Skip to main content

Configure Microsoft 365 to Authorize the IP Addresses Used in Arsen Simulations

IP-based Whitelisting

Updated over a month ago

This procedure describes how to manually whitelist Arsen phishing simulation traffic in Microsoft 365 so that simulation emails bypass spam filters, avoid quarantine, and reliably reach employee inboxes.


1 – Objectives

  • Authorize Arsen simulations using dedicated IP addresses.

  • Bypass anti-spam filtering to avoid false positives.

  • Prevent simulation emails from being quarantined.

  • Improve deliverability using a Microsoft 365 connector.


2 – Prerequisites

  • Administrator access to the Microsoft 365 tenant.

  • Ability to access Microsoft 365 Defender and the Exchange Admin Center.

  • Permissions to modify mail flow and anti-spam policies.


3 – Add Arsen IP Addresses to the Allowed IP List

Steps:

  • Sign in to Microsoft 365 Defender.

  • Go to Policies & RulesThreat Policies.

Microsoft 365 Defender navigation showing “Policies & Rules” and “Threat Policies”.
  • Open Connection Filter Policy (Default)Edit connection filter policy.

Threat policies list displaying anti-spam settings and the default connection filter policy.
Liste des politiques anti-spam et ouverture de la Connection filter policy (Default).
  • Under Always allow messages from the following IP addresses, add:

    • 161.38.204.14

    • 185.211.123.249

  • Check Turn on safe list and click Save.

Connection filter policy editor with 161.38.204.14 added and Safe List enabled.


4 – Bypass Anti-Spam Filtering

  1. Open the Microsoft 365 Admin Center.

  2. Navigate to Exchange.

Microsoft 365 Admin Center highlighting access to Exchange Admin Center.
  1. Go to Mail FlowRules.

  2. Click +Create a new rule.

Exchange Admin Center showing “Add a rule” in the Mail Flow section.

Configure the rule:

  • Name: Arsen Simulation Access

  • Apply this rule if…

    • The sender → IP address is in any of these ranges or exactly matches

    • Add: 161.38.204.14, 185.211.123.249

Condition being configured with sender IP address 161.38.204.14

Actions:

  1. Modify the message properties → Set a message header

    • Header: X-MS-Exchange-Organization-BypassClutter

    • Value: true

Transport rule action setting X-MS-Exchange-Organization-BypassClutter to true.
  1. Add another action:
    Modify the message properties → Set the spam confidence level (SCL) to

    • Value: -1 (Bypass Spam Filtering)

Rule configuration showing SCL set to -1

Click Next, review, and Save.

Récapitulatif des conditions d’une règle de transport Exchange pour Arsen : IP autorisée, bypass Clutter et SCL -1


5 – Prevent Emails from Being Quarantined

  1. In Mail FlowRules, create another new rule.

Microsoft Exchange menu showing mailbox and mail flow management sections.

Configure:

  • Name: Arsen Quarantine Avoidance

  • Condition:
    The sender → IP address is in any of these ranges or exactly matches

    • Add: 161.38.204.14, 185.211.123.249

Action:

  • Modify the message properties → Set a message header

    • Header: X-Forefront-Antispam-Report

    • Value: SFV:SKI;CAT:NONE;

Transport rule configuration adding header X-Forefront-Antispam-Report with value SFV:SKI;CAT:NONE;.

Click Save.

You should now see two rules in the Mail Flow Rules list.

Détail d’une boîte aux lettres Exchange – Menu latéral montrant l’accès aux paramètres généraux, aux alias, aux règles, et aux autorisations.


6 – Configure a Connector to Avoid Delivery Delays

  1. In the Exchange Admin Center, go to Mail FlowConnectors.

  2. Click + Add a connector.

Exchange Connectors section with Add a connector button.

Configure:

  • From: Partner organization

  • To: Office 365

  • Name: Arsen Training Connector

  • Enable Turn it on

IP settings:

  • Choose:

By verifying that the IP address of the sending server matches one of the following IP addresses…

  • Add:

    • 161.38.204.14

    • 185.211.123.249

  • Click Next.

Connector IP validation screen listing Arsen IP addresses.

Security:

  • Check Reject email messages if they aren’t sent over TLS

Connector security options with TLS enforcement enabled.

Finally, click Create Connector.

Détail d’une règle de boîte aux lettres Exchange – Édition des conditions et actions appliquées aux messages entrants.

Did this answer your question?