TAP TRAP EFD

Proofpoint's
Email Security
Trio

TAP, TRAP, and EFD — Proofpoint's three most important products — explained from scratch. No jargon. No assumptions. Everything you need to know.

90%
of targeted attacks start with email
Fortune 1000
50%+ rely on Proofpoint
1T+
data points in Nexus Threat Graph
115k+
customers providing community intel
01 — The Big Picture

Three Products. One Mission:
Protect People From Email Threats.

Before diving into each product, here's the 30-second orientation. Proofpoint is built around one core belief: people, not technology, are the number one target in cyberattacks. These three products are how they protect them.

TAP
Targeted Attack Protection
The Shield — stops threats before they reach your inbox
Detects, analyzes, and blocks advanced email attacks — phishing, ransomware, malicious attachments, weaponized URLs — in real time using AI and sandboxing. It's your first and most powerful line of defense.
TRAP
Threat Response Auto-Pull
The Cleanup Crew — pulls bad email out after delivery
When a malicious email slips through (or is only identified as dangerous after delivery), TRAP automatically hunts down every copy across every mailbox — including forwarded copies — and quarantines them instantly.
EFD
Email Fraud Defense
The Identity Guard — stops fake senders at the source
Implements and manages DMARC authentication so attackers can't forge your email domain. Stops business email compromise (BEC) by verifying that every email claiming to be from your company actually is. Protects your brand, your customers, and your partners.
Think of email security like protecting a building. TAP is the security guard at the front door — checking everyone who tries to come in, scanning for weapons, and turning away threats before they enter. TRAP is the rapid-response team inside the building — the moment someone dangerous slips through, they sweep every room, find them, and remove them. EFD is the identity management system — making sure no one can forge an employee badge and impersonate someone who works there to trick your staff or customers.

02 — Context

Why Email Is the #1 Attack Vector

To understand why these products matter, you need to understand the scale of the email threat problem.

📧

The Most Used Channel

Email is the world's most used business communication tool — which is exactly why attackers love it. Over 90% of all cyberattacks start with an email. It's the path of least resistance into any organization.

🎭

Attacks Are Evolving Fast

Modern email attacks are sophisticated. Polymorphic malware changes its signature to avoid detection. URLs are "clean" at delivery but become malicious minutes later. BEC attacks have no malware at all — just convincing impersonation.

🧑

People Are the Target

Attackers don't hack systems — they hack people. They use social engineering to trick employees into clicking links, wiring money, or sharing credentials. Technology alone can't solve a human problem. Proofpoint's philosophy is "people-centric security."

🔗

The Supply Chain Problem

Attackers compromise a supplier's email account, then use it to send fraudulent invoices or requests to that supplier's clients. The email looks 100% legitimate because it comes from a real, trusted sender — but the account is under attacker control.

The Click Timing Problem

TAP has to make a "safe or dangerous" decision in milliseconds, before a user can click. But some URLs are weaponized after delivery — they're clean when they arrive, then become malicious hours later when threat actors flip a switch.

💰

The Financial Impact

Business Email Compromise (BEC) alone costs organizations over $50 billion globally since 2013. A single convincing fake invoice email to an accounts payable team can result in millions of dollars wired directly to attackers.


03 — Product Deep Dive
TAP

Targeted Attack Protection

Detect, analyze, and block advanced email threats before they reach users — in real time.

Imagine every email is a package delivered to your office. TAP is the X-ray machine, bomb-sniffing dog, and expert inspector all in one — it opens every package in a safe room (sandbox), runs it through dozens of tests simultaneously, and only lets it through if it's deemed safe. If a package contains a ticking bomb that hasn't gone off yet, TAP still catches it before it reaches the desk.

How TAP Works — Step by Step

1

Email Arrives at Proofpoint's Gateway

Every inbound email passes through Proofpoint before it ever reaches your mail server (Microsoft 365, Exchange, Google Workspace). TAP operates inline — meaning it's in the actual email path, not just scanning copies after the fact.

2

Attachment Sandboxing

Any attachment — PDFs, Office documents, executables, archives — is detonated in a cloud-based sandbox (a safe virtual machine). TAP watches what happens: Does it try to download more malware? Does it modify system files? Does it phone home to a hacker's server? This happens in real time using both virtual environments and bare-metal hardware, with analyst-assisted execution to maximize detection.

