Step 1: Create a Permitted Senders Policy
Path:
Administration → Gateway → Policies → Permitted Senders → New Policy
Configuration:
- Policy Narrative: Threatcop – Permitted Senders
- Select Option: Permitted Sender
- Emails From: (Threatcop domain to be added)
- Emails To: Internal domain/users
- Valid From / To: As required
- Enabled: Yes
Path:
Administration → Gateway → Policies → Anti-Spoofing → New Policy
Configuration:
- Policy Narrative: Threatcop – Anti-Spoofing Allow
- Option: Bypass Anti-Spoofing
- Emails From: (Threatcop domain to be added)
- Emails To: Internal domain/users
Path:
Administration → Gateway → Policies → Connection Handling → Gateway Policies → Allowed IP Ranges → New Entry
Add:
- Allowed IP: 168.245.74.19
- Comment: Threatcop SMTP Delivery
Path:
Administration → Gateway → Policies → IP Ranges → New Policy
Configuration:
- IP Range Policy: Threatcop SMTP IP Allow
- IP Range: 168.245.74.19
- Option: Treat as Internal / Permitted
5. Create a Header Bypass Policy
Path:
Administration → Gateway → Policies → Definitions → Header Policies
Steps:
3. Configuration:
Field | Input/Action |
Policy Name | Threatcop – Header Bypass (Custom) |
Sender Header Value | X-Threatcop: This is a phishing security test from ThreatCop that has been authorized by the recipient organization. OR X-Threatcop-Support: In case of any queries kindly contact us at support@threatcop.com |
Action | Allow / Bypass Processing |
Header Type | X-Threatcop or X-Threatcop-Support |
4. Save the policy after configuring.
Path:
Administration → Services → URL Protection → Policies → New Policy
Configuration:
- Policy Narrative: Threatcop – URL Bypass
- Option: Disable URL Rewriting
- URLs: (Threatcop URL placeholder)
- Emails From: Threatcop sender domain
- Emails To: Internal domain
Path:
Administration → Services → Attachment Protection → Policies → New Policy
Configuration:
- Policy Narrative: Threatcop – Attachment Bypass
- Option: Bypass Inspection
- Emails From: Threatcop sender domain
- Emails To: Internal recipients
Once domains/URLs are added:
1. Send a test simulation from Threatcop.
2. In Mimecast → Monitoring → Tracking, verify acceptance.
3. Ensure:
- No rewriting
- No quarantine
- No header stripping