How to Whitelist Phish in Cisco Ironport
If you're using Cisco IronPort spam filtering, you can whitelist Living Security Phish to allow our simulated phishing test emails and training notifications through to your end users.
ℹ️ The instructions below include information from the Cisco whitelisting article. If you run into issues whitelisting in Cisco IronPort, we recommend reaching out to Cisco for specific instructions. You can also contact our support team whenever you need assistance.
Whitelisting Cisco Ironport
To whitelist Living Security Phish in Cisco IronPort, do the following:
- From the Cisco IronPort admin console, navigate to the Mail Policies tab.
- Select HAT Overview. Please ensure that InboundMail lister is selected.
- Click WHITELIST. If you do not see WHITELIST, you can create your own group titled as such.
- Click Add Sender and add our IPs or hostnames.
- Click Submit and then Commit Changes.
Skipping Outbreak Filter Scanning
The instructions above for whitelisting Cisco IronPort do not prevent IronPort's Outbreak Filter from scanning emails from our IPs or hostnames. If you are experiencing issues with our emails being quarantined, you may also need to set our IPs or hostnames to bypass this filter.
To skip Outbreak Filter Scanning, do the following:
- From your Cisco IronPort admin console, navigate to the Mail Policies tab.
- Under the Message Modification section, enter our IPs or hostnames in the Bypass Domain Scanning table.
- Click Submit and then Commit Changes.
Need help? Contact our support team