How to Whitelist in Mimecast
Last updated
Was this helpful?
Last updated
Was this helpful?
Ensure that important emails from trusted sources, like training notifications or emails, bypass Mimecast's usual filtering processes by following these steps. This document guides you through setting up various policies within Mimecast to improve the deliverability and reliability of these critical communications.
To prevent Mimecast from blocking emails from known and safe sources due to impersonation protection rules, set up an Impersonation Protection Bypass Policy.
Note the to be allowed.
Log in to your Mimecast Administration Console.
Navigate to Administration > Gateway | Policies.
Choose Impersonation Protection Bypass from the policies list and click New Policy.
Configure the policy:
Applies From: Everyone (using IP addresses/Hostnames as the source)
Applies To: Everyone
Enter the specific IP addresses under .
Save the policy settings.
For more information on these settings, see Mimecast's article.
Set up an Anti-Spoofing Policy to allow emails that appear to be coming from your domain.
Access Gateway | Policies via the Administration tab.
Select Anti-Spoofing, then New Policy.
Define the policy:
Emails From: Everyone (utilizing IP addresses)
Emails To: Everyone
Commit the changes to ensure that emails are recognized as legitimate. Configure Anti-Spoofing
To allowlist emails specifically for training and phishing simulation:
Go to Gateway | Policies and select Permitted Senders.
Click New Policy and set the parameters:
Emails From: Everyone (with specified IPs)
Emails To: Everyone
Finalize the settings by saving the policy.
For accurate phishing test results, exclude certain URLs from Mimecast's URL Protection.
Under Gateway | Policies, select URL Protection Bypass and then New Policy.
Adjust the policy settings:
Applies From: Everyone (IP addresses/hostnames as the source)
Applies To: Everyone
Save your changes to activate the policy.
After setting up these policies, conduct a small-scale test to ensure everything functions as intended before rolling out to your entire organization. This verification step is crucial to prevent disruptions and ensure that all settings are correctly applied.
Note the to be allowed.
Add the Keepnet IP addresses in the .
For more information see Mimecast's article.
Note the to be allowed.
Include the relevant IP addresses in .
For more information on these settings see Mimecast's article.
Input the applicable IP ranges in .
For more information on these settings, see Mimecast's article