The sender address of the email. Example: "e99d7ed5580193f36a51f597bc2c0210@evil.zz" |
app_instance.messagesBlocked.senderIP | String | The IP address of the sender. Example: "192.0.2.255" |
app_instance.messagesBlocked.spamScore | Integer | The spam score of the message. Higher scores indicate higher certainty. Example: 4 |
app_instance.messagesBlocked.subject | String | The subject of the email. Example: "Please find a totally safe invoice attached." |
app_instance.messagesBlocked.threatsInfoMap | Array | An array of structures that contain details about detected threats within the message. There may be more than one threat per message. Example: [{"campaignId": "...", "classification": "...", ...}] |
app_instance.messagesBlocked.toAddresses | Array | A list of email addresses contained within the To: header, excluding friendly names. Example: ["clark.kent@pharmtech.zz", "diana.prince@pharmtech.zz"] |
app_instance.messagesBlocked.xmailer | String | The xmailer header of the email. Example: "Spambot v2.5" |
app_instance.queryEndTime | String | The time at which the period queried for data ended. Example: “2016-06-24T21:36:00Z” |
Action: Get Issues
This action fetches events for clicks to malicious URLs permitted and messages delivered containing a known threat within the specified time period.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Interval | Enter the time interval (in ISO 8601 format) for which you want to retrieve information. Example:
| Text | Optional | Enter time in the ISO 8601 format. Minimum interval: 30 seconds Maximum interval: 1 hour |
Since Seconds | Enter the time interval in seconds from when you want to retrieve details. Start time: Current API server time, rounded to the nearest minute, less the entered value. End time: Current API server time rounded to the nearest minute. Example: 300 | Integer | Optional | |
Since Time | Enter the date (in ISO 8601 format) from when you want to retrieve details. Start time: Entered value. End time: Current API server time rounded to the nearest minute. Example: 2016-05-01T12:00:00Z | Text | Optional | |
Extra Parameters | Enter the required parameters as key-value pairs. Example: {"threatStatus": "active"} | Key Value | Optional | Allowed keys:
|
Example Request
[ { "interval": " 2020-05-01T12:00:00Z/2020-05-01T13:00:00Z", "extra_params": { "threatStatus": "active" } } ]
Action Response Parameters
Parameter | Type | Description |
---|---|---|
{app_instance} | Object | This parameter indicates the ID of the app instance configured in Orchestrate from which the response is retrieved. |
app_instance.clicksPermitted | Array | An array of objects containing details of all clicks to URL threats that were permitted. |
app_instance.clicksPermitted.campaignId | String | An identifier for the campaign of which the threat is a member, if available at the time of the query. Threats can be linked to campaigns even after these events are retrieved. Example: "46e01b8a-c899-404d-bcd9-189bb393d1a7" |
app_instance.clicksPermitted.classification | String | The category of threat found in the message. Example: "MALWARE" |
app_instance.clicksPermitted.clickIP | String | The external IP address of the user who clicked on the link. If the user is behind a firewall performing network address translation, the IP address of the firewall will be shown. Example: "192.0.2.1" |
app_instance.clicksPermitted.clickTime | String | The timestamp when the user clicked the URL. Example: "2016-06-24T19:17:44.000Z" |
app_instance.clicksPermitted.GUID | String | The globally unique identifier for the message. Example: "b27dbea0-87d5-463b-b93c-4e8b708289ce" |
app_instance.clicksPermitted.id | String | The unique identifier for the click. Example: "8c8b4895-a277-449f-r797-547e3c89b25a" |
app_instance.clicksPermitted.messageID | String | Message ID extracted from the headers of the email message. It can be used to look up the associated message in PPS and is not unique. Example: "8c6cfedd-3050-4d65-8c09-c5f65c38da81" |
app_instance.clicksPermitted.recipient | String | The recipient of the email. Example: "john.doe@exampledomain.com" |
app_instance.clicksPermitted.sender | String | The sender of the email. Example: "9facbf452def2d7efc5b5c48cdb837fa@badguy.zz" |
app_instance.clicksPermitted.senderIP | String | The IP address of the sender. Example: "192.0.x.255" |
app_instance.clicksPermitted.threatID | String | The unique identifier for the threat. Example: "61f7622167144dba5e3ae4480eeee78b23d66f7dfed970cfc3d086cc0dabdf50" |
app_instance.clicksPermitted.threatTime | String | The timestamp when the threat was identified in Proofpoint. Example: "2016-06-24T19:17:46.000Z" |
app_instance.clicksPermitted.threatURL | String | A link to the entry on the TAP Dashboard for the particular threat. Example: "https://threatinsight.proofpoint.com/#/threat/..." |
app_instance.clicksPermitted.threatStatus | String | The current status of the threat. Example: "active" |
app_instance.clicksPermitted.url | String | The URL clicked by the recipient. Example: "http://badguy.zz/" |
app_instance.clicksPermitted.userAgent | String | The user agent string of the browser used to click the URL. Example: "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0)..." |
app_instance.messagesBlocked | Array | An array of objects containing details of blocked messages. Example: messagesBlocked: [{...}] |
app_instance.messagesBlocked.GUID | String | The globally unique identifier for the blocked message. Example: "c26dbea0-80d5-463b-b93c-4e8b708219ce" |
app_instance.messagesBlocked.QID | String | The unique identifier for the queued message. Example: "r2FNwRHF004109" |
app_instance.messagesBlocked.ccAddresses | Array | The CC addresses for the email. Example: ["janesmith@exampledomain.com"] |
app_instance.messagesBlocked.clusterId | String | The identifier for the cluster handling the message. Example: "pharmtech_hosted" |
app_instance.messagesBlocked.completelyRewritten | Boolean | Whether the message was completely rewritten. Example: "true" |
app_instance.messagesBlocked.fromAddress | String | The sender address of the blocked message. Example: "bad.email@domain.zz" |
app_instance.messagesBlocked.headerCC | String | The CC header of the email. Example: “\”Sample Header\" <bruce.wayne@university-of-education.zz>" |
app_instance.messagesBlocked.headerReplyTo | String | The reply-to header of the email. |
app_instance.messagesBlocked.headerTo | String | The to header of the email. Example: "\"Clark Kent\" <clark.kent@pharmtech.zz>; \"Diana Prince\" <diana.prince@pharmtech.zz>" |
app_instance.messagesBlocked.impostorScore | Integer | The impostor score of the message. Higher scores indicate higher certainty. Example: 0 |
app_instance.messagesBlocked.malwareScore | Integer | The malware score of the email. Example: 100 |
app_instance.messagesBlocked.messageID | String | The message identifier. Example: "20160624211145.62086.mail@evil.zz" |
app_instance.messagesBlocked.messageParts | Array | An array of structures that contain details about parts of the message, including both message bodies and attachments. Example: [{"contentType":"text/plain", "filename":"text.txt", ...}] |
app_instance.messagesBlocked.messageTime | String | The timestamp of the message. Example: "2016-06-24T21:18:38.000Z" |
app_instance.messagesBlocked.modulesRun | Array | The modules that were run on the message. Example: ["pdr", "sandbox", "spam", "urldefense"] |
app_instance.messagesBlocked.phishScore | Integer | The phish score of the message. Higher scores indicate higher certainty. Example: 46 |
app_instance.messagesBlocked.policyRoutes | Array | The policy routes for the email. Example: ["default_inbound", "executives"] |
app_instance.messagesBlocked.quarantineFolder | String | The quarantine folder where the email is stored. Example: "Attachment Defense" |
app_instance.messagesBlocked.quarantineRule | String | The quarantine rule applied to the email. Example: "module.sandbox.threat" |
app_instance.messagesBlocked.recipient | Array | The recipients of the email. Example: ["clark.kent@pharmtech.zz", "diana.prince@pharmtech.zz"] |
app_instance.messagesBlocked.replyToAddress | String | The reply-to address of the email. |
app_instance.messagesBlocked.sender | String | The sender address of the email. Example: "e99d7ed5580193f36a51f597bc2c0210@evil.zz" |
app_instance.messagesBlocked.senderIP | String | The IP address of the sender. Example: "192.0.2.255" |
app_instance.messagesBlocked.spamScore | Integer | The spam score of the message. Higher scores indicate higher certainty. Example: 4 |
app_instance.messagesBlocked.subject | String | The subject of the email. Example: "Please find a totally safe invoice attached." |
app_instance.messagesBlocked.threatsInfoMap | Array | An array of structures that contain details about detected threats within the message. There may be more than one threat per message. Example: [{"campaignId": "...", "classification": "...", ...}] |
app_instance.messagesBlocked.toAddresses | Array | A list of email addresses contained within the To: header, excluding friendly names. Example: ["clark.kent@pharmtech.zz", "diana.prince@pharmtech.zz"] |
app_instance.messagesBlocked.xmailer | String | The xmailer header of the email. Example: "Spambot v2.5" |
app_instance.queryEndTime | String | The time at which the period queried for data ended. Example: “2016-06-24T21:36:00Z” |
Action: Get Delivered Messages
This action retrieves details of delivered messages that contained a known threat in the specified time period.
