Warrior Student Guide 22 08 30
Warrior Student Guide 22 08 30
Warrior – Level 1
Student Guide
TABLE OF CONTENTS
Course Objectives
Following the course, you should be able to:
Setup and Administration
• Navigate and understand the functionality the Administration Console
• Explain the relevancy of the Mimecast Services status page.
• Explain the Account Settings menu item and its subsections
• Create and manage Mimecast administrators
• Understand Connectivity
• Manage your users and groups
• Explain what Attributes and how they are used
• Control user access to End User Applications and the limits within
• Schedule delivery and read the reports Mimecast provides.
• Explain the service monitor features and create alert notifications.
• Locate and act on emails within Mimecast in the Message Center
Continuity
• Create and Cloning Continuity Events
• Understand what happens during and after an event
• Know what you need to create a Continuity Monitor
• Understand how to manage a Continuity Event
• Respond to a continuity monitor alert
• Build an SMS response to continuity events
Security Policies
• Understand the Mimecast Email Inspection funnel
• Explain how policies work
• Identify the policies that are set up by default
• Understand basic spam and virus protection concepts
• Explain what each of the policies do and where to find them
Targeted Threat Protection
• Identify Targeted Threat Protection policies that are set up by default
• Optimize a new or existing Targeted Threat Protection policy to suit your organization’s
needs
• Understand how Browser Isolation (BI) service works and how to enable BI for email
• Understand user awareness and how to configure
Scenario
These will highlight real-life use cases that will be covered with students in class.
Those targets without a green background are for students to have as added take-
aways from the session.
Discussion
There may be times in the course where the instructor asks participants to take part
in a discussion about a particular topic (e.g., to discuss something where there may be
more than one solution to a problem).
Warning or Alert
This is meant to provide you with a warning about something.
Disclaimer: During an instructor-led class, an instructor will demonstrate configuring certain policies,
profiles, etc., in the Administration Console. This is being done in an environment that is safe for
demonstration purposes.
If you wish to follow along in your own environment, we advise as follows:
1. Follow along with the configuration steps and cancel instead of saving.
2. In an instance where you follow along configuring a policy, we advise you to set the “To” and
“From” address fields to reference pilot profile groups that have been configured
beforehand. Navigate to Directories | Profile Groups in the Administration Console and add
the email addresses you want in the pilot groups. This will ensure you are testing policies on
a small subset of your user population and not your whole organization.
Please Note: Instructors will use Prefixes for some profile groups, definitions and policies. This is for
training purposes only. As an administrator, you would choose the naming conventions that work for
you in your environment.
Logging In
You can login using the Login button on mimecast.com. The options are Access my email - My Apps
- Partner Portal. To open the Administration Console, you will click the My Apps option. Here you
will also see the other applications you have purchased from Mimecast (e.g., Awareness Training,
Case Review, DMARC Analyzer)
Your login credentials will either be a Mimecast cloud account controlled by Mimecast or your
domain directory account password controlled by your organization’s directory.
Navigation
The top bar will be the main means of navigating the Administration Console.
Selecting Administration will reveal the menu of items you have permissions to see. Depending on
your role you may be limited to what you have access to.
The Mimecaster Central Search Bar allows you to search Mimecaster Central, our knowledge base
of page breakdowns and best practices.
This page is separate from Mimecast infrastructure to provide an accurate and independent status.
Use this page when troubleshooting any Mimecast related problems to keep yourself informed
Status
A general status indicator at the top provides immediate overview of Mimecast’s services. Selecting
any of the regions provides the breakdown of the services Mimecast provides.
History
Here you can view any previous incidents as well as the timeline of actions Mimecast has taken to
investigate and resolve the situation.
Notification Feed
The Notification Feed displays notifications sent by Mimecast to you about your account. The
notifications are displayed in a list with the latest at the top. You can filter the notification feed by
either Product which displays only notifications about things like new releases or by Service which
will display only notifications about your Mimecast service.
In situations where we want to draw your
attention to a notification, for example a service
outage, this will be the only filter type available.
Service notifications will have a color-coded title
and icon that have the following statuses.
Use the path next to each item to navigate to the areas identified below and act.
• Attachments Blocked - Monitoring | Attachments
• Rejected Messages - Message Center | Rejected and Deferred Messages
• Bounced Messages - Message Center | Bounced Messages
• Policy Edits - Gateway | Policies
• Held Messages - Message Center | Held Messages
• Attachments Linked - Monitoring | Attachments
Note: You can zoom in on the graph’s data to display the hourly breakdown by dragging over the
date range and releasing the mouse.
Rejections
Displays the top five rejection types for your account, in no specific order, over a 24-hour period.
You can hover over a graph's data point to display the date, time, and the number of rejections at a
given point in time.
Account Summary
This summary provides you with information about your account.
• Your account name
• Mimecast ID
• Your account code
• Your security passphrase (if one has been configured with us)
• Your support code. This must be quoted when calling Mimecast Support to log a call.
• Your account's maximum retention period for messages
1. Click the icon in the top left-hand corner of the Administration Dashboard.
2. Select either the:
• Attachment Protect menu item to display the Targeted Threat Protection - Attachment
Protect dashboard.
• URL Protect menu item to display the Targeted Threat Protection - URL Protect
dashboard.
• Large File Send menu item to display the Large File Send dashboard.
Note: You will only see the dashboards for the services you have purchased.
Account Settings
The Account Settings sub-group provides license and retention details regarding your Mimecast
account. Much of what you see here cannot be edited even as a super administrator.
Account Settings
Account Name The name for your Mimecast account. This is usually your organization's
name.
Mimecast ID The ID of your Mimecast account. This is to be used for interactions with
Mimecast Service Delivery.
Account Code A unique identifier for your Mimecast account to log a support ticket.
Database Code A reference for the database instances of your Mimecast account.
Account Status Enabled by default. This is only disabled if your account has been
terminated.
DNS Authorization Used to verify permissions for sending through the Mimecast SPF IP
Code Addresses. Added during account implementation.
Maximum Retention Added during account implementation, this specifies the maximum
(Days) number of days messages will be retained in the archive. This setting
cannot be increased by administrators, but it can be reduced for retention
of specific messages.
Maximum Retention Specifies that the Maximum Retention (Days) value has been approved by
Validated a user with Super Administrator, Full Administrator, or Partner
Administrator permissions. Occasionally requested to verify account
retention setting is still accurate.
Number of Users The number of users licensed within this Mimecast account.
Pause Inbound If your email system is temporarily unable to accept messages, enabling
Deliveries this option will globally halt Mimecast from sending emails to that email
environment.
Directory Options
This grouping deals with either linking or not, the Aliases within your environment.
Automatically Link Uses the mailbox information from Active Directory to link alias addresses
Aliases to primary mailbox addresses in Mimecast. This allows users to login using
their primary address, and access emails for the aliases.
Clear All Aliases Removes the alias links to the primary addresses in Mimecast Directory.
System Notification
Systems notifications control who gets notified by SMS, the postmaster address, and who is alerted
for specific events such as archive searches or when export blocks are finished.
SMS Attribute Specifies the Active Directory or Mimecast attribute that identifies the
mobile phone number of users. When sending an SMS to a user, we use
the number associated with this attribute.
Notification Specifies the email address from which all user notifications are sent. A
Postmaster Address postmaster address is created by default in the internal domains and is
selected by default. The address cannot be deleted but a different email
address can be used by clicking the "Lookup" button.
Privileged Access This email address will be notified when an archive search is performed
Notifications by an administrator.
Enforce Archive When selected, Administrators will be required to provide a reason when
Search Reason searching for emails under Administration | Archive | Archive Search or
Administration | Message Center | Message Tracking. The reason
provided will be reflected within Administration | Archive | Search Logs
under the “Reason” column as well as within the Privileged Access
Notifications email that is sent to the email address listed within the
“Privileged Access Notifications” field under Administration | Account |
Account Settings | System Notification Options.
Send Notification This option enables automatic email notifications when exports are
When Export Block is requested.
Complete
Account Contact
The contact information here provides Mimecast the point of contact to alert regarding Mimecast
services. Keep this information up to date as frequently as possible.
