ptr-docs.proofpoint.com
Open in
urlscan Pro
52.207.108.11
Public Scan
Submitted URL: https://ptr-docs.proofpoint.com/ptr-guides/integrations-files/ptr-exchange/#enabling-azure-ad-authentication
Effective URL: https://ptr-docs.proofpoint.com/ptr-guides/integrations-files/ptr-exchange/
Submission: On November 23 via manual from US — Scanned from DE
Effective URL: https://ptr-docs.proofpoint.com/ptr-guides/integrations-files/ptr-exchange/
Submission: On November 23 via manual from US — Scanned from DE
Form analysis
1 forms found in the DOMName: search —
<form class="md-search__form" name="search">
<input type="text" class="md-search__input" name="query" placeholder="Search" accesskey="s" autocapitalize="off" autocorrect="off" autocomplete="off" spellcheck="false">
<label class="md-icon md-search__icon" for="search"></label>
</form>
Text Content
Integrations Integration Guides Microsoft Exchange Type to start searching Proofpoint Threat Response * Home * Terms of Use * Threat Response Threat Response * About Threat Response * Installation Guide * Installation Guide (AWS) * Upgrade Guide * Administration Guide Administration Guide * Administration Guide * Console Guide (New) * Console Guide (Old) * Clustering Guide (New) * Clustering Guide (Old) * User guide User guide * User guide * Indexed Search Fields * Integrations * Release notes * Threat Response Auto Pull Threat Response Auto Pull * About TRAP * Installation Guide * Administration Guide * Troubleshooting Guide * PTR vs. TRAP * Extensibility Extensibility * Threat Response API * Integrations Integrations * Integrations Summary * Integration Guides Integration Guides * BlueCoat Proxy SG * BMC Remedy Ticketing System * Carbon Black * CheckPoint NGFW * Cisco ASA * Cisco FirePower NGIPS * Cisco IOS * Cisco OpenDNS * CyberArk Enterprise Vault * FireEye EX Series * FireEye NX Series * Fortinet Fortigate * Google G Suite * HP ArcSight ESM * IAM and 2FA * IBM Domino * IBM QRadar * Imperva SecureSphere * Juniper Secure Analytics * Juniper SRX * Microsoft Exchange Microsoft Exchange Table of contents * Supported Exchange Versions * Supported Permissions for Quarantine * Preparing Microsoft Exchange 2010 * Identifying the Exchange Web Services URL * Creating a Location for Quarantined Emails * Using a Mailbox for Quarantine * Creating a Service Account for Threat Response * Setting Permissions for the Service Account * Preparing Microsoft Exchange 2013, 2016 and 2019 * Identifying the Exchange Web Services URL * Creating a Location for Quarantined Emails * Using a Mailbox for Quarantine * Creating a Service Account for Threat Response * Setting Permissions for the Service Account * Configuring EWS Throttling Policy * Throttling Settings for Application Impersonation role vs. Full Access * Settling Throttling Policy for TRAP EWS User * Preparing Microsoft Exchange Online * Identifying the Exchange Web Services URL * Creating a Mailbox for Quarantined Emails * Enabling Azure AD Authentication * Creating an Application in Azure AD * Creating a Certificate as a Key for the Application * Installing the Certificate Into the Application's Manifest * Assigning Permissions to the Application * Threat Response Configuration * Configuring Exchange Connectivity in Threat Response * Palo Alto Networks * Proofpoint CLEAR Proofpoint CLEAR * Abuse Mailbox * Integrating CLEAR * Content Rules * Proofpoint CSV Upload * Proofpoint IMD * Proofpoint SmartSearch * Proofpoint SmartSearch - Export to TRAP * Proofpoint TAP * Splunk Enterprise 1.0 * Splunk Enterprise 2.0 * Suricata * Tanium Table of contents * Supported Exchange Versions * Supported Permissions for Quarantine * Preparing Microsoft Exchange 2010 * Identifying the Exchange Web Services URL * Creating a Location for Quarantined Emails * Using a Mailbox for Quarantine * Creating a Service Account for Threat Response * Setting Permissions for the Service Account * Preparing Microsoft Exchange 2013, 2016 and 2019 * Identifying the Exchange Web Services URL * Creating a Location for Quarantined Emails * Using a Mailbox for Quarantine * Creating a Service Account for Threat Response * Setting Permissions for the Service Account * Configuring EWS Throttling Policy * Throttling Settings for Application Impersonation role vs. Full Access * Settling Throttling Policy for TRAP EWS User * Preparing Microsoft Exchange Online * Identifying the Exchange Web Services URL * Creating a Mailbox for Quarantined Emails * Enabling Azure AD Authentication * Creating an Application in Azure AD * Creating a Certificate as a Key for the Application * Installing the Certificate Into the Application's Manifest * Assigning Permissions to the Application * Threat Response Configuration * Configuring Exchange Connectivity in Threat Response THREAT RESPONSE - INTEGRATION