Do I Need To Whitelist The Sender ID?
Whitelisting of Sender ID :
The foremost step that must be taken before starting the cyber security awareness training among employees is whitelisting the sender id. It is extremely important to whitelist our sender id in order to allow our simulated phishing emails and training notifications to land in your inbox instead of either getting blocked or filtered into the spam folder.
Sender ID is specific to the chosen email template. In case, the simulated phishing emails do not land into your domain, then whitelisting of the Sender Id must be done.
Contact our support team for further assistance.
Related Articles
How to Whitelist Threatcop in Thunderbird.
To run a phishing simulation on Thunderbird and ensure the emails land in the mailbox, you need to whitelist the sender ID. Here are the steps you can follow : 1. Add the sender to your address book: Any email address that is in your address book is ...
How to Whitelist Threatcop IP in Lotus Domino.
Kindly follow the steps outlined below to whitelist the IP in LOTUS : Step 1 : Open Domino Administrator : Go to Start > Programs > Lotus Domino > Domino Administrator. Step 2 : Navigate to the Server Document : Click on the Configuration tab, then ...
How to modify the Sender ID of the Simulation Template
TSAT comes with a variety of features and the ability to edit the existing Sender ID is one of them. In this article, we will guide you on how to modify the template Sender ID. Step-by-Step Guide: Step 1: Kindly login to the TSAT account and navigate ...
How to whitelist Threatcop in GSuite
Whitelisting IP Address This process allows emails from specific IP addresses to bypass spam filtering. Step 1: Go to https://admin.google.com/ Step 2: Select Apps -> Google Workspace -> Gmail -> Spam, Phishing and Malware Step 3: Select your ...
How to Whitelist Threatcop by Email Header in Google Workspace
Whitelist by Email Header in Google Workspace If your organization uses Google Workspace, you can ensure delivery of Threatcop’s simulated phishing emails by whitelisting them using email headers. This is done by applying a Content Compliance rule ...