Mimecast 2.0.0
App Vendor: Mimecast
App Category: Email Gateway
Connector Version: 2.0.0
API Version: V2
About App
Mimecast is a cloud-based email management tool with security, archiving, and continuity features.
The Mimecast app is configured with Cyware Orchestrate to perform the following actions:
Action Name | Description |
---|---|
Add Group Member | This action adds user email addresses or domains to a profile group. |
Create Address Alteration Definition (Beta) | This action creates an address alteration definition within an address alteration set or at the root level. |
Create Address Alteration Policy | This action creates a new address alteration policy that applies an alteration definition based on sender and recipient values. |
Create Address Alteration Set | This action creates a new address alteration set. |
Create Anti-Spoofing Policy | This action creates an anti-spoofing spf-based bypass policy. you can create a maximum of 50 policies simultaneously. |
Create Blocked Sender Policy | This action creates new policies for blocked senders, enabling management of sender and recipient restrictions. |
Create Group | This action creates new profile groups at the root level or as child groups. groups can be used to apply permissions and policies. |
Create Managed URL | This action adds new URL entries in managed URLs for URL protection. |
Create Policy with Targets (Beta) | This action creates a Web Security Block or Allow List policy for domains or URLs. |
Create Remediation Incident (Beta) | This action creates a new remediation incident by messageid, file hash, or a URL contained in an email. |
Decode URL | This action decodes a list of Mimecast-encoded URLs. |
Delete Address Alteration Definition | This action removes an existing address alteration definition within an address alteration set. |
Delete Address Alteration Policy | This action removes an existing address alteration policy. |
Delete Anti-Spoofing Policy | This action deletes an existing Anti-Spoofing SPF-based Bypass policy. |
Delete Policy with Targets (Beta) | This action deletes an existing Web Security Block or Allow List policy for domains or URLs. |
Find Remediation Incidents | This action searches for existing remediation incidents. |
Get Address Alteration Definition | This action retrieves an existing address alteration definition. to make a successful request, you must include at least one action parameter. |
Get Address Alteration Policy | This action retrieves the details of an existing address alteration policy. |
Get Address Alteration Set | This action retrieves an existing address alteration set. |
Get Anti-Spoofing Policy | This action retrieves the details of existing Anti-Spoofing SPF-based Bypass policies. |
Get Archive File (Beta) | This action retrieves the archived file or attachment for the given ID. |
Get Blocked Sender Policies | This action retrieves blocked sender policies. |
Get Current Account Details | This action retrieves the details of a configured Mimecast account. |
Get Email Queues | This action retrieves the count of inbound and outbound email queues for the specified times. |
Get File (Beta) | This action retrieves the file attachment based on the provided ID. |
Get Group Members | This action retrieves group members from groups that exist on a tenant. |
Get Held Message List | This action retrieves the count of currently held messages for each hold reason. |
Get Hold Message List | This action retrieves information about held messages, including the reason, hold level, sender, and recipients. |
Get Managed URLs | This action retrieves all the entries that are currently in an account's Managed URL list. |
Get Message Details (Beta) | This action retrieves details about a specific message with the provided ID. |
Get Message Info | This action retrieves detailed information about a specific message. |
Get Policy with Targets (Beta) | This action retrieves the information about an existing Web Security Block or Allow List policy for domains or URLs. |
Get Remediation Incident (Beta) | This action retrieves the information of an existing incident. |
Get TTP Attachment Protection Logs | This action returns TTP attachment protection logs from Mimecast. |
Get TTP Impersonation Protect Logs | This action retrieves messages containing information flagged by an impersonation protection configuration. |
Get TTP URL Logs | This action retrieves TTP URL logs from Mimecast. |
List Messages | This action lists archived messages. To perform this action, your user role must have archive, search, or read permission. |
Nullify Blocked Sender Policy | This action nullifies a blocked sender policy based on the given ID by creating a new policy with the same items, setting the action to no_action, and marking it as an override. |
Permit or Block Sender | This action permits or blocks emails between a provided sender and recipient. |
Reject Held Message | This action rejects a currently held message. |
Release Held Message | This action releases a currently held message. |
Remove Group Member | This action removes members from mimecast profile groups. |
Search | This action searches the Mimecast email environment for messages that match the provided criteria. you must provide either advanced track and trace options or a message ID. |
Search File Hash | This action searches for the given file hashes within messages. |
Search Groups | This action searches for groups in mimecast. |
Update Address Alteration Policy | This action updates an existing address alteration policy. |
Update Anti-Spoofing Policy | This action updates an existing Anti-Spoofing SPF-based Bypass policy. |
Update Group | This action updates the description of mimecast profile groups. You can update a maximum of 10 groups simultaneously. |
Update Policy with Targets (Beta) | This action updates an existing Web Security Block or Allow List policy for domains or URLs. |
Generic Action | This is a generic action used to make requests to any Mimecast endpoint. |
Configuration Parameters
The following configuration parameters are required for the Mimecast app to communicate with the Mimecast enterprise application. The parameters can be configured by creating instances in the app.
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Base URL | Enter the base URL to access Mimecast API. | Text | Required | For more information on supported base URLs, see Mimecast API Documentation. |
Client ID | Enter the client ID to authenticate with Mimecast API. | Text | Required | |
Client Secret | Enter the client secret to authenticate with Mimecast API. | Password | Required | |
Timeout | Enter the timeout value in seconds. This is the number of seconds that requests will wait to establish a connection with Mimecast. | Integer | Optional | Allowed range: 15-120 Default value: 15 |
Verify | Choose your preference to verify SSL or TLS while making requests. It is recommended to set this option to yes. Passing no may result in incorrectly establishing the connection. | Boolean | Optional | By default, verification is disabled. |
Action: Add Group Member
This action adds user email addresses or domains to a profile group.
