HowTo: Allow-List CyberHoot’s Mail-Relay IP Address – Mimecast

21st June 2025 | HowTo, Technology HowTo: Allow-List CyberHoot’s Mail-Relay IP Address – Mimecast

This article will walk you through setting up allow list in Mimecast. The required IP address and Domain name information is found in this HowTo article:

CyberHoot Email-Relay IP Addresses, Domains, and Allow-Listing Articles

 

 

 

 

CyberHoot — HowTo Guide
HowTo • Technology • MSP

HowTo: Allow-List CyberHoot in Mimecast

February 2026

If you’re using Mimecast as your email security gateway, you’ll need to create several allow-list policies so CyberHoot’s simulated phishing emails and training notifications reach your users’ inboxes. Without these policies, Mimecast may rewrite URLs (breaking DKIM authentication), pre-fetch links (causing false click reports), block attachments, or quarantine messages entirely.

CyberHoot Sending IPs & Domains

You’ll need these values for the Source IP Ranges field in every policy below. For the most up-to-date list, see CyberHoot’s Email-Relay IP Addresses & Domains.

DNS Domain Name IP Address
docunotice.com 23.20.251.170/32
messagecenters.net 52.7.191.238/32
securedinbox.net 52.6.6.155/32
notificationhub.net 18.213.175.22/32

Mimecast Policies

1. Anti-Spoofing Policy

This policy allows CyberHoot to send simulated phishing emails that appear to come from an email address at your domain.

  1. Log in to the Mimecast Administration Console.
  2. Click the Administration toolbar button.
  3. Select Gateway > Policies.
  4. Select Anti-Spoofing from the list of policies.
  5. Click New Policy.
  6. Configure the appropriate settings under the Options, Emails From, Emails To, and Validity sections. For help with these settings, see Mimecast’s Configuring an Anti-Spoofing Policy article.
  7. In the Source IP Ranges field, enter CyberHoot’s IP addresses listed in the table above.
  8. Click Save and Exit.

2. Permitted Senders Policy

This policy ensures CyberHoot’s phishing and training-related emails bypass Mimecast’s reputation checks, greylisting, and spam scanning, avoiding rejection or placement in the hold queue.

⚠️ Important: Do not edit your default Permitted Sender Policy. You must create a new one.
  1. Log in to the Mimecast Administration Console.
  2. Click the Administration toolbar button.
  3. Select Gateway > Policies.
  4. Select Permitted Senders from the list of policies.
  5. Click New Policy.
  6. Configure the appropriate settings under the Options, Emails From, Emails To, and Validity sections. For more guidance, see Mimecast’s Configuring a Permitted Senders Policy article.
  7. In the Source IP Ranges field, enter CyberHoot’s IP addresses listed in the table above.
  8. Click Save and Exit.

3. URL Protection Bypass Policy

Mimecast’s URL Protection service scans and rewrites links in emails upon delivery. This can cause two problems for phishing simulations:

  • False click reports — Mimecast pre-fetches and scans every link, which CyberHoot’s tracking system registers as user clicks.
  • Broken DKIM authentication — URL rewriting modifies the email body, invalidating the original DKIM signature.
💡 This is the most critical policy for resolving false click issues. If all of your phish test results show every user clicking, this policy is almost certainly the fix.
  1. Log in to the Mimecast Administration Console.
  2. Click the Administration toolbar button.
  3. Select Gateway > Policies.
  4. Select URL Protection Bypass from the list of policies.
  5. Click New Policy.
  6. Configure the appropriate settings under the Options, Emails From, Emails To, and Validity sections. Under Options, ensure Policy Override is selected. For more information, see Mimecast’s Configuring a URL Protection Bypass Policy article.
  7. In the Source IP Ranges field, enter CyberHoot’s IP addresses listed in the table above.
  8. Click Save and Exit.

4. Impersonation Protection Bypass Policy

If you’re sending phishing simulations that appear to come from users or domains that look like they are internal to your organization, you’ll need to create an Impersonation Protection Bypass Policy.

  1. Log in to the Mimecast Administration Console.
  2. Click the Administration toolbar button.
  3. Select Gateway > Policies.
  4. Select Impersonation Protection Bypass from the list of policies.
  5. Click New Policy.
  6. Configure the appropriate settings under the Options, Emails From, Emails To, and Validity sections. For more guidance, see Mimecast’s Configuring an Impersonation Protection Bypass Policy article.
  7. Under Options > Select Option, select the Impersonation Protection definition you want to bypass.
  8. In the Source IP Ranges field, enter CyberHoot’s IP addresses listed in the table above.
  9. Click Save and Exit.
⚠️ Note: If you have multiple Impersonation Protection definitions, you must create a separate bypass policy for each one.

