Proofpoint ITM and Endpoint DLP
The following sections describe how to set up and use the Proofpoint ITM and Endpoint DLP solutions. Here are some of the features:
-
Account Settings Configuration: Describes how to set up your account and account identity provider.
-
ITM / Endpoint DLP Rules: Describes how to create and use rules which used to trigger actions such as alerts.
-
Conditions: Describes how to create and use conditions and apply them to rules.
-
Alerts: Describes how to set up alerts that you can use to monitor user activity.
-
Explorations: Describes explorations that let you search the data and filter it to view what you want.
-
Threat Library: Provides a library of common scenarios of user activity you may want to monitor.
-
Notification Policies: Describes how to set up and send notifications to users so they are aware of when an alert occurred.
-
Classification Accounts (MIP Labels for ITM / Endpoint DLP): Describes how to use classification label. Currently supported for Microsoft Information Protection Unified Labeling.
-
Content Scanning: Describes content scanning that scans files and detect when users are attempting to exfiltrate sensitive information.
For Proofpoint Data Security & Posture administration, see Platform Administration.