Configure Lumu Spambox for Proofpoint

Lumu Email Intelligence and Proofpoint

In this document, you will learn how to configure Proofpoint Enterprise policies to forward your emails to Lumu for compromise assessment. Lumu Email Intelligence is a unique threat analysis tool that runs advanced correlations between your spam, known indicators of compromise (IoCs), and network traffic.

Learn more about how Lumu Email Intelligence helps you understand who is targeting your organization, how they are doing it, and how successful they are in our documentation.

Requirements

  • You must have Proofpoint Enterprise admin permissions to access the Spam Detection Module.

Proofpoint Setup

1. Lumu assigns a unique email address to your organization. You can find the email address assigned to your organization by going to the Lumu Portal and navigating to Lumu Email under the Intelligence sub-menu. 


2. Sign in to Proofpoint using your admin account, and then navigate to Email Protection > Spam Detection > Policies > Rules. Select the Policy and under the Rules section, select the spam rule and click “Edit”.


3. Under the Disposition section, select the checkbox titled “Send a copy to destination”, then select the “Copy original message” checkbox and add the Lumu email address provided to your company during step 1 in the “New recipient(s)” field.

You can use the default SMTP profile or any other you may have created.


Repeat steps 2 and 3 for all the policies you want to have the emails forwarded to Lumu. We recommend forwarding to Lumu at least the emails filtered by Phishing, Malware, and Bulk Email policies.

For further details about the Spam Detection settings, consult the Proofpoint documentation

        • Related Articles

        • Lumu Email Intelligence and Office 365

          In this document, you will learn how to configure a policy in Microsoft Office 365 to forward your emails to Lumu for compromise assessment. Lumu Email Intelligence is a unique threat analysis tool that runs advanced correlations between your inbox, ...
        • Lumu Email Intelligence and Cisco Email Security

          In this document, you will learn how to configure a Cisco Email Security (CES) policy to forward spam emails to Lumu for compromise assessment. Lumu Email Intelligence is a unique threat analysis tool that runs advanced correlations between your ...
        • Lumu Email Intelligence and G Suite

          In this document, you will learn how to use the G Suite security investigation tool to generate a report on emails and send it to Lumu for compromise assessment. Lumu Email Intelligence is a unique threat analysis tool that runs advanced correlations ...
        • Deploy Lumu Agent using Group Policy (GPO)

          The installation of the Lumu Agent for Windows is simple and straightforward. This article describes how to deploy the Windows Agent quickly to your entire user population through Group Policy Objects (GPO) in a Windows Server. For getting started ...
        • Deploy Virtual Appliances

          To get started and review requirements for Lumu Virtual Appliances, consult our document Introduction to Virtual Appliances. Follow these simple steps to create and download a pre-configured Virtual Appliance and start illuminating threats and ...