Creating / Changing an Impersonation Protection Bypass Policy

Document created by user.KZrHBaK4Vn Expert on Feb 20, 2016Last modified by user.oxriBaJeN4 on Mar 27, 2017
Version 11Show Document
  • View in full screen mode

This guide describes how you can exlude exclude specific senders or recipients from an Impersonation Protection policy, by creating an Impersonation Protect Bypass policy. For example, if Targeted Threat Protection - Impersonation Protect is enabled for messages sent from everyone to all internal recipients, but you want a specific team to be exempt or vice versa.


Applies To...


  • Administrators setting up or changing their Targeted Threat Protection configuration




To create / change an Impersonation Protection policy:

  1. Log in to the Administration Console.
  2. Click on the Administration toolbar button. A menu drop down is displayed.
  3. Click on the Gateway | Policies menu item.
    If you don't see this menu item, your Mimecast account does not have the required permissions. Contact your administrator for assistance.
  4. Click on the Impersonation Protection Bypass record. Any existing policies are listed.
  5. Either:
    • Click the New Policy button to create a policy.
    • Click on the policy to be changed.
  6. Complete the Options section as required:

    Field / OptionDescription
    Policy NarrativeProvide a description of the bypass policy to enable you to identify it. This is appended to emails in the archive that have the policy applied.
    Select Option

    Specify the action the bypass policy should take:

    • Take no action
    • Disable Impersonation Protect
  7. Complete the Emails From and Emails To sections as required:

    Field / OptionDescription
    Addresses Based On

    Specifies the email address characteristics that the bypass policy should be based on.

    A bypass policy bypasses all Impersonation Protection Bypass checks. Specific checks cannot by bypassed.

  8. Complete the Validity section as required:

    Field / OptionDescription
    Enable / DisableUse this option to enable or disable the policy.
    Set Policy as PerpetualClick the "Always On" button to set the policy's start and end dates to "All Time", meaning it never expires.
    Date RangeUse this option to override the "Set Policy as Perpetual" option and set a time period for the policy's activity. Click in the field to display a calendar, specify the required start and end date, and click the "Apply" button. Leave the "Eternal" option selected if you don't wish to specify a start or end date.
    Policy OverrideSelect this option to override the default order that policies are applied. If there are multiple applicable policies, this policy is applied first unless more specific policies of the same type have also been configured with an override.
    Bi-DirectionalUse this setting if you want the policy to apply when a recipient is the sender and the sender is the recipient.
    Source IP Ranges (n.n.n.n/x)Specify any required source IP ranges for the policy. These only apply if the source IP address used to transmit the email data falls inside, or matches, the range(s) configured. IP ranges should be entered in CIDR notation.
  9. Click the Save and Exit button.
    It can take up to ten minutes for the bypass policy to be applied after saving it.

See also...