5. Attachment Protection Bypass Policy

If you plan to include attachments in your phishing simulations, this policy increases the likelihood that those attachments reach users successfully.

⚠️ Note: Mimecast may still block certain attachments. Always conduct a test after creating this policy to verify successful delivery.
  1. Log in to the Mimecast Administration Console.
  2. Click the Administration toolbar button.
  3. Select Gateway > Policies.
  4. Select Attachment Protection Bypass from the list of policies.
  5. Click New Policy.
  6. Configure the appropriate settings under the Options, Emails From, Emails To, and Validity sections. For more information, see Mimecast’s Configuring Attachment Protection Bypass Policies article.
  7. In the Source IP Ranges field, enter CyberHoot’s IP addresses listed in the table above.
  8. Click Save and Exit.

6. Attachment Management Bypass Policy

This policy prevents Mimecast from stripping attachments from your phishing simulation emails, which may otherwise impact your test results.

  1. Log in to the Mimecast Administration Console.
  2. Click the Administration toolbar button.
  3. Select Gateway > Policies.
  4. Select Attachment Management Bypass from the list of policies.
  5. Click New Policy.
  6. Configure the appropriate settings under the Options, Emails From, Emails To, and Validity sections. For more information, see Mimecast’s Configuring Attachment Management Bypass Policies article.
  7. In the Source IP Ranges field, enter CyberHoot’s IP addresses listed in the table above.
  8. Click Save and Exit.

7. Greylisting Bypass Policy

This policy prevents CyberHoot emails from being deferred due to Mimecast’s greylisting checks.

  1. Log in to the Mimecast Administration Console.
  2. Click the Administration toolbar button.
  3. Select Gateway > Policies.
  4. Select Greylisting from the list of policies.
  5. Click New Policy.
  6. Configure the appropriate settings under the Options, Emails From, Emails To, and Validity sections. For more information, see Mimecast’s Configuring Greylisting Policies article.
  7. In the Source IP Ranges field, enter CyberHoot’s IP addresses listed in the table above.
  8. Click Save and Exit.

Managed URLs (If URL Protection Bypass Isn’t Enough)

We have seen cases where, despite having a URL Protection Bypass Policy in place, Mimecast still strips links from phishing simulation emails, preventing click actions from being recorded.

Per Mimecast Support, the recommended fix is to add the CyberHoot sending domains as Managed URLs. This is necessary because emails reported through Mimecast’s End User Reporting send the actual URL to Mimecast from your domain, so the URLs need to be allow-listed separately.

Steps:

  1. In the Mimecast Administration Console, navigate to:
    Email Security > URL Protection > URL Tools > Managed URLs > Add Managed URLs
  2. Add each CyberHoot sending domain in the following format:
    http://*.docunotice.com
    http://*.messagecenters.net
    http://*.securedinbox.net
    http://*.notificationhub.net
  3. Click Save.

After Setup: Test Your Configuration

We recommend setting up a test phishing campaign to yourself or a small group before sending to all users. This ensures:

  • Emails arrive in the inbox (not quarantined or junked)
  • URLs are not rewritten by Mimecast
  • Clicks are only recorded from real user interaction, not automated scanners
  • Attachments (if used) are delivered intact

Please allow time for new policies to propagate before testing.

💡 Also using Microsoft 365? If Mimecast delivers to Microsoft 365, you’ll also need to configure allow-listing on the Microsoft side. See our M365 Allow-Listing Guide and PowerShell Script for Safe Links.

If you are looking for more assistance, head to our HowTo Library, or contact support@cyberhoot.com.

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Sneaky Browser Extensions Are Hijacking ChatGPT Sessions

Sneaky Browser Extensions Are Hijacking ChatGPT Sessions

Cyberattacks usually start with phishing emails or weak passwords. This one did not. Security researchers...

Read more
Cybersecurity Leader Uploads Sensitive Files to AI

Cybersecurity Leader Uploads Sensitive Files to AI

Not surprising when Trouble Ensues Last summer, the interim head of a major U.S. cybersecurity agency uploaded...

Read more
Common Google Workspace Security Gaps

Common Google Workspace Security Gaps

And How to Fix Them Let me make an educated guess. You moved to Google Workspace because it was supposed to...

Read more