WITH MICROSOFT EXCHANGE¶ This document covers the Threat Response integration with Microsoft Exchange Servers to enable the email quarantine capability. Threat Response provides the capability to move malicious emails (manually or automatically) from a user’s mailbox to a predefined quarantine location. Further, Threat Response supports email quarantining as it relates to a Microsoft 365 multi-tenant / multi-geo tenant configuration. Enabling such a configuration between Threat Response and Microsoft 365 presupposes that for every (Microsoft 365) tenant, there exists an Exchange server in Threat Response utilizing Azure AD (modern) authentication. SUPPORTED EXCHANGE VERSIONS¶ Platform Version(s) Microsoft Exchange Server 2010, 2013, 2016 and 2019 Microsoft Exchange Online Microsoft 365 Current SUPPORTED PERMISSIONS FOR QUARANTINE¶ Threat Response requires one of the following permission types for being able to quarantine messages from users’ mailboxes: Permission Type Benefit Considerations Full Access Retains original message headers. Retains message read status when quarantine is undone. Allows organization into subfolders in quarantine mailbox. Requires a scheduled task to apply permissions to new mailboxes. Permissions are set at the mailbox level. Application Impersonation Allows for more concurrent quarantines. Permissions only need to be set once. Does not need permissions to be set as a scheduled task. Permissions are set at the account level. Note If using Azure AD (“modern”) authentication for an Microsoft 365 implementation, Application Impersonation permissions will be used. PREPARING MICROSOFT EXCHANGE 2010¶ Threat Response interfaces with Microsoft Exchange 2010 through the Exchange Web Services API. This chapter details the steps required to determine the Exchange Web Services URL used to interface with Exchange, as well as how to create the quarantine destination, and a service account for Threat Response to use when interacting with Exchange. IDENTIFYING THE EXCHANGE WEB SERVICES URL¶ Threat Response interfaces with Exchange via the Exchange Web Services API. The Threat Response configuration requires that you provide the Exchange Web Services URL so that it can communicate with Exchange. The steps below detail how to find this URL. To identify the Exchange Web Services URL: * Connect to Exchange and start the Exchange Management Shell utility. * Execute the command below to display the Exchange Web Services URL. Get-WebServicesVirtualDirectory|Select name, *url*|fl * Confirm that the Internal URL shown is correct, and routable on your network. This is your Exchange Web Services URL. Make note of the Exchange Web Services URL for now. This will be used when configuring Exchange connectivity in Threat Response. CREATING A LOCATION FOR QUARANTINED EMAILS¶ Threat Response needs a secure location to place emails that have been identified as malicious. This location needs to be a special mailbox created for quarantine purposes. Note This location will contain emails identified to contain malicious content, and should be treated as such. Caution should be exercised when handling items in the quarantine. USING A MAILBOX FOR QUARANTINE¶ A mailbox can be used as a quarantine destination for emails deemed to be malicious. A quarantine mailbox can be created via the Exchange Management Console. To create a quarantine mailbox: * Connect to Exchange and run the Exchange Management Console utility. * Navigate to Microsoft Exchange > Microsoft Exchange On-Premises > Recipient Configuration > Mailbox. * Click New Mailbox in the right-hand panel, and follow the wizard to create a new user mailbox that will serve as the quarantine location. CREATING A SERVICE ACCOUNT FOR THREAT RESPONSE¶ To search user mailboxes and move suspect messages to the quarantine, Threat Response will need an account with elevated permissions. Note Proofpoint recommends creating a dedicated account for performing search and quarantine actions. To create a service account using the Exchange Management Console: * Connect to Exchange and run the Exchange Management Console utility. * Navigate to Microsoft Exchange > Microsoft Exchange On-Premises > Recipient Configuration > Mailbox. * Click New Mailbox in the right-hand panel, and follow the wizard to create a new user mailbox that will serve as the service account for Threat Response. SETTING PERMISSIONS FOR THE SERVICE ACCOUNT¶ The service account will need to be granted access to all user mailboxes that will be protected by the quarantine function. These permissions can be set using the Exchange Management Shell. To assign permissions using the Exchange Management Shell: * Connect to Exchange and start the Exchange Management Shell utility. * For Application Impersonation | Execute the