Mimecast is a cloud-based, anti-spam, and archive filtering service for securing email accounts and communications for businesses.
Mimecast protects an enterprise’s email infrastructure from viruses, malware, phishing, and the rise of deep-fake attacks. It does this by deploying a layered cyber resilience solution that prevents email-borne infections and reduces data loss by archiving emails. This cloud-based cybersecurity solution also makes it possible to automate the recovery of archived and affected emails for continuous use.
The Mimecast approach to protecting email structures means it can predict or anticipate attacks in order to handle real-time threats. It also deals with data loss from ransomware attacks using data archiving, which eliminates the need to meet ransom demands, as well as struggle with downtime. Mimecast can also be deployed to tackle those annoyingly ‘spammy’ messages that keep cluttering inboxes.
For those who already use any of the popular email management brands such as Microsoft Office 365, Outlook, or Google’s Gsuite, Mimecast’s cloud-based nature makes it compatible with them. It can be deployed to tackle spam, ransomware, or other cybersecurity challenges.
The Devo Mimecast Collector uses the Mimecast API to extract all the relevant information an send it as events to Devo.
For more information on how the events are parsed, visit our page.
Vendor setup
Overview
Mimecast API 2.0 uses OAuth 2.0 to authenticate with the new Mimecast API Gateway using a dedicated Application (created and configured by the customer). To register and configure an Application:
To successfully create and manage Mimecast API 2.0 applications, the Security Permissions setting for a logged in administrators' role, must be able to Manage Application Roles. Please see the following KB article for further information on managing roles: Customer Community
For Email Security Cloud Integrated customers
Navigate to Configuration | API 2.0 Applications
Select New Application
Authentication
After this process, the two keys that the Mimecast Collector API 2.0 needs are created, the keys are:
Client ID(client_id).
Client Secret ( client_secret)
Overview
Following steps are necessary for setup at the Mimecast side.
Each API call has a prerequisite section that tells you what permissions are needed for the call. Usually, a Basic Administrator role will suffice, which should allow you to use the same API keys generated for multiple API calls under the application.
Service
Permissions
Service
Permissions
SIEM Audit
Gateway | Tracking | Read
Audit
Account | Logs | Read
TTP attachment
Monitoring | Attachment Protection | Read
TTP impersonation
Monitoring | Impersonation Protection | Read
TTP URL
Monitoring | URL Protection | Read
Archive search
Archive | Search Logs | Read
Archive view
Archive | View Logs | Read
TTP Thread intel
Services | Gateway | Tracking | Read
Message Hold List
Account | Dashboard | Read
Message Hold Summary
Account | Monitoring | Held Summary | Read
Dashboard
Account | Dashboard | Read
If you want to create a custom administrative role for this API service account user:
Navigate to Administration | Account | Roles.
Click New Role.
Enter a Role Name and Description.
In the Application Permissions section, select the boxes for each required role to be used by the service user account.
Click Save and Exit.
Locate the newly created role and click on the role name.
Click Add User to Role.
Click on the email address of the API service user account.
If you want to add the service account user to an existing role:
Navigate to Administration | Account | Roles.
Click on the administrator role the user will be added to.
Click Add User to Role.
Click on the email address of the API service user account.
Once the data source is configured, you can either send us the required information if you want us to host and manage the collector for you (Cloud collector), or deploy and host the collector in your own machine using a Docker image (On-premise collector).
API limits and duplicates
The Mimecast API has some call rate limits. When a limit is reached, the collector shows a 429 error. More details about MImecast limits can be found here and here
The Mimecast API sometimes sends duplicate events (it is not common). The collector tries to filter out the duplicates, but it is not possible to guarantee that all duplicates are deleted.
Change log
Release
Released on
Release type
Recommendations
Release
Released on
Release type
Recommendations
v2.2.1
Oct 30, 2024
bug fixing
Recommended version
Bug fixes
Solved “Collector stops every 7 days” (INT-2957).
v2.2.0
Oct 23, 2024
IMPROVEMENTS
-
Improvements
The tags used for SIEM v2 have been changed, so they can use the new parsers that store data in the old tables
Migrated to DCSDK version 1.13.1
Change internal queue management for protecting against OOMK
Extracted ModuleThread structure from PullerAbstract
Improve Controlled stop when both processes fails to instantiate
Improve Controlled stop when InputProcess is killed
Fixed error related a ValueError exception not well controlled
Fixed error related with loss of some values in internal messages
v2.1.1
Sep 24, 2024
bug fixing
-
Bug fixes
Solved CVE-2024-45490, CVE-2024-45491, CVE-2024-45492 updating base image.