3

URL Rewriting & Time-of-Click Scanning

Every URL in an email is rewritten to a Proofpoint proxy URL. When a user clicks it, TAP intercepts the click, visits the destination URL in a safe environment right at that moment, and only forwards the user if it's safe. This solves the "weaponized after delivery" problem — even if the URL was clean at delivery, TAP catches it if it's become malicious by the time the user clicks.

4

AI Analysis via Nexus Threat Graph

TAP runs every message through Proofpoint's Nexus AI platform — analyzing sender behavior, message structure, historical patterns, and threat intelligence from 115,000+ customers and a trillion+ data points. It uses NexusAI's Language Model, Machine Learning, and Relationship Graph engines to score threats and detect BEC attacks that have no malicious payload.

5

Block, Quarantine, or Deliver with Warning

Based on its verdict, TAP takes action: block the email outright, quarantine it for admin review, deliver it with a warning banner, or allow it through. Admins control the policy. Verdicts are rendered in milliseconds for most messages.

6

Dashboard Intelligence & VAP Reporting

TAP feeds all threat data into the TAP Threat Insight Dashboard, showing who is being targeted, by what kind of attack, from which threat actors. It identifies your Very Attacked People (VAPs) — the specific employees under the heaviest attack — so you can apply stronger protections to them specifically.

💡 What is a VAP (Very Attacked Person)?

TAP calculates an Attack Index score (0–1000) for every user, weighted across four factors: how sophisticated the attacker is, how targeted vs. widespread the attack is, what type of attack it is, and overall volume. The highest-scoring individuals are your VAPs — your CEO, CFO, or specific department members who are disproportionately targeted. TAP lets you apply extra protections (like URL isolation or mandatory sandboxing) specifically to these people.

What TAP Detects

TAP

Polymorphic Malware

Malware that constantly mutates its code to evade signature-based detection. TAP catches it by analyzing behavior, not just signatures.

TAP

Weaponized Documents

Office files and PDFs with embedded malicious macros, exploits, or links that activate when opened. Sandboxing catches these in the act.

TAP

Credential Phishing

Fake login pages for Microsoft, Google, banks, etc. designed to steal usernames and passwords. TAP's URL scanning identifies these even when the page looks completely legitimate.

TAP

BEC / Impostor Email

Emails that impersonate your CEO, CFO, or suppliers to trick employees into wiring money or sharing data. NexusAI's language and relationship models detect these even with no malicious payload.

TAP

TOAD Attacks

Telephone-Oriented Attack Delivery — emails with fake phone numbers that trick users into calling attackers. TAP's Computer Vision engine detects malicious phone numbers and QR codes.

TAP

Cloud App Threats

Emails linking to malicious OAuth apps that trick users into granting attackers full access to their cloud accounts (Google Drive, OneDrive, etc.) without ever entering a password.

TAP add-on: URL Isolation for VAPs. For your highest-risk users, every URL click is routed through an isolated browser running in the cloud. Even if they click a malicious link, the malicious content runs in a remote container — never touching their actual device. Downloads are blocked entirely.
TAP add-on: Account Takeover (TAP ATO). Detects compromised accounts post-breach — suspicious login activity, malicious mailbox rule changes (hiding emails), and data exfiltration. Can automatically reset passwords or lock accounts in Active Directory or Okta.
TAP add-on: Supplier Threat Protection. Proactively monitors the email domains of third-party vendors and suppliers that interact with your company. If a supplier's account is compromised anywhere in the Proofpoint ecosystem, you get alerted — even before the attacker targets your organization using that account.

04 — Product Deep Dive
TRAP

Threat Response Auto-Pull

Automatically quarantine malicious emails after delivery — including every forwarded copy.

Imagine a contaminated letter gets delivered to 50 people at a company before anyone realizes it's dangerous. TRAP is the hazmat team that simultaneously knocks on all 50 doors, removes the letter from every desk — whether it was read, forwarded, or sitting unopened — and seals it in a quarantine bag, all within seconds. It also checks if anyone touched it and tells you exactly who did.

Why TRAP Is Necessary

No filter is perfect

Even the best detection systems occasionally let a malicious email through — especially attacks designed specifically to evade detection. When that happens, the clock is ticking from the moment delivery occurs. TRAP is the safety net for those cases.

