Start a conversation

Email Security Cloud Gateway - Targeted Threat Protection (Impersonation Protection)

Configure - 

1. TTP Impersonation Protection Introduction (Video) 

2. Configuring the Default TTP Impersonation Protection policy (Video) 

3. Configuring the VIP TTP Impersonation Protection policy (Video) 

4. Configuring the Trusted External Parties TTP Impersonation Protection policy (Video) 

TTP Impersonation Protection Case study (Document) 

TTP Impersonation Protection Overview page (Document) 


Optimize - 

Troubleshoot - 

Choose files or drag and drop files
Was this article helpful?
Yes
No
  1. Carlos Rios

  2. Posted

Comments