
Integrated Deployment is also known as ICES or (I)ntegrated (C)loud (E)mail (S)ecurity.
With API-based Integrated Deployment, onboarding new customers takes less than five minutes. By removing the need for MX record adjustments, this option simplifies management for busy MSPs and smaller teams.
Integration with Microsoft 365 enables setup in just a few clicks, automatically detecting and configuring the service. Emails from Microsoft are then processed through Proofpoint's industry-leading AI and reputation-based detection system, where Proofpoint ensures secure communication while effectively blocking a wide range of threats, including phishing, email fraud, and malware.
Emails are still blocked within Proofpoint's quarantine and you can apply the same controls and policies you are used to with MX-based deployment. Users still receive Email Digests like they would with MX-based deployment.
[Example Deployment]
Does this affect pricing?
No, it doesn't.
What other sacrifices do I make with Integrated (ICES) Deployment?
Can you still do outbound mail filtering and encryption?
Who gets the "go live" notification?
Does this work with anything other than Microsoft 365?
No - currently integrated deployment / ICES only works with Microsoft 365.
Can you switch from Integrated (ICES) to MX-based filtering (SEG) after the fact?
Why would I chose Integrated (ICES) over MX?
Good for very small clients that don't have access to DNS or have limited access to DNS settings. It speeds up the onboarding. You do need some form of DNS access to update SPF if you plan on sending mail outbound through proofpoint but that's a simpler change (a single TXT) record. Also, using Integrated skips the domain verification process.
Larger customers would probably have a preference for conventional MX/SEG deployment.
Note that Integrated deployment is also a stepping stone for eventual inter-mailbox scanning (scanning of messages within the same organisation) and other advanced features that are coming in the future.
Does the “easy button” on Integrations page create different connectors & rules based on if account is set to Integrated vs MX?
Yes, there are a few differences in the rules created by the "Easy Button" depending on which deployment method you use. Integrated adds extra header elements to track the org that is sending through proofpoint like the UUID, stack, and traffic direction.
Does the automatic configuration create the azure sync AND imports users or just sets up the sync?
It creates the app registration and synchronization AND forces the sync at the same time importing the users in one go. If the client is on a plus package, it also adds the permissions necessary for making it possible to retract/restore emails from the message log.
With Integrated with M365 enabled, is there any impact to the “Inbound sender DNS check” spam setting?
You can have it on or off, it functions as normal in this scenario.
With Integrated with M365 enabled, does Microsoft reject on DMARC fail p=reject?
Yes.
With Integrated with M365 enabled, does Microsoft quarantine or reject for any other reason?
Microsoft will quarantine on obvious spam, or with their own RBL, or on SPF hard fail (if you have that enabled).
Have you considered SAT tools like KnowBe4 that would bypass PPE and/or signature management tools? Are there recommendations for how to configure with the Integrated rules?
Normally we recommend people use third party Phishing simulation software in direct delivery mode. However in this case, KnowBe4 -- it adds a header element to each email "x-phishtest" for instance, you will need to create a rule prior to all the proofpoint rules to "stop processing" more rules at priority 0 (ie: first rule in the list) with the option "stop processing following rules" checked. Otherwise the messages will get caught by proofpoint.