Note
To use this action, you must have Directories | Groups | Edit permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Member Information | Enter the information of members to be added as a list. | List | Required | Allowed fields: id, domain, emailAddress, notes NoteYou must specify the group ID and include either the domain or email address. |
Example Request
[ { "member_information": [ { "emailAddress": "john.doe@orgname.com", "id": "eNoVzrsOgjAUANB_uasklqIgJA74ppIGo6AkLpUWq_JQajHG-O_ifobzASUy3YgLBw-ItJZ3OllFm72zi1osy1Goz9Vr1qaJj-3QjiVNjv2YzqajxW04fGx4b-70SuIG8uAc-2dyWFsttl_vN2KltCKdVQFSjhulaE7olrIkINf0pHP2DMZgQMHZHbycFUoYkGn1rEvRZDUXXWYabyembyI8sDvZikZd6go804C8Lrho_mPTRRbC3x9dtT4N" } ] } ]
Action: Create Address Alteration Definition (Beta)
This action creates an address alteration definition within an address alteration set or at the root level.
Note
To use this action, you must have Gateway | Policies | Edit.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Address Type | Enter the type of the address to be altered. | Text | Required | Allowed values: all, envelope_from, envelope_to, from, reply_to, to_cc_bcc, sender |
New Address | Enter the new address structure. All domains must be internal. | Text | Required | Allowed formats: localpart@domainpart, @domainpart, localpart@ |
Original Address | Enter the original address being considered to rewrite. All domains must be internal. | Text | Required | Allowed formats: localpart@domainpart, @domainpart, localpart@ |
Routing | Enter the address alteration definition route. | Text | Required | Allowed values: all, inbound, outbound |
Folder ID | Enter the mimecast secure ID of an address alteration set. If you do not enter the ID, the definition will be created at the root level and will apply to messages without an associated policy. | Text | Optional | You can retrieve the Folder ID using the action Get Address Alteration Set. |
Action: Create Address Alteration Policy
This action creates a new address alteration policy that applies an alteration definition based on sender and recipient values. You can create a maximum of 50 policies simultaneously.
Note
To use this action, you must have Gateway | Policies | Edit permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Data | Enter the data to create an address alteration policy. Example: $JSON[[{"addressAlterationSetId" : "test", "policy" : {"comment":"test", "description" :"test", "to":{"type":"everyone"}, "from":{"type":"everyone"}}}]]. | List | Required | Allowed keys: addressAlterationSetId, policy Allowed keys for policy: bidirectional, comment, conditions, description, enabled, enforced, from, fromDate, fromEternal, fromPart, override, to, toDate, toEternal |
Example Request
[ { "policy_information": [ { "addressAlterationSetId": "eNoVzskKgkAYAOB3-a8JLlNu0MG0Qi0xwkHDy-SMS7mUk0pE757dv8P3Ac6yoWcVBRMm4t_1I_btG0I4bI97RIrLqZ2cMcGWoh7UqAxwKkaBY-u7-2r1PNHFVls0nuGWsZaKhRf7aFTU6f2WSFOicMhaV-KaESbS1gvOAcGud0uuQ05e7hoEqCl5gJmTmjMBsoG_uob1WUfZnLGj80a2ZElZqrMcWc-rrgVTFiDvasr6_1iRdR0Z3x9XqT4O", "policy": { "comment": "This is a sample comment.", "description": "This is a sample description.", "to": { "type": "everyone" }, "from": { "type": "everyone" } } } ] } ]
Action: Create Address Alteration Set
This action creates a new address alteration set.
Note
To use this action, you must have Gateway | Policies | Edit permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Description | Enter the name of the Address Alteration Set (folder) to be created. | Text | Required | |
Parent ID | Enter the Mimecast secure ID of an existing alteration set to create the new set within it. If you do not enter the parent ID, the new set will be created at the root level. | Text | Optional | You can retrieve the Parent ID using the action Get Address Alteration Set. |
Example Request
[ { "description": "Sample description" } ]
Action: Create Anti-Spoofing Policy
This action creates an Anti-Spoofing SPF-based Bypass policy. You can create a maximum of 50 policies simultaneously.
Note
To use this action, you must have Gateway | Policies | Edit permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Data | Enter the anti-spoofing policy data to create the policy. Example: $JSON[[{"option": "disable_bypass", "policy": {"comment":"test", "description":"test", "to":{"type":"everyone"},"from":{"type":"everyone"}, "conditions": { "spfdomains": ["test.com"]}}}]] | List | Required | Allowed keys: option, policy Allowed keys for policy: bidirectional, comment, conditions, description, enabled, enforced, from, fromDate, fromEternal, fromPart, override, to, toDate, toEternal |
Example Request
[ { "policy_information": [ { "option": "disable_bypass", "policy": { "comment": "This is a sample test.", "description": "This is a sample description.", "to": { "type": "everyone" }, "from": { "type": "everyone" }, "conditions": { "spfDomains": [ "test.com" ] } } } ] } ]
Action: Create Blocked Sender Policy
This action creates new policies for blocked senders, enabling the management of sender and recipient restrictions.
Note
To use this action, you must have Gateway | Policies | Edit permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Policy Action | Enter the policy action. | Text | Required | Allowed values: no_action, block_sender |
Policy Information | Enter the policy information. | Key Value | Required | Allowed keys: bidirectional, comment, conditions, description, enabled, enforced, from, fromDate, fromEternal, fromPart, override, to, toDate, toEternal |
Example Request
[ { "policy_action": "no_action", "policy_information": { "to": { "type": "individual_email_address", "emailAddress": "john.doe@orgname.com" }, "from": { "type": "individual_email_address", "emailAddress": "jane.doe@orgname.com" }, "override": "True", "description": "This is a sample description." } } ]
Action: Create Group
This action creates new profile groups at the root level or as child groups. You can use groups to apply permissions and policies.
