Skip to main content
Skip table of contents

Whitelisting Guide - Partner Platform

Whitelisting Options

Client email whitelisting (allowing SoSafe senders and domain lists to bypass spam filters) is required to ensure the simulation emails reach your client employees' inboxes. In addition, this configuration will enable the client’s employees to access the learning pages they are supposed to see if they click on one of these simulated emails.

We suggest initiating this process early during client setup, as it requires a clear understanding of the current email security landscape and the necessary permissions for configuring these settings. Following these instructions ensures that our simulated phishing emails - and only those - can bypass your client’s email filters.

To allow partners to adapt to each client's technological stack and requirements, we offer two interchangeable whitelisting options: Header Token-Based and IP Address-Based.

image-20241209-153456.png

Only configure one of the approaches at a time for each client. Setting both Header Token-Based and IP Address-Based whitelisting may lead to misconfiguration, making troubleshooting much harder.

Header Token-Based Whitelisting

Email Header Token-Based whitelisting is a security method that controls which emails can reach employees' inboxes. It works like a secret password in the email's header information.

An email consists of the header and the body. The header usually contains information like the sender's address, IP address, the time the mail was sent, etc. Most of this information is stored in the header's code and is only visible if we examine the header and its properties. Email headers can be provided with a digital token that authenticates the sender. The receiving mail server verifies the signature using a public key stored on the DNS server.

This method offers a one-time configuration, provided the digital token remains unchanged. Consequently, when new phishing simulation templates are introduced, the client's Header Token-Based Whitelisting settings need not be updated in the future.

How do I set up Header Token-Based Whitelisting?

Get the Customer Key and Value:

  1. Go to the client settings in SoSafe’s Partner Platform and open the Whitelisting menu.

    image-20241212-073226.png

  2. From there, you can copy this client’s unique Customer Header Key and Customer Header Value, as shown in the example below.

    image-20241211-070909.png

The Header Key and Value needs to be unique for your company. We recommend using a UUID Generator tool to create the Header Value.

Microsoft 365 Header Token-Based Whitelisting:

In Microsoft 365, two mail flow rules need to be configured.

Bypass Clutter and Spam Filtering

To bypass the Clutter and Spam Filtering please follow these steps:

  1. Open the Office 365 Exchange admin center

  2. Under Mail flow, open the Rules menu, click +Add a rule, and then select the option Create a new rule

    image-20241211-093710.png
  1. Under New transport rule:

    1. Insert a descriptive name like “SoSafe Phish Simulation Bypass Clutter and Spam Filtering”

    2. In Apply this rule if, select the options The message headers… and includes any of these words and then:

      1. Enter the Custom Header Key from SoSafe’s Whitelisting Menu (“X-PARTNER-SAMPLECLIENT” in the above example) in specify header name

      2. Enter the Customer Header Value from SoSafe’s Whitelisting Menu (“f8073d7d-95e2-422e-a6c8-c58731125dca“ in the above example) in specify words or phrases

    3. In Do the following, select the option Modify the message properties and set the spam confidence level (SCL) to Bypass spam filtering

      image-20241211-094854.png

    4. Then, in Do the following, click the + sign
      i. Select the Modify the message properties and set a message header
      ii. Enter “X-MS-Exchange-Organization-BypassClutter“ and set the value to “true”

      image-20241211-095354.png

    5. Click Next

  1. Under Set rule settings, click Next

  2. Under Review and finish, click Next

Bypass the Junk Folder

To bypass the Junk Folder use the same flow from Bypass Clutter and Spam Filtering with the following steps:

  1. Open the Office 365 Exchange admin center

  2. Under Mail flow, open the Rules menu, click +Add a rule, and then select the option Create a new rule (the same flow as above)

  3. Under New transport rule:

    1. Insert a descriptive name like “SoSafe Phish Simulation Bypass the Junk Folder”

    2. In Apply this rule if, select the options The message headers… and includes any of these words and then:

      1. Enter the Custom Header Key from SoSafe’s Whitelisting Menu (“X-PARTNER-SAMPLECLIENT” in the above example) in specify header name

