Skip to main content
My preferencesSign out
Proofpoint, Inc.

Now Available: Integrated Deployment with Microsoft 365

 
Integrated Deployment with Microsoft 365

Seamless Email Protection without MX record changes

 

What's New?

Why it Matters...

Deployment Methods

  • No MX Record Changes Required
    • Email flows directly to Microsoft 365, which then routes mail to Proofpoint Essentials for filtering. 
  • Seamless Setup
    • Automate configuration of Microsoft 365 rules and connectors; applies best-practice security configuration 
  • Hassle-free Protection
    • Deploying Proofpoint Essentials to a Microsoft 365 tenant is now easier than ever, saving time and ensuring accuracy. 
  • Faster, Simpler Deployment
    • No MX record changes means less disruption to users 
  • Same Advanced Threat Protection
    • Get industry leading email protection even without MX
  • MX-Based Deployment Still Available
    • Choose the right deployment method to suit your needs.

MX Deployment
(Traditional SEG)

Screenshot 2025-04-18 at 11.12.02 AM.png

Integrated Deployment

 

Screenshot 2025-04-18 at 11.12.27 AM.png

 

How does it Work?

When an email is sent to your organization, Microsoft 365 and Proofpoint Essentials work together seamlessly to ensure it is safe, compliant, and delivered reliably.

 

Microsoft 365

Advanced Email Security
with Proofpoint Essentials

Delivery to Users Inbox

Integrated Deployment

  1. Email is sent to an recipient email address.
  2. The MX record for the recipient's domain points to Microsoft 365.
  3. Microsoft 365 receives the email, applies its native protection (email authentication, anti-spam/anti-virus, anti-malware and anti-phishing protection).
  4. Customer-specific Proofpoint Essentials identifires are added to the headers of cleared emails and are securely routed to Proofpoint Essentials.
  1. Emails are received by Proofpoint Essentials
  2. Emails are filtered through Proofpoint's multi-layered detection engine which includes protection against commodity and advanced threats including Advanced Malware, Phishing and Business Email Compromise (BEC).

  3. Emails are further filtered against customer created content policies (including DLP).
  4. If an email contains any threats or violates content policies, the email is quarantined by Proofpoint Essentials, and available for review.
  5. Cleared emails are routed back to Microsoft 365.
  1. Emails are delivered to the user's mailbox.
Screenshot 2025-04-18 at 11.08.54 AM.png

 

Available Resources