Skip to main content

Cyware Orchestrate

Mimecast 2.0.0

App Vendor: Mimecast

App Category: Email Gateway

Connector Version: 2.0.0

API Version: V2

About App

Mimecast is a cloud-based email management tool with security, archiving, and continuity features.

The Mimecast app is configured with Cyware Orchestrate to perform the following actions:

Action Name

Description

Add Group Member

This action adds user email addresses or domains to a profile group.

Create Address Alteration Definition (Beta)

This action creates an address alteration definition within an address alteration set or at the root level.

Create Address Alteration Policy

This action creates a new address alteration policy that applies an alteration definition based on sender and recipient values.

Create Address Alteration Set

This action creates a new address alteration set.

Create Anti-Spoofing Policy

This action creates an anti-spoofing spf-based bypass policy. you can create a maximum of 50 policies simultaneously.

Create Blocked Sender Policy

This action creates new policies for blocked senders, enabling management of sender and recipient restrictions.

Create Group

This action creates new profile groups at the root level or as child groups. groups can be used to apply permissions and policies.

Create Managed URL

This action adds new URL entries in managed URLs for URL protection.

Create Policy with Targets (Beta)

This action creates a Web Security Block or Allow List policy for domains or URLs.

Create Remediation Incident (Beta)

This action creates a new remediation incident by messageid, file hash, or a URL contained in an email.

Decode URL

This action decodes a list of Mimecast-encoded URLs.

Delete Address Alteration Definition

This action removes an existing address alteration definition within an address alteration set.

Delete Address Alteration Policy

This action removes an existing address alteration policy.

Delete Anti-Spoofing Policy

This action deletes an existing Anti-Spoofing SPF-based Bypass policy.

Delete Policy with Targets (Beta)

This action deletes an existing Web Security Block or Allow List policy for domains or URLs.

Find Remediation Incidents

This action searches for existing remediation incidents.

Get Address Alteration Definition

This action retrieves an existing address alteration definition. to make a successful request, you must include at least one action parameter.

Get Address Alteration Policy

This action retrieves the details of an existing address alteration policy.

Get Address Alteration Set

This action retrieves an existing address alteration set.

Get Anti-Spoofing Policy

This action retrieves the details of existing Anti-Spoofing SPF-based Bypass policies.

Get Archive File (Beta)

This action retrieves the archived file or attachment for the given ID.

Get Blocked Sender Policies

This action retrieves blocked sender policies.

Get Current Account Details

This action retrieves the details of a configured Mimecast account.

Get Email Queues

This action retrieves the count of inbound and outbound email queues for the specified times.

Get File (Beta)

This action retrieves the file attachment based on the provided ID.

Get Group Members

This action retrieves group members from groups that exist on a tenant.

Get Held Message List

This action retrieves the count of currently held messages for each hold reason.

Get Hold Message List

This action retrieves information about held messages, including the reason, hold level, sender, and recipients.

Get Managed URLs

This action retrieves all the entries that are currently in an account's Managed URL list.

Get Message Details (Beta)

This action retrieves details about a specific message with the provided ID.

Get Message Info

This action retrieves detailed information about a specific message.

Get Policy with Targets (Beta)

This action retrieves the information about an existing Web Security Block or Allow List policy for domains or URLs.

Get Remediation Incident (Beta)

This action retrieves the information of an existing incident.

Get TTP Attachment Protection Logs

This action returns TTP attachment protection logs from Mimecast.

Get TTP Impersonation Protect Logs

This action retrieves messages containing information flagged by an impersonation protection configuration.

Get TTP URL Logs

This action retrieves TTP URL logs from Mimecast.

List Messages

This action lists archived messages. To perform this action, your user role must have archive, search, or read permission.

Nullify Blocked Sender Policy

This action nullifies a blocked sender policy based on the given ID by creating a new policy with the same items, setting the action to no_action, and marking it as an override.

Permit or Block Sender

This action permits or blocks emails between a provided sender and recipient.

Reject Held Message

This action rejects a currently held message.

Release Held Message

This action releases a currently held message.

Remove Group Member

This action removes members from mimecast profile groups.

Search

This action searches the Mimecast email environment for messages that match the provided criteria. you must provide either advanced track and trace options or a message ID.

Search File Hash

This action searches for the given file hashes within messages.

Search Groups

This action searches for groups in mimecast.

Update Address Alteration Policy

This action updates an existing address alteration policy.

Update Anti-Spoofing Policy

This action updates an existing Anti-Spoofing SPF-based Bypass policy.

Update Group

This action updates the description of mimecast profile groups. You can update a maximum of 10 groups simultaneously.

Update Policy with Targets (Beta)

This action updates an existing Web Security Block or Allow List policy for domains or URLs.

Generic Action

This is a generic action used to make requests to any Mimecast endpoint.

Configuration Parameters

The following configuration parameters are required for the Mimecast app to communicate with the Mimecast enterprise application. The parameters can be configured by creating instances in the app.

Parameter

Description

Field Type

Required/Optional

Comments

Base URL

Enter the base URL to access Mimecast API.

Text

Required

For more information on supported base URLs, see Mimecast API Documentation.

Client ID

Enter the client ID to authenticate with Mimecast API.

Text

Required

Client Secret

Enter the client secret to authenticate with Mimecast API.

Password

Required

Timeout

Enter the timeout value in seconds. This is the number of seconds that requests will wait to establish a connection with Mimecast.

Integer

Optional

Allowed range:

15-120

Default value:

15

Verify

Choose your preference to verify SSL or TLS while making requests. It is recommended to set this option to yes. Passing no may result in incorrectly establishing the connection.

Boolean

Optional

By default, verification is disabled.

Action: Add Group Member

This action adds user email addresses or domains to a profile group.

Note

To use this action, you must have Directories | Groups | Edit permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Member Information

Enter the information of members to be added as a list.

List

Required

Allowed fields:

id, domain, emailAddress, notes

Note

You must specify the group ID and include either the domain or email address.

