Whitelisting in Mimecast

This article will cover how to whitelist our Platform’s training notifications and simulated phishing emails if you are using Mimecast. Below are instructions for several different policies you'll need to implement in the Mimecast console to allow the Platform to function correctly.


In this Guide:

  1. Permitted Senders Policy
  2. Greylisting
  3. Impersonation Protection Bypass Policy
  4. Anti-Spoofing Policy
  5. URL Protection Bypass Policy

If you encounter issues whitelisting in Mimecast, we recommend contacting them directly for specific instructions. You can also contact us at support@goldphish.com.


Permitted Senders Policy

To successfully whitelist our phishing and training related emails when using Mimecast, we recommend creating a new Permitted Sender Policy within your Mimecast console. 

NOTE: Do not edit your default Permitted Sender Policy, you MUST create a new one.

1. Log onto the Mimecast Administration console.

2. Open the Administration Toolbar.

3. Select Gateway | Policies.

4. Select Permitted Senders.

5. Select New Policy.

6. Select the appropriate settings (below) under the OptionsEmails FromEmails To, and Validity sections.

For more information, see Mimecast's Configuring a Permitted Senders Policy.

7. Enter Our Domains in the Emails From > Applies From > Specifically Field.

Option Setting
Options
Policy Narrative Security Awareness Permitted Senders
Select Option Permit Sender
 
Emails From  
Addresses Based On Both
Applies From Email Domain
Specifically Our whitelisting technical information can be found here: Whitelisting Technical Information
   
Emails To
Applies To Internal Addresses
Specifically Applies to all Internal Recipients

Validity
Enable/Disable Take no action
Set policy as perpetual Take no action
Date Range Take no action
Policy Override Take no action
Bi Directional Take no action
Source IP Ranges (n.n.n.n/x) Take no action

Greylisting

Adding the Security Awareness Platform to the permitted senders list (above) should bypass Greylisting. However, we recommend following the Greylisting steps below to avoid any potential delivery issues:

1. Log onto the Mimecast Administration console.

2. Open the Administration Toolbar.

3. Select Gateway | Policies.

4. Select Greylisting.

5. Select New Policy.

6. Select the appropriate settings (below) under the OptionsEmails FromEmails To, and Validity sections.

7. Enter Our Domains in the Emails From > Applies From > Specifically Field.

Option Setting
Options
Policy Narrative Security Awareness Platform Greylist
Select Option Take no action
 
Emails From  
Addresses Based On Both
Applies From Email Domain
Specifically Our whitelisting technical information can be found here: Whitelisting Technical Information.
   
Emails To
Applies To Internal Addresses
Specifically Applies to all Internal Recipients

Validity
Enable/Disable Take no action
Set policy as perpetual Take no action
Date Range Take no action
Policy Override Take no action
Bi Directional Take no action
Source IP Ranges (n.n.n.n/x) Take no action

Impersonation Protection Bypass Policy

To enable simulated phishing emails that look like they are from users/domains within your organisation (spoofed domain), you'll need to create an Impersonation Protection Policy and Anti-Spoofing Policy in the Mimecast Console.

First, you'll need to create an impersonation protection definition (if you have not already created one).

Create an impersonation protection definition

1. Log onto the Mimecast Administration console.

2. Open the Administration Toolbar.

3. Select Gateway | Policies.

4. Select Impersonation Protection.

5. Select New Definition.

6. Give the Definition a descriptive name, E.G. "Security Awareness Impersonation Protection Bypass Definition".

7. Select the appropriate settings (below). For more information, see Mimecast's Configuring an Impersonation Protection Definition.

Option Setting
Identifier Settings
Description Security Awareness Impersonation Protection Bypass Definition
Similar Internal Domain Checked
Similarity Distance 1
Newly Observed Domain Unchecked
Internal User Name Checked
Reply-to Address Mismatch Checked
Targeted Threat Dictionary Checked
Mimecast Threat Directory Checked
Custom Threat Directory [Leave as-is]
Number of Hits 2
Ignore Signed Messages Unchecked


Identifier Actions
Action None
Tag Message Body Unchecked
Tag Subject Unchecked
Tag Header Unchecked


General Actions
Mark All Inbound Items as 'External' Unchecked


Notifications
Notify Group [Leave as-is]
Notify (Internal) Recipient Unchecked
Notify Overseers Unchecked

Create a policy to avoid the definition

1. Log onto the Mimecast Administration console.

2. Open the Administration Toolbar.

3. Select Gateway | Policies.

4. Select Impersonation Protection Bypass.

5. Select New Policy.

6. Select the appropriate settings (below) under the OptionsEmails FromEmails To, and Validity sections. For more information, see Mimecast's Configuring an Impersonation Protection Bypass Policy.

