Configuration mappings for Proofpoint Essentials

This page includes:

About configuration mappings for Proofpoint Essentials

You can use the configuration mappings in the table below to migrate your configuration from Proofpoint Essentials to FortiMail Workspace Security.

Configuration mappings

 

Setting description

Setting location in FortiMail Workspace Security

Setting location in Proofpoint Essentials

Migration steps

 

Do not scan emails from listed IPs

Detection Setup > Allowlists & Blocklists > Sender IP Allowlist

Company Settings > Sender Lists

Copy all Exempted IPs from Proofpoint to FortiMail Workspace Security.

 

Mark emails, from the listed IPs, as malicious

Detection Setup > Allowlists & Blocklists > Sender IP Blocklist

Company Settings > Sender Lists

N/A

 

Do not scan emails from listed sender email addresses (exact or domain)

Detection Setup > Allowlists & Blocklists > Sender Email Address Allowlist

Company Settings > Sender Lists

Copy all Exempted email addresses and domains from Proofpoint to FortiMail Workspace Security.

 

Mark emails, from listed sender email addresses, as malicious (exact or domain)

Detection Setup > Allowlists & Blocklists > Sender Email Address Blocklist

Company Settings > Sender Lists

Copy all email addresses and domains that are marked as Block or Quarantine, in Proofpoint , to FortiMail Workspace Security.

 

Do not scan emails to listed recipient email addresses

Detection Setup > Allowlists & Blocklists > Recipient Email Address Allowlist

Company Settings > Filters

Copy all Exempted users email addresses from Proofpoint to FortiMail Workspace Security.

 

Do not scan listed URLs (exact or domain)

Detection Setup > Allowlists & Blocklists > URL Allowlist

Company Settings > URL Defense

Copy all Ignored URLs from Proofpoint to FortiMail Workspace Security.

 

Mark emails with listed URLs as malicious (exact or domain)

Detection Setup > Allowlists & Blocklists > URL Blocklist

N/A

N/A

 

List of private email addresses of users that are more prone to impersonation attacks

Detection Setup > VIP users

N/A

N/A