Example Request

[
  {
    "member_information": [
      {
        "emailAddress": "john.doe@orgname.com",
        "id": "eNoVzrsOgjAUANB_uasklqIgJA74ppIGo6AkLpUWq_JQajHG-O_ifobzASUy3YgLBw-ItJZ3OllFm72zi1osy1Goz9Vr1qaJj-3QjiVNjv2YzqajxW04fGx4b-70SuIG8uAc-2dyWFsttl_vN2KltCKdVQFSjhulaE7olrIkINf0pHP2DMZgQMHZHbycFUoYkGn1rEvRZDUXXWYabyembyI8sDvZikZd6go804C8Lrho_mPTRRbC3x9dtT4N"
      }
    ]
  }
]
Action: Create Address Alteration Definition (Beta)

This action creates an address alteration definition within an address alteration set or at the root level.

Note

To use this action, you must have Gateway | Policies | Edit.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Address Type

Enter the type of the address to be altered.

Text

Required

Allowed values:

all, envelope_from, envelope_to, from, reply_to, to_cc_bcc, sender

New Address

Enter the new address structure. All domains must be internal.

Text

Required

Allowed formats:

localpart@domainpart, @domainpart, localpart@

Original Address

Enter the original address being considered to rewrite. All domains must be internal.

Text

Required

Allowed formats:

localpart@domainpart, @domainpart, localpart@

Routing

Enter the address alteration definition route.

Text

Required

Allowed values:

all, inbound, outbound

Folder ID

Enter the mimecast secure ID of an address alteration set. If you do not enter the ID, the definition will be created at the root level and will apply to messages without an associated policy.

Text

Optional

You can retrieve the Folder ID using the action Get Address Alteration Set.

Action: Create Address Alteration Policy

This action creates a new address alteration policy that applies an alteration definition based on sender and recipient values. You can create a maximum of 50 policies simultaneously.

Note

To use this action, you must have Gateway | Policies | Edit permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Data

Enter the data to create an address alteration policy.

Example:

$JSON[[{"addressAlterationSetId" : "test", "policy" : {"comment":"test", "description" :"test", "to":{"type":"everyone"}, "from":{"type":"everyone"}}}]].

List

Required

Allowed keys:

addressAlterationSetId, policy

Allowed keys for policy:

bidirectional, comment, conditions, description, enabled, enforced, from, fromDate, fromEternal, fromPart, override, to, toDate, toEternal

Example Request

[
  {
    "policy_information": [
      {
        "addressAlterationSetId": "eNoVzskKgkAYAOB3-a8JLlNu0MG0Qi0xwkHDy-SMS7mUk0pE757dv8P3Ac6yoWcVBRMm4t_1I_btG0I4bI97RIrLqZ2cMcGWoh7UqAxwKkaBY-u7-2r1PNHFVls0nuGWsZaKhRf7aFTU6f2WSFOicMhaV-KaESbS1gvOAcGud0uuQ05e7hoEqCl5gJmTmjMBsoG_uob1WUfZnLGj80a2ZElZqrMcWc-rrgVTFiDvasr6_1iRdR0Z3x9XqT4O",
        "policy": {
          "comment": "This is a sample comment.",
          "description": "This is a sample description.",
          "to": {
            "type": "everyone"
          },
          "from": {
            "type": "everyone"
          }
        }
      }
    ]
  }
]
Action: Create Address Alteration Set

This action creates a new address alteration set.

Note

To use this action, you must have Gateway | Policies | Edit permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Description

Enter the name of the Address Alteration Set (folder) to be created.

Text

Required

Parent ID

Enter the Mimecast secure ID of an existing alteration set to create the new set within it. If you do not enter the parent ID, the new set will be created at the root level.

Text

Optional

You can retrieve the Parent ID using the action Get Address Alteration Set.

Example Request

[
  {
    "description": "Sample description"
  }
]
Action: Create Anti-Spoofing Policy

This action creates an Anti-Spoofing SPF-based Bypass policy. You can create a maximum of 50 policies simultaneously.

Note

To use this action, you must have Gateway | Policies | Edit permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Data

Enter the anti-spoofing policy data to create the policy.

Example:

$JSON[[{"option": "disable_bypass", "policy": {"comment":"test", "description":"test", "to":{"type":"everyone"},"from":{"type":"everyone"}, "conditions": { "spfdomains": ["test.com"]}}}]]

List

Required

Allowed keys:

option, policy

Allowed keys for policy:

bidirectional, comment, conditions, description, enabled, enforced, from, fromDate, fromEternal, fromPart, override, to, toDate, toEternal

Example Request

[
  {
    "policy_information": [
      {
        "option": "disable_bypass",
        "policy": {
          "comment": "This is a sample test.",
          "description": "This is a sample description.",
          "to": {
            "type": "everyone"
          },
          "from": {
            "type": "everyone"
          },
          "conditions": {
            "spfDomains": [
              "test.com"
            ]
          }
        }
      }
    ]
  }
]
Action: Create Blocked Sender Policy

This action creates new policies for blocked senders, enabling the management of sender and recipient restrictions.

Note

To use this action, you must have Gateway | Policies | Edit permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Policy Action

Enter the policy action.

Text

Required

Allowed values:

no_action, block_sender

Policy Information

Enter the policy information.

Key Value

Required

Allowed keys:

bidirectional, comment, conditions, description, enabled, enforced, from, fromDate, fromEternal, fromPart, override, to, toDate, toEternal

Example Request

[
  {
    "policy_action": "no_action",
    "policy_information": {
      "to": {
        "type": "individual_email_address",
        "emailAddress": "john.doe@orgname.com"
      },
      "from": {
        "type": "individual_email_address",
        "emailAddress": "jane.doe@orgname.com"
      },
      "override": "True",
      "description": "This is a sample description."
    }
  }
]
Action: Create Group

This action creates new profile groups at the root level or as child groups. You can use groups to apply permissions and policies.