One of the below parameters must be provided:
Interval
Since Seconds
Since Time
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Interval | Enter the time interval (in ISO 8601 format) for which you want to retrieve information. Example:
| Text | Optional | Enter time in the ISO 8601 format. Minimum interval: 30 seconds Maximum interval: 1 hour |
Since Seconds | Enter the time interval in seconds from when you want to retrieve details. Start time: Current API server time, rounded to the nearest minute, less the entered value. End time: Current API server time rounded to the nearest minute. Example: 300 | Integer | Optional | |
Since Time | Enter the date (in ISO 8601 format) from when you want to retrieve details. Start time: Entered value. End time: Current API server time rounded to the nearest minute. Example: 2016-05-01T12:00:00Z | Text | Optional | |
Extra Parameters | Enter the required parameters as key-value pairs. Example: {"threatStatus": "active"} | Key Value | Optional | Allowed keys:
|
Example Request
[ { "interval": " 2020-05-01T12:00:00Z/2020-05-01T13:00:00Z", "extra_params": { "threatStatus": "active" } } ]
Action Response Parameters
Parameter | Type | Description |
---|---|---|
{app_instance} | Object | This parameter indicates the ID of the app instance configured in Orchestrate from which the response is retrieved. |
app_instance.clicksPermitted | Array | An array of objects containing details of all clicks to URL threats that were permitted. |
app_instance.clicksPermitted.campaignId | String | An identifier for the campaign of which the threat is a member, if available at the time of the query. Threats can be linked to campaigns even after these events are retrieved. Example: "46e01b8a-c899-404d-bcd9-189bb393d1a7" |
app_instance.clicksPermitted.classification | String | The category of threat found in the message. Example: "MALWARE" |
app_instance.clicksPermitted.clickIP | String | The external IP address of the user who clicked on the link. If the user is behind a firewall performing network address translation, the IP address of the firewall will be shown. Example: "192.0.2.1" |
app_instance.clicksPermitted.clickTime | String | The timestamp when the user clicked the URL. Example: "2016-06-24T19:17:44.000Z" |
app_instance.clicksPermitted.GUID | String | The globally unique identifier for the message. Example: "b27dbea0-87d5-463b-b93c-4e8b708289ce" |
app_instance.clicksPermitted.id | String | The unique identifier for the click. Example: "8c8b4895-a277-449f-r797-547e3c89b25a" |
app_instance.clicksPermitted.messageID | String | Message ID extracted from the headers of the email message. It can be used to look up the associated message in PPS and is not unique. Example: "8c6cfedd-3050-4d65-8c09-c5f65c38da81" |
app_instance.clicksPermitted.recipient | String | The recipient of the email. Example: "john.doe@exampledomain.com" |
app_instance.clicksPermitted.sender | String | The sender of the email. Example: "9facbf452def2d7efc5b5c48cdb837fa@badguy.zz" |
app_instance.clicksPermitted.senderIP | String | The IP address of the sender. Example: "192.0.x.255" |
app_instance.clicksPermitted.threatID | String | The unique identifier for the threat. Example: "61f7622167144dba5e3ae4480eeee78b23d66f7dfed970cfc3d086cc0dabdf50" |
app_instance.clicksPermitted.threatTime | String | The timestamp when the threat was identified in Proofpoint. Example: "2016-06-24T19:17:46.000Z" |
app_instance.clicksPermitted.threatURL | String | A link to the entry on the TAP Dashboard for the particular threat. Example: "https://threatinsight.proofpoint.com/#/threat/..." |
app_instance.clicksPermitted.threatStatus | String | The current status of the threat. Example: "active" |
app_instance.clicksPermitted.url | String | The URL clicked by the recipient. Example: "http://badguy.zz/" |
app_instance.clicksPermitted.userAgent | String | The user agent string of the browser used to click the URL. Example: "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0)..." |
app_instance.messagesBlocked | Array | An array of objects containing details of blocked messages. Example: messagesBlocked: [{...}] |
app_instance.messagesBlocked.GUID | String | The globally unique identifier for the blocked message. Example: "c26dbea0-80d5-463b-b93c-4e8b708219ce" |
app_instance.messagesBlocked.QID | String | The unique identifier for the queued message. Example: "r2FNwRHF004109" |
app_instance.messagesBlocked.ccAddresses | Array | The CC addresses for the email. Example: ["janesmith@exampledomain.com"] |
app_instance.messagesBlocked.clusterId | String | The identifier for the cluster handling the message. Example: "pharmtech_hosted" |
app_instance.messagesBlocked.completelyRewritten | Boolean | Whether the message was completely rewritten. Example: "true" |
app_instance.messagesBlocked.fromAddress | String | The sender address of the blocked message. Example: "bad.email@domain.zz" |
app_instance.messagesBlocked.headerCC | String | The CC header of the email. Example: “\”Sample Header\" <bruce.wayne@university-of-education.zz>" |
app_instance.messagesBlocked.headerReplyTo | String | The reply-to header of the email. |
app_instance.messagesBlocked.headerTo | String | The to header of the email. Example: "\"Clark Kent\" <clark.kent@pharmtech.zz>; \"Diana Prince\" <diana.prince@pharmtech.zz>" |
app_instance.messagesBlocked.impostorScore | Integer | The impostor score of the message. Higher scores indicate higher certainty. Example: 0 |
app_instance.messagesBlocked.malwareScore | Integer | The malware score of the email. Example: 100 |
app_instance.messagesBlocked.messageID | String | The message identifier. Example: "20160624211145.62086.mail@evil.zz" |
app_instance.messagesBlocked.messageParts | Array | An array of structures that contain details about parts of the message, including both message bodies and attachments. Example: [{"contentType":"text/plain", "filename":"text.txt", ...}] |
app_instance.messagesBlocked.messageTime | String | The timestamp of the message. Example: "2016-06-24T21:18:38.000Z" |
app_instance.messagesBlocked.modulesRun | Array | The modules that were run on the message. Example: ["pdr", "sandbox", "spam", "urldefense"] |
app_instance.messagesBlocked.phishScore | Integer | The phish score of the message. Higher scores indicate higher certainty. Example: 46 |
app_instance.messagesBlocked.policyRoutes | Array | The policy routes for the email. Example: ["default_inbound", "executives"] |
app_instance.messagesBlocked.quarantineFolder | String | The quarantine folder where the email is stored. Example: "Attachment Defense" |
app_instance.messagesBlocked.quarantineRule | String | The quarantine rule applied to the email. Example: "module.sandbox.threat" |
app_instance.messagesBlocked.recipient | Array | The recipients of the email. Example: ["clark.kent@pharmtech.zz", "diana.prince@pharmtech.zz"] |
app_instance.messagesBlocked.replyToAddress | String | The reply-to address of the email. |
app_instance.messagesBlocked.sender | String | The sender address of the email. Example: "e99d7ed5580193f36a51f597bc2c0210@evil.zz" |
app_instance.messagesBlocked.senderIP | String | The IP address of the sender. Example: "192.0.2.255" |
app_instance.messagesBlocked.spamScore | Integer | The spam score of the message. Higher scores indicate higher certainty. Example: 4 |
app_instance.messagesBlocked.subject | String | The subject of the email. Example: "Please find a totally safe invoice attached." |
app_instance.messagesBlocked.threatsInfoMap | Array | An array of structures that contain details about detected threats within the message. There may be more than one threat per message. Example: [{"campaignId": "...", "classification": "...", ...}] |
app_instance.messagesBlocked.toAddresses | Array | A list of email addresses contained within the To: header, excluding friendly names. Example: ["clark.kent@pharmtech.zz", "diana.prince@pharmtech.zz"] |
app_instance.messagesBlocked.xmailer | String | The xmailer header of the email. Example: "Spambot v2.5" |
app_instance.queryEndTime | String | The time at which the period queried for data ended. Example: “2016-06-24T21:36:00Z” |
Action: Get Blocked Messages
This action retrieves details of all blocked messages containing a known threat in the specified period.
