Email Allowlisting

Table of Contents

Phishing Allowlisting – Spam Filter

When applying allowlists to your email servers and/or email filtering solutions, please refer to the instructions below before applying.

Mail Server IPv4 Addresses:

  • 3.106.21.22
  • 13.237.47.221

Sending Domains:

  • alerting-services.com
  • authwebmail.com
  • cloud-notification-services.com
  • securesupportcloud.com
  • office-365-notifications.com
  • webnotifications.net
  • paypaypal.net
  • cmail31.com

Phishing Website Domains:

  • *.authwebmail.com
  • *.cmail31.com
  • *.securesupportcloud.com
  • *.webnotifications.net
  • *.alerting-services.com

Microsoft/Office 365 - Allowlisting (Use M365 Defender to allow a Phishing simulation)

To ensure Cyber Bark LLC can effectively simulate phishing campaigns, you will need to allowlist our emails. We highly recommend this method for allowlisting as it’s been explicitly created by Microsoft for the purpose of conducting phishing simulations.

Use the Microsoft 365 Defender portal to configure third-party phishing simulations in the advanced delivery policy

1. Login to Microsoft 365 Defender at the following link to go straight to the Phishing Simulation
allowlisting form: https://security.microsoft.com/advanceddelivery?viewid=PhishingSimulation

Phishing Allowlisting—Spam Filter

Note: This form can also be accessed by going to https://security.microsoft.com/ and clicking through Email & Collaboration > Policies & Rules > Threat Policies > Advanced Delivery > Phishing Simulation

2. Click ✏️ Edit icon. Edit or If there are no configured phishing simulations, click Add.

3. On the Edit third-party phishing simulation flyout that opens, configure the following settings:

Sending Domains:

  • alerting-services.com
  • authwebmail.com
  • cloud-notification-services.com
  • securesupportcloud.com
  • office-365-notifications.com
  • webnotifications.net
  • paypaypal.net
  • cmail31.com

Sending IPs:

  • 3.106.21.22
  • 13.237.47.221

Simulation URLs to allow:

  • authwebmail.com/*
    *.authwebmail.com/*
  • cmail31.com/*
    *.cmail31.com/*
  • securesupportcloud.com/*
    *.securesupportcloud.com/*
  • webnotifications.net/*
    *.webnotifications.net/*
  • alerting-services.com/*
    *.alerting-
    services.com/*services.com

Note: All the above domains and IP addresses are under the sole control of Cyber Bark LLC. As such we can ensure that no unintended emails will originate from these IPs and domains after allowlisting occurs.

4. When you’re finished, click Add/Save and then click Close.

Note: Allowlisting may take up to an hour to take effect.

All done! Allowlisting can be tricky… should you have any difficulties, please don’t hesitate to contact us.

Disabling Microsoft/Office 365 "Report as Phishing" to Avoid False Reports within Outlook Web

Should your recipients use the Microsoft 365 report as phishing feature on one of Cyber Bark’s simulated phishing emails, it can cause a false-positive click to appear in the platform. Naturally, this would be counted as a failure on the recipient’s part even though they never clicked the link, so we want to prevent this from happening.

To do this we’ll need to disable the junk email and phishing email reporting feature via Exchange PowerShell. The simple steps below will guide you through this process.

Use Exchange Online PowerShell to disable the Microsoft 365 “Report as Phishing” feature

1. Open Exchange PowerShell then run the following command to locate the relevant policy:

Get-OwaMailboxPolicy | Format-Table Name,ReportJunkEmailEnabled

2. Set the policy to false, as in the example below:

Set-OwaMailboxPolicy -Identity “OwaMailboxPolicy-Default” -ReportJunkEmailEnabled $false

3. To verify the changes, check a recipient’s Outlook on the web account and select the Mark as phishing option from the drop-down menu, as below:

Disabling Microsoft/Office 365 "Report as Phishing" to Avoid False Reports within Outlook Web

4. Once the feature has been disabled, recipients will still see the option, however, when it is clicked the message will not be reported and the “successful reporting” message will not display.

Allowlisting – Proofpoint

If you’re using Proofpoint’s spam filtering, you can allowlist Cyber Bark LLC to allow our simulated phishing test emails and training notifications through to your end users.

The instructions below are for third-party software. If you run into issues allowlisting Cyber Bark LLC in Proofpoint, we recommend reaching out to Proofpoint for specific instructions. You can also contact us whenever you need assistance.

Note: If your phishing security test emails are bouncing with the below error message, see the How to Prevent Proofpoint from Bouncing Emails section of this report.