Enhanced Logging
If you are using a SIEM or any other data analytics platform, you can enable additional logging of
email transactions on your account. These logs are available using the SIEM Logs API.
For more information, see the Mimecast Documentation site and SIEM Logs API here.
These additional settings do not impact the current Reporting features available in the
Administration Console and are only available using an API integration.
Common Examples
Some common examples of logs are as follows:
Event Description Information Provided
Logon A user attempted to log on to • User’s login
Authentication the Administration Console, but • Date and time
Failed their authentication failed • IP address
• Application used to access Mimecast
New Policy A policy was created • Administrator
• Date and time
• Policy type
• Full policy details
On the Audit Logs page, select a log to display its information. The log displays details about each
event.
• User: Email address of who triggered the event
• Category: Category of the event that generated the log file (e.g., Policy Logs, Account Logs)
Exporting
When exporting, you can select which columns of the log you want
included. Click the Export button in the top left corner to see the panel
shown here.
Default Roles
Protected Roles have a padlock next to them (see items 1-5 below).
1. Super Administrator: Can manage application roles and has full privileges to all account
options, including the content view of all email, delegate mailbox access, and the
assignment of protected permissions (for example, the assignment of content view).
2. Full Administrator: Can manage application roles and has high-level administrator
privileges, including the content view of all messages, delegate mailbox access, message
exports, and the creation and approval of retention adjustments.
3. Partner Administrator: Can manage application roles and has full privileges for Partner
Administrators, including delegate mailbox access, but excludes protected permissions.
4. Discovery Officer: Cannot manage roles but has access to common eDiscovery features
such as archive search with content view, messages exports, and the creation or
approval of retention adjustments.
5. Reviewer: Cannot manage roles but has access to the Case Review application as a
reviewer, where discovery cases can be reviewed for relevance and privilege.
6. Gateway Administrator: Has read access to common gateway functionality (e.g., policy
management, message tracking, service connections, and user settings) and rights to
create other administrator accounts without protected permissions.
7. Basic Administrator: A primary administrator account with rights to create other Basic
Administrator accounts, but with no access to protected permissions. You can do basic
things such as create policies, but you cannot read email for example.
8. Help Desk Administrator: Has access to common help desk tasks (e.g., message tracking,
read-only access to policy management, service connections, and user settings).
Read Administrator Role Permissions for a detailed list of permissions.
Security Permissions
Your account comes with a list of default roles. Each role has a security permission assigned. The
security permissions are as follows:
• Cannot Manage Roles: Access to the Roles tab is disabled.
• Manage Application Roles: The Application Role also allows Administrators the ability to
control the Administration Console menu items that other administrators can access. The
exception is if the application areas are marked as protected with the "Protected Roles"
permission.
• Manage Protected Roles: A Protected Role is one that allows an Administrator to control
the Administration Console menu items that other administrators can access, including
functionality with protected content (e.g., viewing email content, archiving email content,
exporting messages, managing retention and smart tag assignment). Protected roles have a
padlock icon located to the left of the "View Role" button.
Role Editor
Administrator roles are managed using the Role Editor. This allows administrators to:
• Control the users assigned to roles
• Create custom roles in addition to the default roles provided
To access the Role Editor, the administrator must have the correct Security Permissions. Without
these permissions, the Roles tab is not displayed in the Administration Console.
To display the Role Editor:
1. Navigate to Administration | Account | Roles
Within the Role Editor, you will see the following.
• Default Roles: Default roles are listed and indicated by a View Role button next to them.
These can only be viewed and not edited.
• View Role and Edit Role Buttons: In the list of roles you will notice, some have a View Role
button and others have an Edit Role button. Those with the ability to edit are Custom Roles
(names and description displayed in italics. These are a copy of an existing role. The roles
with the View Role button are roles that you cannot edit.
• Right-Click options: Right-clicking on a role will allow you to do things such as Add Users to a
Role, Manage Users for a Role, Copy a Role, and Remove a Role for those Administrators
with the proper permissions.
• Padlock: Roles with a Padlock have access to the Role Editor and have Protected
Permissions, meaning they can modify access to protected application areas (e.g., archive
email content, exporting messages, managing message retention).
• Custom Roles: Custom roles can be changed / deleted and are displayed in italics.
• Members Column: This column shows the number of members added to a particular role.
Right-click a role to
display a pop-up
menu
View a Role
To view what permissions a particular role has in detail:
1. Click View Role next to any of the roles
2. Once opened, you will see Properties and Security
Permissions sections.
3. Under Security Permissions you will see what
type of security permissions that role has.
4. Under the Application Permissions area you will
see all the menus in the Administration Console
that role has access to and what type of access
[e.g., Read, Edit, etc.]
Custom Roles
You can only create a role with the permission level up to or lesser than the logged in administrator.
Depending on administrative permissions, you can only create an administrator with the same or
lesser permissions.
When creating a role, we suggest copying a role instead of creating new. The best practice is to
assign permissions less than what the user needs and then add permissions. Another
recommendation is to keep part of the name of the original role as part of the description.
• As a Customer, this is the area where you will see any 3rd party administrators that have
access to your Administration Console.
• As a Managed Service Provider (MSP), this is the area where you will see who you have at
your partner organization set up to manage that customer’s account.
MSPs should be encouraged as a part of best practice to link their External Address to
any Customer they are supporting, ensuring they have both access to the
Administration Console and can Raise Support tickets for that account.
Customer Use
• As a customer, if you are logged on as a Super or Full Administrator, you can see the
Manage External Administrator button.
• When you click the button, you can see a list of the 3rd party administrators that have access
to your Administration Console.
If you are an MSP, you should know that when you log into the Partner Portal, there is a place where
you can see all the customers whose Administration Console you have access to. It is here where you
will click an Administration Console button next to their company name and be logged in with SSO.
1. To do this in the Administration Console, click the Manage External Administrators button
2. Click the Add External Admin button
3. Enter the External Admin Email Address of the partner you want to manage this account
and use the Select Role drop-down menu to assign them the Partner Administrator role
4. Click Save and Exit.
• If you click on the Partner Admin Role at the home page of the Role Editor, you
will see the external admin you added is located here and listed as a member.
• If you click on any of the users listed as an External Administrator, you will notice
an External Admin Account Code. This is auto generated when you create a new
External Admin and Save.
• If adding multiple email addresses, you will add them one by one here or they
can be added via the MSP Portal. See article below.
More information on delegating access here. See also the Managed Service Providers (MSPs) Portal.
Directory Connectors
Before users can authenticate against any Mimecast applications, they need a user account. There
are several methods you can use to get your users into the platform: Active Directory Sync,
Mimecast Synchronization Engine (MSE), Domino, Google and manually adding via spreadsheet –
just to name a few.
This tells us where we are connecting and gives us the authority to read your directory. It creates a
record of your user accounts that we can reference in many ways in the Mimecast Suite of services.
It is also important to note that it is a live lookup. We do not cache passwords. It is in the cloud and
can be configured to work with whatever environment you have whether it be Microsoft 365, LDAP,
Google, or Domino.
To access your Directory Connectors, you can either click the See more link next to Directory
Connectors on the home page of the Dashboard or you can access as follows:
1. Navigate to Administration | Services | Directory Synchronization
2. To create a new connector, click New Directory Connector, fill in the details and click Test
Connection before saving.
3. To edit existing, click on an existing connector to view the details
There are different types of connectors, depending on the environment you have. If you have been
through implementation, you will have one listed here. The different types are as follows:
• Active Directory (LDAP)
• Domino Directory (LDAP)
• Office 365 / Windows Azure Active Directory
• Google Directory
Synchronization Issues
There are certain instances where the synchronization process fails resulting in potential end user
logons failing and permission issues.
©2022 Mimecast. All Rights Reserved |22
The first place you would see an indication of an issue would be the
dashboard. Here you would see either an amber color which is an
indicator of Partial disruption or red which indicates there is a
Service disruption.
The first place you will begin to troubleshoot a directory connection issue is the point of entry,
where Mimecast connects, to obtain your directory information. Read Troubleshooting LDAP
Directory Synchronization for further detail.