One of the below parameters must be provided:
Interval
Since Time
Since Seconds
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Interval | Enter the time interval (in ISO 8601 format) for which you want to retrieve information. Example:
| Text | Optional | Enter time in the ISO 8601 format. Minimum interval: 30 seconds Maximum interval: 1 hour |
Since Seconds | Enter the time interval in seconds from when you want to retrieve details. Start time: Current API server time, rounded to the nearest minute, less the entered value. End time: Current API server time rounded to the nearest minute. Example: 300 | Integer | Optional | |
Since Time | Enter the date (in ISO 8601 format) from when you want to retrieve details. Start time: Entered value. End time: Current API server time rounded to the nearest minute. Example: 2016-05-01T12:00:00Z | Text | Optional | |
Extra Parameters | Enter the required parameters as key-value pairs. Example: {"threatStatus": "active"} | Key Value | Optional | Allowed keys:
|
Example Request
[ { "interval": " 2020-05-01T12:00:00Z/2020-05-01T13:00:00Z", "extra_params": { "threatStatus": "active" } } ]
Action Response Parameters
Parameter | Type | Description |
---|---|---|
{app_instance} | Object | This parameter indicates the ID of the app instance configured in Orchestrate from which the response is retrieved. |
app_instance.clicksPermitted | Array | An array of objects containing details of all clicks to URL threats that were permitted. |
app_instance.clicksPermitted.campaignId | String | An identifier for the campaign of which the threat is a member, if available at the time of the query. Threats can be linked to campaigns even after these events are retrieved. Example: "46e01b8a-c899-404d-bcd9-189bb393d1a7" |
app_instance.clicksPermitted.classification | String | The category of threat found in the message. Example: "MALWARE" |
app_instance.clicksPermitted.clickIP | String | The external IP address of the user who clicked on the link. If the user is behind a firewall performing network address translation, the IP address of the firewall will be shown. Example: "192.0.2.1" |
app_instance.clicksPermitted.clickTime | String | The timestamp when the user clicked the URL. Example: "2016-06-24T19:17:44.000Z" |
app_instance.clicksPermitted.GUID | String | The globally unique identifier for the message. Example: "b27dbea0-87d5-463b-b93c-4e8b708289ce" |
app_instance.clicksPermitted.id | String | The unique identifier for the click. Example: "8c8b4895-a277-449f-r797-547e3c89b25a" |
app_instance.clicksPermitted.messageID | String | Message ID extracted from the headers of the email message. It can be used to look up the associated message in PPS and is not unique. Example: "8c6cfedd-3050-4d65-8c09-c5f65c38da81" |
app_instance.clicksPermitted.recipient | String | The recipient of the email. Example: "john.doe@exampledomain.com" |
app_instance.clicksPermitted.sender | String | The sender of the email. Example: "9facbf452def2d7efc5b5c48cdb837fa@badguy.zz" |
app_instance.clicksPermitted.senderIP | String | The IP address of the sender. Example: "192.0.x.255" |
app_instance.clicksPermitted.threatID | String | The unique identifier for the threat. Example: "61f7622167144dba5e3ae4480eeee78b23d66f7dfed970cfc3d086cc0dabdf50" |
app_instance.clicksPermitted.threatTime | String | The timestamp when the threat was identified in Proofpoint. Example: "2016-06-24T19:17:46.000Z" |
app_instance.clicksPermitted.threatURL | String | A link to the entry on the TAP Dashboard for the particular threat. Example: "https://threatinsight.proofpoint.com/#/threat/..." |
app_instance.clicksPermitted.threatStatus | String | The current status of the threat. Example: "active" |
app_instance.clicksPermitted.url | String | The URL clicked by the recipient. Example: "http://badguy.zz/" |
app_instance.clicksPermitted.userAgent | String | The user agent string of the browser used to click the URL. Example: "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0)..." |
app_instance.messagesBlocked | Array | An array of objects containing details of blocked messages. Example: messagesBlocked: [{...}] |
