8.22.X Release Notes - Reva - 8.22.0
8.22.X Release Notes - Reva - 8.22.0
This document describes what is new in the Proofpoint Protection Server 8.22.X feature Release. The
information applies to both on-premise and PoD deployments unless stated otherwise.
Contents
Release 8.22.0
The following sections describe new features, changes, and enhancements included in release 8.22.0.
Proprietary and Confidential © 2025 – Proofpoint, Inc. March 2025 Rev A - Page 1 of 14
Unauthorized Relay Abuse Protection
Release 8.22.0 includes improvements to the Microsoft O365 Allow Relay option to protect your
deployment from unauthorized relay abuse. Administrators can enable Allow Relay for only the tenant
domains listed for Inbound Mail (System > Inbound Mail) and any additional tenant domains that are
trusted and allowed – these must be added to a list by the administrator on the System > Outbound Mail
> Allow Relay page. These tenant domains can be found in Settings > Domains in the Microsoft 365
admin center.
For testing and auditing purposes, messages that are not allowed from domains initially have a Delivery
Method of Continue to be delivered to the email infrastructure and a copy is sent to a new Quarantine
folder M365 Unauthorized Relay. Once administrators are satisfied that the configuration is working as
expected, they can change the Delivery Method for unauthorized messages to Reject and disable the
Quarantine copy.
Messages that land in the M365 Unauthorized Relay Quarantine folder are excluded from Digests for the
user community.
Proofpoint leverages the x-originatororg header that Microsoft applies to every message when it
leaves its tenant to identify these messages for the M365 Allow Relay feature.
Upgrade Customers
Nothing will change for customers upgrading from a previous release who have enabled Allow Relay for
Any M365 tenant – Email Firewall rules they already have in place for unauthorized domains will not be
touched, and the Delivery Method for those messages will remain in place. After an upgrade,
administrators can decide if they want to configure Allow Relay for Microsoft Office 365 to reject
messages from unauthorized M365 domains using the new parameters on the System > Outbound Mail
> Allow Relay page.
New Installations
New customers will have the default setting Allow Relay for Only M365 tenant domains listed in Inbound
Mail and the additional domains below enabled by default, and the Delivery Method will be set to
Continue by default, with a copy of unauthorized messages sent to the M365 Unauthorized Relay
Quarantine folder. Administrators can test the feature and then change the Delivery Method to Reject and
disable the Quarantine copy for unauthorized messages when satisfied with the results.
Proprietary and Confidential © 2025 – Proofpoint, Inc. March 2025 Rev A - Page 2 of 14
SAML 2.0 Import Profiles and Certificates
This change applies to the SAML 2.0 Import/Auth Profile. Customers must generate a unique certificate
or supply their own certificate for request signing. They can no longer use the default Proofpoint
certificate for request signing. If you are currently using a Proofpoint certificate, upon upgrade you will see
a warning dialog to generate a new certificate. The SAML 2.0 Import/Auth Profile dialog box displays a
new link, Manage Certificates that takes you to the System > Certificates > Certificates page.
SSLv3 – Deprecated
For the TLS Minimum Protocol Version (System > SMTP Encryption > Settings), SSLv3 is deprecated
for security reasons.
Customers currently using SSLv3 as the minimum protocol for SMTP Encryption will automatically be
updated to use TLS 1.0 as the minimum upon upgrading to release 8.22.0.
Now in release 8.22.0, this hidden text will also be removed when the tag is removed.
This feature is off by default. If an outbound message contains a DLP violation in the first few lines of the
original message (the hidden text), it could trigger a DLP rule and be quarantined.
Proprietary and Confidential © 2025 – Proofpoint, Inc. March 2025 Rev A - Page 3 of 14
Proofpoint on Demand customers need to open a support ticket to enable this change to Email Warning
Tags (remove the hidden text).
On-premise administrators who want to enable the feature can do so by changing these filter.cfg
keys to “t” .
com.proofpoint.filter.module.banner.construct.preheader.removal=t
com.proofpoint.filter.module.banner.destruct.preheader.removal=t
PoD customers must submit a helpdesk ticket to enable the new configuration option.
On-premise administrators who control the filter.cfg file must enable the following two keys:
com.proofpoint.encrypt.securereader.pwdreset.verificationcode.enable=t
(if password reset via Email is enabled for Secure Reader ) *
com.proofpoint.encrypt.securereader.registration.verificationcode.manual=t
*User Management > Password Policies > Encryption_Users > Password Reset tab.
Variable – Added support for the Variable condition to the Email Firewall module. This condition is
generally used for custom rules and integrations and previously needed to be set up by Professional
Services. It is now exposed in the UI, allowing for administrators to make changes to rules referencing
this condition themselves.
