ptr-docs.proofpoint.com Open in urlscan Pro
52.207.108.11  Public Scan

Submitted URL: https://ptr-docs.proofpoint.com/ptr-guides/integrations-files/ptr-exchange/#enabling-azure-ad-authentication
Effective URL: https://ptr-docs.proofpoint.com/ptr-guides/integrations-files/ptr-exchange/
Submission: On November 23 via manual from US — Scanned from DE

Form analysis 1 forms found in the DOM

Name: search

<form class="md-search__form" name="search">
  <input type="text" class="md-search__input" name="query" placeholder="Search" accesskey="s" autocapitalize="off" autocorrect="off" autocomplete="off" spellcheck="false">
  <label class="md-icon md-search__icon" for="search"></label>
</form>

Text Content

Integrations Integration Guides Microsoft Exchange
Type to start searching

Proofpoint Threat Response
 * Home
 * Terms of Use
 * Threat Response
   Threat Response
    * About Threat Response
    * Installation Guide
    * Installation Guide (AWS)
    * Upgrade Guide
    * Administration Guide
      Administration Guide
       * Administration Guide
       * Console Guide (New)
       * Console Guide (Old)
       * Clustering Guide (New)
       * Clustering Guide (Old)
   
    * User guide
      User guide
       * User guide
       * Indexed Search Fields
   
    * Integrations
    * Release notes

 * Threat Response Auto Pull
   Threat Response Auto Pull
    * About TRAP
    * Installation Guide
    * Administration Guide
    * Troubleshooting Guide
    * PTR vs. TRAP

 * Extensibility
   Extensibility
    * Threat Response API

 * Integrations
   Integrations
    * Integrations Summary
    * Integration Guides
      Integration Guides
       * BlueCoat Proxy SG
       * BMC Remedy Ticketing System
       * Carbon Black
       * CheckPoint NGFW
       * Cisco ASA
       * Cisco FirePower NGIPS
       * Cisco IOS
       * Cisco OpenDNS
       * CyberArk Enterprise Vault
       * FireEye EX Series
       * FireEye NX Series
       * Fortinet Fortigate
       * Google G Suite
       * HP ArcSight ESM
       * IAM and 2FA
       * IBM Domino
       * IBM QRadar
       * Imperva SecureSphere
       * Juniper Secure Analytics
       * Juniper SRX
       * Microsoft Exchange Microsoft Exchange
         Table of contents
          * Supported Exchange Versions
          * Supported Permissions for Quarantine
          * Preparing Microsoft Exchange 2010
             * Identifying the Exchange Web Services URL
             * Creating a Location for Quarantined Emails
                * Using a Mailbox for Quarantine
            
             * Creating a Service Account for Threat Response
                * Setting Permissions for the Service Account
         
          * Preparing Microsoft Exchange 2013, 2016 and 2019
             * Identifying the Exchange Web Services URL
             * Creating a Location for Quarantined Emails
                * Using a Mailbox for Quarantine
            
             * Creating a Service Account for Threat Response
                * Setting Permissions for the Service Account
         
          * Configuring EWS Throttling Policy
             * Throttling Settings for Application Impersonation role vs. Full
               Access
             * Settling Throttling Policy for TRAP EWS User
         
          * Preparing Microsoft Exchange Online
             * Identifying the Exchange Web Services URL
             * Creating a Mailbox for Quarantined Emails
             * Enabling Azure AD Authentication
                * Creating an Application in Azure AD
                * Creating a Certificate as a Key for the Application
                * Installing the Certificate Into the Application's Manifest
                * Assigning Permissions to the Application
         
          * Threat Response Configuration
             * Configuring Exchange Connectivity in Threat Response
      
       * Palo Alto Networks
       * Proofpoint CLEAR
         Proofpoint CLEAR
          * Abuse Mailbox
          * Integrating CLEAR
          * Content Rules
      
       * Proofpoint CSV Upload
       * Proofpoint IMD
       * Proofpoint SmartSearch
       * Proofpoint SmartSearch - Export to TRAP
       * Proofpoint TAP
       * Splunk Enterprise 1.0
       * Splunk Enterprise 2.0
       * Suricata
       * Tanium

