HowTo: Allow-List in MailProtector

11th September 2025 | HowTo, MSP, Platform, Technology HowTo: Allow-List in MailProtector

This HowTo article explains how to configure Allow Listing rules in to allow Attack Phishing tests to reach end users using MailProtector.

Warning: CyberHoot supports fake email Attack-Phishing for customers.  Please keep in mind this approach uses negative reinforcement to reduce click rates in employees.  To be successful, always pair with Positive Reinforcement, educational, and realistic HootPhish phishing simulations for the best Affect and Effect on end users.

Steps for Allow-Listing DNS Domain Names:

1.) Access the MailProtector site at https://emailservice.io/signin

2.) Select the Domains tab

3.) Select the domain you wish to configure allow-listing rules.

4.) Select the Filtering tab

5.) You will see Allow rules (inbound only), from there, you can input CyberHoot’s DNS Domain names easily on the right hand side under “Always allow emails from” input box. Then click “Add” to add the domains.
For a full list of our DNS Domain names, follow this link: https://cyberhoot.com/howto/cyberhoots-email-ip-addresses-and-hostnames/

MailProtector only needs the DNS Domain names to allow-list as they don’t accept IP Addresses to allow-list. But once you have set up all of CyberHoot’s DNS Domain names then you are good to go!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

That DocuSign Email Probably Isn’t From DocuSign

That DocuSign Email Probably Isn’t From DocuSign

Your inbox sees dozens of emails every day that look completely routine. A DocuSign notification fits right in. A...

Read more
PromptSpy: The Android Malware That Hired an AI Assistant

PromptSpy: The Android Malware That Hired an AI Assistant

And yes, Google's Gemini AI had no idea it was working for the bad guys. Malware has always followed a script....

Read more
Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware groups are not breaking in organizations the same way they did five years ago. The entry methods have...

Read more