Targeted Threat Protection - Impersonation Protect - Configuration

This article contains information on configuring and optimizing Impersonation Protect policies to detect and prevent phishing, whaling, and impersonation attacks, including recommended settings, steps for setup, and integration with email security systems.

Impersonation Protect policies allow you to control:

  •  
    •  
      • What messages to protect.
      • The identifiers used to detect phishing, whaling, impersonation, and socially engineered phishing attacks.
      • The action is taken if one or more of the identifiers are triggered.

Maximum Settings for New Installations

We provide a list of Impersonation Protect definitions and policy settings based on commonly used configurations that we consider to provide an optimal solution to protect you against targeted spearphishing attacks. See the page Configuring Your First Impersonation Protect Definition and Policy for full details. However, as one setting may not meet all your specific requirements, we recommend you review your requirements and changing these options where necessary.

Configuration Steps

To configure Impersonation Protect, follow the steps below:

  1. Configuring Impersonation Protect Definitions.
  2. Configuring Impersonation Protect Custom Threat Dictionaries. This is an optional step.
  3. Impersonation Protect - Impersonation Protect Policies.

For detailed information on how to configure, optimize, integrate, and troubleshoot, see the Email Security Cloud Gateway Knowledge Hub.

Was this article helpful?
0 out of 1 found this helpful

Comments

0 comments

Please sign in to leave a comment.