About Griffith Email Security

To mitigate the risk of the University becoming a target for cyber threats, Mimecast has been implemented as the Griffith Email Security System to filter email and improve protection against spam, junk email and messages containing suspicious content.

Frequently asked questions

More about Mimecast

Release email request

Request to release a blocked email or attachment

4 Key features Mimecast use to protect your email

1. Spam Digest

Spam Digest scans messages to ensure they are not SPAM. Suspicious messages will be held in quarantine and you will receive a spam digest message to review. You can release, block or permit the message.

Important information:

  • Digest emails will be received at 8am, 12am and 4pm (AEDT).
  • You will only receive a digest notification if you have new messages in your hold queue.
  • If you have Released an email and it does not appear in your Griffith email inbox, please check your Griffith email spam folder.
  • If not actioned, the email will expire from the hold queue in 30 calendar days and be deleted; Griffith email administrator will not be able to retrieve deleted emails, you will need to ask for the email to be resent.
  • If you accidentally blocked an important email, contact the IT Service Centre to log a job to the Email administration team to check as there is currently no option to review blocked or permitted lists.
  • Most subscription based newsletters and promotional emails will have the option to Unsubscribe. If you are unsure if the email is spam, click Release to view content. You can choose to remove yourself from the mailing list by clicking the Unsubscribe link at the bottom of the email.
Action Email Delivery Future Messages
Release Releases message from the hold queue and immediately delivers it to your inbox. Messages from this sender may still be sent to the hold queue, depending on your administrator's policies and the message's content.
Block Removes message from the hold queue, but doesn't deliver the message to your inbox. Messages from this sender will be immediately blocked rejected, and will not be delivered to your inbox.
Permit Releases message from the hold queue and immediately delivers it to your Inbox  Messages from this sender will bypass all spam checks, and will be delivered to your inbox provided it passes virus scanning, content, and attachment policies.

2. Impersonation (Whaling) Protect

Known as Whaling and Business Email Compromise (BEC), hackers use clever tactics to make it look as though an email you receive is from a trusted person.  Hackers convince you to share sensitive information and use your data for malicious activities.

Impersonation (Whaling Protect) blocks emails that appear to be impersonating a legitimate sender or organisation. If Griffith suspects you have received an email from an imposter, we will add a message in the subject line (e.g. Suspicious Message) and a message at the top of the email.

3. URL Protect

Malicious URL links within emails can allow hackers to steal your information and can grant them access to the Griffith network. URL Protects scans links in an email to ensure the link is safe prior to delivery.

When you hover over a link, you will see the address starting with: https://protect-au.mimecast.com. This allows our security system (Mimecast), to scan the link to ensure its safe prior to delivery. If the site is ok, you will be allowed to continue as normal.  If the site is bad, access will be blocked for your protection.

4. Attachment Security

Messages from external senders can contain dangerous attachments that can compromise the security of the Griffith’s network.  Mimecast attachment security scans attachments and removes them from the email if they contain a dangerous file type. The original email will be received, however the attachment will be replaced with a notification advising that the attachment has been removed.

Dangerous file types include:

File type
A - C .a6p, .ac, .acr, .action, .adp, .air, .apk, .app, .applescript, .awk, .bas, .bat, .bin, .chm, .cmd, .com, .cpl, .crt, .csh
D - F .dek, .dld, .dll .drv, .ds, .ebm, .elf, .emf, .esh, ._exe, .exe, .ezs, .fky, .frs, .fxp
G - I .gadget, .gpe, .gpu, .hlp, .hms, .hta, .icd, .iim, .inf, .ins, .inx, .ipa, .ipf, .isp, .isu
J - L .jar, .js, .jse, .jsx, .kix, .ksh, .lib, .lnk
M - O .mcr, .mde, .mel, .mem, .mpx, .mrc, .ms, .msc, .msi, .msp, .mst, .mxe, .obs, .ocx, .out, .osx
P - R .pas, .pcd, .pex, .pif, .plsc, .pm, .prc, .prg, .pvd, .pwc, .py, .pyc, .pyo, .qpx, .rbx, .reg, .rgs, .rox, .rpj
S - U .scar, .scpt, .scr, .script, .sct, .seed, .sh, .shb, .shs, .spr, .sys, .thm, .tlb, .tms, .u3p, .udf, .url
V - Z           .vb, .vbe, .vbs, .vbscript, .vdo, .vxd, .wcm, .widget, .wmf, .workflow, .wpk, .ws, .wsc, .wsf, .wsh, .xap, .xqt, .zlq

Attachment Blocked Notice: attachment removed

External attachment will be scanned and removed if they contain a dangerous file type. The original email will be received, however the attachment will be replaced with the following notification advising that the attachment has been removed.

Linked Attachment Download: warning to review before download

External attachments that are encrypted will also be removed. The original email will be received, however the attachment will be replaced with the following notification advising you to take care before downloading the attachment.