This guide describes how to integrate Brand Exploit Protect with your Mimecast account.
Brand Exploit Protect can be used without integrating with your Mimecast account. However, to get the best return on your investment, we recommend that it be integrated. This provides the ability to create policies to provide web and email protection from the Brand Exploit Protect dashboard.
Integration requires you to perform the following in the Mimecast Administration Console:
Considerations
Before you start the integration, review the following considerations.
- It is best practice to create a dedicated Brand Exploit Protect user, and use it to generate keys. This avoids instances where an employee might leave the company or change roles, and having to assign a different user. See the Brand Exploit Protect: Managing Users page for further details..
- The "Admin IP Range" is currently incompatible with the BEP integration
- If you are using the "Admin IP Range", this is currently incompatible with the BEP integration, but is currently being considered. The best options would be to disable the IP range or continue to use the BEP service without the integration. The latter would only affect the ability to generate policies from the BEP dashboard.
Creating an API Application Record
To create an API Application record:
- Log on to the Mimecast Administration Console.
- Navigate to Services | API and Platform Integrations.
- Click on the Add API Application button.
- Complete the Application Details dialog as follows:
See the Managing API Applications page for further details.
| Field / Option | Value |
|---|---|
| Application Name | Brand Exploit Protect Integration. |
| Category | Other |
| Service Application | Enabled |
| Description | API Application to enable integration with Brand Exploit Protect. |
- Click the Next button.
- Complete the Application Settings dialog as follows:
| Field / Option | Value |
|---|---|
| Developer |
Enter a name for the internal owner. Ensure they have the required access to the Administration Console. |
| Enter the owner's email address. |
- Click the Next button.
- Review all the information you've entered. Click the Previous button to go back to change any details.
- Click the Add button.
Requesting the Access / Secret Keys
After you've created the application, you must wait 30 minutes before requesting the private keys.
To request the private keys:
- Log in to the Mimecast Administration Console.
- Navigate to Services | API and Platform Integrations.
- Click on the API Application.
- In the slide out panel, click on the Create Keys button.
- Enter the Email Address of a service account. You must know the account’s domain or cloud password.
Ensure this user has the required access to the Mimecast Administration Console.
- Click the Next button.
- Complete the Account Password dialog as follows:
| Field / Option | Value |
|---|---|
| Type | Cloud |
| Password | Specify the Administration Console password for the email address previously entered. |
- Click the Next button. A verification code is sent to the user's email address.
- Enter the Code to authenticate the request.
- Click the Next button. The Access Key and Secret Key fields are displayed.
- Either click the:
-
icon to reveal the keys.
-
icon to copy the key to your clipboard.
You must make a note of both keys in a secure place, as they won't be displayed again after you have exited this page.
-
Click the Close button.
Minimum Admin Rights Required
The dedicated user created for the purposes of generating the API keys, must be a Basic Admin level or above.
If you would like to give the Basic Admin dedicated user the minimum needed permissions please refer to the following list of end points that are being interacted with by the API integration:
- Create Block Sender Policy API: in order to successfully use this endpoint the logged-in user must be a Mimecast administrator with at least the Gateway | Policies | Edit permission.
- Create Managed URL API: In order to successfully use this endpoint the logged-in user must be a Mimecast administrator with at least the Services | Targeted Threat Protection – URL Protect | Edit permission.
- Get Managed URL API: To successfully use this endpoint the logged-in user must be a Mimecast administrator with at least the Services | Targeted Threat Protection – URL Protect | Edit permission.
- Create/Get/Update Group & Add Group Members APIs: in order to successfully use this endpoint the logged-in user must be a Mimecast administrator with at least the Directories | Groups | Edit permissions.
Comments
Please sign in to leave a comment.