How to configure Mimecast Impersonation Protection Bypass policy

Here is the step by step process to configure the Mimecast¬†Impersonation Protection Bypass policy. If you are not sure what is¬†Impersonation Protection is here is the definition (Courtesy The increasing number of “whaling” attacks, usually targeting an organization’s senior management, means additional protection is required against¬†email threats that do not contain attachments or URLs. […]