LogoLogo
Get Demo
  • đź’«NEXT-GENERATION PRODUCT
    • Introduction
    • Getting Started
      • 1. Invite System Users
      • 2. Add Target Users
        • Add Users via CSV
        • Add users via SCIM
          • SCIM Setup in Azure AD
          • SCIM Setup in Okta
          • SCIM Setup in Onelogin
          • SCIM Setup in Jumpcloud
        • Add users via LDAP
        • Add Users via API
      • 3. Email Deliverability
        • Microsoft 365
          • M365: Direct Email Creation
          • M365: Whitelisting
        • Google Workspace
          • Google: Direct Email Creation
          • Google: Whitelisting
        • Exchange 2013 and 2016
      • 4. Track Opened Emails
      • 5. Allow Phishing URLs
        • Whitelist for Office 365
        • Whitelist for Google Workspace
        • Whitelist for Exchange 2013/2016
        • Whitelist in Security Solutions
      • 6. Setup Phishing Reporter
        • Step 1. Download Phishing Reporter
        • Step 2. Deploy Phishing Reporter
          • How to Deploy Add-In in Microsoft 365
          • How to Deploy Add-In in Exchange Admin Center
          • How to Deploy Add-In in Google Workspace
          • How to Deploy Add-In in Outlook
            • Troubleshooting Phishing Reporter Add-In on Outlook Desktop
      • 7. Incident Responder Setup
        • Step 1. Integrate Threat Intel Partners
        • Step 2. Mail Configurations
          • Microsoft 365
          • Google Workspace (Gsuite)
          • Exchange (EWS)
    • Platform
      • Dashboard
        • Dashboard Widgets
        • Incident Responder Widgets
        • Threat Sharing Widgets
        • Phishing Simulator Widgets
      • Threat Intelligence
      • Email Threat Simulator
        • Start Scan
        • View Scan Report
        • Create Trusted Account on Exchange
        • Start Scan on O365 Email Account
        • Start Scan on Google Workspace Email Account
      • Threat Sharing
        • Communities
        • Incidents
      • Phishing Simulator
        • Manage Phishing Scenarios
          • Phishing Scenarios
          • Email Templates
          • Landing Pages
        • Phishing Campaign Manager
        • Phishing Campaign Reports
        • Settings
          • DNS Services and Domains
          • Exclude IP Address
      • Callback Simulator
        • Manage Callback Scenarios
          • Callback Scenarios
          • Callback Email Templates
          • Callback Templates
        • Callback Campaign Manager
        • Callback Campaign Reports
        • Settings
          • Callback Phone Numbers
      • Vishing Simulator
        • Vishing Templates
        • Vishing Campaign Manager
        • Vishing Campaign Reports
      • Smishing Simulator
        • Manage Smishing Scenarios
          • Smishing Scenarios
          • Text Message Templates
          • Landing Page Templates
        • Smishing Campaign Manager
        • Smishing Campaign Reports
        • Settings
          • Manage DNS and Domains
          • Exclude IP Addresses
      • Quishing Simulator
        • Manage Quishing Scenarios
          • Quishing Scenarios
          • Quishing Templates
          • Quishing Landing Page Templates
        • Quishing Campaign Manager
        • Quishing Campaign Reports
        • Settings
          • DNS and Domains
          • Excluding IP Address
      • Awareness Educator
        • Training Library
        • Enrollments
        • Certificates
        • Training Reports
        • Training Completion Queries
      • Incident Responder
        • Incident Responder Dashboard
        • Investigations
        • Integrations
        • Playbook
        • Mail Configurations
          • Microsoft 365
          • Exchange
          • Google Workspace
        • Cross Company Integration
      • Phishing Reporter
        • Phishing Reporter Customization
        • Phishing Reporter Deployment
          • How to Deploy the Add-in in Microsoft 365
          • Phishing Reporter Page View Failure Due to Deprecated Exchange Online Tokens
          • Microsoft Ribbon Phishing Reporter
          • Microsoft Page View Phishing Reporter
          • How to Deploy the Add-in in Exchange Admin Center
          • How to Deploy the Add-in in Google Workspace
          • Phishing Reporter Announcement Email Template
        • Diagnostic Tool
        • Integrating Microsoft Phishing Reporting Button with Keepnet
        • Integrating Microsoft Defender with Keepnet Phishing Reporter
        • Troubleshooting Phishing Reporter on Outlook Desktop
      • Reports
        • Advanced Reports
        • Executive Reports
        • Scheduled Reports
        • Gamification Report
      • Company
        • Target Users
        • Companies
          • Company Groups
        • Company Settings
          • Privacy
            • Account Privacy
            • Data Privacy
          • AI Ally Settings
          • SMTP Settings
          • Direct Email Creation
            • Direct Email Creation for Google Workspace
            • Direct Email Creation for Microsoft 365
          • Notification Templates
          • Google User Provisioning
          • REST API
          • White Labeling
          • Proxy Settings
          • SAML Settings
            • How to Configure SAML on ADFS
            • How to Configure SAML on Google Workspace
            • How to Configure SAML on Azure AD
            • How to Configure SAML on CyberArk
            • How to Configure SAML on Okta
          • SCIM Settings
            • Getting Started with SCIM
            • Azure AD SCIM Integration
            • Okta SCIM Integration
            • Onelogin SCIM Integration
            • Jumpcloud SCIM Integration
          • SIEM Integrations
            • Splunk Integration
            • Syslog Integration
          • LDAP
          • Allowed Domains
        • System Users
          • People
          • Roles
        • Audit Log
        • Job Log
      • Free Phishing Email Analysis Service
    • Miscellaneous
      • Whitelisting
        • How to Whitelist an IP Address in Office 365
        • How to Whitelist an IP Address in Exchange 2013 and 2016
        • How to Whitelist an IP Address in Google Workspace
        • How to Whitelist in Mimecast
        • How to Whitelist in Proofpoint
        • Whitelisting in Other Security Solutions
        • Whitelisting the Pictures on Microsoft Outlook Apps
        • Keepnet Tools Whitelisting Guidelines
        • Understanding Email Delivery Errors
        • Tracking Email Opens in Phishing Simulations
      • User Profile
      • Multi-Factor Authentication (MFA) Settings
      • On-Premise Requirement Checker
      • Platform Requirements
        • Portal UI Requirements
        • Phishing Reporter Requirements
        • Diagnostic Tool Requirements
      • Maintenance Tool
      • Understanding the Preferred Language Setting
  • 📚RESOURCES
    • Platform Security
    • Volume & Performance
    • Customer Help Desk
    • Product Update/Maintenance
    • Research Methodology
    • Release Notes
      • 2025
      • 2024
      • 2023
      • 2022
      • 2021
      • 2020
  • ⚖️Legal Hub
    • For Customers
      • Customer Terms of Service
      • Product Specific Terms
      • Jurisdiction Specific Terms
      • Data Processing Agreement
      • Regional Data Hosting Policy
      • Product and Services Catalog
      • Acceptable Use Policy
      • Keepnet Security Program
      • Microsoft CoPilot Usage Policy
    • For Everyone
      • Website
        • Terms of Use
        • Privacy Policy
        • Cookie Policy
      • Free Phishing Email Analysis
        • Terms of Service
        • Privacy Policy
      • Transparency Report
Powered by GitBook

