# Microsoft Office 365 Allowlisting

{% hint style="info" %}
**Important**

To allow phishing URLs that are part of third-party attack simulation training, use the [advanced delivery configuration](https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/skip-filtering-phishing-simulations-sec-ops-mailboxes?view=o365-worldwide) to specify the URLs.

**Don't use the Tenant Allow/Block List.**
{% endhint %}

[Microsoft's secure by default feature](https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/secure-by-default?view=o365-worldwide) may affect the way your organization allowlists Prventi. Due to this change, you can allowlist Prventi using Microsoft's advanced delivery policies feature instead.

In this article, you will learn how to allowlist Prventi with the advanced delivery policy feature. Read more about [configuring the delivery of third-party phishing simulations to users](https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/skip-filtering-phishing-simulations-sec-ops-mailboxes?view=o365-worldwide#use-the-microsoft-365-defender-portal-to-configure-third-party-phishing-simulations-in-the-advanced-delivery-policy).

### How to Allowlist Prventi Using Advanced Delivery Policies

1. Navigate to the [Microsoft 365 Defender portal](https://security.microsoft.com/homepage)
2. Expand **Email and collaboration in the** menu&#x20;
3. Select [Policies and Rules](https://security.microsoft.com/securitypoliciesandrules)
4. Select [Threat policies](https://security.microsoft.com/threatpolicy)
5. Select [Advanced delivery](https://security.microsoft.com/advanceddelivery)
6. Select the Phishing simulation tab at the top of the page
7. Select Edit

<figure><img src="https://2587798137-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FxD7mHVJd8Cx98j1Vu8yh%2Fuploads%2FDax6fncCPUwHLTRd9E8u%2Fadvanced-delivery-config.png?alt=media&#x26;token=6e77cae3-8cfd-483e-adf0-f9b68f69eda2" alt=""><figcaption></figcaption></figure>

#### Add the following domains:

postman-pat.com, paymentnotifications.email, no-reply-sender.email

| Prventi Phishing Email Domains | Description                |
| ------------------------------ | -------------------------- |
| postman-pat.com                | Phishing simulation domain |
| paymentnotifications.email     | Phishing simulation domain |
| no-reply-sender.email          | Phishing simulation domain |
| sharepoitnonline.com           | Phishing simulation domain |

#### Sending IP

| IP Address     | Description                      |
| -------------- | -------------------------------- |
| 161.38.204.124 | Phishing simulation email server |

#### Simulation URLs to allow

| Phishing Website Domains        | Description             |
| ------------------------------- | ----------------------- |
| \*.securelogin.page/\*          | Phishing website domain |
| \*.secure-online.store/\*       | Phishing website domain |
| \*.securepayment.site/\*        | Phishing website domain |
| \*.sharepoitnonline.com/\*      | Phishing website domain |
| \*.compressed-download.zip/\*   | Phishing website domain |
| \*.stable-release.zip/\*        | Phishing website domain |
| \*.strictly-confidential.zip/\* | Phishing website domain |
| \*.final-1.zip/\*               | Phishing website domain |
