KB // MIMECAST
EMAIL SECURITY OPERATIONS
13,241 ENDPOINTS KTC-DEMO-ORG
Knowledge Base · Email Security
Mimecast Email Security
Operations Center
Complete reference for configuring, operating, and integrating the Mimecast Email Security Operations Center across KTC-Demo-Org's 13,241-endpoint environment. Covers TTP protection, gateway configuration, quarantine management, API integration, and SIEM forwarding.
MIMECAST API 2.0 13,241 ENDPOINTS DEMO ENVIRONMENT us-api.services.mimecast.com SPLUNK · SENTINEL AZURE AD · LDAP

Mimecast is a cloud-native email security platform that sits in front of your mail flow — typically Microsoft 365 or Google Workspace — and inspects every inbound, outbound, and internal message before delivery. It combines anti-spam, anti-malware, targeted threat protection (TTP), impersonation defense, DLP, and awareness training into a single managed service.

In the KTC-Demo-Org environment, Mimecast is the primary email security gateway protecting all 13,241 endpoints. All mail is routed through Mimecast's infrastructure before reaching Microsoft 365 Exchange Online. The Mimecast Operations Center demo surface exposes the full Mimecast API 2.0 via a unified SOC-style interface.

Core Protection Layers
  • Gateway: Anti-spam, anti-virus, SPF/DKIM/DMARC enforcement, DLP
  • URL Protect: Real-time URL rewriting and on-click sandboxing
  • Attachment Protect: Pre-emptive sandboxing of all attachments
  • Impersonation Protect: BEC, CEO fraud, and typosquat detection
  • Internal Email Protect: Scans mail between internal users
Platform Integrations
  • Microsoft 365: Mail routing, Azure AD sync, Defender co-exist
  • Splunk / Sentinel: SIEM log forwarding via batch API
  • Azure AD: Directory group sync for policy targeting
  • Awareness Training: Built-in phishing simulation + SAFE scoring
  • API: REST API 2.0 for automation, reporting, and orchestration
Demo Environment Note The Operations Center dashboard runs in demo mode. All API calls return realistic mock responses scoped to 13,241 endpoints. No live mail is processed. Connect a valid Client ID + Secret in API Explorer to switch to live production data.
Inbound Mail Flow

Inbound email to your domain is routed through Mimecast MX records before delivery to Microsoft 365. Mimecast inspects every message through multiple processing engines sequentially:

Internet Sender
Mimecast MX
Gateway Engine
SPF·DKIM·DMARC·AV·Spam
TTP Layer
URL·Attach·Impersonation
M365 Delivery
spacer
Blocked/Rejected
Quarantined/Held
Processing Engines
EngineFunctionOutputAPI Source
Anti-SpamBulk and opportunistic spam scoringBlock, Quarantine, Tag/api/stats/gateway
Anti-VirusSignature-based malware detectionBlock/api/stats/gateway
SPF/DKIM/DMARCSender authentication enforcementReject, Quarantine/api/policy/antispoofing
URL ProtectRewrites URLs; blocks on clickBlock, Warn, Allow/api/ttp/url/get-logs
Attachment ProtectPre-emptive sandbox detonationBlock, Convert, Allow/api/ttp/attachment/get-logs
Impersonation ProtectBEC, CEO fraud, typosquat detectionBlock, Tag, Quarantine/api/ttp/impersonation/get-logs
DLPOutbound PII / PHI / CCN scanningHold, Encrypt, Block/api/policy/content-examination
Outbound Mail Flow

Outbound mail from Microsoft 365 is relayed through Mimecast for DLP scanning, archiving, and branding injection. Mimecast adds DKIM signatures, enforces SPF alignment, and scans for data loss policy violations before releasing to the internet.

M365 Connector Requirement Microsoft 365 must be configured with an outbound connector pointing to Mimecast relay IPs. Misconfigured connectors bypass Mimecast DLP and lose DKIM signing. Validate connector configuration monthly via the Policy → Allow Microsoft 365 Relay toggle in the Operations Center.