Note
To use this action, you must have Directories | Groups | Edit permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Group Information | Enter the information of the new group as a list. | List | Required | Allowed fields: description (mandatory), parentId |
Example Request
[ { "groups_information": [ { "description": "This is a sample description." } ] } ]
Action: Create Managed URL
This action adds new URL entries in managed URLs for URL protection.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
URL Information | Enter the information of the URL to be added as a $JSON[[{action}]]. | List | Required | Allowed fields for each URL object: action (mandatory): Allowed values are permit or block, disableLogClick, comment, disableRewrite, disableUserAwareness, matchType, url |
Example Request
[ { "url_information": [ { "url": "https://www.example.com", "action": "permit" } ] } ]
Action: Create Policy with Targets (Beta)
This action creates a Web Security Block or Allow List policy for domains or URLs.
Note
To use this action, you must have the Web Security | Policies | Edit permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Description | Enter a description of the policy. | Text | Required | |
Policies | Enter the policy scoping details to create the policy. | Key Value | Required | Allowed keys: bidirectional, comment, conditions, description, enabled, enforced, from, to, fromDate, fromEternal, fromPart, override, toDate, toEternal |
URLs | Enter the URLs along with the corresponding actions for each URL to be applied by this policy. | Key Value | Required | Allowed keys: action (mandatory), id, type (mandatory), value (mandatory) |
Action: Create Remediation Incident (Beta)
This action creates a new remediation incident by messageid, file hash, or a url contained in an email.
Note
To use this action, you must have the Services | Threat Remediation | Edit permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Reason | Specify the reason for creating the remediation incident. | Text | Required | |
Hash or Message ID | Enter the file hash value or the message ID based on the value specified in the search by field. You can leave this empty if you are searching by URL. | Text | Optional | |
Search by | Enter the message component to search by. | Text | Optional | Allowed values: hash, messageId, url |
Start Date | Enter the start date (in yyyy-mm-dd't'hh:mm:ssz format) of the earliest messages to remediate. | Text | Optional | By default, it starts from the last calendar month. |
End Date | Enter the end date (in yyyy-mm-dd't'hh:mm:ssz format) of the most recent messages to remediate. | Text | Optional | By default, it ends at the time of the request. |
URL Value | Enter the URL present in the email that requires remediation. This field is mandatory when Search by is set to 'url'. Ensure the URL is decoded and is not the Mimecast-rewritten version. | Text | Optional |
Action: Decode URL
This action decodes a list of Mimecast-encoded URLs.
Note
To use this action, you must have the Account | Dashboard | Read permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Encoded URLs | Enter the list of Mimecast encoded URLs. You can enter a maximum of 25 URLs. Example: [{"url": "https://protect-xx.mimecast.com/"}] | List | Required |
Example Request
[ { "encoded_urls": [ { "url": "https://protect-xx.mimecast.com/" } ] } ]
Action: Delete Address Alteration Definition
This action removes an existing address alteration definition within an address alteration set.
Note
To use this action, you must have Gateway | Policies | Edit permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
ID | Enter the Mimecast secure ID of the address alteration definition to delete. | Text | Required | You can retrieve the ID using the action Get Address Alteration Definition. |
Example Request
[ { "id": "eNoVzs0KgkAUQOF3mbWQmkkELWowtAwtMx1p5Z1bDaVTM2p_9O7Z_oNzPkQjtAoFJxNyHO5Exlp2fUdR7WX3S-rl3DebU7KimjsFi3mwrQ4DwRZ-5yfha_kqVL5nz02ZMI1pEcq5iQFtO5mNojGFRwln8AQM852UVaZuCOVaxyHUwZQYRDRY_cOWadmuQaDVjaxQgeTY39A0mVszy7Qdt7cdKi1k3ePvD-qWPBc" } ]
Action: Delete Address Alteration Policy
This action removes an existing address alteration policy.
Note
To use this action, you must have Gateway | Policies | Edit permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Policy ID | Enter one or more Mimecast secure IDs of the policies to delete. You can delete a maximum of 500 policies simultaneously. Example: {"id":"eNo1jk0LgjAAQP_LrgZumq6CDqYGMxGjFI0uNldq-ZG6mUT_PTt0f4_33qBjlLcsT8EKCOGrXH2dhsK0encTtUeL2vtqsEQcGoru6kHmhWc58Cxzsb1r2nOfSjaWSmdJsgif5ZsT7VSh6MM4wqTMVJ_TisAOL_0Y2o538JKQOEV84dekJ2swA039yOn4aysIYzQDlHd9XbKW1imbhszgsEEGgspcn2jB2i6vK7BCf_M4NoxM9kRA-PkCaGtApA"} | Key Value | Required | You can retrieve the Policy ID using the action Get Address Alteration Policy. |
Example Request
[ { "policy_id": { "id": "eNo1jk0LgjAAQP_LrgZumq6CDqYGMxGjFI0uNldq-ZG6mUT_PTt0f4_33qBjlLcsT8EKCOGrXH2dhsK0encTtUeL2vtqsEQcGoru6kHmhWc58Cxzsb1r2nOfSjaWSmdJsgif5ZsT7VSh6MM4wqTMVJ_TisAOL_0Y2o538JKQOEV84dekJ2swA039yOn4aysIYzQDlHd9XbKW1imbhszgsEEGgspcn2jB2i6vK7BCf_M4NoxM9kRA-PkCaGtApA" } } ]
Action: Delete Anti-Spoofing Policy
This action deletes an existing Anti-Spoofing SPF-based Bypass policy.
Note
To use this action, you must have Gateway | Policies | Edit permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Policy ID | Enter one or more policy IDs to delete. You can delete a maximum of 500 anti-spoofing policies simultaneously. | Key Value | Required | You can retrieve the Policy ID using the action Get Anti-Spoofing Policy. |
Example Request
[ { "policy_id": { "id": "eNo1jk0LgjAAQP_LrgVuM10GHSoNZjEUUxK82Fxp5UfzixH99-zQ_T3ee4NW8F6KIgMrYJ08wzk8ZXwbmOIL5uu2LMZqtIc42mDzaIY5ixItZPZuuX8YxsvPZg6Zla5F8zNJtJt7PugDNkelYFrmutfzisKWWF4MHZcFLI2oe48v_TXt6BrMQVM_C65-bYwIwXPA-7arSyF5nYlpaBcGW7RBEC_MiR6EbIu6Aiv0N0-qEXSyEYQQfb4_I0By" } } ]
Action: Delete Policy with Targets (Beta)
This action deletes an existing Web Security Block or Allow List policy for domains or URLs.
