Mimecast Hardening Guide
Email security hardening for Mimecast including targeted threat protection, impersonation policies, and gateway configuration
Overview
Mimecast is a leading cloud-based email security platform protecting millions of mailboxes against phishing, malware, and business email compromise (BEC). As the gateway for all organizational email, Mimecast configurations directly impact protection against the #1 attack vector. Proper hardening ensures maximum protection while minimizing false positives.
Intended Audience
- Security engineers managing email security
- IT administrators configuring Mimecast
- GRC professionals assessing email protection
- SOC analysts monitoring email threats
How to Use This Guide
- L1 (Baseline): Essential controls for all organizations
- L2 (Hardened): Enhanced controls for security-sensitive environments
- L3 (Maximum Security): Strictest controls for regulated industries
Scope
This guide covers Mimecast Email Security Gateway configuration including targeted threat protection, impersonation protection, URL protection, and policy optimization.
Table of Contents
- Gateway Configuration
- Targeted Threat Protection
- Impersonation Protection
- Admin & Access Security
- Monitoring & Compliance
- Compliance Quick Reference
1. Gateway Configuration
1.1 Verify MX Record Configuration
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 9.2 |
| NIST 800-53 | SC-7 |
Description
Ensure MX records are properly configured to route all email through Mimecast.
Rationale
Why This Matters:
- Incorrect MX priorities can bypass Mimecast protection
- Email must route through Mimecast before reaching mail server
- Misconfiguration leaves organization exposed
Validation
Step 1: Check MX Records
Step 2: Verify Configuration
- MX records should point to Mimecast servers
- Priority should be lowest number (e.g., 10)
- No direct mail server MX records should exist
Step 3: Configure Email Server
- Configure mail server to only accept from Mimecast IPs
- Block direct delivery attempts
- Document allowed IP ranges
1.2 Configure Email Authentication (SPF, DKIM, DMARC)
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 9.5 |
| NIST 800-53 | SC-8 |
Description
Configure email authentication to prevent spoofing and verify sender identity.
ClickOps Implementation
Step 1: Configure SPF
- Navigate to: Administration → Gateway → Policies → Definitions → DNS Authentication - Outbound
- Verify SPF record includes Mimecast. See the Code Pack below for the recommended SPF and DMARC records.
Step 2: Configure DKIM
- Navigate to: Administration → Gateway → Policies → Definitions → DNS Authentication - Outbound
- Enable DKIM signing
- Generate DKIM keys
- Publish DKIM DNS records
Step 3: Configure DMARC
- Publish DMARC record (see Code Pack below for recommended record format)
- Start with
p=nonefor monitoring - Progress to
p=quarantinethenp=reject
Step 4: Configure Inbound Checking
- Navigate to: Administration → Gateway → Policies → Definitions → DNS Authentication - Inbound
- Configure actions for SPF/DKIM/DMARC failures
1.3 Configure Secure Communication
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 3.10 |
| NIST 800-53 | SC-8 |
Description
Configure TLS and secure communication for email transmission.
ClickOps Implementation
Step 1: Configure TLS
- Navigate to: Administration → Gateway → Policies → Definitions → Secure Messaging
- Configure TLS settings:
- Enable opportunistic TLS
- Require TLS for sensitive domains (L2)
- Configure TLS version requirements
Step 2: Configure Directory Sync Security
- Use LDAPS instead of LDAP
- Navigate to: Administration → Services → Directory Sync
- Configure LDAPS for encrypted sync
Step 3: Configure Journaling Security
- Use POP3S instead of POP3
- Ensure encrypted communication
2. Targeted Threat Protection
2.1 Configure URL Protection
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 9.6 |
| NIST 800-53 | SI-3 |
Description
Configure URL Protection to detect and block malicious links.
ClickOps Implementation
Step 1: Access URL Protection
- Navigate to: Administration → Gateway → Policies → Definitions → URL Protection
Step 2: Configure Definition
- Click New Definition or edit existing
- Configure URL scanning:
- Enable URL rewriting: Yes
- Scan on click: Yes (critical)
- Block malicious URLs: Yes
- Check against browser isolation: Consider for L2
Step 3: Enable All URL Options
- Enable:
- Scan internal URLs
- Check file downloads
- Advanced similarity checks
- Newly observed domain detection
Step 4: Configure User Notification
- Configure block page messaging
- Enable user reporting for false positives
- Set up admin notifications
Time to Complete: ~30 minutes
2.2 Configure Attachment Protection
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 10.1 |
| NIST 800-53 | SI-3 |
Description
Configure attachment scanning and sandboxing for malware protection.
