Impersonation Protect - Impersonation Protect Logs

This article describes how to access Impersonation Protect log files.

Applies To

  • Administrators who are responsible for understanding why a potential impersonation protection attack has been triggered.

Displaying a Log File

To display log files:

  1. Log in to the Mimecast Administration Console.
  2. Navigate to Email Security | Impersonation Protection menu item.

Authentication requests are excluded from the listing by default. Authenticated requests can be displayed by applying the Authentication filter. See the Administration Console: Searching / Filtering Records page for full details.

  1. Click on a Log Entry. The details are displayed in a slide-in panel from the right-hand side of the screen.
image.png
  1. Click on the X icon in the top right-hand corner to return to the log file list.

See Also...

Was this article helpful?
0 out of 1 found this helpful

Comments

0 comments

Please sign in to leave a comment.