Collect Mimecast Mail V2 logs

Supported in:

This document explains how to collect Mimecast Mail V2 logs by setting up a Google Security Operations feed using the Third Party API. Mimecast Email Security Cloud Gateway is a cloud-based email security platform that provides advanced threat protection, data loss prevention, and email continuity services. The Mimecast Mail V2 log type uses Mimecast API 2.0 with OAuth 2.0 Client Credentials authentication to retrieve SIEM log data from your Mimecast tenant.

Before you begin

Ensure that you have the following prerequisites:

  • A Google SecOps instance
  • Privileged access to the Mimecast Administration Console
  • An administrator role in Mimecast with the Manage Application Roles security permission enabled, required to create and manage API 2.0 applications

Configure Mimecast API 2.0 application

To enable Google SecOps to pull logs from Mimecast, you need to register an API 2.0 application in the Mimecast Administration Console and obtain OAuth 2.0 credentials.

Create API 2.0 application

  1. Sign in to the Mimecast Administration Console.
  2. Navigate to Integrations > Integrations Hub.
  3. If prompted, review and accept the API Terms and Conditions.
  4. Locate the Mimecast API 2.0 tile and click Configure New.
  5. Under Details, provide the following configuration:
    • Application Name: Enter a descriptive name (for example, Google SecOps Integration). This cannot be changed after saving.
    • Products: Select the API products that include SIEM log access (for example, Threats, Security Events and Data for CG). This cannot be changed after saving.
    • Application Role: Select or create a custom Administration Role with the minimum permissions required for log retrieval (see Required API permissions). Roles can be managed under Account > Admin Roles.
    • Description (optional): Enter a description for the application.
  6. Under Notification Settings, provide:
    • Technical Point of Contact: Enter the name of the person or team responsible for this integration.
    • Email: Enter the contact email address.
  7. Click Save.

Record API credentials

After clicking Save, a dialog displays the following credentials:

  • Client ID: Your OAuth 2.0 client identifier.
  • Client Secret: Your OAuth 2.0 client secret.

Required API permissions

Create a custom Administration Role with the minimum permissions required for the integration. The role must have read-only access to SIEM log data and audit events.

Configure a feed in Google SecOps to ingest Mimecast Mail V2 logs

  1. Go to SIEM Settings > Feeds.
  2. Click Add New Feed.
  3. On the next page, click Configure a single feed.
  4. In the Feed name field, enter a name for the feed (for example, Mimecast Mail V2 Logs).
  5. Select Third Party API as the Source type.
  6. Select Mimecast Mail V2 as the Log type.
  7. Click Next.
  8. Specify values for the following input parameters:

    • OAuth client ID: The Client ID from the API 2.0 application.
    • OAuth client secret: The Client Secret from the API 2.0 application.

    • Asset namespace: The asset namespace.

    • Ingestion labels: The label to be applied to the events from this feed.

  9. Click Next.

  10. Review your new feed configuration in the Finalize screen, and then click Submit.

After setup, the feed begins to retrieve logs from your Mimecast tenant in chronological order.

Mimecast API 2.0 gateway

Mimecast API 2.0 offers three gateway options:

Gateway URL Description
Global (default) api.services.mimecast.com Routes traffic to the nearest instance with automatic failover.
UK Instance uk-api.services.mimecast.com Processes traffic exclusively through the UK instance. Use for UK data residency compliance.
US Instance us-api.services.mimecast.com Processes traffic exclusively through the US instance. Use for US data residency compliance.

UDM mapping table

Log Field UDM Mapping Logic
aCode additional_fields.aCode Value taken from aCode.
Att_AV additional_fields.Att_AV Value taken from Att_AV.
Att_Det additional_fields.Att_Det Value taken from Att_Det.
Att_Enc additional_fields.Att_Enc Value taken from Att_Enc.
Att_Key additional_fields.Att_Key Value taken from Att_Key.
Att_Mod additional_fields.Att_Mod Value taken from Att_Mod.
Att_Orig additional_fields.Att_Orig Value taken from Att_Orig.
Att_Rem additional_fields.Att_Rem Value taken from Att_Rem.
Att_State additional_fields.Att_State Value taken from Att_State.
Att_Type additional_fields.Att_Type Value taken from Att_Type.
CKS additional_fields.CKS Value taken from CKS.
Date additional_fields.Date Value taken from Date.
Delivered additional_fields.Delivered Value taken from Delivered.
dlp additional_fields.dlp Value taken from dlp.
Dmarc additional_fields.Dmarc Value taken from Dmarc.
Enc additional_fields.Enc Value taken from Enc.
Error_Code additional_fields.Error_Code Value taken from Error_Code.
Error_Type additional_fields.Error_Type Value taken from Error_Type.
Grey additional_fields.Grey Value taken from Grey.
header_id additional_fields.header_id Value taken from header_id.
Hold_For additional_fields.Hold_For Value taken from Hold_For.
Hold_Reason additional_fields.Hold_Reason Value taken from Hold_Reason.
Latency additional_fields.Latency Value taken from Latency.
Malware_Hash additional_fields.Malware_Hash Value taken from Malware_Hash.
Malware_Name additional_fields.Malware_Name Value taken from Malware_Name.
Msg_Key additional_fields.Msg_Key Value taken from Msg_Key.
MsgSize additional_fields.MsgSize Value taken from MsgSize.
Policy additional_fields.Policy Value taken from Policy.
Processing_Time additional_fields.Processing_Time Value taken from Processing_Time.
Queue_ID additional_fields.Queue_ID Value taken from Queue_ID.
rcpt_type additional_fields.rcpt_type Value taken from rcpt_type.
Receipt additional_fields.Receipt Value taken from Receipt.
sCode additional_fields.sCode Value taken from sCode.
Sent additional_fields.Sent Value taken from Sent.
Snt additional_fields.Snt Value taken from Snt.
spamLimit additional_fields.spamLimit Value taken from spamLimit.
spamScore additional_fields.spamScore Value taken from spamScore.
SpamRef additional_fields.SpamRef Value taken from SpamRef.
Tarpit additional_fields.Tarpit Value taken from Tarpit.
Time additional_fields.Time Value taken from Time.
datetime metadata.event_timestamp Value taken from datetime. The original datetime field is also parsed to set the event's primary @timestamp.
metadata.event_type Set to NETWORK_EMAIL.
metadata.product_event_type Set to processed_email.
dir network.direction Derived from dir: In -> INBOUND; Out -> OUTBOUND; Int -> UNKNOWN.
sender, route, hdr_from network.email.from Value taken from sender, then route. If still empty, value is taken from hdr_from.
MsgID network.email.message_id Value taken from MsgID.
subject network.email.subject Value taken from subject.
rcpt network.email.to Value taken from rcpt and split by ',' into an array.
IP principal.ip Value taken from IP and split by ',' into an array.
hdr_from principal.user.email_addresses Value taken from hdr_from and split by ',' into an array.
act security_result.action Derived from act: Rej, T, Hld, Bnc -> BLOCK; U, A -> ALLOW; else UNKNOWN.
Att_Hash target.file.md5 Value taken from Att_Hash.
Att_Name target.file.name Value taken from Att_Name.
Att_Size target.file.size Value taken from Att_Size and converted to integer.
URL target.url Value taken from URL.
rcpt_to target.user.email_addresses Value taken from rcpt_to and split by ',' into an array.
metadata.product_name Set to Mail V2.
metadata.vendor_name Set to Mimecast.

Need more help? Get answers from Community members and Google SecOps professionals.