How to configure mails for Phishing Simulation
Problem Statement
Organizations often run security awareness phishing simulations using Sorb Security platform.
Sorb Security intentionally sends emails that resemble phishing attacks in order to measure user awareness and train employees to recognize suspicious messages.
However, modern email systems such as:
- Microsoft 365
- Google Workspace
- Zimbra Collaboration
contain built-in anti-spam, anti-phishing, and spoofing protections. Because simulation emails closely resemble real phishing attacks, these protections may:
- Quarantine the email
- Deliver it to the spam folder
- Reject the message during SMTP
- Rewrite or block links
- Trigger impersonation protection
As a result, authorized phishing simulation campaigns may fail to reach users, preventing security teams from accurately measuring awareness levels.
To ensure successful delivery of simulation emails, administrators must configure controlled allow rules for the simulation platform’s sending infrastructure.
Solution
To allow authorized phishing simulation campaigns, configure the following controls in the email platform:
- Allow the simulation platform sending IP ranges
- Allow the simulation sender domains
- Configure anti-phishing exclusions
- Verify successful delivery through message tracking
These configurations should be limited only to Sorb Security Infrastructure.
Sending IP: 36.50.34.0/24 36.50.35.0/24 129.126.138.112/28 192.82.62.32/27
Sender domain: sorbsecurity.com
Solution for Microsoft 365
In Microsoft 365, configuration is performed in the Microsoft Defender security portal and Exchange Admin Center.
Step 1 – Add Domain to Tenant Allow List
Open the security portal: https://security.microsoft.com
Navigate to:
Email & Collaboration
→ Policies & Rules
→ Threat Policies
→ Tenant Allow/Block List
Add a new entry:
Type: Domain
Value: sorbsecurity.com
Action: Allow
Step 2 – Exclude Domain from Anti-Phishing Policy
Navigate to:
Threat Policies
→ Anti-phishing
Edit the active policy.
Under Excluded Senders or Domains, add:
sorbsecurity.com
This prevents simulation emails from being blocked by impersonation detection.
Step 3 – Create Mail Flow Allow Rule
Open the Exchange Admin Center.
Navigate to:
Mail Flow
→ Rules
→ Add new rule
Configure the rule:
Rule Name:
Allow Sorb Security Phishing Simulation Platform
Condition:
Sender IP address is within range Sender IP:
36.50.34.0/24 36.50.35.0/24 129.126.138.112/28 192.82.62.32/27
Action:
Set spam confidence level (SCL) to -1
This ensures the messages are not treated as spam.
Step 4 – Verify Email Delivery
Verify delivery using:
Microsoft Defender
→ Email & Collaboration
→ Explorer
or
Exchange Admin Center
→ Mail Flow
→ Message Trace
Confirm that the simulation email is delivered to the user inbox.
Solution for Google Workspace
In Google Workspace, configuration is performed in the Google Admin Console.
Step 1 – Access the Admin Console
Open:
https://admin.google.com
Navigate to:
Apps
→ Google Workspace
→ Gmail
Step 2 – Add Simulation IPs to the Gmail Allowlist
Navigate to:
Spam
→ Email Allowlist
Add the simulation platform IP ranges.
Example:
36.50.34.0/24 36.50.35.0/24 129.126.138.112/28 192.82.62.32/27
This prevents Gmail from classifying the emails as spam.
Step 3 – Configure Allowed Sender Domains
Navigate to:
Safety
→ Spoofing and Authentication
Add the simulation domain:
sorbsecurity.com
This reduces phishing detection for the authorized simulation sender.
Step 4 – Verify Message Delivery
Use the email log search:
Reporting
→ Email Log Search
Confirm the message was successfully delivered.
Solution for Zimbra
For Zimbra Collaboration, configuration is typically done using Postfix and SpamAssassin allow lists.
Step 1 – Allow Simulation IP Ranges
Add the vendor IP ranges to the Postfix allow list.
Example configuration:
36.50.34.0/24 OK
36.50.35.0/24 OK
129.126.138.112/28 OK
192.82.62.32/27 OK
Restart mail services:
zmmtactl restart
Step 2 – Whitelist Sender Domain
Edit the SpamAssassin configuration:
/opt/zimbra/conf/salocal.cf
Add:
whitelist_from *@sorbsecurity.com
Restart the spam filtering service:
zmamavisdctl restart
Step 3 – Verify Email Delivery
Send a test phishing simulation email and confirm that it is delivered to the mailbox.
Check mail logs:
/var/log/zimbra.log
Please reach out to wecare@sorbsecurity.com if you have any questions.