This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Whitelist by Email Headers

You need to have the option that most other phishing simulators have which is "Whitelist by Email Headers"  Most other vendors have some kind of customer headers so that they can be whitelisted by rule in Office 365 mail.  Without this feature Office 365 will mark all your simulation emilas as spam.

How knowbe4 does it: https://knowbe4.zendesk.com/hc/en-us/articles/212723707

 



This thread was automatically locked due to age.
Parents
  • I know this is an old thread, but I second this recommendation.  We are two months into our PhishThreat purchase and have to this point been unable to actually effectively use the reporting due specifically to O365 'reading and clicking' on the emails. 

    I have a support ticket open, and they have been unable to assist.  Additionally.  I have added the Mailflow rules for the mark Sophos' email server IP's and the two rules to try and bypass SafeAttachement and SafeLinks based on the sending domain.  All of these have been ineffective. 

Reply
  • I know this is an old thread, but I second this recommendation.  We are two months into our PhishThreat purchase and have to this point been unable to actually effectively use the reporting due specifically to O365 'reading and clicking' on the emails. 

    I have a support ticket open, and they have been unable to assist.  Additionally.  I have added the Mailflow rules for the mark Sophos' email server IP's and the two rules to try and bypass SafeAttachement and SafeLinks based on the sending domain.  All of these have been ineffective. 

Children
No Data