TAP for Employees

Targeted Attack Protection (TAP)

About TAP

Proofpoint's TAP service analyzes email links by checking the intended site for malicious content.

When TAP detects a hyperlink in a plain-text email, it will rewrite the URL in plain text. In this case, you will see the rewritten URL directly in the body of the email.

If a URL is embedded and you hover over the link, the URL displayed will show the destination URL rewritten as a Proofpoint URL. The URL will function normally from the user’s perspective.

Proofpoint URLs will begin with https://urldefense.proofpoint.com. If you were to receive an email sent from someone outside of Fordham University that included a link to the EDUCAUSE homepage, you would notice the following:

  • Display URL (what you will see in the email): www.educause.edu
  • Embedded URL (what you will see if you hover your mouse over the link in the email): https://urldefense.proofpoint.com/v2/url?=http-3A__www.educause.edu&[….]

You may notice a one or two-second delay while a web page loads after clicking on a rewritten link deemed safe by Proofpoint.

If you click on a rewritten link deemed malicious by Proofpoint or the Office of Information Technology, a warning page will appear.

Targeted Attack Protection does not mean every link is safe for clicking. Exercise caution for any link in a questionable email.

For more information on TAP, view our Targeted Attack Protection User Guide. Questions? Call the IT Service Desk.

Need Help?


Walk-In Centers

McShane Center 266 | RH
Leon Lowenstein SL18 | LC

View Our Walk-In Hours