Emails spread internally

When an employee forwards a suspicious email to colleagues ("Hey, do you recognize this?"), the threat multiplies. Manual cleanup — finding and removing every copy from every mailbox — can take hours. TRAP does it automatically in seconds.

Post-delivery weaponization

Some phishing URLs are safe at delivery but become malicious afterward. TAP might scan them and find nothing wrong — but later, users who clicked are at risk. When TAP updates its verdict, TRAP gets triggered automatically to clean up.

10–20 minutes per email manually

Manually quarantining a single email in Exchange or Microsoft 365, tracking down forwarded copies, and documenting everything takes 10–20 minutes. When you have 100 malicious emails to clean up, that's 30+ hours of analyst time. TRAP does it in seconds.

How TRAP Works — Step by Step

1

Receive an Alert

TRAP connects to multiple alert sources: TAP (its primary partner), abuse mailboxes where users report suspicious emails, CSV file uploads from SmartSearch, and even third-party tools like FireEye. When any of these sources identifies a threat, an alert flows into TRAP automatically.

2

Identify All Affected Mailboxes

TRAP doesn't just act on the original recipient. It uses the Nexus Threat Graph and its own logic to trace the email through forwarding chains and distribution lists — finding every mailbox that received a copy, whether directly or indirectly through internal forwarding.

3

Automatically Move to Quarantine

TRAP connects directly to Exchange, Microsoft 365, or Google Workspace and moves the email from every affected inbox to a quarantine folder that only admins can access. This happens in the automatic setting before most users even have a chance to click anything. You can also run TRAP in manual mode where an analyst approves the action first.

4

Check If Anyone Clicked

TRAP checks whether any user clicked a malicious URL or otherwise interacted with the message. Unlike Microsoft's native message recall system, TRAP doesn't care whether the message was read — it pulls it regardless. But it also tells you exactly who read it, which is critical for follow-up response (password resets, account reviews, etc.).

5

Optionally Trigger Automated Responses

If a user clicked a malicious URL or is confirmed to have interacted with the email, TRAP can automatically trigger additional responses: reset the user's password in Active Directory or Okta, lock the account, or notify their manager. These are policy-driven and configurable.

6

Create a Full Audit Trail

Every action TRAP takes is logged with timestamps: which mailboxes were affected, what actions were taken, whether the email was read before quarantine, and the success or failure of each retrieval attempt. This is invaluable for incident response, compliance, and reporting to executives or regulators.

TRAP + Abuse Mailbox. Organizations give employees an "[email protected]" address to report suspicious emails. TRAP monitors this mailbox, automatically analyzes every submission using Proofpoint's threat intelligence, classifies it as malicious/suspicious/spam/bulk — and if it's confirmed malicious, auto-pulls it from all mailboxes. This turns your employees into active sensors feeding your security operation.
Deployment options. TRAP can be deployed in the cloud (Proofpoint-hosted, SaaS — easiest to manage), on-premises on VMware, or on AWS. It integrates with Microsoft 365, Exchange on-premises, and Google Workspace.

05 — Product Deep Dive
EFD

Email Fraud Defense

Stop email impersonation attacks by authenticating every email sent to and from your domain.

Imagine someone can forge perfect copies of your company's letterhead and use them to send fraudulent letters to your customers and partners. EFD is the cryptographic stamp of authenticity that makes forgery impossible — it verifies that every email claiming to come from your domain was actually sent by you or an authorized sender. If it wasn't, email servers around the world automatically reject or quarantine it before anyone ever sees it.

The Foundation: SPF, DKIM, and DMARC

EFD is centered on deploying and managing three email authentication standards. You don't need to memorize these deeply, but understanding them at a high level is essential.

Step 1

SPF — Sender Policy Framework

A list published in your domain's DNS records of every server that is allowed to send email on your behalf. If an email claims to be from you but comes from a server not on the list, receiving servers can flag or reject it. EFD helps you manage and host your SPF records properly — including all third-party senders (marketing tools, CRMs, etc.).

Step 2

DKIM — DomainKeys Identified Mail

A cryptographic signature added to every outbound email, signed with a private key only your organization holds. Receiving servers verify the signature using your public key. If the signature doesn't match — because the email was forged or tampered with — the message fails DKIM and can be rejected.

