You do not have the permissions required to view this article, or the article does not exist.
Knowledgebase
   


Why do I keep getting a 554 5.7.1: Relay access denied [http://support.proofpointessentials.com/index.php?/Knowledgebase/Article/View/242/0/error-codes]? Proofpoint Essentials is a closed relay system. This means that all mail going through the Essentia...
This can be down to a number of factors, please check the items below and if the connection is still not successful log a support ticket and an archive engineer will assist. * Firewall issue. Make sure your firewall is setup to accept connections on po...
This can occur if you have a Throttling Policy set on you IMAP journal account. To check if it is enabled you can turn on IMAP logging as per the Microsoft KB here: https://technet.microsoft.com/en-us/library/aa997690(v=exchg.150).aspx [https://technet.mi...
**PLEASE NOTE: THESE STEPS HAVE BEEN UPDATED BASED FOR THE CURRENT VERSION OF AZURE** Customers hosted on Office 365 may prefer to use Azure Active Directory to sync users and groups to Proofpoint Essentials. This will allow you to import: • Active us...
BOUNCES AND DEFERRALS TROUBLESHOOTING: DELIVERED: Messages that are sent through Proofpoint Essentials platform and are delivered. QUARANTINED: Message that are quarantined by one of the filters on the platform. * These messages can be released fr...
Building and Sending Reports in Proofpoint Essentials * To build a report Select REPORTS * On the Left Report Panel SELECT THE REPORT you want to view. * There CONFIGURE the report with data points you want to view. * On the Right hand side ...
The following information details the CA TLS for Proofpoint Essentials outbound email: COMMON NAME: *.proofpointessentials.com SANS: *.proofpointessentials.com, proofpointessentials.com ORGANIZATION: Proofpoint, Inc. LOCATION: Sunnyvale, Californi...
  When moving from one filtering service to another, or setting up for the first time, there are steps to include when setting up Proofpoint Essentials that may be forgotten outside of our standard steps. Remember to add in our IP ranges [http://suppo...
CHECK WHEN USER DIGEST LAST RAN These are the steps to see when the user's digest last ran * Log into your user portal, i.e US1 or EU1. * If you are a partner, look through your customer list by searching. * Once the domain is located, go to t...
Office 365 uses Remote Journaling (SMTP Journaling).  This guide will go over the full configuration for both Proofpoint Essentials and Office 365. PROOFPOINT ESSENTIALS ARCHIVE CONFIGURATION * Click on the Archive tab.  If only the current Archive ...
CUSTOMER LIST INFORMATION For Reseller accounts, a list of customers is found in the Customer tab. You can navigate to the appropriate customer here. However, you can get more detailed information of accounts as well, expanding the table to include the i...
This article is to help creating DMARC settings so you can implement DMARC on any of your domain names. If you are unsure on how to implement DMARC, we do have a tool available to customers here: DMARC record creation [https://stopemailfraud.proofpoint....
This article is for Emergency Inbox usage. This tells you how to access and set-up spooling alerts. The Proofpoint Essentials service will continue to try and check the customer's mail server, as per the standard set-up. As we are unable to relay the em...
COMMON ERROR CODES DELIVERY SUMMARY: Any time you see, “_This message was rejected by its destination for reasons outside the control of Proofpoint Essentials, and got returned to the sender_”, this literally means that this is outside our control, and ...
When releasing an email from quarantine digest I am presented with the following error: 'User does not exist or is invalid' To resolve this please generate a new digest from the User Interface or wait until a new digest is delivered. Once a new digest...
ERROR WITH OPENING ENCRYPTED EMAILS & ATTACHMENTS  OPENING AN ENCRYPTED EMAIL: When logging into the Encryption Portal to view a received encrypted email, sometimes users may see the following error: "Warning You are trying to access a message tha...
TICKET CREATION For these processes, we highly recommend providing the details directly in our ticketing system by attachments. Please make sure when submitting, follow these ticketing processes: Creating a ticket Updating a ticket FALSE POSITIVE (F...
The Proofpoint Essentials system has been changed in May 2015, the most notable change is the addition of Sender Lists [1] rather than the traditional adding an allow/block to the filters. The below is a listing of the End-User Sender Lists - Block ...
Please review the provided PDF for configuring the updated Proofpoint Essentials Archiving product.  This document covers both local Exchange with SMTP Journaling and IMAP, and Office 365 with SMTP Journaling.  The following links will go over each conf...
Remember to enter/edit Page Settings (Summary text, Stage classification, tags) and Page Restrictions as required. OVERVIEW Google may route "internal" mail externally causing an issue with Proofpoint Essential's spoof protection. There are two opt...
DIFFERENCE BETWEEN GROUPS AND FUNCTIONAL ACCOUNTS Under the tab : ‘USERS & GROUPS’ within ProofPoint Essentials there are a couple of sub-tabs mainly Users , Groups , Functional Accounts etc. 'GROUPS WITHIN PROOFPOINT ESSENTIALS' GROUPS : These grou...
