Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Next »

Please double check the below list of IP Address and domains against the Wizer updated list here: Wizer IPs and Domains (wizer-training.com). Continue to follow the instructions below but ensure to include any additions found at the link above.

M365 Allow Listing

Initial configuration within Microsoft 365 makes use of Advanced Delivery settings to ensure simulation emails are delivered directly to your email without an issue, read more about Advanced Deliver: https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/skip-filtering-phishing-simulations-sec-ops-mailboxes?view=o365-worldwide#use-the-microsoft-365-defender-portal-to-configure-third-party-phishing-simulations-in-the-advanced-delivery-policy.

  1. Navigate to https://security.microsoft.com/advanceddelivery?viewid=PhishingSimulation

  2. Select “Add” in the middle of the screen if there are currently no bypasses in place or “Edit” if available.

    1. Add the following IP Addresses:

      3.132.222.232
      100.21.157.149
      100.24.129.5
      104.236.69.186
      104.197.155.117
      104.131.52.111
      167.71.100.208
      64.225.56.248
      104.131.18.139
    2. Add the following Domains:

      ssuport.com
      supppot.com
      center-supports.com
      supoorts.com
      suporrt.com
      team-support.net
      supppot.net
      legal-user.com
      the-verification.com
      legals-team.com
      authenticatecenter.com
      ourlogin.co.uk
      mnminfo.com
      help-desc.com
  3. The select “Add.”

If a third-party Secure Email Gateway (SEG) is the primary MX record for your team, you should continue to the following steps to ensure Microsoft can find the appropriate IP addresses.

We’ll make use of Enhanced Filtering for Connects, also known as Skip listing, within Microsoft to allow you to filter email based on the actual source of messages that arrive over the connector. Enhanced Filtering skips the source IP addresses of the connector and looks back in the routing path to determine the actual source of the incoming messages. Learn more at Enhanced Filtering for Connectors.

  1. Navigate to https://security.microsoft.com/skiplisting

  2. Select the appropriate inbound connector, in the example above I’ll choose “Secure Email Gateway Inbound Connector.

  3. Select the “Automatically detect and skip the last IP address” radial (recommended) or

  4. Select the “Skip these IP addresses…” radial and input the exact IP addresses from your Inbound gateway if you know the exact IP addresses it always uses.

  5. Finally Select “Apply to entire organization” then “Save

  6. (Optional) if you’d like to test with a small subset of users first you can select “Apply to small set of users” then select your users or groups and save but remember to apply to the entire organization when ready!

  • No labels