Skip to main content

General Whitelisting

An outline of whitelisting for Jericho Security Phishing simulations

N
Written by Nate Hatcher
Updated over 6 months ago

How to whitelist

  • By IP Ranges of Email Servers

    • 50.31.156.96/27 (50.31.156.96 - 127)

    • 104.245.209.192/26 (104.245.209.192 - 255)

    • 50.31.205.204/30 (50.31.205.204 - 207)

  • By Email Header

    • Your Jericho Security technical contact will have a unique email header key and value for you.

  • By Domains

    • This is more difficult as Jericho Security offers many sender domains and often adds more.

Where to whitelist

  • Email Provider (e.g. Microsoft or Google), for both Spam and Phishing

  • Email Security Toolings (ProofPoint, Mimecast, Abnormal, Microsoft Defender, etc)

  • (Rarely Needed) Web Firewall

What to whitelist

  • Ensure Email Delivery

  • To avoid Inspection of Links in Emails (e.g. avoid URL Rewrite)

  • To Avoid Scanning Attachments in Emails

Did this answer your question?