Secure Email Gateway: Security Policies: Student Guide - L1
Secure Email Gateway: Security Policies: Student Guide - L1
Security Policies
Student Guide – L1
TABLE OF CONTENTS
MIMECAST EMAIL INSPECTION FUNNEL ............................................................................................................ 4
SUSPECTED MALWARE............................................................................................................................................. 29
ATTACHMENT MANAGEMENT .................................................................................................................................. 30
Scenario
These will highlight real-life use cases.
Discussion
There may be times in the course where the instructor asks participants to take part in a
discussion about a particular topic (e.g., to discuss something where there may be more than
one solution to a problem).
Warning or Alert
This is meant to provide you with a warning about something.
Disclaimer: During an instructor-led class, an instructor will demonstrate configuring certain policies, profiles, etc., in
the Administration Console. This is being done in an environment that is safe for demonstration purposes.
If you wish to follow along in your own environment, we advise as follows:
1. Follow along with the configuration steps and cancel instead of saving.
2. In an instance where you follow along configuring a policy, we advise you to set the “To” and “From” address
fields to reference pilot profile groups that have been configured beforehand. Navigate to Directories | Profile
Groups in the Administration Console and add the email addresses you want in the pilot groups. This will
ensure you are testing policies on a small subset of your user population and not your whole organization.
Please Note: Instructors will use Prefixes for some profile groups, definitions and policies. This is for training purposes
only. As an administrator, you would choose the naming conventions that work for you in your environment.
Some policies work on their own without a definition (for example, Greylisting and Anti
spoofing) whereas others require a link to a definition.
Equal Specificity
For policies (except cumulative policies), where there is equal specificity between two (or more) policies of the same
policy type, the following logic is applied to decide which policy needs to be applied:
Recipient Trumps Sender: When there is equal specificity, the "Emails To" value receives a slightly higher score. This
means the Mimecast Gateway considers the recipient more specific than the sender.
Conditions: Where there is equal specificity, and the "recipient trumps sender" logic does not resolve this, a policy that
has a matching "Source IP Range" or matching "Hostname" validity condition is considered to be more specific.
Most Recently Created: Where there is equal specificity and the "recipient trumps sender" and "conditions" logic do
not resolve this, the most recently created policy is favored.
Use this article to see some specificity examples based on Messages From / Emails To Details as well as working with
groups.
Policy Details
When creating or editing a policy, there will be three sections:
1. Options: Here you enter a name for the policy and select either the
Action to take or the definition you are applying to the policy.
2. Emails From and To: Here you need to specify the conditions an email
has to have to activate the policy. This includes the Emails “From” and
“To” addresses.
3. Validity: Choose to enable / disable a policy, determine the time the
policy will be active, along with IP ranges if applicable.
Date Range: If you wish for your policy to be valid for a specific date
range.
Policy Override: If the Policy Override option is enabled, the policy will be considered before those that do not
have it enabled. When multiple policies have it enabled, those policies will follow the specificity rules to determine
which should apply to your email. If none of those policies apply, only then will your remaining non-override,
policies be considered using the specificity rules.
Bi-Directional: Applies the policy in the reverse mail flow so the policy is applied in both directions.
Source IP Ranges: If a Policy is configured with both a specific FROM variable and source IP address, only emails
which match both of these properties will trigger the Policy. Alternatively, if you would like to specify only the
source IP address, select the FROM variable as Everyone, and enter the desired IP address/range in the Source IP
Range field.
To navigate to a policy, go to Administration | Gateway | Policies and click on a policy to open it.
Anti-Spoofing
An Anti-Spoofing policy is used to avoid spoofing. Having one configured will ensure external messages appearing to
come from an internal domain are blocked. The policy is configured to apply anti-spoofing to email from your domain
to your domain.
Things to be aware of:
• When an email is blocked/rejected by Mimecast, its content is not kept, so cannot be released, or recovered
by Mimecast, so it’s important that this policy is configured correctly.
• If you find that you don’t have a default policy blocking mail from your internal domain to internal addresses,
you will need to create one.
• Anti-spoofing can be applied automatically when a customer is registering a domain or sub-domain in your
Mimecast account.
• If you have a third-party vendor such as MailChimp, Constant Contact or Salesforce that send email appearing
to be from you, you will need to create an Anti-Spoofing exception policy (outlined below) or an Anti-Spoofing
SPF Based Bypass.