app_instance.messagesBlocked.GUID | String | The globally unique identifier for the blocked message. Example: "c26dbea0-80d5-463b-b93c-4e8b708219ce" |
app_instance.messagesBlocked.QID | String | The unique identifier for the queued message. Example: "r2FNwRHF004109" |
app_instance.messagesBlocked.ccAddresses | Array | The CC addresses for the email. Example: ["janesmith@exampledomain.com"] |
app_instance.messagesBlocked.clusterId | String | The identifier for the cluster handling the message. Example: "pharmtech_hosted" |
app_instance.messagesBlocked.completelyRewritten | Boolean | Whether the message was completely rewritten. Example: "true" |
app_instance.messagesBlocked.fromAddress | String | The sender address of the blocked message. Example: "bad.email@domain.zz" |
app_instance.messagesBlocked.headerCC | String | The CC header of the email. Example: “\”Sample Header\" <bruce.wayne@university-of-education.zz>" |
app_instance.messagesBlocked.headerReplyTo | String | The reply-to header of the email. |
app_instance.messagesBlocked.headerTo | String | The to header of the email. Example: "\"Clark Kent\" <clark.kent@pharmtech.zz>; \"Diana Prince\" <diana.prince@pharmtech.zz>" |
app_instance.messagesBlocked.impostorScore | Integer | The impostor score of the message. Higher scores indicate higher certainty. Example: 0 |
app_instance.messagesBlocked.malwareScore | Integer | The malware score of the email. Example: 100 |
app_instance.messagesBlocked.messageID | String | The message identifier. Example: "20160624211145.62086.mail@evil.zz" |
app_instance.messagesBlocked.messageParts | Array | An array of structures that contain details about parts of the message, including both message bodies and attachments. Example: [{"contentType":"text/plain", "filename":"text.txt", ...}] |
app_instance.messagesBlocked.messageTime | String | The timestamp of the message. Example: "2016-06-24T21:18:38.000Z" |
app_instance.messagesBlocked.modulesRun | Array | The modules that were run on the message. Example: ["pdr", "sandbox", "spam", "urldefense"] |
app_instance.messagesBlocked.phishScore | Integer | The phish score of the message. Higher scores indicate higher certainty. Example: 46 |
app_instance.messagesBlocked.policyRoutes | Array | The policy routes for the email. Example: ["default_inbound", "executives"] |
app_instance.messagesBlocked.quarantineFolder | String | The quarantine folder where the email is stored. Example: "Attachment Defense" |
app_instance.messagesBlocked.quarantineRule | String | The quarantine rule applied to the email. Example: "module.sandbox.threat" |
app_instance.messagesBlocked.recipient | Array | The recipients of the email. Example: ["clark.kent@pharmtech.zz", "diana.prince@pharmtech.zz"] |
app_instance.messagesBlocked.replyToAddress | String | The reply-to address of the email. |
app_instance.messagesBlocked.sender | String | The sender address of the email. Example: "e99d7ed5580193f36a51f597bc2c0210@evil.zz" |
app_instance.messagesBlocked.senderIP | String | The IP address of the sender. Example: "192.0.2.255" |
app_instance.messagesBlocked.spamScore | Integer | The spam score of the message. Higher scores indicate higher certainty. Example: 4 |
app_instance.messagesBlocked.subject | String | The subject of the email. Example: "Please find a totally safe invoice attached." |
app_instance.messagesBlocked.threatsInfoMap | Array | An array of structures that contain details about detected threats within the message. There may be more than one threat per message. Example: [{"campaignId": "...", "classification": "...", ...}] |
app_instance.messagesBlocked.toAddresses | Array | A list of email addresses contained within the To: header, excluding friendly names. Example: ["clark.kent@pharmtech.zz", "diana.prince@pharmtech.zz"] |
app_instance.messagesBlocked.xmailer | String | The xmailer header of the email. Example: "Spambot v2.5" |
app_instance.queryEndTime | String | The time at which the period queried for data ended. Example: “2016-06-24T21:36:00Z” |
Action: Get Permitted Clicks
This action retrieves a list of all clicks to malicious URLs (blocked by you) in the specified time period.
