Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

After receiving the Security Awareness Training welcome email, after reaching out to your Account Executive or support@inky.com, setup your initial account using the provided instructions.

Step 1 - INKY Settings Change

There are a few changes that ensure simulation emails run smoothly within INKY.

...

You don’t need to select “Bypass link rewriting for all links in simulated phishing messages” because INKY will already know not to click on the links during analysis based on selecting “INKY Security Awareness Training (Powered by Wizer)” from above. If you do select this option, it could give away that these emails are different to end-users because they would no longer be rewritten by INKY.

M365 Allow Listing

Initial configuration within Microsoft 365 makes use of Advanced Delivery settings to ensure simulation emails are delivered directly to your email without an issue, read more about Advanced Deliver: https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/skip-filtering-phishing-simulations-sec-ops-mailboxes?view=o365-worldwide#use-the-microsoft-365-defender-portal-to-configure-third-party-phishing-simulations-in-the-advanced-delivery-policy.

  1. Navigate to https://security.microsoft.com/advanceddelivery?viewid=PhishingSimulation

  2. Select “Add” in the middle of the screen if there are currently no bypasses in place or “Edit” if available.

    1. Add the following IP Addresses:
      3.132.222.232
      100.21.157.149
      100.24.129.5
      104.236.69.186
      104.197.155.117
      104.131.52.111
      167.71.100.208
      64.225.56.248
      104.131.18.139

    2. Add the following Domains:
      ssuport.com

      supppot.com

      center-supports.com

      supoorts.com

      suporrt.com

      team-support.net

      supppot.net

      legal-user.com

      the-verification.com

      legals-team.com

      authenticatecenter.com

      mnminfo.com

  3. The select “Add.”

    Image Removed

Note

If a third-party Secure Email Gateway (SEG) is the primary MX record for your team, you should continue to the following steps to ensure Microsoft can find the appropriate IP addresses.

We’ll make use of Enhanced Filtering for Connects, also known as Skip listing, within Microsoft to allow you to filter email based on the actual source of messages that arrive over the connector. Enhanced Filtering skips the source IP addresses of the connector and looks back in the routing path to determine the actual source of the incoming messages. Learn more at Enhanced Filtering for Connectors.

  1. Navigate to https://security.microsoft.com/skiplisting

    Image Removed
  2. Select the appropriate inbound connector, in the example above I’ll choose “Secure Email Gateway Inbound Connector.

  3. Select the “Automatically detect and skip the last IP address” radial (recommended) or

  4. Select the “Skip these IP addresses…” radial and input the exact IP addresses from your Inbound gateway if you know the exact IP addresses it always uses.

  5. Finally Select “Apply to entire organization” then “Save

  6. (Optional) if you’d like to test with a small subset of users first you can select “Apply to small set of users” then select your users or groups and save but remember to apply to the entire organization when ready!

General Allow List

If you utilize a Secure Email Gateway (SEG) and or third-party firewalls, anti-virus, etc. that requires allow listing you should add all of the options below.

...

IP Addresses:
3.231.237.226
3.132.222.232
100.21.157.149
100.24.129.5
104.236.69.186
104.197.155.117
104.131.52.111
167.71.100.208
64.225.56.248
104.131.18.139

...

From Domains:
ssuport.com

supppot.com

center-supports.com

supoorts.com

suporrt.com

team-support.net

supppot.net

legal-user.com

the-verification.com

legals-team.com

authenticatecenter.com

mnminfo.com

...

Landing pages are only required for whitelisting in third-party email validation services (e.g. Proofpoint, Firewall, antiviruses, etc.):
authverificator.com

get-amazon.net

link-provider.com

officeyour.com

linkmyauth.com

verificator.net

authorisationservice.com

authorizationservice.com

e-authenticationservice.com

auth-provider.com

providerer.net

nlmnxs.com

nlmns.com

authentification-provider.com

authentification-providerer.com

authentificationprovider.com

antiantivirusapp.com

applicationnewsletter.com

certificationvalidation.com

securitysender.com

e-mailverification.com

...

Step 2 - Configure your email provider to allow training emails

Follow the below instructions for M365 or Google Workspace to ensure mail is delivered to end users appropriately.

M365 Configuration - INKY Knowledge Base - Confluence (atlassian.net)

Google Workspace Configuration - INKY Knowledge Base - Confluence (atlassian.net)

Step 3 - General Allow List for Firewalls and AV

Add the general allow list to appropriate firewalls and AV appliances as applicable.

General Configuration (Firewalls, AVs, etc.) - INKY Knowledge Base - Confluence (atlassian.net)