How to configure Mimecast Impersonation Protection Bypass policy

Here is the step by step process to configure the Mimecast Impersonation Protection Bypass policy. If you are not sure what is Impersonation Protection is here is the definition (Courtesy Mimecast.com) The increasing number of “whaling” attacks, usually targeting an organization’s senior management, means additional protection is required against email threats that do not contain attachments or URLs. […]