ClickOps Implementation
Step 1: Access Attachment Protection
- Navigate to: Administration → Gateway → Policies → Definitions → Attachment Protection
Step 2: Configure Attachment Scanning
- Configure definition:
- Enable attachment scanning: Yes
- Sandbox suspicious files: Yes
- Block password-protected archives: Consider
- Block dangerous file types: Yes
Step 3: Configure File Type Restrictions
- Block high-risk file types:
- Executable files (.exe, .scr, .bat, .cmd)
- Script files (.js, .vbs, .ps1)
- Macro-enabled documents (.docm, .xlsm)
- Consider blocking by default, allow by exception
Step 4: Configure Safe File Viewing
- Enable Preemptive protection
- Convert to safe formats before delivery
- Allow download of original if needed
2.3 Configure Internal Email Protection
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 9.6 |
| NIST 800-53 | SI-3 |
Description
Enable scanning of internal email for compromised account detection.
Rationale
Why This Matters:
- Compromised internal accounts can spread malware
- Internal phishing can bypass perimeter controls
- Lateral movement detection
ClickOps Implementation
Step 1: Configure Internal Email Protect
- Navigate to: Administration → Gateway → Policies → Definitions → Internal Email Protect
- Enable internal email scanning
- Configure threat detection
Step 2: Configure Policies
- Apply URL Protection to internal mail
- Apply Attachment Protection
- Monitor for suspicious patterns
3. Impersonation Protection
3.1 Configure Standard Impersonation Policy
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 9.6 |
| NIST 800-53 | SI-3 |
Description
Configure impersonation protection to detect business email compromise attempts.
Rationale
Why This Matters:
- BEC attacks cause billions in losses annually
- Impersonation of executives is primary attack vector
- Requires multiple detection layers
ClickOps Implementation
Step 1: Configure Impersonation Protection
- Navigate to: Administration → Gateway → Policies → Definitions → Impersonation Protection
- Create new definition
Step 2: Configure Standard 2-Hit Policy
- Configure “2-hit” detection:
- Display name matches + suspicious indicators
- Reply-to mismatch + urgency language
- Set action: Tag, hold, or block
Step 3: Configure Newly Observed Domain Policy
- Flag emails from newly registered domains
- Increased scrutiny for new senders
- Configure age threshold (e.g., 30 days)
3.2 Configure VIP Protection
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 9.6 |
| NIST 800-53 | SI-3 |
Description
Configure enhanced protection for high-value targets (executives, finance).
ClickOps Implementation
Step 1: Define VIP List
- Navigate to: Administration → Gateway → Policies → Definitions → Profile Groups
- Create VIP profile group
- Add executives and high-risk users:
- CEO, CFO, C-suite
- Finance team
- HR team
- Legal team
Step 2: Configure VIP Policy
- Create dedicated impersonation definition for VIPs
- Configure stricter detection:
- Lower threshold for flagging
- Additional display name variations
- External sender warnings
Step 3: Configure User Awareness
- Add warning banners for impersonation attempts
- Train VIPs on threat awareness
- Establish out-of-band verification procedures
3.3 Configure Advanced Business Email Compromise (ABEC)
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 9.6 |
| NIST 800-53 | SI-3 |
Description
Enable advanced BEC detection using AI-powered analysis.
ClickOps Implementation
Step 1: Enable ABEC
- Navigate to: Administration → Gateway → Policies → Email Policies
- Edit policy → Phishing & Impersonation
- Enable Advanced BEC settings
Step 2: Configure ABEC Options
- Enable AI-based detection
- Configure sensitivity level
- Consider Monitor Mode for testing
Step 3: Tune and Validate
- Review detections
- Adjust false positive rates
- Move from monitor to enforcement
4. Admin & Access Security
4.1 Configure Admin Access Controls
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 5.4 |
| NIST 800-53 | AC-6 |
Description
Implement least privilege for Mimecast administration.
ClickOps Implementation
Step 1: Review Admin Roles
- Navigate to: Administration → Account → Roles
- Review built-in roles
- Create custom roles for specific functions
Step 2: Implement Role-Based Access
- Create roles:
- Security Admin: Policy management
- Report Viewer: Read-only reporting
- Help Desk: User support only
- Assign minimum required permissions
Step 3: Limit Full Admin Access
- Restrict full admin to essential personnel
- Use separate accounts for admin work
- Regular access reviews
4.2 Enforce MFA for Admin Accounts
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 6.5 |
| NIST 800-53 | IA-2(1) |
Description
Require MFA for all administrative access to Mimecast.
ClickOps Implementation
Step 1: Configure 2-Step Authentication
- Navigate to: Administration → Account → Authentication
- Enable 2-Step Verification
- Apply to all admin accounts
Step 2: Configure Authentication Methods
- Supported methods:
- Authenticator app (recommended)
- Email verification
- Enforce enrollment
4.3 Manage User Access and Lifecycle
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 5.3 |
| NIST 800-53 | AC-2 |
Description
Implement proper user lifecycle management.
