Search Bluebook IT Support Website

Category: Mimecast

Mimecast – Impersonation Protection Policies

To implement an Impersonation Protection policy requires three steps:- Creating the Impersonation Protection Policy Defining a group of internal users likely to be attacked by Impersonation emails  Applying the policy to this group Steps Creating the Impersonation Policy The policy is defined under Administration, Gateway, Policies. Then in the dropdown box under Definition – choose Impersonation Protection Then select New Definition (or amend the existing policy “SSL Impersonation Protection Policy”) Use the existing policy as […]