Note
To use this action, you must have the Web Security | Policies | Edit permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
ID | Enter the ID of an existing policy to delete. You can delete a maximum of 10 policies simultaneously. | Key Value | Required | You can retrieve the ID using the action Get Policy with Targets. |
Action: Find Remediation Incidents
This action searches for existing remediation incidents.
Note
To use this action, you must have the Services | Threat Remediation | Read permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Filter by | Enter the value to filter the response based on the incident type. | Key Value | Optional | Allowed keys: fieldName, value |
Search by | Enter the value to search the results. | Key Value | Optional | Allowed keys: fieldName, value |
Start Date | Enter the start date of the earliest incident to return in yyyy-mm-dd't'hh:mm:ssz format. | Text | Optional | |
End Date | Enter the end date of the latest incident to return in yyyy-mm-dd't'hh:mm:ssz format. | Text | Optional |
Action: Get Address Alteration Definition
This action retrieves an existing address alteration definition. To make a successful request, you must include at least one action parameter.
Note
To use this action, you must have the Gateway | Policies | Read permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Folder ID | Enter the folder ID that contains the address alteration definitions. | Text | Optional | You can retrieve the Folder ID using the action Get Address Alteration Set. |
New Address | Enter the new address structure. All domains must be internal. Example: sample1@sample.com | Text | Optional | Allowed formats: localpart@domainpart, @domainpart, localpart@ |
Original Address | Enter the original address to be rewritten. All domains must be internal. Example: sample@sample.com | Text | Optional | Allowed formats: localpart@domainpart, @domainpart, localpart@ |
Routing | Enter the address alteration definition route. | Text | Optional | Allowed values: all, inbound, outbound |
Example Request
[ { "routing": "all" } ]
Action: Get Address Alteration Policy
This action retrieves the details of an existing address alteration policy. You can retrieve details for a maximum of 500 policies simultaneously.
Note
To use this action, you must have the Gateway | Policies | Read permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Policy ID | Enter the policy ID to retrieve its details. If you do not enter an ID, this action retrieves the details of all policies. | Key Value | Optional | You can retrieve the Policy ID using the action Get Address Alteration Policy. |
Example Request
[ { "policy_id": "eNo1jk0LgjAAQP_LrgVts2YGHTQNZiXGUjS62Fxp-ZU6w6L_nh26v8d7b9AILmuRxmABFDOMjuadua_A0tmO5m6GDb14ml3o65hsiZc4_mniOeZqvr7PZo99PLLUUW5rNAnU0-RqBxulw-TZ9zDKE8WVvKCwUTU3hJbtMCfyqX0Lz_IStXQJxqAqs5T3vzZGBOEx4LJpy1zUvIzFMLTymIF0BPGUDHQn6iYtC7BAf_PQV4IO9kBA-PkC50A_7A" } ]
Action: Get Address Alteration Set
This action retrieves an existing address alteration set.
Note
To use this action, you must have the Gateway | Policies | Read permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Folder ID | Enter the mimecast secure ID of the alteration set (folder). If you do not enter an ID, this action retrieves all sets. | Text | Optional | You can retrieve the folder ID using the action Get Address Alteration Set. |
Depth | Enter the depth for recursing the address alteration set. | Integer | Optional | Default value: 1 |
Example Request
[ { "depth": 0 } ]
Action: Get Anti-Spoofing Policy
This action retrieves the details of existing Anti-Spoofing SPF-based Bypass policies.
Note
To use this action, you must have the Gateway | Policies | Read permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Policy IDs | Enter the ID of the policy to retrieve the details. If you do not enter the ID, this action retrieves details of all the policies. | Key Value | Optional | You can retrieve the policy ID using the action Get Anti-Spoofing Policy. |
Example Request
[ { "policy_ids": "eNo1jk0LgjAAQP_LrgVuq2YFHeyTzRpJTRK82FxppZZLbUT_PTt0f4_33kArWZUqjcEYbG6CoesehRZujHBfK6259ry8mdeB72CyJiLhfmgJPp8Nl9fB4OHFnYXdydiIJgc7tM7s4PZqTBpjYJQlvW0lcwq1PdoGcMH4jkc-ZZfgWJ2iJ52ALrgXt1SaXxwju0-6QFb6WWSqlEWs2qOZ2E2RgyDuk5auVanTIgdj9Df35q5oayMIIfp8AYFTQMU" } ]
Action: Get Archive File (Beta)
This action retrieves the archived file or attachment for the given ID.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
File or Attachment ID | Enter the Mimecast ID of the message attachment. | Text | Required |
Action: Get Blocked Sender Policies
This action retrieves blocked sender policies.
Note
To use this action, you must have the Gateway | Policies | Read permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Policy IDs | Enter the list of IDs of blocked sender policies. If you do not enter any ID, all blocked sender policies will be returned. Example: $LIST["eNo1jk0LgjAAQP_LrgZtU6cGHcwKpmFFKRpdbC618iN1mkT_PTt0f4_33qDhTNQ8i8EM6GbveEQS8gkZ25cJIy1hVlL0yy70TUw2xEtd_zz13KWlr--q-tzH0kqTctugaaCdp4kdOHKHST8MMMpTeSdYQWGjGbsQrmz34EY-tW_hRVyjls7BBFTlI2PDr42RouIJYKJpy5zXrIz5OGR5hwUyEcQKGemO101WFmCG_uZxqDgdbQShAj9fpGo_lQ"] | List | Optional | You can retrieve the policy ID using the action Get Blocked Sender Policies. |
Example Request
[ { "policy_id":"eNo1jk0LgjAAQP_LrgZtU6cGHcwKpmFFKRpdbC618iN1mkT_PTt0f4_33qDhTNQ8i8EM6GbveEQS8gkZ25cJIy1hVlL0yy70TUw2xEtd_zz13KWlr--q-tzH0kqTctugaaCdp4kdOHKHST8MMMpTeSdYQWGjGbsQrmz34EY-tW_hRVyjls7BBFTlI2PDr42RouIJYKJpy5zXrIz5OGR5hwUyEcQKGemO101WFmCG_uZxqDgdbQShAj9fpGo_lQ" } ]
Action: Get Current Account Details
This action retrieves the details of a configured Mimecast account.
