The increasing number of "whaling" attacks, usually targeting an organization's senior management, means additional protection is required against email threats that do not contain attachments or URLs. Traditional spam filtering systems are unable to detect these as suspicious, due to their minimal content.
Targeted Threat Protection - Impersonation Protect solves this, by looking for combinations of key identifiers commonly found in these attacks.
Introducing Impersonation Protect
- How Targeted Threat Protection - Impersonation Protect Works
- Monitoring Impersonation Protect Logs
- Targeted Threat Protection: Frequently Asked Questions
Configuring Attachment Protection Definitions and Policies