Step 3

DMARC — Policy & Reporting

The policy layer that ties SPF and DKIM together. DMARC tells receiving mail servers what to do when an email fails authentication: nothing (monitor), quarantine it, or reject it outright. Critically, DMARC also sends reports back to you — so you can see every email that claims to be from your domain and whether it passed or failed authentication.

Why DMARC matters so much right now: Google and Yahoo now require DMARC for bulk senders. Without it, your legitimate marketing and transactional emails may be rejected or go to spam. EFD helps you get to full DMARC enforcement without accidentally breaking your own email deliverability.

How EFD Works — Step by Step

1

Discover All Your Senders

EFD begins by mapping the entire landscape of who sends email on behalf of your domain. This isn't just your own servers — it includes third-party marketing platforms (Mailchimp, Salesforce, HubSpot), CRM tools, invoice systems, and shadow IT services that teams set up without IT's knowledge. Each one needs to be identified and authorized.

2

Read DMARC Reports

EFD subscribes to the DMARC aggregate reports that every major mail provider sends — Google, Microsoft, Yahoo, and others. These XML reports show every email claiming to be from your domain, which servers sent them, and whether they passed SPF and DKIM. EFD parses and visualizes this data, turning thousands of raw data points into actionable insights on a clean dashboard.

3

Guided DMARC Enforcement Journey

EFD guides you through a carefully staged rollout: start with p=none (monitor only), then quarantine, then reject. Proofpoint's expert consultants work with you to ensure all legitimate senders are properly authenticated before you tighten policy — so you don't accidentally reject your own emails. The typical journey takes weeks, not months.

4

Supplier Risk Monitoring

EFD's Nexus Supplier Risk Explorer automatically identifies all the third-party suppliers and vendors that email your employees, scoring each one for risk. It also runs Domain Discover — a machine learning system that finds domains impersonating your brand (e.g., companyna me.com or company-invoices.net) that attackers might use to target your customers or partners.

5

Protect Inbound Email Too

EFD doesn't just protect outbound email. The authentication intelligence it builds — knowing exactly which servers legitimately send from your domain — is fed back into the Proofpoint gateway to make inbound filtering smarter. Fake emails claiming to be from your CEO are more easily identified and blocked.

EFD goes beyond DMARC. While DMARC handles domain-level authentication, EFD also uses NexusAI machine learning to detect BEC attacks that use lookalike domains (companv.com instead of company.com) or display name spoofing ("CEO Name" <[email protected]>) — attacks that technically pass DMARC because they're sent from a different domain altogether.

06 — The Intelligence Engine

Nexus: The AI Brain
Behind All Three

TAP, TRAP, and EFD are all powered by Proofpoint's Nexus threat intelligence and AI platform. Understanding Nexus helps you understand why these products are so effective.

The Nexus Threat Graph

Proofpoint aggregates data from over 115,000 customers and analyzes more than 1 trillion data points — spanning email, cloud, network, mobile, and social media. This community threat graph means that when an attack targets one of Proofpoint's customers anywhere in the world, all 115,000+ customers instantly benefit from the intelligence gained.

🧠 NexusAI Language Model

Analyzes email text for transactional language and urgency patterns characteristic of BEC attacks — even with no malicious payload or attachment.

🔗 Relationship Graph

Builds a model of normal communication patterns between senders and recipients. Flags deviations — like a CEO "emailing" from a country they never contact, or a supplier suddenly changing payment details.

⚙️ Machine Learning Engine

Detects behavioral similarities to known threat patterns. Trained continuously on new attack campaigns across the entire Proofpoint customer base.

👁️ Computer Vision

Detects image-based impersonations, malicious QR codes, and fake phone numbers embedded in emails — attacks that traditional text-analysis systems miss entirely.

Emerging Threats (ET) Intelligence — Proofpoint's threat research team maintains one of the most respected threat intelligence feeds in the industry, with fully verified signatures and reputation data. TAP, TRAP, and EFD all leverage ET Intelligence to enrich their detections with real-world attacker context: "This IP is associated with the TA453 threat actor, a state-sponsored Iranian group targeting government and defense organizations."

07 — The Full Picture

TAP + TRAP + EFD:
The Complete Defense

These three products aren't just complementary — they're designed as an integrated system, each filling the gaps the others leave.