Note
To use this action, you must have the Account | Dashboard | Read permissions.
Action Input Parameters
No input parameters are required for this action.
Action: Get Email Queues
This action retrieves the count of inbound and outbound email queues for the specified times.
Note
To use this action, you must have the Account | Dashboard | Read permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
End | Enter the most recent date for message queues in ISO 8601 format. Example: 2015-11-16t14:49:18+0000 | Text | Required | |
Start | Enter the earliest date for message queues in ISO 8601 format. Example: 2015-11-16t14:49:18+0000 | Text | Required |
Example Request
[ { "end": "2024-12-10T10:10:18+0000", "start": "2023-12-10T10:10:18+0000" } ]
Action: Get File (Beta)
This action retrieves the file attachment based on the provided id.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
File or Attachment ID | Enter the Mimecast ID of the message attachment. | Text | Required |
Action: Get Group Members
This action retrieves group members from groups that exist on a tenant.
Note
To use this action, you must have the Services | Directory Sync | Read permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Group ID | Enter the Mimecast ID of the group. | Text | Required |
Example Request
[ { "group_id": "eNoVzrsOgjAUANB_uasklqIgJA74ppIGo6AkLpUWq_JQajHG-O_ifobzASUy3YgLBw-ItJZ3OllFm72zi1osy1Goz9Vr1qaJj-3QjiVNjv2YzqajxW04fGx4b-70SuIG8uAc-2dyWFsttl_vN2KltCKdVQFSjhulaE7olrIkINf0pHP2DMZgQMHZHbycFUoYkGn1rEvRZDUXXWYabyembyI8sDvZikZd6go804C8Lrho_mPTRRbC3x9dtT4N" } ]
Action: Get Held Message List
This action retrieves the count of currently held messages for each hold reason.
Action Input Parameters
No input parameters are required for this action.
Action: Get Hold Message List
This action retrieves information about held messages, including the reason, hold level, sender, and recipients.
Note
To use this action, you must have the Account | Dashboard | Read permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Admin | Choose true to return results for all recipients. Id you choose false, it returns results only for the currently authenticated user. | Boolean | Optional | Default value: false |
Field Name | Enter the message fields to filter the response. | Text | Optional | Allowed values: all, subject, sender, recipient, reasonCode, senderIP |
Value | Enter the text to filter the results. | Text | Optional | |
Start Date | Enter the start time of the earliest message to return in yyyy-mm-dd't'hh:mm:ssz format. | Text | Optional | |
End Date | Enter the end time of the latest message to return in yyyy-mm-dd't'hh:mm:ssz format. | Text | Optional | |
Page Size | Enter the number of results to retrieve on each page. | Integer | Optional | Default value: 100 |
Number of Pages | Enter the number of result pages to retrieve. | Integer | Optional |
Example Request
[ { "admin": true } ]
Action: Get Managed URLs
This action retrieves all the entries that are currently in an account's managed URL list.
Note
To use this action, you must have the Services | Targeted Threat Protection - URL Protect | Edit permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Domain or Content | Enter the domain or content to search in managed URLs. | Text | Optional | |
Domain or URL | Enter the domain or URL to filter the results. | Text | Optional | |
Exact Match | Choose true to retrieve results that exactly match the value provided for the domain or URL parameter. If you choose false, this will return results that include partial matches as well. | Boolean | Optional | Default value: false |
Filter by | Enter the filters for the override type field. | List | Optional | Allowed values: all, permitted, blocked |
Sort by URL | Choose true to sort the response by URL. | Boolean | Optional | Default value: false |
Sort Order | Sort the response in either ascending or descending order. You can use this only when Sort by URL is used. | Text | Optional | Allowed values: asc, desc Default value: asc |
Example Request
[ { "domain_or_url": "https://examplemaliciousdomain.com/attack-vector", "domain_or_content": "https://examplemaliciousdomain.com/attack-vector" } ]
Action: Get Message Details (Beta)
This action retrieves details about a specific message with the provided ID.
Note
To use this action, you must have the Archive | Search Content View permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Message ID | Enter the ID of the message to retrieve details. | Text | Required | You can retrieve the message ID using the action List Messages. |
Action: Get Message Info
This action retrieves detailed information about a specific message.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Message ID | Enter the Mimecast ID of the message. | Text | Required | You can retrieve the message ID using the action List Messages. |
Example Request
[ { "message_id": "eNpNj91Og0AQhd9lr0tc2kVoEy8KqZZKWyqtBWJCYJkASZdt9gclxncX1Kg3k0nO-WbOeUcSqBbQlGiBknq3c1ebrSMsFaqlP3vYhyzGqooePVmSNAlL_4m93DTJ_bpbR0G_6VMRPydvhyJKJJzSgLsYfE93_GztHY--FrSmq4bO4iPn7CyuQIutDAPa-ndoghhImVcQqVxpeeyvMGTIBa2bDso_-aBBgz_ka_XlMkGKtb871VJxBoLycmS9U-SaSxNPye2AdyBkw1u0MAeoHQ3f0M-Hr8ZVRg3ItCywmREn60riGHb27042HaaJB3lqjT4FghEDY9sgNplbc4LRxye-SWmI" } ]
Action: Get Policy with Targets (Beta)
This action retrieves the information about an existing Web Security Block or Allow List policy for domains or URLs.
Note
To use this action, you must have the Web Security | Policies | Read permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
ID | Enter the ID of an existing policy to retrieve the details. | Text | Required |
Action: Get Remediation Incident (Beta)
This action retrieves the information of an existing incident.