7. Enter Our Domains in the Emails From > Applies From > Specifically Field.

Option Setting
Options
Policy Narrative Security Awareness Platform Impersonation Protection Bypass
Select Option [Select the appropriate definition to bypass, Use the Security Awareness Platform definition (created above) if you have none]
 
Emails From  
Addresses Based On Both
Applies From Email Domain
Specifically Our whitelisting technical information can be found here: Whitelisting Technical Information.
   
Emails To
Applies To Internal Addresses
Specifically Applies to all Internal Recipients

Validity
Enable/Disable Take no action
Set policy as perpetual Take no action
Date Range Take no action
Policy Override Take no action
Bi Directional Take no action
Source IP Ranges (n.n.n.n/x) Take no action

Anti-Spoofing Policy

Follow the steps below to allow the Security Awareness Platform to send simulated phishing emails that appear to come from your domain:

1. Log onto the Mimecast Administration console.

2. Open the Administration Toolbar.

3. Select Gateway | Policies.

4. Select Anti-Spoofing from the policies list.

5. Select New Policy.

6. Select the appropriate settings (below) under the OptionsEmails FromEmails To, and Validity sections. For more information, see Mimecast's Configuring an Anti-Spoofing Policy.

7. Enter Our Domains in the Emails From > Applies From > Specifically Field.

Option Setting
Options
Policy Narrative Security Awareness Anti-Spoof Allow Policy
Select Option Take no action
 
Emails From  
Addresses Based On Both
Applies From Email Domain
Specifically Our whitelisting technical information can be found here: Whitelisting Technical Information
   
Emails To
Applies To Everyone
Specifically Applies to all Internal Recipients

Validity
Enable/Disable Take no action
Set policy as perpetual Take no action
Date Range Take no action
Policy Override Take no action
Bi Directional Take no action
Source IP Ranges (n.n.n.n/x) Take no action

This will enable simulated phishing emails, that appear to be sent from your organisation's domain, to be successfully delivered to your recipients' inboxes. As with all whitelisting, we recommend setting up a test campaign to yourself or a small group to ensure everything works smoothly before running organisation-wide campaigns.


URL Protection Bypass Policy

Mimecast's URL Protection service scans links sent within emails as they are delivered. Occasionally, this causes simulated phishing emails to trigger this service. Follow the steps below to create a URL Protection Bypass policy.

1. Log onto the Mimecast Administration console.

2. Open the Administration Toolbar.

3. Select Gateway | Policies.

4. Select URL Protection Bypass.

5. Select New Policy.

6. Select the appropriate settings (below) under the OptionsEmails FromEmails To, and Validity sections. For more information, see Mimecast's Configuring a URL Protection Bypass Policy.

7. Enter Our Domains in the Emails From > Applies From > Specifically Field.

Option Setting
Options
Policy Narrative Security Awareness Platform URL Protection Bypass
Select Option Disable URL Protection
 
Emails From  
Addresses Based On Both
Applies From Email Domain
Specifically Our whitelisting technical information can be found here: Whitelisting Technical Information
   
Emails To
Applies To Internal Addresses
Specifically Applies to all Internal Recipients

Validity
Enable/Disable Take no action
Set policy as perpetual Take no action
Date Range Take no action
Policy Override Take no action
Bi Directional Take no action
Source IP Ranges (n.n.n.n/x) Take no action

As with all whitelisting, we recommend setting up a test campaign to yourself or a small group to ensure everything works smoothly before running organisation-wide campaigns.


Whitelisting can be complicated so if you require any further assistance, please contact our support team by clicking here, alternatively contact us through the platform Web Widget. 

Did this answer your question? Thanks for the feedback There was a problem submitting your feedback. Please try again later.

Still need help? Contact Us Contact Us