One of the below parameters must be provided:
Interval
Since Seconds
Since Time
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Interval | Enter the time interval (in ISO 8601 format) for which you want to retrieve information. Example:
| Text | Optional | Enter time in the ISO 8601 format. Minimum interval: 30 seconds Maximum interval: 1 hour |
Since Seconds | Enter the time interval in seconds from when you want to retrieve details. Start time: Current API server time, rounded to the nearest minute, less the entered value. End time: Current API server time rounded to the nearest minute. Example: 300 | Integer | Optional | |
Since Time | Enter the date (in ISO 8601 format) from when you want to retrieve details. Start time: Entered value. End time: Current API server time rounded to the nearest minute. Example: 2016-05-01T12:00:00Z | Text | Optional | |
Extra Parameters | Enter the required parameters as key-value pairs. Example: {"threatStatus": "active"} | Key Value | Optional | Allowed keys:
|
Example Request
[ { "interval": " 2020-05-01T12:00:00Z/2020-05-01T13:00:00Z", "extra_params": { "threatStatus": "active" } } ]
Action Response Parameters
Parameter | Type | Description |
---|---|---|
{app_instance} | Object | This parameter indicates the ID of the app instance configured in Orchestrate from which the response is retrieved. |
app_instance.clicksPermitted | Array | An array of objects containing details of all clicks to URL threats that were permitted. |
app_instance.clicksPermitted.campaignId | String | An identifier for the campaign of which the threat is a member, if available at the time of the query. Threats can be linked to campaigns even after these events are retrieved. Example: "46e01b8a-c899-404d-bcd9-189bb393d1a7" |
app_instance.clicksPermitted.classification | String | The category of threat found in the message. Example: "MALWARE" |
app_instance.clicksPermitted.clickIP | String | The external IP address of the user who clicked on the link. If the user is behind a firewall performing network address translation, the IP address of the firewall will be shown. Example: "192.0.2.1" |
app_instance.clicksPermitted.clickTime | String | The timestamp when the user clicked the URL. Example: "2016-06-24T19:17:44.000Z" |
app_instance.clicksPermitted.GUID | String | The globally unique identifier for the message. Example: "b27dbea0-87d5-463b-b93c-4e8b708289ce" |
app_instance.clicksPermitted.id | String | The unique identifier for the click. Example: "8c8b4895-a277-449f-r797-547e3c89b25a" |
app_instance.clicksPermitted.messageID | String | Message ID extracted from the headers of the email message. It can be used to look up the associated message in PPS and is not unique. Example: "8c6cfedd-3050-4d65-8c09-c5f65c38da81" |
app_instance.clicksPermitted.recipient | String | The recipient of the email. Example: "john.doe@exampledomain.com" |
app_instance.clicksPermitted.sender | String | The sender of the email. Example: "9facbf452def2d7efc5b5c48cdb837fa@badguy.zz" |
app_instance.clicksPermitted.senderIP | String | The IP address of the sender. Example: "192.0.x.255" |
app_instance.clicksPermitted.threatID | String | The unique identifier for the threat. Example: "61f7622167144dba5e3ae4480eeee78b23d66f7dfed970cfc3d086cc0dabdf50" |
app_instance.clicksPermitted.threatTime | String | The timestamp when the threat was identified in Proofpoint. Example: "2016-06-24T19:17:46.000Z" |
app_instance.clicksPermitted.threatURL | String | A link to the entry on the TAP Dashboard for the particular threat. Example: "https://threatinsight.proofpoint.com/#/threat/..." |
app_instance.clicksPermitted.threatStatus | String | The current status of the threat. Example: "active" |
app_instance.clicksPermitted.url | String | The URL clicked by the recipient. Example: "http://badguy.zz/" |
app_instance.clicksPermitted.userAgent | String | The user agent string of the browser used to click the URL. Example: "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0)..." |
app_instance.messagesBlocked | Array | An array of objects containing details of blocked messages. Example: messagesBlocked: [{...}] |
app_instance.messagesBlocked.GUID | String | The globally unique identifier for the blocked message. Example: "c26dbea0-80d5-463b-b93c-4e8b708219ce" |
app_instance.messagesBlocked.QID | String | The unique identifier for the queued message. Example: "r2FNwRHF004109" |
app_instance.messagesBlocked.ccAddresses | Array | The CC addresses for the email. Example: ["janesmith@exampledomain.com"] |
app_instance.messagesBlocked.clusterId | String | The identifier for the cluster handling the message. Example: "pharmtech_hosted" |
app_instance.messagesBlocked.completelyRewritten | Boolean | Whether the message was completely rewritten. Example: "true" |
app_instance.messagesBlocked.fromAddress | String | The sender address of the blocked message. Example: "bad.email@domain.zz" |
app_instance.messagesBlocked.headerCC | String | The CC header of the email. Example: “\”Sample Header\" <bruce.wayne@university-of-education.zz>" |
app_instance.messagesBlocked.headerReplyTo | String | The reply-to header of the email. |
app_instance.messagesBlocked.headerTo | String | The to header of the email. Example: "\"Clark Kent\" <clark.kent@pharmtech.zz>; \"Diana Prince\" <diana.prince@pharmtech.zz>" |
app_instance.messagesBlocked.impostorScore | Integer | The impostor score of the message. Higher scores indicate higher certainty. Example: 0 |
app_instance.messagesBlocked.malwareScore | Integer | The malware score of the email. Example: 100 |
app_instance.messagesBlocked.messageID | String | The message identifier. Example: "20160624211145.62086.mail@evil.zz" |
app_instance.messagesBlocked.messageParts | Array | An array of structures that contain details about parts of the message, including both message bodies and attachments. Example: [{"contentType":"text/plain", "filename":"text.txt", ...}] |
app_instance.messagesBlocked.messageTime | String | The timestamp of the message. Example: "2016-06-24T21:18:38.000Z" |
app_instance.messagesBlocked.modulesRun | Array | The modules that were run on the message. Example: ["pdr", "sandbox", "spam", "urldefense"] |
app_instance.messagesBlocked.phishScore | Integer | The phish score of the message. Higher scores indicate higher certainty. Example: 46 |
app_instance.messagesBlocked.policyRoutes | Array | The policy routes for the email. Example: ["default_inbound", "executives"] |
app_instance.messagesBlocked.quarantineFolder | String | The quarantine folder where the email is stored. Example: "Attachment Defense" |
app_instance.messagesBlocked.quarantineRule | String | The quarantine rule applied to the email. Example: "module.sandbox.threat" |
app_instance.messagesBlocked.recipient | Array | The recipients of the email. Example: ["clark.kent@pharmtech.zz", "diana.prince@pharmtech.zz"] |
app_instance.messagesBlocked.replyToAddress | String | The reply-to address of the email. |
app_instance.messagesBlocked.sender | String | The sender address of the email. Example: "e99d7ed5580193f36a51f597bc2c0210@evil.zz" |
app_instance.messagesBlocked.senderIP | String | The IP address of the sender. Example: "192.0.2.255" |
app_instance.messagesBlocked.spamScore | Integer | The spam score of the message. Higher scores indicate higher certainty. Example: 4 |
app_instance.messagesBlocked.subject | String | The subject of the email. Example: "Please find a totally safe invoice attached." |
app_instance.messagesBlocked.threatsInfoMap | Array | An array of structures that contain details about detected threats within the message. There may be more than one threat per message. Example: [{"campaignId": "...", "classification": "...", ...}] |
app_instance.messagesBlocked.toAddresses | Array | A list of email addresses contained within the To: header, excluding friendly names. Example: ["clark.kent@pharmtech.zz", "diana.prince@pharmtech.zz"] |
app_instance.messagesBlocked.xmailer | String | The xmailer header of the email. Example: "Spambot v2.5" |
app_instance.queryEndTime | String | The time at which the period queried for data ended. Example: “2016-06-24T21:36:00Z” |
Action: Get Blocked Clicks
This action retrieves events for clicks to malicious URLs blocked in the specified time period.
