Back to Browse

Proofpoint TAP Malicious Email Attachment Defense Configuration – Tutorial

11.0K views
Oct 28, 2020
4:03

More than 90% of targeted attacks start with email, including threats delivered through malicious attachments. Email attachments are successful in penetrating security holes for several reasons, one of them being the difficulty in blocking attachments. Find out how Proofpoint Attachment Defense hashes and scans for malware contained in malicious attachments, such as Word, Excel, PowerPoint, and more. Watch as this video tutorial guides you through the basics of Proofpoint Attachment Defense and how it works using a seven-step process. You will learn how to navigate the Email Protection dashboard to configure Email Attachment Defense. Learn about the different setting capabilities, policy route changes, and predefined rule variations available to suit your organization’s needs. Protect your people and your organization against email threats delivered through malicious attachments – Proofpoint TAP is especially effective at identifying hard-to-catch threats that other solutions miss. Powered by @Proofpoint https://www.youtube.com/watch?v=t_RRyzEl4y8 #Proofpoint https://www.thobson.com/ https://www.facebook.com/ThobsonTechnologies https://www.linkedin.com/company/thobson/

Download

0 formats

No download links available.

Proofpoint TAP Malicious Email Attachment Defense Configuration – Tutorial | NatokHD