This article contains information on configuring Suspected Malware Policies and Definitions in Mimecast, including early detection of zero-day threats, policy actions, notification options, and considerations for bypassing malware checks or handling encrypted files.
Suspected Malware Policies, or Zero Hour Adaptive Risk Assessor (ZHARA), is our proprietary software that provides early detection and prevention against zero-day malware and spam outbreaks. This protects against previously unknown threats using deep-level anomaly detection and trending against our entire customer base.
Considerations
Consider the following before configuring a definition or policy:
- A default Suspected Malware policy is created when your Mimecast account is created. See the Out of the Box Settings for Mimecast Email Security page for further information.
- You can bypass malware checks with a Suspected Malware Bypass policy. This should only be implemented if regular attachments are blocked, which should be allowed through. Bypassing Suspected Malware checks can result in undetected virus outbreaks while signatures are being updated. See the Configuring Suspected Malware Bypass Policies page for further details.
- Encrypted ZIP files cannot be checked, although they can be held using an Attachment Management policy.
Configuring a Suspected Malware Definition
To configure a Suspected Malware definition:
- Log in to the Mimecast Administration Console.
- Select the Policies | Gateway Policies menu item.
- Click on the Definitions button.
- Click on the Suspected Malware definition type from the list.
- Either click on the:
-
- Definition to be changed.
- New Definition button to create a definition.
- Complete the Malware Definitions Settings section as follows:
If you have Attachment Management enabled on your Mimecast account, the Dangerous Files, Encrypted Archives, Unreadable Archives, and Scan for Disallowed Extensions options should be left unchecked. The existing Attachment Management policy already covers these four options.
| Field / Option | Description | ||||||||
| Description | Add a description for the definition. | ||||||||
| Suspected Malware | If selected, messages containing an archived file format (e.g., .ZIP) containing one or more of the following file types are considered as suspected malware.
|
||||||||
| Dangerous Files | If selected, messages containing any of the file types listed on the What is a Dangerous File Type? page are considered dangerous. | ||||||||
| Encrypted Archives | All encrypted or password-protected archive files will be processed according to the selected options. Hold places messages containing these attachments on hold pending user action. Block strips the attachment and places it in the held queue. | ||||||||
| Unreadable Archives | Provides a way to control the handling of encrypted archives not supported by the archive extraction process. Attachments found to be an unsupported archive type are processed according to the selected option of Allow/Link/Hold/Block.
|
||||||||
| Scan for Disallowed Extensions Within Legacy Microsoft Office Files | This option is enabled by default if Attachment Management is not part of your Mimecast subscription. In that scenario, we recommend it is left enabled. The check offers protection against dangerous files detected in legacy Microsoft Office extensions. | ||||||||
| Scan for Microsoft Office Macros | This option is disabled by default. The check offers protection against Microsoft Office attachments that hold macros. The "Scan for Disallowed Extensions Within Legacy Microsoft Office Files" option must also be enabled for detection in legacy Microsoft Office files. Legacy Microsoft PowerPoint files are excluded. | ||||||||
| Archive Limit |
Check for the following attributes:
For example, Excel files can be packaged as XML files. To determine the true uncompressed size of the file change, change the extension to .ZIP and unpack the file. |
- Complete the Notification Options section as follows:
| Field / Option | Description |
| Policy Action |
This menu provides options such as hold for review, bounce, and delete.
|
| Hold Type | Specifies that Administrators are able to see the held messages via Mimecast's end user applications. The field is only displayed if the Policy Action field has a Hold for Review value. |
| Notify Group | Use this option to notify a group of users when the policy is triggered. Use the Lookup button to select a group. |
| Notify (Internal) Sender | Use this option to notify an internal sender that the policy has been triggered. |
| Notify (Internal) Recipient | Use this option to notify an internal recipient that the policy has been triggered. |
| Notify (External) Sender | Use this option to notify an external sender that the policy has been triggered. |
| Notify (External) Recipient | Use this option to notify an external recipient that the policy has been triggered. |
- Click on the Save and Exit button.
Configuring a Suspected Malware Policy
To configure a Suspected Malware policy:
- Log in to the Mimecast Administration Console.
- Select the Policies | Gateway Policies menu item.
- Click on Suspected Malware.
- Either click on the:
-
- Policy to be changed.
- New Policy button to create a policy.
- Complete the Options section as required:
| Field / Option | Description |
|---|---|
| Policy Narrative | Provide a description for the policy to allow you to identify it in the future easily. |
| Select Suspected Malware Definition | Use the Lookup button to select the required Suspected Malware definition for the policy. |
- Complete the Emails From and Emails To sections as required:
| Field / Option | Description |
| Addresses Based On |
Specify the email address characteristics the policy is based on. This option is only available in the Emails From section. The options are:
|
| Applies From / To |
Specify the Sender characteristics the policy is based on. For multiple policies, you should apply them from the most to the least specific. The options are:
|
- Complete the Validity section as required:
| Field / Option | Description |
|---|---|
| Enable / Disable | Use this to enable (default) or disable a policy. Disabling the policy allows you to prevent it from being applied without having to delete or backdate it. Should the policy's configured date range be reached, it is automatically disabled. |
| Set Policy as Perpetual | Specifies that the policy's start and end dates are set to Eternal, meaning the policy never expires. |
| Date Range | Specify a start and end date for the policy. This automatically deselects the Eternal option. |
| Policy Override | Select this to override the default order in which policies are applied. If there are multiple applicable policies, this policy is applied first unless more specific policies of the same type have also been configured with an override. |
| Bi-Directional | If selected, the policy also applies when the policy's recipient is the sender and the sender is the recipient. |
| Source IP Ranges (n.n.n.n/x) | Enter any required Source IP Ranges for the policy. These only apply if the source IP address used to transmit the message data, falls inside or matches the range(s) configured. IP ranges should be entered in CIDR notation. |
- Click on the Save and Exit button.
Comments
Please sign in to leave a comment.