implementing-mimecast-targeted-attack-protection
Deploy Mimecast Targeted Threat Protection including URL Protect, Attachment Protect, Impersonation Protect, and Internal Email Protect to defend against advanced phishing and spearphishing attacks.
Best use case
implementing-mimecast-targeted-attack-protection is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
Deploy Mimecast Targeted Threat Protection including URL Protect, Attachment Protect, Impersonation Protect, and Internal Email Protect to defend against advanced phishing and spearphishing attacks.
Teams using implementing-mimecast-targeted-attack-protection should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/implementing-mimecast-targeted-attack-protection/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How implementing-mimecast-targeted-attack-protection Compares
| Feature / Agent | implementing-mimecast-targeted-attack-protection | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Deploy Mimecast Targeted Threat Protection including URL Protect, Attachment Protect, Impersonation Protect, and Internal Email Protect to defend against advanced phishing and spearphishing attacks.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
Related Guides
AI Agents for Marketing
Discover AI agents for marketing workflows, from SEO and content production to campaign research, outreach, and analytics.
Best AI Agents for Marketing
A curated list of the best AI agents and skills for marketing teams focused on SEO, content systems, outreach, and campaign execution.
AI Agent for Cold Email Generation
Discover AI agent skills for cold email generation, outreach copy, lead personalization, CRM support, and sales-adjacent messaging workflows.
SKILL.md Source
# Implementing Mimecast Targeted Attack Protection ## Overview Mimecast Targeted Threat Protection (TTP) is a suite of advanced email security services designed to protect against sophisticated phishing, spearphishing, and targeted attacks. TTP consists of four core modules: URL Protect (real-time URL rewriting and click-time analysis), Attachment Protect (sandbox detonation of suspicious attachments), Impersonation Protect (BEC and whaling detection), and Internal Email Protect (scanning internal/outbound email for threats). As of November 2025, Mimecast enabled URL Pre-Delivery Action with Hold setting for all customers by default. ## When to Use - When deploying or configuring implementing mimecast targeted attack protection capabilities in your environment - When establishing security controls aligned to compliance requirements - When building or improving security architecture for this domain - When conducting security assessments that require this implementation ## Prerequisites - Mimecast Email Security license with TTP add-on - Administrative access to Mimecast Administration Console - Microsoft 365 or Google Workspace environment - MX records configured to route through Mimecast - Understanding of email authentication (SPF, DKIM, DMARC) ## Key Concepts ### TTP Module Overview | Module | Function | Key Capability | |---|---|---| | URL Protect | Rewrites and scans URLs at click time | Real-time sandbox, pre-delivery hold | | Attachment Protect | Sandboxes suspicious attachments | Static + dynamic analysis | | Impersonation Protect | Detects BEC/whaling attacks | VIP name matching, header analysis | | Internal Email Protect | Scans internal/outbound email | Lateral phishing detection | ### Impersonation Protection Scenarios - **Hit 3 (Default)**: Flags emails matching 3+ impersonation indicators - **Hit 1 (VIP)**: Flags emails matching 1+ indicator for designated VIP users - Key identifiers: display name similarity, domain similarity, reply-to mismatch, newly registered domains ### URL Protect Modes - **Rewrite**: URLs rewritten to route through Mimecast proxy at click time - **Pre-Delivery Action (Hold)**: URLs checked before message delivery; held if suspicious - **Pre-Delivery Action (None)**: URLs checked pre-delivery but not held ## Workflow ### Step 1: Configure URL Protect Policy - Navigate to Administration > Gateway > Policies > Targeted Threat Protection - URL Protect - Create URL Protect definition with rewriting enabled for inbound messages - Enable URL Pre-Delivery Action set to "Hold" for maximum protection - Configure scan mode: aggressive for high-risk users, moderate for general population - Set action for malicious URLs: block page with user notification - Enable URL logging for all click events ### Step 2: Configure Attachment Protect Policy - Navigate to Administration > Gateway > Policies > Targeted Threat Protection - Attachment Protect - Create Attachment Protect definition for inbound email - Select sandbox mode: "Safe File" (converts to safe format) or "Dynamic Configuration" (full sandbox) - Configure attachment types to scan: executables, Office documents, PDFs, archives - Set timeout for sandbox analysis (default: up to 7 minutes for complex files) - Enable pre-emptive sandboxing for attachments from unknown senders ### Step 3: Configure Impersonation Protect - Create Default Impersonation Protect Definition (Hit 3) for all inbound email - Create VIP Impersonation Protect Definition (Hit 1) for executive protection - Build VIP list: CEO, CFO, CTO, board members, finance leadership - Configure detection identifiers: display name, domain similarity, newly observed sender - Set actions: quarantine high-confidence impersonation, tag moderate