Proofpoint SER App Onboarding Guide v1.4
Proofpoint SER App Onboarding Guide v1.4
SER is a cloud-based SMTP relay that secures application transactional email using your company's domains. Internal or 3rd party
applications connect to SER in a secure manner and all email is DKIM-signed and scanned with Proofpoint anti-spam/anti-virus
technology prior to being distributed to the Internet.
• Multiple Envelope From: / Header From: combinations with domains your company owns can be specified for the same SER
SMTP Credential
• SMTP Authentication credentials are restricted to use with specific combinations of Envelope From (a.k.a. RFC 5321 /
MFROM) and Header From (a.k.a. RFC 5322 / HFROM) sending addresses.
The domains of the addresses must be owned by your company/organization and the user-portion (to the left of the “@”)
can be “wildcard”.
Subdomains must be explicitly specified.
• Email address of the individual to send the credentials to: Email address (SMTP Authentication credentials will be sent via
Proofpoint SecureShare)
• Sending IP address(es) (optional; the SMTP Authentication credentials can be locked down to this IP(s) / CIDR)
• Maximum Message Size: default max is 5MB. Max possible is 50MB. Recommend requesting higher than expected maximum
size. There is no additional charge for higher limit.
STEP 2:
Configure your application to connect to SER using the following information / configurations:
1
SECURE EMAIL RELAY
SPF:
Add the POD SER IP addresses to the SPF records of the Envelope From domain(s) being used by applications (see 'INSTRUCTIONS
FOR APPLICATION OWNERS" (above). Refer to Welcome Letter for the SER POD IP addresses.
For IP warmup purposes, adding SER Shared IP addresses may be recommended by Professional Services consultant.
2
SECURE EMAIL RELAY
TROUBLESHOOTING TIPS
If connecting from internal network, connectivity must be allowed through firewall to the following:
authnz.proofpoint.com
205.220.188.0/24
205.220.189.0/24.
SMTP Authentication credentials are restricted to use with specific combinations of Envelope From (a.k.a. RFC 5321 / MFROM) and
Header From (a.k.a. RFC 5322 / HFROM) sending addresses. Any failures related to this will be communicated over the SMTP
connection as 5XX errors.
3
SECURE EMAIL RELAY
SMTP Authentication credentials have a default configuration that limits emails to 5MB (base64 encoded). This limit can be
increased up to 50MB upon request of ser-support@proofpoint.com. Any failures related to this will be communicated over the
SMTP connection as 5XX errors.
Is the application attempting to TLS-encrypt the SMTP connection with an unsupported cipher?
Please confirm there's compatibility between the ciphers being negotiated. Below are the ciphers supported by SER:
ECDHE-RSA-AES256-GCM-SHA384
ECDHE-RSA-AES128-GCM-SHA256
ECDHE-RSA-AES256-SHA384
ECDHE-RSA-AES128-SHA256
ECDHE-RSA-AES256-SHA
ECDHE-RSA-AES128-SHA
AES256-GCM-SHA384
AES128-GCM-SHA256
AES256-SHA256
AES128-SHA256
AES256-SHA
AES128-SHA
RC4-SHA
DES-CBC3-SHA
This applies to email being routed from SER to a Proofpoint Gateway (i.e. emails originating externally and being sent to employees).
In general, is there anything configured on the Gateway that could be blocking email? Is the Proofpoint "Anti-Spoof"
rule, specifically, configured and blocking email?
In this case, please create an exception for email coming from SER IPs (see Page 1)
proofpoint.com