Skip to main content

Proofpoint

Pull

Synopsis

Creates a WebSocket consumer that connects to Proofpoint's Targeted Attack Protection (TAP) log stream service and receives security event data. Supports both message and maillog data types with secure token authentication.

Schema

- id: <numeric>
name: <string>
description: <string>
type: proofpoint
tags: <string[]>
pipelines: <pipeline[]>
status: <boolean>
properties:
endpoint: <string>
cluster: <string>
token: <string>
type: <string>
secure: <boolean>
workers: <numeric>
reuse: <boolean>

Configuration

The following fields are used to define the device:

Device

FieldRequiredDefaultDescription
idYUnique numeric identifier
nameYDevice name
descriptionN-Optional description
typeYMust be proofpoint
tagsN-Array of labels for categorization
pipelinesN-Array of preprocessing pipeline references
statusNtrueEnable/disable the device

Connection

FieldRequiredDefaultDescription
endpointY"wss://logstream.proofpoint.com:443/v1/stream"Proofpoint WebSocket endpoint URL
clusterYProofpoint cluster identifier
tokenYAuthentication token for Proofpoint API
typeY"message"Data type to consume (message or maillog)
secureNfalseEnable token encryption in configuration

Performance

FieldRequiredDefaultDescription
workersN1Number of worker processes
reuseNtrueEnable multi-worker mode

Details

WebSocket Connection

The device establishes a persistent WebSocket connection to Proofpoint's TAP log stream service. The connection URL includes query parameters for cluster ID and data type. Bearer token authentication is used in the Authorization header.

Data Types

Proofpoint supports two log data types:

  • message: Security event messages including threats detected, clicks permitted/blocked, and message disposition
  • maillog: Mail flow logs including message routing and delivery information

Token Security

When secure is set to true, the token is encrypted in the YAML configuration using the service shared key. The token is decrypted at runtime before authentication. This prevents token exposure in configuration files.

Performance Tuning

The reuse field enables multi-worker mode for processing messages concurrently. When enabled, the specified number of workers processes consume data in parallel, improving throughput for high-volume log streams.

Connection Management

The device handles WebSocket connection lifecycle including automatic reconnection on failure. Query parameters are encoded in the connection URL including cluster ID (cid) and data type (type).

Examples

The following are commonly used configuration types.

Basic Configuration

The minimum required configuration creates the consumer:

Creating a basic Proofpoint consumer for security messages...

devices:
- id: 1
name: proofpoint-tap
type: proofpoint
properties:
cluster: "your-cluster-id"
token: "your-api-token"
type: "message"

Device receives Proofpoint threat events in real-time...

{
"GUID": "abc123",
"threatType": "url",
"classification": "malware",
"threatUrl": "http://malicious.example.com"
}

Secure Token Storage

Token encryption prevents credential exposure:

Configuring encrypted token storage...

devices:
- id: 2
name: proofpoint-secure
type: proofpoint
properties:
cluster: "your-cluster-id"
token: "encrypted-token-string"
type: "message"
secure: true

Token is decrypted at runtime using service shared key...

note

The token must be encrypted using the service shared key before setting secure: true.

Maillog Collection

Mail flow logs can be consumed:

Collecting mail routing and delivery logs...

devices:
- id: 3
name: proofpoint-maillog
type: proofpoint
properties:
cluster: "your-cluster-id"
token: "your-api-token"
type: "maillog"

Device receives mail flow events including routing decisions...

{
"ts": "2025-01-02T10:30:00Z",
"sender": "[email protected]",
"recipient": "[email protected]",
"action": "delivered"
}

High-Volume Processing

Performance can be optimized for high message rates:

Enabling multi-worker processing for throughput...

devices:
- id: 4
name: proofpoint-highvolume
type: proofpoint
properties:
cluster: "your-cluster-id"
token: "your-api-token"
type: "message"
reuse: true
workers: 4

Four worker processes consume messages in parallel...

Custom Endpoint

Alternative Proofpoint endpoints can be configured:

Connecting to a regional or custom endpoint...

devices:
- id: 5
name: proofpoint-custom
type: proofpoint
properties:
endpoint: "wss://logstream-eu.proofpoint.com:443/v1/stream"
cluster: "eu-cluster-id"
token: "your-api-token"
type: "message"

Device connects to the specified regional endpoint...

Pipeline Processing

Threat events can be preprocessed:

Applying custom processing to threat events...

devices:
- id: 6
name: proofpoint-pipeline
type: proofpoint
pipelines:
- threat_enrichment
- geo_lookup
properties:
cluster: "your-cluster-id"
token: "your-api-token"
type: "message"

Pipelines enrich threat data before routing to targets...

note

Pipelines are processed sequentially and can modify or drop events before ingestion.