Threat Response - Integrating with Proofpoint Internal Mail Defense (IMD)

Internal Mail Defense (IMD) detects and remediates threats that originate from internal email by leveraging the journaling functionality in Exchange / Office 365. It protects internal mail against malware, advanced threats and spam. Remediation is performed by auto-pulling and quarantining bad messages. The service has absolutely no impact to existing mail flow and end user experience.

medium

Note

Internal Mail Defense (IMDv2) requires Threat Response 4.6.1 or later but the latest official release is recommended.

Configuring Exchange / Office 365

Creating the send connector

In order to ensure that journaled email reaches the IMD platform without being modified or potentially blocked, it is important to create a send connector to ensure direct delivery of the journal traffic.

Send connector details:

  • From Exchange / O365 to Partner Organization
  • For messages sent to the following domain: imd.proofpoint.com
  • Choose the radio button for “Route email through these smart hosts” and enter the MX records or the IPs for your Proofpoint IMD cluster
  • Use TLS
  • Validate the connector using the journal address journal@imd.proofpoint.com

Creating the Journal rule

IMD requires all internal mail traffic be journaled to a customer-specific email address in our data centers. This traffic is then analyzed, and alerts are generated for any malicious messages we find.

Journal rule details:

  • Internal messages
  • All users (can be restricted to a group for testing)
  • Journal to the address provided by Proofpoint

Note

It is not recommended to enable the journal rule before the Threat Response part of the configuration has been completed and tested. It’s also not recommended to enable the journal rule until the IMD cluster is fully configured and the full two hour propagation time has passed since creating the connector.

Configuring Threat Response for IMD

The steps below describe the process of integrating IMD in Threat Response.

Threat Response queries the IMD data center for alerts using a Python ETL script linked to a scripted poller source. Before creating the new source, the script, and some supporting data must be added to Threat Response.

Important

You must be logged in to Threat Response with an account that is part of both the Admins and Script Admins teams to make the necessary configuration changes.

Adding the ETL script

Note

Your professional services consultant will provide you with the required python script.

  1. Navigate to the Scripts page in Threat Response.

    image

  2. Select ETL Scripts from the menu on the left.

  3. Click the Add (+) button in the header section of the left panel to open the Add ETL Script panel on the right.

    small

  4. Choose the IMD_Poller script file you wish to upload and enter an optional description.

    small

  5. Click Save

Once saved, the script information will be presented in the right-hand panel:

small

Creating the auth profile

The auth profile contains the username and password required to connect to the IMD service.

Note

Your professional services consultant will provide you with the username and password.

To create an auth profile:

  1. Navigate to the Scripts page in Threat Response.

    image

  2. Select Auth Profiles from the menu on the left.

    small

  3. Click the Add (+) button in the header section of the left panel to open the Add Auth Profile panel on the right.

  4. Give the auth profile a name (e.g. “IMD Auth”) and optional description, then click the Add (+) button next to the “key/value” fields.

    small

    1. Enter “IMD Login” as the ‘Key’ and the provided login name as the ‘Value’.

    2. Click the Add (+) button to create a new key/value pair.

    3. Enter “IMD Password” as the ‘Key’ and the provided password name as the ‘Value’.

    Note

    The keys’ values will not be displayed as you type it. You can see them after saving by clicking the Reveal link.

  5. Click Save.

Customizing the JSON variable file

IMD requires certain defined variables to operate, and exposes a number of variables to customize your configuration. These variables are stored in a JSON-formatted text file that is uploaded to Threat Response.

Note

Your professional services consultant will provide you with a basic JSON file that will be need to be modified prior to uploading.

The basic variable file looks something like this:

{
  "IMD API Service" : "https://clusterid.pphosted.com:10000",
  "IMD Quarantine Folder List" : "Malware, Phish, Attachment Defense, Virus"
}

These two keys are required. “IMD API Service” should be modified to point to your specific IMD cluster and “IMD Quarantine Folder List” should be updated to included a comma-separated list of all the quarantine mailboxes configured in Threat Response. The folders listed above are the best practice recommendations.

If you use a proxy to communicate with the Internet, you will need to explictly state this in the json variable file.

A json variable file using a proxy looks something like this:

{
  "IMD API Service" : "https://clusterid.pphosted.com:10000",
  "IMD Quarantine Folder List" : "Malware, Phish, Attachment Defense, Virus",
  "IMD CertVerify" : "False",
  "IMD Proxy Enable" : "True",
  "IMD Proxy Scheme" : "http",
  "IMD Proxy Host" : "10.1.100.123",
  "IMD Proxy Port" : "8080",
  "IMD Proxy Auth Enable" : "True"
}

In some circumstances, it may be desired to safelist certain alerts so that they are not processed by Threat Response. This is done by creating a proofpoint_imd policy route to your IMD cluster which then bypasses Spam, Virus and Attachment Defense scanning.

