Actions
Get TTP Impersonation Protect Logs
Get messages containing information flagged by an configuration.
Required application permissions: Monitoring | Impersonation Protection | Read
.
To learn more, visit the Mimecast documentation.
Basic Parameters
Parameter | Description |
---|---|
Search By Actions | Specify actions to search by. |
Search By Field | Specify the field to be used for filtering the Search Query .Note: If this parameter is provided, Search Query must be specified. |
Search By Identifiers | Search logs by identifiers. |
Search Query | Provide a query to search in the logs.Note: If Search By Field is provided, this parameter must be specified. |
Tagged Malicious | Determines whether to return only messages that are tagged as malicious. |
Advanced Parameters
Parameter | Description |
---|---|
Search By End Date | The end date of logs to return. The default is the execution time. |
Search By Start Date | The start date of logs to return. The default is the start of the current day. |
Sort Descending | Determines whether to order results with the most recent first. |
Example Output
Workflow Library Example
Get Ttp Impersonation Protect Logs with Mimecast and Send Results Via Email
Preview this Workflow on desktop