Table of contents
 * Supported Exchange Versions
 * Supported Permissions for Quarantine
 * Preparing Microsoft Exchange 2010
    * Identifying the Exchange Web Services URL
    * Creating a Location for Quarantined Emails
       * Using a Mailbox for Quarantine
   
    * Creating a Service Account for Threat Response
       * Setting Permissions for the Service Account

 * Preparing Microsoft Exchange 2013, 2016 and 2019
    * Identifying the Exchange Web Services URL
    * Creating a Location for Quarantined Emails
       * Using a Mailbox for Quarantine
   
    * Creating a Service Account for Threat Response
       * Setting Permissions for the Service Account

 * Configuring EWS Throttling Policy
    * Throttling Settings for Application Impersonation role vs. Full Access
    * Settling Throttling Policy for TRAP EWS User

 * Preparing Microsoft Exchange Online
    * Identifying the Exchange Web Services URL
    * Creating a Mailbox for Quarantined Emails
    * Enabling Azure AD Authentication
       * Creating an Application in Azure AD
       * Creating a Certificate as a Key for the Application
       * Installing the Certificate Into the Application's Manifest
       * Assigning Permissions to the Application

 * Threat Response Configuration
    * Configuring Exchange Connectivity in Threat Response


THREAT RESPONSE - INTEGRATION WITH MICROSOFT EXCHANGE¶

This document covers the Threat Response integration with Microsoft Exchange
Servers to enable the email quarantine capability. Threat Response provides the
capability to move malicious emails (manually or automatically) from a user’s
mailbox to a predefined quarantine location.

Further, Threat Response supports email quarantining as it relates to a
Microsoft 365 multi-tenant / multi-geo tenant configuration. Enabling such a
configuration between Threat Response and Microsoft 365 presupposes that for
every (Microsoft 365) tenant, there exists an Exchange server in Threat Response
utilizing Azure AD (modern) authentication.


SUPPORTED EXCHANGE VERSIONS¶

Platform Version(s) Microsoft Exchange Server 2010, 2013, 2016 and 2019
Microsoft Exchange Online
Microsoft 365 Current


SUPPORTED PERMISSIONS FOR QUARANTINE¶

Threat Response requires one of the following permission types for being able to
quarantine messages from users’ mailboxes:

Permission Type Benefit Considerations Full Access Retains original message
headers.

Retains message read status when quarantine is undone.

Allows organization into subfolders in quarantine mailbox. Requires a scheduled
task to apply permissions to new mailboxes.

Permissions are set at the mailbox level. Application Impersonation Allows for
more concurrent quarantines.

Permissions only need to be set once. Does not need permissions to be set as a
scheduled task.

Permissions are set at the account level.

Note

If using Azure AD (“modern”) authentication for an Microsoft 365 implementation,
Application Impersonation permissions will be used.


PREPARING MICROSOFT EXCHANGE 2010¶

Threat Response interfaces with Microsoft Exchange 2010 through the Exchange Web
Services API. This chapter details the steps required to determine the Exchange
Web Services URL used to interface with Exchange, as well as how to create the
quarantine destination, and a service account for Threat Response to use when
interacting with Exchange.


IDENTIFYING THE EXCHANGE WEB SERVICES URL¶

Threat Response interfaces with Exchange via the Exchange Web Services API. The
Threat Response configuration requires that you provide the Exchange Web
Services URL so that it can communicate with Exchange. The steps below detail
how to find this URL.

To identify the Exchange Web Services URL:

 * Connect to Exchange and start the Exchange Management Shell utility.
 * Execute the command below to display the Exchange Web Services URL.

Get-WebServicesVirtualDirectory|Select name, *url*|fl



 * Confirm that the Internal URL shown is correct, and routable on your network.
   This is your Exchange Web Services URL.

Make note of the Exchange Web Services URL for now. This will be used when
configuring Exchange connectivity in Threat Response.


