Mimecast Whitelisting


Whitelisting is an important facility for the successful implementation and usage of the CyberRiskAware Platform. All clients of the CyberRiskAware platform MUST whitelist our mail server to allow the successful delivery of Mock Phishing and Training emails. This is a requirement for all mail service providers.


Whitelisting in Mimecast is achieved through implementing several policies from the Administration console.

Applying the following policies should allow Cyber Risk Aware’s simulated phishing emails to arrive in the target inboxes. Emails containing attachments should also be catered for based on these policies.


Permitted Sender Policy


  • Log in to the Administration Console
  • From the Administration Toolbar, select the menu item Gateway | Polices.
  • Within the policy dropdown, select Permitted Senders.
  • Click New Policy
  • Enter the details presented in the image below with the Source IP Ranges:
  • 192.254.120.51/32
  • 168.245.104.162/32



Anti-Spoofing Policy


  • Log in to the Administration Console
  • From the Administration Toolbar, select the menu item Gateway | Polices.
  • Within the policy dropdown, select Anti-Spoofing.
  • Click New Policy
  • Enter the details presented in the image below with the Source IP Ranges:
  • 192.254.120.51/32
  • 168.245.104.162/32
  • Ensure the Select Option is set to Take No Action




Attachment Bypass Policy


  • Log in to the Administration Console
  • From the Administration Toolbar, select the menu item Gateway | Polices.
  • Within the policy dropdown, select Attachment Protection Bypass.
  • Click New Policy
  • Enter the details presented in the image below with the Source IP Ranges:
  • 192.254.120.51/32
  • 168.245.104.162/32
  • Ensure the Select Option is set to Disable Attachment Protection


NOTE: Profile Group will need set to a group that you will need to select.



URL Protection Bypass Policy


  • Log in to the Administration Console
  • From the Administration Toolbar, select the menu item Gateway | Polices.
  • Within the policy dropdown, select URL Protection Bypass.
  • Click New Policy
  • Enter the details presented in the image below with the Source IP Ranges:
  • 192.254.120.51/32
  • 168.245.104.162/32
  • Ensure the Select Option is set to Disable URL Protection



Attachment Management Bypass Policy


  • Log in to the Administration Console
  • From the Administration Toolbar, select the menu item Gateway | Polices.
  • Within the policy dropdown, select Attachment Management Bypass.
  • Click New Policy
  • Enter the details presented in the image below with the Source IP Ranges:
  • 192.254.120.51/32
  • 168.245.104.162/32
  • Ensure the Select Option is set to Disable Attachment Management