Channel Admins and Organization Admins can change the contents of the default Proofpoint Essentials notifications emails as they would desire to be. These notifications emails are user's "WELCOME", "PASSWORD RESET" and "DIGESt". CHANNEL ADMINS: ...
ENABLE ACTIVE DIRECTORY SYNC If you have Active Directory located on your premises, you can use Proofpoint Essentials Active Directory Sync option to add and automatically sync user accounts and groups between environments. Before you begin, you ...
_INBOUND / OUTBOUND UI STATS FOR USERS_ _HOW TO ACCESS:_ _Go to Users & Groups, here you will see you users displayed by Name/Email Address and following their Role/Aliases and Inbound/Outbound stats. _ _If it is a user your wishing to check their s...
To convert a User account to a Functional account: * Go to Users & Groups * From the 'Select' drop-down choose the 'Mass Update' option * Check the box to the left of the User accounts you wish to convert to Functional accounts * From the Role o...
This article explains what to do when AD sync within ProofPoint Essentials is unable to fetch hidden items from Active Directory even with the option : ‘Include items hidden from GAL’  (Active Directory tab -> What to sync) checked. Parameter on the AD ...
PERMALINK: (This link helps support to quickly navigate to the email you have a question about. GENERAL DESCRIPTION: * Envelop Sender: Where the message originated from. * From Header: Where the message said it was from. * Subject: Subject of th...
ISSUE: Receiving a bounce error or see in your logs: "IP Address is an open relay." NOTE: This issue confirms that your set-up for outbound relay is configured properly through the Proofpoint Essentials smarthost, otherwise you would not be seeing this ...
The following steps should be taken to route email from Proofpoint Essentials to Office 365 CONFIGURE PROOFPOINT ESSENTIALS Locate your MX record for your domain in Office 365 1. Log in to the _OFFICE 365 EXCHANGE ADMIN CENTER (EAC)_ __2. Click on...
The following steps should be taken to route email outbound from Office 365 to Proofpoint Essentials CONFIGURE OUTBOUND RELAYING PROOFPOINT ESSENTIALS The following steps should be taken to route email outbound from Office 365 to Proofpoint Essentials ...
How do I retrieve internet headers from an email message? The following steps below explain how to provide the Support Team with email headers MICROSOFT OUTLOOK 2010 AND 2013 1.    DOUBLE CLICK the message to open it in a new window 2.    Click File ...
Proofpoint Essentials now offers protection against impostor email threats (also known as spoofing), business email compromise or CEO fraud. Suspected imposter emails are identified as inbound messages from the internet where the "from" domain is one o...
If your IP is listed on SORBS, please follow the steps below to address your IP listing. The process to de-list your IP from SORBS is found on their SUPPORT PAGE [HTTP://WWW.US.SORBS.NET/CONTACT/SUPPORTREQ.SHTML]. NOTE: One thing to note is that you n...
As of the release for May 2015, we no longer require individual or large filters for a safe or blocked sender. A new tab under Company Settings has been made named "SENDER LISTS." An individual list exists for Blocked or Safe senders. MANUAL ADDING T...
Another way to provision users to the service is with SMTP Discovery. When enabled, SMTP Discovery allows email to be relayed to non-licensed users. Users become licensed-users when manually added within a span of 30 days, a specified number of valid mess...
As part of the Proofpoint Essentials spam scanning, the senders SPF record can contribute to the overall spam score of the message. Proofpoint Essentials does not block an email outright for SPF entry. This is because there are a large number of domain...
When I receive an email to my Office 365 account this email has failed SPF checking by Office 365 e.g. Authentication-Results: spf=fail (sender IP is xx.xxx.xx.xx) When routing mail through an Email Security service such as Proofpoint Essentials, the ...
_UI LOGS SAY “DELIVERED” BUT EMAIL IS NOT IN MY INBOX _ _ _ _When looking in your Proofpoint Essential Logs, and you see an email that has a STATUS of “Delivered” but it is not in your inbox. There are a few things to check:_ _ _ _1 – Click on the...
Messages processed through Proofpoint Essentials go through various stages in a particular order which is outlined below for both inbound and outbound. INBOUND MAIL FLOW: * PDR - Proofpoint Dynamic Reputation [http://support.proofpointessentials.com...
The Access Control page is used to limit the permissions of a system role that is assigned to a user who has rights to access Proofpoint Essentials. There are 5 roles available to Proofpoint Essentials users and they operate with the following permission ...
If you create a filter with this option, then it will come into effect when the engine module responsible for decomposing an email into parts does not know what an attachment is supposed to be. This can happen when the MIME part doesn't have a filename...
The permissions of the user are written to the archive configuration the first time they access the Archive tab based on their role in the Proofpoint Essentials interface. If the user was to first login to the archive as an End User and then later c...
Proofpoint Essentials Filters will allow you to search for word(s) within parts of the message, including the Email Subject, Email Headers, Email Message Contents, and the entire Raw Email (up to 10,000 lines.)  The Raw Email option will be reviewing all ...
Most Popular