©2021 Mimecast. All Rights Reserved |7
Usage Considerations
• Anti-Spoofing policies override addresses or domains permitted by users. For example, messages from a
domain added to a user's permitted senders list AND an Anti-Spoofing policy are rejected.
• This is a “policy only” configuration.
Anti-Spoofing Default Policy
1. Navigate to Administration | Gateway | Policies
2. Click on the Anti-Spoofing policy in the Policy Editor
3. Open the Default Anti-Spoofing policy
Options
4. Policy Narrative: Default Anti-Spoofing
5. Select Option: Apply Anti-Spoofing (Exclude Mimecast IPs)
This will apply anti-spoofing except if an email is sent from one of Mimecast’s public IPs.
Emails From
6. Address Based On: Both
7. Applies From: Email Domain
8. Specifically: Enter the applicable internal domain you wish to block spoofs from.
Emails To
9. Applies To: Internal Addresses
10. Specifically: Applies to all Internal Recipients
Validity
11. Enable / Disable: Enable
12. Set policy as perpetual: Always On
13. Date Range: All Time
14. Policy Override: Disabled
15. Bi Directional: Disabled
16. Source IP Ranges: No entries
17. Hostname(s): No entries
Policy Validity
Validity parameters control the application of a Policy to an email. An Active Policy is applied to
emails, and an Expired Policy is ignored by Mimecast. Validity can be controlled manually, and
Policies can also be automatically set to expire on a certain date. By default policies are set to
apply Eternally.
Note: Policy Validity also allows certain options to be applied to policies. For example, bi-
directional policy application, policy override, and adding Source IP addresses.
For information on Policy Validity, click here.
Note: Messages rejected by the Anti-Spoofing policy can be seen in Message Center | Rejected and Deferred
Messages.
Blocked Senders
A Blocked Senders policy restricts messages to or from specific email addresses or domains. It can apply to inbound or
outbound messages, although is typically used to block inbound messages.
Usage Considerations
Consider the following before creating a policy:
• Messages from blocked senders are rejected and logged in the Rejections Viewer. See the Message Center:
Rejected and Deferred Messages page for further details.
• Blocked Senders policies override any configured Permitted Senders policies.
• Blocked Senders policies override addresses allowed by individual users.
Usage Considerations
Consider the following before creating a policy:
• It isn't necessary to create a policy for all trusted senders, only if a sender is having difficulty sending messages
to your end users.
• End users have a personal permitted sender list. These are managed by them using The Digest Email, or when
logged onto the Mimecast Personal Portal or Mimecast for Outlook.
• Referencing a user group enables you to minimize the number of Permitted Sender policies you need. The only
time a specific policy is required is if the domain entry contains a wildcard. This requires a separate policy to
permit by IP (everyone to everyone).
• Blocked Senders Policies always supersede over Permitted Senders policies. This means that messages from a
domain or email address that are added to both a Blocked AND Permitted Senders policy are rejected. These
policies don't override default virus checks.
• An entry on a user's blocked senders list in Managed Senders, whether it has been added by an administrator
or a user, is always superseded by a Permitted Senders policy if it relates to (P1) envelope addresses. Read
more on this here.
These messages are still subjected to DNS authentication. Failing SPF, DKIM and DMARC checks
can cause Mimecast to ignore this list entirely.
Usage Considerations
• An Auto Allow entry is automatically deleted if no emails are sent to the address for 120 days.
• Auto Allow database entries are maintained in an End User's Managed Senders List.
• Auto Allow database entries are not generated when:
o Auto-responses are sent (including Out of Office messages).
o Suspected spam related messages are released, and the recipient subsequently replies to the sender.
If you needed to make an exception to exclude certain addresses you can create an Auto Allow Creation policy with the
Select Option set to “Do Not Generate AAL Entries”. You would do this, for example, if you had a marketing group
mailbox sending out mass mailings and you did not want those external email addresses to be logged as Auto Allow
entries.
To access the policy, navigate to Administration | Gateway | Policies. To configure, see this article.
Managed Senders
Managed Senders are the email addresses that end users have blocked, permitted, or have been added to their auto-
allow list. Users can block or permit from either the Personal Portal, Mimecast for Outlook or a Digest Email.
An administrator can view, add, modify, or delete these entries. In fact, you may need to edit these entries to
troubleshoot some email delivery flow issues, or to prevent users from accepting email from dubious sources.
