From proofpoint
Retrieves and analyzes Proofpoint TAP threat events, click tracking, message delivery/blocking data, SIEM feeds, and threat types including URL, attachment, and message threats.
npx claudepluginhub wyre-technology/msp-claude-plugins --plugin proofpointThis skill uses the workspace's default tool permissions.
Proofpoint TAP is the core threat detection engine in the Proofpoint email security stack. It analyzes email messages, URLs, and attachments in real time using sandboxing, behavioral analysis, and threat intelligence. The TAP SIEM API provides programmatic access to all threat events, click activity, and message disposition data.
Guides Next.js Cache Components and Partial Prerendering (PPR) with cacheComponents enabled. Implements 'use cache', cacheLife(), cacheTag(), revalidateTag(), static/dynamic optimization, and cache debugging.
Migrates code, prompts, and API calls from Claude Sonnet 4.0/4.5 or Opus 4.1 to Opus 4.5, updating model strings on Anthropic, AWS, GCP, Azure platforms.
Compresses source documents into lossless, LLM-optimized distillates preserving all facts and relationships. Use for 'distill documents' or 'create distillate' requests.
Proofpoint TAP is the core threat detection engine in the Proofpoint email security stack. It analyzes email messages, URLs, and attachments in real time using sandboxing, behavioral analysis, and threat intelligence. The TAP SIEM API provides programmatic access to all threat events, click activity, and message disposition data.
TAP identifies three primary threat vectors:
| Classification | Description | Typical Action |
|---|---|---|
malware | Known or sandboxed malware payload | Block and quarantine |
phish | Credential harvesting or phishing | Block and quarantine |
spam | Unsolicited bulk email | Quarantine or tag |
impostor | Business Email Compromise (BEC) | Quarantine or warn |
| Disposition | Description |
|---|---|
allowed | Message was delivered to the recipient |
blocked | Message was blocked before delivery |
quarantined | Message was placed in quarantine |
| Verdict | Description |
|---|---|
permitted | Click was allowed (URL was clean at time of click) |
blocked | Click was blocked (URL was malicious at time of click) |
TAP SIEM API supports relative and absolute time windows:
| Parameter | Format | Example | Max Window |
|---|---|---|---|
sinceSeconds | Integer (seconds) | 3600 (1 hour) | 86400 (24 hours) |
sinceTime | ISO 8601 | 2024-02-15T00:00:00Z | 24 hours from now |
interval | ISO 8601 duration | PT1H (1 hour) | 1 hour |
Important: The maximum lookback window is 24 hours. For historical data beyond 24 hours, use the forensics or campaign APIs instead.
| Field | Type | Description |
|---|---|---|
GUID | string | Unique message identifier |
QID | string | Queue ID from the mail server |
sender | string | Envelope sender address |
recipient | string[] | List of recipient addresses |
subject | string | Message subject line |
messageTime | datetime | When the message was processed |
threatsInfoMap | object[] | Array of threat details |
malwareScore | int | 0-100 malware confidence score |
phishScore | int | 0-100 phishing confidence score |
spamScore | int | 0-100 spam confidence score |
impostorScore | int | 0-100 impostor/BEC confidence score |
cluster | string | Proofpoint cluster that processed the message |
messageParts | object[] | Breakdown of message MIME parts |
completelyRewritten | boolean | Whether all URLs were rewritten by URL Defense |
policyRoutes | string[] | Policy rules that matched |
| Field | Type | Description |
|---|---|---|
threat | string | The threat indicator (URL, hash, etc.) |
threatID | string | Unique threat identifier |
threatStatus | string | active, cleared, falsePositive |
threatTime | datetime | When the threat was first identified |
threatType | string | url, attachment, messageText |
classification | string | malware, phish, spam, impostor |
threatUrl | string | URL to threat detail in TAP dashboard |
| Field | Type | Description |
|---|---|---|
campaignId | string | Associated campaign identifier |
clickIP | string | IP address of the clicker |
clickTime | datetime | When the click occurred |
GUID | string | Message GUID containing the URL |
recipient | string | Who clicked |
sender | string | Who sent the message |
threatID | string | Threat identifier for the URL |
threatTime | datetime | When URL was classified as threat |
threatURL | string | The malicious URL that was clicked |
url | string | The original URL before rewrite |
userAgent | string | Browser user agent of the clicker |
classification | string | malware, phish |
| Tool | Description | Key Parameters |
|---|---|---|
proofpoint_tap_get_all_events | Retrieve all TAP events (messages + clicks) | sinceSeconds, sinceTime, threatType, threatStatus |
proofpoint_tap_get_messages_blocked | Get messages blocked by TAP | sinceSeconds, sinceTime |
proofpoint_tap_get_messages_delivered | Get messages delivered despite threats | sinceSeconds, sinceTime |
proofpoint_tap_get_clicks_permitted | Get clicks that were permitted | sinceSeconds, sinceTime |
proofpoint_tap_get_clicks_blocked | Get clicks that were blocked | sinceSeconds, sinceTime |
proofpoint_tap_get_top_clickers | Get users who click most on threats | window (14, 30, 90 days) |
proofpoint_tap_get_all_events with sinceSeconds=3600proofpoint_tap_get_messages_blocked with sinceTime set to start of windowproofpoint_tap_get_messages_delivered with same time windowproofpoint_tap_get_messages_delivered with sinceSeconds=3600impostorScore > 50 in resultsproofpoint_tap_get_all_events with sinceSeconds=86400proofpoint_tap_get_clicks_permitted with relevant time windowrecipient, threatURL, and clickTimecampaignId to find related threats| Code | Message | Resolution |
|---|---|---|
| 400 | Invalid time range | Ensure sinceSeconds <= 86400 or sinceTime is within 24 hours |
| 400 | Invalid threatType | Use url, attachment, or messageText |
| 401 | Authentication failed | Verify service principal and secret |
| 403 | Insufficient permissions | Ensure TAP API access is enabled for your service principal |
| 404 | No data available | No events in the specified time window |
| 429 | Rate limit exceeded | Implement backoff; TAP API allows ~1000 requests/hour |
If no events are returned:
campaignId to connect individual events to broader threat campaignsthreatIDmessageParts for multi-vector attacks (URL + attachment)