Onboarding: Delivery

3rd Party Email Security Applications

We have provided some basic resources to utilize while configuring your 3rd party email security applications.

Example of Email Security Application Providers: AppRiver, Barracuda, Check Point, Cisco Ironport, ESET, FireEye, ForcePoint, Fortinet FortiGate, Kaspersky, McAfee MX, Message Labs, Mimecast, ProofPoint, SonicWall, Sophos, Symantec, Trend Micro, Zix
Please check this list, and configure any mentioned applications to allow our educational emails to get through, this is not a comprehensive list and if your organization uses any other email security tools that scan, block, or filter emails then you will need to white list our sending IP addresses before PhishFirewall can be deployed

Quick Reference  for Configuring 3rd Party Email Security Applications:

- IP Addresses: 168.203.37.175, 168.203.37.174, 168.203.36.203

- Netmask: "255.255.255.255"

- Full List of Domains In Use can be found Here.

Generic Instructions.

Key Goal: ensure that emails from "168.203.37.175, 168.203.37.174, 168.203.36.203" are not blocked or impacted by your email security application.

Note: We advise you to find the guides published by your email security application, to have the most streamlined experience. You will often find these guides under

Step-By-Step Generic Instructions:

1. Log into the administration console of your email security application .

2. Navigate to the area of the console where IP address whitelisting is managed. This is often labeled something like "Policies", "Filter Settings", "IP Configuration", "Gateway" or "Security Services", depending on the specific provider.

3. Add the 3 provided IP addresses to the whitelist: 168.203.37.174, 168.203.37.175, 168.203.36.203
If the netmask is required: 255.255.255.255 .

168.203.37.174
mta-203-37-174.sparkpostmail.com
168.203.36.203
mta-203-36-203.sparkpostmail.com
168.203.37.175
mta-203-37-175.sparkpostmail.com

You might also have to specify the action as "Allow" or similar.

4. Save or apply the changes to update the whitelist.

This is a general guide, as the exact process will vary depending on the specific email security application. Make sure to review the documentation provided by your specific provider or reach out to their support for provider-specific instructions if needed.

You need to ensure that emails from "168.203.37.175, 168.203.37.175, 168.203.36.203" are not blocked or impacted by your email security application.

Next Step:

Great Job, now we will sync your users!

Have Suggestions

At PhishFirewall, your satisfaction is our priority and we are relentlessly committed to enhancing your experience with us. We understand that user feedback is crucial in our mission to deliver the best service possible.

We are particularly eager to understand your thoughts about our onboarding process, as we have identified this as a potential area for improvement based on customer feedback. We would greatly value your insights on how we can make this process more seamless and user-friendly for you.

You can easily share your thoughts and suggestions with us through email or by filling out the accompanying form.

Thank you in advance for your invaluable feedback - it's a key ingredient in our recipe for continual improvement!
Thank you! Your feedback has been received!
Oops! Something went wrong while submitting the form.