CREATING A LOCATION FOR QUARANTINED EMAILS¶

Threat Response needs a secure location to place emails that have been
identified as malicious. This location needs to be a special mailbox created for
quarantine purposes.

Note

This location will contain emails identified to contain malicious content, and
should be treated as such. Caution should be exercised when handling items in
the quarantine.

USING A MAILBOX FOR QUARANTINE¶

A mailbox can be used as a quarantine destination for emails deemed to be
malicious. A quarantine mailbox can be created via the Exchange Management
Console.

To create a quarantine mailbox:

 * Connect to Exchange and run the Exchange Management Console utility.
 * Navigate to Microsoft Exchange > Microsoft Exchange On-Premises > Recipient
   Configuration > Mailbox.



 * Click New Mailbox in the right-hand panel, and follow the wizard to create a
   new user mailbox that will serve as the quarantine location.


CREATING A SERVICE ACCOUNT FOR THREAT RESPONSE¶

To search user mailboxes and move suspect messages to the quarantine, Threat
Response will need an account with elevated permissions.

Note

Proofpoint recommends creating a dedicated account for performing search and
quarantine actions.

To create a service account using the Exchange Management Console:

 * Connect to Exchange and run the Exchange Management Console utility.
 * Navigate to Microsoft Exchange > Microsoft Exchange On-Premises > Recipient
   Configuration > Mailbox.



 * Click New Mailbox in the right-hand panel, and follow the wizard to create a
   new user mailbox that will serve as the service account for Threat Response.

SETTING PERMISSIONS FOR THE SERVICE ACCOUNT¶

The service account will need to be granted access to all user mailboxes that
will be protected by the quarantine function. These permissions can be set using
the Exchange Management Shell.

To assign permissions using the Exchange Management Shell:

 * Connect to Exchange and start the Exchange Management Shell utility.
 * For Application Impersonation | Execute the command below to give the service
   account access to all mailboxes (Note: replace “username” with the service
   account name).

New-ManagementRoleAssignment -Name:ThreatResponseImpersonation -Role:ApplicationImpersonation -user:Domain\ServiceAccount

Note

-Name: ThreatResponseImpersonation is for example purposes, this can be any
unique name that fits within your organization’s naming standards

 * For FullAccess delegation | Execute the command below to give the service
   account access to all mailboxes inclusive of shared mailboxes. Be sure to
   replace username with the service account name.

Get-Mailbox -ResultSize unlimited -Filter {(RecipientType -eq 'UserMailbox')} | Add-MailboxPermission -User username -AccessRights FullAccess -InheritanceType all



This command can locate all mailboxes (inclusive of shared mailboxes) in
Microsoft Exchange as well as granting FullAccess rights to both “regular” and
shared mailboxes.

Note

This action only applies to mailboxes that currently exist in Exchange. When new
mailboxes are created, this command will need to be run again to grant access to
the new mailboxes.


PREPARING MICROSOFT EXCHANGE 2013, 2016 AND 2019¶

Threat Response interfaces with Microsoft Exchange 2013, 2016 and 2019 through
the Exchange Web Services API. This chapter details the steps required to
determine the Exchange Web Services URL used to interface with Exchange, as well
as how to create the quarantine destination, and a service account for Threat
Response to use when interacting with Exchange.


IDENTIFYING THE EXCHANGE WEB SERVICES URL¶

Threat Response interfaces with Exchange via the Exchange Web Services API. The
Threat Response configuration requires that you provide the Exchange Web
Services URL so that it can communicate with Exchange. The steps below detail
how to find this URL.

To identify the Exchange Web Services URL:

 * Connect to Exchange and start the Exchange Management Shell utility.
 * Execute the command below to display the Exchange Web Services URL.

Get-WebServicesVirtualDirectory|Select name, *url*|fl



 * Confirm that the Internal URL shown is correct, and routable on your network.
   This is your Exchange Web Services URL.

Make note of the Exchange Web Services URL for now. This will be used when
configuring Exchange connectivity in Threat Response.