Proprietary and Confidential © 2025 – Proofpoint, Inc. March 2025 Rev A - Page 4 of 14
Folder Limit
Administrators are limited to 400 folders (total) for the Quarantine and Data Loss Protection Incidents. If
you try to create a folder that will exceed this limit, you will see an error message.
Summary Digest
Summary Digests are not compatible with the Proofpoint Cloud Quarantine Service. There are no plans at
present to re-introduce this functionality, but if it is important to you, please submit a Request for
Enhancement in the Proofpoint feedback portal. Proofpoint will consider similar feedback, if any, from our
broader customer base to determine if this request should be considered in the future. If users are
interested in viewing all messages in their quarantine, they can do so by logging in to the End User
Portal.
Release 8.22.0 requires a minimum of 8 GB of RAM for each system in your deployment. Updates to
release 8.22.0 will fail if there is insufficient RAM on the Config Master and each agent in the cluster.
Release 8.22.X adds support for SSH keys using the ED25519 algorithm. Some SSH clients may refuse
to connect and authenticate due to the change in host key algorithms. There are three ways to resolve
this issue:
1. Configure the SSH client to only use the host key algorithm it already has, or
2. Manually add the ED25519 key to the SSH client’s known_hosts file, or
3. Delete the existing entry from the client’s known_hosts file and use the default Trust On First
Use option to obtain the new keys.
If upgrading from a version prior to 8.18.6, administrators must upgrade all outbound clusters that
remove Email Warning Tags before upgrading inbound clusters that insert Email Warning Tags.
Proprietary and Confidential © 2025 – Proofpoint, Inc. March 2025 Rev A - Page 5 of 14
Rollback Notes
Reference Description
Previously, messages that were quarantined by Smart Send were not being
PPS-43204 consistently DKIM-signed when released from the Quarantine. This issue is
resolved.
In rare cases valid S/MIME signed messages would fail validation. This issue
PPS-44342
is resolved.
The Quarantine REST API will now display Data Loss Protection (DLP)
PPS-75813
violations and details as expected.
Proprietary and Confidential © 2025 – Proofpoint, Inc. March 2025 Rev A - Page 6 of 14
Reference Description
Previously, if you exported TLS Domains on the System > SMTP Encryption
> TLS Domains page, made edits to the CSV file, and imported the file, your
PPS-75815
changes were not preserved unless you also added a new domain to the
exported file. This issue is fixed and now works as expected.
Improvements to the user import process to better handle situations in which
the user database becomes unavailable during the import. When this
PPS-75987
happened, it could result in users being removed from the database. This
issue is resolved.
This issue applies to Message Defense for Targeted Attack Protection.
Previously, in the rare circumstance that Proofpoint experienced a
PPS-76158 communication failure in the TAP infrastructure during scanning, attachments
were being continuously re-submitted for scanning, possibly resulting in “loops
exceeded limit” error. This issue is fixed.
Previously, after patch 4502 was installed, the System > Licenses and
Updates > General page in the Admin GUI would display garbled characters.
PPS-78960
This was purely a display issue and had no impact on the successful
installation of the patch. This issue is resolved.
This fix applies to Email Warning Tags on the Tag Customization page.
Previously, if an administrator deleted the text in the Body text box and saved
PPS-79360
their changes, the text box would disappear until the administrator selected
Reset to Defaults. This issue is resolved.
Previously, new certificates added to the System > Certificates >
PPS-79557 Certificates page on the Config Master were not consistently being
propagated to new agents added to a cluster. This issue is resolved.
This issue applies to PPS Virtual Appliances. If your virtual appliance has a
PPS-80282 dual interface, the upgrade will fail with an appropriate message if your
deployment is configured with interfaces no longer supported by VMware.
This issue applies to PoD deployments. Administrators were receiving an error
PPS-80897 message if they tried to make changes to remote syslog configuration on the
Logs and Reports > Log Settings page. This issue is resolved.
In Smart Search, when you search for messages that triggered insertion of an
PPS-81423 Email Warning tag, Smart Search will only return messages that actually had a
tag inserted into a message or removed from the message.
Proprietary and Confidential © 2025 – Proofpoint, Inc. March 2025 Rev A - Page 7 of 14
Reference Description
The Extract Text from Images radio button on the System > Settings >
PPS-84219
System page will now appear as disabled by default upon an upgrade.
Querying the Quarantine API will now default to the Quarantine folder if no
PPS-84278
folder name is specified.
Querying the Quarantine API using the wildcard * in sender or recipient (from
PPS-84293
or rcpt) in the search criteria will now return the expected results.
This issue applies to Email Protection > Spam Detection > Settings >
Impostor Display Names. If you add a record to the Impostor Display
PPS-84365 Names page, and do not include an email address for the Display Name in the
dialog box, inbound messages address to that display name will be flagged as
Impostor.
