This article describes how to configure a Targeted Threat Protection Impersonation Protect policy. This requires that you have a preconfigured Targeted Threat Protection Impersonation Protect definition. See the Impersonation Protect Definitions page for full details.
For detailed information on configuring, optimizing, integrating, and troubleshooting the Impersonation Protect Guides & Resources page.
Considerations
Impersonation Protect only applies to messages from external senders. An Impersonation Protect policy won't capture:
- A spoofed message if anti-spoofing is bypassed.
- Internal to internal messages, even if the individual's email address is in a profile group and scoped to an Impersonation Protect policy.
Common Settings for New Installations
We provide a list of Impersonation Protect definitions and policy settings based on commonly used configurations that can protect you against targeted spearphishing attacks. For full details, see the Impersonation Protect First Policy page.
As one setting may not meet all your specific requirements, we recommend you review your requirements and change these options where necessary.
You can configure up to 20 Impersonation Protect policies. To do so:
- Log in to the Mimecast Administration Console.
- Navigate to Policies | Gateway Policies.
- Select the Impersonation Protection item.
- Either click on the following:
-
- New Policy button to create a definition.
- Policy to be changed.
- Complete the Options section as required:
| Field / Option | Description |
| Policy Narrative | Describe the policy to enable you to identify it. This is appended to emails in the archive that have the policy applied. |
| Select Option |
Select the definition to be applied to the policy:
|
| Preview |
This field can be used to display a preview of the definition selected in the Select Option field: |
- Complete the Emails From this section as required:
| Field / Option | Description |
| Addresses Based On |
Specify the email address characteristics the policy is based on. The options are:
|
| Applies From |
Specify the sender characteristics the policy is based on. For multiple policies, apply them from the most to least specific. The options are:
|
- Complete the Emails To section as required:
| Field / Option | Description |
| Applies To |
Specify the sender characteristics the policy is based on. You should apply multiple policies from the most to least specific. The options are:
|
- Complete the Validity section as required:
| Field / Option | Description |
|---|---|
| Enable / Disable | Use this to enable (default) or disable a policy. If a date range has been specified, the policy will automatically be disabled when the end of the configured date range is reached. |
| Set Policy as Perpetual | If the policy's date range has no end date, this field displays Always On, meaning the policy never expires. |
| Date Range | Use this field to specify a start and/or end date for the policy. If the Eternal option is selected, no date is required. |
| Policy Override | This overrides the default order in that policies are applied. If there are multiple applicable policies, this policy is applied first unless more specific policies of the same type are configured with an override. |
| Bi-Directional | If selected, the policy is applied when the policy's recipient is the sender and the sender is the recipient. |
| Source IP Ranges (n.n.n.n/x) | Enter any required Source IP Ranges for the policy. These only apply if the source IP address used to transmit the message data falls inside or matches the range(s) configured. IP ranges should be entered in CIDR notation. |
- Click on the Save and Exit button.
Comments
Please sign in to leave a comment.