Integrate Proofpoint Cloud Threat Response with Google SecOps
Integration version: 1.0
This document explains how to integrate Proofpoint Cloud Threat Response with Google Security Operations.
Use cases
The Proofpoint Cloud Threat Response integration addresses the following security operations use cases:
Automated incident ingestion: Automatically pull incidents and associated email messages from Proofpoint into Google SecOps to reduce manual monitoring and speed up triage.
Prioritized threat response: Filter ingested alerts based on specific severity and confidence thresholds to ensure analysts focus on high-impact threats first.
Granular verdict analysis: Streamline workflows by filtering incidents based on Proofpoint verdicts (such as Threat or Manual Review) and dispositions (such as Malware or Phish).
Custom environment mapping: Dynamically assign ingested alerts to specific environments using field mapping and regular expression patterns, ensuring proper data segregation and multi-tenancy support.
Before you begin
Before you configure the integration in the Google SecOps platform, verify that you have the following:
Proofpoint API credentials: A valid Client ID and Client Secret generated from your Proofpoint Threat Response account. These credentials are required for the integration to authenticate and generate a Bearer token.
API root URL: The specific endpoint for your Proofpoint Cloud Threat Response instance (the default is
https://threatprotection-api.proofpoint.com).Network access: Ensure that the Google SecOps platform can communicate with the Proofpoint API endpoints over port 443. If your organization uses a proxy, have the proxy server address and credentials available.
Integration parameters
The Proofpoint Cloud Threat Response integration requires the following parameters:
| Parameter | Description |
|---|---|
API Root |
Required. The API Root URL of the Proofpoint Cloud Threat Response instance. The default value is
|
Client ID |
Required. The Client ID used to authenticate with the Proofpoint Cloud Threat Response instance. |
Client Secret |
Required. The Client Secret used to authenticate with the Proofpoint Cloud Threat Response instance. |
Verify SSL |
Required. If selected, the integration validates the SSL certificate when connecting to the Proofpoint Cloud Threat Response server. Enabled by default. |
For instructions about how to configure an integration in Google SecOps, see Configure integrations.
You can make changes at a later stage, if needed. After you configure an integration instance, you can use it in playbooks. For more information about how to configure and support multiple instances, see Supporting multiple instances.
Actions
For more information about actions, see Respond to pending actions from Your Workdesk and Perform a manual action.
Ping
Use the Ping action to test the connectivity to Proofpoint Cloud Threat Response.
This action doesn't run on Google SecOps entities.
Action inputs
None.
Action outputs
The Ping action provides the following outputs:
| Action output type | Availability |
|---|---|
| Case wall attachment | Not available |
| Case wall link | Not available |
| Case wall table | Not available |
| Enrichment table | Not available |
| JSON result | Not available |
| Output messages | Available |
| Script result | Available |
Output messages
The Ping action can return the following output messages:
| Output message | Message description |
|---|---|
Successfully connected to the Proofpoint Cloud Threat Response
server with the provided connection parameters! |
The action succeeded. |
Failed to connect to the Proofpoint Cloud Threat Response
server! Error is ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Ping action:
| Script result name | Value |
|---|---|
is_success |
true or false |
Connectors
For more information about how to configure connectors in Google SecOps, see Ingest your data (connectors).
Proofpoint Cloud Threat Response - Incidents Connector
Use the Proofpoint Cloud Threat Response - Incidents Connector to retrieve incidents and related message data from Proofpoint Cloud Threat Response and ingest them as alerts into Google SecOps.
Connector inputs
The Proofpoint Cloud Threat Response - Incidents Connector requires the following parameters:
| Parameter | Description |
|---|---|
Product Field Name |
Required. The name of the field where the product name is stored. The product name primarily impacts mapping. To streamline and improve the mapping process for the connector, the default value resolves to a fallback value that is referenced from the code. Any invalid input for this parameter resolves to a fallback value by default. The default value is |
Event Field Name |
Required. The name of the field that determines the event name or subtype. The default value is |
Environment Field Name |
Optional. The name of the field that determines the event name (subtype). The default value is |
Environment Regex Pattern |
Optional. A regular expression pattern to extract or manipulate the environment
value from The default value is |
Script Timeout (Seconds) |
Required. The timeout limit, in seconds, for the Python process that runs the current script. The default value is |
API Root |
Required. The API root URL of the Proofpoint Cloud Threat Response instance. The default value is
|
Client ID |
Required. The Client ID used to authenticate with the Proofpoint Cloud Threat Response instance. |
Client Secret |
Required. The Client Secret used to authenticate with the Proofpoint Cloud Threat Response instance. |
Lowest Severity To Fetch |
Optional. The lowest severity level of incidents to retrieve. For example,
selecting The possible values are as follows:
|
Status Filter |
Optional. A comma-separated list of incident statuses to include in the ingestion. The possible values are The default value is |
Lowest Confidence To Fetch |
Optional. The lowest confidence level of incidents to retrieve. For example,
selecting The possible values are as follows:
|
Disposition Filter |
Optional. A comma-separated list of dispositions to include (for example,
|
Verdict Filter |
Optional. A comma-separated list of verdicts to include in the ingestion. The possible values are |
Max Hours Backwards |
Required. The number of hours prior to the current time to search for incidents during the first iteration or if the timestamp expires. The default value is |
Max Incidents To Fetch |
Required. The maximum number of incidents to process in every connector iteration. The maximum value is The default value is |
Use dynamic list as a blocklist |
Required. If selected, the connector uses the dynamic list (based on Source values) as a blocklist to exclude specific incidents. Disabled by default. |
Disable Overflow |
Optional. If selected, the connector ignores the Google SecOps overflow mechanism. Disabled by default. |
Verify SSL |
Required. If selected, the integration validates the SSL certificate when connecting to the Proofpoint Cloud Threat Response server. Disabled by default. |
Proxy Server Address |
Optional. The address of the proxy server to use. |
Proxy Username |
Optional. The proxy username to authenticate with. |
Proxy Password |
Optional. The proxy password to authenticate with. |
Need more help? Get answers from Community members and Google SecOps professionals.