command below to give the service account access to all mailboxes (Note: replace “username” with the service account name). New-ManagementRoleAssignment -Name:ThreatResponseImpersonation -Role:ApplicationImpersonation -user:Domain\ServiceAccount Note -Name: ThreatResponseImpersonation is for example purposes, this can be any unique name that fits within your organization’s naming standards * For FullAccess delegation | Execute the command below to give the service account access to all mailboxes inclusive of shared mailboxes. Be sure to replace username with the service account name. Get-Mailbox -ResultSize unlimited -Filter {(RecipientType -eq 'UserMailbox')} | Add-MailboxPermission -User username -AccessRights FullAccess -InheritanceType all This command can locate all mailboxes (inclusive of shared mailboxes) in Microsoft Exchange as well as granting FullAccess rights to both “regular” and shared mailboxes. Note This action only applies to mailboxes that currently exist in Exchange. When new mailboxes are created, this command will need to be run again to grant access to the new mailboxes. PREPARING MICROSOFT EXCHANGE 2013, 2016 AND 2019¶ Threat Response interfaces with Microsoft Exchange 2013, 2016 and 2019 through the Exchange Web Services API. This chapter details the steps required to determine the Exchange Web Services URL used to interface with Exchange, as well as how to create the quarantine destination, and a service account for Threat Response to use when interacting with Exchange. IDENTIFYING THE EXCHANGE WEB SERVICES URL¶ Threat Response interfaces with Exchange via the Exchange Web Services API. The Threat Response configuration requires that you provide the Exchange Web Services URL so that it can communicate with Exchange. The steps below detail how to find this URL. To identify the Exchange Web Services URL: * Connect to Exchange and start the Exchange Management Shell utility. * Execute the command below to display the Exchange Web Services URL. Get-WebServicesVirtualDirectory|Select name, *url*|fl * Confirm that the Internal URL shown is correct, and routable on your network. This is your Exchange Web Services URL. Make note of the Exchange Web Services URL for now. This will be used when configuring Exchange connectivity in Threat Response. CREATING A LOCATION FOR QUARANTINED EMAILS¶ Threat Response needs a secure location to place emails that have been identified as malicious. This location needs to be a special mailbox created for quarantine purposes. Note This location will contain convicted malware emails identified to contain malicious content, and should be treated as such. Caution should be exercised when handling items in the quarantine. USING A MAILBOX FOR QUARANTINE¶ A mailbox can be used as a quarantine destination for emails deemed to be malicious. A quarantine mailbox can be created via the Exchange Admin Center. To create a quarantine mailbox: * Log in to the Exchange Admin Center from a browser. * Navigate to recipients > mailboxes. * Click the “+” sign to create a new mailbox for quarantined emails. CREATING A SERVICE ACCOUNT FOR THREAT RESPONSE¶ To search user mailboxes and move suspect messages to the quarantine, Threat Response will need an account with elevated permissions. Note Proofpoint recommends creating a dedicated account for performing search and quarantine actions. Important Make sure there is an active mailbox enabled for the service account that has been created and is being used to perform a quarantine using either Full Access permissions or the Application Impersonation role. Note that if there is no mailbox for the service account, quarantining from a regular mailbox will still work but quarantining from distribution lists on Exchange will fail. To create a service account using the Exchange Admin Center: * Log in to the Exchange Admin Center from a browser. * In the Exchange Admin Center, navigate to recipients > mailboxes. * Click the “+” icon to create a new mailbox to serve as the service account. SETTING PERMISSIONS FOR THE SERVICE ACCOUNT¶ The service account will need to be granted access to all user mailboxes that will be protected by the quarantine function. These permissions can be set using the Exchange Management Shell. To assign permissions using the Exchange Management Shell: * Connect to Exchange and start the Exchange Management Shell utility. * For Application Impersonation | Execute the command below to give the service account access to all mailboxes (Note: replace “username” with the service account name). New-ManagementRoleAssignment -Name:ThreatResponseImpersonation -Role:ApplicationImpersonation -user:Domain\ServiceAccount Note -Name: ThreatResponseImpersonation is for example purposes, this can be any unique name that fits within your