This issue was found when the Send a copy of unmodified email to
address option is enabled for URL Rewrite Policies, and your organization
has purchased Proofpoint Archiving. If your deployment has also enabled
PPS-84373
Email Warning Tags, if the message contained more than one recipient, the
send a copy option would archive multiple copies of a tagged message. This
issue is resolved.
This fix applies to the Information Protection > DLP Incidents > Incidents
page. When viewing the Email DLP details, the matches in the left panel did
PPS-84391
not always highlight the proper matches for the content on the right panel. This
issue is fixed.
This issue would happen if a deployment contained a large number of
Quarantine folders. When the administrator clicked the magnifying glass in the
PPS-84440 Final Action column of a Smart Search query result to navigate to the
message details in the Quarantine, an error message was displayed instead of
the expected Quarantine details. This issue is resolved.
This issue applies to the Alerts feature for message injection rate for
PPS-84563 Quarantine and DLP Incidents folders. Previously, the alert did not accurately
trigger according to the threshold settings. This issue is resolved.
In rare circumstances, adding or removing a domain on System > Inbound
PPS-84616 Mail could cause all domain references to appear as “ARRAY”. This issue has
been resolved.
Previously, in some cases a rule in Information Protection > Regulatory
Compliance with Type selected as Match Condition Per MIME Part making
PPS-84672
use of the MIME Type condition would fail to trigger as expected. This issue is
fixed.
Proprietary and Confidential © 2025 – Proofpoint, Inc. March 2025 Rev A - Page 8 of 14
Reference Description
This fix applies to the Regulatory Compliance Module and Smart Identifiers.
When rules triggered for attachments that had multipart/alternative parts that
PPS-84977 were containers and not simple text or HTML, incorrect counts for the number
of occurrences of the Smart Identifier (for example, a Social Security Number)
were reported. This issue is resolved.
This issue applies only to PoD deployments. Previously, changes to Remote
PPS-85043 Log Options on the Logs and Reports > Log Settings page were not being
propagated to all agents in the cluster as expected. This issue is resolved.
The daemon for the McAfee Anti-Virus engine would occasionally exit
PPS-85087 incorrectly, causing delays in message processing until it was manually re-
started. This issue is resolved.
This fix applies to the System > SMTP Encryption > Settings feature. If you
change the cypher strength for TLS Domains and enable TLS Fallback, the
PPS-85092
new cipher strength would not be propagated to the tlsfallback SMTP Profile.
This issue is resolved.
Users may have received a “Bad Request" error when trying to read an
PPS-85237 encrypted message that contained an attachment in Secure Reader. This
issue has been resolved.
This fix applies to editing rules in the Targeted Attack Protection > Message
PPS-85329 Defense module. In certain cases, the “discard” action would be removed after
saving the edited rule. This issue has been resolved.
Proprietary and Confidential © 2025 – Proofpoint, Inc. March 2025 Rev A - Page 9 of 14
Reference Description
In some cases, messages that were re-injected for filtering could have their
PPS-85471 route direction improperly calculated, potentially affecting delivery depending
on configuration. This issue is resolved.
Improvements have been made to reduce memory usage and improve system
PPS-85475 stability when saving changes to a large virtuser table or making very
frequent smaller configuration changes.
Duplicate domain entries in System > SMTP Encryption > TLS Domains
PPS-85532 could prevent the TLS configuration applying as expected. This issue is
resolved.
This issue applies to the End User Services > Filters > Users page. When
Include Users with Messages in the Quarantine was enabled, and a Digest
PPS-85553
was sent to a user who was not included in the User Repository, the user
could not release his or her message. This issue is resolved.
URL Rewrite would fail to rewrite URLs in messages that resembled PGP
PPS-85741
messages by the appearance of a PGP header string. This issue is resolved.
This fix applies to deployments that include Unified Alert Manager for
Proofpoint Cloud Services. Previously, if a message was split for several
PPS-85891 recipients and triggered a DLP violation that included both encryption and
quarantine actions, the DLP event was not available in the Unified Alert
Manager for the message. This issue is resolved.
This fix applies to the delivery option Change Message Headers. Using certain
PPS-85970 template variables as the value would produce an error message and the rule
could not be saved. This issue is fixed.
In some situations, Proofpoint-generated non-delivery reports would include
PPS-85988 an additional To: header which could result in them not being accepted for
delivery by some mailbox providers. This issue is resolved.
Proprietary and Confidential © 2025 – Proofpoint, Inc. March 2025 Rev A - Page 10 of 14
Reference Description
This issue was found when a deployment had multiple Sub-Orgs with an
administrator for each one. In some cases, an administrator from one Sub-Org
PPS-86036
was able to search for users belonging to another Sub-Org. This issue is
resolved.