The Email Security Lifecycle
From impersonation attempt to full remediation — here's how all three work together
EFD

Before Delivery

DMARC rejects forged emails claiming to be from your domain. Supplier monitoring alerts you to compromised partner accounts before they target you.

TAP

At Delivery

TAP scans every email, sandboxes attachments, rewrites URLs, runs AI analysis, and blocks or quarantines threats before they reach the inbox.

TRAP

After Delivery

If anything slips through, TRAP auto-pulls every copy from every mailbox the moment a threat verdict is updated. Audits who interacted with it.

All Three

Ongoing

Threat intelligence loops back into Nexus. Every detected attack improves detection for all 115k+ customers. The system gets smarter with every attack.

🔄 TAP → TRAP Integration

The most common integration. TAP detects a threat and automatically sends an alert to TRAP. TRAP immediately begins hunting down and quarantining every copy of that email. The integration takes minutes to set up and results are immediate — in automatic mode, emails are typically pulled before users have a chance to click. This is the cornerstone workflow of Proofpoint's post-delivery response.

📧 EFD → TAP Intelligence Loop

EFD's deep knowledge of which email servers legitimately send on your behalf gets shared with TAP's inbound filtering. This means TAP can more confidently identify when an email is spoofing your domain or impersonating an internal sender — even if it technically passes basic checks. EFD's DMARC insights make TAP's detection sharper for your specific environment.

🚨 Abuse Mailbox → TRAP → TAP

Users report suspicious emails to an abuse mailbox. TRAP picks these up, analyzes them using Proofpoint intelligence, and if they're confirmed malicious, auto-pulls them. Threat data flows back into TAP to improve future detection. This creates a closed-loop security system where your own employees' vigilance directly improves your defenses — at scale, with zero manual intervention.

📊 Unified Visibility

All three products feed into the Proofpoint dashboard ecosystem. The TAP Threat Insight Dashboard shows your threat landscape, VAPs, attack actors, and campaign data. TRAP's dashboard shows incident history and remediation audit trails. EFD's portal shows your DMARC compliance journey and domain abuse monitoring. Together, they give a 360° view of your email security posture.


08 — Side by Side

TAP vs TRAP vs EFD:
Quick Reference

Everything compared at a glance.

Attribute TAP TRAP EFD
Full Name Targeted Attack Protection Threat Response Auto-Pull Email Fraud Defense
Primary Job Detect & block threats before delivery Remove threats after delivery Authenticate email identity, stop impersonation
When It Acts Pre-delivery (and at click) Post-delivery Before email is even sent (DNS-level policy)
Core Technique Sandboxing, URL rewriting, AI/ML analysis Automated mailbox quarantine across forwarding chains DMARC, SPF, DKIM authentication + AI BEC detection
Threats Addressed Malware, phishing, BEC, ransomware, TOAD, cloud threats Delivered threats — any type TAP or other sources flag Domain spoofing, brand impersonation, BEC, lookalike domains
Who It Protects Your employees (inbound) Your employees (post-delivery cleanup) Your customers, partners & employees (outbound trust + inbound spoofing)
Key Dashboard TAP Threat Insight Dashboard — VAP reports, threat actors, campaign data TRAP Incident Dashboard — quarantine history, audit trail EFD Portal — DMARC compliance, sender landscape, domain abuse
Deployment Cloud gateway (inline), API mode for M365/Google Cloud (SaaS), on-prem VMware, or AWS Cloud SaaS — consult-led implementation
Integration with TAP ✅ Primary alert source for TRAP ✅ EFD intel feeds TAP inbound detection
Human Action Required? Analysts review flagged threats; most actions automated Automatic mode requires zero human action; manual mode optional Consultant-assisted setup; ongoing monitoring is automated
Industry Analogy Airport security screening Bomb squad post-breach response team Passport/identity verification authority

09 — Career Path

Certification & How
to Learn Proofpoint

Want to become a Proofpoint professional? Here's the structured path.

