Proofpoint ITM and Endpoint DLP

The following sections describe how to set up and use the Proofpoint ITM and Endpoint DLP solutions. Here are some of the features:

  • Account Settings Configuration: Describes how to set up your account and account identity provider.

  • ITM / Endpoint DLP Rules: Describes how to create and use rules which used to trigger actions such as alerts.

  • Conditions: Describes how to create and use conditions and apply them to rules.

  • Alerts: Describes how to set up alerts that you can use to monitor user activity.

  • Explorations: Describes explorations that let you search the data and filter it to view what you want.

  • Threat Library: Provides a library of common scenarios of user activity you may want to monitor.

  • Notification Policies: Describes how to set up and send notifications to users so they are aware of when an alert occurred.

  • Classification Accounts (MIP Labels for ITM / Endpoint DLP): Describes how to use classification label. Currently supported for Microsoft Information Protection Unified Labeling.

  • Content Scanning: Describes content scanning that scans files and detect when users are attempting to exfiltrate sensitive information.

For Proofpoint Data Security & Posture administration, see Platform Administration.