Note

To use this action, you must have Directories | Groups | Edit permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Group Information

Enter the information of the new group as a list.

List

Required

Allowed fields:

description (mandatory), parentId

Example Request

[
  {
    "groups_information": [
      {
        "description": "This is a sample description."
      }
    ]
  }
]
Action: Create Managed URL

This action adds new URL entries in managed URLs for URL protection.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

URL Information

Enter the information of the URL to be added as a $JSON[[{action}]].

List

Required

Allowed fields for each URL object:

action (mandatory): Allowed values are permit or block, disableLogClick, comment, disableRewrite, disableUserAwareness, matchType, url

Example Request

[
  {
    "url_information": [
      {
        "url": "https://www.example.com",
        "action": "permit"
      }
    ]
  }
]
Action: Create Policy with Targets (Beta)

This action creates a Web Security Block or Allow List policy for domains or URLs.

Note

To use this action, you must have the Web Security | Policies | Edit permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Description

Enter a description of the policy.

Text

Required

Policies

Enter the policy scoping details to create the policy.

Key Value

Required

Allowed keys:

bidirectional, comment, conditions, description, enabled, enforced, from, to, fromDate, fromEternal, fromPart, override, toDate, toEternal

URLs

Enter the URLs along with the corresponding actions for each URL to be applied by this policy.

Key Value

Required

Allowed keys:

action (mandatory), id, type (mandatory), value (mandatory)

Action: Create Remediation Incident (Beta)

This action creates a new remediation incident by messageid, file hash, or a url contained in an email.

Note

To use this action, you must have the Services | Threat Remediation | Edit permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Reason

Specify the reason for creating the remediation incident.

Text

Required

Hash or Message ID

Enter the file hash value or the message ID based on the value specified in the search by field. You can leave this empty if you are searching by URL.

Text

Optional

Search by

Enter the message component to search by.

Text

Optional

Allowed values:

hash, messageId, url

Start Date

Enter the start date (in yyyy-mm-dd't'hh:mm:ssz format) of the earliest messages to remediate.

Text

Optional

By default, it starts from the last calendar month.

End Date

Enter the end date (in yyyy-mm-dd't'hh:mm:ssz format) of the most recent messages to remediate.

Text

Optional

By default, it ends at the time of the request.

URL Value

Enter the URL present in the email that requires remediation. This field is mandatory when Search by is set to 'url'. Ensure the URL is decoded and is not the Mimecast-rewritten version.

Text

Optional

Action: Decode URL

This action decodes a list of Mimecast-encoded URLs.

Note

To use this action, you must have the Account | Dashboard | Read permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Encoded URLs

Enter the list of Mimecast encoded URLs. You can enter a maximum of 25 URLs.

Example:

[{"url": "https://protect-xx.mimecast.com/"}]

List

Required

Example Request

[
  {
    "encoded_urls": [
      {
        "url": "https://protect-xx.mimecast.com/"
      }
    ]
  }
]
Action: Delete Address Alteration Definition

This action removes an existing address alteration definition within an address alteration set.

Note

To use this action, you must have Gateway | Policies | Edit permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

ID

Enter the Mimecast secure ID of the address alteration definition to delete.

Text

Required

You can retrieve the ID using the action Get Address Alteration Definition.

Example Request

[
  {
    "id": "eNoVzs0KgkAUQOF3mbWQmkkELWowtAwtMx1p5Z1bDaVTM2p_9O7Z_oNzPkQjtAoFJxNyHO5Exlp2fUdR7WX3S-rl3DebU7KimjsFi3mwrQ4DwRZ-5yfha_kqVL5nz02ZMI1pEcq5iQFtO5mNojGFRwln8AQM852UVaZuCOVaxyHUwZQYRDRY_cOWadmuQaDVjaxQgeTY39A0mVszy7Qdt7cdKi1k3ePvD-qWPBc"
  }
]
Action: Delete Address Alteration Policy

This action removes an existing address alteration policy.

Note

To use this action, you must have Gateway | Policies | Edit permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Policy ID

Enter one or more Mimecast secure IDs of the policies to delete. You can delete a maximum of 500 policies simultaneously.

Example:

{"id":"eNo1jk0LgjAAQP_LrgZumq6CDqYGMxGjFI0uNldq-ZG6mUT_PTt0f4_33qBjlLcsT8EKCOGrXH2dhsK0encTtUeL2vtqsEQcGoru6kHmhWc58Cxzsb1r2nOfSjaWSmdJsgif5ZsT7VSh6MM4wqTMVJ_TisAOL_0Y2o538JKQOEV84dekJ2swA039yOn4aysIYzQDlHd9XbKW1imbhszgsEEGgspcn2jB2i6vK7BCf_M4NoxM9kRA-PkCaGtApA"}

Key Value

Required

You can retrieve the Policy ID using the action Get Address Alteration Policy.

Example Request

[
  {
    "policy_id": {
      "id": "eNo1jk0LgjAAQP_LrgZumq6CDqYGMxGjFI0uNldq-ZG6mUT_PTt0f4_33qBjlLcsT8EKCOGrXH2dhsK0encTtUeL2vtqsEQcGoru6kHmhWc58Cxzsb1r2nOfSjaWSmdJsgif5ZsT7VSh6MM4wqTMVJ_TisAOL_0Y2o538JKQOEV84dekJ2swA039yOn4aysIYzQDlHd9XbKW1imbhszgsEEGgspcn2jB2i6vK7BCf_M4NoxM9kRA-PkCaGtApA"
    }
  }
]
Action: Delete Anti-Spoofing Policy

This action deletes an existing Anti-Spoofing SPF-based Bypass policy.

Note

To use this action, you must have Gateway | Policies | Edit permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Policy ID

Enter one or more policy IDs to delete. You can delete a maximum of 500 anti-spoofing policies simultaneously.

Key Value

Required

You can retrieve the Policy ID using the action Get Anti-Spoofing Policy.

