IeL Pre-Deployment

iLMS and PhishProof

Written By Marissa Fegan (Super Administrator)

Updated at September 11th, 2025

Please review and implement the following pre-deployment requirements to ensure the optimal performance and functionality of the Inspired eLearning (IeL) platform and its components, including the iLMS, PhishProof, and associated courses.

System Requirements

Product or Component System Requirements
iLMS

Web Browsers

We support the latest release of the following browsers on both Mac and Windows operating systems:

  • Google Chrome
  • Microsoft Edge
  • Mozilla Firefox
  • Apple Safari

Other Requirements

You must also have the following: 

  • JavaScript must be enabled in your browser
  • A minimum of 4 Mbps download and 0.5 Mbps upload speed per host machine
  • Display Settings set at:
    • Browser and operating system zoom level set to 100%
    • Screen resolution between 1024 x 768 and 1920 x 1080

 

Course Content

Web Browsers

We support the latest release of the following browsers on both Mac and Windows operating systems:

  • Google Chrome
  • Microsoft Edge
  • Mozilla Firefox
  • Apple Safari

Other Requirements

You must also have the following: 

  • JavaScript must be enabled in your browser
  • A minimum of 4 Mbps download and 0.5 Mbps upload speed per host machine
  • Display Settings set at:
    • Browser and operating system zoom level set to 100%
    • Screen resolution between 1024 x 768 and 1920 x 1080

For optimal performance, we recommend using a desktop or laptop with a supported browser and a stable, direct internet connection.

 

Users may experience issues when accessing training courses through the following:

  • Thin clients (e.g., Citrix or virtual desktops)
  • Proxy connections

Mobile Ready courses

The Learner Center is mobile responsive however users may experience issues when accessing training courses that are not Mobile Ready. For a complete list of Mobile Ready courses, consult the Course Catalog.

PhishHook Add-in

Email Clients

  • Outlook in Microsoft 365
  • Outlook 2016+ (Microsoft Windows)
  • Outlook for Mac
  • Outlook mobile app (for iOS or Android)
  • Gmail in Google Workspace

Pre-Deployment Action Items: Hosted & SCORM

Please complete the following steps to ensure the iLMS platform and Inspired eLearning courses function correctly. Hosted customers using iLMS must include both the LMS and CDN domains, while SCORM customers only need to include the CDN domains for course content.

Step 1: Add Exceptions to Network Security - Intrusion Detection System (IDS) and Firewall)

Add the following domains to your allow-list:

  • LMS Domains
    • *.inspiredlms.com
    • *.securityawarenesstraining.com
  • CDNs for Course Content:
    • spa.tclcdn.com
    • inspiredcdn.s3.amazonaws.com
    • assets.tclcdn.com

Step 2: Add Exceptions for Email Communication

Add the following domains to your email filter allow-list:

  • Default LMS Sender Domain
    • *.inspiredlms.com
    • *.securityawarenesstraining.com
  • Domains used for communications from VIPRE internal teams to designated customer contacts:
    • *.inspiredelearning.com
    • *.vipre.com
  • Domain used for communication with our support teams: *.inspiredelearning.zendesk.com

Step 3: Adjust Browser Settings

Add the following to the trusted sites and privacy settings in your browser:

  • LMS Domains
    • *.inspiredlms.com
    • *.securityawarenesstraining.com
  • (Only If using Skillsoft Content) Content Streaming Domain: *.skillport.com

Allow pop-ups from the following site to ensure courses launch properly:

  • LMS Domains
    • *.inspiredlms.com
    • *.securityawarenesstraining.com

Completing these steps ensures optimal performance and functionality of the iLMS and courses.


Pre-Deployment Action Items: PhishProof

PhishProof Prerequisites

To ensure our simulated phishing campaigns and training notifications successfully reach your users, it's essential to add our IP addresses, domains, and URLs to your allowlists. This guide provides the prerequisites and instructions to do just that, with dedicated sections at the bottom tailored for your environment.

