Knowledgebase : FAQ's
       
A common method of securing LDAP communication is using an SSL tunnel . This is denoted in LDAP URLs by using the URL scheme "ldaps". The use of LDAP over SSL was common in LDAP Version 2 (LDAPv2) but it was never standardized in any formal specificati...
QUESTION: What is the difference between Spam and Opt-in Email? ANSWER: Customer-submitted messages help us to improve our spam models by providing us access to a wide variety of spam and valid mail data. Sometimes, customers are not certain wheth...
The bounceback is required to investigate the logs of the destination SMTP server. Problems of this nature are usually a poor quality SMTP server, a broken firewall or router in place between our servers and the destination server (dropping ICMP packet...
Proofpoint Essentials only processes email for domains and static IPs registered on our user interface. This is so we can safeguard against the security threat of being used as an open relay. As such auto-forwarding practices should be relayed using...
UPDATE YOUR PASSWORD 1. While logged into the user interface, navigate to Users \">SAVE. Your password is set. You must use this password the next time you log in to the user interface.
FREQUENTLY ASKED QUESTIONS (FAQ) Q. What packages is Data Loss Prevention included in?  * _ Data Loss Prevention is included in the Business, Advance and Professional package._  Q. How is Data Loss Prevention enabled?  * _Data Loss Prevention ca...
For additional questions, please see the DLP FAQ [1]. CREATING A FILTER THAT USES A DICTIONARY * Once logged in, click on the Filters tab. * Click on the Add New Filter button. * Select the direction of mail flow that the filter should be ap...
For additional questions, please see the DLP FAQ [http://support.proofpointessentials.com/index.php?/Knowledgebase/Article/View/173/34/dlp---data-loss-prevention-faqs]. CREATING A FILTER THAT USES A SMART IDENTIFIER * Once logged in, click on the Fi...
Proofpoint Essentials does filter outbound email for SPAM. If a message is not delivered it will be recorded in the Email Logs and can be released to the intended recipient. Please note that similar messages of this nature are likely to be quarantined ...
ENCRYPTING AN EMAIL SET-UP If you wish to make use of Proofpoint Encryption service you must be on Advanced package or above. This feature then needs to be enabled. To enable please go to: * Click on Features * Tick check box Enable Email Encr...
Once an account is completely setup on Proofpoint Essentials User Interface according to the getting started guide found, the partners/customers should wait until the top of the 30 minutes for the changes to update across Proofpoint Essentials Network ...
TICKET CREATION For these processes, we highly recommend providing the details directly in our ticketing system by attachments. Please make sure when submitting, follow these ticketing processes: Creating a ticket Updating a ticket FALSE POSITIVE (F...
Remember to enter/edit Page Settings (Summary text, Stage classification, tags) and Page Restrictions as required. OVERVIEW Google may route "internal" mail externally causing an issue with Proofpoint Essential's spoof protection. There are two opt...
OVERVIEW This page describes TLS behavior from a Proofpoint Sender and Recipient point of view. In both cases below, we do recommend that the filters created be for the recipient TLS OUTBOUND This is the Proofpoint sender's perspective. Most...
Only Partners or Direct Support customers are able to log into the support site to create a ticket. If you are a Partner or Direct Support customer and need an account please email a request to essentials-provisioning@proofpoint.com [1]. NOTE: If yo...
WHITELIST IP TO BYPASS REPUTATION If you wish to whitelist an IP in order to bypass Proofpoint's reputation service, you will need to submit a request through our SUPPORT SITE. Proofpoint support resources will then review requests and, if approved,...
WHITELIST IP TO BYPASS SPAM FILTERING If an email has been blocked by Proofpoint Essentials as a result of content we can ensure further delivery of these emails by whitelisting their IP address. _To whitelist an IP so that it is not blocked as a r...
If Proofpoint Essentials users are unable to receive email from certain email addresses, it is most likely an issue with the sending mail server. However there are a few possible areas where this may be a configuration issue on the Proofpoint Essential...
WEB FORM MESSAGES NOT RECEIVED We have frequent issues with web form messages not coming into the Proofpoint Essentials service. One of the key statements is: "This works to any other recipient, just not my domain name." We ask that you check ...
MASS UPDATE The mass update feature allows you to apply a change across all or a large set of users. For example, if you have loaded users as silent users you may want to change them to an end user to ensure they receive the quarantine digest and ca...
Proofpoint Essentials have implemented logic into our engines to help deal with the recent Dridex campaigns in which emails contain macro enabled attachments. This could cause some legitimate outbound emails to be marked and quarantined as spam. I...
Proofpoint has a block list service named: Proofpoint Dynamic Reputation, or PDR. Proofpoint Essentials utilizes PDR for inbound email. IPs listed on PDR will block a message prior to delivery to the account. IPs listed on Proofpoint's PDR may recei...
When an email cannot be delivered and is deferred for whatever reason, the platform will reattempt delivery of that email as below: - Immediately, after the first failed attempt, then - Once per minute for 5 minutes, then - Every 10 minutes fo...
ACCESSING LOGS AND REPORTING The email logs can assist in many ways. NOTE: Email logs are only there if the message got sent and processed by Proofpoint Essentials. REPORTING SPAM FROM USER EMAIL LOGS * Log into the interface URL for your ...
HOW TO REST YOUR PROOFPOINT ESSENTIALS LOGIN PASSWORD If you have lost or forgotten your Proofpoint Essentials user interface login password never fear! We've made it super easy to reset the password for your account. * Simply go to the Proofpoint...
The bulk message error is automatically generated by the system and it would not give a false alarm. The message count also includes the number of bounce backs that sender receives which we do not keep them in the logs. This may sound counter intuit...
As of the release for May 2015, we no longer require individual or large filters for a safe or blocked sender. A new tab under Company Settings has been made named "SENDER LISTS." An individual list exists for Blocked or Safe senders. MANUAL ADDING T...
Proofpoint Essentials is powered by Proofpoint's MLX machine learning technology. This solution examines and filters millions of possible spam attributes in every email including message envelope headers and structure, email images, email sender reputa...
HOW TO CONFIGURE PROOFPOINT ESSENTIALS SPAM STAMP FEATURE If this option is enabled, Proofpoint Essentials will still filter messages for spam. However, instead of moving suspected spam to the quarantine, a configurable text value (default: “***Spam***”...
VERIFY THE FOLLOWING: * THE OUTBOUND RELAY FEATURE IS ENABLED FOR THE COMPANY. 1. Log in to the Proofpoint Essentials user interface 2. Type the customer name into the search bar (top header) 3. Click on Company Settings 4. Click on Features 5. Check...
This article aims to give a brief guide on how to understand the information in the Proofpoint Essentials logs. Below are some common examples of the various states email logs can display on Proofpoint Essentials, and some explanations for the informat...
In order to update a ticket, you need to have created a ticket. If you have not done so, please make sure to follow the create a ticket KB [1]. REPLING TO A TICKET. * Go to the "View Tickets" link, either at the top, or from the home page. * Sel...
FREQUENTLY ASKED QUESTIONS (FAQ) NOTE:_ Updated 9/16/2015 with changes made in the August 2015 release_ Q. What packages is URL Defense included in? * _URL Defense is included in the Business, Advanced and Professional packages._ Q. How is ...