This page provides an overview of the varied reports created for Impersonation Protect. Impersonation Protect provides instant protection against the latest impersonation attacks.
Impersonation Protect Detections
This page provides an overview of messages which trigger at least one Impersonation Detect policy, and a summary of the statistics above the charts. The donut chart is divided into amounts of suspicious and held attachments. This amount is also recorded in percentages.
The bar chart shows the number of detections made per day, and how many of them are categorized as suspicious, held, or bounced.
This chart is further analyzed through the benchmarking panels, which will show how your business compares against other Mimecast customers across industry, region, and size. If these numbers are unexpectedly high or low, then we recommend you review your policy definitions in the first instance.
Top Impersonation Protect Targets
This table lists the most commonly encountered recipients in Impersonation Protection detections. The recipients are in descending order of mail volume.
Comments
Good day,
Please assist an email account has been hacked and its sending emails as if its the owner.
Thank you for the comment! In order to get you the best solution possible, would you please post it into our Community? Not only will it be addressed by Cybersecurity peers, but the Mimecast team as well. Once you receive a solution, it can be bookmarked for easy retrieval.
If your issue is more urgent and/or you wish to open a new Support case, please do so here.
Please sign in to leave a comment.