Some common safelisted senders/recipients are: envelope sender of the Proofpoint email digest (if used) and the envelope sender AND recipient address of your Threat Response quarantine mailbox.

Important

Any alert matching one or more of the conditions of the proofpoint_imd policy route will not be ingested by Threat Response at all, and there will be no record of the corresponding message.

Uploading the JSON variable file

To upload the variable file:

  1. Navigate to the Scripts page in Threat Response.

    image

  2. Select Variable Files from the menu on the left.

    small

  3. Click the Add (+) button in the header section of the left panel to open the Add Variable File panel on the right.

  4. Click Choose file and browse to the JSON file to upload. Enter an optional description.

    small

  5. Click Save.

Making changes to the JSON variable file

To make changes to the variables used by the IMD source, a new JSON file must be uploaded and linked. After making changes to the file, please follow the instructions in this guide to upload the new file and link it to the IMD source by updating the Variable File for the existing IMD source.

Adding the IMD source

  1. Navigate to the Sources page in Threat Response.

    image

  2. Click the blue Add (+) button next to Sources in the left panel to add a new alert source to Threat Response.

  3. Select Scripted Poller from the Type drop-down.

    1. Give the source a name, and optional description

    2. Script: Choose the IMD script you uploaded earlier

    3. Auth Profile: Choose the auth profile you created earlier

    4. Variable File: Choose the JSON variable file you uploaded earlier

    5. Polling Interval: Set to 60 seconds (the minimum)

    6. Choose Scripted Poller as the Icon Image

    small

  4. Click Add Source

To link a variable file to an alert source:

Note

These steps assume the alert source has already been created. If it hasn’t, please follow the steps in Adding a source to create a new one. You can link the variable file during source creation.

  1. Navigate to the Sources page in Threat Response.

    image

  2. Select the alert source from the list, then click on Edit from the details menu.

    small

  3. In the Python ETL Scripting section of the details panel, choose the desired variable file from the Variable File drop-down.

    small

  4. Click Save Changes

Configuring Match Conditions

This section will cover the steps for creating, modifying and removing Match Conditions.

Creating Match Conditions

A Match Condition is a rule that allows Threat Response to take automated action based on certain criteria found in the reviewed alert.

  1. To create a new Match Condition click the Add(+) button to the right of Match Condition

    small

  2. Within the ‘New Match Condition’ dialog configure the following:

    large

    • Name: Provide a name for the event source. This is an internal name only and can be whatever is most helpful to the administrator or operators.

    • Description: Provide any desired description of the event source.

    • For alerts of severity: Used to specify the severity of the alert to match.

    • LDAP Attribute: Provides a dropdown list/text box to enter in an LDAP attribute. This is useful if you wish the match condition to only apply to a subset of users during testing, for example. In order for the alert to match on an LDAP attribute Threat Response must be configured to retrieve that attribute. To configure this collection please refer to the admin guide. The dropdown list will only populate with attributes collected.

    • LDAP value: This test field is greyed out unless the LDAP attribute field is configured. It is required to be populated when active.

    • Responses: This is the response action to take when the match condition criteria is met. Add a response to Move email to quarantine and choose to additionally quarantine messages from other mailboxes if distributed internally and close incident after successful quarantine.

  3. Click Save.

Changing Match Conditions

  1. Select the appropriate Alert Source

  2. In the right hand pane identify the Match Condition to change

  3. Click ‘Change’ in the bottom right corner of the Match Condition

    small

  4. Make appropriate adjustments and save the Match Condition. Reference “Creating Match Conditions” in this document for specifics about each configurable setting.

Disabling Match Conditions

  1. Select the appropriate Alert Source

  2. In the right hand pane identify the Match Condition to disable

  3. Click ‘Disable’ in the bottom right corner of the Match Condition

    small

  4. The selection in the bottom right corner should change to ‘Enable’

    small

Enabling Match Conditions

  1. Select the appropriate Alert Source

  2. In the right hand pane identify the Match Condition to enable

  3. Click ‘Enable’ in the bottom right corner of the Match Condition

    small

  4. The selection in the bottom right corner should change to ‘Disable’

    small

Remove Match Conditions

Important

There is no warning given to verify and there is no way to undo this action.

  1. Select the appropriate Alert Source

  2. In the right hand pane identify the Match Condition to remove

  3. Click checkbox to the left of the Match Condition to remove

  4. Click the red circle indicator that becomes active opposite the ‘Match Condition’ heading

    small