Copyright © Keepnet Labs LTD. All rights reserved.

On this page
  • Whitelisting in Proofpoint Essentials
  • Whitelisting in Proofpoint Enterprise
  • URL Defense (TAP) Exemptions
  • Whitelisting by Simulation Domain
  • If Simulation Emails Are Going to Spam
  • Verifying Your Configuration

Was this helpful?

Export as PDF
  1. NEXT-GENERATION PRODUCT
  2. Miscellaneous
  3. Whitelisting

How to Whitelist in Proofpoint

To ensure smooth delivery of Keepnet’s simulated phishing campaigns and awareness training notifications, you may need to whitelist Keepnet in your Proofpoint environment. This guide covers configuration steps for both Proofpoint Essentials and Proofpoint Enterprise.

These are third-party configurations. If you encounter any difficulties during the process, we recommend contacting Proofpoint support directly. For any questions specific to Keepnet, feel free to reach out to our support team.

Whitelisting in Proofpoint Essentials

Follow the steps below to allow Keepnet’s IP addresses through Proofpoint Essentials:

  1. Go to Security Settings > Email > Sender Lists.

  2. In the Safe Senders section, add Keepnet’s IP addresses.

  3. Click Save to apply the changes.

For information about Proofpoint’s handling of email attachments, consult their documentation titled "Blocks by Default."

Whitelisting in Proofpoint Enterprise

To safelist Keepnet in your Proofpoint Enterprise environment:

  1. Sign in to your Proofpoint Enterprise Admin Console.

  2. Navigate to Email Protection.

  3. Under the Spam Detection menu, select Organizational Safe List.

  4. Click Add to begin a new rule.

  5. In the Global Safe List configuration:

    • Filter Type: Select Sender Hostname.

    • Operator: Choose Equals.

    • Value: Enter Keepnet’s IP addresses.

  6. Click Save Changes.

URL Defense (TAP) Exemptions

To avoid disruptions by Proofpoint Targeted Attack Protection (TAP), you can exclude Keepnet’s emails from URL rewriting policies:

  1. Navigate to Email Protection > Targeted Attack Protection > URL Defense.

  2. Select URL Rewrite Policies.

  3. Under Exceptions, do the following:

    • Add Keepnet’s IP addresses.

    • Add your phishing link domains.

      • To get a downloadable CSV of your phishing simulation domains, go to your Keepnet dashboard and then go to Phishing Simulator > Settings > Domains page.

  4. Click Save Changes.

Whitelisting by Simulation Domain

To whitelist Keepnet by simulation domains in Proofpoint:

  1. Go to Email Firewall > Rules in your Proofpoint Admin Center.

  2. Enable the rule by switching Enable to On.

  3. Set a descriptive name such as 'Keepnet Whitelisting Simulation Domains'

  4. Under Conditions, click Add Condition and select Sender Domain.

  5. Add the domains listed in the Keepnet platform by logging in and then going to Phishing Simulator > Settings > Domains page.

  6. Under Dispositions, change Delivery Method to Deliver Now.

  7. Click Save to apply changes.

Allow time for the rule to propagate before testing your next campaign.

If Simulation Emails Are Going to Spam

If your simulated phishing emails land in users’ spam folders or are being quarantined, ensure Keepnet is on the Organizational Safe List:

  1. In the Proofpoint Admin Center, go to Email Protection > Spam Detection > Organizational Safe List.

  2. Add Keepnet’s IPs.

Verifying Your Configuration

To confirm successful whitelisting, please follow the steps below.

  1. First, launch a phishing campaign to your pilot groups and confirm if the simulation emails are delivered to the inbox.

  2. Second, please check the campaign report on the Keepnet platform to confirm if there are any false positives.

Even after whitelisting is completed, but still the emails go to spam or quarantine, please make sure you have whitelisted Keepnet on your email server too. Please check this document for more information.

If you need further help, submit a support request — our team is here to assist.

PreviousHow to Whitelist in MimecastNextWhitelisting in Other Security Solutions

Last updated 17 hours ago

Was this helpful?

đź’«