This article contains information on Mimecast's Targeted Threat Protection - Attachment Protect, which safeguards against malicious email attachments by replacing them with clean, transcribed versions, offering secure access to originals via sandbox analysis.
Targeted Threat Protection - Attachment Protect is an advanced service that protects customers from the growing risk of spearphishing and other targeted attacks using email attachments. This protection is provided on all devices used for the end user's enterprise email account, including smartphones or tablets, whether they are provided directly by the employer or not.
For example, it can be used to strip attachments from inbound messages that could potentially contain malicious code (e.g., PDF, Microsoft Office files). Instead, they are replaced with a clean, transcribed version. Employees have instant access to these clean attachments but can request access to the original files via the sandbox by clicking a link in the notification. When an original attachment is requested, a detailed security analysis is performed on the file before it is provided to the user. This safe file approach eliminates the latency inherent in traditional sandbox solutions, confining wait time to only those minority instances where an editable document is required.
For detailed information on how to configure, optimize, integrate and troubleshoot, see the Knowledge Hub.
Use the links below to learn more about how Targeted Threat Protection - Attachment Protect works and how to set it up:
Introducing Attachment Protect
-
-
-
TTP Attachment Protect - How It Works
Learn how Targeted Threat Protection - Attachment Protect works and how your users interact with it. -
Attachment Protection Dashboard
Learn how the dashboard can be used to report on blocked attachments. -
Managing Attachments
Understand how attachments analyzed by Targeted Threat Protection - Attachment Protect can be released to either the recipient (with the original message), to the recipient (without the original message), or to the sandbox for processing.
-
TTP Attachment Protect - How It Works
-
Configuring Attachment Protection Definitions and Policies
-
-
-
TTP Attachment Protect - Configuration
Understand how to enable the Targeted Threat Protection - Attachment Protect features by creating a definition and policy to apply granular control to the flow of messages as they are processed by us. -
TTP Attachment Protect - Your First Policy
Our settings can provide an optimal solution to protect you against potentially unsafe attachments. -
TTP Attachment Protection - Bypass Policy Configuration
Learn how you can exclude specific senders or recipients from Targeted Threat Protection - Attachment Protect policies.
-
TTP Attachment Protect - Configuration
-
See Also
-
-
- A list of frequently asked questions on Targeted Threat Protection, complete with their answers, can be found here.
-
Comments
Please sign in to leave a comment.