Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

Through a new partnership with Wizer Security Awareness Training and Phishing Simulation tool, INKY is proud to offer their vast catalogue of comprehensive and dynamic Security Awareness Training modules, along with comprehensive Phishing Simulation tools. This integration combines INKY's industry-leading phishing protection solution with Wizer's innovative training platform, empowering organizations to strengthen their defenses against evolving cyber threats. With a wide range of interactive training modules and realistic phishing simulations, businesses can now proactively educate their employees, foster a culture of security awareness, and significantly reduce the risk of falling victim to sophisticated phishing attacks.

Please contact your Account Executive directly or support@inky.com to get you setup with a 14-day free trial of INKY Security Awareness Training.

Initial Configuration

After receiving the Security Awareness Training welcome email, after reaching out to your Account Executive or support@inky.com, setup your initial account using the provided instructions.

INKY Settings Change

There are a few changes that ensure simulation emails run smoothly within INKY.

  1. Navigate to the INKY App Dashboard at Phishing Awareness Training - INKY (inkyphishfence.com)

  2. Select “INKY Security Awareness Training (Powered by Wizer)” from the Phishing Awareness Training Platforms list.

  3. Scroll down to the newly available settings and select:

    1. Always deliver simulated phishing messages to the user's Inbox (only applies if using INKY's Delivery Settings)

    2. Do not attach raw messages to reports for simulated phishing messages

    3. Send email notifications to different addresses when users report simulated phishing messages.

      1. Leave the text field empty if you don’t need to receive the report emails OR

      2. input an email address to receive the report emails.

  4. Select “Save Changes” at the bottom right corner.

You don’t need to select “Bypass link rewriting for all links in simulated phishing messages” because INKY will already know not to click on the links during analysis based on selecting “INKY Security Awareness Training (Powered by Wizer)” from above. If you do select this option, it could give away that these emails are different to end-users because they would no longer be rewritten by INKY.

M365 Allow Listing

Initial configuration within Microsoft 365 makes use of Advanced Delivery settings to ensure simulation emails are delivered directly to your email without an issue, read more about Advanced Deliver: https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/skip-filtering-phishing-simulations-sec-ops-mailboxes?view=o365-worldwide#use-the-microsoft-365-defender-portal-to-configure-third-party-phishing-simulations-in-the-advanced-delivery-policy.

  1. Navigate to https://security.microsoft.com/advanceddelivery?viewid=PhishingSimulation

  2. Select “Add” in the middle of the screen if there are currently no bypasses in place or “Edit” if available.

    1. Add the following IP Addresses:
      3.231.237.226
      3.132.222.232
      100.21.157.149
      100.24.129.5
      104.236.69.186
      104.197.155.117
      104.131.52.111
      167.71.100.208
      64.225.56.248
      104.131.18.139

    2. Add the following Domains:
      ssuport.com

      supppot.com

      center-supports.com

      supoorts.com

      suporrt.com

      team-support.net

      supppot.net

      legal-user.com

      the-verification.com

      legals-team.com

      authenticatecenter.com

      mnminfo.com

  3. The select “Add.”

If a third-party Secure Email Gateway (SEG) is the primary MX record for your team, you should continue to the following steps to ensure Microsoft can find the appropriate IP addresses.

We’ll make use of Enhanced Filtering for Connects, also known as Skip listing, within Microsoft to allow you to filter email based on the actual source of messages that arrive over the connector. Enhanced Filtering skips the source IP addresses of the connector and looks back in the routing path to determine the actual source of the incoming messages. Learn more at Enhanced Filtering for Connectors.

  1. Navigate to https://security.microsoft.com/skiplisting

  2. Select the appropriate inbound connector, in the example above I’ll choose “Secure Email Gateway Inbound Connector.

  3. Select the “Automatically detect and skip the last IP address” radial (recommended) or

  4. Select the “Skip these IP addresses…” radial and input the exact IP addresses from your Inbound gateway if you know the exact IP addresses it always uses.

  5. Finally Select “Apply to entire organization” then “Save

  6. (Optional) if you’d like to test with a small subset of users first you can select “Apply to small set of users” then select your users or groups and save but remember to apply to the entire organization when ready!

General Allow List

If you utilize a Secure Email Gateway (SEG) and or third-party firewalls, anti-virus, etc. that requires allow listing you should add all of the options below.

  • IP Addresses:
    3.231.237.226
    3.132.222.232
    100.21.157.149
    100.24.129.5
    104.236.69.186
    104.197.155.117
    104.131.52.111
    167.71.100.208
    64.225.56.248
    104.131.18.139

  • From Domains:
    ssuport.com

    supppot.com

    center-supports.com

    supoorts.com

    suporrt.com

    team-support.net

    supppot.net

    legal-user.com

    the-verification.com

    legals-team.com

    authenticatecenter.com

    mnminfo.com

  • Landing pages are only required for whitelisting in third-party email validation services (e.g. Proofpoint, Firewall, antiviruses, etc.):
    authverificator.com

    get-amazon.net

    link-provider.com

    officeyour.com

    linkmyauth.com

    verificator.net

    authorisationservice.com

    authorizationservice.com

    e-authenticationservice.com

    auth-provider.com

    providerer.net

    nlmnxs.com

    nlmns.com

    authentification-provider.com

    authentification-providerer.com

    authentificationprovider.com

    antiantivirusapp.com

    applicationnewsletter.com

    certificationvalidation.com

    securitysender.com

    e-mailverification.com

  • Video Hosting Settings. Domains to whitelist:
    In situations where all video or audio content is blocked, regardless of source, please allow listing the following domains will ensure the content comes through:
    *.wistia.com
    fast.wistia.net
    embed-fastly.wistia.com
    embedwistia-a.akamaihd.net
    akamai.net

  • No labels