🧪 Community ✓ Claude Code ✓ Claude Desktop • Email Security
Proofpoint
Proofpoint Email Protection - TAP, quarantine, threat intel, forensics, URL defense, VAP reports
Installation
Install this plugin individually:
/plugin marketplace add wyre-technology/msp-claude-plugins --plugin proofpoint Or install all MSP plugins at once:
/plugin marketplace add wyre-technology/msp-claude-plugins Features
- Forensics
- People
- Quarantine
- Tap
- Threat Intel
- Url Defense
Skills
This plugin provides 7 skills that teach Claude about Proofpoint:
| Skill | Description |
|---|---|
forensics | Use this skill when working with Proofpoint forensics and threat response - auto-pull, search and destroy, message trace, evidence collection, and remediation workflows. |
people | Use this skill when working with Proofpoint people-centric security - Very Attacked People (VAP) reports, top clickers, user risk scoring, attack index, and user-level threat analytics. |
quarantine | Use this skill when working with Proofpoint email quarantine - listing, searching, releasing, and deleting quarantined messages. |
tap | Use this skill when working with Proofpoint Targeted Attack Protection (TAP) - retrieving threat events, click tracking, message delivery and blocking data, SIEM integration feeds, and threat type analysis. |
threat-intel | Use this skill when working with Proofpoint threat intelligence - campaign tracking, threat families, indicators of compromise (IOCs), forensic evidence, and threat landscape analysis. |
url-defense | Use this skill when working with Proofpoint URL Defense - URL rewriting, URL decoding, real-time URL analysis, click-time protection, and URL investigation. |
api-patterns | Use this skill when working with the Proofpoint API - authentication using HTTP Basic Auth with service principal and secret, base URLs, rate limits, pagination, error codes, and common integration patterns. |
Commands
Available slash commands:
| Command | Description |
|---|---|
/check-threats | View recent TAP threat events including blocked messages, delivered threats, and click activity |
/decode-url | Decode a Proofpoint URL Defense rewritten URL back to the original URL |
/investigate-threat | Deep-dive threat investigation with forensics, campaign context, and remediation options |
/release-quarantine | Release one or more quarantined messages to their intended recipients |
/search-quarantine | Search quarantined messages in Proofpoint by sender, recipient, subject, or reason |
/vap-report | Get the Very Attacked People (VAP) report showing the most targeted users |
API Reference
| Base URL | |
| Authentication | |
| Rate Limit | |
| Documentation |
Example Usage
View recent TAP threat events including blocked messages, delivered threats, and click activity
/check-threats Decode a Proofpoint URL Defense rewritten URL back to the original URL
/decode-url Deep-dive threat investigation with forensics, campaign context, and remediation options
/investigate-threat Release one or more quarantined messages to their intended recipients
/release-quarantine Search quarantined messages in Proofpoint by sender, recipient, subject, or reason
/search-quarantine Get the Very Attacked People (VAP) report showing the most targeted users
/vap-report Using Skills
/skill proofpoint:forensics
Use this skill when working with Proofpoint forensics and threat response - auto-pull, search and destroy, message trace, evidence collection, and remediation workflows.