Targeted Threat Protection: Impersonation Protect

Document created by user.oxriBaJeN4 Employee on Apr 11, 2016Last modified by user.oxriBaJeN4 Employee on Aug 12, 2019
Version 16Show Document
  • View in full screen mode

To use Targeted Threat Protection - Impersonation Protect, you must have another product from the Targeted Threat Protection suite (e.g. Attachment Protect or URL Protect).

The increasing number of "whaling" attacks, usually targeting an organization's senior management, means additional protection is required against email threats that do not contain attachments or URLs. Traditional spam filtering systems are unable to detect these as suspicious, due to their minimal content.

 

Targeted Threat Protection - Impersonation Protect solves this, by looking for combinations of key identifiers commonly found in these attacks.

 

Introducing Impersonation Protect

 

 

Configuring Attachment Protection Definitions and Policies

 

3 people found this helpful

Attachments

    Outcomes