Outbound Traffic
Once your Mimecast account has been created, your Technical Point of Contact (TPOC) should log
onto the account to confirm they can access it. If this is successful, your email server can be
configured to route outbound emails through Mimecast.
This requires that your:
• Public IP addresses are added to Mimecast's authorized outbounds. The Connect Team or
Mimecast Support will configure these. If utilizing a Cloud service (e.g., Office 365, GSuite),
the Connect Team or Support can add these.
• Firewall is configured to allow access to Mimecast Data Center IP Ranges for SMTP port 25.
See the Mimecast Data Centers and URLs page for more information. You will need to be
logged into Mimecaster Central to access this page.
Note: This step may not be applicable on Hosted Exchange (HEX) and Microsoft 365
implementations.
• Email server or cloud service is configured to deliver emails to Mimecast
See Connect Process: Setting up Your Outbound Email for further detail.
Authorized Outbounds
The goal is to configure your environment to ensure Mimecast is accepting email on behalf of your
company only over the IP ranges that your Technical Point of Contact tells us are authorized for your
company. If you are on-premises, you need to have a connection created. This is called an
Authorized Outbound.
We add at least one IP address to your authorized outbounds, based on the information you
provided when your Mimecast account was created. These IP addresses are the only ones that
Journaling
The external email communications (inbound or outbound) for a business are automatically Archived
based on an organization’s compliance and global retention values, however some organizations
wish for internal email communication to also be retained. This can be achieved using a Journal
connector.
Inbound Email
Having previously set up your outbound email, messages should be successfully being routing
outbound. You are now ready to set up inbound email to be routed through Mimecast.
External messages destined for your organization must be directed to Mimecast, not left directed to
your email server or hosted email service. Once the messages reach Mimecast, they are processed
A default delivery policy tied to a default definition will have been set during
implementation. For more information, read the Configuring Delivery Routing
Definitions and Policies article.
See the Testing Delivery Routing Connectivity article for full details.
Managing Connectors
This section covers how to configure a connector from Mimecast to your Cloud Service Provider.
These connections are required by certain Mimecast services, including:
• Threat Remediation
• Continuity
• Exchange Sync & Recover
Note: For information on how to do this with Exchange Web Services (EWS) for on-premises
Exchange refer to the article at the end of this section.
Internal Directories
An internal domain is a domain that your organization has registered with Mimecast to send,
receive, and / or archive email for. This section details the domains you have under your Mimecast
account and are owned by your organization. You should have at least one domain already
populated here from your implementation process.
Note: This isn’t compulsory but is recommended to prevent spoofing messages from the
domain.
• Click Finish.
For further instruction on Adding a Domain through the Administration Console, read Configuring
Internal Domain / Subdomains. Read Connect Application: Validating Your Domains for detailed
instructions on how to do this with the Connect Application.
Recipient Validation
Recipient Validation is the process of checking the recipients(s) of an inbound email to one of your
Internal Domains from an external sender.
For us to accept your inbound email, recipient validation must be configured. To do this, we must
have a complete list of all internal users.
Address Types
When viewing the email addresses associated with one of your internal domains, you will notice to
the left of each email address is an icon indicating how the user was created in the directory. See
explanations for each below.
Actions
New Address Allows you to create an email address.
Purge Selected Addresses Deletes the selected email addresses including linked aliases. This
can be performed by any administrator who has the ability to read
and edit Internal Directories. A warning will be displayed to
confirm the removal of the address and all list entries. Addresses
will not be purged while emails are still being processed for the
address (e.g., if related emails are held). Administrators can
prevent the purge from taking place by removing the address from
the purge list under View | Address Purge list in your domain view
with a right-click Remove Item. This has to be done before
housekeeping runs (which generally occurs overnight).
Import Delegate Mailboxes Allows you to import delegated mailboxes. Note: This button is
only available when logged on as an Administrator with protected
permissions.
Export Data Export a list of email addresses to a .XLS, or CSV file.
View Filters the list of email addresses displayed by:
If your subscription includes Secure Messaging and an external sender needs to reset
their Secure Messaging Portal password, you will come here.
Groups
Groups are internal Mimecast folders containing email addresses and/or email domains. It is
important to use good naming conventions and be organized in the way that your structure your
groups to ensure proper policy application.
There are two types of Groups: Profile and Directory.
• Profile Groups – These groups are local to Mimecast and are manually created and
maintained within the Administration Console by your Administrators.
• Default Groups – Please be aware that some groups are created by default during your
initial implementation and will be attached to “out-of-the-box” policies and services,
also created during your implementation. For example, Administrator Alerts, Blocked
Senders and Permitted Senders are some of the default groups you’ll find under your
Profile groups.
• Directory Groups – These groups are visible in
Mimecast after syncing with your organization’s
directory environment (e.g., Active Directory,
Azure, etc.) These groups are read-only and can
only be added, removed, renamed or have their
contents altered by first making those changes in
your directory service and then running a directory
synchronization (Administration | Services |
Directory Synchronization.) To view the Directory
groups that have been synchronized with
Mimecast, navigate to Administration | Directories | Directory Groups, while also being
aware of any folder with a + sign next to it, which will allow you to delve deeper into the
synchronized directory structure.
Groups are used primarily to be referenced in policies or end user applications to control mail flow
for specific user groups. This has the following benefits:
• Mail routing can be specified for users in different regional locations with different mail
servers.
• Used in Permitted Senders / Blocked Sender policies
©2022 Mimecast. All Rights Reserved |33
• Any address changes are automatically applied to policies.
• Collecting email addresses (e.g., click actions in Stationery Layouts).
Read the Out of the Box Settings for Mimecast Email Security for detail on our out of the box policies
that you would configure to apply to these groups.
Creating a Group
All groups are displayed in a hierarchy, linked to a root group. This allows changes made to one
group, to also apply to all other sub-groups in that group.
Note: You cannot create a group inside the Root folder. A sub-folder must be created inside it to
enable a group to be created.
1. Navigate to Administration | Directories | Profile Groups
2. Either:
• Select the Folder into which the group is to be created.
• Create a Sub-Folder as follows:
a) Click on the + Icon in the bottom right-hand corner of the folder where you want the
group created. A folder called "New Folder" is created in the group's hierarchy in a
collapsed state.
b) Rename the group:
o Expand the Group's Hierarchy
o Click on the "New Folder" Group
o Type the Group Name in the Edit Group field at the top of the hierarchy
o Press the Enter key
3. See the "Adding Group Entities" section below for details of how to add email addresses or
domains to the group.
Adding Group Entities
You can add email addresses or domain names to a group using one of the following methods:
• Add Email Addresses
• Add Email Domains
• Group List Imports (email addresses only)
Wildcard characters are not supported for groups. See the Using Wildcards in Policies
page for full details.
After the group is made you will see a number next to the folder in the hierarchy. This
is an indicator of how many entries are in that group.
WARNING: Prior to deleting a group’s entities, you should consider using the Export
Data option, as unlinking cannot be undone, and the export would be the only record
of the entities in this group.
Deleting a Group
When deleting a group, the following must be considered:
• A default group located in the Root folder cannot be deleted.
• Only empty groups or sub-groups can be deleted. If a group contains an empty sub-group,
this must be deleted before the other group or sub-group can be deleted.
• Only groups or sub-groups not used in any policy can be deleted.
• The number displayed in brackets to the right of a folder shows how many email addresses
or domain names are in the group.
To delete a group:
1. Navigate to Administration | Directories | Profile Groups
2. Select the Group to be deleted
3. Click on the Red Cross Icon to the left of the folder
Moving a Group
You can either move the group or all its entries, as well as copy any entry into another group of your
choosing. In any group or subgroup, you can add domains or email addresses.
Note: A default profile group located in the Root folder cannot be moved.
To move a group to a new location in the hierarchy:
1. Navigate to Administration | Directories | Profile Groups
2. Select the Group to be moved in the hierarchy.
3. Click on the Move Group button.
4. Select the Group in the hierarchy into which the group being moved is to be placed. The
group is moved to the chosen location.
