Email Security

Minimal guidance for messy support realities.

Mimecast targetted threat protection rewrites QR-code phish but users still scan screenshots

Issue Summary

This article covers a Mimecast email-security issue where Mimecast targetted threat protection rewrites QR-code phish but users still scan screenshots. Use the path below to confirm scope, separate mail-flow from policy and identity causes, and move from safe user checks into deeper administrative remediation without weakening protection broadly.

Mimecast mailbox continuity login works but sent items never appear

Issue Summary

This article covers a Mimecast email-security issue where Mimecast mailbox continuity login works but sent items never appear. Use the path below to confirm scope, separate mail-flow from policy and identity causes, and move from safe user checks into deeper administrative remediation without weakening protection broadly.

Mimecast accepted domains configured but brand-new subdomain mail is rejected

Issue Summary

This article covers a Mimecast email-security issue where Mimecast accepted domains configured but brand-new subdomain mail is rejected. Use the path below to confirm scope, separate mail-flow from policy and identity causes, and move from safe user checks into deeper administrative remediation without weakening protection broadly.

Mimecast digest release works for users but admin release silently fails

Issue Summary

This article covers a Mimecast email-security issue where Mimecast digest release works for users but admin release silently fails. Use the path below to confirm scope, separate mail-flow from policy and identity causes, and move from safe user checks into deeper administrative remediation without weakening protection broadly.

Mimecast journaling connector healthy but archive lag grows during peak hours

Issue Summary

This article covers a Mimecast email-security issue where Mimecast journaling connector healthy but archive lag grows during peak hours. Use the path below to confirm scope, separate mail-flow from policy and identity causes, and move from safe user checks into deeper administrative remediation without weakening protection broadly.

Mimecast secure messaging prompts external user to verify every message

Issue Summary

This article covers a Mimecast email-security problem centered on Mimecast secure messaging prompts external user to verify every message. Use the path below to verify symptoms, identify whether the break is policy, routing, quarantine, identity, or integration related, and escalate cleanly if standard repair steps do not hold.

Mimecast archive search finds message but restore to mailbox fails

Issue Summary

This article covers a Mimecast email-security issue where Mimecast archive search finds message but restore to mailbox fails. Use the path below to confirm scope, separate mail-flow from policy and identity causes, and move from safe user checks into deeper administrative remediation without weakening protection broadly.

Mimecast blocked sender entry created but spam still reaches shared mailbox

Issue Summary

This article covers a Mimecast email-security issue where Mimecast blocked sender entry created but spam still reaches shared mailbox. Use the path below to confirm scope, separate mail-flow from policy and identity causes, and move from safe user checks into deeper administrative remediation without weakening protection broadly.

Mimecast large file send works externally but internal recipients never receive links

Issue Summary

This article covers a Mimecast email-security issue where Mimecast large file send works externally but internal recipients never receive links. Use the path below to confirm scope, separate mail-flow from policy and identity causes, and move from safe user checks into deeper administrative remediation without weakening protection broadly.

Mimecast impersonation protect flags vendor invoices from trusted senders

Issue Summary

This article covers a Mimecast email-security issue where Mimecast impersonation protect flags vendor invoices from trusted senders. Use the path below to confirm scope, separate mail-flow from policy and identity causes, and move from safe user checks into deeper administrative remediation without weakening protection broadly.