Skip to main content

Netskope Help

Mimecast Plugin for User Risk Exchange

This document explains how to configure Mimecast with User Risk Exchange in the Netskope Cloud Exchange platform. This integration enables seeing multiple connected systems’ risk values for individual users and groups.


To complete this configuration, you need:

  • A Netskope tenant (or multiple, for example, production and development/test instances).

  • A Netskope Cloud Exchange tenant with the User Risk Exchange module already configured.

  • A Mimecast Instance with an account having a subscription to the Awareness Training package for fetching user risk scores.

  1. Obtain the Mimecast credentials.

  2. Configure the Mimecast plugin.

  3. Configure Actions for the Mimecast plugin.

  4. Validate the Mimecast plugin.

Click play to learn more about how this plugin works.

  1. Log in to your Mimecast instance.

  2. Make note of the region in Mimecast Instance URL. It will be in the form of https://login-<region>

  3. Create a new user:

    1. Go to Administration > Directories > Internal Directories to display a list of internal domains.

    2. Select the internal domain where you would like to create your new user.

    3. Click New Address on the menu bar.

    4. Complete the new address form by setting a new email address, user’s password, and phone number (required for 2FA). Click Save and Exit to create the new user.

    5. Keep a note of the password because you will use this to get your Authentication Tokens at a later stage.

  4. Add the newly created user to an Administrative Role:

    1. Go to Administration > Account > Roles to display the Roles page.

    2. Right-click the Basic Administrator role and select Add users to role.

    3. Browse or search to find the new user created previously.

    4. Select the checkbox to the left of the user.

    5. Click Add selected users to add the user to the role.

  5. Create a new group and add your new user>

    1. Go to Administration > Directories > Profile Groups to display the Profile groups page.

    2. Create a new group by selecting the plus icon on the parent folder where you would like to create the group. This creates a new group with the name New Folder.

    3. To rename the group, select the newly created New Folder group. Then from the Edit group text box, enter the name you want to give the folder, for example, Risk Exchange Admin, and then press Enter to apply the change.

    4. With the group selected, click on the Build dropdown list and select Add Email Addresses.

    5. Type the name of the new user created previously.

    6. Select Save and Exit to add the new user to the group.

  6. Create a new Authentication Profile:

    1. Go to Administration > Services > Applications to display the Application Settings page.

    2. Click Authentication Profiles.

    3. Select the New Authentication Profile button.

    4. Type a Description for the new profile.

    5. Set the Authentication TTL setting to Never Expires. This ensures that when you create your Authentication Token, it will not expire and impact the data collection of the app.

    6. Leave all other settings as their default.

    7. Select Save and Exit to create the profile.

  7. Create a new Application Setting:

    1. Go to Administration > Services > Applications to display the Application Settings page.

    2. Click New Application Settings.

    3. Type a Description.

    4. Click the Group Lookup button and select the Group that you created previously.

    5. Click the Authentication Profile Lookup button and select the Authentication Profile created previously.

    6. Leave all other settings defaults.

    7. Click Save and Exit to create and apply the Application Settings to your new group and user.

  8. Create a new API application:

    1. Go to Administration > Services > API Applications to display the available API Applications.

    2. Click Add API Application to create a new API application to be used.

    3. Fill out the form with appropriate information. Check Enable Extended Session, which ensures your API token will never expire. Select Other for Category, and then click Next.

    4. Enter the appropriate Developer Name and enter the Email address created previously, which links the user's application/profile settings to the API application. Click Next button.

    5. Review the entered configuration parameters, edit them if required, and then click Add.

    6. Your API application will be created and its details will be displayed. Click on the small “eye” icon beside the Application Key to view it. Copy the Application ID and Application Key.

  9. Get Access key and Secret Key:

    1. The Keys can be generated only after 30 minutes of creating a new API application.

    2. Go to Administration > Services > API Applications menu item to display the available API Applications.

    3. Click on the newly created API application and then click Create Keys.

    4. Enter the email address of the user created previously, and then click Next.

    5. For Type select Cloud and enter the password of the user created previously, and then click Next.

    6. An OTP (Code) will be generated and sent to the user's mobile device. Enter the OTP here and click Next.

    7. Note down both of the keys displayed by pressing the small eye icons. Click Close.

  1. Go to Settings > Plugins.

  2. Select the Mimecast plugin box to open the plugin creation page.

  3. Enter a Configuration Name.

  4. Adjust the Sync Interval to appropriate value. Recommended is 5+ minutes.

  5. Click Next.

  6. Enter your Base URL. This is the Mimecast base URL you obtained previously. For more details, refer to

  7. Enter your Application ID and Application Key from Mimecast.

  8. Enter your Access Key and Secret Key from Mimecast.

  9. Click Next.

  10. Select the appropriate range for the aggregate score.

  11. Click Save.

  1. Go to User Risk Exchange and click Actions.

  2. Click Add Action Configuration.

  3. Click the Business rule dropdown list and choose the appropriate Business rule.

  4. Select the Configuration dropdown list and choose Mimecast.

  5. Select Actions from the dropdown list and choose (Add to Group, Remove to Group or No Action).

    • Add to Group : When triggered, users are added to that group.

    • Remove to Group : When triggered, users are removed from that group.

    • No Action : This does not perform any actions on users.

  6. From the Group dropdown list, select a Group Name, or select Create new group from Group dropdown. Enter the Group Name if you want to create a new group in Mimecast.

  7. Click on the Generate Alert switch to enable it. This would ensure that new alerts are added in the CTO module whenever this action is taken.

  8. Click Save.


To map the grade (risk) fetched from Mimecast into 1-1000 range following mapping is used:

  1. Map the grade fetched from Mimecast to the following range:

    • A: 800 - 1000

    • B: 600 - 799

    • C: 400 - 599

    • D: 200 - 399

    • F: 1 - 199

  2. Pick the minimum value from the defined range.

  3. Eg. If a user has grade C in the Mimecast platform then that user will have 400 score in the Cloud Exchange platform.

To validate the plugin in Cloud Exchange and Mimecast, you must have Mimecast users.

In Cloud Exchange:

  1. In User Risk Exchange, select Users.

  2. If you want to check how many user scores are fetched from Mimecast and added to the group in Mimecast then you can look at the audit logs in Cloud Exchange. In Cloud Exchange, select Logging.


In the Mimecast platform:

  1. Go to Administration > Directories and select Profile Groups

  2. Find the group that you added while creating the Action configuration and click on that group.