Group
Each definition is specific to a group of users, including
any sub-groups. This requires a group to be created that
can consist of individual users or entire domains.
Propagation
It may take up to 15 minutes for application settings definition to propagate. For example, if you
made a change relating to Mimecast for Outlook, it will take about 15 minutes to apply. Users will
have to exit Outlook and go back in to see the change.
Details for every option can be found under Configuring Application Settings.
For information about which Application Settings a particular user is assigned, administrators can
review what is assigned in the Effective Group Application Settings field of the Application Settings
section of the user profile
Access Reporting
To access the reporting functionality, navigate to Administration | Reporting:
The following menu items are displayed:
• Account Assessment: A report created for your account by Mimecast at the end of each
reporting period. The report is available for one week from Monday to Sunday, and over
each calendar month. See the Account Assessment Report Overview page for more details.
• PDF Reports: Schedule weekly or monthly reports to be emailed to specific recipients or
made available for download. See the Reporting: PDF Reports page for more details.
• CSV Data: Download and view the daily CSV data for certain account logs, including
rejections. See the Reporting: CSV Data page for more details.
• Overview: Provides graphs that show email volumes, bandwidth, and statistics for your
account. This includes outbound, inbound, and internal emails, and rejected email traffic.
See the Reporting Overview page for more details.
PDF Reports
The PDF Reports function allows you to schedule reports to be run on either a weekly or monthly
schedule and save the output to a PDF file. You can also download reports directly.
Administrators with read only access to the Reporting module will not have access to edit Reporting
Schedules.
You can select:
• Whether the report should be emailed or saved locally on Mimecast.
• Whether you want a PDF of a standard report or a custom report of your choice of data
• Which graphs should be saved / sent
• How often these graphs should be run (weekly or monthly).
• The email addresses where the PDFs should be sent (up to 5 individuals)
Administrators with read only access to the Reporting module will not have access to
edit Reporting Schedules.
The PDF and Overview reports are focused on email traffic data, while the Account
Assessment provides a full report of every facet of your Mimecast services.
CSV Data
The CSV reports consist of daily rejection data. Administrators can download the report data in a
comma separated (.CSV) format. This has many uses, including sharing it with colleagues who do not
have access to the Mimecast Administration Console.
For data that is not retained on Mimecast eternally (e.g., Rejection Viewer logs) Administrators can
access this data, even after it is no longer visible in the Administration Console.
More information on this here.
Overview Reports
These reports provide a graphical representation of email volumes and flows. These default reports
give Administrators a quick view of their environment, showing different aspects of their email data
volumes and bandwidth usage. Administrators can also determine which users in the company are
sending large volumes of emails and analyze what is causing inbound emails to be rejected.
To access, navigate to Administration | Reporting | Overview:
Reporting Overview shows groups of graphs as follows:
• Summary Graphs - display the volumes of email split into Outbound, Inbound, and Internal
messages, as well as Rejected volumes
• Outbound Email - displays email communication from internal users to external users and
domains
• Inbound Email - displays email communication from external users to internal users and
domains
• Internal Email - displays email communication between internal users
• Custom Reports - displays any Custom Report Definitions that have been configured
View the Reporting Definitions page for a detailed breakdown of what each of the
different graph data types represent. Reporting data is available for a year, although
scheduled reports can be stored in PDF for a longer period.
Functionality
The Service Monitor displays information in one of the
following tabs:
• Dashboard: The dashboard displays a graphical representation of your outbound delivery,
inbound delivery, and journaling queues. Access to the status of your Journaling and Active
Directory (AD) services is also available.
• Alerts: Enables you to set the thresholds for each alert type.
• Subscribers: Enables you to set up users to receive alert messages for Mimecast services.
• Notifications: Displays a list of any recent alerts issued to subscribers.
Dashboard
Queue and Service Meters
The meters on the dashboard display the number of messages in each respective queue (outbound,
inbound, journal) as well as the recommended threshold for the queue at the max level of the
meter.
The service detail display differs depending on the service type. The status of each service can be
viewed as follows:
• Indicates there is an issue with the service. See the "Last Error" message for further
information.
Service History
From the Services page, you can access a view of all the configured service's history. This allows you
to analyze the service to determine if there are any ongoing issues. The history is displayed in a
graphical format in the following time frames:
• 15 minutes with history up to 2 days
• Hourly with history up to 7 days
• Daily with history up to 60 days
• Graph: Displays an interactive graph of the average number of "OK" service connections
versus the average number of "Error" connections, in selected time intervals. The "15
Minute" tab displays by default. Optionally click on the "Hourly" or "Daily" tab to update the
graph's data on display.
Note: Hover your mouse over the graph to display the number of "OK" or "Error" service statuses
during the selected interval.
• Date / Time: Displays the date and time when the data was collected.
• Status: Displays an icon of the service's status when the data was collected. This can be
either:
• The service's status was OK at the time of the data entry.
• The service's status has an error at the time of entry, and an alert has been sent to
subscribers (if configured).
• Show / Entries: Click on the drop-down arrow and select to display 10, 25, 50, or 100 entries
per page. This will also update the graph.
• Time Zone: Select a specific time zone to apply to the data from the drop-down menu.
• Next / Previous: Use the buttons to switch between the pages displayed. This will also
update the queues graphical display.
Queues
1. Escalation Level – Specifies the number of sequential alerts that must be sent to subscribers
before the escalation point is reached. Once reached, subscribers configured to receive
escalation notifications receive notifications in addition to regular subscribers. This is
defaulted to 5.
2. Alert Level – How many problems (service disruptions/items in queue) have to occur before
an alert is sent. Once the number of items in a queue goes beyond this threshold an alert is
generated. A minimum value of 50 should be specified. If a value less than 50 is specified, it
is ignored and a value of 50 is used instead.
3. Recommended Threshold - This is an auto generated threshold based on the recent history
of your account. It is intended as a starting point, based on the account's profile.
4. Acknowledge the alerts – Once this option is checked, no further notifications for this alert
are sent until another threshold is reached. Once the queue is no longer in alert this flag is
re-set.
Journal Services
1. Escalation Level - How many alerts are reached before escalation notifications are sent out.
This is defaulted to 5.
1. Escalation Level - How many alerts are reached before escalation notifications are sent out.
This is defaulted to 5.
2. Acknowledge - Once this option is checked, no further notifications for this alert are sent
until another threshold is reached. Once the queue is no longer in alert this flag is re-set.
3. Enabled – enable or disable this
4. Click Save AD Services
Refer to the Service Monitor: Managing Alert Notifications article for more detail.
Subscribers
The Subscribers page will allow you to set up who will
receive notifications on alerts and escalations via
email or SMS. These users are typically administrators responsible for the efficient running of the
Mimecast account and internal email systems.
Click Subscribers in the upper right corner to get to the Subscribers page.
The Subscribers page will allow you to set up who will receive notifications on alerts and escalations.
1. Enter in a user’s credentials
Note: The password is a local password which should be used to login to Service Monitor if
your Directory server is unavailable. The password will only be accepted when used with the
configured email address.
Alert notifications can be sent out as emails, SMS messages, or both. The distribution schedule for
delivery of email and SMS alerts differs.
Note: All specific service details regarding the IP address and email address, are automatically
populated based on your journal / directory connection configuration in the Administration Console.
• Email alerts are sent to subscribers every 15 minutes when a queue / service reaches its
threshold
• One SMS message per alert type is sent to each subscriber when a queue / service reaches
its threshold. When the alert reaches the escalation point, all subscribers to that alert type
get one further SMS message.
Note: It is highly recommended to create two or more subscribers.
Notifications
Notifications are a record of all alerts sent out up to the past 90 days.
1. Click Notifications in the upper right corner to
get to the Notifications page.
You can display alert notifications for up to three months in the past in the Service Monitor. These
can be used to determine:
• What triggered an alert
• Who the alert was sent to
• The date and time the alert was sent
You can filter the alert notifications by selecting / deselecting:
Message Tracking
Message tracking allows you to search across all email queues to find specific messages that may
have been delayed in delivery (inbound or outbound) or that were never delivered.
