Mimecast
Overview
Mimecast ingests and normalizes logs from Mimecast's email security platform in Logpoint. Once ingested, you can explore and analyze the data using Logpoint's search capabilities and available analytics for this integration, including dashboards and alerts. This gives you clear visibility into email threats, malicious domains, malware detection, phishing attempts, spam filtering, and email traffic patterns, enabling faster detection, compliance, and response.
The integration includes:
MimecastLogFetcher to retrieve raw logs from Mimecast API and ingest them into Logpoint for processing.
MimecastCompiledNormalizer to convert the fetched logs into a standardized format for consistent analysis across Logpoint.
Dashboard packages (LP_Mimecast, LP_Mimecast Threat Protection), which provide a graphical and interactive overview of Mimecast activities, highlighting patterns including malicious domains, malware attachments, targeted threat dictionary detections, newly observed domains, email traffic flows, and rejection reasons. It allows you to quickly spot unusual behavior, monitor compliance, and track operational changes over time.
Alert package (LP_Mimecast Phishing Email Attachments Detection) that notifies you about critical security events, including phishing email attachments with malicious content. They enable faster incident response and help you maintain compliance with internal or regulatory security requirements.
Mimecast collects the following email events:
Inbound - Emails from external senders to internal recipients
Outbound - Emails from internal senders to external recipients
Internal - Emails between internal domains
Supported Events
Mimecast versions:
Mimecast v3.x
Mimecast API v1.0
Mimecast log types:
Threat Protection Events: Malicious domain detection, malware scanning, phishing detection, spear-phishing attempts, data leak prevention
Email Traffic Events: Inbound messages, outbound messages, internal messages, message acceptance, message rejection, message holds
Impersonation Detection: Internal user name spoofing, reply address mismatches, similar internal domain detection
Domain Intelligence: Newly observed domains, targeted threat dictionary matches, suspicious domain patterns
Attachment Security: Malicious file extensions, weaponized attachments, virus signatures
Delivery Events: Failed delivery reasons, email routing, destination tracking, source country analysis
Last updated
Was this helpful?