Usage Considerations
• Administrators can manage a user's personal managed senders. Corrections may be necessary when a user has
incorrectly created an entry by:
o Using a digest set to block / permit an external email address.
o Using Mimecast Personal Portal or Mimecast for Outlook to block / permit addresses and / or domain
names.
o Sending a message to an external recipient, which adds the external address to their auto allow list.
• Blocked Senders Policies always supersede Permitted Senders policies. This means that messages from a
domain or email address that are added to both a Blocked AND Permitted Senders policy are rejected. These
policies do not override default virus checks.
• An entry on a user's blocked senders list in Managed Senders, whether it has been added by an administrator
or a user, is always superseded by a Permitted Senders policy.
• Permitted / blocked addresses only apply to the user's primary SMTP address. If you update the user's primary
SMTP address, the personal managed senders list no longer applies, and the address must be re-added.
DNS Authentication
What is DNS Authentication?
DNS Authentication combines three industry-standard email authentication technologies (DMARC, DKIM and SPF) that
allow domain owners to control who sends on behalf of their domains. It also validates the authenticity of inbound
messages.
• SPF (Sender Policy Framework) is an open standard for email authentication. It ensures that any messages
sent using a domain come from permitted sources. It does this by checking the domain from the inbound
message's "From Address", to see if the originating IP address is listed in the domain's DNS record. If the IP
address is not listed, a failed result is returned.
• DKIM (Domain Keys Identified Mail) adds a cryptographic hash or signature as a new header to outbound
messages. This ensures outbound messages haven't been altered after leaving the sending organization's mail
server, by matching the hash or signature to the DNS records. DKIM requires a public DKIM key to be published
in a TXT record in the DNS record for the sender's domain by the domain owner.
• DMARC (Domain Based Message Authentication, Reporting & Conformance) is an email validation system
designed to detect and prevent email spoofing, that builds protection on top of the SPF and DKIM
mechanisms. It ensures messages are correctly authenticated using the SPF and DKIM email authentication
standards.
SPF Settings
SPF
Description Recommended Setting Notes
SPF None Ignore Managed/Permitted The domain owner has not chosen to implement SPF,
Sender Entries meaning that senders using this domain do not need to
authenticate to send on its behalf. Therefore, it is
(Note: DNS Checks are still recommended to perform spam / reputation-based checks
performed) to minimize the level of unwanted mail.
SPF Neutral Ignore Managed/Permitted Neutral SPF results are for when the domain owner has not
Sender Entries specified whether a sender using this domain are permitted
to send on their behalf. With this in mind, messages
returning this SPF result should be spam scanned to
minimize the level of unwanted mail being received.
SPF Soft Fail Ignore Managed/Permitted The Soft Fail result is generally considered to be a temporary
Sender Entries setting, whilst SPF is being configured. It does not cause any
restrictions to be applied. All that is added is a header value
containing the check result. However, once all the sending IP
Addresses are added to the relevant SPF DNS record, the
SPF failure action should be changed to Hard Fail. Therefore,
inbound messages with this result should have spam /
reputation-based checks applied rather than rejected.
SPF Hard Fail Reject Any inbound messages that result in an SPF Hard Fail should
be rejected. In these cases, the sender is not sending the
message from an authorized IP address.
SPF PermError Ignore Managed/Permitted PermErrors are similar to TempErrors. They can be caused
Sender Entries by incorrectly formatted SPF records being present and
The default definition is set to Ignore Managed/Permitted Sender entries which means Reputation, greylisting, and
spam checks are performed on the inbound message.
Note: In this course, we will not cover the DKIM or DMARC settings. Please refer to the article below for further detail.
Reputation
Reputation policies allow you to manually configure the reputation checks applied to inbound mail. Together with
reputation definitions, they provide granular control over the default reputation spam detection technologies we
apply. When an inbound message is rejected because of a reputation check, the event is logged in the Rejection
Viewer.
Reputation policies check the reputation of the sending IP against Mimecast Global Permitted List of IPs and Global
Block Lists (RBL). We use several block lists and give a score to the IP based on how many of those lists it matches (how
many hits it gets).
Reputation Definition
1. Navigate to Administration | Gateway | Policies | Definitions | Reputation Definition
2. Open the Reputation Definition
3. Description: Reputation Definition
4. Mimecast Global Permitted List
[Check inbound email against an IP address based permitted list. If the connecting IP address is present on the
permitted list, it bypasses the spam check.]
5. Global Block Lists
[If selected, all inbound email is checked for spam against 5 IP address-based block lists. This option is used in
conjunction with the "Number of Block List Hits" option]
6. Number of Block List Hits
[Specify a value to set the number of hits required before the sending IP address of a message is rejected.]
