HowTo: Allow-List in MailProtector

11th September 2025 | HowTo, MSP, Platform, Technology HowTo: Allow-List in MailProtector

This HowTo article explains how to configure Allow Listing rules in to allow Attack Phishing tests to reach end users using MailProtector.

Warning: CyberHoot supports fake email Attack-Phishing for customers.  Please keep in mind this approach uses negative reinforcement to reduce click rates in employees.  To be successful, always pair with Positive Reinforcement, educational, and realistic HootPhish phishing simulations for the best Affect and Effect on end users.

Steps for Allow-Listing DNS Domain Names:

1.) Access the MailProtector site at https://emailservice.io/signin

2.) Select the Domains tab

3.) Select the domain you wish to configure allow-listing rules.

4.) Select the Filtering tab

5.) You will see Allow rules (inbound only), from there, you can input CyberHoot’s DNS Domain names easily on the right hand side under “Always allow emails from” input box. Then click “Add” to add the domains.
For a full list of our DNS Domain names, follow this link: https://cyberhoot.com/howto/cyberhoots-email-ip-addresses-and-hostnames/

MailProtector only needs the DNS Domain names to allow-list as they don’t accept IP Addresses to allow-list. But once you have set up all of CyberHoot’s DNS Domain names then you are good to go!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Claude Mythos Opened Pandora’s Box. Project Glasswing Is Racing to Close It.

Claude Mythos Opened Pandora’s Box. Project Glasswing Is Racing to Close It.

A Practical Brief for vCISOs THE WARNING WE IGNORED OR COULD NOT UNDERSTAND For years, the most credible...

Read more
When the “CEO” Calls and Asks You to Move Money Fast

When the “CEO” Calls and Asks You to Move Money Fast

A guide to spotting senior executive impersonation scams before the fake CEO gets a real wire transfer. It...

Read more
When the Attack Looks Just Like You

When the Attack Looks Just Like You

Artificial Intelligence (or AI) is making phishing emails smarter, malware sneakier, and credential theft easier...

Read more