This fix applies to the Information Protection > DLP Incidents > Incidents
page. Previously, if there were Comments for the Status of the message, and
PPS-86049
you exported the incident details to a CSV file, the Comments would not be
included in the export. This issue is fixed.
In rare cases, deployments using IPv6 for sendmail would not correctly use
127.0.0.1 when TLS Fallback to Proofpoint Encryption was enabled. The
PPS-86096
tlsfallback SMTP profile would use ::1 instead of 127.0.0.1. This issue is
resolved.
Two DLP folder access control issues have been fixed:
1. The administrator was unable to view the content of the messages in the all
folders view (DLP Incidents > Incidents > all folders from the drop-down list.)
The messages appeared in the list but clicking them did not return message
PPS-86399
content.
2. With certain access control permissions, if the role had access to anything
less than all of the Quarantine folders, then the Add and Delete folder options
were missing from the DLP Incidents > Folders view.
Legitimate messages that were re-injected could cause the M365 Relay Abuse
PPS-86755
protection rules to incorrectly trigger. This issue has been resolved.
Proprietary and Confidential © 2025 – Proofpoint, Inc. March 2025 Rev A - Page 11 of 14
Reference Description
sendmail has been updated to use LDAPv3 by default. In the event that an
PPS-86959 older protocol is needed, Proofpoint Support can assist in modifying the LDAP
configuration.
This issue was observed when the Filter email (Opt In/Out) parameter was
set to No for an internal recipient. If a message was addressed to an external
PPS-86963 recipient and also to the internal recipient (in that order), the message was
delivered to the external recipient but not the internal recipient. This issue is
resolved.
Performance improvements to the process for generating and viewing reports
PPS-86991 from the Logs and Reports > Report Viewer page, particularly for the Spam -
Quarantined reports.
Previously, if an encrypted message contained an image, and the recipient
PPS-87070 replied to the message using Secure Reader, the image could disappear. This
issue is fixed.
During Email Warning tag insertion, some messages would trigger a complex
PPS-87121
regular subexpression alert. This issue is fixed.
An issue where a rule in the Email Firewall Module was failing to detect and
PPS-87177
trigger on a password-protected .rar file has been resolved.
Several improvements to the Secure Reader password create and reset user
PPS-87266
experience.
This issue applies to customers that have been migrated to Cloud Quarantine
Service. Previously, if a message to a recipient with an email address that
started with the special characters * or + landed in a quarantine folder, an error
PPS-87267
message would display when navigating to the folder in the classic PPS Admin
UI (navigating to the folder in the Cloud Admin Portal was not impacted). This
issue is fixed.
This fix applies to Smart Send. Previously, it was possible for the same
message to have more than one command applied to it - for example, “block”
and also later “release”. This issue is resolved, and once a command is
PPS-87274
applied to a message no further actions can be applied to it, and the user is
notified that the message is no longer available. Quarantine message details
reflect the true status for the message.
Email warning tag removal on outbound does not work when a reply or
forward is composed in Outlook on the web or New Outlook for Windows and
PPS-87289 the user edits the quoted copy of the original message. A fix is now available.
The fix must be enabled manually. Contact Support for more information and
reference PPS-87289.
Some messages with multiple recipients would fail DKIM verification when the
PPS-87338
recipients matched different Policy Routes. This issue is fixed.
Proprietary and Confidential © 2025 – Proofpoint, Inc. March 2025 Rev A - Page 12 of 14
Reference Description
MaxQueueAge was not being honored by the MTA. This issue has been
PPS-88302
resolved.
This fix applies to Information Protection > DLP Incidents > Settings >
Templates. Previously, when making changes to a template, there could be a
PPS-88502
delay prior to the updated template being used by triggered DLP rules. This
issue is fixed.
Known Limitations
Re-ordering Rules
To change the order in which rules are applied in a module, use the arrow keys to move a rule up or
down in the order. The scroll bar to the left of the Enabled column (drag-and-drop) will be fixed in a future
release.
Proprietary and Confidential © 2025 – Proofpoint, Inc. March 2025 Rev A - Page 13 of 14
Reference Description
For security reasons, the management interface (Admin GUI) is not supported
on older browser versions. To view a list of currently-supported browsers,
PPS-81195
please refer to the Proofpoint Community article Proofpoint Protection Server
Version Support Matrix – Release 8.X.
This limitation applies to the Information Protection > DLP Incidents >
PPS-85658 Incidents page. When viewing the Email DLP details, DLP violations in a zip
archive inside another zip archive cannot be highlighted.
Proprietary and Confidential © 2025 – Proofpoint, Inc. March 2025 Rev A - Page 14 of 14