KTC-Demo-Org operates 13,241 protected endpoints across all licensed users, servers, and managed devices. The numbers below represent daily throughput baselines at this scale and are used throughout the Operations Center dashboard to contextualize alert volumes.

Inbound Mail / Day
~94,800
Across 13,241 endpoints
Outbound Mail / Day
~22,400
DLP scanned + relay
Threats Blocked / Day
~240
All threat categories
Spam Rejected / Day
~18,400
99.2% catch rate
URLs Scanned / Hour
~148K
URL Protect rewrites
Attachments Sandboxed
~218
Per day, pre-emptive
GroupUsersEndpointsPolicy TierSync Source
Executive Leadership5252BEC High RiskAzure AD
Finance Department128128Wire Fraud PolicyAzure AD
IT Administrators34204Bypass Ext TagAzure AD
All Staff8,2418,241Standard TTPLDAP
Infrastructure Servers4,616Server TTP PolicyAPI Managed
Total8,455+13,241

The Operations Center dashboard is the primary entry point. It displays the current threat posture across five KPI tiles, a live event feed, threat breakdown, recent high-priority alerts, hourly sparkline, and top threat origin domains.

KPI Tiles
Threats Blocked (24h)Total blocked events across all threat categories in the last 24 hours. Sourced from /api/threats/events. Drifts upward in live mode as new blocks occur.
Quarantined TodayCount of messages currently in the held/quarantine queue. Links to the Quarantine view. Reflects actions taken — releases and purges decrement this counter live.
URL Clicks BlockedUsers who clicked a Mimecast-rewritten URL that was blocked at click-time. Sourced from /api/ttp/url/get-logs.
Emails ProcessedTotal inbound + outbound messages processed by the gateway since midnight UTC. Drifts upward every 5 seconds in the live feed simulation.
Spam RejectedGateway-level spam rejections (pre-delivery, not quarantine). Sourced from /api/stats/gateway.
Live Feed Bar

The orange LIVE bar at the top of the dashboard scrolls recent high-signal events from the Mimecast event stream. Events rotate every ~3.8 seconds and represent actual event types scoped to 13,241 endpoints — BEC blocks, malware detonations, SIEM batch pulls, URL rewrites, and policy sync confirmations.

Alert Workflow

The Recent High-Priority Alerts panel shows the five most recent events requiring analyst attention. Clicking any row opens a detailed modal with full event context, API response snippet, and action buttons:

  • Investigate / View Hash: Opens event detail modal with sender data, TTP definition, API source, and code snippet.
  • Block Domain: Fires a mock PUT /api/policy/blockedsenders call to add the sender domain to the blocked list. Updates the blocked sender count.
  • Acknowledge: Marks the alert row as reviewed (visual dim), decrements the critical badge in the sidebar.
  • Export to SIEM: Fires a mock batch export to Splunk/Sentinel.
  • Ack All (panel header): Acknowledges all five current alerts simultaneously.

TTP is Mimecast's advanced threat suite for defending against targeted attacks that bypass standard anti-spam/AV. It consists of three dedicated modules, each with its own API endpoint and policy configuration.

URL Protect

URL Protect rewrites every URL in inbound emails to route clicks through Mimecast's proxy. At click time, the destination is evaluated against live threat intelligence. If the URL is flagged, the user sees a Mimecast block page instead of the malicious site.

REWRITEAll URLs transformed to https://url.us.m.mimecastprotect.com/... at ingest time. Happens before delivery.
ON-CLICK SCANURL checked at click time against live threat feeds. Provides protection even if a URL was clean at delivery but later compromised.
BLOCKClick blocked. User redirected to Mimecast block page. Event logged to /api/ttp/url/get-logs.
WARNSuspicious but not confirmed malicious. User sees a warning page and can choose to proceed.
User Confusion Risk Rewritten URLs look unusual to end users. Train staff that URLs starting with url.us.m.mimecastprotect.com are Mimecast-wrapped links — not phishing. Hover-preview in Outlook will always show the Mimecast proxy address.
API · URL Protect Log Response
{
  "meta": {"status": 200, "totalCount": 241, "endpoints": 13241},
  "data": [{
    "id": "url001",
    "url": "hxxps://login-secure-bank[.]xyz/auth",
    "userEmailAddress": "j.smith@ktc-demo.com",
    "action": "Block",
    "reason": "Phishing",
    "ttpDefinition": "URL Protect - Default",
    "date": "2026-03-22T10:54:22+0000"
  }]
}
Attachment Protect

