HowTo: Allow-List in Perception Point

14th January 2026 | HowTo, MSP, Platform, Technology HowTo: Allow-List in Perception Point

CyberHoot – Perception Point Allowlisting Instructions

Organizations using Perception Point for email security should allowlist CyberHoot to ensure reliable delivery of security awareness training emails and simulated phishing campaigns. Adding CyberHoot’s approved sender IP addresses and domains to the Perception Point allowlist helps prevent message filtering, blocking, or false positives—ensuring all users receive required communications.

Follow the steps below to complete the allowlisting configuration.

1. Configure Sender IP Allowlist

  1. Log in to the Perception Point Dashboard.
  2. From the left navigation menu, select Detection Setup → Allow List / Block List.
  3. To the right of Sender IP Allow List, click Add IP.
  4. Configure the allowlist entry as follows:
    • Organization: Select the organization to which this rule should apply.
    • Sender IP: Enter one of the following IP addresses.

Note: A separate allowlist rule is required for each IP address.

  1. 54.240.125.36/32
  2. 54.240.125.37/32
  3. 23.20.251.170/32
  4. 52.7.191.238/32
  5. 52.6.6.155/32
  6. 18.213.175.22/32
  7. Verdict: Select No review – always allow.
  8. Click Add Sender IP.
  9. Repeat steps 3–5 for each remaining IP address.

2. Configure URL Allowlist

  1. Log in to the Perception Point Dashboard.
  2. Navigate to Detection Setup → Allow List / Block List.
  3. To the right of URL Allow List, click Add URL.
  4. Configure the allowlist entry as follows:
    • Organization: Select the organization to which this rule should apply.
    • URL: Enter one of the following domains.

Note: A separate allowlist rule is required for each domain.

  1. cyberhoot.com
  2. docunotice.com
  3. messagecenters.net
  4. securedinbox.net
  5. notificationhub.net
  6. Method: Select Domain ends with
    (This ensures all required subdomains used for training delivery and phishing simulations are permitted.)
  7. Verdict: Select No review – always allow.
  8. Click Add URL.
  9. Repeat steps 3–5 for each remaining domain.

Completion

That’s it! Once these allowlist entries are in place, CyberHoot training and phishing simulation emails should be delivered without interruption. If you encounter any issues, refer to Perception Point’s official documentation or contact their support team for additional assistance.

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Cybercriminals Are Exploiting DocuSign with Customizable Phishing Templates

Cybercriminals Are Exploiting DocuSign with Customizable Phishing Templates

DocuSign has become one of the most trusted tools in modern business. Contracts, HR paperwork, NDAs, vendor...

Read more
PromptSpy: The Android Malware That Hired an AI Assistant

PromptSpy: The Android Malware That Hired an AI Assistant

And yes, Google's Gemini AI had no idea it was working for the bad guys. Malware has always followed a script....

Read more
Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware groups are not breaking in organizations the same way they did five years ago. The entry methods have...

Read more