# Whitelist Cisco IronPort (ESA)

# **Whitelist Cisco IronPort (ESA) for CyTech – AQUILA Phishing Simulation**

## <span style="color: rgb(53, 152, 219);">**Why Whitelist in Cisco IronPort?**</span>

Whitelisting ensures that the CyTech - AQUILA Phishing Simulation (PS) emails are delivered without interference from Cisco IronPort’s anti-spam and threat detection filters. Without proper configuration, PS emails may be quarantined, flagged, or altered, impacting the accuracy and effectiveness of the training.

To ensure proper delivery, the following configurations are recommended:

- IP Allow List (HAT Policy)
- Mail Flow Policies (Mail Policy)
- Content Filters (Bypass ATP and anti-spam)
- Domain and URL Filtering

---

## <span style="color: rgb(53, 152, 219);">**Key Configurations**</span>

##### **1. Whitelist Sending IP Addresses (HAT Policy - Mail Flow Policy)**

**Steps:**

1. Log in to Cisco IronPort (ESA) via the web interface.
2. Go to **Mail Policies &gt; HAT Overview**.
3. Edit the **Incoming Mail Policy** or create a new one for CyTech Phishing Simulation.
4. Under the "Sender Group", create a new entry (e.g., **AQUILA-Phish**).
5. Add the following IPs: Mail Server and Landing Page
    
    ```
    35.153.237.243
    ```
    
    ```
    107.22.65.180
    ```
6. Set the **Mail Flow Policy** for this group to **ACCEPTED**.

> ✅ This ensures AQUILA emails are not rejected or throttled by IP filtering.

---

##### **2. Whitelist Domains and Header-Based Filtering (Message Filters)**

To ensure messages are recognized as simulations and not flagged, configure a custom header filter.

**Steps:**

1. Navigate to **Mail Policies &gt; Message Filters**.
2. Add a new filter named **Cytech\_Header\_Bypass.**

**Filter Syntax Example:**

```java
CyTech_Header_Bypass:
if (header("X-PHISHTEST") == "CYTECH") {
   skip-spamcheck();
   skip-viruscheck();
   skip-attachmentcheck();
   log-entry("CyTech Simulation Bypass");
}

```

3. Commit changes and enable the filter.

---

##### **3. Create a Content Filter to Bypass Anti-Spam &amp; ATP (Content Filters)**

**Steps:**

1. Go to **Mail Policies &gt; Content Filters**.
2. Add a new filter (e.g., **AQUILA\_Bypass\_SPAM\_ATP**).
3. Create a condition using either:
    
    
    - **Sender IP**: match any of the CyTech IPs.
        
        
        - **35.153.237.243**
        - **107.22.65.180**
    - **Sender Domain**: match domains listed below.

**Domains to Whitelist:**

```
slackj.com  
ttrelli.com  
airbnd.cc  
attlassians.com  
eebbey.com  
lastpasss.net  
my1psswords.com  
zooms.cc
0365.click
micros0ft.click
offlce.click
```

<div class="contain-inline-size rounded-2xl border-[0.5px] border-token-border-medium relative bg-token-sidebar-surface-primary" id="bkmrk-actions%3A"><div class="overflow-y-auto p-4" dir="ltr">  
</div><div class="overflow-y-auto p-4" dir="ltr">**Actions:**</div></div>- Bypass spam and virus filters.
- Optionally log a custom message.
- Tag emails if needed for internal monitoring.

4. Commit changes.

---

##### **4. URL Filtering / Allow List (Optional - Web Reputation / AMP Integration)**

If you have Cisco AMP or Web Reputation Filters enabled:

**Steps:**

1. Navigate to **Security Services &gt; URL Filtering / Web Reputation Filters**.
2. Add the following simulation URLs to the **Allow List** or mark as **Trustworthy**:

```
slackj.com/*
ttrelli.com/*
airbnd.cc/*
attlassians.com/*
eebbey.com/*
lastpasss.net/*
my1psswords.com/*
zooms.cc/*
0365.click/*
micros0ft.click/*
offlce.click/*
```

---

##### **5. Prioritize Rules (Recommended)**

Ensure that the HAT, content filters, and message filters for CyTech Phishing Simulation have the **highest priority** or are evaluated **before** other blocking rules.

---

### <span style="color: rgb(53, 152, 219);">**Final Checklist**</span>

<p class="callout success">IPs whitelisted in HAT policy</p>

<p class="callout success"> Custom header filtering configured (X-PHISHTEST: CYTECH)</p>

<p class="callout success"> Content filters bypass spam/virus checks</p>

<p class="callout success">Simulation domains and URLs allowed</p>

<p class="callout success"> Filters/rules are enabled and prioritized correctly</p>

*<span class="TextRun SCXW71272603 BCX0" data-contrast="auto" lang="EN-US" xml:lang="EN-US"><span class="NormalTextRun SCXW71272603 BCX0">If you need further </span><span class="NormalTextRun SCXW71272603 BCX0">assistance</span><span class="NormalTextRun SCXW71272603 BCX0">, kindly contact our support at </span></span><span style="color: rgb(53, 152, 219);">**<span class="TextRun SCXW71272603 BCX0" data-contrast="none" lang="EN-US" xml:lang="EN-US"><span class="NormalTextRun SCXW71272603 BCX0">support@cytechint.com</span></span>**</span><span class="TextRun SCXW71272603 BCX0" data-contrast="auto" lang="EN-US" xml:lang="EN-US"><span class="NormalTextRun SCXW71272603 BCX0"> for prompt </span><span class="NormalTextRun SCXW71272603 BCX0">assistance</span><span class="NormalTextRun SCXW71272603 BCX0"> and guidance.</span></span><span class="EOP SCXW71272603 BCX0" data-ccp-props="{}"></span>*