Attachment Protect intercepts all inbound attachments and submits them to Mimecast's sandbox for pre-emptive detonation before the message is delivered. Three operating modes are available:

ModeBehaviorDelivery DelayUse Case
SandboxFile detonated in cloud sandbox. Malicious = blocked. Clean = delivered original.2–10 minAll untrusted inbound
Convert & DeliverOffice docs converted to safe PDF. Original attached to separate email.NoneHigh-volume / low latency
Pre-emptive BlockSpecific file types blocked regardless of content (.exe, .vbs, .ps1).NoneExecutive / Finance groups
SHA256 Hash Logging Every sandboxed file generates a SHA256 hash stored in /api/ttp/attachment/get-logs. Submit hashes to VirusTotal, your SIEM, or threat intel feeds for cross-environment correlation. The Operations Center includes a "Submit to TI" button in the attachment detail modal.
Impersonation Protect

Impersonation Protect detects attacks that use social engineering instead of malware — specifically Business Email Compromise (BEC), CEO fraud, typosquat domains, and internal spoofing. It uses a combination of AI-based analysis, custom monitored domain lists, and header inspection.

BEC / CEO FraudHigh risk. Message purports to be from an executive or finance authority. Common identifiers: similar internal domain, display name match on different address, DKIM misalign.
CFO / Finance FraudHigh risk. Targets payroll, AR/AP, wire transfer approvers. Executive Leadership and Finance groups should have BEC High Risk policy applied.
Typosquat DomainSender domain is a near-miss of a trusted domain (e.g. microsofft.com, acme-corp.co). Mimecast flags and optionally blocks.
Brand AbuseThird-party brand (DocuSign, PayPal, Microsoft) impersonated in a non-registered domain. Tagged or blocked depending on policy definition.
Internal SpoofFrom-header matches internal domain but is arriving from external source. Should be blocked outright — legitimate internal mail never arrives via the inbound MX path.
🔴
Finance & Exec Groups Must Have BEC Policy Wire transfer fraud is the highest-cost email threat. Ensure the Finance Department (128 users) and Executive Leadership (52 users) have the "BEC High Risk" TTP definition applied. A single successful BEC can exceed an entire year's Mimecast licensing cost. Verify in Directory Groups.

Gateway Statistics provides aggregate mail flow metrics from /api/stats/gateway. This view is not for per-message investigation — it is for capacity planning, catch-rate reporting, and trend analysis.

Key Metrics
Inbound ProcessedAll messages accepted by Mimecast MX, regardless of final action. Use for mail volume trend tracking. ~94,822/day for 13,241 endpoints (~7.2 emails/endpoint/day).
Outbound ProcessedAll messages relayed from M365 through the Mimecast outbound connector. Should equal your Exchange Online send count — discrepancy indicates a connector misconfiguration.
Malware BlockedAnti-virus engine catches (signature-based, pre-sandbox). Separate from TTP sandbox detections.
Spam RejectedMessages rejected at the gateway envelope stage (SMTP 5xx) before queuing. These do not appear in quarantine — they are never accepted.
Traffic DispositionDonut chart: Delivered Clean (76%), Blocked/Rejected (18%), Quarantined (4%), Held/Review (2%). Use to justify Mimecast ROI in client QBRs.
99.2% Spam Catch Rate KTC-Demo-Org maintains a 99.2% spam catch rate with under 0.1% false positives. Industry baseline is 99%. If your rate drops below 98%, open a Mimecast support case — sender reputation lists may need refreshing for your domain profile.