One of the below parameters must be provided:
Interval
Since Seconds
Since Time
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Interval | Enter the time interval (in ISO 8601 format) for which you want to retrieve information. Example:
| Text | Optional | Enter time in the ISO 8601 format. Minimum interval: 30 seconds Maximum interval: 1 hour |
Since Seconds | Enter the time interval in seconds from when you want to retrieve details. Start time: Current API server time, rounded to the nearest minute, less the entered value. End time: Current API server time rounded to the nearest minute. Example: 300 | Integer | Optional | |
Since Time | Enter the date (in ISO 8601 format) from when you want to retrieve details. Start time: Entered value. End time: Current API server time rounded to the nearest minute. Example: 2016-05-01T12:00:00Z | Text | Optional | |
Extra Parameters | Enter the required parameters as key-value pairs. Example: {"threatStatus": "active"} | Key Value | Optional | Allowed keys:
|
Example Request
[ { "interval": " 2020-05-01T12:00:00Z/2020-05-01T13:00:00Z", "extra_params": { "threatStatus": "active" } } ]
Action Response Parameters
Parameter | Type | Description |
---|---|---|
{app_instance} | Object | This parameter indicates the ID of the app instance configured in Orchestrate from which the response is retrieved. |
app_instance.clicksPermitted | Array | An array of objects containing details of all clicks to URL threats that were permitted. |
app_instance.clicksPermitted.campaignId | String | An identifier for the campaign of which the threat is a member, if available at the time of the query. Threats can be linked to campaigns even after these events are retrieved. Example: "46e01b8a-c899-404d-bcd9-189bb393d1a7" |
app_instance.clicksPermitted.classification | String | The category of threat found in the message. Example: "MALWARE" |
app_instance.clicksPermitted.clickIP | String | The external IP address of the user who clicked on the link. If the user is behind a firewall performing network address translation, the IP address of the firewall will be shown. Example: "192.0.2.1" |
app_instance.clicksPermitted.clickTime | String | The timestamp when the user clicked the URL. Example: "2016-06-24T19:17:44.000Z" |
app_instance.clicksPermitted.GUID | String | The globally unique identifier for the message. Example: "b27dbea0-87d5-463b-b93c-4e8b708289ce" |
app_instance.clicksPermitted.id | String | The unique identifier for the click. Example: "8c8b4895-a277-449f-r797-547e3c89b25a" |
app_instance.clicksPermitted.messageID | String | Message ID extracted from the headers of the email message. It can be used to look up the associated message in PPS and is not unique. Example: "8c6cfedd-3050-4d65-8c09-c5f65c38da81" |
app_instance.clicksPermitted.recipient | String | The recipient of the email. Example: "john.doe@exampledomain.com" |
app_instance.clicksPermitted.sender | String | The sender of the email. Example: "9facbf452def2d7efc5b5c48cdb837fa@badguy.zz" |
app_instance.clicksPermitted.senderIP | String | The IP address of the sender. Example: "192.0.x.255" |
app_instance.clicksPermitted.threatID | String | The unique identifier for the threat. Example: "61f7622167144dba5e3ae4480eeee78b23d66f7dfed970cfc3d086cc0dabdf50" |
app_instance.clicksPermitted.threatTime | String | The timestamp when the threat was identified in Proofpoint. Example: "2016-06-24T19:17:46.000Z" |
app_instance.clicksPermitted.threatURL | String | A link to the entry on the TAP Dashboard for the particular threat. Example: "https://threatinsight.proofpoint.com/#/threat/..." |
app_instance.clicksPermitted.threatStatus | String | The current status of the threat. Example: "active" |
app_instance.clicksPermitted.url | String | The URL clicked by the recipient. Example: "http://badguy.zz/" |
app_instance.clicksPermitted.userAgent | String | The user agent string of the browser used to click the URL. Example: "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0)..." |
app_instance.messagesBlocked | Array | An array of objects containing details of blocked messages. Example: messagesBlocked: [{...}] |
app_instance.messagesBlocked.GUID | String | The globally unique identifier for the blocked message. Example: "c26dbea0-80d5-463b-b93c-4e8b708219ce" |
app_instance.messagesBlocked.QID | String | The unique identifier for the queued message. Example: "r2FNwRHF004109" |
app_instance.messagesBlocked.ccAddresses | Array | The CC addresses for the email. Example: ["janesmith@exampledomain.com"] |
app_instance.messagesBlocked.clusterId | String | The identifier for the cluster handling the message. Example: "pharmtech_hosted" |
app_instance.messagesBlocked.completelyRewritten | Boolean | Whether the message was completely rewritten. Example: "true" |
app_instance.messagesBlocked.fromAddress | String | The sender address of the blocked message. Example: "bad.email@domain.zz" |