organization’s naming standards * For FullAccess delegation | Execute the command below to give the service account access to all mailboxes inclusive of shared mailboxes. Be sure to replace username with the service account name. Get-Mailbox -ResultSize unlimited -Filter {(RecipientType -eq 'UserMailbox')} | Add-MailboxPermission -User username -AccessRights FullAccess -InheritanceType all This command can locate all mailboxes (inclusive of shared mailboxes) in Microsoft Exchange as well as granting FullAccess rights to both “regular” and shared mailboxes. Note This action only applies to mailboxes that currently exist in Exchange. When new mailboxes are created, this command will need to be run again to grant access to the new mailboxes. CONFIGURING EWS THROTTLING POLICY¶ The throttling policies in Exchange affect not only EWS, but also all client connections to the Exchange server, including the protocols used by Office Outlook, Outlook Web App, and Exchange ActiveSync. These Throttling policies are assigned per user, and the system has a default throttling policy out of the box. To improve TRAP quarantine speed, we strongly recommend removing EWS Throttling policy for the user account you plan on using for email quarantines. Important Microsoft 365 does not expose throttling policies. Microsoft 365 subscribers should contact Microsoft with any throttling questions. These instructions only apply to on-premise Exchange deployments. THROTTLING SETTINGS FOR APPLICATION IMPERSONATION ROLE VS. FULL ACCESS¶ There are two options for the EWS Service Account configured for TRAP: 1. TRAP EWS User has Full Access Permission: If you’re quarantining using a service account that has Full Access permissions, then just set a throttling policy with unlimited (or high number) EWS settings (as already described in the installation guide) for that account. 2. TRAP EWS User has Application Impersonation role: If you’re quarantining with impersonation, you must create and assign a new throttling policy to quarantine-user, but you must also allow each individual account more head room. To do so, it’s likely that the best course of action is to update the default throttling policy on the network. SETTLING THROTTLING POLICY FOR TRAP EWS USER¶ From the Exchange Management PowerShell (run on the CAS), you can see the existing policies by running: Get-throttlingpolicy To create a new policy that has no EWS throttling and assign it to the quarantine user, do the following: * Create a new policy: New-throttlingpolicy PFPT_ThreatScanner_ThrottlingPolicy * Set the EWS throttling portion of that new policy to “unlimited”: For Exchange 2010, use the following: set-throttlingpolicy PFPT_ThreatScanner_ThrottlingPolicy -EWSMaxConcurrency $null -EWSPercentTimeInAD $null -EWSPercentTimeInCAS $null -EWSPercentTimeInMailboxRPC $null For Exchange 2013, 2016 and 2019: Set-ThrottlingPolicy PFPT_ThreatScanner_ThrottlingPolicy -EWSMaxConcurrency Unlimited -EWSMaxSubscriptions Unlimited -EwsCutoffBalance Unlimited -EwsMaxBurst Unlimited -EwsRechargeRate Unlimited * Assign the policy to the quarantine user: Set-ThrottlingPolicyAssociation -Identity Domain\TRAPService -ThrottlingPolicy PFPT_ThreatScanner_ThrottlingPolicy Note Replace Domain\TRAPService with your service account PREPARING MICROSOFT EXCHANGE ONLINE¶ Threat Response interfaces with Microsoft Exchange Online through the Exchange Web Services API. This chapter details the steps required to determine the Exchange Web Services URL used to interface with Exchange, as well as how to create the quarantine destination, and a service account for Threat Response to use when interacting with Exchange. The service account will be an Azure app registration. Note All Microsoft 365 accounts used can be a shared mailbox which requires no user license. You will need one shared mailbox for quarantine and one shared mailbox for reported abuse. IDENTIFYING THE EXCHANGE WEB SERVICES URL¶ Threat Response interfaces with Exchange via the Exchange Web Services API. The Threat Response configuration requires that you provide the Exchange Web Services URL so that it can communicate with Exchange. In Exchange Online deployments, this is a standard URL that is used for all Exchange Online customers. Exchange Online EWS URL: https://outlook.office365.com/EWS/Exchange.asmx Make note of the Exchange Web Services URL for now. This will be used when configuring Exchange connectivity in Threat Response. CREATING A MAILBOX FOR QUARANTINED EMAILS¶ Threat Response needs a mailbox to place emails that have been identified as malicious. This mailbox should be dedicated for quarantine purposes. Note This location will contain emails identified to contain malicious content. Caution should be exercised when handling items in the quarantine. To