CREATING A LOCATION FOR QUARANTINED EMAILS¶

Threat Response needs a secure location to place emails that have been
identified as malicious. This location needs to be a special mailbox created for
quarantine purposes.

Note

This location will contain convicted malware emails identified to contain
malicious content, and should be treated as such. Caution should be exercised
when handling items in the quarantine.

USING A MAILBOX FOR QUARANTINE¶

A mailbox can be used as a quarantine destination for emails deemed to be
malicious. A quarantine mailbox can be created via the Exchange Admin Center.

To create a quarantine mailbox:

 * Log in to the Exchange Admin Center from a browser.
 * Navigate to recipients > mailboxes.
 * Click the “+” sign to create a new mailbox for quarantined emails.




CREATING A SERVICE ACCOUNT FOR THREAT RESPONSE¶

To search user mailboxes and move suspect messages to the quarantine, Threat
Response will need an account with elevated permissions.

Note

Proofpoint recommends creating a dedicated account for performing search and
quarantine actions.

Important

Make sure there is an active mailbox enabled for the service account that has
been created and is being used to perform a quarantine using either Full Access
permissions or the Application Impersonation role. Note that if there is no
mailbox for the service account, quarantining from a regular mailbox will still
work but quarantining from distribution lists on Exchange will fail.

To create a service account using the Exchange Admin Center:

 * Log in to the Exchange Admin Center from a browser.
 * In the Exchange Admin Center, navigate to recipients > mailboxes.
 * Click the “+” icon to create a new mailbox to serve as the service account.



SETTING PERMISSIONS FOR THE SERVICE ACCOUNT¶

The service account will need to be granted access to all user mailboxes that
will be protected by the quarantine function. These permissions can be set using
the Exchange Management Shell.

To assign permissions using the Exchange Management Shell:

 * Connect to Exchange and start the Exchange Management Shell utility.
 * For Application Impersonation | Execute the command below to give the service
   account access to all mailboxes (Note: replace “username” with the service
   account name).

New-ManagementRoleAssignment -Name:ThreatResponseImpersonation -Role:ApplicationImpersonation -user:Domain\ServiceAccount

Note

-Name: ThreatResponseImpersonation is for example purposes, this can be any
unique name that fits within your organization’s naming standards

 * For FullAccess delegation | Execute the command below to give the service
   account access to all mailboxes inclusive of shared mailboxes. Be sure to
   replace username with the service account name.

Get-Mailbox -ResultSize unlimited -Filter {(RecipientType -eq 'UserMailbox')} | Add-MailboxPermission -User username -AccessRights FullAccess -InheritanceType all



This command can locate all mailboxes (inclusive of shared mailboxes) in
Microsoft Exchange as well as granting FullAccess rights to both “regular” and
shared mailboxes.

Note

This action only applies to mailboxes that currently exist in Exchange. When new
mailboxes are created, this command will need to be run again to grant access to
the new mailboxes.


CONFIGURING EWS THROTTLING POLICY¶

The throttling policies in Exchange affect not only EWS, but also all client
connections to the Exchange server, including the protocols used by Office
Outlook, Outlook Web App, and Exchange ActiveSync. These Throttling policies are
assigned per user, and the system has a default throttling policy out of the
box.

To improve TRAP quarantine speed, we strongly recommend removing EWS Throttling
policy for the user account you plan on using for email quarantines.

Important

Microsoft 365 does not expose throttling policies. Microsoft 365 subscribers
should contact Microsoft with any throttling questions. These instructions only
apply to on-premise Exchange deployments.


THROTTLING SETTINGS FOR APPLICATION IMPERSONATION ROLE VS. FULL ACCESS¶

There are two options for the EWS Service Account configured for TRAP:

 1. TRAP EWS User has Full Access Permission: If you’re quarantining using a
    service account that has Full Access permissions, then just set a throttling
    policy with unlimited (or high number) EWS settings (as already described in
    the installation guide) for that account.
 2. TRAP EWS User has Application Impersonation role: If you’re quarantining
    with impersonation, you must create and assign a new throttling policy to
    quarantine-user, but you must also allow each individual account more head
    room. To do so, it’s likely that the best course of action is to update the
    default throttling policy on the network.


