Table of Contents
Overview
This guide provides step-by-step instructions to whitelist phishing simulation emails in Microsoft Office 365. Proper whitelisting ensures that simulated phishing emails reach end-users’ inboxes without being blocked by security filters.
1. Whitelisting Using Microsoft Defender for Office 365
Step 1: Add Simulation Domains to Allowed List
- Sign in to Microsoft Defender
- Navigate to Microsoft Defender Security Portal.
- Go to Policies & Rules
- Under Email & Collaboration, select Threat policies.
- Modify Anti-Phishing Policies
- Click on Anti-phishing.
- Select the Default policy (or create a new custom policy).
- Under Advanced settings, find Allowed senders and domains.
- Add the phishing simulation domains (mailservers.xyz).
- Click Save.
Step 2: Create a Safe Senders Policy
- Open Microsoft Defender and navigate to Policies & Rules.
- Under Threat policies, select Anti-spam policies.
- Click Create policy (or edit an existing one).
- Add the simulation sender domain(s) under Allowed domains and addresses.
- Click Save.
2. Configuring Exchange Online Protection (EOP)
Step 1: Bypass Spam Filtering for Simulation Emails
- Sign in to Exchange Admin Center (https://admin.exchange.microsoft.com).
- Navigate to Mail flow > Rules.
- Click Add a rule > Bypass spam filtering.
- Set the condition. If the sender’s domain is > Enter the simulation domain(s).
- Under Actions, select Modify the message properties > Set the spam confidence level (SCL) to -1.
- Click Save.
Step 2: Allow Phishing Simulations via Connection Filtering
- Go to Microsoft Defender > Email & Collaboration.
- Select Policies & Rules > Threat Policies > Anti-spam.
- Under Connection Filtering, add the IP addresses used for sending phishing simulations.
- Click Save.
3. Configuring Microsoft Defender Safe Links Policy
- Navigate to Threat Policies > Safe Links.
- Under Global Settings, find Do not rewrite URLs.
- Add the phishing simulation domains.
- Click Save.
4. Configuring Microsoft Defender Safe Attachments Policy
- Navigate to Threat Policies > Safe Attachments.
- Select Turn off Safe Attachments scanning for these file types.
- Add email addresses or domains used for simulations.
- Click Save.
5. Testing and Verification
- Send a test phishing simulation email from the provider’s domain.
- Check delivery reports in Microsoft Defender.
- If emails are blocked, revisit policies to ensure correct configuration.
6. Troubleshooting
- Emails still being quarantined? Check the Quarantine Portal and release them manually.
- Links being rewritten? Ensure Safe Links policy is updated correctly.
- Attachments being blocked? Confirm Safe Attachments settings.
Conclusion
Properly configuring whitelisting ensures that phishing simulation emails are delivered successfully while maintaining security. Follow these steps carefully and test to confirm the correct setup.