You can search by any of the following:
• Data or Message ID
• Partial email address or domain name (minimum of 3 characters)
Note: Wildcards are not supported and may return unpredictable results
Using Search by Data allows you to search using content that could be in the To and From fields, the
subject, or IP address.
Search by ID
This allows you to search for a Message ID so you find the specific message in case the same sender
has sent 100 messages for example. The Message ID is a unique ID for that message and can be
found in the header.
The actions you are able to perform have to do with the Queue that the message is
sitting in.
Accepted Messages
The Accepted messages queue is where you would go to troubleshoot mail flow after configuration.
These messages can be found by navigating to Administration | Message Center | Accepted
Messages.
Administrators come here to review recently sent and received messages that are awaiting indexing.
Once indexing is complete, messages are moved to the Mimecast Archive.
Before being archived, administrators can access the metadata and SMTP transmission information,
which is useful for troubleshooting message delivery.
Click here for more information on Accepted Messages.
Overview Tab
The Overview tab provides an overview of all held messages split into the following sections:
• Held Reason: Lists all held reasons and the number of messages held for each one.
Note: Use the Search box to filter the list by entering a held reason.
• Top Ten Held Reasons: Lists the top ten reasons why a message is held.
• Messages Held by Group: Displays a graphical pie chart of the held messages.
Message Details
Click on a message to see the message details panel. These details will help you in investigating why
a message was held.
• Details: Displays the message's transmission details
(e.g., held reason, the sending server's IP address, DKIM
signature, and sender / recipient details).
• Message: Displays details of the message's body.
• Analysis: This is where you will see spam scanning
details, processing details such as graymail, managed
senders, permitted senders, SPF result, DKIM, DMARC
and RBL.
• Header: Displays details of the message's header.
• Transmission Data: Displays details of the message's
envelope and transmission components.
• Policies: Displays the policies that were considered to
be applied to the message.
Note: Policies here will only be applied if it matches the
definition, so if it warrants greylisting, for example, that policy will be applied.
Bounced Messages
You can view messages that have been accepted by the Mimecast Gateway but could not be
delivered to their recipients. These messages are displayed in the Bounced Messages viewer.
Messages are bounced for a number of reasons. When a bounce occurs, we send a Non-Delivery
Report (NDR) to the message's originator informing them that the delivery failed.
Bounced messages (both inbound and outbound) are still available in the archive, as
the message was originally accepted by Mimecast before being bounced.
Message Details
To troubleshoot failed delivery, you can view information about the message through the details
panel. Here you will see the Bounce Properties and much more.
Message Delivery
The Message Delivery page shows you the delivery and bulk queues of messages that passed the
processing queue. The Bulk Queue tab includes messages that are subject to the bulk sender's
policy. These messages can be found by navigating to Administration | Message Center | Message
Delivery.
We attempt to deliver messages to the recipient for up to four days (96 hours) or 30 retry attempts
by default, with the Delivery Queue displaying all inbound and outbound messages waiting to be
delivered. The time between the retry attempts increase incrementally. The longer the message is in
the queue, the longer the interval between retries.
The delivery queue is used to troubleshoot or investigate delayed email delivery. You can also:
• Force an immediate retry
• Reject the message for delivery
• Perform an early (hard) bounce
Processing Queue
Before Mimecast can deliver emails, certain checks are performed, and the applicable policies need
to be applied. While these activities are being performed, emails are temporarily queued in the
Processing Queue. Once completed, emails are moved into the Delivery Queue awaiting delivery.
Typically, an Administrator will not need to monitor the Processing Queue. Emails should only be
displayed in the queue for a short time as they are processed immediately on receipt, and then
moved to the Delivery Queue. Sometimes, if larger mailshots are being sent out, emails can be
queued in the Processing Queue due to the increased processing required.
Note: Mimecast will not process more than 10 identical emails coming from the same sender
going outbound to different recipients at one time, as this would resemble a mailshot, and the
priority of these emails is automatically lowered.
These messages can be found by navigating to Administration | Message Center | Processing
Queue.
With the messages listed, you can take action on one or more message to:
• Retry delivery
• Reject delivery
• Bounce delivery
Enabling Continuity
There are three ways to enable continuity:
• A planned event: wherein an administrator plans for continuity to start and end at specific
times and is seen as a proactive approach.
• An unplanned event: wherein a continuity monitor detects a mail flow error and alerts an
administrator to start a continuity event.
• An end user continuity event: wherein if end users are given permissions, may start their
own personal continuity event that only affects them.
Note: If you do not wish for a user to be able to enable Continuity Mode manually, navigate to
Administration | Application Settings | Continuity Settings and uncheck Allow User to Failover
Manually.
Event Duration
8. Time Zone: Select the appropriate time zone from the drop-
down list that the continuity event start/end time should be
based upon.
9. Event Start: Specify the start date/time for the continuity
event. This must be within five (5) days of the planned
continuity event start. Mimecast provides a 5-day rolling
mailbox.
Note: Setting the event to start on a date/time prior to the outage ensures that the
Mimecast for Outlook and Mimecast Mobile apps will download the affected messages,
allowing end user access to them.
10. Event End: Specify the end date/time for the continuity event. Click the Eternal button to
set the continuity event to Never End, if you are not sure when the outage requiring the
continuity event will end. When you want to end the event, click the End Now button.
Alternatively, set the Event End time to a date/time well in the future. Once the outage is
over, set the Event End to a date/time in the past to complete the event.
Note: If you see a field appear that allows you to click a button to check for an Overlapping
Continuity Event, use it to check.
During an Event
Outlook Continuity mode takes about 10 minutes to invoke. The API will switch to listening directly
to the Mimecast system for the new email pushes. If the user sends an email, it is sent out through
Mimecast and not your Exchange server and a copy of the message is populated into the Sent Items
folder in your Mimecast mailbox and your local Outlook client Sent Items.
Mimecast for Outlook can only enter continuity mode if Microsoft Outlook has the
"Use Cached Exchange Mode" option enabled in your Account Settings. If Microsoft
Outlook is in non-cached mode, continuity functionality is not available from Outlook.
Outbound Traffic
After creating the monitor, if you navigate to Administration | Message Center | Accepted
Messages and filter on Outbound you will be able to identify the outbound messages coming from
the monitor as they are addressed from “<custom-string>@mimecastmonitor.com”. Here you will
notice the timing between them is two minutes apart.
At the start of each two-minute window, Mimecast checks to see if the last sent message was
received, and if so, within the acceptable latency time specified.
In an SMS message, you can do all the things you can do in the browser:
SMS Dashboard
The SMS (Short Message Service) Services Dashboard
displays a graphical summary of recent SMS activity
on your account. It allows administrators to monitor
SMS activity, view SMS information, and setup /
change SMS configuration.
To access navigate to:
1. Navigate to Administration | Services | SMS
Dashboard (or use hamburger menu on main
Administration Console dashboard)
2. The dashboard is split into the following
sections:
• SMS Messages per Day: Displays the number
of successful and failed SMS messages sent per day over the last 14 days. Hover over the bar
graph to display more information.
• Phone Numbers Settings: Displays the current attribute used for sending SMS messages.
Click on the Change Attribute button to use a different attribute.
• Last 10 Active Messages (Last 14 days): Displays a summary of the last 10 active messages
by user primary email address, mobile (cell) number registered, the SMS message type, the
last update time for the message, and the current status. Click the View All link to display the
full list of messages sent over the last 14 days.
SMS Attribute
To enable SMS messages sent out during a continuity event, you will need to ensure that you have a
mobile number attribute referenced under Administration | Account | Account Settings | System
Notification Options | SMS Attribute. You can also use the Change Attribute button on the SMS
Dashboard to navigate here. This specifies the Mimecast attribute that identifies the mobile phone
number of users. When sending an SMS to a user, we use the number associated with this attribute.
Local Groups
If you do not have your Active Directory synchronized and you are using local groups, you will need
to do a bulk import of profiles of users. Include a column with the title of “mobile” and list the
numbers associated with the persons you are importing. Use this article to help you with this.