ClickOps Implementation
Step 1: Configure Directory Sync
- Navigate to: Administration → Services → Directory Sync
- Configure sync with Active Directory
- Enable automatic disabling on AD deletion/disable
Step 2: Regular Access Review
- Review user accounts quarterly
- Remove inactive accounts
- Verify access levels appropriate
5. Monitoring & Compliance
5.1 Configure Audit Logging
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 8.2 |
| NIST 800-53 | AU-2 |
Description
Enable and monitor audit logs for security events.
ClickOps Implementation
Step 1: Access Audit Logs
- Navigate to: Administration → Account → Audit Events
- Review logged events:
- Admin actions
- Policy changes
- Authentication events
Step 2: Configure SIEM Integration
- Navigate to: Administration → Services → SIEM Integration
- Configure log export to SIEM
- Configure real-time streaming
Key Events to Monitor:
- Policy modifications
- Admin login events
- Permission changes
- URL/Attachment blocks
- Impersonation detections
5.2 Conduct Quarterly Policy Review
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 4.1 |
| NIST 800-53 | CA-7 |
Description
Regularly audit and review Mimecast policies for effectiveness.
Process
Step 1: Audit Core Security Policies
- Review 18 core security policies
- Verify configurations are current
- Check for policy drift
Step 2: Review Profile Groups
- Audit email/domain/IP lists
- Remove obsolete entries
- Document approved exceptions
Step 3: Review Detection Effectiveness
- Analyze blocked threats
- Review false positive rates
- Tune policies as needed
Quarterly Checklist:
- Review impersonation protection settings
- Verify VIP list is current
- Audit permitted sender lists
- Review URL/Attachment block rates
- Check admin access list
- Verify MX record configuration
5.3 Monitor Threat Dashboard
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 8.11 |
| NIST 800-53 | SI-4 |
Description
Actively monitor threat dashboard for emerging threats.
ClickOps Implementation
Step 1: Access Dashboard
- Navigate to: Monitoring → Threat Dashboard
- Review:
- Blocked threats by category
- Detection trends
- Top targeted users
Step 2: Configure Alerts
- Set up alerts for:
- Unusual volume of blocks
- New threat campaigns
- Targeted attacks on VIPs
6. Compliance Quick Reference
SOC 2 Trust Services Criteria Mapping
| Control ID | Mimecast Control | Guide Section |
|---|---|---|
| CC6.1 | Admin MFA | 4.2 |
| CC6.6 | URL Protection | 2.1 |
| CC6.8 | Attachment Protection | 2.2 |
| CC7.1 | Email Authentication | 1.2 |
| CC7.2 | Audit logging | 5.1 |
NIST 800-53 Rev 5 Mapping
| Control | Mimecast Control | Guide Section |
|---|---|---|
| SC-7 | Gateway configuration | 1.1 |
| SC-8 | TLS/Encryption | 1.3 |
| SI-3 | Threat Protection | 2.1, 2.2 |
| AC-6 | Least privilege | 4.1 |
| AU-2 | Audit logging | 5.1 |
Appendix A: Default Policy Review
| Policy Area | Default Setting | Recommended Change |
|---|---|---|
| URL Protection | Basic | Enable all options |
| Attachment Protection | Basic | Enable sandboxing |
| Impersonation Protection | Disabled | Enable with VIP list |
| DMARC | None | p=quarantine minimum |
| Internal Email Protection | Disabled | Enable for L2 |
Appendix B: References
Official Mimecast Documentation:
- Mimecast Trust Center
- Mimecast Product Documentation
- Targeted Threat Protection Optimization
- TTP Impersonation Protect Guide
- Email Security Cloud Gateway Best Practices
API Documentation:
Compliance Frameworks:
- SOC 2 Type II, ISO/IEC 27001:2022, ISO/IEC 27701:2019, ISO 22301:2019, ISO/IEC 42001:2023, Cyber Essentials Plus — via Mimecast Certification and Attestation
- Mimecast Trust Center (SafeBase)
Security Incidents:
- SolarWinds Supply Chain Attack (January 2021): Mimecast confirmed that a certificate used for Microsoft 365 Exchange Web Services authentication was compromised by the same nation-state actors (APT29) behind the SolarWinds attack. Approximately 10% of customers (~3,900) used the affected connection type, and fewer than 10 were specifically targeted. Attackers potentially exfiltrated encrypted service account credentials and accessed some source code. — Mimecast Certificate Compromise (TechTarget)
Changelog
| Date | Version | Maturity | Changes | Author |
|---|---|---|---|---|
| 2025-02-05 | 0.1.0 | draft | Initial guide with gateway, TTP, and impersonation protection | Claude Code (Opus 4.5) |
Contributing
Found an issue or want to improve this guide?
- Report outdated information: Open an issue with tag
content-outdated - Propose new controls: Open an issue with tag
new-control - Submit improvements: See Contributing Guide