Example Request

[
  {
    "policy_id": {
      "id": "eNo1jk0LgjAAQP_LrgVuM10GHSoNZjEUUxK82Fxp5UfzixH99-zQ_T3ee4NW8F6KIgMrYJ08wzk8ZXwbmOIL5uu2LMZqtIc42mDzaIY5ixItZPZuuX8YxsvPZg6Zla5F8zNJtJt7PugDNkelYFrmutfzisKWWF4MHZcFLI2oe48v_TXt6BrMQVM_C65-bYwIwXPA-7arSyF5nYlpaBcGW7RBEC_MiR6EbIu6Aiv0N0-qEXSyEYQQfb4_I0By"
    }
  }
]
Action: Delete Policy with Targets (Beta)

This action deletes an existing Web Security Block or Allow List policy for domains or URLs.

Note

To use this action, you must have the Web Security | Policies | Edit permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

ID

Enter the ID of an existing policy to delete. You can delete a maximum of 10 policies simultaneously.

Key Value

Required

You can retrieve the ID using the action Get Policy with Targets.

Action: Find Remediation Incidents

This action searches for existing remediation incidents.

Note

To use this action, you must have the Services | Threat Remediation | Read permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Filter by

Enter the value to filter the response based on the incident type.

Key Value

Optional

Allowed keys:

fieldName, value

Search by

Enter the value to search the results.

Key Value

Optional

Allowed keys:

fieldName, value

Start Date

Enter the start date of the earliest incident to return in yyyy-mm-dd't'hh:mm:ssz format.

Text

Optional

End Date

Enter the end date of the latest incident to return in yyyy-mm-dd't'hh:mm:ssz format.

Text

Optional

Action: Get Address Alteration Definition

This action retrieves an existing address alteration definition. To make a successful request, you must include at least one action parameter.

Note

To use this action, you must have the Gateway | Policies | Read permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Folder ID

Enter the folder ID that contains the address alteration definitions.

Text

Optional

You can retrieve the Folder ID using the action Get Address Alteration Set.

New Address

Enter the new address structure. All domains must be internal.

Example:

sample1@sample.com

Text

Optional

Allowed formats:

localpart@domainpart, @domainpart, localpart@

Original Address

Enter the original address to be rewritten. All domains must be internal.

Example:

sample@sample.com

Text

Optional

Allowed formats:

localpart@domainpart, @domainpart, localpart@

Routing

Enter the address alteration definition route.

Text

Optional

Allowed values:

all, inbound, outbound

Example Request

[
  {
    "routing": "all"
  }
]
Action: Get Address Alteration Policy

This action retrieves the details of an existing address alteration policy. You can retrieve details for a maximum of 500 policies simultaneously.

Note

To use this action, you must have the Gateway | Policies | Read permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Policy ID

Enter the policy ID to retrieve its details.

If you do not enter an ID, this action retrieves the details of all policies.

Key Value

Optional

You can retrieve the Policy ID using the action Get Address Alteration Policy.

Example Request

[
  {
    "policy_id": "eNo1jk0LgjAAQP_LrgVts2YGHTQNZiXGUjS62Fxp-ZU6w6L_nh26v8d7b9AILmuRxmABFDOMjuadua_A0tmO5m6GDb14ml3o65hsiZc4_mniOeZqvr7PZo99PLLUUW5rNAnU0-RqBxulw-TZ9zDKE8WVvKCwUTU3hJbtMCfyqX0Lz_IStXQJxqAqs5T3vzZGBOEx4LJpy1zUvIzFMLTymIF0BPGUDHQn6iYtC7BAf_PQV4IO9kBA-PkC50A_7A"
  }
]
Action: Get Address Alteration Set

This action retrieves an existing address alteration set.

Note

To use this action, you must have the Gateway | Policies | Read permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Folder ID

Enter the mimecast secure ID of the alteration set (folder). If you do not enter an ID, this action retrieves all sets.

Text

Optional

You can retrieve the folder ID using the action Get Address Alteration Set.

Depth

Enter the depth for recursing the address alteration set.

Integer

Optional

Default value:

1

Example Request

[
    {
      "depth": 0
    }
]
Action: Get Anti-Spoofing Policy

This action retrieves the details of existing Anti-Spoofing SPF-based Bypass policies.

Note

To use this action, you must have the Gateway | Policies | Read permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Policy IDs

Enter the ID of the policy to retrieve the details. If you do not enter the ID, this action retrieves details of all the policies.

Key Value

Optional

You can retrieve the policy ID using the action Get Anti-Spoofing Policy.

Example Request

[
  {
    "policy_ids": "eNo1jk0LgjAAQP_LrgVuq2YFHeyTzRpJTRK82FxppZZLbUT_PTt0f4_33kArWZUqjcEYbG6CoesehRZujHBfK6259ry8mdeB72CyJiLhfmgJPp8Nl9fB4OHFnYXdydiIJgc7tM7s4PZqTBpjYJQlvW0lcwq1PdoGcMH4jkc-ZZfgWJ2iJ52ALrgXt1SaXxwju0-6QFb6WWSqlEWs2qOZ2E2RgyDuk5auVanTIgdj9Df35q5oayMIIfp8AYFTQMU"
  }
]
Action: Get Archive File (Beta)

This action retrieves the archived file or attachment for the given ID.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

File or Attachment ID

Enter the Mimecast ID of the message attachment.

Text

Required

Action: Get Blocked Sender Policies

This action retrieves blocked sender policies.

Note

To use this action, you must have the Gateway | Policies | Read permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Policy IDs

Enter the list of IDs of blocked sender policies. If you do not enter any ID, all blocked sender policies will be returned.

