Skip to main content

New PageHow to Whitelist by IP Address in Office 365 and by Domain in Microsoft Defender for Office 365 Portal

Why Whitelist in Office 365?

Whitelisting ensures the CyTech phishing simulation (PS) functions without issue and prevents PS emails from being automatically moved to the spam folder or notifying users about potential phishing emails. The Connection Filter Policy and Spam Filtering both required to be whitelisted.

Whitelist Connection Filter Policy

The Office 365 Exchange Connection Filter identifies good or bad source email servers by their IP addresses. The actions below will allow all emails from CyTech IP addresses to be received.

Whitelist the Connection Filter Policy

1. Go to the https://security.microsoft.com/antispam

2. Click on "Connection filter policy"

3. Then click on "Edit connection filter policy"

image.png

4. Add the IPs to the "Always allow messages from the following IP addresses or address range" input, one by one:

a-adobe.com

accountsgoogle.me

airbnd.cc

attlassians.com

dropboox.site

eebbey.com

gitllb.com

instegram.org

lastpasss.net

llinkedln.co

my1psswords.com

netpaypal.com

offficce.com

onedriives.com

partnrportalludeemy.com

slackj.com

ttrelli.com

zooms.cc

5. Click on the "Save" button (refer to the screenshot below which depicts how the fields are populated with multiple IPs, the relevant list of IP addresses is always represented in the abovementioned list)

image.png

Allow IP: 35.153.237.243

Whitelist Spam Filtering

All mail systems have spam filtering. As the CyTech PS emails are "phishing: by definition, the Microsoft spam filter must be whitelisted. The steps below outline how to disable all spam checks for CyTech PS emails, so you won't experience issues with 100% clicked and 100% opened emails, even if the users don't click on them.

Steps to Whitelist the Spam Filtering

1. Go to the https://admin.exchange.microsoft.com/#/transportrules

2. Click on the plus sign → "Create a new rule"

image.png

3. Give the rule a name, such as "CyTech Spam Filtering"

4. Click on "Apply this rule if → The sender → IP address is in any of these ranges or exactly matches"

image.png

5. Specify the IP addresses in the field IP: 35.153.237.243

image.png

Please do not forget to click on "Save"

6. Click on "Do the following → Modify the message properties → Set a

Message Header"

7. Choose the "Enter text" buttons by the right side of the "Do the following" field

and enter these values: "-MS-Exchange-Organization-BypassClutter" and "true"

image.png

8. Click on the "+" sign, to add another rule condition

9. Choose "Modify the message properties → Set the spam confidence level (SCL)"

to... and select "Bypass Spam Filtering", which will set the value of SCL to -1

image.png

10. Click on the "Next" button

11. Leave the Set Rule settings as is and proceed to the Review and finish window and save the rule.

12. Your final Completed Mail Flow Rule screen should look as below:

image.png

Please make sure the rule is Enabled, and priority is set to 0.

Whitelist ATP by email header for mail filtering.

Whitelisting ATP by email header is recommended if you have a mail filter in front of your mail server

To configure the mail flow rule to bypass ATP link processing by header: 1. Navigate to https://admin.exchange.microsoft.com/#/transportrules

2. Create a new rule & name it "Bypass ATP Links". (this is an example name, as it can be set as desired)

3. In the "Apply this rule if" condition select The message headers and then select "includes any of these words"

4. In the Enter text type the header name X-TestPhish.

5. In the Enter words type in CyTech

6. In the "Do the following" condition select "Modify the message properties" and "set a message header"

7. Insert below into the "Enter text" fields:

· Click the first *Enter text... link and set the message header to X-MS-Exchange-Organization-SkipSafeLinksProcessing

· Click the second *Enter text... link and set the value to 1

Please refer to the below screenshot which illustrates how should the configuration look like:

image.png

Set the rule settings according to your needs in the next tab, and in the Review and finish tab, press Finish.

Whitelist Using Advanced Delivery Policies in Microsoft Defender for Office 365 1. In the Microsoft 365 Defender portal at https://security.microsoft.com, go to Email & Collaboration > Policies & Rules > Threat policies > Advanced delivery in the Rules section.

Alternatively, you can use the following link https://security.microsoft.com/advanceddelivery to navigate directly to the Advanced delivery page.

2. In the Advanced delivery menu, navigate to the Phishing simulation tab and press Edit to either add new or configure existing values (refer to the screenshot below).

image.png

3. On the Edit third-party phishing simulation menu that opens, configure the following settings:

Domain: Expand this setting and enter at least one email address domain by clicking in the box, entering a value, and then pressing Enter or selecting the value that's displayed below the box. Repeat this step as many times as necessary. You can add up to 20 entries.

Edit third party phishing simulations

Phishing simulations are attacks orchestrated by your security team and used for training and learning. Simulations can help identify vulnerable users and lessen the impact of malicious attacks on your organization.

Third-party phishing simulations require at least one Sending domain entry [source domain or DKIM] AND at least one Sending IP entry. Simulations URLs to allow entries are optional, and prevent the simulated phishing URLs from being blocked at time of click.

image.png

Sending IP: Expand this setting and enter at least one valid IPv4 address by clicking in the box, entering a value, and then pressing Enter or selecting the value that's displayed below the box. Repeat this step as many times as necessary. You can add up to 10 entries.

Valid values are:

Single IP: For example, 192.168.1.1.

IP range: For example, 192.168.0.1-192.168.0.254.

CIDR IP: For example, 192.168.0.1/25.

Simulation URLs to allow: Expand this setting and optionally enter specific URLs that are part of your phishing simulation campaign that should not be blocked or detonated by clicking in the box, entering a value, and then pressing Enter or selecting the value that's displayed below the box.

For the URL syntax format, see URL syntax for the Tenant Allow/Block List (opens in a new tab). These URLs are wrapped at the time of the click, but they aren't blocked.

When you're finished, you can click Add, and click close afterward if this was a first-time addition, or if you were editing existing values click Save and then click Close. 

  • https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/tenant-allow-block-list-about?view=o365-worldwide#url-syntax-for-the-tenant-allowblock-list