SETTLING THROTTLING POLICY FOR TRAP EWS USER¶

From the Exchange Management PowerShell (run on the CAS), you can see the
existing policies by running:

Get-throttlingpolicy

To create a new policy that has no EWS throttling and assign it to the
quarantine user, do the following:

 * Create a new policy:

New-throttlingpolicy PFPT_ThreatScanner_ThrottlingPolicy

 * Set the EWS throttling portion of that new policy to “unlimited”:

For Exchange 2010, use the following:

set-throttlingpolicy PFPT_ThreatScanner_ThrottlingPolicy -EWSMaxConcurrency $null -EWSPercentTimeInAD $null -EWSPercentTimeInCAS $null -EWSPercentTimeInMailboxRPC $null

For Exchange 2013, 2016 and 2019:

Set-ThrottlingPolicy PFPT_ThreatScanner_ThrottlingPolicy -EWSMaxConcurrency Unlimited -EWSMaxSubscriptions Unlimited -EwsCutoffBalance Unlimited -EwsMaxBurst Unlimited -EwsRechargeRate Unlimited

 * Assign the policy to the quarantine user:

Set-ThrottlingPolicyAssociation -Identity Domain\TRAPService -ThrottlingPolicy PFPT_ThreatScanner_ThrottlingPolicy

Note

Replace Domain\TRAPService with your service account


PREPARING MICROSOFT EXCHANGE ONLINE¶

Threat Response interfaces with Microsoft Exchange Online through the Exchange
Web Services API. This chapter details the steps required to determine the
Exchange Web Services URL used to interface with Exchange, as well as how to
create the quarantine destination, and a service account for Threat Response to
use when interacting with Exchange. The service account will be an Azure app
registration.

Note

All Microsoft 365 accounts used can be a shared mailbox which requires no user
license. You will need one shared mailbox for quarantine and one shared mailbox
for reported abuse.


IDENTIFYING THE EXCHANGE WEB SERVICES URL¶

Threat Response interfaces with Exchange via the Exchange Web Services API. The
Threat Response configuration requires that you provide the Exchange Web
Services URL so that it can communicate with Exchange. In Exchange Online
deployments, this is a standard URL that is used for all Exchange Online
customers.

Exchange Online EWS URL:

https://outlook.office365.com/EWS/Exchange.asmx

Make note of the Exchange Web Services URL for now. This will be used when
configuring Exchange connectivity in Threat Response.


CREATING A MAILBOX FOR QUARANTINED EMAILS¶

Threat Response needs a mailbox to place emails that have been identified as
malicious. This mailbox should be dedicated for quarantine purposes.

Note

This location will contain emails identified to contain malicious content.
Caution should be exercised when handling items in the quarantine.

To create a quarantine account in Microsoft 365:

 * Log in to the Microsoft 365 Portal as an admin user.
 * Click on the Exchange Admin Center



 * In Exchange Admin Center navigate to Recipients > Mailboxes.
 * Click the “Add a shared mailbox” button to create a quarantine mailbox.



Note

The name of the mailbox, e.g. Inbox, must be in the English language, as per
Microsoft’s instructions, in order to allow Threat Response to access it.


ENABLING AZURE AD AUTHENTICATION¶

To search user mailboxes and move suspect messages to the quarantine, Threat
Response will need elevated permissions.

Note

In version 4.2.0, Threat Response added support for Azure AD Authentication
(“Modern Auth”) for Microsoft 365 configurations. This authentication method is
not supported for on-premise Exchange deployments.

Important

Basic Auth for O365 is no longer recommended by Proofpoint. If you are still
using Basic Authentication on O365 we recommend changing to Azure AD Auth as
Basic Authentication will be deprecated on or around the second half of 2021.
Microsoft began to disable Basic Authentication for newly created tenants by
default and began to disable Basic Authentication in tenants that have no
recorded usage starting October 2020.