Reputation Policy
1. Navigate to Administration | Gateway | Policies | Reputation Policy
2. Open the Reputation Policy
Options
3. Policy Narrative: Reputation Policy
4. Select option: Reputation Definition
Emails From
5. Address Based On: The Return Address
6. Applies From: Everyone
7. Specifically: Applies to All Senders
Emails To
8. Applies To: Internal Addresses
9. Specifically: Applies to all Internal Recipients
Validity
10. Enable / Disable: Enable
11. Set policy as perpetual: Always On
12. Date Range: Eternal
13. Policy Override: Disabled
14. Bi Directional: Disabled
15. Source IP Ranges: No entries
16. Hostname(s): No entries
Greylisting
Greylisting is a default compliance check applied to all inbound messages not previously seen by the Mimecast Servers.
This helps to defend email users from unsolicited spam email.
Usage Considerations
Consider the following before creating a policy:
• All email connections that have been subjected to greylisting are logged in the Deferred Messages Queue.
• Any sender email address, domain, or IP address added to the Auto Allow or Permitted Senders list isn't
subjected to greylisting.
• A greylisting policy is created by default by Mimecast Support during the Implementation process, configured
to apply to all inbound traffic. There may be instances where you have trouble receiving email from legitimate
senders, whose MTA haven't been correctly configured. If the sender's MTA doesn't comply with RFC
standards, but their messages are deemed safe for your organization, you can create a greylisting bypass
policy.
Greylisting Policy
1. Navigate to Administration | Gateway | Policies | Greylisting
2. Open the Greylisting Policy
Options
3. Policy Narrative: Greylisting Policy
4. Select option: Apply Greylisting
Emails From
5. Address Based On: The Return Address
6. Applies From: Everyone
7. Specifically: Applies to All Senders
Emails To
8. Applies To: Internal Addresses
9. Specifically: Applies to all Internal Recipients
©2021 Mimecast. All Rights Reserved | 19
Validity
10. Enable / Disable: Enable
11. Set policy as perpetual: Always On
12. Date Range: Eternal
13. Policy Override: Disabled
14. Bi Directional: Disabled
15. Source IP Ranges: No entries
16. Hostname(s): No entries
To access the policy, navigate to Administration | Gateway | Policies. To configure, see this article.
Spam Scanning
Mimecast's multiple scanning engines examine the content of inbound mail by searching for key phrases and
identifiers commonly used by spammers. Based on the findings Mimecast will make a decision based on whether or
not an email is allowed through, held or rejected.
Considerations
Consider the following before configuring a definition or policy:
• Our spam engine works by giving each email a spam score. A message with a spam score of 28 or higher is
automatically rejected in protocol and logged in the Rejection Viewer. This happens regardless of whether a
spam scanning policy is configured.
• If an email address, domain name, or IP address is added as a permitted sender, the inbound message still
undergoes spam scanning, but the spam scanning definition action is not applied.
• If a DNS Authentication policy applies to a message, but the permitted sender fails the DNS checks (e.g. SPF)
the message is still subjected to spam scanning.
Users can prevent messages from being classified as greymail by adding senders to their
Managed Senders list using a Mimecast End User Application like Mimecast for Outlook or the
Mimecast Personal Portal.
To access the policy, navigate to Administration | Gateway | Policies. To configure, see this article.
Usage Considerations
Consider the following before configuring a policy:
• Secure Delivery and Secure Receipt policies are required to ensure the entire transmission is encrypted
These policies are bi-directional so it will apply to both inbound and outbound email.
To access the Secure Delivery and Receipt policies, navigate to Administration | Gateway | Policies.
There is NO POLICY required with the MFO configuration. You will need to apply
this definition to all users by way of options you select under an Application Settings
Definition.
6) Secure Messaging Folder: Use Lookup and select the appropriate Secure Messaging Definitions folder
[This will pull in all the definitions under this folder]
7) Save and Exit
Secure Messaging options in the Mimecast For Outlook plugin are based on the
Secure Messaging folder chosen within Application Settings. All definitions within the
chosen folder will appear as options when applicable users click the Send Securely
button in their email client.
Content Examination
Overview
A Content Examination definition analyzes the content of messages (e.g., message body, subject and header), looking
for patterns and matches you provide. It sets the conditions under which a message is considered safe, and what
action should be taken if it isn’t.
