In case you are utilizing the services of Trend Micro, you can whitelist ThreatCop to allow the simulated phishing test emails as well as training notifications to reach your end-users.
Step 1: Advance Threat Protection > Add
Step 2: Choose your policy based on your service
Step 3: Advance Spam Protection > Enable Advanced Spam Protection
Step 4: Select Approved or Blocked Send List section
Step 5: Check the box next to the ‘Enable Approved Sender List’ option
Step 6: Add *threatcop.ai in the text field and click on ‘Add’
Step 7: Rule Configuration section > Incoming Message option
Step 8: Select Detection level = Medium
Step 1: On left panel, select Malware Scanning
Step 2: Select Rule Configuration
Step 3: Apply to: drop down, select the All Message option
Step 4: Select ‘Scan All Files’ and ‘Enable IntelliTrap’
Step 5: Select Action > Trend Micro Recommend action
Step 6: Select Notification > select Notify
We recommend you to keep File Blocking on as you cannot limit this option to Kratikal’s messages. Turning off File Blocking can be very dangerous as it might allow potentially malicious attachments through to your end-users.
Step 1: On the left panel, select Web Reputation > Enable Web Reputation
Step 2: Select Rule Configuration and choose All Messages
Step 3: Security Level : Medium
Step 4: Select the Approved/Blocked URL List section
Step 5: Check the box next to the ‘Enable the Approved URL List’ option
Step 6: Check the box next to ‘Add Internal Domains to the Approved URL List’ option and then, enter ThreatCop’s hostnames into the text field
Step 7: Click Add > Virtual Analyzer
Step 8: Check the Enable Virtual Analyzer option
Step 9: Click on the Save button