Targeted Threat Protection - URL Protect

Document created by user.oxriBaJeN4 Employee on Sep 7, 2015Last modified by user.oxriBaJeN4 Employee on Jul 11, 2019
Version 22Show Document
  • View in full screen mode

Targeted Threat Protection - URL Protect is an advanced Mimecast service, that builds on our security gateway services to protect your organization against the growing threat posed by advanced phishing and spear phishing attacks in inbound mail. It works by rewriting all URLs in inbound messages. This means each time the link is clicked by the end user, we can conduct security checks on the destination web page in real time. It provides your organization with the following benefits:

  • Instant protection from targeted attacks and spear phishing attempts across all devices, without any client side software.
  • Protection against good websites turning bad or delayed exploits.
  • Centrally managed, rapid deployment without using any additional infrastructure.
  • Centrally visible administrative monitoring and reporting on user activity.


Introducing Targeted Threat Protection - URL Protect


For information on Targeted Threat Protection - URL Protect, see the guides listed below:


Configuring URL Protect Definitions and Policies


For information on configuring URL Protect definitions and policies, see the guides listed below:


User Awareness / Device Enrollment


For information on configuring user awareness and device enrollment, see the guides listed below:


Further Information


For further information on configuring URL Protect, see the guides listed below:

  • Using Managed URLs
    Describes how you can use Targeted Threat Protection - URL Protect's managed URL functionality to add a domain or URL to a block or allow list, thereby overriding the real-time action when a link is clicked.
  • Verifying a URL
    Describes how you can verify a URL that has been rewritten by Targeted Threat Protection - URL Protect.
  • Decoding / Checking a URL
    Describes how you can decode and check the safety of a URL without clicking on it, from the Targeted Threat Protection - URL Protect dashboard.
  • Displaying Targeted Threat Protection - URL Protect Log Files
    Describes how you can view the URL Protect log file details for each link clicked on by end users, as well as how to block or allow a URL.
  • Optimizing Targeted Threat Protection 
    Provides help to help you perform a review of your current environment and learn about the latest Targeted Threat Protection optimizations.
9 people found this helpful