The Quarantine view surfaces held messages from /api/message/get-hold-message-list. At 13,241 endpoints, expect 150–250 held messages on a typical business day. The Operations Center pages 10 at a time and shows a running total.

Hold Reasons & Actions
Hold ReasonRisk LevelRecommended ActionNotes
MALWARECriticalPurge immediatelyNever release. Sandbox confirmed malicious.
BECCriticalPurge + block domainBEC attempts should never reach the inbox.
SUSPICIOUSHighAnalyst review requiredMay be legitimate. Check sender, subject, and context.
SPAMLowPurge or release based on user requestCheck for false positives with users weekly.
POLICYMediumRelease if authorized by managerLarge file shares, unusual attachment types.
DLPHighBlock + incident logPII/PHI exfiltration attempt. Must be documented.
Operations Center Quarantine Actions
  • Checkbox + Release Selected: Select multiple rows and batch-release. Messages animate out and the total counter decrements.
  • Release (row): Delivers the held message to the recipient's inbox. Use for false positives confirmed by the user or analyst.
  • Purge (row): Permanently deletes the message. Use for confirmed threats, spam, or policy violations. Cannot be undone.
  • Purge All: Header button. Purges all visible held messages sequentially with staggered animation. Use during cleanup cycles.
  • Release Selected: Header button. Batch-releases all checked rows.
DLP Holds Require Documentation Any message quarantined for DLP reasons (PHI, PII, CCN) must be documented in your ITSM before releasing or purging. This is required for HIPAA and PCI compliance. The DLP violation event should be forwarded to your SIEM via the Export to SIEM action.
API: Get Hold Message List
POST · /api/message/get-hold-message-list
// Request body
{
  "meta": {
    "pagination": {
      "pageSize": 10,
      "pageToken": ""
    }
  },
  "data": [{
    "admin": true,
    "holdType": "MTA"
  }]
}

// Response excerpt · 183 total held messages
{
  "meta": {"pagination": {"totalCount": 183}},
  "data": [{
    "id": "hold001",
    "fromEnv": "billing@invoices-pro.net",
    "holdReason": "Attachment: Malicious",
    "received": "2026-03-22T11:18:05+0000"
  }]
}

Mimecast's SIEM integration uses a batch pull model — your SIEM queries /api/siem/v1/batch/events on a schedule to retrieve compressed JSON event bundles. This is different from a real-time webhook model.

Batch Architecture

Each API call returns a pointer to a compressed file containing up to ~25,000 events per batch at KTC-Demo-Org scale. The SIEM connector fetches, decompresses, parses, and indexes the events. At 13,241 endpoints, expect 20,000–30,000 events per 5-minute pull cycle during business hours.

Log TypeEvent ContentSIEM Use Case
receiptAll inbound messages — sender, recipient, action, size, IPMail volume trending, sender reputation
deliveryOutbound delivery events with SMTP codesBounce analysis, relay health
ttpURL clicks, attachment sandboxing, impersonation eventsThreat correlation, IOC extraction
avAnti-virus detections with file hashMalware trending, endpoint correlation
impersonationBEC, CEO fraud, typosquat events with identifiersSOC alerting, executive risk
processMessage processing pipeline events, policy matchesPolicy audit, compliance evidence
journalArchive/journal copies (if archiving licensed)eDiscovery, legal hold
SIEM Integration Setup (Splunk)
1
Create Mimecast API Application
In Mimecast admin console: Administration → Services → API Applications → Add Application. Note the Client ID and Client Secret.
2
Install Mimecast Add-on for Splunk
Splunkbase: "Mimecast Add-On for Splunk." Install on Heavy Forwarder or Search Head. Requires Splunk 8.2+.
3
Configure Data Input
Splunk → Settings → Data Inputs → Mimecast SIEM. Enter Client ID, Secret, Account Code, and desired log types. Set pull interval to 300s (5 min).
4
Validate Index Population
Search index=mimecast sourcetype=mimecast:siem in Splunk. Should see receipt, delivery, and ttp events within one pull cycle.
5
Build Alert Rules
Create Splunk alerts for: BEC attempts (RejCode=TT0004), malicious attachments (sandboxResult=Malicious), DLP triggers (RejType=ContentExamination).
Sample SIEM Event · BEC Detection
{
  "datetime": "2026-03-22T11:42:18+0000",
  "acc": "KTC-Demo-Org",
  "endpoints": 13241,
  "Sender": "m.johnson@acme-corp.co",
  "Recipient": "finance@ktc-demo.com",
  "Dir": "Inbound",
  "Act": "Blk",
  "RejType": "Impersonation",
  "RejCode": "TT0004",
  "Definition": "BEC High Risk",
  "ThreatDictionary": "CEO Fraud",
  "Subtype": "BEC"
}

