Ensure delivery of your phishing tests with PhishProof Direct-to-Inbox. By integrating directly with your Microsoft 365 environment, this feature bypasses traditional security email gateways, ensuring your simulated messages always reach their target for more effective training.
PhishProof Direct-to-Inbox currently integrates only with Microsoft 365.
VIPRE Recommends
For a seamless deployment, we recommend rolling out to a small pilot group of users before deploying to the entire organization.
Before you begin, if you have not already done so, please review the PhishProof Prerequisites. It is recommended to have them open in another browser window during this setup process.
To configure Direct-to-Inbox:
- From within iLMS, click PhishProof from the left menu
- Once PhishProof opens, hover over Settings in the left menu, and select Direct-to-Inbox
Step 1: Configure Microsoft 365 for PhishProof
To configure DTI, you must complete several processes within your Microsoft 365 environment, including configuring an inbound connector, mail flow rules, and a connection filter policy, which will allow PhishProof to bypass your email security.
Before starting, ensure you have administrative access to the Microsoft 365 Exchange Admin Center and Microsoft Defender.
Configure an Inbound Connector in Microsoft 365
Configuring an inbound connector in Microsoft 365 Exchange Admin Center streamlines email flow and enhances security for your organization's communication infrastructure. This process allows you to establish trusted connections with partner organizations and implement custom mail routing rules.
- In a second browser tab, log in to the Microsoft 365 Exchange Admin Center
- Navigate to the Mail Flow > Connectors section
- Click Add Connector

- Select Partner Organization in the connection type
- Provide a descriptive Connector Name

- On the Authenticating sent email screen, select By verifying that the IP address of the sending server matches one of the following IP addresses, which belong to your partner organization
- In this case, we (VIPRE Security Group) are your partner organization
- Use the relevant IP addresses below based on your geographical location
Region/Access URL | IP Address |
---|---|
Asia |
13.215.236.136 |
Europe |
176.34.82.119 54.72.119.208 52.211.103.221 |
EMEA |
34.253.128.215 54.72.119.208 52.211.103.221 |
North America |
34.229.36.22 52.54.239.51 100.29.131.89 54.91.86.36 |
Partners |
54.156.131.219 52.54.239.51 100.29.131.89 54.91.86.36 |
- Click Next
- On the Security Restrictions screen, enable TLS security restrictions by selecting Reject email messages if they aren't sent over TLS, then click Next
- After reviewing the connector settings, click Create Connector at the bottom of the page
Configure Mail Flow Rules
This section explains how to create a mail flow rule in Microsoft 365 to bypass spam filtering for emails sent from specific IP addresses. This rule works by setting the Spam Confidence Level (SCL) to -1, which prevents messages from trusted sources from being sent to the junk or spam folder.
- Assuming you're still logged in to the Microsoft 365 Exchange Admin Center (EAC), select Mail flow > Rules from the navigation menu
- Click +Add Rule, then select Create a new rule
- Enter a descriptive name for your rule
- Under Apply this rule if, select The sender, then choose IP address is in any of these ranges or exactly matches
Image C - Configure Rule Conditions - In the window that appears, enter the trusted IP addresses that you want to allow; these should match the IP addresses configured in your inbound connector, as shown above in Table A - DTI Email Service IP Addresses
- Click Save
- Under Do the following, select Modify the message properties, and then choose Set the spam confidence level (SCL)
- In the pop-up window, select Bypass spam filtering from the dropdown menu
- There is no need to change this from the default SCL value
- Click Save, then Next
-
Rule mode: Select Enforce
- This turns the rule on as soon as it's saved
-
Stop processing more rules: Check this box
- This prevents subsequent rules from overriding this action and potentially marking the email as spam
Image D - Rule Settings
- This prevents subsequent rules from overriding this action and potentially marking the email as spam
-
Rule mode: Select Enforce
- Click Next, review your settings, and then click Finish
- You will see a confirmation that the rule has been created; click Done
- On the Rules screen, click the checkbox next to your newly created rule and select Edit at the top
- Your rule details will appear; click the Settings tab and set Priority to 0
- This ensures it's applied before any other filtering rules
- Click Save
- In the list of Rules, under the Status column, you can see if your rule is Enabled or Disabled
- If your rule is disabled, you can enable it by clicking Disabled to open the details pane and use the toggle to enable it
- Allow a few moments for the rule to become fully active
- If your rule is disabled, you can enable it by clicking Disabled to open the details pane and use the toggle to enable it
![]() |
![]() |
Configure Connection Filter Policy for Phishing Simulations with VIPRE Integrated Email Security
The following steps provide a straightforward method to configure Microsoft Defender to allow phishing simulation emails from VIPRE's PhishProof platform to be delivered directly to your users. This is achieved by whitelisting the PhishProof Direct-to-Inbox (DTI) IP addresses in your connection filter policy, ensuring your phishing simulations are both effective and uninterrupted.
Important
While these steps have been primarily tested with VIPRE Integrated Email Security, the same principle should be able to serve as a general guide for bypassing different Integrated Cloud Email Security (ICES) solutions. Always validate your configuration with your specific email security platform to ensure compatibility.
- Navigate to the Microsoft 365 Defender portal
- In the navigation pane on the left, expand the Email & collaboration, then select Policies & rules
- Choose Threat policies and then find and click on the Anti-spam card
- On the Anti-spam policies page, select Connection filter policy (Default)
- A details pane will slide out from the right; click the Edit connection filter policy button
- In the policy settings, find the section titled Always allow messages from the following IP addresses or address range; in the text box provided, enter all the appropriate regional DTI IP addresses from Table A above
- Ensure you enter one IP address or IP range per line
Image G - Connection filter policy configuration for bypassing VIPRE IES
- Ensure you enter one IP address or IP range per line
- Leave Turn on safe list unchecked
- Click Save at the bottom of the pane, then click Close to exit the policy editor
Step 2: Connect PhishProof to Microsoft 365
After completing the steps above in Microsoft 365, select the tab where you have PhishProof open, and go to Step 2: Connect PhishProof to your Microsoft 365 Environment.

Field | Description |
---|---|
Domain(s) |
This field controls which of your organization's email domains will use Direct-to-Inbox delivery for phishing campaigns.
|
Host URL |
This field is for your Microsoft 365 hostname. Use the steps below to locate it.
Before starting, ensure you have administrative access to the Microsoft 365 Admin Center.
Step 1: Access Your Domain Settings
Step 2: Locate Your DNS Records
Step 3: Find Your Hostname
|
Port | The default port number is 25 unless an administrator has explicitly changed it. |
Steps 3 & 4: Test Connection and Enable Direct-to-Inbox
Under Step 3: Test your Connection, you can confirm your setup by sending a test email. This will verify that PhishProof can connect to your mail server and deliver messages directly to the target inbox.
- Enter your desired test email address in the text field and click Send Test Email
- If successful, you will see a green confirmation that says “Connection successful. A test email has been sent to the address above.”
- To verify this in your test Inbox, look for the email subject Test Email - Connection Verification
- Once that test has been successfully completed, select the toggle next to Enable Direct-to-Inbox and click Save

Congratulations! Direct-to-Inbox has been successfully configured within PhishProof.