Mimecast Human Risk Command Center - Watchlist Rules Manager - Jan 2026

Service Update

Availability Jan 29th, 2026
Product(s) Human Risk Command Center, Email Security Cloud Gateway, Engage
Who's affected Administrators of SEG and Engage

Overview

Mimecast is pleased to announce the Human Risk Watchlist Rules Manager functionality, available to all Human Risk customers. The Watchlist Rules Manager enables administrators to create and and manage continuously updated dynamic Watchlists of employees based on risk-related behaviors and user attributes. These Watchlists are automatically populated and updated using configurable rules that consider behavior scores (e.g., phishing susceptibility), security events, and user information (e.g., department, region)

Customers can then use the profile groups automatically created by Watchlist as part of email security Policies or via the Profile Group API to drive interventions in other products.

What's changing

  • Introduction of Watchlist Manager: Administrators can now define rules to automatically group users based on risk scores, behavioral events, and demographic information.
  • Dynamic and Automated Updates: Watchlists are evaluated and updated hourly, ensuring that group membership always reflects the latest risk landscape.
  • Integration with Security Policies: Each Watchlist syncs with a corresponding profile group, which can be used directly in Mimecast email security policies or accessed via API to trigger interventions in third-party products.
  • Flexible Rule Criteria: Rules can combine multiple factors, such as recent phishing test failures, malware events, or specific user attributes (e.g., department, region).
  • Continuous Risk Management: Enables organizations to respond quickly to emerging risks and apply targeted controls to the right users at the right time.

The Watchlist Rules Manager feature is available in the Mimecast Administration Console by navigating to Human Risk Command Center | Watchlists Rule Manager.

2026-01-15_13-42-01.png

Recommended actions

  • Identify key risk factors and user attributes relevant to your organization for Watchlist rule creation.
  • Plan how Watchlists will be integrated into your existing security policies and workflows.

See Also...

Was this article helpful?
0 out of 0 found this helpful

Comments

0 comments

Please sign in to leave a comment.