To implement an Impersonation Protection policy requires three steps:-
- Creating the Impersonation Protection Policy
- Defining a group of internal users likely to be attacked by Impersonation emails
- Applying the policy to this group
Steps
- Creating the Impersonation Policy
- The policy is defined under Administration, Gateway, Policies.
- Then in the dropdown box under Definition – choose Impersonation Protection
- Then select New Definition (or amend the existing policy “SSL Impersonation Protection Policy”)
- Use the existing policy as a template for any new policy
- Save and Exit
- Defining a Group
- To create a Profile Group – go to Administration, Directory, Profile Group
- A new “Group” is created by clicking on the plus sign attached to the “Root” envelope. A sub-folder is created called New Folder
- Click on the label “New Folder”. Notice a window appear above the Root called “Edit Group” with the name New Folder in the window. You can change the folder name here to something more relevant – such as Impersonation Targets
- Now click on the label Impersonation Targets in the subfolder. Above the right window select Build – Add email addresses. Add the addresses of the users to be in this group. It is unlikely that all users will be targeted by impersonation emails as they are usually sent to those who can enact fund transfers. So the addresses to add here are Finance, Finance Officer, Directors, etc.
- After adding each email address – click Save and Exit
- To create a Profile Group – go to Administration, Directory, Profile Group
- Apply the policy
- To apply the recently created Impersonation Protection Policy definition, go to Administration, Gateway Policies and scroll down the left hand column under “Policy Name” to Impersonation Protection
- Select and then either create a New Policy or click on an existing
- Select in the box “Option” the policy (in the existing policy this is called “SSL Impersonation Protection Policy”)
- In the “Applies” to under “Email Groups” choose the group you just created “Impersonation Targets”
- Save and Exit