Example:

$LIST["eNo1jk0LgjAAQP_LrgZtU6cGHcwKpmFFKRpdbC618iN1mkT_PTt0f4_33qDhTNQ8i8EM6GbveEQS8gkZ25cJIy1hVlL0yy70TUw2xEtd_zz13KWlr--q-tzH0kqTctugaaCdp4kdOHKHST8MMMpTeSdYQWGjGbsQrmz34EY-tW_hRVyjls7BBFTlI2PDr42RouIJYKJpy5zXrIz5OGR5hwUyEcQKGemO101WFmCG_uZxqDgdbQShAj9fpGo_lQ"]

List

Optional

You can retrieve the policy ID using the action Get Blocked Sender Policies.

Example Request

[
  {
    "policy_id":"eNo1jk0LgjAAQP_LrgZtU6cGHcwKpmFFKRpdbC618iN1mkT_PTt0f4_33qDhTNQ8i8EM6GbveEQS8gkZ25cJIy1hVlL0yy70TUw2xEtd_zz13KWlr--q-tzH0kqTctugaaCdp4kdOHKHST8MMMpTeSdYQWGjGbsQrmz34EY-tW_hRVyjls7BBFTlI2PDr42RouIJYKJpy5zXrIz5OGR5hwUyEcQKGemO101WFmCG_uZxqDgdbQShAj9fpGo_lQ"
  }
]
Action: Get Current Account Details

This action retrieves the details of a configured Mimecast account.

Note

To use this action, you must have the Account | Dashboard | Read permissions.

Action Input Parameters

No input parameters are required for this action.

Action: Get Email Queues

This action retrieves the count of inbound and outbound email queues for the specified times.

Note

To use this action, you must have the Account | Dashboard | Read permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

End

Enter the most recent date for message queues in ISO 8601 format.

Example:

2015-11-16t14:49:18+0000

Text

Required

Start

Enter the earliest date for message queues in ISO 8601 format.

Example:

2015-11-16t14:49:18+0000

Text

Required

Example Request

[
  {
    "end": "2024-12-10T10:10:18+0000",
    "start": "2023-12-10T10:10:18+0000"
  }
]
Action: Get File (Beta)

This action retrieves the file attachment based on the provided id.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

File or Attachment ID

Enter the Mimecast ID of the message attachment.

Text

Required

Action: Get Group Members

This action retrieves group members from groups that exist on a tenant.

Note

To use this action, you must have the Services | Directory Sync | Read permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Group ID

Enter the Mimecast ID of the group.

Text

Required

Example Request

[
  {
    "group_id": "eNoVzrsOgjAUANB_uasklqIgJA74ppIGo6AkLpUWq_JQajHG-O_ifobzASUy3YgLBw-ItJZ3OllFm72zi1osy1Goz9Vr1qaJj-3QjiVNjv2YzqajxW04fGx4b-70SuIG8uAc-2dyWFsttl_vN2KltCKdVQFSjhulaE7olrIkINf0pHP2DMZgQMHZHbycFUoYkGn1rEvRZDUXXWYabyembyI8sDvZikZd6go804C8Lrho_mPTRRbC3x9dtT4N"
  }
]
Action: Get Held Message List

This action retrieves the count of currently held messages for each hold reason.

Action Input Parameters

No input parameters are required for this action.

Action: Get Hold Message List

This action retrieves information about held messages, including the reason, hold level, sender, and recipients.

Note

To use this action, you must have the Account | Dashboard | Read permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Admin

Choose true to return results for all recipients. Id you choose false, it returns results only for the currently authenticated user.

Boolean

Optional

Default value:

false

Field Name

Enter the message fields to filter the response.

Text

Optional

Allowed values:

all, subject, sender, recipient, reasonCode, senderIP

Value

Enter the text to filter the results.

Text

Optional

Start Date

Enter the start time of the earliest message to return in yyyy-mm-dd't'hh:mm:ssz format.

Text

Optional

End Date

Enter the end time of the latest message to return in yyyy-mm-dd't'hh:mm:ssz format.

Text

Optional

Page Size

Enter the number of results to retrieve on each page.

Integer

Optional

Default value:

100

Number of Pages

Enter the number of result pages to retrieve.

Integer

Optional

Example Request

[
  {
    "admin": true
  }
]
Action: Get Managed URLs

This action retrieves all the entries that are currently in an account's managed URL list.

Note

To use this action, you must have the Services | Targeted Threat Protection - URL Protect | Edit permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Domain or Content

Enter the domain or content to search in managed URLs.

Text

Optional

Domain or URL

Enter the domain or URL to filter the results.

Text

Optional

Exact Match

Choose true to retrieve results that exactly match the value provided for the domain or URL parameter. If you choose false, this will return results that include partial matches as well.

Boolean

Optional

Default value:

false

Filter by

Enter the filters for the override type field.

List

Optional

Allowed values:

all, permitted, blocked

Sort by URL

Choose true to sort the response by URL.

Boolean

Optional

Default value:

false

Sort Order

Sort the response in either ascending or descending order. You can use this only when Sort by URL is used.

Text

Optional

Allowed values:

asc, desc

Default value:

asc

Example Request

[
  {
    "domain_or_url": "https://examplemaliciousdomain.com/attack-vector",
    "domain_or_content": "https://examplemaliciousdomain.com/attack-vector"
  }
]
Action: Get Message Details (Beta)

This action retrieves details about a specific message with the provided ID.

Note

To use this action, you must have the Archive | Search Content View permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Message ID

Enter the ID of the message to retrieve details.

Text

Required

You can retrieve the message ID using the action List Messages.

Action: Get Message Info

This action retrieves detailed information about a specific message.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Message ID

Enter the Mimecast ID of the message.

Text

Required

You can retrieve the message ID using the action List Messages.