Learning TAP

  • Start with Proofpoint's free online training portal — Proofpoint University (available to customers and partners)
  • Study the TAP Administration Guide — covers configuration, policy creation, sandboxing settings, and URL defense setup
  • Learn to use the TAP Threat Insight Dashboard — understanding threat categories, VAP reports, and forensics views
  • Understand the Attack Index scoring system and how to build targeted controls for VAPs
  • Practice configuring TAP add-ons: URL Isolation, Account Takeover, and Supplier Threat Protection

Learning TRAP

  • Read the TRAP Administration Guide — covers alert source configuration, LDAP/Active Directory integration, and quarantine settings
  • Practice setting up automatic response rules (match conditions → automated quarantine actions)
  • Understand how to configure the abuse mailbox monitoring workflow
  • Learn to generate incident reports and interpret the audit trail
  • Study the TAP-to-TRAP integration guide — this is the core workflow most organizations rely on daily

Learning EFD

  • Master the email authentication fundamentals: SPF, DKIM, and DMARC — understand what each does and how they interact
  • Learn to read and interpret DMARC aggregate (RUA) and forensic (RUF) reports
  • Practice the phased DMARC deployment: none → quarantine → reject
  • Understand SPF record flattening and why EFD's hosted SPF is valuable
  • Study the Nexus Supplier Risk Explorer and Domain Discover features for brand protection

Official Certification

  • Proofpoint offers the Proofpoint Certified Guardian certification — a professional credential covering the full Proofpoint platform
  • Prerequisites: familiarity with email security concepts, experience with Proofpoint products (typically 6+ months hands-on)
  • Study materials available through Proofpoint University and authorized training partners
  • Also look for role-based certifications (Administrator, Analyst) depending on your job function
  • Proofpoint's partner ecosystem (VAR/MSSP partners) often provide training environments for hands-on practice

10 — Reference

Key Terms Glossary

Every important term from this guide — defined in plain English.

TAP — Targeted Attack Protection
Proofpoint's email threat detection and blocking product. Uses sandboxing, URL rewriting, and AI to stop advanced attacks pre-delivery.
TRAP — Threat Response Auto-Pull
Proofpoint's post-delivery email remediation tool. Automatically quarantines malicious emails from all mailboxes after delivery.
EFD — Email Fraud Defense
Proofpoint's email authentication and anti-impersonation product. Manages DMARC, SPF, and DKIM to stop domain spoofing.
VAP — Very Attacked Person
An employee who receives a disproportionately high volume of targeted, sophisticated attacks, as measured by TAP's Attack Index (0–1000 scale).
BEC — Business Email Compromise
An attack where criminals impersonate executives, suppliers, or partners to trick employees into wiring money or sharing sensitive data. Often has no malware — pure social engineering.
Sandboxing
Executing a suspicious file or URL in an isolated virtual environment to observe its behavior safely, without risk to real systems.
URL Rewriting
TAP's technique of replacing every URL in an email with a Proofpoint proxy URL, enabling real-time scanning at the moment a user clicks — even after delivery.
DMARC
Domain-based Message Authentication Reporting and Conformance. An email authentication policy that tells receiving servers what to do with emails that fail SPF or DKIM verification.
SPF — Sender Policy Framework
A DNS record that lists which mail servers are authorized to send email on behalf of your domain.
DKIM — DomainKeys Identified Mail
A cryptographic signature added to outbound emails, allowing receiving servers to verify the email hasn't been forged or tampered with.
Polymorphic Malware
Malware that constantly changes its code signature to evade antivirus detection. Behavioral sandboxing catches it where signature-based tools fail.
Nexus Threat Graph
Proofpoint's cross-customer threat intelligence platform, aggregating 1 trillion+ data points from 115,000+ customers across email, cloud, network, and social to power all Proofpoint products.
Weaponized URL
A URL that appears benign at delivery but is changed to a malicious destination after delivery — designed to evade pre-delivery scanning. TAP's time-of-click scanning defeats this.
TOAD — Telephone-Oriented Attack Delivery
A phishing technique where the email contains a fake phone number, directing victims to call attackers rather than click a link. TAP's Computer Vision detects these.
Abuse Mailbox
An email address (e.g., [email protected]) where employees report suspicious emails. TRAP monitors this and auto-analyzes submissions, turning employees into security sensors.
Nexus Supplier Risk Explorer
An EFD feature that automatically discovers and scores all third-party vendors and suppliers that email your organization, helping prioritize supplier security risk.
Domain Discover
An EFD feature that uses ML to find lookalike domains impersonating your brand — e.g., company-invoices.net — that attackers might use to target your customers.
Attack Index
TAP's 0–1000 score measuring how heavily targeted an individual is, weighted by attacker sophistication, attack focus, type, and volume. Used to identify VAPs.