If you're new to Phriendly Phishing or recently made changes within your existing infrastructure, it is important to ensure all our IPs and domains are whitelisted on your mail gateways to ensure Phriendly Phishing delivery and effective training.
The phishing campaigns are designed to give learners quick wins and more confidence by starting off with easy to identify phishing emails. Unfortunately, this also makes it easy for the anti-spam filters to identify them and render them ineffective.
Reminders
- Read through below Whitelisting guides and configure in your environment as applicable.
- For more details on mail server whitelisting guide, please visit What whitelisting method should I use? – Phriendly Phishing
- Refer to Phriendly Phishing's IP Addresses, Domains for the list to add.
-
Whitelist Mail Server
Mail Server Guides Microsoft O365 - O365 Only : Whitelisting : O365 Advanced Delivery Configuration
- O365 + Mail Filtration Services : Whitelisting : O365 Advanced Delivery Configuration + Bypass Mail Filtering Services
Google Workspace Whitelisting : Google Workspace -
Whitelist Phriendly Phishing Domains and IP addresses
This includes whitelisting us in any applications listed below as applicable that may block emails, links etc from us. Whitelisting our domains and IPs on below app varies, please contact your provider.
- Mail Gateways
- Firewall
- Anti Virus
- Endpoint Security Applications
At times, popular spam filters like Barracuda, MessageLabs may have link-scanning which can lead to inaccurate click-through rate. Hence, additional configuration is to add all our simulation domains in allowlist in your environment. Please reach out to Phriendly Phishing Support team to get a list of all simulated phishing domains.
-
Perform a Whitelist Test
Once the IP and domain addresses have been whitelisted across all your internal mail gateway systems, it is recommended to generate a whitelist test to ensure the delivery of our emails and links. For more information, please visit Test Whitelisting – Phriendly Phishing.
Comments
Please sign in to leave a comment.