There are 64 configurable
policies in Mimecast

  • Address Alterations​

  • Address Alteration Bypass​

  • Anti-Spoofing​

  • Anti-Spoofing SPF based Bypass​

  • Attachment Block on Size​

  • Attachment Hold on Size​

  • Attachment Link on Size​

  • Attachment Management​

  • Attachment Management Bypass​

  • Attachment Protection​

  • Attachment Protection Bypass​

  • Auto-Allow​

  • Auto-Allow Creation​

  • Auto Response​

  • AV Scan on Release​

  • Blocked Senders​

  • Content Examination​

  • Content Examination Bypass​

  • Content Overseers​

  • Content Preservation ( Days )​

  • Content Preservation ( Minutes)​

  • Continuity Event​

  • Dedicated Delivery Route​

  • Delivery Failure Retry Count​

  • Delivery Routing​

  • Digest Sets​

  • DNS Authentication Inbound​

  • DNS Authentication Outbound​

  • Document Services​

  • Document Services Bypass​

  • Email Alteration Bypass​

  • Email Size Limits

  • External Recipient Limiting​

  • Forwarding Address​

  • Geographical Restrictions​

  • Greylisting​

  • Group Carbon-Copy​

  • Impersonation Protection​

  • Impersonation Protection Bypass​

  • Message Actions​

  • Message Passthrough​

  • Message Sanitization Bypass​

  • Meta Data Preservation ( Days )​

  • Meta Data Preservation ( Minutes )​

  • Notification Sets​

  • Permanent MX Resolution Failure​

  • Permitted Senders​

  • RBL Prevention​

  • Reputation Policy​

  • Scanner Policy​

  • Secure Delivery​

  • Secure Receipt ​

  • Sender Privacy Policy​

  • Sieve Sub Address​

  • Smart Tag Assignment​

  • Smart Tag Bypass Administrative​

  • Smart Tag Bypass Personal​

  • Spam Scanning​

  • Stationary​

  • Stationary Exclusion​

  • Suspected Malware​

  • Suspected Malware Bypass​

  • ULR Protection​

  • URL Protection Bypass

Policy Breakdown

Each policy has a distinct functionality and optimal configuration for your company. We have broken down all polices into 4 categories and derived best practice configuration based on years of experience consulting with this product. We break them down as follows:

18 Core Security
5 Advanced Security
24 Quality of Life
17 Rarely Used

Assessment Reporting

We’ve developed a scoring and reporting methodology that will allow you to understand your email security posture and create a plan for improvement. Additionally, we are the foremost experts in guiding you towards a non-disruptive policy transition and teachers who can help you gain full control and understanding of the platform.

Plan of Action

Within this system your initial goal will be to become CORE compliant. This means that you are scoring 100% optimization for the 18 core security policies within Mimecast. This process can take time, planning, and organization in order to successfully transition. There will be exceptions to most security rules and custom work that needs to be done in many policies. The final result will be that your email security will have extreme efficacy.

Additional benchmarks include the configuration and leverage of powerful but more complex advanced security policies. Our team also has a strong grasp on the quality of life and rarely used policies in Mimecast which we can help configure with you.

Start With a Free Assessment and
Introduction to Our Team