Then, on the attributes page, create a new attribute with the following settings:
• Name (Prompt): mobile (the name is case sensitive to the column head in the import)
Number Verification
You can verify the cell phone numbers entered for a
group of users to ensure they meet the format
required [+<country code><mobile number>] so you
can send them SMS messages.
1. Navigate to Administration | Services | SMS
Dashboard
2. Click on the Number Verification toolbar
button.
3. Specify the group of users to be checked in the
Select Group field
4. Click Verify Group. The summary results of the verification check are displayed at the
bottom of the dialog.
Note: At the bottom, you will have an option to download a report or verify another group.
SMS Status
You can display all SMS messages sent to users for the last 30 days in the SMS Status view. This has
the advantage of allowing you to filter the records by type and date range.
To access the SMS Status view:
1. Navigate to Administration | Services | SMS Dashboard
2. Click on the SMS Status toolbar
The SMS types seen in this list would be as follows:
• Password Reset
• Continuity Event
• Two-Step Authentication
• Unsubscribe (administrators can unsubscribe)
• Continuity Event Monitor Alert
Statuses:
• Queued
• Sent Awaiting Verification Sent Verified
• Unsubscribed Failed
Resources
For updated information regarding managing Mimecast Continuity, refer to the following links:
Continuity Guides
Continuity Best Practice
Policy Specificity
Mimecast applies policies to messages based on
specificity. The more specific a policy is, the higher the
priority.
For example, a policy specifying a single individual email
address is very specific and is favored above a policy
applied to everyone (which is the least specific of all). See
the table below and the article here to understand the
different levels of specificity.
Each policy performs an action that is applied to messages
as they are processed by the Mimecast Gateway. In many
cases, more than one policy of the same type (e.g., Blocked Senders) is considered for the same
message, but only the most specific policy of that type is applied.
Specificity Level Description
Everyone This is the least specific of all from / to options and includes all email
addresses.
Internal Addresses All addresses internal to your account, typically found under
Directories > Internal Directories.
External Addresses All addresses external to your account, typically found under
Directories > External Directories.
Email Domain Enables you to specify one or more domain names to which the
policy is applied.
Freemail Domains Only available under the "Email From" section of Impersonation
Protection policies. Includes sender domains that are present on a
Mimecast list of freemail domains.
Address Groups Enables you to specify a predefined Directory or Profile Group which
could hold domain names or individual addresses.
Header Display Name Only available under the "Email From" section of Impersonation
Protection policies when the "Addresses Based On" option has been
set to "The Message From Address" or "Both". This enables you to
specify a Header Display Name.
Address Attributes Enables you to specify a predefined attribute and can only be used
when attributes have been configured.
Individual Email Address This is the most specific of all from / to options and relates to a
single email address.
Using Policy Specificity
Equal Specificity
For policies (except cumulative policies), where there is equal specificity between two (or more)
policies of the same policy type, the following logic is applied to decide which policy needs to be
applied:
Recipient Trumps Sender: When there is equal specificity, the "Emails To" value receives a slightly
higher score. This means the Mimecast Gateway considers the recipient more specific than the
sender.
Conditions: Where there is equal specificity, and the "recipient trumps sender" logic does not
resolve this, a policy that has a matching "Source IP Range" or matching "Hostname" validity
condition is considered to be more specific.
Most Recently Created: Where there is equal specificity and the "recipient trumps sender" and
"conditions" logic do not resolve this, the most recently created policy is favored.
Use this article to see some specificity examples based on Messages From / Emails To Details as well
as working with groups.
Policy Details
When creating or editing a policy, there will be three sections:
1. Options: Here you enter a name for the policy and select
either the Action to take or the definition you are
applying to the policy.
2. Emails From and To: Here you need to specify the
conditions an email has to have to activate the policy. This
includes the Emails “From” and “To” addresses.
3. Validity: Choose to enable / disable a policy, determine
the time the policy will be active, along with IP ranges if
applicable.
Date Range: If you wish for your policy to be valid for a specific date range.
Policy Override: If the Policy Override option is enabled, the policy will be considered before
those that do not have it enabled. When multiple policies have it enabled, those policies will
Policy Validity
Validity parameters control the application of a Policy to an email. An Active Policy
is applied to emails, and an Expired Policy is ignored by Mimecast. Validity can be
controlled manually, and Policies can also be automatically set to expire on a
certain date. By default policies are set to apply Eternally.
Note: Policy Validity also allows certain options to be applied to policies. For
example, bi-directional policy application, policy override, and adding Source IP
addresses.
For information on Policy Validity, click here.
Note: Messages rejected by the Anti-Spoofing policy can be seen in Message Center | Rejected and
Deferred Messages.
Blocked Senders
A Blocked Senders policy restricts messages to or from specific email addresses or domains. It can
apply to inbound or outbound messages, although is typically used to block inbound messages.
Usage Considerations
Consider the following before creating a policy:
• Messages from blocked senders are rejected and logged in the Rejections Viewer. See the
Message Center: Rejected and Deferred Messages page for further details.
Permitted Senders
Permitted Senders policies ensure successful delivery of inbound messages from trusted sources.
Messages from permitted senders bypass our Spam Scanning, Greylisting and IP Reputation checks,
avoiding the possibility of being rejected or placed in the hold queue. This is useful in situations
where the sender's mail server is listed in an RBL, or for messages flagged by our content checks.
Note: A permitted sender messages are still subject to system wide message compliance and virus
checks. Adding an address to the permitted senders list, just removes the message from additional
spam checks.
Usage Considerations
• An Auto Allow entry is automatically deleted if no emails are sent to the address for 120 days.
• Auto Allow database entries are maintained in an End User's Managed Senders List.
• Auto Allow database entries are not generated when:
o Auto-responses are sent (including Out of Office messages).
o Suspected spam related messages are released, and the recipient subsequently replies to
the sender.
Auto Allow Default Policy
1. Navigate to Administration | Gateway | Policies | Auto Allow
2. Click on the Auto Allow policy in the Policy Editor
3. Open the Auto Allow policy
Options
4. Policy Narrative: Default Auto Allow
5. Auto Allow Policy: Apply Auto Allow
Emails From
6. Address Based On: The Return Address
7. Applies From: Everyone
8. Specifically: Applies to all Recipients
Emails To
9. Applies To: Everyone
10. Specifically: Applies to all Recipients
Validity
11. Enable / Disable: Enable
12. Set policy as perpetual: Always On
13. Date Range: Eternal
14. Policy Override: Disabled
15. Bi Directional: Disabled
16. Source IP Ranges: No entries
17. Hostname(s): No entries
To access the policy, navigate to Administration | Gateway | Policies. To configure, see this article.
Managed Senders
Managed Senders are the email addresses that end users have blocked, permitted, or have been
added to their auto-allow list. Users can block or permit from either the Personal Portal, Mimecast
for Outlook or a Digest Email.
An administrator can view, add, modify, or delete these entries. In fact, you may need to edit these
entries to troubleshoot some email delivery flow issues, or to prevent users from accepting email
from dubious sources.
Usage Considerations
• Administrators can manage a user's personal managed senders. Corrections may be
necessary when a user has incorrectly created an entry by:
o Using a digest set to block / permit an external email address.
o Using Mimecast Personal Portal or Mimecast for Outlook to block / permit addresses and
/ or domain names.
o Sending a message to an external recipient, which adds the external address to their auto
allow list.
The View menu can be used to filter by blocked, permitted, trusted senders and auto allow entries.
Each entry displays the sender / recipient address, along with the policy type. For more detail see
Managing an End User’s Managed Senders List.
DNS Authentication
What is DNS Authentication?
DNS Authentication combines three industry-standard email authentication technologies (DMARC,
DKIM and SPF) that allow domain owners to control who sends on behalf of their domains. It also
validates the authenticity of inbound messages.
• SPF (Sender Policy Framework) is an open standard for email authentication. It ensures that
any messages sent using a domain come from permitted sources. It does this by checking
the domain from the inbound message's "From Address", to see if the originating IP address
is listed in the domain's DNS record. If the IP address is not listed, a failed result is returned.
