Users Catalog

Users Catalog is a centralized user identity service that interfaces with directory services and provides enriched user information. Users Catalog consolidates user information from different sources and creates a single, unified identity for a user.

  • Users: Provides a list of users and risk information. From here, you can explore and filter users by their directory attributes, such as title, manager, location, users' groups, and risk levels and risk profiles.

  • Users Data: Provides details and insights about users.

  • Agent Integration with Users (Identity) Catalog: (For ITM / Endpoint DLP users) When the Agent is integrated with Users Catalog (Identity Catalog), the Agent receives the consolidated user information and uses it with detection and prevention rules.

  • ITD User Insights: Provides valuable context about the vulnerability of identities/users. This allows analysts to be proactive in blocking threats before the vulnerabilities can be leveraged for privilege escalation and lateral movement.

Users Catalog Information Sources

Depending on your entitlements, the information can be collected from the following sources:

  • Microsoft Entra ID (Microsoft Azure)

  • Google GSuite

  • OKTA Directory

Users and Groups are updated every 12 hours

Group Membership, Risk Profiles Memberships, Risk Scores are updated every 24 hours.

Information Collection

Information is collected via API ingestion or Cloud Connectors.

CASB customers do not have to create a Cloud Connector or Cloud Connector Data Realm. See Connected Apps.

Collection via Cloud Connector

Cloud Connectors are accessed from the Administration app. (AdministrationIntegrationsCloud Connector) Apps.

If you want to add a Cloud Connector, you create it as a Data Realm. (AdministrationIntegrationsData Realm.Select Feed TypeConnector.) Select Connector as the Field Type

Creating A Cloud Connector

Cloud Connectors are created from the Data Realm Administration application. It takes several minutes for the Data realm to activate.

You can review the status of the Cloud Connector, from the Data Realms view. Status can be Active, Deleted, Error or Pending.

  1. Select IntegrationsData Realm.

  2. Click New Realm and select Connector as the Field Type.

  3. In the Alias field, provide a name for the connector.

  4. In the Resource Group field, select the relevant group.

  5. In the Feed Type field, select Connector.

  6. Click Save.

Connecting Cloud Connector to the Application

When the Cloud Connector is active, you can connect to the Service you want.

  1. From  Integrations, select Cloud Connector) Apps.

  2. From the upper right of the screen, select the filter you want.

  3. Click Add Application. The Application screen displays. Applications are available for your selection depending on your entitlements. Currently Microsoft 365 is available.

  4. Click Select Application.

  5. In the Choose Application tab, select the applications you want.

  6. In the Configuration tab, select the Connection Type as Identity Only.

  7. Click Connect.

    You are redirected to the relevant application.

For Office 365

Prerequisites:

Create a Global Administrator or Privileged Role Administrator user.

  1. Sign in with the dedicated admin account.

  2. When prompted, accept the scope requirements.

  3. You are returned to the Proofpoint console and a confirmation message appears.

  4. You are now integrated with Microsoft 365

Collection via API Ingestion

For details about the API, see Proofpoint Developer Portal in Proofpoint Data Security & Posture. (DeveloperLibraryIdentity Catalog API).

The following are supported:

  • PUT /interfaces/scim/identities: Add and update user information

  • POST/ interfaces/scim/groups: Create a group

  • PATCH /interfaces/scim/groups/(jd): Add or update members in an existing group

You must assign the Identity Catalog Scim Feed Access to your application.

  1. In the Proofpoint Developer Portal, select DeveloperAuthorizationCredentials.

  2. Click the Edit Policies icon next to the relevant application.

  3. From the Filter by Policies panel, select Identity Catalog Scim Feed Access from Granular Access policies. Click Done.

Examples of Source and Attributes Collected

The table describes some of the user identification attributes collected by each source. In addition other attributes are collected from the sources.

Source

Attribute

Example

Connectors (O365, GSuite etc..)

email

carol.brown@3z3340.onmicrosoft.com

securityIdentifier

S-1-12-1-1696632856-1305359795-3721942948-2746764945

Endpoint

email

carol.brown@3z3340.onmicrosoft.com

Security Identifier

S-1-12-1-1696632856-1305359795-3721942948-2746764945

SCIM (API)

email (primary and secondary)

carol.brown@3z3340.onmicrosoft.com