This guide describes how you can exlude exclude specific senders or recipients from an Impersonation Protection policy, by creating an Impersonation Protect Bypass policy. For example, if Targeted Threat Protection - Impersonation Protect is enabled for messages sent from everyone to all internal recipients, but you want a specific team to be exempt or vice versa.
- Administrators setting up or changing their Targeted Threat Protection configuration
To create / change an Impersonation Protection policy:
- Log in to the Administration Console.
- Click on the Administration toolbar button. A menu drop down is displayed.
- Click on the Gateway | Policies menu item.If you don't see this menu item, your Mimecast account does not have the required permissions. Contact your administrator for assistance.
- Click on the Impersonation Protection Bypass record. Any existing policies are listed.
- Click the New Policy button to create a policy.
- Click on the policy to be changed.
- Complete the Options section as required:
Field / Option Description Policy Narrative Provide a description of the bypass policy to enable you to identify it. This is appended to emails in the archive that have the policy applied. Select Option
Specify the action the bypass policy should take:
- Take no action
- Disable Impersonation Protect
- Complete the Emails From and Emails To sections as required:
Field / Option Description Addresses Based On
Specifies the email address characteristics that the bypass policy should be based on.
A bypass policy bypasses all Impersonation Protection Bypass checks. Specific checks cannot by bypassed.
- Complete the Validity section as required:
Field / Option Description Enable / Disable Use this option to enable or disable the policy. Set Policy as Perpetual Click the "Always On" button to set the policy's start and end dates to "All Time", meaning it never expires. Date Range Use this option to override the "Set Policy as Perpetual" option and set a time period for the policy's activity. Click in the field to display a calendar, specify the required start and end date, and click the "Apply" button. Leave the "Eternal" option selected if you don't wish to specify a start or end date. Policy Override Select this option to override the default order that policies are applied. If there are multiple applicable policies, this policy is applied first unless more specific policies of the same type have also been configured with an override. Bi-Directional Use this setting if you want the policy to apply when a recipient is the sender and the sender is the recipient. Source IP Ranges (n.n.n.n/x) Specify any required source IP ranges for the policy. These only apply if the source IP address used to transmit the email data falls inside, or matches, the range(s) configured. IP ranges should be entered in CIDR notation.
- Click the Save and Exit button.It can take up to ten minutes for the bypass policy to be applied after saving it.