Ingest Logs
Enrichment Configuration
Method 2: Configure via Devices
Configuring a Repo for Proofpoint
Adding a Normalization Policy for Proofpoint
Configuring a Processing Policy for Proofpoint
Adding Proofpoint as a Device in Logpoint
Configuring the Syslog Collector for Proofpoint
Verify Ingestion
Check Log Ingestion
Verify Data Flow
Last updated
Was this helpful?