Example Request

[
  {
    "message_id": "eNpNj91Og0AQhd9lr0tc2kVoEy8KqZZKWyqtBWJCYJkASZdt9gclxncX1Kg3k0nO-WbOeUcSqBbQlGiBknq3c1ebrSMsFaqlP3vYhyzGqooePVmSNAlL_4m93DTJ_bpbR0G_6VMRPydvhyJKJJzSgLsYfE93_GztHY--FrSmq4bO4iPn7CyuQIutDAPa-ndoghhImVcQqVxpeeyvMGTIBa2bDso_-aBBgz_ka_XlMkGKtb871VJxBoLycmS9U-SaSxNPye2AdyBkw1u0MAeoHQ3f0M-Hr8ZVRg3ItCywmREn60riGHb27042HaaJB3lqjT4FghEDY9sgNplbc4LRxye-SWmI"
  }
]
Action: Get Policy with Targets (Beta)

This action retrieves the information about an existing Web Security Block or Allow List policy for domains or URLs.

Note

To use this action, you must have the Web Security | Policies | Read permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

ID

Enter the ID of an existing policy to retrieve the details.

Text

Required

Action: Get Remediation Incident (Beta)

This action retrieves the information of an existing incident.

Note

To use this action, you must have the Services | Threat Remediation | Read permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Remediation Incident IDs

Enter the list of remediation incident IDs.

List

Required

You can retrieve the remediation incident ID using the action Find Remediation Incidents.

Action: Get TTP Attachment Protection Logs

This action returns TTP attachment protection logs from Mimecast.

Note

To use this action, you must have the Monitoring | Attachment Protection | Read permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Result

Enter the result of the scan to filter logs.

Text

Optional

Allowed values:

safe, malicious, timeout, error, unsafe, all

Default value:

all

Oldest First

Choose true to retrieve results with the oldest logs first.

Boolean

Optional

Default value:

false

Route

Enter the value of the route to filter the response.

Text

Optional

Allowed values:

inbound, outbound, internal, all

Default value:

all

Start Date

Enter the start date in yyyy-mm-dd't'hh:mm:ssz format from which you want to retrieve the logs.

Text

Optional

By default, it starts from the beginning of the current day.

End Date

Enter the end date in yyyy-mm-dd't'hh:mm:ssz format up to which you want to retrieve the logs.

Text

Optional

By default, it ends at the time of the request.

Page Size

Enter the number of results to retrieve on each page.

Integer

Optional

Default value:

100

Number of Pages

Enter the number of result pages to retrieve.

Integer

Optional

Example Request

[
  {
    "end": "2024-10-13T17:30:00+0000",
    "start": "2024-10-12T18:30:00+0000",
    "page_size": "10",
    "no_of_pages": "1",
    "oldest_first": true
  }
]
Action: Get TTP Impersonation Protect Logs

This action retrieves messages containing information flagged by an Impersonation Protection configuration.

Note

To use this action, you must have the Monitoring | Impersonation Protection | Read permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Actions

Enter the actions to filter the response.

List

Optional

Allowed values:

hold, bounce, none

Identifiers

Enter the identifiers to filter the response.

List

Optional

Allowed values:

similar_internal_domain, newly_observed_domain, internal_user_name, reply_address_mismatch, targeted_threat_dictionary, custom_external_domain, mimecast_external_domain, advanced_similar_internal_domain, advanced_custom_external_domain, advanced_mimecast_external_domain, custom_name_list

Oldest First

Choose true to retrieve results with the oldest logs first.

Boolean

Optional

Default value:

false

Query

Enter the query to search.

This parameter is required if Search Field parameter is not null.

Text

Optional

Search Field

Enter the field to search for logs.

If a search string is provided, this defaults to all.

Text

Optional

Allowed values:

senderAddress, recipientAddress, subject, definition, all

Tagged Malicious

Choose true to filter for messages that are tagged malicious.

Boolean

Optional

Start Date

Enter the start date in yyyy-mm-dd't'hh:mm:ssz format from which you want to retrieve the logs.

Text

Optional

By default, it starts from the beginning of the current day.

End Date

Enter the end date in yyyy-mm-dd't'hh:mm:ssz format up to which you want to retrieve the logs.

Text

Optional

By default, it ends at the time of the request.

Page Size

Enter the number of results to retrieve on each page.

Integer

Optional

Default value:

100

Number of Pages

Enter the number of result pages to retrieve.

Integer

Optional

Example Request

[
  {
   "actions":"hold"
  }
]
Action: Get TTP URL Logs

This action retrieves TTP URL logs from Mimecast.

Note

To use this action, you must have the Monitoring | URL Protection | Read permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Scan Result

Enter the result of the scan to filter logs.

Text

Optional

Allowed values:

clean, malicious, suspicious, all

Default value:

all

Route

Enter the value of the route to filter the response.

Text

Optional

Allowed values:

inbound, outbound, internal, all

Default value:

all

Oldest First

Choose true to retrieve results with the oldest logs first.

Boolean

Optional

Default value:

false

Start Date

Enter the start date in yyyy-mm-dd't'hh:mm:ssz format from which you want to retrieve the logs.

Text

Optional

By default, it starts from the beginning of the current day.

End Date

Enter the end date in yyyy-mm-dd't'hh:mm:ssz format up to which you want to retrieve the logs.

Text

Optional

By default, it ends at the time of the request.

Page Size

Enter the number of results to retrieve on each page.

Integer

Optional

Default value:

100

Number of Pages

Enter the number of result pages to retrieve.

Integer

Optional

Example Request

[
  {
    "route":"all"
  }
]
Action: List Messages

This action lists archived messages.

Note

To perform this action, your user role must have archive, search, or read permission.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

View

Enter the type of the message list.

Text

Required

Allowed values:

inbox, sent

Start

Enter the earliest date in ISO 8601 format from which to retrieve messages.

Example:

2015-11-16t14:49:18+0000

Text

Optional

By default, this is set to the last calendar month.

Mailbox

Enter the email address to retrieve the message lis.

Text

Optional

By default, messages for the logged-in user are returned.

Include Delegates

Choose true to include messages for addresses to which the mailbox has delegate permissions.

Boolean

Optional

Default value:

false

Include Aliases

Choose true to include messages sent to alias addresses of the mailbox.

