Through a new partnership with Wizer Security Awareness Training and Phishing Simulation tool, INKY is proud to offer their vast catalogue of comprehensive and dynamic Security Awareness Training modules, along with comprehensive Phishing Simulation tools. This integration combines INKY's industry-leading phishing protection solution with Wizer's innovative training platform, empowering organizations to strengthen their defenses against evolving cyber threats. With a wide range of interactive training modules and realistic phishing simulations, businesses can now proactively educate their employees, foster a culture of security awareness, and significantly reduce the risk of falling victim to sophisticated phishing attacks.
Please contact your Account Executive directly or support@inky.com to get you setup with a 14-day free trial of INKY Security Awareness Training.
Initial Configuration
After receiving the Security Awareness Training welcome email, after reaching out to your Account Executive or support@inky.com, setup your initial account using the provided instructions.
INKY Settings Change
There are a few changes that ensure simulation emails run smoothly within INKY.
Navigate to the INKY App Dashboard at Phishing Awareness Training - INKY (inkyphishfence.com)
Select “INKY Security Awareness Training (Powered by Wizer)” from the Phishing Awareness Training Platforms list.
Scroll down to the newly available settings and select:
Always deliver simulated phishing messages to the user's Inbox (only applies if using INKY's Delivery Settings)
Do not attach raw messages to reports for simulated phishing messages
Send email notifications to different addresses when users report simulated phishing messages.
Leave the text field empty if you don’t need to receive the report emails OR
input an email address to receive the report emails.
Select “Save Changes” at the bottom right corner.
You don’t need to select “Bypass link rewriting for all links in simulated phishing messages” because INKY will already know not to click on the links during analysis based on selecting “INKY Security Awareness Training (Powered by Wizer)” from above. If you do select this option, it could give away that these emails are different to end-users because they would no longer be rewritten by INKY.
M365 Allow Listing
Initial configuration within Microsoft 365 makes use of Advanced Delivery settings to ensure simulation emails are delivered directly to your email without an issue, read more about Advanced Deliver: https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/skip-filtering-phishing-simulations-sec-ops-mailboxes?view=o365-worldwide#use-the-microsoft-365-defender-portal-to-configure-third-party-phishing-simulations-in-the-advanced-delivery-policy.
Navigate to https://security.microsoft.com/advanceddelivery?viewid=PhishingSimulation
Select “Add” in the middle of the screen if there are currently no bypasses in place or “Edit” if available.
Add the following IP Addresses:
3.231.237.226
3.132.222.232
100.21.157.149
100.24.129.5
104.236.69.186
104.197.155.117
104.131.52.111
167.71.100.208
64.225.56.248
104.131.18.139Add the following Domains:
ssuport.comsupppot.com
center-supports.com
supoorts.com
suporrt.com
team-support.net
supppot.net
legal-user.com
the-verification.com
legals-team.com
authenticatecenter.com
mnminfo.com
The select “Add.”
If a third-party Secure Email Gateway (SEG) is the primary MX record for your team, you should continue to the following steps to ensure Microsoft can find the appropriate IP addresses.
We’ll make use of Enhanced Filtering for Connects, also known as Skip listing, within Microsoft to allow you to filter email based on the actual source of messages that arrive over the connector. Enhanced Filtering skips the source IP addresses of the connector and looks back in the routing path to determine the actual source of the incoming messages. Learn more at Enhanced Filtering for Connectors.
Navigate to https://security.microsoft.com/skiplisting
Select the appropriate inbound connector, in the example above I’ll choose “Secure Email Gateway Inbound Connector.”
Select the “Automatically detect and skip the last IP address” radial (recommended) or
Select the “Skip these IP addresses…” radial and input the exact IP addresses from your Inbound gateway if you know the exact IP addresses it always uses.
Finally Select “Apply to entire organization” then “Save”
(Optional) if you’d like to test with a small subset of users first you can select “Apply to small set of users” then select your users or groups and save but remember to apply to the entire organization when ready!
General Allow List
If you utilize a Secure Email Gateway (SEG) and or third-party firewalls, anti-virus, etc. that requires allow listing you should add all of the options below.
IP Addresses:
3.231.237.226
3.132.222.232
100.21.157.149
100.24.129.5
104.236.69.186
104.197.155.117
104.131.52.111
167.71.100.208
64.225.56.248
104.131.18.139From Domains:
ssuport.comsupppot.com
center-supports.com
supoorts.com
suporrt.com
team-support.net
supppot.net
legal-user.com
the-verification.com
legals-team.com
authenticatecenter.com
mnminfo.com
Landing pages are only required for whitelisting in third-party email validation services (e.g. Proofpoint, Firewall, antiviruses, etc.):
authverificator.comget-amazon.net
link-provider.com
officeyour.com
linkmyauth.com
verificator.net
authorisationservice.com
authorizationservice.com
e-authenticationservice.com
auth-provider.com
providerer.net
nlmnxs.com
nlmns.com
authentification-provider.com
authentification-providerer.com
authentificationprovider.com
antiantivirusapp.com
applicationnewsletter.com
certificationvalidation.com
securitysender.com
e-mailverification.com
Video Hosting Settings. Domains to whitelist:
In situations where all video or audio content is blocked, regardless of source, please allow listing the following domains will ensure the content comes through:
*.wistia.com
fast.wistia.net
embed-fastly.wistia.com
embedwistia-a.akamaihd.net
akamai.net