Central Phish Threat



Educate employees to spot the latest cyber-attacks with Sophos Phish Threat. In this short demo video, you’ll experience Phish Threat from the administrator. Sophos Central Phish Threat - subscription license renewal (2 years) - 1 us. Something went wrong. Please try again later. Better Together. This Item: Sophos Central Phish Threat - subscription license renewal (2 years) - 1 us. Total Price: Add to Cart.

Here you can see the domains and IP addresses that Phish Threat uses to send campaign emails.

Go to Phish Threat > Settings > Sending domains and IPs to review your domains and IP addresses.

You must allow email and web traffic to and from these IPs and domains on your email gateway, web proxy, firewall appliance, or anywhere else in your environment where email and web filtering is done.

You can also find out more about how Office 365 ATP Safe Link and Safe Attachments interact with Phish Threat V2. Dvd maker free download mac.

Central Phish Threat

This list updates when we add new IPs and domains.

IP addresses

To ensure successful delivery of Phish Threat emails, you must add the following IP addresses to your allow list:

  • 54.240.51.52
  • 54.240.51.53

Domain names

You must also add the domains listed below to your allow lists.

Central Phish Threatening

If you're using an external email proxy (including Central Email), you may also need to amend your SPF records.

Links contained within campaign emails are configured to redirect users to an awstrack.me URL. This is expected behavior, as Phish Threat uses AWS tracking to determine which users have clicked on the malicious links.

  • amaz0nprime.store
  • auditmessages.com
  • awstrack.me
  • bankfraudalerts.com
  • buildingmgmt.info
  • corporate-realty.co
  • court-notices.com
  • e-billinvoices.com
  • e-documentsign.com
  • e-faxsent.com
  • e-receipts.co
  • epromodeals.com
  • fakebookalerts.live
  • global-hr-staff.com
  • gmailmsg.com
  • goog1e-mail.com
  • helpdesk-tech.com
  • hr-benefits.site
  • it-supportdesk.com
  • linkedn.co
  • mail-sender.online
  • memberaccounts.co
  • micros0ft.tech
  • myhr-portal.site
  • online-statements.site
  • outlook-mailer.com
  • secure-alerts.co
  • secure-bank-alerts.com
  • shipping-updates.com
  • tax-official.com
  • toll-citations.com
  • trackshipping.online
  • voicemailbox.online
  • itunes.e-reciepts.co
  • sophos-phish-threat.go-vip.co
  • go-vip.co

Office 365 ATP Safe Links and Safe Attachments

Sophos Central Phish Threat

Office 365 Advanced Threat Protection (ATP) offers security features such as Safe Links and Safe Attachments.

ATP Safe Links can help protect the organization by providing time-of-click verification of web addresses (URLs) in email messages and Office documents. The ATP Safe Attachments feature checks to see if email attachments are malicious, and then takes action to protect the organization.

If Phish Threat V2 IP address and domain names are not included in the allow list, Office 365 executes the links. This makes it seem like an end user has clicked on the links. To ensure the proper execution of Phish Threat V2 with Office 365, set up an exception for the phish threat for both Safe Links and Safe Attachments in Office 365. For instructions on how to set up these exceptions, see IP addresses and domains.

Sophos Central Phish Threat Trial

Other 3rd party email scanning products and Phish Threat V2

Other 3rd party email security products may apply their own scanning techniques that open links and attachments in emails as they are processed. If this is the case you may receive reports indicating that your users have clicked links.

Please make sure the above IPs and domains are added to allow lists within the 3rd party product.

We are aware that some 3rd party solutions do not allow their security features to be bypassed in this way. We are actively investigating ways to prevent false positive campaign results caused by 3rd party security products. We hope to include these in Phish Threat in the near future.

You can add or manage groups of users.

You can use groups to assign a policy to multiple users at once.

The sections below tell you about the groups list and how to add, modify or delete groups.

About the groups list

The current groups are listed and the number of users in each group is shown.

Central Phish Threat

To see full details for a group, click the group's name.

Add a group

  1. Click the Add Group button.
  2. In the Add Group dialog, enter the following settings:

    Group Name: Enter the name of the new group.

    Available Users: Select users from the list of available users.

    Tip In the Search box you can start typing a name to filter down the displayed entries.
  3. Click Save.

Modify a group

To modify a group, click the group's name to open and edit the group details. For more information, see User Group Details.

Central Phish Threats

Delete a group

Central Phish Threatens

To delete a group, select it and click Delete in the upper right of the page.

Deleting a group will not delete its users.