Mimecast policies define what happens to messages matching specific criteria. Policies are ordered and evaluated top-down — the first matching policy wins. The Operations Center exposes six active gateway policies and allows toggling and editing via the policy management panel.

Policy NameActionScopeEntriesPriority
Block — Known Malicious SendersBLOCKAll inbound4,218 entries1
Quarantine — Suspicious AttachmentsQUARANTINEInbound · .xlsm .docm .exe .vbs .ps12
Anti-Spoofing SPF StrictREJECTAll inbound · SPF fail3
Tag — External Sender WarningTAGAll external inbound4
DLP — PII Outbound ScanHOLDOutbound · SSN / CC / PHI5
Allow — Microsoft 365 RelayALLOWOutbound · IP whitelist (8 IPs)8 IPs6
Policy Toggle Behavior

The toggle switch on each policy row calls PUT /api/policy/{id}/enable or PUT /api/policy/{id}/disable and syncs the change across all 13,241 endpoints within ~60 seconds. In demo mode, toggling shows the state change and fires a toast confirmation. Note:

  • Disabling SPF Strict in production will immediately allow spoofed mail to reach inboxes. Never disable without a maintenance window and change record.
  • Disabling the M365 Relay Allow policy will block all outbound mail. Ensure this is your last resort during incident response.
  • The Blocked Senders list is managed via API. The Operations Center allows additions via the Block Domain buttons in URL Protect, Attachment Protect, and Impersonation views.
Adding a New Policy (Operations Center)
1
Click "+ New Policy" in the Policies view header
Opens the New Policy modal with fields for name, action, scope, and conditions.
2
Define the Policy Name and Action
Select Block, Quarantine, Tag, Allow, or Hold. Name should follow the convention: Action — Description.
3
Set the Scope and Conditions
Define whether the policy applies to All inbound, Outbound, specific directory groups, or specific file extensions.
4
Click "Create Policy"
Fires POST /api/policy/blockedsenders or the relevant endpoint. Policy syncs to all 13,241 endpoints.

Mimecast directory groups allow policies to be applied to specific sets of users rather than the entire tenant. Groups are synchronized from Azure AD (primary) and LDAP. The sync runs at 06:00 UTC daily and can be forced via the Operations Center or API.

Sync Sources
Azure AD SyncUses the Mimecast Azure AD connector (service principal). Syncs user UPNs, group memberships, and manager relationships. Required for BEC policies targeting Executive and Finance groups.
LDAP SyncOn-premises Active Directory sync via LDAP over port 636 (LDAPS). Used for All Staff group (8,241 users) where AD is the authoritative source.
API ManagedGroups like Blocked Senders List are maintained entirely via API calls. No directory sync — entries are added programmatically on threat detection events.
Force Sync (Operations Center)

The "Force AD Sync" button in the Directory view calls POST /api/directory/find-groups followed by a sync trigger. At 13,241 endpoints, expect a 3–5 minute sync cycle. The last sync timestamp updates on completion.

