If your organization utilizes Cisco's Ironport spam filtering, you can safelist PhishingBox to allow our simulated phishing and training emails through to your end-users.
For an up-to-date list of PhishingBox's IP addresses, see Safelisting Basics.
Safelisting IP Addresses and Hostnames in Cisco Ironport
Follow the below instructions to safelist PhishingBox in Cisco Ironport:
- Navigate to Cisco Ironport's admin console.
- Go to the Mail policies tab.
- Click on HAT Overview. Make sure that InboundMail Listener is selected.
- Click WHITELIST.
- Click the Add Sender button.
- Enter PhishingBox's IPs
-
US - 64.191.166.196 (Phishing), 64.191.166.197 (Training), 69.72.47.194 (System)
-
EU - 64.238.34.10 (Phishing), 64.238.34.11 (Phishing), 64.191.166.197 (Training), 161.38.205.202 (System)
NOTE: For an up-to-date list of PhishingBox's IP addresses, see Safelisting Basics.
-
- Click Submit.
- Click Commit Changes.
How to Skip Outbreak Filter Scanning
The above instructions for safelisting Cisco Ironport will not prevent Ironport's Outbreak Filter from scanning the emails from our IPs or hostnames. If our emails are being quarantined, you may also need to add our IPs or hostnames to the Bypass Domain Scanning table. Follow the below instructions to do so:
- Go to your Cisco Ironport admin console and navigate to the Mail Policies tab.
- In the Message Modification section, enter our IPs or hostnames in the Bypass Domain Scanning table. For a list of our IP addresses and hostnames, please see Safelisting Basics.
- Click Submit and then Commit Changes.
Comments
0 comments
Please sign in to leave a comment.