Boolean

Optional

Default value:

true

End

Enter the latest date in ISO 8601 format to retrieve messages up to.

Example:

2015-11-16t14:49:18+0000

Text

Optional

By default, this is set to the end of the current day.

Example Request

[
  {
    "view": "INBOX"
  }
]
Action: Nullify Blocked Sender Policy

This action nullifies a blocked sender policy based on the given ID by creating a new policy with the same items, setting the action to no_action, and marking it as an override.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Policy ID

Enter the ID of the policy.

Text

Required

Example Request

[
  {
    "policy_id": "eNo1js0KgkAYAN9lrwZ-q-Zm0MGsaM2WojSFLrauaeVPmopE754dus8w80a14E0l0ghNkcMA9vNTFGtbX7DSW5caNbu8W7SBZyq6o7sJ886yyxbWZHUfj5_7SFoSKbMNmvjkLF9tf6O2it71PYRZou4anlOoibELYGmzAws9at-CSxOHLzpDI1QWj5T3v7aCCSEjxJv6VWSi4kUkhiHLPcyxiUHR9IFuRVWnRY6m-G8e-1LQwcYAGny-230_6w"
  }
]
Action: Permit or Block Sender

This action permits or blocks emails between a provided sender and recipient.

Note

To use this action, you must have the Gateway | Managed Senders | Edit permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Permit Block Information

Enter the information to permit or block the sender or recipient.

List

Required

Allowed keys:

sender, to, action

Example Request

[
  {
    "permit_block_information": [
      {
        "action": "permit",
        "to": "john.doe@organame.com",
        "sender": "jane.doe@orgname.com"
      }
    ]
  }
]
Action: Reject Held Message

This action rejects a currently held message.

Note

To use this action, you must have the Account | Monitoring | Held | Edit permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

IDs

Enter one or more ,imecast secure IDs of the messages to be rejected.

List

Required

You can retrieve the ID using the action List Messages.

Message

Enter the rejection message to be returned to the sender.

Text

Optional

Notify

Choose true to notify the sender about the rejection.

Boolean

Optional

Default value:

false

Reason Type

Enter the code of reason for rejecting the message.

Text

Optional

Allowed values:

MESSAGE CONTAINS UNDESIRABLE CONTENT, MESSAGE CONTAINS CONFIDENTIAL INFORMATION, REVIEWER DISAPPROVES OF CONTENT, INAPPROPRIATE COMMUNICATION, MESSAGE GOES AGAINST EMAIL POLICIES

Example Request

[
  {
    "ids": [
      "eNpNzlsLgjAABeD_stcCl7qZQg-RBrNYVigKQnhZ2WUrL1Mk-u-tt56_czjnDVpWyIZdS-CAAgbjYde9XMK9l6HPbqEp470Y3D6Jljre4rCiUaqF1F3N13eE6n058awJ921SxVaqXfx4Y_Q6HsYRZrwyAlkIAlvLDhLo-fRIs4j4tySX56wjCzAF1aOsf8vI1NEcYXsKOi5-T2Sbd6zhpsr0rGmvTwGcmVJRMqUQYgW1ZJKd_uufL2McP4o"
    ]
  }
]
Action: Release Held Message

This action releases a currently held message. You can release a maximum of 25 held messages simultaneously.

Note

To use this action, you must have the Account | Monitoring | Held | Edit permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

ID

Enter one or more IDs of the messages to release.

Key Value

Required

You can retrieve the ID using the action List Messages.

Example Request

[
  {
    "id": "eNpNzlsLgjAABeD_stcCl7qZQg-RBrNYVigKQnhZ2WUrL1Mk-u-tt56_czjnDVpWyIZdS-CAAgbjYde9XMK9l6HPbqEp470Y3D6Jljre4rCiUaqF1F3N13eE6n058awJ921SxVaqXfx4Y_Q6HsYRZrwyAlkIAlvLDhLo-fRIs4j4tySX56wjCzAF1aOsf8vI1NEcYXsKOi5-T2Sbd6zhpsr0rGmvTwGcmVJRMqUQYgW1ZJKd_uufL2McP4o"
  }
]
Action: Remove Group Member

This action removes members from Mimecast profile groups.

Note

To use this action, you must have the Services | Directory Sync | Edit permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Member Information

Enter the information of the members to be removed as a list.

List

Required

Allowed fields:

id, domain, emailAddress.

Note

You must specify the group ID and include either the domain or email address.

Example Request

[
  {
    "member_information": [
      {
        "emailAddress": "john.doe@orgname.com",
        "id": "eNoVzrsOgjAUANB_uasklqIgJA74ppIGo6AkLpUWq_JQajHG-O_ifobzASUy3YgLBw-ItJZ3OllFm72zi1osy1Goz9Vr1qaJj-3QjiVNjv2YzqajxW04fGx4b-70SuIG8uAc-2dyWFsttl_vN2KltCKdVQFSjhulaE7olrIkINf0pHP2DMZgQMHZHbycFUoYkGn1rEvRZDUXXWYabyembyI8sDvZikZd6go804C8Lrho_mPTRRbC3x9dtT4N"
      }
    ]
  }
]
Action: Search File Hash

This action searches for the given file hashes within messages.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Hashes

Enter the list of file hashes to determine if they have been seen within an account.

List

Required

Example Request

[
  {
    "hashes": [
      "9566f8d8c7842c14f2d60a035790f7dd85511d8a60e5ebb587573ea28a8e4ddb"
    ]
  }
]
Action: Search Groups

This action searches for groups in Mimecast.

Note

To use this action, you must have the Directories | Groups | Edit permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Query

Enter the query string to search for groups.

Text

Optional

Source

Enter the group source to filter the search.

Text

Optional

Allowed values:

cloud, ldap

Example Request

[
  {
    "source": "cloud"
  }
]
Action: Update Address Alteration Policy

This action updates an existing address alteration policy.