Note
To use this action, you must have the Services | Threat Remediation | Read permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Remediation Incident IDs | Enter the list of remediation incident IDs. | List | Required | You can retrieve the remediation incident ID using the action Find Remediation Incidents. |
Action: Get TTP Attachment Protection Logs
This action returns TTP attachment protection logs from Mimecast.
Note
To use this action, you must have the Monitoring | Attachment Protection | Read permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Result | Enter the result of the scan to filter logs. | Text | Optional | Allowed values: safe, malicious, timeout, error, unsafe, all Default value: all |
Oldest First | Choose true to retrieve results with the oldest logs first. | Boolean | Optional | Default value: false |
Route | Enter the value of the route to filter the response. | Text | Optional | Allowed values: inbound, outbound, internal, all Default value: all |
Start Date | Enter the start date in yyyy-mm-dd't'hh:mm:ssz format from which you want to retrieve the logs. | Text | Optional | By default, it starts from the beginning of the current day. |
End Date | Enter the end date in yyyy-mm-dd't'hh:mm:ssz format up to which you want to retrieve the logs. | Text | Optional | By default, it ends at the time of the request. |
Page Size | Enter the number of results to retrieve on each page. | Integer | Optional | Default value: 100 |
Number of Pages | Enter the number of result pages to retrieve. | Integer | Optional |
Example Request
[ { "end": "2024-10-13T17:30:00+0000", "start": "2024-10-12T18:30:00+0000", "page_size": "10", "no_of_pages": "1", "oldest_first": true } ]
Action: Get TTP Impersonation Protect Logs
This action retrieves messages containing information flagged by an Impersonation Protection configuration.
Note
To use this action, you must have the Monitoring | Impersonation Protection | Read permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Actions | Enter the actions to filter the response. | List | Optional | Allowed values: hold, bounce, none |
Identifiers | Enter the identifiers to filter the response. | List | Optional | Allowed values: similar_internal_domain, newly_observed_domain, internal_user_name, reply_address_mismatch, targeted_threat_dictionary, custom_external_domain, mimecast_external_domain, advanced_similar_internal_domain, advanced_custom_external_domain, advanced_mimecast_external_domain, custom_name_list |
Oldest First | Choose true to retrieve results with the oldest logs first. | Boolean | Optional | Default value: false |
Query | Enter the query to search. This parameter is required if Search Field parameter is not null. | Text | Optional | |
Search Field | Enter the field to search for logs. If a search string is provided, this defaults to all. | Text | Optional | Allowed values: senderAddress, recipientAddress, subject, definition, all |
Tagged Malicious | Choose true to filter for messages that are tagged malicious. | Boolean | Optional | |
Start Date | Enter the start date in yyyy-mm-dd't'hh:mm:ssz format from which you want to retrieve the logs. | Text | Optional | By default, it starts from the beginning of the current day. |
End Date | Enter the end date in yyyy-mm-dd't'hh:mm:ssz format up to which you want to retrieve the logs. | Text | Optional | By default, it ends at the time of the request. |
Page Size | Enter the number of results to retrieve on each page. | Integer | Optional | Default value: 100 |
Number of Pages | Enter the number of result pages to retrieve. | Integer | Optional |
Example Request
[ { "actions":"hold" } ]
Action: Get TTP URL Logs
This action retrieves TTP URL logs from Mimecast.
Note
To use this action, you must have the Monitoring | URL Protection | Read permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Scan Result | Enter the result of the scan to filter logs. | Text | Optional | Allowed values: clean, malicious, suspicious, all Default value: all |
Route | Enter the value of the route to filter the response. | Text | Optional | Allowed values: inbound, outbound, internal, all Default value: all |
Oldest First | Choose true to retrieve results with the oldest logs first. | Boolean | Optional | Default value: false |
Start Date | Enter the start date in yyyy-mm-dd't'hh:mm:ssz format from which you want to retrieve the logs. | Text | Optional | By default, it starts from the beginning of the current day. |
End Date | Enter the end date in yyyy-mm-dd't'hh:mm:ssz format up to which you want to retrieve the logs. | Text | Optional | By default, it ends at the time of the request. |
Page Size | Enter the number of results to retrieve on each page. | Integer | Optional | Default value: 100 |
Number of Pages | Enter the number of result pages to retrieve. | Integer | Optional |
Example Request
[ { "route":"all" } ]
Action: List Messages
This action lists archived messages.
Note
To perform this action, your user role must have archive, search, or read permission.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
View | Enter the type of the message list. | Text | Required | Allowed values: inbox, sent |
Start | Enter the earliest date in ISO 8601 format from which to retrieve messages. Example: 2015-11-16t14:49:18+0000 | Text | Optional | By default, this is set to the last calendar month. |
Mailbox | Enter the email address to retrieve the message lis. | Text | Optional | By default, messages for the logged-in user are returned. |
Include Delegates | Choose true to include messages for addresses to which the mailbox has delegate permissions. | Boolean | Optional | Default value: false |
Include Aliases | Choose true to include messages sent to alias addresses of the mailbox. | Boolean | Optional | Default value: true |
End | Enter the latest date in ISO 8601 format to retrieve messages up to. Example: 2015-11-16t14:49:18+0000 | Text | Optional | By default, this is set to the end of the current day. |
Example Request
[ { "view": "INBOX" } ]
Action: Nullify Blocked Sender Policy
This action nullifies a blocked sender policy based on the given ID by creating a new policy with the same items, setting the action to no_action, and marking it as an override.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Policy ID | Enter the ID of the policy. | Text | Required |
Example Request
[ { "policy_id": "eNo1js0KgkAYAN9lrwZ-q-Zm0MGsaM2WojSFLrauaeVPmopE754dus8w80a14E0l0ghNkcMA9vNTFGtbX7DSW5caNbu8W7SBZyq6o7sJ886yyxbWZHUfj5_7SFoSKbMNmvjkLF9tf6O2it71PYRZou4anlOoibELYGmzAws9at-CSxOHLzpDI1QWj5T3v7aCCSEjxJv6VWSi4kUkhiHLPcyxiUHR9IFuRVWnRY6m-G8e-1LQwcYAGny-230_6w" } ]
Action: Permit or Block Sender
This action permits or blocks emails between a provided sender and recipient.
