Policy Considerations for Living Security Phish in Proofpoint

If you're using Proofpoint Essential's spam filtering or Proofpoint Enterprise's allow list, follow the guide below to ensure delivery of phishing simulations to end users.


Whitelisting in Proofpoint Essentials
Whitelisting in Proofpoint Enterprise
Attachment Exceptions
Are your phishing simulations going to spam?

Whitelisting in Proofpoint Essentials

  1. Navigate to Security Settings > Email > Sender Lists.
  2. Under the Safe Sender list, enter our IP addresses found here.
  3. Click Save.

For more information, consult Proofpoint's article on Safe listing Addresses.


Whitelisting in Proofpoint Enterprise

  1. Navigate to your Proofpoint Enterprise Admin console.
  2. Click Email Protection.
  3. Under the Spam Detection drop-down, select Organizational Safe List.
  4. Click Add.
  5. In the Proofpoint - Global Safe List window, enter the following information:
    • Filter Type: From the drop-down menu, select Sender Hostname.
    • Operator: From the drop-down menu, select Equals.
    • Value: In the field, enter our IP addresses found here.
  6. Click Save Changes.

To avoid potential issues with Proofpoint’s Targeted Attack Protection, we suggest that you add our IP addresses to Proofpoint’s URL Defense:

  1. Navigate to your Proofpoint Essentials Admin console.
  2. Click Email Protection.
  3. Under the Targeted Attack Protection drop-down, select URL Defense.
  4. Click URL Rewrite Policies.
  5. Under the Exceptions section, enter our IP addresses found here.
  6. Click Save Changes.

Attachment Exceptions

Proofpoint blocks certain extensions with a high malicious potential by default. If you find the need to send executable attachments in your phishing simulations, follow the steps below to ensure delivery to end users:

  1. Navigate to Security Settings > Email > Filter Policies.
  2. Click New Filter.
  3. Give the filter an appropriate name.
  4. For Type, select Inbound
  5. Click Continue.
  6. Use the following conditions for your filter:

    bypassexe.JPG

ℹ️ The above attachment is an example to allow .exe files. This will need to be changed based on the file extension you wish to allow, such as *.dll or *.vb. The previous excerpt was gathered from Proofpoint's article on Attachment Types Proofpoint Essentials Blocks By Default.


Are your phishing simulations going to spam?

Add our IP addresses to the organizational safe list:

  1. From your Proofpoint admin center, navigate to Email Protection > Spam Detection > Organizational Safe List.
  2. Add either our hostnames or IP addresses found here.

Questions? Please contact help@livingsecurity.com