We will be sending simulated phishing emails from outside your network. Completing the tasks below is essential to ensuring successful email delivery.

Add Exceptions for Phishing Simulations

There are two delivery methods for routing PhishProof emails to your organization: Direct-to-Inbox (DTI) or Conventional Email Delivery.

Universal Allowlisting (Required for all Delivery Methods)

Regardless of your delivery method (Conventional or DTI), the following domains must be added to your email security solution (IDS, Firewall, or Cloud Filter) to ensure landing pages and educational content are accessible.

The following has been formatted for easy copying from here and pasting into a CSV for importing.

PhishProof Landing Page and Template Domains

*.phishproof.com

accountsecurity.online
amznbks.com
bankameriica.com
certifyjob.com
clickweb.solutions
faceboookfriendster.com
filescanners.org
formsmail.com
funitgames.org
googllesecurity.net
ibsbanks.com
mailsystems.online
securityadmin.net
securityalert.org
starrwood.net
systemadsmin.org
twitttersocialpage.com
upssite.com
uspostallservice.com
wallgreenspharm.com
web-access-alerting.com
boxfilesshare.com
docutransfers.com
employee-rewards.net
hr-rewardscenter.com
hq-administrators.com
itpatching-installs.com
corp-addmin.com
admin-tokenalert.com
sso-server.com
login-microsoft.com


Direct-to-Inbox Configuration

If your organization uses Microsoft 365 as your email platform, you must configure Direct-to-Inbox (DTI). Failure to use DTI will result in PhishProof campaigns being blocked or filtered, preventing simulations from reaching your users' inboxes.

Please navigate to PhishProof Direct-to-Inbox for complete details on how to configure DTI, including configuring an Inbound Connector in Microsoft 365 and configuring Mail Flow Rules. 

Conventional Email Delivery

If you are using conventional SMTP delivery, ensure the IP addresses listed below are permitted through your gateway.

The following has been formatted for easy copying from here and pasting into a CSV for importing.

Sending IP Addresses used for email delivery

69.72.47.208
69.72.47.209
69.72.47.21
69.72.47.210
69.72.47.211
69.72.47.3
69.72.47.30
69.72.47.31
69.72.47.56
159.135.234.148

159.112.248.122

SMTP Relay used by PhishProof smtp.mailgun.org

Additional Configuration

Select this if your organization uses Microsoft Email Services - Required for both DTI and conventional delivery methods

 

Select this if your organization uses Microsoft Email Services AND a third-party Secure Email Gateway (including VIPRE Email Security Cloud) - Required only for conventional delivery methods

 
 

This section provides the necessary steps to ensure that simulated phishing emails and educational links are delivered and function correctly without being blocked or altered by Microsoft's security filters.

Steps Required for all Delivery Methods

Regardless of your delivery method (Conventional or DTI), action is required to prevent Microsoft Defender SmartScreen from misidentifying safe PhishProof educational landing pages as malicious. 

Update Group Policy settings for SmartScreen


Steps Required for Conventional Delivery Only

If your organization uses conventional email delivery, the following configuration is required to further ensure seamless email delivery and proper functionality of your phishing simulations.

Configure Allow-Listing in Microsoft 365 Defender:

Bypass ATP Link and Attachment Processing: 

 

If your organization utilizes Microsoft 365 in conjunction with a third-party Secure Email Gateway (SEG), such as VIPRE Email Security Cloud, additional configuration is required to prevent mail flow disruptions. Due to intermediary routing, Microsoft 365 may not correctly recognize simulation emails as coming from PhishProof when using a third-party cloud filter.

Step 1: Create a Receive Connector in Office 365

A Receive Connector allows emails processed by your third-party filter to enter Microsoft's email service securely.

Step 2: Enable Enhanced Filtering for the Receive Connector in Exchange Online

This ensures that Microsoft recognizes emails routed through your third-party filter as trusted.