You've invested in Mimecast to protect your organization, but is your configuration working as hard as it could be?
That's the question behind our new Maximizing Mimecast series: a collection of Product Optimization Guides designed to help you close common configuration gaps and get the full value from your Mimecast deployment.
Each guide tackles a specific, frequently seen misconfiguration, explaining why it matters and how to fix it, step by step, for Microsoft 365, Google Workspace, and On-Premises Exchange environments.
Here's what's available now (requires sign-in):
- Locking Down Your Local Mail Environment: If your mail environment accepts connections from anywhere on the internet, attackers can bypass Mimecast entirely. Lock it down.
- Removing Commonly Abused Domains from Permitted Senders / Profile Groups: Permitting broad domains like gmail.com or outlook.com opens the door to phishing. Tighten your allow lists.
- Removing Unnecessary Anti-Spoofing Bypasses: Anti-spoofing bypasses made sense once. Do they still? Audit and remove what you no longer need.
- Configuring Targeted Impersonation Protection Scans: Protect your VIPs. Make sure impersonation protection is tuned to catch the attacks that target your most sensitive users.
- Configuring Stricter Inbound DNS Scans: Strengthen your inbound DNS checks to catch more spoofed and suspicious mail before it reaches your users.
What should we cover next?
This series is built for you, and we want your input. Tell us which configurations, features, or optimization topics you'd like to see in future guides.
And don't miss what's coming: follow the Maximizing Mimecast - Product Optimization Guides section in our Knowledge Hub to get notified as new guides are published.
Your cybersecurity goals. Our expertise. Let's make sure your configuration reflects both.
Thank you for reading. Please ask your questions below.
David