Azure AD Authentication provides a more secure, certificate-based method of
authenticating to Microsoft 365. It also simplifies assigning permissions.

CREATING AN APPLICATION IN AZURE AD¶

 1. Launch Azure Active Directory.
    (https://portal.office.com/adminportal/home#/homepage)
 2. Click Admin Centers, then Azure Active Directory.

 3. Click App Registrations (not Enterprise Applications).
    
    

 4. Click New Registration.
    
    

 5. Register the application.
    
    * Enter a name for the App. It can be anything. Try to keep it unique
      against the other apps already registered.
    * For Supported Account Types select the Accounts in this organizational
      directory only radio button.
    * Leave the Redirect URI blank.
    * Click Register at the bottom of the page.
    
    

 6. Record/Save the Application (client) ID and the Directory (tenant) ID. These
    will be needed later when configuring Threat Response.
    
    Tip
    
    Clicking on the ID field gives a little icon to “copy to clipboard”
    
    

CREATING A CERTIFICATE AS A KEY FOR THE APPLICATION¶

Note that it is possible to accomplish this task in two different ways:

 1. Option one includes the following instructions for uploading the certificate
    file.
    
    Navigate to Microsoft Azure’s application registration for the client
    application and
    
    Select Certificates & Secrets.
    
    Click on Upload Certificate and then select the certificate file to be
    uploaded.
    
    Click on Add. Once the certificate is uploaded, the thumbprint, start date,
    and expiration values should be displayed.

 2. Option two includes both the following information and the instructions
    contained in the Installing the Certificate Into the Application’s Manifest
    section below.

Note

You must have Powershell 3 or higher to execute the commands below

Execute the following Powershell commands (in this example, we’re in the
directory c:\temp\oauth_cert). These commands will create a self-signed cert in
the variable $cert, then generate a thumbprint so it can be registered in Azure.
For this example, the certificate is set to expire 3 years from now.

$cert=New-SelfSignedCertificate -Subject "CN=TRAP_cert" -CertStoreLocation "Cert:\CurrentUser\My" -KeyExportPolicy Exportable -KeySpec Signature -NotAfter (Get-Date).AddYears(3)
$bin = $cert.RawData
$base64Value = [System.Convert]::ToBase64String($bin)
$bin = $cert.GetCertHash()
$base64Thumbprint = [System.Convert]::ToBase64String($bin)
$keyid = [System.Guid]::NewGuid().ToString()
$jsonObj = @{customKeyIdentifier=$base64Thumbprint;keyId=$keyid;type="AsymmetricX509Cert";usage="Verify";value=$base64Value}
$keyCredentials=ConvertTo-Json @($jsonObj) | Out-File "keyCredentials.txt"

The contents of keyCredentials.txt will be used in the next section.

Execute the following Powershell commands to export the cert as a PFX file so it
can be securely uploaded to Threat Response. Remember to update “password” to
contain your chosen secure password.

Export-Certificate -Cert $cert -FilePath .\cert.cer
$mypwd = ConvertTo-SecureString -String "password" -Force -AsPlainText
Export-PfxCertificate -cert $cert -FilePath .\cert.pfx -Password $mypwd

INSTALLING THE CERTIFICATE INTO THE APPLICATION’S MANIFEST¶

In order to associate the generated certificate with the newly created app, we
must modify the Manifest in Azure AD.

 1. Go to the newly created app in the Azure Active Directory, under App
    Registrations, and click Manifest
    
    

 2. Replace the contents of the keyCredentials property with the contents of
    keyCredentials.txt, and then save the manifest.
    
    

ASSIGNING PERMISSIONS TO THE APPLICATION¶

Complete the following steps to tell Azure AD that our application has
permission to use Exchange.

 1. Click API Permissions.
    
    

 2. Click Add a Permission.

 3. The Microsoft APIs tab will be selected by default.
    
    Select the APIs my organization uses tab and then search for Microsoft 365.

 4. Select Microsoft 365 Exchange Online and then Application permissions on the
    next screen.

 5. Select full_access_as_app to grant application permissions and then click
    Add Permission at the bottom of the screen.

