The following applies to organizations that use Mimecast and have trouble with email delivery due to Mimecast security protection policies. This may impact both Attack Simulation emails and training email interactions.
Note: Mimecast provides several different security features / policies that may be implemented at your organization. It is important to understand which policies are in place, in order to successfully whitelist OutThink’s email services. It is however recommended to take the trial approach of applying whitelisting rules to a single policy at a time, and testing email deliverability using an OutThink test campaign sent to a sample subset of users.
For all policies below, use the following Source IP Addresses:
69.169.231.204
69.169.231.205
147.253.222.115
199.15.227.83
Permitted Senders Policy
A Permitted Senders policy can ensure the successful delivery of inbound messages from OutThink, which will bypass Mimecast’s reputation, greylisting and spam scanning policies. This will avoid the possibility of emails being rejected or placed in the hold queue.
Reference: https://community.mimecast.com/s/article/Configuring-Permitted-Senders-Policies-1067720131
- Log on to your Mimecast Administration Console.
- Select the Administration toolbar menu item.
- Select the Gateway | Policies menu item.
- Select Permitted Senders.
- Select the New Policy button.
- Set the Policy Narrative to OutThink Permitted Senders Policy or similar.
- Set the Permitted Sender Policy option to Permit Sender.
- Complete the Emails From and Emails To sections, ensuring that Everyone is selected.
- In the Validity section, check the Policy Override option and set the Source IP Ranges to the IP Addresses given above. Note that these must be entered in CIDR notation.
Anti-Spoofing Bypass Policy
Spoofing is the forgery of email headers so messages appear to come from someone other than the actual source. If you have an existing Mimecast anti-spoofing policy in place, a bypass policy may also need to be created. This may be required, for example, where training emails are delivered on your organization’s behalf, using a sub-domain registered with our mail provider.
Reference: https://community.mimecast.com/s/article/Configuring-Anti-Spoofing-Policies-1695615136
- Log on to your Mimecast Administration Console.
- Select the Administration toolbar menu item.
- Select the Gateway | Policies menu item.
- Select Anti-Spoofing.
- Select the New Policy button.
- Set the Policy Narrative to OutThink Anti-Spoofing Policy or similar.
- In the Select Option field select Take No Action.
- In the For Emails From and For Emails To sections, set the Applies From and Applies To fields to Everyone, as IP addresses are going to be used as the source of the messages.
- In the Policy Validity section, check the Policy Override option and set the Source IP Ranges to the IP Addresses given above. Note that these must be entered in CIDR notation.
URL Protection Bypass Policy
Mimecast will analyse the hyperlinks sent within emails, sometimes resulting in false positive phishing clicks in Attack Simulation campaign results. If your campaign results present phishing link clicks where users have not actually clicked themselves, you may need to add a bypass policy for OutThink’s mail server IP addresses.
Impersonation Protection Bypass Policy
Attack Simulations that purport to come from internal users in your organization may be blocked by Mimecast’s Impersonation Protection Policy. If you detect that certain attack simulation templates are not being received by your users, a bypass policy may need to be added via your Mimecast Administration Console.
Attachment Protection Bypass Policy
An Attachment Protection Bypass policy allows you to exclude OutThink’s emails from an Attachment Protection policy. This may only be required if you are sending advanced Attack Simulation campaigns containing attachments, and you are detecting deliverability issues.
Reference: https://community.mimecast.com/s/article/Configuring-Attachment-Protection-Bypass-Policies-846582455
Attachment Management Bypass Policy
An Attachment Management Bypass policy allows you to exclude OutThink’s emails from an Attachment Management policy. This may only be required if you are sending advanced Attack Simulation campaigns containing attachments, and you are detecting that attachments are being strpped from those emails upon delivery.
Change Log
New IP Address – Updated September 2023
The following IP Address has been added for future compatibility. If you have not already included this IP Address in the whitelisting rules above, please do so.
199.15.227.83
Banner photo by freestocks
Was this helpful?
2 / 0