• DKIM (Domain Keys Identified Mail) adds a cryptographic hash or signature as a new
header to outbound messages. This ensures outbound messages haven't been altered after
leaving the sending organization's mail server, by matching the hash or signature to the DNS
records. DKIM requires a public DKIM key to be published in a TXT record in the DNS record
for the sender's domain by the domain owner.
The default definition is set to Ignore Managed/Permitted Sender entries which means Reputation,
greylisting, and spam checks are performed on the inbound message.
Note: In this course, we will not cover the DKIM or DMARC settings. Please refer to the article below
for further detail.
Reputation
Reputation policies allow you to manually configure the reputation checks applied to inbound mail.
Together with reputation definitions, they provide granular control over the default reputation spam
detection technologies we apply. When an inbound message is rejected because of a reputation
check, the event is logged in the Rejection Viewer.
Reputation policies check the reputation of the sending IP against Mimecast Global Permitted List of
IPs and Global Block Lists (RBL). We use several block lists and give a score to the IP based on how
many of those lists it matches (how many hits it gets).
By default, all block lists and reputation checks are applied to inbound mail.
However, by configuring a reputation definition, you can adjust or exclude
some of these checks, or decrease their sensitivity.
Reputation Definition
1. Navigate to Administration | Gateway | Policies | Definitions | Reputation Definition
2. Open the Reputation Definition
3. Description: Reputation Definition
4. Mimecast Global Permitted List
[Check inbound email against an IP address based permitted list. If the connecting IP address
is present on the permitted list, it bypasses the spam check.]
Greylisting
Greylisting is a default compliance check applied to all inbound messages not previously seen by the
Mimecast Servers. This helps to defend email users from unsolicited spam email.
The vast majority of spam is sent from applications designed to "fire-and-forget" emails, where they
attempt to send spam to one or more MX hosts for a domain, but never attempt a retry. By using
greylisting policies, any messages sent from an incorrectly configured MTA aren't accepted.
Usage Considerations
Consider the following before creating a policy:
• All email connections that have been subjected to greylisting are logged in the Deferred
Messages Queue.
• Any sender email address, domain, or IP address added to the Auto Allow or Permitted
Senders list isn't subjected to greylisting.
• A greylisting policy is created by default by Mimecast Support during the Implementation
process, configured to apply to all inbound traffic. There may be instances where you have
trouble receiving email from legitimate senders, whose MTA haven't been correctly
configured. If the sender's MTA doesn't comply with RFC standards, but their messages are
deemed safe for your organization, you can create a greylisting bypass policy.
Greylisting Policy
1. Navigate to Administration | Gateway | Policies | Greylisting
2. Open the Greylisting Policy
Options
3. Policy Narrative: Greylisting Policy
4. Select option: Apply Greylisting
Emails From
5. Address Based On: The Return Address
6. Applies From: Everyone
7. Specifically: Applies to All Senders
Emails To
8. Applies To: Internal Addresses
9. Specifically: Applies to all Internal Recipients
Validity
10. Enable / Disable: Enable
11. Set policy as perpetual: Always On
12. Date Range: Eternal
13. Policy Override: Disabled
14. Bi Directional: Disabled
15. Source IP Ranges: No entries
16. Hostname(s): No entries
To access the policy, navigate to Administration | Gateway | Policies. To configure, see this article.
Spam Scanning
Mimecast's multiple scanning engines examine the content of inbound mail by searching for key
phrases and identifiers commonly used by spammers. Based on the findings Mimecast will make a
decision based on whether or not an email is allowed through, held or rejected.
To access the policy, navigate to Administration | Gateway | Policies. To configure, see this article.
Usage Considerations
Consider the following before configuring a policy:
• Secure Delivery and Secure Receipt policies are required to ensure the entire transmission is
encrypted
• TLS technology protects confidentiality and data integrity by encrypting connections
between servers
• Using TLS Requires an installed third-party certificate at each end of the tunnel
• Mimecast supports connections using TLS 1.2, 1.1, and 1.0 for AES-256, MD5, and AnonDH
Secure Delivery and Receipt Defaults
The policies listed below are added to all new accounts to add email addresses or domains that must
only be communicated with using TLS.
• A Secure Delivery definition called "Default Secure Delivery - Enforced TLS" is created with
the "Enforced TLS" option. This requires a publicly signed certificate from a root certificate
authority. See the Configuring Secure Delivery Definitions and Policies page for full details.
• A Secure Delivery policy from "Everyone" to a group called "Enforced TLS Group". Add
email addresses or domains to this group so that email to them will attempt Enforced TLS.
• A Secure Receipt policy from "Everyone" to a group called "Enforced TLS Group". See
the Configuring Secure Receipt Policies page for full details.
To access the Secure Delivery and Receipt policies, navigate to Administration | Gateway | Policies.
There is NO POLICY required with the MFO configuration. You will need to apply this
definition to all users by way of options you select under an Application Settings
Definition.
6) Secure Messaging Folder: Use Lookup and select the appropriate Secure Messaging
Definitions folder
[This will pull in all the definitions under this folder]
7) Save and Exit
Secure Messaging options in the Mimecast For Outlook plugin are based on the
Secure Messaging folder chosen within Application Settings. All definitions within the
chosen folder will appear as options when applicable users click the Send Securely
button in their email client.
Content Examination Policies don’t apply based on policy specificity. They can apply to
every single message that falls under the scoping of the policy. In other words, multiple
content examination policies can be applied to a single message.
Reference Dictionaries
Content Examination definitions can link to a reference dictionary. These are typically created by the
administrator to contain a list of words, phrases, or regular expressions. The email content is
matched against a predefined set of text entries.
Content reference dictionaries are added from the Insert menu inside a Content Examination
Definition.
Each line in the word/phrase match list within the definition must have a scoring number in front of
it, which is the number that will be added to the message's score. Then if the total score matches
the activation score, the action will be taken on the message.
Multiple definitions can point to the same dictionary. We have a set of Mimecast-managed
reference dictionaries that you can use for credit cards, profanity, and healthcare. Custom reference
dictionaries can also be created.
ALERT: Please note that while Mimecast supports the use of regular expressions, and
may recommend certain ones to use, we do not directly support the writing of the
expressions themselves and cannot provide troubleshooting based on how they are
constructed - we can only compare the regex you are using vs. message content to see
if the content matched or not, if troubleshooting is needed.
Entities
Entities allow administrators to search for sensitive information in messages and attachments,
without the need to create complicated word lists or regular expressions (regex). Entity groups are a
©2022 Mimecast. All Rights Reserved |93
collection of entities aligned by category (e.g., PII, PHI or Financial). This allows administrators to
search based on a subject area, rather than listing individual entities to achieve the same goal.
How Entities Work
An entity consists of:
• A validator: confirms that the structure of the content meets the defined standards for the
item you are looking for. For example, if looking for credit cards, the content must contain
four blocks of four numbers, and a check digit within the specified range.
• A regular expression. This is applied to the target content, if the validator check passes.
Should the validator check fail, the content checks stop.
• A word list. This is used to limit the number of false positives encountered by matching
keywords for the subject area. For example, credit card keywords are used when using the
credit card entities. This helps determine the context of the match and allows us to exclude
a string of numbers that meet the credit card checks but which isn't a credit card number.
There is also an option to not require a keyword by using the “_nkw” feature that goes after
the entity.
Types of Entities
• Credit Cards
• Passport Numbers
• Date of Birth
• Social Security Number
Note: See the Content Examination Definitions: Using Reference Dictionaries and Content
Examination Definitions: Using Entities pages for more information.
The "creditcard" entity finds all credit card numbers, regardless of the credit card type. For example,
the following would match any credit card number found in the specified areas of an email (header,
body, attachment), if it is within proximity to a credit card entity keyword. This would be typed in
the Word / Phrase match list of a Content Examination Definition. See the "Credit Card" section of
the Content Examination: Entity Keywords page for further details.
• 1 detect creditcard
Other examples:
• 1 detect passport
• 1 detect DOB
• 1 detect SSN
Content Examination Definition Examples
• Content Examination Keyword Trigger: If you want users to have the freedom to decide (on a
per message basis) to send something via Secure Messaging (if they don’t use MFO, MPP or
Mimecast for Mac), the Administrator will have to decide on a keyword, make it part of the
configuration and tell their users what that keyword is and have them use it in the “Subject”
line, for example, the word “Secure” in brackets preceding a normal subject – [Secure] Financial
Documents.
