...
After receiving the Security Awareness Training welcome email, after reaching out to your Account Executive or support@inky.com, setup your initial account using the provided instructions.
Step 1 - INKY Settings Change
There are a few changes that ensure simulation emails run smoothly within INKY.
...
You don’t need to select “Bypass link rewriting for all links in simulated phishing messages” because INKY will already know not to click on the links during analysis based on selecting “INKY Security Awareness Training (Powered by Wizer)” from above. If you do select this option, it could give away that these emails are different to end-users because they would no longer be rewritten by INKY.
M365 Allow Listing
Initial configuration within Microsoft 365 makes use of Advanced Delivery settings to ensure simulation emails are delivered directly to your email without an issue, read more about Advanced Deliver: https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/skip-filtering-phishing-simulations-sec-ops-mailboxes?view=o365-worldwide#use-the-microsoft-365-defender-portal-to-configure-third-party-phishing-simulations-in-the-advanced-delivery-policy.
Navigate to https://security.microsoft.com/advanceddelivery?viewid=PhishingSimulation
Select “Add” in the middle of the screen if there are currently no bypasses in place or “Edit” if available.
Add the following IP Addresses:
3.132.222.232
100.21.157.149
100.24.129.5
104.236.69.186
104.197.155.117
104.131.52.111
167.71.100.208
64.225.56.248
104.131.18.139Add the following Domains:
ssuport.comsupppot.com
center-supports.com
supoorts.com
suporrt.com
team-support.net
supppot.net
legal-user.com
the-verification.com
legals-team.com
authenticatecenter.com
mnminfo.com
The select “Add.”
Note |
---|
If a third-party Secure Email Gateway (SEG) is the primary MX record for your team, you should continue to the following steps to ensure Microsoft can find the appropriate IP addresses. |
We’ll make use of Enhanced Filtering for Connects, also known as Skip listing, within Microsoft to allow you to filter email based on the actual source of messages that arrive over the connector. Enhanced Filtering skips the source IP addresses of the connector and looks back in the routing path to determine the actual source of the incoming messages. Learn more at Enhanced Filtering for Connectors.
Navigate to https://security.microsoft.com/skiplisting
Select the appropriate inbound connector, in the example above I’ll choose “Secure Email Gateway Inbound Connector.”
Select the “Automatically detect and skip the last IP address” radial (recommended) or
Select the “Skip these IP addresses…” radial and input the exact IP addresses from your Inbound gateway if you know the exact IP addresses it always uses.
Finally Select “Apply to entire organization” then “Save”
(Optional) if you’d like to test with a small subset of users first you can select “Apply to small set of users” then select your users or groups and save but remember to apply to the entire organization when ready!
General Allow List
If you utilize a Secure Email Gateway (SEG) and or third-party firewalls, anti-virus, etc. that requires allow listing you should add all of the options below.
...
IP Addresses:
3.231.237.226
3.132.222.232
100.21.157.149
100.24.129.5
104.236.69.186
104.197.155.117
104.131.52.111
167.71.100.208
64.225.56.248
104.131.18.139
...
From Domains:
ssuport.com
supppot.com
center-supports.com
supoorts.com
suporrt.com
team-support.net
supppot.net
legal-user.com
the-verification.com
legals-team.com
authenticatecenter.com
mnminfo.com
...
Landing pages are only required for whitelisting in third-party email validation services (e.g. Proofpoint, Firewall, antiviruses, etc.):
authverificator.com
get-amazon.net
link-provider.com
officeyour.com
linkmyauth.com
verificator.net
authorisationservice.com
authorizationservice.com
e-authenticationservice.com
auth-provider.com
providerer.net
nlmnxs.com
nlmns.com
authentification-provider.com
authentification-providerer.com
authentificationprovider.com
antiantivirusapp.com
applicationnewsletter.com
certificationvalidation.com
securitysender.com
e-mailverification.com
...
Step 2 - Configure your email provider to allow training emails
Follow the below instructions for M365 or Google Workspace to ensure mail is delivered to end users appropriately.
M365 Configuration - INKY Knowledge Base - Confluence (atlassian.net)
Google Workspace Configuration - INKY Knowledge Base - Confluence (atlassian.net)
Step 3 - General Allow List for Firewalls and AV
Add the general allow list to appropriate firewalls and AV appliances as applicable.
General Configuration (Firewalls, AVs, etc.) - INKY Knowledge Base - Confluence (atlassian.net)