Configuration mappings for Proofpoint Essentials
This page includes:
About configuration mappings for Proofpoint Essentials
You can use the configuration mappings in the table below to migrate your configuration from Proofpoint Essentials to FortiMail Workspace Security.
Configuration mappings
|
|
Setting description |
Setting location in FortiMail Workspace Security |
Setting location in Proofpoint Essentials |
Migration steps |
|---|---|---|---|---|
|
|
Do not scan emails from listed IPs |
Detection Setup > Allowlists & Blocklists > Sender IP Allowlist |
Company Settings > Sender Lists |
Copy all Exempted IPs from Proofpoint to FortiMail Workspace Security. |
|
|
Mark emails, from the listed IPs, as malicious |
Detection Setup > Allowlists & Blocklists > Sender IP Blocklist |
Company Settings > Sender Lists |
N/A |
|
|
Do not scan emails from listed sender email addresses (exact or domain) |
Detection Setup > Allowlists & Blocklists > Sender Email Address Allowlist |
Company Settings > Sender Lists |
Copy all Exempted email addresses and domains from Proofpoint to FortiMail Workspace Security. |
|
|
Mark emails, from listed sender email addresses, as malicious (exact or domain) |
Detection Setup > Allowlists & Blocklists > Sender Email Address Blocklist |
Company Settings > Sender Lists |
Copy all email addresses and domains that are marked as Block or Quarantine, in Proofpoint , to FortiMail Workspace Security. |
|
|
Do not scan emails to listed recipient email addresses |
Detection Setup > Allowlists & Blocklists > Recipient Email Address Allowlist |
Company Settings > Filters |
Copy all Exempted users email addresses from Proofpoint to FortiMail Workspace Security. |
|
|
Do not scan listed URLs (exact or domain) |
Detection Setup > Allowlists & Blocklists > URL Allowlist |
Company Settings > URL Defense |
Copy all Ignored URLs from Proofpoint to FortiMail Workspace Security. |
|
|
Mark emails with listed URLs as malicious (exact or domain) |
Detection Setup > Allowlists & Blocklists > URL Blocklist |
N/A |
N/A |
|
|
List of private email addresses of users that are more prone to impersonation attacks |
Detection Setup > VIP users |
N/A |
N/A |
See also:
