Example of Email Security Application Providers: AppRiver, Barracuda, Check Point, Cisco Ironport, ESET, FireEye, ForcePoint, Fortinet FortiGate, Kaspersky, McAfee MX, Message Labs, Mimecast, ProofPoint, SonicWall, Sophos, Symantec, Trend Micro, Zix
Please check this list, and configure any mentioned applications to allow our educational emails to get through, this is not a comprehensive list and if your organization uses any other email security tools that scan, block, or filter emails then you will need to white list our sending IP addresses before PhishFirewall can be deployed
Quick Reference for Configuring 3rd Party Email Security Applications:
- IP Addresses: 168.203.37.175, 168.203.37.174, 168.203.36.203
- Netmask: "255.255.255.255"
- Full List of Domains In Use can be found Here.
Generic Instructions.
Key Goal: ensure that emails from "168.203.37.175, 168.203.37.174, 168.203.36.203" are not blocked or impacted by your email security application.
Note: We advise you to find the guides published by your email security application, to have the most streamlined experience. You will often find these guides under
Step-By-Step Generic Instructions:
1. Log into the administration console of your email security application .
2. Navigate to the area of the console where IP address whitelisting is managed. This is often labeled something like "Policies", "Filter Settings", "IP Configuration", "Gateway" or "Security Services", depending on the specific provider.
3. Add the 3 provided IP addresses to the whitelist: 168.203.37.174, 168.203.37.175, 168.203.36.203
If the netmask is required: 255.255.255.255 .
168.203.37.174
mta-203-37-174.sparkpostmail.com
168.203.36.203
mta-203-36-203.sparkpostmail.com
168.203.37.175
mta-203-37-175.sparkpostmail.com
You might also have to specify the action as "Allow" or similar.
4. Save or apply the changes to update the whitelist.
This is a general guide, as the exact process will vary depending on the specific email security application. Make sure to review the documentation provided by your specific provider or reach out to their support for provider-specific instructions if needed.
You need to ensure that emails from "168.203.37.175, 168.203.37.175, 168.203.36.203" are not blocked or impacted by your email security application.