confidence - Enable end-user warning banners for flagged messages ### Step 4: Enable Internal Email Protect - Configure journaling from Microsoft 365/Google Workspace to Mimecast - Enable URL scanning for internal emails - Enable attachment scanning for internal emails - Configure alerts for internal account compromise indicators - Set up detection for internal phishing (compromised account sending malware) ### Step 5: Create Test Group and Validate - Create pilot group of 50-100 users across departments - Apply TTP policies to pilot group first - Send test emails with known-safe test URLs and EICAR test files - Verify URL rewriting, attachment sandboxing, and impersonation detection - Monitor false positive rate for 1-2 weeks before organization-wide deployment ### Step 6: Deploy Organization-Wide and Tune - Extend TTP policies to all users - Monitor Mimecast Threat Dashboard for detection metrics - Review and whitelist legitimate applications triggering false positives - Tune impersonation sensitivity based on false positive feedback - Configure exception policies for automated systems and mailing lists ## Tools & Resources - **Mimecast Administration Console**: Policy configuration and management - **Mimecast Threat Dashboard**: Real-time threat visibility and analytics - **Mimecast Awareness Training**: Integrated security awareness platform - **Mimecast API**: Programmatic access to logs and threat data - **Message Center**: Quarantine management for admins and users ## Validation - URL Protect rewrites URLs in test messages and blocks known-malicious at click - Attachment Protect sandboxes test file and returns verdict within SLA - Impersonation Protect flags test BEC email impersonating VIP - Internal Email Protect detects test lateral phishing scenario - Pre-delivery hold catches weaponized URL before reaching inbox - False positive rate below organizational threshold after tuning
Related Skills
recovering-from-ransomware-attack
Executes structured recovery from a ransomware incident following NIST and CISA frameworks, including environment isolation, forensic evidence preservation, clean infrastructure rebuild, prioritized system restoration from verified backups, credential reset, and validation against re-infection. Covers Active Directory recovery, database restoration, and application stack rebuild in dependency order. Activates for requests involving ransomware recovery, post-encryption restoration, or disaster recovery from ransomware.
performing-web-cache-poisoning-attack
Exploiting web cache mechanisms to serve malicious content to other users by poisoning cached responses through unkeyed headers and parameters during authorized security tests.
performing-web-cache-deception-attack
Execute web cache deception attacks by exploiting path normalization discrepancies between CDN caching layers and origin servers to cache and retrieve sensitive authenticated content.
performing-vlan-hopping-attack
Simulates VLAN hopping attacks using switch spoofing and double tagging techniques in authorized environments to test VLAN segmentation effectiveness and validate switch port security configurations against Layer 2 bypass attacks.
performing-supply-chain-attack-simulation
Simulate and detect software supply chain attacks including typosquatting detection via Levenshtein distance, dependency confusion testing against private registries, package hash verification with pip, and known vulnerability scanning with pip-audit.
performing-ssl-stripping-attack
Simulates SSL stripping attacks using sslstrip, Bettercap, and mitmproxy in authorized environments to test HSTS enforcement, certificate validation, and HTTPS upgrade mechanisms that protect users from downgrade attacks on encrypted connections.
performing-packet-injection-attack
Crafts and injects custom network packets using Scapy, hping3, and Nemesis during authorized security assessments to test firewall rules, IDS detection, protocol handling, and network stack resilience against malformed and spoofed traffic.
performing-kerberoasting-attack
Kerberoasting is a post-exploitation technique that targets service accounts in Active Directory by requesting Kerberos TGS (Ticket Granting Service) tickets for accounts with Service Principal Names
performing-jwt-none-algorithm-attack
Execute and test the JWT none algorithm attack to bypass signature verification by manipulating the alg header field in JSON Web Tokens.
performing-http-parameter-pollution-attack
Execute HTTP Parameter Pollution attacks to bypass input validation, WAF rules, and security controls by injecting duplicate parameters that are processed differently by front-end and back-end systems.
performing-graphql-introspection-attack
Performs GraphQL introspection attacks to extract the full API schema including types, queries, mutations, subscriptions, and field definitions from GraphQL endpoints. The tester uses introspection queries to map the attack surface, identifies sensitive fields and mutations, tests for query depth and complexity limits, and exploits GraphQL-specific vulnerabilities including batching attacks, alias-based brute force, and nested query DoS. Activates for requests involving GraphQL security testing, introspection attack, GraphQL enumeration, or GraphQL API penetration testing.
performing-graphql-depth-limit-attack
Execute and test GraphQL depth limit attacks using deeply nested recursive queries to identify denial-of-service vulnerabilities in GraphQL APIs.