Best Practice
When a new domain is added to your Mimecast account, it is recommended that the Default Anti-Spoofing checkbox is enabled. This will automatically create an Anti-Spoofing policy that contains the settings below. If this was not done when the domain was registered in Mimecast, you could follow the steps below to apply a Default Anti-Spoofing policy.
All of your Internal Domains should be covered by one of the following:
- A policy set to Apply Anti-Spoofing (Excluding Mimecast IPs), either individually or within a Profile Group.
- A Take No Action policy/policies to Allow any legitimately spoofed mail restricted to the source IPs.
To configure an Anti-Spoofing policy:
- Log on to the Mimecast Administration Console.
- Navigate to Gateway | Policies.
- Click on Anti-Spoofing. A list of policies is displayed.
- Click on New Policy. For further details on completing the basic policy criteria, see the Mimecast KB article: Policy Basics: From / To / Validity.
- Complete with the following settings:
| Field / Option | Required configuration | 
|---|---|
| Policy Narrative | Enter a name for the policy. | 
| Select Option | Apply Anti-Spoofing (Exclude Mimecast IPs) | 
| Addresses Based On | Both | 
| Applies From | Email Domain | 
| Specifically | Enter the internal domain that you want to protect from spoofing. | 
| Applies To | Internal Addresses | 
| Specifically | Applies to all Internal Recipients | 
| Enable / Disable | Enable | 
| Set policy as perpetual | Always On | 
| Date Range | All time | 
| Policy Override | Disabled | 
| Bi-Directional | Disabled | 
| Source IP Ranges (n.n.n.n/x) | Leave the text box blank. Note: You will never need to specify an IP address when applying Anti-Spoofing checks under normal circumstances. | 
| Hostname(s) | Leave the text box blank. Note: You will never need to specify a Hostname when applying Anti-Spoofing checks under normal circumstances. | 
- Click Save and Exit.
A bypass policy can be created to allow spoofing emails from specified IP addresses or hostnames. All other spoof emails will be blocked if the correct default Anti-Spoofing policies are set up for your internal domains.
| Note: | Items highlighted in bold are the recommended default setting for most customers. | 
| Field / Option | Required configuration | 
|---|---|
| Policy Narrative | Enter a name for the policy. | 
| Select Option | Take No Action | 
| Addresses Based On | Both | 
| Applies From | Everyone Note: For additional security, you can be more specific and restrict it to a domain or individual address if you wish. | 
| Specifically | Applies to all Internal Senders Note: Unless you're specifying an individual address or domain. | 
| Applies To | Everyone Note: For additional security, you can be more specific and restrict it to an internal domain or internal email address if you wish. | 
| Specifically | Applies to all Internal Recipients Note: Unless you're specifying an individual address or domain. | 
| Enable / Disable | Enable | 
| Set policy as perpetual | Always On | 
| Date Range | All time | 
| Policy Override | Enabled | 
| Bi-Directional | Disabled | 
| Source IP Ranges (n.n.n.n/x) | Tighten this policy's security by entering the sending server's public IP address or address range in CIDR format. The policy will only trigger when the IP matches. | 
| Hostname(s) | Less commonly used; however, you can restrict this policy by utilizing the sending servers' publicly visible hostname. The policy will only trigger when the Hostname matches. | 
 
            
Comments
0 comments
Article is closed for comments.