Content Examination Policies can trigger:
• Actions:
None
Hold
Delete
Bounce
Content Examination Policies don’t apply based on policy specificity. They can apply to every single
message that falls under the scoping of the policy. In other words, multiple content examination
policies can be applied to a single message.
ALERT: Please note that while Mimecast supports the use of regular expressions, and may
recommend certain ones to use, we do not directly support the writing of the expressions
themselves and cannot provide troubleshooting based on how they are constructed - we can only
compare the regex you are using vs. message content to see if the content matched or not, if
troubleshooting is needed.
Entities
Entities allow administrators to search for sensitive information in messages and attachments, without the need to
create complicated word lists or regular expressions (regex). Entity groups are a collection of entities aligned by
category (e.g., PII, PHI or Financial). This allows administrators to search based on a subject area, rather than listing
individual entities to achieve the same goal.
Types of Entities
• Credit Cards
• Passport Numbers
• Date of Birth
• Social Security Number
The "creditcard" entity finds all credit card numbers, regardless of the credit card type. For example, the following
would match any credit card number found in the specified areas of an email (header, body, attachment), if it is within
proximity to a credit card entity keyword. This would be typed in the Word / Phrase match list of a Content
Examination Definition. See the "Credit Card" section of the Content Examination: Entity Keywords page for further
details.
• 1 detect creditcard
Other examples:
• 1 detect passport
• 1 detect DOB
• 1 detect SSN
ALERT: If you are creating your first Content Examination policy and you are unsure of
the impact, select None as the Policy Action, and use a Notify Group | Administrator
alerts. Monitor how often you are getting notifications.
In the following configuration, we will configure Content Examination to look for specific keywords, e.g., [Secure], etc.
and Send as a Secure Message based on the matches we find.
For Example: An administrator will notify their employees that if they wish to send something using Secure Messaging,
they can insert a key word – for example: [Secure] into the Subject of an email so it triggers a Secure Message.
Suspected Malware
Suspected Malware policies, or Zero Hour Adaptive Risk Assessor (ZHARA), is our proprietary software that provides
early detection and prevention against zero-day malware and spam outbreaks. This provides protection against
previously unknown threats using deep level anomaly detection, and trending against our entire customer base.
4) Archive limit: This option is enabled by default if Attachment Management is not part of the Mimecast
subscription and in which case it is recommended to leave it enabled. The check offers protection against
archives that might be malicious.
5) Policy Action: Hold for Review
6) Hold type: Administrator
7) Notify Internal Recipient: check
Attachment Management
What is Attachment Management?
There are attachment-based policies to filter out possible malware by controlling for attachment size or types of files
that are allowed through.
Similar to Suspected Malware but extremely granular. There are several different policies that correspond with
Attachment Management.
There are 3 similar policies: Attachment Block on Size, Attachment Link on Size and Attachment Hold on size if you
navigate to Administration | Gateway | Policies. These policies are intrinsically matched with our default Attachment
Management policy.
Some companies have limited storage on their mail servers. This policy will allow attachments
to be directly downloaded from Mimecast to the local machine.
• Spam Scanning
• Attachment Management
• Content Examination
Select the boxes in the Digest Definition to apply the Digest Notification to inbound emails when they trigger Spam,
Content or Attachment Management Definitions.
Frequency of Notifications
Digest Sets are only sent to internal users. The policy is set from Everyone to
Internal. These are sent specifically for an individual internal user that has
anything on user level hold.
Users can get a digest informing them of all spam caught by Mimecast. These
are set by default up to three times but can be sent hourly over a 24-hour
period. They can review these emails via their Mimecast client and can release
block or permit the sender for future communications.
Default Configuration
A default Digest Sets definition and policy is configured on Mimecast accounts as described in Configuring Digest Set
Emails. You can customize the default Digest Set or create new ones that are specific to your needs.
Be aware, a notification sets definition and policy allows you to customize the digest set email
sent to end users.
Notification Sets
Notification Sets policies allow you to customize the notifications generated by Mimecast for certain email delivery
events. If no policy is configured, the default notifications apply. You can specify which notifications apply to different
end users, as well as user groups.
Some examples include notifying users when a message:
• Has been modified (e.g., stripped attachments)
• Did not complete delivery (e.g., bounced or held)
Normally, there is only one policy for the entire company, mostly scoped from everyone to everyone.
Under Notifications, you will see you have a set of notifications. You can see which ones are enabled and support
branding.