Collect Mimecast Mail V2 logs
This document explains how to collect Mimecast Mail V2 logs by setting up a Google Security Operations feed using the Third Party API. Mimecast Email Security Cloud Gateway is a cloud-based email security platform that provides advanced threat protection, data loss prevention, and email continuity services. The Mimecast Mail V2 log type uses Mimecast API 2.0 with OAuth 2.0 Client Credentials authentication to retrieve SIEM log data from your Mimecast tenant.
Before you begin
Ensure that you have the following prerequisites:
- A Google SecOps instance
- Privileged access to the Mimecast Administration Console
- An administrator role in Mimecast with the Manage Application Roles security permission enabled, required to create and manage API 2.0 applications
Configure Mimecast API 2.0 application
To enable Google SecOps to pull logs from Mimecast, you need to register an API 2.0 application in the Mimecast Administration Console and obtain OAuth 2.0 credentials.
Create API 2.0 application
- Sign in to the Mimecast Administration Console.
- Navigate to Integrations > Integrations Hub.
- If prompted, review and accept the API Terms and Conditions.
- Locate the Mimecast API 2.0 tile and click Configure New.
- Under Details, provide the following configuration:
- Application Name: Enter a descriptive name (for example,
Google SecOps Integration). This cannot be changed after saving. - Products: Select the API products that include SIEM log access (for example, Threats, Security Events and Data for CG). This cannot be changed after saving.
- Application Role: Select or create a custom Administration Role with the minimum permissions required for log retrieval (see Required API permissions). Roles can be managed under Account > Admin Roles.
- Description (optional): Enter a description for the application.
- Application Name: Enter a descriptive name (for example,
- Under Notification Settings, provide:
- Technical Point of Contact: Enter the name of the person or team responsible for this integration.
- Email: Enter the contact email address.
Click Save.
Record API credentials
After clicking Save, a dialog displays the following credentials:
- Client ID: Your OAuth 2.0 client identifier.
- Client Secret: Your OAuth 2.0 client secret.
Required API permissions
Create a custom Administration Role with the minimum permissions required for the integration. The role must have read-only access to SIEM log data and audit events.
Configure a feed in Google SecOps to ingest Mimecast Mail V2 logs
- Go to SIEM Settings > Feeds.
- Click Add New Feed.
- On the next page, click Configure a single feed.
- In the Feed name field, enter a name for the feed (for example,
Mimecast Mail V2 Logs). - Select Third Party API as the Source type.
- Select Mimecast Mail V2 as the Log type.
- Click Next.
Specify values for the following input parameters:
- OAuth client ID: The Client ID from the API 2.0 application.
OAuth client secret: The Client Secret from the API 2.0 application.
Asset namespace: The asset namespace.
Ingestion labels: The label to be applied to the events from this feed.
Click Next.
Review your new feed configuration in the Finalize screen, and then click Submit.
After setup, the feed begins to retrieve logs from your Mimecast tenant in chronological order.