Sync Lag Risk When an employee is terminated, their Mimecast policies remain active until the next sync cycle (up to 24 hours). For immediate access removal, manually delete the user via Mimecast Admin Console or call DELETE /api/user/{id} directly. Do not rely on the scheduled sync for terminations.
POST · /api/directory/find-groups
{
  "meta": {"pagination": {"pageSize": 25}},
  "data": [{"source": "cloud"}]
}
// Response
{
  "data": [
    {"id": "grp_exec", "description": "Executive Leadership", "userCount": 52},
    {"id": "grp_finance", "description": "Finance Department", "userCount": 128},
    {"id": "grp_all", "description": "All Staff", "userCount": 8241}
  ]
}

Mimecast Awareness Training is a built-in phishing simulation and security education platform. It runs campaigns against your real user base, tracks click-through rates, and calculates a per-user SAFE Score (Security Awareness Fitness Evaluation).

SAFE Score

The SAFE Score is a 0–100 composite score per user based on phishing simulation behavior, training completion, and historical click rates. Lower scores = higher risk. The Operations Center displays the org-wide average (74 for KTC-Demo-Org) and surfaces the top 5 high-risk users out of 38.

Org-Wide SAFE Score
74 / 100
▲ +4 this month
Training Pending
842
Users overdue · 8,241 total
High Risk Users
38
SAFE score < 40
Phishing Campaigns

The Operations Center displays active and completed campaigns with sent/clicked/reported rates. Click rates tell the real story — not just whether users clicked, but whether they reported. A 5.8% click rate with 38% report rate (IT Help Desk Spoof) is significantly better than 11.5% click / 26% report (CEO Fraud Sim).

CampaignSentClickedClick RateReportedStatus
Q1 2026 — CEO Fraud Sim8,24194811.5%2,194ACTIVE
IT Help Desk Spoof8,2414785.8%3,181ACTIVE
PayPal Invoice Phish8,2412142.6%5,097COMPLETE
Assign Training (Operations Center)

In the High Risk Users watchlist, clicking "Assign Training" fires POST /api/awareness-training/assign-module for that user and sends an email notification. The user's SAFE score recalculates within 24–48 hours of course completion.

Link Awareness Training to HR Policy For CMMC and HIPAA compliance, awareness training completion must be tracked as a control. Set up a Mimecast API export to push SAFE scores and completion records to your GRC tool monthly. The Operations Center SIEM export covers training events in the awareness log type.

The Mimecast API 2.0 is a REST API hosted at https://us-api.services.mimecast.com (US region). It uses OAuth 2.0 Client Credentials flow. All requests require a short-lived Bearer token obtained by exchanging your Client ID and Secret.

Authentication Flow
1
Create an API Application
Mimecast Admin Console → Administration → Services → API and Platform Integrations → Add Application. Assign the required API permissions (read-only for monitoring, read-write for automation).
2
Obtain Client ID and Secret
After saving the application, copy the Client ID and Client Secret. The secret is shown once. Store in Azure Key Vault or your secrets manager immediately.
3
Request an Access Token
POST to /oauth/token with your credentials. Returns a Bearer token valid for 30 minutes.
4
Authenticate API Requests
Include the token in all subsequent requests as Authorization: Bearer {token}.
OAuth 2.0 Token Request
# POST /oauth/token
curl -X POST https://us-api.services.mimecast.com/oauth/token \
  -H "Content-Type: application/x-www-form-urlencoded" \
  -d "client_id=YOUR_CLIENT_ID" \
  -d "client_secret=YOUR_CLIENT_SECRET" \
  -d "grant_type=client_credentials"