create a quarantine account in Microsoft 365: * Log in to the Microsoft 365 Portal as an admin user. * Click on the Exchange Admin Center * In Exchange Admin Center navigate to Recipients > Mailboxes. * Click the “Add a shared mailbox” button to create a quarantine mailbox. Note The name of the mailbox, e.g. Inbox, must be in the English language, as per Microsoft’s instructions, in order to allow Threat Response to access it. ENABLING AZURE AD AUTHENTICATION¶ To search user mailboxes and move suspect messages to the quarantine, Threat Response will need elevated permissions. Note In version 4.2.0, Threat Response added support for Azure AD Authentication (“Modern Auth”) for Microsoft 365 configurations. This authentication method is not supported for on-premise Exchange deployments. Important Basic Auth for O365 is no longer recommended by Proofpoint. If you are still using Basic Authentication on O365 we recommend changing to Azure AD Auth as Basic Authentication will be deprecated on or around the second half of 2021. Microsoft began to disable Basic Authentication for newly created tenants by default and began to disable Basic Authentication in tenants that have no recorded usage starting October 2020. Azure AD Authentication provides a more secure, certificate-based method of authenticating to Microsoft 365. It also simplifies assigning permissions. CREATING AN APPLICATION IN AZURE AD¶ 1. Launch Azure Active Directory. (https://portal.office.com/adminportal/home#/homepage) 2. Click Admin Centers, then Azure Active Directory. 3. Click App Registrations (not Enterprise Applications). 4. Click New Registration. 5. Register the application. * Enter a name for the App. It can be anything. Try to keep it unique against the other apps already registered. * For Supported Account Types select the Accounts in this organizational directory only radio button. * Leave the Redirect URI blank. * Click Register at the bottom of the page. 6. Record/Save the Application (client) ID and the Directory (tenant) ID. These will be needed later when configuring Threat Response. Tip Clicking on the ID field gives a little icon to “copy to clipboard” CREATING A CERTIFICATE AS A KEY FOR THE APPLICATION¶ Note that it is possible to accomplish this task in two different ways: 1. Option one includes the following instructions for uploading the certificate file. Navigate to Microsoft Azure’s application registration for the client application and Select Certificates & Secrets. Click on Upload Certificate and then select the certificate file to be uploaded. Click on Add. Once the certificate is uploaded, the thumbprint, start date, and expiration values should be displayed. 2. Option two includes both the following information and the instructions contained in the Installing the Certificate Into the Application’s Manifest section below. Note You must have Powershell 3 or higher to execute the commands below Execute the following Powershell commands (in this example, we’re in the directory c:\temp\oauth_cert). These commands will create a self-signed cert in the variable $cert, then generate a thumbprint so it can be registered in Azure. For this example, the certificate is set to expire 3 years from now. $cert=New-SelfSignedCertificate -Subject "CN=TRAP_cert" -CertStoreLocation "Cert:\CurrentUser\My" -KeyExportPolicy Exportable -KeySpec Signature -NotAfter (Get-Date).AddYears(3) $bin = $cert.RawData $base64Value = [System.Convert]::ToBase64String($bin) $bin = $cert.GetCertHash() $base64Thumbprint = [System.Convert]::ToBase64String($bin) $keyid = [System.Guid]::NewGuid().ToString() $jsonObj = @{customKeyIdentifier=$base64Thumbprint;keyId=$keyid;type="AsymmetricX509Cert";usage="Verify";value=$base64Value} $keyCredentials=ConvertTo-Json @($jsonObj) | Out-File "keyCredentials.txt" The contents of keyCredentials.txt will be used in the next section. Execute the following Powershell commands to export the cert as a PFX file so it can be securely uploaded to Threat Response. Remember to update “password” to contain your chosen secure password. Export-Certificate -Cert $cert -FilePath .\cert.cer $mypwd = ConvertTo-SecureString -String "password" -Force -AsPlainText Export-PfxCertificate -cert $cert -FilePath .\cert.pfx -Password $mypwd INSTALLING THE CERTIFICATE INTO THE APPLICATION’S MANIFEST¶ In order to associate the generated certificate with the newly created app, we must modify the Manifest in Azure AD. 1. Go to the newly created app in the Azure Active Directory, under App Registrations, and click Manifest 2. Replace the contents of the keyCredentials property with the contents of keyCredentials.txt, and then save the manifest. ASSIGNING PERMISSIONS TO THE APPLICATION¶ Complete the following steps to tell Azure AD that our application has permission to use Exchange. 1. Click API Permissions. 2. Click Add a Permission. 3. The Microsoft APIs tab will be selected by default. Select the APIs my organization uses tab and then search for Microsoft 365. 4. Select Microsoft 365 Exchange Online and then Application permissions on the next screen. 5. Select full_access_as_app to grant application permissions and then click Add Permission at the bottom of the screen. 6. Lastly, click Grant admin consent. The application has now been granted the necessary permissions to use Exchange. THREAT RESPONSE CONFIGURATION¶ Configuring Threat Response for Exchange integration requires that you create an Exchange Server device in Threat Response. This device will hold all of the information that Threat Response needs to interface with Exchange to quarantine messages, including the EWS URL, quarantine location, and service account to use when interfacing with Exchange. CONFIGURING EXCHANGE CONNECTIVITY IN THREAT RESPONSE¶ In order for Threat Response to communicate with an Exchange Server it must be properly configured in the System Settings. To add an Exchange server in the System Settings: * Log in to Threat Response. * Using the top menu bar open the settings menu and navigate to the System settings page. * Navigate to Email Integration > Exchange servers * Click the blue Add (+) button next to Microsoft Exchange Servers to bring up the New Microsoft Exchange Server panel. * Set the following fields: * Enabled: Check the box if you want to enable the configuration for the Exchange server; if off, the configuration will be saved but not enabled * Name: A label / name for this Exchange Server. * Exchange Web Services URL: The complete EWS URL for the exchange instance. * MessageID search: Check this option to fallback to searching the mailbox for the message if the message-ID is missing from the alert, and the alert type is URL-based. * Scan Recoverable Items: Allows the quarantine of deleted items that remain in the recoverable items folder. * Scan Exchange Online Archive: Allows messages to be quarantined out of EOA (Exchange Online Archive). * Use configured proxy: Allows Threat Response to use or bypass proxy configuration (typically used for communication to on-premise Exchange). * Quarantine mailbox: The SMTP address of the quarantine mailbox. * Authentication Type: Choose Azure AD or NTLM/Basic Authentication * For Basic Authentication set the following fields: * Microsoft 365: Do not check this option since Basic Authentication is only used for Exchange Onprem. * Username: Username used to login to EWS (typically a service account). Typically entered as domain\user or in UPN format. * Password: Password used to login to EWS. * Use impersonation: Check this option if you want to use the Application Impersonation role (for the credentials that you created for Threat Response). Uncheck this option if you’re using full mailbox access. * Quarantine folder name: The name of the mailbox folder that quarantined messages should be placed into (not available if using Application Impersonation). * Create folder per mailbox: Check this box to organize quarantined emails into separate recipient folders below the quarantine folder (not available if using Application Impersonation). * With impersonation mode, custom headers to emails are configurable and visible when a message in the end-user’s mailbox is quarantined and restored. * Quarantine header (impersonation mode only): This header informs the user that the message was originally quarantined for a reason. * Undo quarantine header (impersonation mode only): This header informs the user that the quarantined message was restored back into the mailbox for a reason. * For Azure AD set the following fields: * Application ID: Enter the Application ID of the app created in Azure AD * Tenant ID: Enter your Microsoft 365 tenant name (e.g. customer.onmicrosoft.com) * Authentication Endpoint: For most deployments, the value should be https://login.windows.net (default). If you are deploying TRAP in a geography (e.g. China, Germany) that requires a different Microsoft authentication endpoint, please change this field to your local authentication end-point recommended by Microsoft. * Private key file: Choose the .pfx file you saved with the application private key * Private key password: Enter the password for the .pfx file * Click Save to complete the configuration Test Exchange Server button enables the user to test the configuration and reflect any errors in the Microsoft Exchange Servers table (red or green indicator icon). With a successful configuration in place, you will see a green status icon next to the newly created Exchange Server in Threat Response. Previous Juniper SRX Next Palo Alto Networks Copyright Proofpoint 2019