 6. Lastly, click Grant admin consent.

The application has now been granted the necessary permissions to use Exchange.


THREAT RESPONSE CONFIGURATION¶

Configuring Threat Response for Exchange integration requires that you create an
Exchange Server device in Threat Response. This device will hold all of the
information that Threat Response needs to interface with Exchange to quarantine
messages, including the EWS URL, quarantine location, and service account to use
when interfacing with Exchange.


CONFIGURING EXCHANGE CONNECTIVITY IN THREAT RESPONSE¶

In order for Threat Response to communicate with an Exchange Server it must be
properly configured in the System Settings.

To add an Exchange server in the System Settings:

 * Log in to Threat Response.
 * Using the top menu bar open the settings menu and navigate to the System
   settings page.



 * Navigate to Email Integration > Exchange servers
 * Click the blue Add (+) button next to Microsoft Exchange Servers to bring up
   the New Microsoft Exchange Server panel.



 * Set the following fields:
   
   * Enabled: Check the box if you want to enable the configuration for the
     Exchange server; if off, the configuration will be saved but not enabled
   * Name: A label / name for this Exchange Server.
   * Exchange Web Services URL: The complete EWS URL for the exchange instance.
   * MessageID search: Check this option to fallback to searching the mailbox
     for the message if the message-ID is missing from the alert, and the alert
     type is URL-based.
   * Scan Recoverable Items: Allows the quarantine of deleted items that remain
     in the recoverable items folder.
   * Scan Exchange Online Archive: Allows messages to be quarantined out of EOA
     (Exchange Online Archive).
   * Use configured proxy: Allows Threat Response to use or bypass proxy
     configuration (typically used for communication to on-premise Exchange).
   * Quarantine mailbox: The SMTP address of the quarantine mailbox.
   * Authentication Type: Choose Azure AD or NTLM/Basic Authentication

 * For Basic Authentication set the following fields:
   
   * Microsoft 365: Do not check this option since Basic Authentication is only
     used for Exchange Onprem.
   * Username: Username used to login to EWS (typically a service account).
     Typically entered as domain\user or in UPN format.
   * Password: Password used to login to EWS.
   * Use impersonation: Check this option if you want to use the Application
     Impersonation role (for the credentials that you created for Threat
     Response). Uncheck this option if you’re using full mailbox access.
   * Quarantine folder name: The name of the mailbox folder that quarantined
     messages should be placed into (not available if using Application
     Impersonation).
   * Create folder per mailbox: Check this box to organize quarantined emails
     into separate recipient folders below the quarantine folder (not available
     if using Application Impersonation).

 * With impersonation mode, custom headers to emails are configurable and
   visible when a message in the end-user’s mailbox is quarantined and restored.
   
   * Quarantine header (impersonation mode only): This header informs the user
     that the message was originally quarantined for a reason.
   * Undo quarantine header (impersonation mode only): This header informs the
     user that the quarantined message was restored back into the mailbox for a
     reason.
   
   

 * For Azure AD set the following fields:
   
   * Application ID: Enter the Application ID of the app created in Azure AD
   * Tenant ID: Enter your Microsoft 365 tenant name (e.g.
     customer.onmicrosoft.com)
   * Authentication Endpoint: For most deployments, the value should be
     https://login.windows.net (default). If you are deploying TRAP in a
     geography (e.g. China, Germany) that requires a different Microsoft
     authentication endpoint, please change this field to your local
     authentication end-point recommended by Microsoft.
   * Private key file: Choose the .pfx file you saved with the application
     private key
   * Private key password: Enter the password for the .pfx file
   
   

 * Click Save to complete the configuration

Test Exchange Server button enables the user to test the configuration and
reflect any errors in the Microsoft Exchange Servers table (red or green
indicator icon).

With a successful configuration in place, you will see a green status icon next
to the newly created Exchange Server in Threat Response.

Previous Juniper SRX
Next Palo Alto Networks

Copyright Proofpoint 2019