Skip to main content
My preferencesSign out
Proofpoint, Inc.

Security Awareness Safelisting Considerations

Situation What steps should be taken to prepare for Safelisting in the Proofpoint Essentials Security Awareness Platform
Version Proofpoint Essentials Security Awareness 
Platform
Safelisting
Summary You need to understand your Email Delivery:  Single Mail Filter vs Multiple Mail Filters as well as any applications your organization has installed:  Web Proxies\Firewalls

Question

What should we consider when safelisting for the Proofpoint Essentials Security Awareness Platform and/or Phishing ?

Answer

Safelisting is necessary to ensure the best end user experience with the Security Awareness Training Tools. This ensures that the emails involved in the program are delivered to their intended recipients and, in the case of the Simulated Phishing Campaigns, that the results gathered are accurate. This can involve the creation of exceptions in one or more Email Filters, Firewalls, Web Proxies, EndPoint Protection or other Security Appliances and Software.

Email Delivery - Single Mail Filter

Understanding the flow of email into the organization can help determine how much, and what type of safelisting needs to be done. Typically an organization will have an email filter in front of their mail server to stop potential threats before they're delivered to an end user: 
User-added image
In these cases, safelisting at the filter, using our sending IP addresses, is sufficient to ensure the emails are delivered to the end users' inboxes on the Mail Server. However, more advanced safelisting, such as in the case of Microsoft 365 customers using Exchange Online Protection (EOP), may be necessary to create additional rules to not only ensure delivery, but that the emails are not qualified as Junk\SPAM or tested for malicious payloads. 

Email Delivery - Multiple Mail Filters

In some cases, multiple mail filters may be deployed. This provides additional challenges to ensuring proper mail delivery since most mail filters will not see the original mail sending IP address if it is behind another mail filter:
User-added image

To safelist correctly in this scenario, along with safelisting by sending IP at Filter-1, an alternate identifier will be needed to safelist through Filter-2. This is typically a value in the header of the email that provides validation after it's allowed past Filter-1. Filter-1 can also be used to introduce a value to mail header that additional filters downstream can use to pass the email or set rules to ensure proper handling of the email (set SCL or bypass ATP, as examples) past Filter-1.

Application Access - Web Proxies\Firewalls

Along with the ability to access the Security Awareness Training Platform to participate in their interactive training, users and applications installed in network may also need access to several external URLs to ensure proper functionality. Web proxies may block these communications and prevent users or applications (such as PhishAlarm) from accessing the necessary resources.
 

See Safelisting Guide for more information.