app_instance.messagesBlocked.headerCC | String | The CC header of the email. Example: “\”Sample Header\" <bruce.wayne@university-of-education.zz>" |
app_instance.messagesBlocked.headerReplyTo | String | The reply-to header of the email. |
app_instance.messagesBlocked.headerTo | String | The to header of the email. Example: "\"Clark Kent\" <clark.kent@pharmtech.zz>; \"Diana Prince\" <diana.prince@pharmtech.zz>" |
app_instance.messagesBlocked.impostorScore | Integer | The impostor score of the message. Higher scores indicate higher certainty. Example: 0 |
app_instance.messagesBlocked.malwareScore | Integer | The malware score of the email. Example: 100 |
app_instance.messagesBlocked.messageID | String | The message identifier. Example: "20160624211145.62086.mail@evil.zz" |
app_instance.messagesBlocked.messageParts | Array | An array of structures that contain details about parts of the message, including both message bodies and attachments. Example: [{"contentType":"text/plain", "filename":"text.txt", ...}] |
app_instance.messagesBlocked.messageTime | String | The timestamp of the message. Example: "2016-06-24T21:18:38.000Z" |
app_instance.messagesBlocked.modulesRun | Array | The modules that were run on the message. Example: ["pdr", "sandbox", "spam", "urldefense"] |
app_instance.messagesBlocked.phishScore | Integer | The phish score of the message. Higher scores indicate higher certainty. Example: 46 |
app_instance.messagesBlocked.policyRoutes | Array | The policy routes for the email. Example: ["default_inbound", "executives"] |
app_instance.messagesBlocked.quarantineFolder | String | The quarantine folder where the email is stored. Example: "Attachment Defense" |
app_instance.messagesBlocked.quarantineRule | String | The quarantine rule applied to the email. Example: "module.sandbox.threat" |
app_instance.messagesBlocked.recipient | Array | The recipients of the email. Example: ["clark.kent@pharmtech.zz", "diana.prince@pharmtech.zz"] |
app_instance.messagesBlocked.replyToAddress | String | The reply-to address of the email. |
app_instance.messagesBlocked.sender | String | The sender address of the email. Example: "e99d7ed5580193f36a51f597bc2c0210@evil.zz" |
app_instance.messagesBlocked.senderIP | String | The IP address of the sender. Example: "192.0.2.255" |
app_instance.messagesBlocked.spamScore | Integer | The spam score of the message. Higher scores indicate higher certainty. Example: 4 |
app_instance.messagesBlocked.subject | String | The subject of the email. Example: "Please find a totally safe invoice attached." |
app_instance.messagesBlocked.threatsInfoMap | Array | An array of structures that contain details about detected threats within the message. There may be more than one threat per message. Example: [{"campaignId": "...", "classification": "...", ...}] |
app_instance.messagesBlocked.toAddresses | Array | A list of email addresses contained within the To: header, excluding friendly names. Example: ["clark.kent@pharmtech.zz", "diana.prince@pharmtech.zz"] |
app_instance.messagesBlocked.xmailer | String | The xmailer header of the email. Example: "Spambot v2.5" |
app_instance.queryEndTime | String | The time at which the period queried for data ended. Example: “2016-06-24T21:36:00Z” |
List Campaign IDs
This action retrieves a list of active campaign IDs.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Time From | Enter the time to retrieve the ID of campaigns that are updated after this time. Example: "2020-05-01T12:00:00Z" | Text | Required | |
Time To | Enter the time to retrieve the ID of campaigns that are updated before this time. Example: "2020-05-01T13:00:00Z" | Text | Required | |
Page Number | Enter the page number to retrieve campaign IDs. Example: 2 | Integer | Optional | Default value: 1 |
Page Size | Enter the maximum number of campaign IDs to retrieve. Example: 50 | Integer | Optional | Default value: 100 |
Example Request
[ { "time_from": "2020-05-01T12:00:00Z", "time_to": "2020-05-01T13:00:00Z", "page": 2, "size": 50 } ]
Generic Action
This is a generic action to perform any additional use case on Proofpoint Targeted Attack Prevention (TAP).
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Endpoint | Enter the endpoint to make the request. Example: "campaign/ids" | Text | Required | |
Method | Enter the HTTP method. Example:
| Text | Required | |
Query Params | Enter the query parameters in JSON format to filter the result. Example: $JSON[{"page":1}] | Any | Optional | |
Payload Data | Enter the payload data to pass with the request. Example: {"data": {'type': type,'id': id}} | Key Value | Optional | |
Payload JSON | Enter the payload in JSON format to pass with the request. Example: $JSON[{"data": {'type': type,'id': id}}] | Any | Optional |
Example Request
[ { "endpoint":"campaign/ids", "method":"POST", "query_params":[ { "page":1 } ], "payload_data":{ "data":{ "type":"type", "id":"id" } }, "payload_json":[ { "data":{ "type":"type", "id":"id" } } ] } ]