ALERT: If you are creating your first Content Examination policy and you are unsure of
the impact, select None as the Policy Action, and use a Notify Group | Administrator
alerts. Monitor how often you are getting notifications.
In the following configuration, we will configure Content Examination to look for specific keywords,
e.g., [Secure], etc. and Send as a Secure Message based on the matches we find.
For Example: An administrator will notify their employees that if they wish to send something using
Secure Messaging, they can insert a key word – for example: [Secure] into the Subject of an email so
it triggers a Secure Message.
Suspected Malware
Suspected Malware policies, or Zero Hour Adaptive Risk Assessor (ZHARA), is our proprietary
software that provides early detection and prevention against zero-day malware and spam
outbreaks. This provides protection against previously unknown threats using deep level anomaly
detection, and trending against our entire customer base.
4) Archive limit: This option is enabled by default if Attachment Management is not part of the
Mimecast subscription and in which case it is recommended to leave it enabled. The check
offers protection against archives that might be malicious.
5) Policy Action: Hold for Review
6) Hold type: Administrator
7) Notify Internal Recipient: check
Suspected Malware Default Policy
1) Navigate to Administration | Gateway | Policies | Spam Scanning
2) Click the New Policy button
3) Policy Narrative: Default Suspected Malware
4) Select Message Scan Definition: Default Suspected Malware Definition
Attachment Management
What is Attachment Management?
There are attachment-based policies to filter out possible malware by controlling for attachment size
or types of files that are allowed through.
Similar to Suspected Malware but extremely granular. There are several different policies that
correspond with Attachment Management.
There are 3 similar policies: Attachment Block on Size, Attachment Link on Size and Attachment
Hold on size if you navigate to Administration | Gateway | Policies. These policies are intrinsically
matched with our default Attachment Management policy.
Some companies have limited storage on their mail servers. This policy will allow
attachments to be directly downloaded from Mimecast to the local machine.
Attachment Sets
You should have a default definition and policy configured for dangerous file types using Mimecast
Best Practice to block dangerous file types. This would be an Attachment Management Policy with a
Definition called Attachment Sets which is similar to suspected Malware but here you can granularly
decide what you want to do BASED ON THE FILE EXTENSION (block, allow or link).
• Spam Scanning
• Attachment Management
• Content Examination
Select the boxes in the Digest Definition to apply the Digest Notification to inbound emails when
they trigger Spam, Content or Attachment Management Definitions.
Spam Scanning Digest Example:
If the spam detection action is set for hold for review in the spam scanning
definition, the digest can be utilized to inform the user of held messages, at
which point it can be released or blocked.
Frequency of Notifications
Digest Sets are only sent to internal users. The policy is set from
Everyone to Internal. These are sent specifically for an individual
internal user that has anything on user level hold.
Users can get a digest informing them of all spam caught by
Mimecast. These are set by default up to three times but can be sent
hourly over a 24-hour period. They can review these emails via their
Mimecast client and can release block or permit the sender for future communications.
Default Configuration
A default Digest Sets definition and policy is configured on Mimecast accounts as described in
Configuring Digest Set Emails. You can customize the default Digest Set or create new ones that are
specific to your needs.
Be aware, a notification sets definition and policy allows you to customize the digest
set email sent to end users.
Notification Sets
Notification Sets policies allow you to customize the notifications generated by Mimecast for certain
email delivery events. If no policy is configured, the default notifications apply. You can specify
which notifications apply to different end users, as well as user groups.
Some examples include notifying users when a message:
• Has been modified (e.g., stripped attachments)
• Did not complete delivery (e.g., bounced or held)
Normally, there is only one policy for the entire company, mostly scoped from everyone to
everyone.
Under Notifications, you will see you have a set of notifications. You can see which ones are enabled
and support branding.
How it Works
Impersonation Protect detects and prevents these types of attacks by identifying combinations of
key indicators in an email to determine if the content is suspicious, even in the absence of a
malicious URL or attachment.
These indicators include:
Similar Domain (including Attempts to use a similar domain to the target,
homoglyph/homograph) a popular internet domain, or supply chain
partner domain.
Newly observed domains These are more likely to be malicious.
Internal Username (e.g., display name) Is the attacker trying to spoof an internal
sender?
Reply to mismatch Senders trying to hide their true sending email
address.
Key Capabilities
• Ensures end users are protected by blocking, quarantining, or visibly marking suspicious emails.
• Protects against newly observed and newly registered domains used in an attack.
• Scans for popular internet domain brand impersonation.
• Uses a Targeted Threat Dictionary managed by Mimecast that customers can add custom terms to.
To access your Impersonation Protect policy and definition, navigate to Administration | Gateway |
Policies.
User Awareness
If User Awareness settings are enabled as part of a URL
Protection Definition, users can be redirected to a page
providing information about the destination of the link
they've clicked.
Here the user can decide if they want to proceed to the
destination site or abort the request. What happens next
depends on:
• The settings configured in the URL Protect definition
• Whether the URL is considered safe, or harmful
• What action the user chooses when presented with
the user awareness prompts
Notifications
21. Enable Notifications: Enabled
22. Notification Group: Choose your group (e.g., Administrator Alert)
Note: Outbound and Journal Checks will not be discussed in this course. Those configurations are
discussed in the Internal Email Protect course.
URL Protection Default Policy
1. Navigate to Administration | Gateway | Policies | URL Protection
Options
2. Policy Narrative: Default URL Protection
3. Select option: Default URL Protection
Emails From
4. Address Based On: The Return Address
5. Applies From: Everyone
6. Specifically: Applies to All Senders
Emails To
7. Applies To: Internal Addresses
8. Specifically: Applies to all Internal Recipients
Validity
9. Enable / Disable: Enable
10. Set policy as perpetual: Always On
11. Date Range: Eternal
12. Policy Override: Disabled
13. Bi Directional: Disabled
14. Source IP Ranges: No entries
Device Enrollment
Device enrollment enhances security when accessing attachments and links in messages, by using an
authentication service. If the authentication service is turned on, a cookie is stored on the user's
device.
When they access a Targeted Threat Protection service (e.g. a rewritten or attachment release link),
a check is made to see if the cookie is on their device:
How it Works
You can configure Attachment Protect in
different ways, but the following are the two
most common. Pre-emptive Sandboxing is the
out of the box setting:
1. Pre-emptive Sandbox:
A user is sent an email with attachments. Prior to it reaching their mailbox, a pre-emptive sandboxing
and static file analysis is performed on the file before delivering the email with its attachment to the
user.
If the files are deemed safe, the files are passed through whereas if the files contain malicious code,
they are rejected, the Administrator is alerted and directed to the Held Queue to review.
2. Safe File On-Demand:
Attachments are converted to PDF and sent to the user, giving them the option to request the
original files if they wish to edit. If they want the original files, a pre-emptive sandboxing and static
file analysis is then performed on the files before delivering to the user.
If the files are deemed safe, the files are passed through whereas if the files contain malicious code,
they are rejected, the Administrator is alerted and directed to the Held Queue to review.
Delivery Methods
Attachment Protection uses a definition that can be configured to deliver messages using one of the
following methods:
1) Safe File: Users are provided with a safe, transcribed version of the attachment.
2) Safe File with On-Demand Sandbox: Users are provided with a safe, transcribed version of
the attachment, and an option to request the original attachment via the sandbox. When an
original attachment is requested, a detailed security analysis is performed before it is
provided to the user.
Note: The original attachment can only be released within your data retention time frame.
For example, you receive the safe file and confirm it’s what you want, but don’t request the
original file. If there is a 30- day retention period, and you request the original file on the
31st day, you won’t be able to release it.
3) Pre-Emptive Sandbox: Files are submitted to the sandbox during the email delivery process.
All vulnerable file types are analyzed in the sandbox. The message and its attachments are
only delivered to the user if they are considered safe.