Note
To use this action, you must have the Gateway | Managed Senders | Edit permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Permit Block Information | Enter the information to permit or block the sender or recipient. | List | Required | Allowed keys: sender, to, action |
Example Request
[ { "permit_block_information": [ { "action": "permit", "to": "john.doe@organame.com", "sender": "jane.doe@orgname.com" } ] } ]
Action: Reject Held Message
This action rejects a currently held message.
Note
To use this action, you must have the Account | Monitoring | Held | Edit permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
IDs | Enter one or more ,imecast secure IDs of the messages to be rejected. | List | Required | You can retrieve the ID using the action List Messages. |
Message | Enter the rejection message to be returned to the sender. | Text | Optional | |
Notify | Choose true to notify the sender about the rejection. | Boolean | Optional | Default value: false |
Reason Type | Enter the code of reason for rejecting the message. | Text | Optional | Allowed values: MESSAGE CONTAINS UNDESIRABLE CONTENT, MESSAGE CONTAINS CONFIDENTIAL INFORMATION, REVIEWER DISAPPROVES OF CONTENT, INAPPROPRIATE COMMUNICATION, MESSAGE GOES AGAINST EMAIL POLICIES |
Example Request
[ { "ids": [ "eNpNzlsLgjAABeD_stcCl7qZQg-RBrNYVigKQnhZ2WUrL1Mk-u-tt56_czjnDVpWyIZdS-CAAgbjYde9XMK9l6HPbqEp470Y3D6Jljre4rCiUaqF1F3N13eE6n058awJ921SxVaqXfx4Y_Q6HsYRZrwyAlkIAlvLDhLo-fRIs4j4tySX56wjCzAF1aOsf8vI1NEcYXsKOi5-T2Sbd6zhpsr0rGmvTwGcmVJRMqUQYgW1ZJKd_uufL2McP4o" ] } ]
Action: Release Held Message
This action releases a currently held message. You can release a maximum of 25 held messages simultaneously.
Note
To use this action, you must have the Account | Monitoring | Held | Edit permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
ID | Enter one or more IDs of the messages to release. | Key Value | Required | You can retrieve the ID using the action List Messages. |
Example Request
[ { "id": "eNpNzlsLgjAABeD_stcCl7qZQg-RBrNYVigKQnhZ2WUrL1Mk-u-tt56_czjnDVpWyIZdS-CAAgbjYde9XMK9l6HPbqEp470Y3D6Jljre4rCiUaqF1F3N13eE6n058awJ921SxVaqXfx4Y_Q6HsYRZrwyAlkIAlvLDhLo-fRIs4j4tySX56wjCzAF1aOsf8vI1NEcYXsKOi5-T2Sbd6zhpsr0rGmvTwGcmVJRMqUQYgW1ZJKd_uufL2McP4o" } ]
Action: Remove Group Member
This action removes members from Mimecast profile groups.
Note
To use this action, you must have the Services | Directory Sync | Edit permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Member Information | Enter the information of the members to be removed as a list. | List | Required | Allowed fields: id, domain, emailAddress. NoteYou must specify the group ID and include either the domain or email address. |
Example Request
[ { "member_information": [ { "emailAddress": "john.doe@orgname.com", "id": "eNoVzrsOgjAUANB_uasklqIgJA74ppIGo6AkLpUWq_JQajHG-O_ifobzASUy3YgLBw-ItJZ3OllFm72zi1osy1Goz9Vr1qaJj-3QjiVNjv2YzqajxW04fGx4b-70SuIG8uAc-2dyWFsttl_vN2KltCKdVQFSjhulaE7olrIkINf0pHP2DMZgQMHZHbycFUoYkGn1rEvRZDUXXWYabyembyI8sDvZikZd6go804C8Lrho_mPTRRbC3x9dtT4N" } ] } ]
Action: Search
This action searches the Mimecast email environment for messages that match the provided criteria. You must provide either advanced track and trace options or a message ID.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Advanced Track and Trace Options | Enter the advanced filters as key-value pairs to use in the tracking query. | Key Value | Optional | Allowed keys: from, senderIp, subject, to, url |
Message ID | Enter the internet message ID of the message to track. | Text | Optional | You can retrieve the message ID using the action List Messages. |
Search Reason | Enter the reason for tracking an email. This information is used for activity-tracking purposes. | Text | Optional | |
Route | Enter the values of the route to filter the result. | List | Optional | Allowed values: internal, inbound, outbound |
Status | Enter the list of email statuses to filter the result. | List | Optional | Allowed values: accepted, processing, bulk_processing, delivery, bulk_delivery, held, bounced, deferred, rejected, archived |
Attachments | Choose true to search for emails with attachments. | Boolean | Optional | |
Start Date | Enter the start date of the earliest message to track in yyyy-mm-dd't'hh:mm:ssz format. | Text | Optional | |
End Date | Enter the end date of the latest message to track in yyyy-mm-dd't'hh:mm:ssz format. | Text | Optional |
Example Request
[ { "advanced_track_or_trace_options": { "senderIP": "54.243.138.179" } } ]
Action: Search File Hash
This action searches for the given file hashes within messages.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Hashes | Enter the list of file hashes to determine if they have been seen within an account. | List | Required |
Example Request
[ { "hashes": [ "9566f8d8c7842c14f2d60a035790f7dd85511d8a60e5ebb587573ea28a8e4ddb" ] } ]
Action: Search Groups
This action searches for groups in Mimecast.
Note
To use this action, you must have the Directories | Groups | Edit permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Query | Enter the query string to search for groups. | Text | Optional | |
Source | Enter the group source to filter the search. | Text | Optional | Allowed values: cloud, ldap |
Example Request
[ { "source": "cloud" } ]
Action: Update Address Alteration Policy
This action updates an existing address alteration policy.