# Response
{
  "access_token": "eyJhbGciOiJSUzI1NiJ9...",
  "token_type": "Bearer",
  "expires_in": 1800
}
API Regions
US (Primary)https://us-api.services.mimecast.com — Used by KTC-Demo-Org. All API calls in the Operations Center use this base URL.
EUhttps://eu-api.services.mimecast.com — GDPR-resident tenants. Data does not leave EU region.
DEhttps://de-api.services.mimecast.com — Germany-resident (DSGVO). Required for certain German public sector customers.
AU / ZA / CAAustralia, South Africa, Canada regional endpoints. Same API surface, data residency varies.
MethodEndpointDescriptionDashboard View
GET/api/ttp/url/get-logsURL Protect click events and blocksURL Protect
GET/api/ttp/attachment/get-logsSandbox verdicts and file hashesAttachment Protect
GET/api/ttp/impersonation/get-logsBEC, CEO fraud, typosquat eventsImpersonation Protect
POST/api/siem/v1/batch/eventsSIEM log batch download pointerSIEM Logs
POST/api/message/get-hold-message-listList quarantine / held messagesQuarantine
POST/api/message/release-held-messageRelease a quarantine messageQuarantine (Release)
POST/api/message/reject-held-messagePurge / delete a held messageQuarantine (Purge)
GET/api/stats/gatewayGateway throughput and disposition statsGateway Stats
POST/api/directory/find-groupsList directory groupsDirectory Groups
POST/api/directory/get-group-membersMembers of a specific groupDirectory Groups
GET/api/policy/blockedsendersList blocked sender policiesPolicies
POST/api/policy/blockedsenders/createAdd domain/sender to block listBlock Domain action
POST/api/awareness-training/get-safe-score-summaryOrg and per-user SAFE scoresAwareness Training
POST/api/awareness-training/get-campaignsActive and completed campaignsAwareness Training

Mimecast enforces per-endpoint rate limits on all API calls. At KTC-Demo-Org scale (13,241 endpoints), the SIEM batch and quarantine endpoints are the most frequently constrained. The API Status view shows current usage against limits in real time.

EndpointQuotaTypical UsageStatusNotes
/api/ttp/url/get-logs100/min~57/minMODERATEHigh during business hours
/api/ttp/impersonation/get-logs100/min~43/minOKPeaks during exec email cycles
/api/siem/v1/batch/events10/min~3/minOKPull every 5 min max recommended
/api/message/get-hold-message-list50/min~38/minMODERATEHigher during spam wave events
/api/awareness-training/*20/min~4/minOKLow frequency reporting calls
/api/stats/gateway60/min~12/minOKDashboard refresh polling
Rate Limit Error Handling HTTP 429 responses include a Retry-After header. All automation scripts must implement exponential backoff. The Operations Center API Explorer displays 429 status in red and halts the demo call. In production integrations, never retry immediately on 429.
BECBusiness Email Compromise. Attack type where an adversary impersonates an executive or trusted authority to initiate fraudulent wire transfers, payroll diversions, or data theft. Highest financial impact email threat type.
TTPTargeted Threat Protection. Mimecast's premium module suite covering URL Protect, Attachment Protect, and Impersonation Protect. Requires TTP license add-on.
SAFE ScoreSecurity Awareness Fitness Evaluation. 0–100 score per user based on phishing simulation behavior and training completion. Below 40 = high risk. Used to target remediation training.
Sandbox DetonationAttachment is opened and executed in an isolated cloud VM. Behavioral analysis determines malice. Pre-emptive detonation occurs before delivery.
URL RewritingAll URLs in inbound messages are replaced with Mimecast proxy URLs (url.us.m.mimecastprotect.com). The proxy evaluates the click in real time.
Hold / QuarantineMessages staged pending review. Accessible via /api/message/get-hold-message-list. Not yet delivered or deleted — can be released or purged.
SPFSender Policy Framework. DNS TXT record listing IP addresses authorized to send mail on behalf of a domain. SPF fail = sender not authorized.
DKIMDomainKeys Identified Mail. Cryptographic signature proving the message body and headers were not modified in transit.
DMARCDomain-based Message Authentication, Reporting & Conformance. Policy layer built on SPF and DKIM. Specifies what to do with messages that fail authentication (none, quarantine, reject).
TyposquatA domain that visually resembles a legitimate domain by substituting characters (e.g. microsofft.com, rn instead of m). Used to trick users into trusting malicious senders.
DLPData Loss Prevention. Policy engine scanning outbound mail for patterns matching sensitive data (SSN, credit card numbers, PHI). Matches trigger hold or encrypt actions.
SIEMSecurity Information and Event Management. Platform (Splunk, Sentinel) that aggregates and correlates log data. Mimecast feeds events via the SIEM batch API.
RejCodeMimecast internal rejection code in SIEM events. TT0001=URL, TT0002=Attachment, TT0003=Typosquat, TT0004=BEC/Impersonation.
Common Issues
Legitimate email going to quarantineCheck hold reason. If SUSPICIOUS or POLICY, review sender domain against blocked list. If recurring, add to a permitted senders policy scoped to the affected recipient group. Do not disable the quarantine policy globally.
SIEM not receiving eventsVerify token is not expired (30-min TTL). Check the SIEM batch queue — a failed prior call may have advanced the cursor. Run a manual pull via API Explorer and inspect the response. Check network egress rules to us-api.services.mimecast.com:443.
Outbound mail not DKIM-signedM365 outbound connector is likely bypassing Mimecast. Verify the connector condition includes all mailboxes and that the connector is set to route through Mimecast relay IPs only.
URL rewriting breaking linksSome applications embed Mimecast-wrapped URLs in webhooks or API callbacks. Add these senders or domains to a URL bypass policy scoped to the specific application mailbox. Never disable URL Protect globally.
API returning 401 UnauthorizedToken expired. Tokens are valid for 1,800 seconds (30 min). Re-request from /oauth/token. In production, implement automatic token refresh 5 minutes before expiry.
Directory sync not updating groupsVerify Azure AD connector service principal has Group.Read.All and User.Read.All permissions. Check Mimecast connector status in admin console. Force a manual sync via the Operations Center and watch for error events in the SIEM awareness log.
Operations Center Demo Behavior
  • All Release and Purge actions animate the quarantine row out and decrement the sidebar badge — no API call is made in demo mode.
  • Block Domain buttons fire a toast notification and simulate adding to the blocked senders list. The blocked entry count is not persisted between sessions.
  • The API Explorer returns mock responses. Selecting a template + clicking RUN always returns 200 OK with realistic demo data scoped to 13,241 endpoints.
  • Live counters drift upward every 5 seconds to simulate real-world mail volume. Refresh All resets counters to new random baselines.
  • The auth token TTL counts down from 28 minutes and fires a warning toast at 0. In production, this represents a real OAuth token expiry — implement auto-refresh.

