Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

After receiving the Security Awareness Training welcome email, after reaching out to your Account Executive or support@inky.com, setup your initial account using the provided instructions.

Step 1 - INKY Settings Change

There are a few changes that ensure simulation emails run smoothly within INKY.

...

You don’t need to select “Bypass link rewriting for all links in simulated phishing messages” because INKY will already know not to click on the links during analysis based on selecting “INKY Security Awareness Training (Powered by Wizer)” from above. If you do select this option, it could give away that these emails are different to end-users because they would no longer be rewritten by INKY.

M365 Allow Listing

Initial configuration within Microsoft 365 makes use of Advanced Delivery settings to ensure simulation emails are delivered directly to your email without an issue, read more about Advanced Deliver: https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/skip-filtering-phishing-simulations-sec-ops-mailboxes?view=o365-worldwide#use-the-microsoft-365-defender-portal-to-configure-third-party-phishing-simulations-in-the-advanced-delivery-policy.

  1. Navigate to https://security.microsoft.com/advanceddelivery?viewid=PhishingSimulation

  2. Select “Add” in the middle of the screen if there are currently no bypasses in place or “Edit” if available.

    1. Add the following IP Addresses:
      3.132.222.232
      100.21.157.149
      100.24.129.5
      104.236.69.186
      104.197.155.117
      104.131.52.111
      167.71.100.208
      64.225.56.248
      104.131.18.139

    2. Add the following Domains:
      ssuport.com
      supppot.com
      center-supports.com
      supoorts.com
      suporrt.com
      team-support.net
      supppot.net
      legal-user.com
      the-verification.com
      legals-team.com
      authenticatecenter.com
      ourlogin.co.uk
      mnminfo.com
      help-desc.com

  3. The select “Add.”

    Image Removed

Note

If a third-party Secure Email Gateway (SEG) is the primary MX record for your team, you should continue to the following steps to ensure Microsoft can find the appropriate IP addresses.

We’ll make use of Enhanced Filtering for Connects, also known as Skip listing, within Microsoft to allow you to filter email based on the actual source of messages that arrive over the connector. Enhanced Filtering skips the source IP addresses of the connector and looks back in the routing path to determine the actual source of the incoming messages. Learn more at Enhanced Filtering for Connectors.

  1. Navigate to https://security.microsoft.com/skiplisting

    Image Removed
  2. Select the appropriate inbound connector, in the example above I’ll choose “Secure Email Gateway Inbound Connector.

  3. Select the “Automatically detect and skip the last IP address” radial (recommended) or

  4. Select the “Skip these IP addresses…” radial and input the exact IP addresses from your Inbound gateway if you know the exact IP addresses it always uses.

  5. Finally Select “Apply to entire organization” then “Save

  6. (Optional) if you’d like to test with a small subset of users first you can select “Apply to small set of users” then select your users or groups and save but remember to apply to the entire organization when ready!

Google Workspace Configuration

Google Workspace configuration requires a managed list and specific spam setting to ensure messages get to the inbox without Google Workspace banners. To enable this configuration please follow the below steps.

  1. Navigate to https://admin.google.com/ac/apps/gmail/manageaddresslist

  2. Select “Add Address List”

  3. Name “INKY Security Awareness Training”

  4. Select “Bulk add Addresses”

  5. Copy the following comma separated list of domains
    ssuport.com,supppot.com,center-supports.com,supoorts.com,suporrt.com,team-support.net,supppot.net,legal-user.com,the-verification.com,legals-team.com,authenticatecenter.com,ourlogin.co.uk,mnminfo.com,help-desc.com

  6. Check the “Require sender authentication” checkbox

  7. Click “Add”

    Image Removed

  8. Save

  9. Navigate to Spam, phishing, and malware (google.com)

  10. Scroll to the Spam section and select configure or if there are already other rules add another rule.

  11. Name INKY Security Awareness Training

  12. Only Check “Bypass spam filters and hide warnings for messages from senders or domains in selected lists”

  13. Select “Use Existing List”

  14. Select “INKY Security Awareness Training”

  15. Save

    Image Removed

General Allow List

If you utilize a Secure Email Gateway (SEG) and or third-party firewalls, anti-virus, etc. that requires allow listing you should add all of the options below.

...

IP Addresses:
3.231.237.226
3.132.222.232
100.21.157.149
100.24.129.5
104.236.69.186
104.197.155.117
104.131.52.111
167.71.100.208
64.225.56.248
104.131.18.139

...

From Domains:
ssuport.com
supppot.com
center-supports.com
supoorts.com
suporrt.com
team-support.net
supppot.net
legal-user.com
the-verification.com
legals-team.com
authenticatecenter.com
ourlogin.co.uk
mnminfo.com
help-desc.com

...

Landing pages are only required for whitelisting in third-party email validation services (e.g. Proofpoint, Firewall, antiviruses, etc.):
authverificator.com
get-amazon.net
link-provider.com
officeyour.com
linkmyauth.com
verificator.net
authorisationservice.com
authorizationservice.com
e-authenticationservice.com
auth-provider.com
mylogin.ltd
providerer.net
nlmnxs.com
nlmns.com
authentification-provider.com
authentification-providerer.com
authentificationprovider.com
antiantivirusapp.com
applicationnewsletter.com
certificationvalidation.com
securitysender.com
e-mailverification.com

...

Step 2 - Configure your email provider to allow training emails

Follow the below instructions for M365 or Google Workspace to ensure mail is delivered to end users appropriately.

M365 Configuration - INKY Knowledge Base - Confluence (atlassian.net)

Google Workspace Configuration - INKY Knowledge Base - Confluence (atlassian.net)

Step 3 - General Allow List for Firewalls and AV

Add the general allow list to appropriate firewalls and AV appliances as applicable.

General Configuration (Firewalls, AVs, etc.) - INKY Knowledge Base - Confluence (atlassian.net)