- Fix for event filtering.
- Fix for Poller.
- Bugfix.
- Initial release
Proofpoint Targeted Attack Protection (TAP) helps you stay ahead of attackers with an innovative approach that detects, analyzes and blocks advanced threats before they reach your inbox. This includes ransomware and other advanced email threats delivered through malicious attachments and URLs.
The Proofpoint TAP function package provides the following features:
- Poll detailed information from several types of TAP events in a SIEM-compatible, vendor-neutral format. This includes Blocked or permitted clicks to threats recognized by URL Defense and Blocked, and delivered messages containing threats recognized by URL Defense or Attachment Defense.
- Get detailed forensic evidences about individual threats or campaigns observed in their environment. These evidences could be used as indicators of compromise to confirm infection on a host, as supplementary data to enrich and correlate against other security intelligence sources, or to orchestrate updates to security endpoints to prevent exposure and infection.
- Pull specific details about campaigns, including their description, the actor, malware family, and techniques associated with the campaign and the threat variants which have been associated with the campaign.
- Resilient platform >=
v32
- An Integration Server running
resilient_circuits>=32.0.186
- To set up an Integration Server see: ibm.biz/res-int-server-guide
-
Download the
fn_proofpoint_tap.zip
. -
Copy the
.zip
to your Integration Server and SSH into it. -
Unzip the package:
$ unzip fn_proofpoint_tap-x.x.x.zip
-
Change Directory into the unzipped directory:
$ cd fn_proofpoint_tap-x.x.x
-
Install the package:
$ pip install fn_proofpoint_tap-x.x.x.tar.gz
-
Import the configurations into your app.config file:
$ resilient-circuits config -u
-
Import the fn_proofpoint_tap customizations into the Resilient platform:
$ resilient-circuits customize -y -l fn-proofpoint-tap
-
Open the config file, scroll to the bottom and edit your fn_proofpoint_tap configurations:
$ nano ~/.resilient/app.config
Config Required Example Description base_url Yes https://tap-api-v2.proofpoint.com/v2
URL used to authenticate to Proofpoint TAP username Yes `` Credentials used to authenticate to Proofpoint TAP. password Yes `` Credentials used to authenticate to Proofpoint TAP. polling_interval Yes 5
How often, in minutes, to check for new events. Enter 0 to disable. startup_interval No 30
How long, in minutes, to check for previous events at startup. Maximum is 60. type_filter No malware, phish, spam, impostor, all
Filter used to determine which comma-separated list of types of events to import into the Resilient platform. score_threshold No 50
Classification for the type of event to import based on the respective threat score. threat_template No Jinja template to override default threat description format. forensics_template No Jinja template to override default forensic format. cafile No cafile=~/.resilient/tap/cert.cer
Certificate file if required by Proofpoint. http_proxy No http://proxyhost:8080
Only required if using a proxy server. https_proxy No https://proxyhost:8080
Only required if using a proxy server. -
Save and Close the app.config file.
-
[Optional]: Run selftest to test the Integration you configured:
$ resilient-circuits selftest -l fn-proofpoint-tap
-
Run resilient-circuits or restart the Service on Windows/Linux:
$ resilient-circuits run
-
To use the functions, the Resilient playbook designer needs to create a new Incident tab containing the Proofpoint TAP Campaign Object Details Data Table. The examples in the User Guide assume that the incident tab is named Proofpoint TAP.
-
There are two custom incident fields Proofpoint Campaign ID and Proofpoint Threat ID that you can place on a desired layout. These two fields are automatically populated by the Proofpoint TAP poller.
- SSH into your Integration Server.
- Uninstall the package:
$ pip uninstall fn-proofpoint-tap
- Open the config file, scroll to the [fn_proofpoint_tap] section and remove the section or prefix
#
to comment out the section. - Save and Close the app.config file.
There are several ways to verify the successful operation of a function.
- When viewing an incident, use the Actions menu to view Action Status. By default, pending and errors are displayed.
- Modify the filter for actions to also show Completed actions.
- Click on an action to display additional information on the progress made or what error occurred.
A separate log file is available to review scripting errors. This is useful when issues occur in the pre-processing or post-processing scripts.
The default location for this log file is: /var/log/resilient-scripting/resilient-scripting.log
.
By default, Resilient logs are retained at /usr/share/co3/logs
.
The client.log
may contain additional information regarding the execution of functions.
- The log is controlled in the .resilient/app.config file under the section [resilient] and the property
logdir
. - The default file name is app.log.
- Each function creates progress information.
- Failures show up as errors and may contain python trace statements.
If you receive a timeout error from the Proofpoint TAP endpoint while making a request, you can increase the default timeout value in the app.config file by adding this section.
[integrations]
timeout=60
Name | Version | Author | Support URL |
---|---|---|---|
fn_proofpoint_tap | 1.0.0 | IBM Resilient | https://success.resilientsystems.com/ |