Note

To use this action, you must have the Gateway | Policies | Edit permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

ID

Enter the Mimecast secure ID of the address alteration policy to be modified.

Text

Required

You can retrieve the ID using the action Get Address Alteration Policy.

Policy

Enter the policy conditions that determine when to apply the alteration set.

Key Value

Required

Allowed keys:

bidirectional, comment, conditions, description, enabled, enforced, from, fromDate, fromEternal, fromPart, override, to, toDate, toEternal

Address Alteration Set ID

Enter the Mimecast secure ID of the address alteration set (folder) to apply this policy.

Text

Optional

You can retrieve the address alteration set ID using the action Get Address Alteration Set.

Example Request

[
  {
    "id": "eNo1jk0LgjAAQP_LrgZumq6CDqYGMxGjFI0uNldq-ZG6mUT_PTt0f4_33qBjlLcsT8EKCOGrXH2dhsK0encTtUeL2vtqsEQcGoru6kHmhWc58Cxzsb1r2nOfSjaWSmdJsgif5ZsT7VSh6MM4wqTMVJ_TisAOL_0Y2o538JKQOEV84dekJ2swA039yOn4aysIYzQDlHd9XbKW1imbhszgsEEGgspcn2jB2i6vK7BCf_M4NoxM9kRA-PkCaGtApA",
    "policy": {
      "comment": "This is a sample comment."
    }
  }
]
Action: Update Anti-Spoofing Policy

This action updates an existing Anti-Spoofing SPF-based Bypass policy.

Note

To use this action, you must have the Gateway | Policies | Edit permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

ID

Enter the ID of an existing policy.

Text

Required

You can retrieve the ID using the action Get Anti-Spoofing Policy.

Option

Enter the action to be performed on the policy.

Text

Required

Allowed values:

disable_bypass, enable_bypass

Policy

Enter the policy scoping details to update.

Key Value

Required

Allowed keys:

bidirectional, comment, conditions, description, enabled, enforced, from, fromDate, fromEternal, fromPart, override, to, toDate, toEternal

Example Request

[
  {
    "id": "eNo1jk0LgjAAQP_LrgVuM10GHSoNZjEUUxK82Fxp5UfzixH99-zQ_T3ee4NW8F6KIgMrYJ08wzk8ZXwbmOIL5uu2LMZqtIc42mDzaIY5ixItZPZuuX8YxsvPZg6Zla5F8zNJtJt7PugDNkelYFrmutfzisKWWF4MHZcFLI2oe48v_TXt6BrMQVM_C65-bYwIwXPA-7arSyF5nYlpaBcGW7RBEC_MiR6EbIu6Aiv0N0-qEXSyEYQQfb4_I0By",
    "option": "enable_bypass",
    "policy": {
      "comment": "This is a sample comment."
    }
  }
]
Action: Update Group

This action updates the description of Mimecast profile groups. You can update a maximum of 10 groups simultaneously.

Note

To use this action, you must have the Services | Directory Sync | Edit permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Data

Enter the data to update the group.

Example:

$JSON[[{"id" : "test"}]]

List

Required

Allowed keys:

description, id (mandatory), parentId

Example Request

[
  {
    "groups_information": [
      {
        "id": "eNoVzskKgkAYAOB3-a8JrrlBB9OCGUVaUBS6TM6Y5TLlqBXRu2f37_B9QLBi7NmVgguojcpXVxv8kIWHAK-Jbwf1vnsGU556mhmZSRWnJzmJA9_e1svlY08XG2vRYgdVmXWSLzgL9Ukzn--3QtpK341FhxRhObtc2eD4GJMU4Vt-HksyoBVI0FByB7ckjWASFKMYeMv6glM2Z_zkuFY9VdEMc5YT68WVd-CqEpS8oaz_jzXVdiz9-wOBuj5H",
        "parentId": "eNoVzssKgkAUANB_uduExncKLayMtBosURTcTM6YlY7p-CCif6_2Z3HeIFg-dOxGwQbMtuM5VY-IO3I7WdquCsyLw6fNmMaOYhyMqMRxNo_wZr3YPnS9PdGZa85q3_LKxMzmVz_Zq6NiTK8XInWpBkPOPSRMK0iR6-MQk9jz7-llKEjvLUGCipIn2AWpBJMgH0Tf1KzLG8p-mXUUrmRHRopm_OTIOnFrONiyBEVTUdb9x-jzBQBrPMc",
        "description": "This is a sample description."
      }
    ]
  }
]
Action: Update Policy with Targets (Beta)

This action updates an existing web security block or allow list policy for domains or urls.

Note

To use this action, you must have the Web Security | Policies | Edit permissions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

ID

Enter the ID of the policy to update.

Text

Required

Policies

Enter at least one policy scoping detail to update.

Key Value

Required

Allowed keys:

bidirectional, comment, conditions, description, enabled, enforced, from, fromDate, fromEternal, fromPart, override, to, toDate, toEternal

URLs

Enter the URLs along with the corresponding actions for each URL.

Key Value

Optional

Allowed keys:

action (mandatory), id, type (mandatory), value (mandatory)

Description

Enter the description of the policies for future reference.

Text

Optional

Action: Generic Action

This is a generic action used to make requests to any Mimecast endpoint.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Method

Enter the HTTP method to make the request.

Text

Required

Allowed values:

GET, PUT, POST, DELETE

Endpoint

Enter the endpoint to make the request to.

Example:

api/directory/execute-sync

Text

Required

Query Params

Enter the query parameters to pass to the API.

Key Value

Optional

Payload

Enter the payload to pass to the API.

Any

Optional

Extra Fields

Enter the extra fields to pass to the API.

Key Value

Optional

Allowed keys:

payload_json, download, files, filename, retry_wait, retry_count, custom_output, response_type

Example Request

[
  {
    "method": "POST",
    "endpoint": "api/policy/blockedsenders/get-policy",
    "extra_fields": {},
    "query_params": {}
  }
]