Proofpoint Data Protection
Audience: Security administrators, IT administrators, Compliance officers
Purpose: Enterprise data loss prevention using Proofpoint DLP and CASB solutions
Quick Links
| Resource | Description |
|---|---|
| DLP Onboarding | Implement Proofpoint Endpoint DLP for your unit |
| DLP Acceptable Use | Guidelines for appropriate DLP agent deployment |
| CASB Alerts | Process Cloud Access Security Broker alerts |
| Proofpoint Dashboard | Proofpoint admin console |
Overview
Proofpoint provides enterprise data protection through two key solutions:
| Component | Description |
|---|---|
| Endpoint DLP | Monitor and prevent data exfiltration from endpoints |
| CASB | Visibility and control over cloud application usage |
Microsoft Purview
For Microsoft Purview documentation (sensitivity labels, compliance, eDiscovery), see M365 > Purview.
Key Documents
Implementation Guide
The Enterprise Implementation Guide provides a complete playbook covering:
- Phase 0: Leadership and policy decisions
- Phase 1: Foundational setup and licensing
- Phase 2+: Classification, protection, governance, and monitoring
Email DLP
The Email DLP & Encryption Guide covers:
- Defining sensitive data types (SSN, UIN, PHI)
- Microsoft 365 and Google Workspace DLP
- Automatic encryption for external emails
eDiscovery
The eDiscovery Guide provides:
- Case management best practices
- Legal hold procedures
- KeyQL query syntax
- Export and production workflows
Related Resources
- Security Documentation — Email, cloud, and data protection
- Entra ID — Identity management
- SharePoint — Content management