Self-service whitelisting
Several things must be done to allow our simulated phishing emails reach your employees' inboxes (also known as whitelisting or allowlisting). In addition, this will enable your employees to access the learning pages they are supposed to see if they do click on one of these emails.
Following our instructions ensures that our simulated phishing emails - and only those - can bypass your email filters. Your next steps depend on whether you're using Microsoft 365 or Google Workspace, and whether you plan to enable Direct Message Injection (DMI). We recommend doing so, as it makes the process considerably more convenient.
Direct Message Injection (DMI) is a method of delivering simulated phishing emails directly to users' inboxes without routing them through email gateways. This significantly reduces the complexity of whitelisting and eliminates the chance of filters blocking or flagging our emails. DMI ensures consistent delivery and faster deployment.
As an alternative to DMI, you can use traditional whitelisting. This approach involves configuring your email system to recognize and allow messages from specific IP addresses, domains, or senders. While it can be effective, it typically involves a more complex setup, ongoing maintenance, and a greater risk of our emails being quarantined or flagged as spam.
You can find the relevant instructions here: