Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

INKY tracks Phishing Simulation emails from third party providers, such as KnowBe4, in a specific fashion in order to ensure that we’re not letting emails through inadvertently. The phishing simulation emails sent from KnowBe4, and the training emails are sent out of different infrastructure points. This means that the INKY bypass that’s in place for KnowBe4 phishing simulation emails will not automatically special handling to training emails.

If you’re receiving Red, Danger, banners showing a Spoofed Internal Sender result for KnowBe4 training emails please follow the below instructions to make the fix.

Option 1:

  1. Navigate to the message using the Observations - INKY (inkyphishfence.com) page

  2. Find the given message that’s currently marked as a Spoofed Internal Sender and click it to bring up the observation detail view. It’ll look like the below screenshot.

  3. Use the Policy Action dropdown and select.

    1. “Add training.knowbe4.com as a trusted third-party sender for domain.com”

...

Option 2:

  1. Navigate to the Trusted Third-Party Senders settings directly here: Analysis - INKY (inkyphishfence.com)

  2. Map your domains to training.knowbe4.com directly such as the example below. If my internal domain is polvocapital.com it would look like the below: “polvocapital.com: training.knowbe4.com

...