“Sender address rejected: Domain not found (in reply to RCPT TO command)”

Allowlisting in Proofpoint

When you’re ready to allowlist in Proofpoint, follow the below instructions. These instructions were gathered from Proofpoint’s Safelisting Addresses article.

  1. Navigate to Security Settings > Email > Sender Lists.
  2. Under the Safe Sender list, enter our IP addresses. (Please see the first page instructions for a full list of our IP addresses)
  3. Click Save.

If you have issues with attachment-related emails, see Proofpoint’s article on Blocks by Default.

What to Do If Your Emails are Going to Spam

If your emails are being sent to spam or are being quarantined, you’ll need to add Cyber Bark LLC to the Organizational Safe List in Proofpoint.

Follow the instructions below to add Cyber Bark’s IP addresses to the Organizational Safe List:

  1. From your Proofpoint admin center, navigate to Email Protection > Spam Detection > Organizational Safe List.
  2. Add either our IP addresses. (See the instructions in the first page)

Phishing Simulation Email Delivery – Troubleshooting Guide

Sometimes phishing simulation emails can be blocked, delayed, or altered by spam filters, email gateways, or security tools.
To ensure successful delivery and accurate reporting, please follow the guide below.

Before the Campaign: Prepare Your Environment

To make sure our emails reach your users’ inboxes, please complete these steps before we send the campaign: 

1. Allow-List Sending IPs and Domains
  • Add our sending IP addresses and domains to the allow list in all your email security layers
  • Include both:
    o Inbound connection filters (for IPs), and
    o Content filters (for domains and URLs).
  • Make sure to allow our phishing URLs in any link-scanning or click-protection tools such as:
    o Microsoft Defender Safe Links
    o Proofpoint TAP
    o Barracuda Link Protection
2. Apply Allow-Lists at All Layers

Please ensure allow-lists are applied across all the following systems:

  • Microsoft 365 / Exchange Online
  • Google Workspace / Gmail
  • Third-party email security gateways (Proofpoint, Mimecast, Barracuda, Cisco IronPort, etc.)
  • Any Endpoint protection or browser security tools that may block links (CrowdStrike, Defender, etc.)

Tip: Allow at least one hour for allow-list changes to propagate before launching the campaign.

If You Don’t See the Emails

If you’ve already configured allow-lists and still don’t see our emails, here are the
troubleshooting steps to follow:

1. Check Spam, Junk, or Quarantine Folders
  • Check user mailboxes: Junk, Spam, Other, Promotions, or Updates tabs.
  • Check your organization’s quarantine portals:
2. Search the Mailbox Directly
  • Search by the (email subject line, sender domain, or email address).
  • In Office 365, don’t forget to check the Focused/Other inbox tabs.
  • In Gmail, check the “Promotions” or “Updates” tabs.
3. Review Delivery Logs

Check your email platform’s message trace tools to check what happened to the messages:

  • Microsoft 365: Exchange Admin Center → Mail Flow → Message Trace
  • Google Workspace: Admin Console → Email Log Search
  • Third-party gateway: Check the platform’s message tracking feature

Look for any:

4.Re-Check Allow-List Settings
  • Confirm IPs and domains are correctly entered
  • Are they applied to the inbound flow (not just outbound)?
  • Are they prioritized above stricter policies or default anti-spam rules?
5. Test With a Plain Email
  • Let us know, and we can send a simple test email from our sending platform.
  • If even this message doesn’t arrive, it strongly indicates allow-lists are not correctly applied or are being overridden.
6. Check for Automated Link Clicks (Bot Activity)
  • Some systems (e.g., Proofpoint TAP, Barracuda ATP, etc.) automatically scan or click links
    in emails.
  • These link scanners can trigger false “clicks” before users even see the email.
  • Signs of bot activity:
      • Clicks within seconds of delivery
      • Users say they never clicked

Common Issues to Avoid

Best Practices

    • Email security
    • Endpoint protection 
    • Network/firewall inspection

(Optional) Advanced: SPF, DKIM, and DMARC

If your organization enforces strict inbound DMARC checks, ensure:

 

  • Our SPF records are passing
  • DKIM signatures are valid
  • Messages are not failing DMARC policy enforcement

We’re happy to provide example headers for you to validate these configurations.

Still Having Issues?

If you’ve followed all the steps above and are still not seeing messages, please send us:

 

  • A screenshot or description of your allow-list settings.
  • Results from your email delivery/message trace logs.
  • Any bounce-back or error messages you’ve encountered.
  • Confirmation of whether URLs were excluded from link scanning.

We’re happy to assist further and troubleshoot directly with your IT or security team.

Scroll to Top

GET A FREE SEO REPORT

Fill in your details to receive a comprehensive SEO report straight to your inbox