It can be used to look up the associated message in PPS and is not unique.Retrieves events from the thirty minutes beginning at noon UTC on 05-01-2016 and ending at 12:30pm UTC. Join them to grow your own development teams, manage permissions, and collaborate on projects.Fluentd daemonset for Kubernetes and it Docker image Higher scores indicate higher certainty.When the message was delivered to the user or quarantined by PPSA link to the entry on the TAP Dashboard for the particular threat.A string specifying which threat type will be returned in the data. If JSON output is selected, the end time is included in the returned result.The service has encountered an unexpected situation and is unable to give a better response to the request.Fetch events for clicks to malicious URLs permitted in the specified time periodThere is no authorization information included in the request, the authorization information is incorrect, or the user is not authorized.The user has made too many requests over the past 24 hours and has been throttled.Syslog format only: If no records matching the specified criteria were found, a status code of 204 will be returned with empty content.Proofpoint identified the URL as a threat at this time.Whether the threat was an attachment, URL, or message type.Message-ID extracted from the headers of the email message. If this interval overlaps with previous requests for data, records from the previous request may be duplicated. Overview. Only permitted clicks are returned. For example, https://tap-api-v2.proofpoint.com/v2/campaign. Expand/collapse global hierarchy Expand/collapse global location No headers . The domain-part is cleartext.The unique identifier associated with this threat. All endpoints are available on the tap-api-v2.proofpoint.com host. API Documentation Last updated Jan 28, 2020; Save as PDF Table of contents No headers. It represents the start of the data retrieval period. If JSON output is selected, the end time is included in the returned result.Requests to the endpoints can produce a response with a variety of HTTP status codes. Proofpoint Targeted Attack Protection (TAP) helps you stay ahead of attackers with an innovative approach that detects, analyzes and blocks advanced threats before they reach your inbox. The end of the period is determined by current API server time rounded to the nearest minute. The domain-part is cleartext.The time at which the period queried for data endedFetch events for clicks to malicious URLs blocked in the specified time periodRetrieves events to the present, starting 3600 seconds before the query time. All events are returned. Back to top; Home; API Documentation Python program to pull URL threat information from the ProofPoint TAP SIEM API and populate a URL block list. Updated on Oct 30, 2018. The user-part is hashed.
False positives are included in the output. The minimum interval is thirty seconds. The request is missing a mandatory "request" parameter, a parameter contains data which is incorrectly formatted, or the API doesn't have enough information to determine the identity of the customer.The user is authenticated for the service but is not authorized to access data for the given customer.The malicious URL which was clickedRetrieves events from noon on 05/01/2016 to the present. A minimal init system for Linux containersGraphite client for the go-metricspython collectd module to gather metrics from puppet reportsMonitors a url and announces it into Platform discoveryA Go API client for the v2 Docker Registry APIKubernetes Operations (kops) - Production Grade K8s Installation, Upgrades, and ManagementAPIServer encryption provider, backed by AWS KMSCloudWatch Logs Plugin for FluentdCluster-wide aggregator of resource usage data.Platform packaging for Rack servers (legacy code)Prometheus Operator creates/configures/manages Prometheus clusters atop KubernetesConfigure external DNS servers (AWS Route53, Google CloudDNS and others) for Kubernetes Ingresses and ServicesBootstrap TLS certificates for Pods using the Kubernetes certificates API.etcd operator creates/configures/manages etcd clusters atop KubernetesPrometheus to KairosDB remote storage adapterAn open source, general-purpose policy engine.Operator to manage Cilium's etcd clusterBase image for Proofpoint Platform based servicesNGINX Ingress Controller for KubernetesThe Prometheus monitoring system and time series database.Autoscaling components for KubernetesGitHub is home to over 50 million developers working together. The end of the window is the current API server time rounded to the nearest minute. Follow their code on GitHub. It can be used to query the forensics and campaign endpoints. The time the user clicked on the URLIf the JSON output is used, the following structure will always be produced, even if there are no events inside any individual (or all) event arrays.The phish score of the message. Proofpoint has 52 repositories available. 1. ... python collectd module to gather metrics from puppet reports Python MIT 6 0 0 0 Updated Jan 24, 2019. Output is in the JSON format.The email address of the SMTP (envelope) sender. It can be used to look up the associated message in PPS and is not unique.The unique identifier associated with this threat.