If you’re using Proofpoint’s spam filtering software, you can safelist (whitelist) CyberHoot to allow your users to receive our simulated attack-based phish testing emails.
CyberHoot Mail Relays to Add to your Allow-Lists
Allow-Listing By IP Address (preferred)
- From your Proofpoint admin center, navigate to Email Firewall, then Rules.
- Be sure to select the On radio button for Enable, under Rule Settings.
- Name your rule ID something descriptive, such as “CyberHoot Allow-Listing by IP Address,” and provide a summary of the rule such as “Enable Attack-Based Phish Testing for CyberHoot Sending Mail servers”
- In the “Conditions” section you will allow list CyberHoot by IP address using the “Add Condition” button. You can find our IP addresses for phishing and training emails in this article or find them at the end of this article below.
- Under “Dispositions”, change the Delivery Method from the default selection to Deliver Now.
- Be sure to save your rule and allow time for this new setting to propagate before testing.
Please Note: if you are using URL Defense in your ProofPoint, be sure to also enable a bypass for CyberHoot in URL defenses. See below for details.
Allow-listing in ProofPoint Essentials
The below instructions apply to allow-listing in ProofPoint Essentials.
- Go to Security Settings > Email > Sender Lists.
- Inside the Safe Sender list, enter the Portal IP addresses, found in this article.
- Click the Save button.
Allow-listing in ProofPoint Enterprise
- From your ProofPoint Enterprise Admin console, click on Email Protection.
- Select the Organizational Safe List option, located under Spam Protection.
- Click the Add button.
- A popup will appear, labeled Proofpoint – Global Safe. Use the following information in this popup:
- Filter Type: select Sender Hostname.
- Operator: select Equals.
- Value: enter the Portal IP addresses listed in this article.
- Click ‘Save Changes’.
URL Defense:
NOTE: We also recommend that you add CyberHoot’s sending mail relay IP addresses to Proofpoint’s URL Defense (this will help prevent any issues with ProofPoint’s Targeted Attack Protection). Here are instructions on adding Portal’s IP addresses to ProofPoint’s Targeted Attack Protection:
- From your Proofpoint Essentials Admin console, click Email Protection.
- Select URL Defense from under the Targeted Attack Protection drop-down.
- Click URL Rewrite Policies.
- Under the Exceptions section, enter the Portal’s IP addresses.
- Click Save Changes.