Note
To use this action, you must have the Gateway | Policies | Edit permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
ID | Enter the Mimecast secure ID of the address alteration policy to be modified. | Text | Required | You can retrieve the ID using the action Get Address Alteration Policy. |
Policy | Enter the policy conditions that determine when to apply the alteration set. | Key Value | Required | Allowed keys: bidirectional, comment, conditions, description, enabled, enforced, from, fromDate, fromEternal, fromPart, override, to, toDate, toEternal |
Address Alteration Set ID | Enter the Mimecast secure ID of the address alteration set (folder) to apply this policy. | Text | Optional | You can retrieve the address alteration set ID using the action Get Address Alteration Set. |
Example Request
[ { "id": "eNo1jk0LgjAAQP_LrgZumq6CDqYGMxGjFI0uNldq-ZG6mUT_PTt0f4_33qBjlLcsT8EKCOGrXH2dhsK0encTtUeL2vtqsEQcGoru6kHmhWc58Cxzsb1r2nOfSjaWSmdJsgif5ZsT7VSh6MM4wqTMVJ_TisAOL_0Y2o538JKQOEV84dekJ2swA039yOn4aysIYzQDlHd9XbKW1imbhszgsEEGgspcn2jB2i6vK7BCf_M4NoxM9kRA-PkCaGtApA", "policy": { "comment": "This is a sample comment." } } ]
Action: Update Anti-Spoofing Policy
This action updates an existing Anti-Spoofing SPF-based Bypass policy.
Note
To use this action, you must have the Gateway | Policies | Edit permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
ID | Enter the ID of an existing policy. | Text | Required | You can retrieve the ID using the action Get Anti-Spoofing Policy. |
Option | Enter the action to be performed on the policy. | Text | Required | Allowed values: disable_bypass, enable_bypass |
Policy | Enter the policy scoping details to update. | Key Value | Required | Allowed keys: bidirectional, comment, conditions, description, enabled, enforced, from, fromDate, fromEternal, fromPart, override, to, toDate, toEternal |
Example Request
[ { "id": "eNo1jk0LgjAAQP_LrgVuM10GHSoNZjEUUxK82Fxp5UfzixH99-zQ_T3ee4NW8F6KIgMrYJ08wzk8ZXwbmOIL5uu2LMZqtIc42mDzaIY5ixItZPZuuX8YxsvPZg6Zla5F8zNJtJt7PugDNkelYFrmutfzisKWWF4MHZcFLI2oe48v_TXt6BrMQVM_C65-bYwIwXPA-7arSyF5nYlpaBcGW7RBEC_MiR6EbIu6Aiv0N0-qEXSyEYQQfb4_I0By", "option": "enable_bypass", "policy": { "comment": "This is a sample comment." } } ]
Action: Update Group
This action updates the description of Mimecast profile groups. You can update a maximum of 10 groups simultaneously.
Note
To use this action, you must have the Services | Directory Sync | Edit permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Data | Enter the data to update the group. Example: $JSON[[{"id" : "test"}]] | List | Required | Allowed keys: description, id (mandatory), parentId |
Example Request
[ { "groups_information": [ { "id": "eNoVzskKgkAYAOB3-a8JrrlBB9OCGUVaUBS6TM6Y5TLlqBXRu2f37_B9QLBi7NmVgguojcpXVxv8kIWHAK-Jbwf1vnsGU556mhmZSRWnJzmJA9_e1svlY08XG2vRYgdVmXWSLzgL9Ukzn--3QtpK341FhxRhObtc2eD4GJMU4Vt-HksyoBVI0FByB7ckjWASFKMYeMv6glM2Z_zkuFY9VdEMc5YT68WVd-CqEpS8oaz_jzXVdiz9-wOBuj5H", "parentId": "eNoVzssKgkAUANB_uduExncKLayMtBosURTcTM6YlY7p-CCif6_2Z3HeIFg-dOxGwQbMtuM5VY-IO3I7WdquCsyLw6fNmMaOYhyMqMRxNo_wZr3YPnS9PdGZa85q3_LKxMzmVz_Zq6NiTK8XInWpBkPOPSRMK0iR6-MQk9jz7-llKEjvLUGCipIn2AWpBJMgH0Tf1KzLG8p-mXUUrmRHRopm_OTIOnFrONiyBEVTUdb9x-jzBQBrPMc", "description": "This is a sample description." } ] } ]
Action: Update Policy with Targets (Beta)
This action updates an existing web security block or allow list policy for domains or urls.
Note
To use this action, you must have the Web Security | Policies | Edit permissions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
ID | Enter the ID of the policy to update. | Text | Required | |
Policies | Enter at least one policy scoping detail to update. | Key Value | Required | Allowed keys: bidirectional, comment, conditions, description, enabled, enforced, from, fromDate, fromEternal, fromPart, override, to, toDate, toEternal |
URLs | Enter the URLs along with the corresponding actions for each URL. | Key Value | Optional | Allowed keys: action (mandatory), id, type (mandatory), value (mandatory) |
Description | Enter the description of the policies for future reference. | Text | Optional |
Action: Generic Action
This is a generic action used to make requests to any Mimecast endpoint.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Method | Enter the HTTP method to make the request. | Text | Required | Allowed values: GET, PUT, POST, DELETE |
Endpoint | Enter the endpoint to make the request to. Example: api/directory/execute-sync | Text | Required | |
Query Params | Enter the query parameters to pass to the API. | Key Value | Optional | |
Payload | Enter the payload to pass to the API. | Any | Optional | |
Extra Fields | Enter the extra fields to pass to the API. | Key Value | Optional | Allowed keys: payload_json, download, files, filename, retry_wait, retry_count, custom_output, response_type |
Example Request
[ { "method": "POST", "endpoint": "api/policy/blockedsenders/get-policy", "extra_fields": {}, "query_params": {} } ]