Mimecast API 2.0 gateway
Mimecast API 2.0 offers three gateway options:
| Gateway | URL | Description |
|---|---|---|
| Global (default) | api.services.mimecast.com |
Routes traffic to the nearest instance with automatic failover. |
| UK Instance | uk-api.services.mimecast.com |
Processes traffic exclusively through the UK instance. Use for UK data residency compliance. |
| US Instance | us-api.services.mimecast.com |
Processes traffic exclusively through the US instance. Use for US data residency compliance. |
UDM mapping table
| Log Field | UDM Mapping | Logic |
|---|---|---|
aCode |
additional_fields.aCode | Value taken from aCode. |
Att_AV |
additional_fields.Att_AV | Value taken from Att_AV. |
Att_Det |
additional_fields.Att_Det | Value taken from Att_Det. |
Att_Enc |
additional_fields.Att_Enc | Value taken from Att_Enc. |
Att_Key |
additional_fields.Att_Key | Value taken from Att_Key. |
Att_Mod |
additional_fields.Att_Mod | Value taken from Att_Mod. |
Att_Orig |
additional_fields.Att_Orig | Value taken from Att_Orig. |
Att_Rem |
additional_fields.Att_Rem | Value taken from Att_Rem. |
Att_State |
additional_fields.Att_State | Value taken from Att_State. |
Att_Type |
additional_fields.Att_Type | Value taken from Att_Type. |
CKS |
additional_fields.CKS | Value taken from CKS. |
Date |
additional_fields.Date | Value taken from Date. |
Delivered |
additional_fields.Delivered | Value taken from Delivered. |
dlp |
additional_fields.dlp | Value taken from dlp. |
Dmarc |
additional_fields.Dmarc | Value taken from Dmarc. |
Enc |
additional_fields.Enc | Value taken from Enc. |
Error_Code |
additional_fields.Error_Code | Value taken from Error_Code. |
Error_Type |
additional_fields.Error_Type | Value taken from Error_Type. |
Grey |
additional_fields.Grey | Value taken from Grey. |
header_id |
additional_fields.header_id | Value taken from header_id. |
Hold_For |
additional_fields.Hold_For | Value taken from Hold_For. |
Hold_Reason |
additional_fields.Hold_Reason | Value taken from Hold_Reason. |
Latency |
additional_fields.Latency | Value taken from Latency. |
Malware_Hash |
additional_fields.Malware_Hash | Value taken from Malware_Hash. |
Malware_Name |
additional_fields.Malware_Name | Value taken from Malware_Name. |
Msg_Key |
additional_fields.Msg_Key | Value taken from Msg_Key. |
MsgSize |
additional_fields.MsgSize | Value taken from MsgSize. |
Policy |
additional_fields.Policy | Value taken from Policy. |
Processing_Time |
additional_fields.Processing_Time | Value taken from Processing_Time. |
Queue_ID |
additional_fields.Queue_ID | Value taken from Queue_ID. |
rcpt_type |
additional_fields.rcpt_type | Value taken from rcpt_type. |
Receipt |
additional_fields.Receipt | Value taken from Receipt. |
sCode |
additional_fields.sCode | Value taken from sCode. |
Sent |
additional_fields.Sent | Value taken from Sent. |
Snt |
additional_fields.Snt | Value taken from Snt. |
spamLimit |
additional_fields.spamLimit | Value taken from spamLimit. |
spamScore |
additional_fields.spamScore | Value taken from spamScore. |
SpamRef |
additional_fields.SpamRef | Value taken from SpamRef. |
Tarpit |
additional_fields.Tarpit | Value taken from Tarpit. |
Time |
additional_fields.Time | Value taken from Time. |
datetime |
metadata.event_timestamp | Value taken from datetime. The original datetime field is also parsed to set the event's primary @timestamp. |
| metadata.event_type | Set to NETWORK_EMAIL. |
|
| metadata.product_event_type | Set to processed_email. |
|
dir |
network.direction | Derived from dir: In -> INBOUND; Out -> OUTBOUND; Int -> UNKNOWN. |
sender, route, hdr_from |
network.email.from | Value taken from sender, then route. If still empty, value is taken from hdr_from. |
MsgID |
network.email.message_id | Value taken from MsgID. |
subject |
network.email.subject | Value taken from subject. |
rcpt |
network.email.to | Value taken from rcpt and split by ',' into an array. |
IP |
principal.ip | Value taken from IP and split by ',' into an array. |
hdr_from |
principal.user.email_addresses | Value taken from hdr_from and split by ',' into an array. |
act |
security_result.action | Derived from act: Rej, T, Hld, Bnc -> BLOCK; U, A -> ALLOW; else UNKNOWN. |
Att_Hash |
target.file.md5 | Value taken from Att_Hash. |
Att_Name |
target.file.name | Value taken from Att_Name. |
Att_Size |
target.file.size | Value taken from Att_Size and converted to integer. |
URL |
target.url | Value taken from URL. |
rcpt_to |
target.user.email_addresses | Value taken from rcpt_to and split by ',' into an array. |
| metadata.product_name | Set to Mail V2. |
|
| metadata.vendor_name | Set to Mimecast. |
Need more help? Get answers from Community members and Google SecOps professionals.