There are 64 configurable
policies in Mimecast
Address Alterations
Address Alteration Bypass
Anti-Spoofing
Anti-Spoofing SPF based Bypass
Attachment Block on Size
Attachment Hold on Size
Attachment Link on Size
Attachment Management
Attachment Management Bypass
Attachment Protection
Attachment Protection Bypass
Auto-Allow
Auto-Allow Creation
Auto Response
AV Scan on Release
Blocked Senders
Content Examination
Content Examination Bypass
Content Overseers
Content Preservation ( Days )
Content Preservation ( Minutes)
Continuity Event
Dedicated Delivery Route
Delivery Failure Retry Count
Delivery Routing
Digest Sets
DNS Authentication Inbound
DNS Authentication Outbound
Document Services
Document Services Bypass
Email Alteration Bypass
Email Size Limits
External Recipient Limiting
Forwarding Address
Geographical Restrictions
Greylisting
Group Carbon-Copy
Impersonation Protection
Impersonation Protection Bypass
Message Actions
Message Passthrough
Message Sanitization Bypass
Meta Data Preservation ( Days )
Meta Data Preservation ( Minutes )
Notification Sets
Permanent MX Resolution Failure
Permitted Senders
RBL Prevention
Reputation Policy
Scanner Policy
Secure Delivery
Secure Receipt
Sender Privacy Policy
Sieve Sub Address
Smart Tag Assignment
Smart Tag Bypass Administrative
Smart Tag Bypass Personal
Spam Scanning
Stationary
Stationary Exclusion
Suspected Malware
Suspected Malware Bypass
ULR Protection
URL Protection Bypass
Policy Breakdown
Each policy has a distinct functionality and optimal configuration for your company. We have broken down all polices into 4 categories and derived best practice configuration based on years of experience consulting with this product. We break them down as follows:
18 Core Security
5 Advanced Security
24 Quality of Life
17 Rarely Used
Assessment Reporting
We’ve developed a scoring and reporting methodology that will allow you to understand your email security posture and create a plan for improvement. Additionally, we are the foremost experts in guiding you towards a non-disruptive policy transition and teachers who can help you gain full control and understanding of the platform.
Plan of Action
Within this system your initial goal will be to become CORE compliant. This means that you are scoring 100% optimization for the 18 core security policies within Mimecast. This process can take time, planning, and organization in order to successfully transition. There will be exceptions to most security rules and custom work that needs to be done in many policies. The final result will be that your email security will have extreme efficacy.
Additional benchmarks include the configuration and leverage of powerful but more complex advanced security policies. Our team also has a strong grasp on the quality of life and rarely used policies in Mimecast which we can help configure with you.