      2. Enter the Customer Header Value from SoSafe’s Whitelisting Menu (“f8073d7d-95e2-422e-a6c8-c58731125dca“ in the above example) in specify words or phrases

    3. In Do the following, select the option Modify the message properties and set the spam confidence level (SCL) to Bypass spam filtering

    4. Then, in Do the following, click the + sign

      i. Select the Modify the message properties and set a message header

      ii. Enter “X-Forefront-Antispam-Report“ and set the value to “SFV:SKI;”

      image-20241211-100202.png

e. Click Next

  1. Under Set rule settings, click Next

  2. Under Review and finish, click Next

Activate Mail Flow rules

The new mail flow rules are disabled by default. To enable the rules:

  1. Click on each rule name to open the details

  2. Then click the Enabled toggle

    image-20241211-101105.png

  3. Repeat this process for the second rule and check that both rules' status is Enabled.

    image-20241211-101353.png

IP Address-Based Whitelisting

IP Address-Based Whitelisting is a security method that ensures training emails come only from authorized sending servers, helping to distinguish legitimate training from actual phishing attempts.

It contains a list of approved IP addresses for SoSafe’s Phishing Simulation platform to avoid conflicts with regular email security systems.

The release of new phishing simulation templates may introduce new envelope senders or URL domain entries. This means that IP Address-Based configurations will need to be updated to guarantee that the new simulation emails can bypass the email security filters.

How do I set up IP Address-Based Whitelisting?

1. Get the Customer Key and Value:

Go to the client settings in SoSafe’s Partner Platform and open the Whitelisting menu.

From there, you can download the whitelisting guide (“SoSafe Whitelisting Manual.pdf”) by clicking on the Read how to do it button or email it to someone else by clicking on the Send button.

image-20241211-161720.png

2. Microsoft 365 IP Address-Based Whitelisting:

In Microsoft 365, to ensure that all simulated phishing emails reach their intended recipients, advanced delivery must be set up by following these steps:

  1. Open Microsoft 365 Defender

  2. Under Email & collaboration, select Policies & rules and then Threat policies

    image-20241212-064524.png

  1. Under Threat policies, go to the Rules group and select Advanced delivery

  2. Here, select the tab called Phishing simulation and then select Edit. A new window titled Edit third party phishing simulations will open

  3. In the corresponding fields, enter the whitelisting information provided in the “SoSafe Whitelisting Manual.pdf”, as follows:

    1. The domains provided under Envelope sender addresses (technical senders) belong in Sending Domain on the Microsoft page. Note that only the domain, the part after the @ (name@domain.com), should be added here, not the entire address.

    2. The IPv4 addresses provided under SoSafe mail servers belongs in Sending IP on the Microsoft page.

    3. The domains/URLs provided under List of used domains in the phishing links belong under Simulation URLs to allow on the Microsoft page. Please use the following format: "~example.com~".

      image-20241212-065612.png

  1. Select Save to finish the process. It may take some time for the changes to take effect.

Confirm Whitelisting configuration

Regardless of the whitelisting approach, because clients may have multi-layer security systems, it is paramount always to test that whitelisting is working as expected after the configuration.

To do so, send all test emails to an inbox that uses your client’s domain, then have the client check whether they were all received. In addition, the customer should check whether they are being forwarded to the micro-learning pages correctly when clicking the links.

  1. Go to the client settings in SoSafe’s Partner Platform and open the Whitelisting menu

  2. Click on the Test whitelisting button, and enter an email address belonging to the client’s email domain

    image-20241212-070022.png

  1. Open the client’s email to validate that the Phishing Simulation emails are in the inbox

  2. Then click on the email body links to confirm access to the micro-learning pages (like the example from below)

    image-20241212-071154.png

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.