Skip to main content

Proofpoint Threat Response

Download With Dependencies

Use the Proofpoint Threat Response integration to orchestrate and automate incident response.

Proofpoint Threat Response

Proofpoint Threat Response

Overview

Proofpoint Threat Response is a security solution that helps organizations detect, analyze, and respond to threats quickly. It automates threat investigation and incident response to reduce risk and response time. By integrating with other security tools, it streamlines workflows and improves overall security operations.

This pack includes:

  • Rest API integration for security incidents
  • Modeling rules

Configure Proofpoint Threat Response Event Collector in Cortex XSIAM

Parameter Description Required
Server URL (e.g., https://192.168.0.1) True
API key for the authentication True
Trust any certificate (not secure) If set to false, trusts any certificate (not secure). False
Use system proxy settings False
First fetch timestamp (<number> <time unit>, e.g., 12 hours, 7 days) The time range for the initial data fetch. If timeout errors occur, consider changing this value. False
Fetch limit - maximum number of incidents per fetch False
Fetch delta - The delta time in each batch. e.g. 1 hour, 3 minutes. The time range between create_after and created_before that is sent to the API when fetching older incidents. If timeout errors occur, consider changing this value. False
Fetch incidents with specific event sources. Can be a list of comma-separated values. False
Fetch incidents with specific state 'Abuse Disposition' values. (Can be a list of comma-separated values.) False
Fetch incident with specific states. False
POST URL of the JSON alert source. You can find this value by navigating to Sources -&gt; JSON event source -&gt; POST URL. False

Commands

You can execute these commands from the CLI, as part of an automation, or in a playbook.
After you successfully execute a command, a DBot message appears in the War Room with the command details.

proofpoint-trap-get-events


Retrieves all incident metadata from Threat Response by specifying filter criteria such as the state of the incident or time of closure.

Base Command

proofpoint-trap-get-events

Input

Argument Name Description Required
should_push_events If true, the command will create events, otherwise it will only display them. Default is false. Required
state The state of the incidents to retrieve. Possible values are: new, open, assigned, closed, ignored. Optional
created_after Retrieve incidents that were created after this date, in ISO 8601 format (UTC). Example: 2020-02-22 or 2020-02-22T00:00:00Z. Optional
created_before Retrieve incidents that were created before this date, in ISO 8601 format (UTC). Example: 2020-02-22 or 2020-02-22T00:00:00Z. Optional
closed_after Retrieve incidents that were closed after this date, in ISO 8601 format (UTC). Example: 2020-02-22 or 2020-02-22T00:00:00Z. Optional
closed_before Retrieve incidents that were closed before this date, in ISO 8601 format (UTC). Example: 2020-02-22 or 2020-02-22T00:00:00Z. Optional
expand_events If false, will return an array of event IDs instead of full event objects. This will significantly speed up the response time of the API for incidents with a large number of alerts. Possible values are: true, false. Optional
limit The maximum number of incidents to return. Default is 100. Required

Context Output

There is no context output for this command.

PUBLISHER

PLATFORMS

Cortex XSOARCortex XSIAM

INFO

CertificationRead more
Supported ByCortex
CreatedSeptember 23, 2020
Last ReleaseMay 14, 2025
WORKS WITH THE FOLLOWING INTEGRATIONS:

DISCLAIMER
Content packs are licensed by the Publisher identified above and subject to the Publisher’s own licensing terms. Palo Alto Networks is not liable for and does not warrant or support any content pack produced by a third-party Publisher, whether or not such packs are designated as “Palo Alto Networks-certified” or otherwise.