<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How do I get Proofpoint Targeted Attack Protection logs ingested into Splunk? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-get-Proofpoint-Targeted-Attack-Protection-logs-ingested/m-p/422190#M94054</link>
    <description>&lt;P&gt;After configuring pps and receiving data:&lt;/P&gt;

&lt;P&gt;Data input -&amp;gt; Proofpoint TAP SIEM Modular Input&lt;BR /&gt;
Name, Principal,Secret,&lt;BR /&gt;
Siem url host=tap-api-v2.proofpoint.com&lt;BR /&gt;
Sourcetype=proofpoint_tap_siem&lt;BR /&gt;
index (we were limited in choices for some reason, which caused us to update the macro set up in pps config)&lt;/P&gt;</description>
    <pubDate>Wed, 30 Sep 2020 01:05:32 GMT</pubDate>
    <dc:creator>kpkeimig</dc:creator>
    <dc:date>2020-09-30T01:05:32Z</dc:date>
    <item>
      <title>How do I get Proofpoint Targeted Attack Protection logs ingested into Splunk?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-get-Proofpoint-Targeted-Attack-Protection-logs-ingested/m-p/422187#M94051</link>
      <description>&lt;P&gt;Hi , &lt;/P&gt;

&lt;P&gt;I have my Proofpoint servers over my side. &lt;/P&gt;

&lt;P&gt;I want the logs to be ingested into Splunk. How can i proceed ?&lt;/P&gt;</description>
      <pubDate>Wed, 10 Oct 2018 14:01:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-get-Proofpoint-Targeted-Attack-Protection-logs-ingested/m-p/422187#M94051</guid>
      <dc:creator>Abhirup89</dc:creator>
      <dc:date>2018-10-10T14:01:00Z</dc:date>
    </item>
    <item>
      <title>Re: How do I get Proofpoint Targeted Attack Protection logs ingested into Splunk?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-get-Proofpoint-Targeted-Attack-Protection-logs-ingested/m-p/422188#M94052</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;

&lt;P&gt;If you are thinking about ingesting Proofpoint TAP logs into Splunk, then it may be possible.&lt;/P&gt;

&lt;P&gt;You can use Proofpoint modular inputs over there.&lt;/P&gt;

&lt;P&gt;Here is the link for the Proofpoint TAP Add-on: &lt;A href="https://splunkbase.splunk.com/app/3681/"&gt;https://splunkbase.splunk.com/app/3681/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;You need principal and secret for API call&lt;/P&gt;

&lt;P&gt;Example Commands In Curl&lt;BR /&gt;
The following commands assume that principal and secret are defined environment variables. They correspond to the service principal and secret that was created on the Settings page.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;curl "https://tap-api-v2.proofpoint.com/v2/siem/issues?format=json&amp;amp;sinceTime=2016-05-01T12:00:00Z" --user "$PRINCIPAL:$SECRET" -s
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Retrieves events from noon on 05/01/2016 to the present. Returned events are limited to just permitted clicks and delivered attachment threats. Output is in the JSON format.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;curl "https://tap-api-v2.proofpoint.com/v2/siem/all?format=syslog&amp;amp;sinceSeconds=3600" --user "$PRINCIPAL:$SECRET" -s
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Retrieves events to the present, starting 3600 seconds before the query time. All events are returned. Output is in the syslog Format.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;curl "https://tap-api-v2.proofpoint.com/v2/siem/clicks/permitted?format=syslog&amp;amp;interval=PT30M/2016-05-01T12:30:00Z" --user "$PRINCIPAL:$SECRET" -s
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Retrieves events from the thirty minutes beginning at noon UTC on 05-01-2016 and ending at 12:30pm UTC. Only permitted clicks are returned. Output is in the syslog format.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;curl "https://tap-api-v2.proofpoint.com/v2/siem/all?format=json&amp;amp;interval=PT30M/2016-05-01T12:30:00Z&amp;amp;threatStatus=falsePositive&amp;amp;threatStatus=active&amp;amp;threatStatus=cleared" --user "$PRINCIPAL:$SECRET" -s
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Retrieves events from the thirty minutes beginning at noon UTC on 05-01-2016 and ending at 12:30pm UTC. All events are returned. False positives are included in the output. Output is in the JSON format.&lt;/P&gt;

&lt;P&gt;For more help , you can visit &lt;A href="https://help.proofpoint.com/Threat_Insight_Dashboard/API_Documentation/SIEM_API"&gt;https://help.proofpoint.com/Threat_Insight_Dashboard/API_Documentation/SIEM_API&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Oct 2018 15:31:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-get-Proofpoint-Targeted-Attack-Protection-logs-ingested/m-p/422188#M94052</guid>
      <dc:creator>iamarkaprabha</dc:creator>
      <dc:date>2018-10-10T15:31:30Z</dc:date>
    </item>
    <item>
      <title>Re: How do I get Proofpoint Targeted Attack Protection logs ingested into Splunk?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-get-Proofpoint-Targeted-Attack-Protection-logs-ingested/m-p/422189#M94053</link>
      <description>&lt;P&gt;If you want the filter and MTA logs from your Protection server you will also want to add your Splunk server to the remote log server settings located in: Logs and Reports &amp;gt; Log Settings in Protection.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Oct 2018 19:43:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-get-Proofpoint-Targeted-Attack-Protection-logs-ingested/m-p/422189#M94053</guid>
      <dc:creator>eckolp2003</dc:creator>
      <dc:date>2018-10-30T19:43:12Z</dc:date>
    </item>
    <item>
      <title>Re: How do I get Proofpoint Targeted Attack Protection logs ingested into Splunk?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-get-Proofpoint-Targeted-Attack-Protection-logs-ingested/m-p/422190#M94054</link>
      <description>&lt;P&gt;After configuring pps and receiving data:&lt;/P&gt;

&lt;P&gt;Data input -&amp;gt; Proofpoint TAP SIEM Modular Input&lt;BR /&gt;
Name, Principal,Secret,&lt;BR /&gt;
Siem url host=tap-api-v2.proofpoint.com&lt;BR /&gt;
Sourcetype=proofpoint_tap_siem&lt;BR /&gt;
index (we were limited in choices for some reason, which caused us to update the macro set up in pps config)&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 01:05:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-get-Proofpoint-Targeted-Attack-Protection-logs-ingested/m-p/422190#M94054</guid>
      <dc:creator>kpkeimig</dc:creator>
      <dc:date>2020-09-30T01:05:32Z</dc:date>
    </item>
    <item>
      <title>Re: How do I get Proofpoint Targeted Attack Protection logs ingested into Splunk?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-get-Proofpoint-Targeted-Attack-Protection-logs-ingested/m-p/747461#M118770</link>
      <description>&lt;P&gt;Hi, how is this macro set up updated?&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2025 10:36:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-get-Proofpoint-Targeted-Attack-Protection-logs-ingested/m-p/747461#M118770</guid>
      <dc:creator>nerd</dc:creator>
      <dc:date>2025-06-04T10:36:09Z</dc:date>
    </item>
  </channel>
</rss>