Mimecast contributes to multiple compliance frameworks through its gateway, archiving, and training capabilities. The Operations Center surfaces the evidence artifacts most relevant to common audit requirements.

FrameworkControlMimecast EvidenceOperations Center Source
CMMC L2SI.L2-3.14.1 — Flaw RemediationMalware block logs, sandboxing recordsAttachment Protect · SIEM batch
CMMC L2AT.L2-3.2.2 — Role-based TrainingSAFE Score, campaign completion ratesAwareness Training
HIPAA§164.312(a)(1) — Access ControlsDLP quarantine records for PHIQuarantine · SIEM process logs
HIPAA§164.308(a)(5) — Security TrainingPhishing sim completion, SAFE ScoreAwareness Training · API export
PCI DSSReq 5.3 — Anti-MalwareGateway AV stats, sandbox verdictsGateway Stats · Attachment Protect
PCI DSSReq 6.3.3 — Phishing ProtectionURL Protect blocks, impersonation logsURL Protect · Impersonation
NIST CSFDE.CM-3 — Personnel MonitoringBEC alerts, DLP violations, click eventsThreat Events · SIEM batch
NIST CSFPR.AT-1 — User AwarenessAwareness training recordsAwareness Training
SOC 2CC6.6 — Transmission of DataDLP outbound controls, DKIM/DMARC enforcementPolicies · Gateway Stats
Automate Evidence Collection Use the SIEM batch API to export monthly evidence bundles directly to your GRC tool. Schedule POST /api/siem/v1/batch/events on the last day of each month with log_types: ["ttp","impersonation","av","process"]. This eliminates manual screenshot collection at audit time and is timestamped by Mimecast's infrastructure.
KB // MIMECAST EMAIL SECURITY OPERATIONS KTC-DEMO-ORG · 13,241 ENDPOINTS · API 2.0