Maximize your protection, eliminate business risks.
Optimize and modernize with cloud transformation.
Empower your people to work securely from anywhere.
Let us handle IT so you can focus on growing your business.
Get multichannel 24/7/365 expert end-user support.
Protect, detect, and respond—Dataprise keeps your business secure.
Maximize uptime with with industry-leading DRaaS.
Swiftly mitigate cyber threats and restore security.
Improve efficiency, productivity and outcomes with cloud.
Ensure all mobile devices, everywhere, are secure.
Gain a competitive edge with strategic IT solutions.
This battle-tested checklist enables your team to swiftly initiate a ransomware response.
IT for businesses of all sizes, in any industry.
Empower institution growth with custom IT solutions.
Ensure your firm is always in compliance.
Improve patient care and staff morale.
Deal with pressing legal matters, not IT.
Keep up with the evolving digital landscape.
Focus on your mission by outsourcing IT.
Accelerate PE client deals and secure data.
Empower Your Municipality with Secure, Reliable IT Services
Execute initiatives and develop IT strategies.
Get the latest industry insights and trends.
Join us at events in person and online.
Hear from clients and learn more about strategic IT.
See how Dataprise can make IT your greatest asset.
Get informative technical resources from IT experts.
Stay on stop of emerging cybersecurity threats.
Discover the key areas of DR your organization needs to address to ensure downtime is minimized.
Gain a strategic asset by bringing harmony to IT.
Ensure 24/7 support and security with dedicated teams.
Drive business forward by partnering with Dataprise.
Meet our one-of-a-kind leadership team.
Discover the recognition Dataprise has earned.
Help us help businesses with strategic IT.
Grow through acquisition and partnership with Dataprise.
Embracing different perspectives and backgrounds.
Find a Dataprise location near you.
Dataprise is committed to empowering more women to consider a career in technology.
Explore our trusted partnerships with leading tech innovators.
Posts
By: Dataprise
Table of content
Watch this video or use the instructions below to learn how you can add email addresses or domains to your Safe Senders List in Outlook to whitelist them.
We’ll cover how to do this in the Outlook desktop app as well as online through the Outlook Web App.
Full Transcript:
If you want to make sure you get emails from a specific contact in Office 365, you’ve probably stumbled on a lot of articles that talk about using the Exchange Admin center or PowerShell.
The problem with these methods is unless you’re an IT admin, you probably don’t have access to the Exchange Admin Center or PowerShell.
Instead, you can add an email address to your Safe Senders list in Office 365. This will whitelist the email in Office 365 for just your account—if you want to make a larger change, you’ll need to get with an IT admin using one of the methods above, and we have instructions for that too.
There are two different ways to whitelist emails. You can whitelist a specific email address or you can whitelist all email addresses from a certain domain.
So for example, say your bank keeps emailing you from [email protected] and you’re tired of digging around your junk mail folder for important notices. You could choose to whitelist
Either of these methods will result in your bank notifications being delivered, but there are some nuances between the two options.
Email phishing attacks have increased more than 250% over the last year, making them the most common type of malicious attack according to Microsoft’s 2018 Security Intelligence Report (Volume 24).
Phishing Attack – A phishing attack is a form of social engineering where malicious actors send emails disguised as legitimate to trick users into giving up sensitive information—credit card numbers, login credentials, etc.
Hackers sending phishing emails are often able to spoof an important email domain—like Microsoft—or even your bank. To the recipient, these emails appear to come from these reputable senders because they appear to have the correct email domain.
When you whitelist an entire domain in Office 365, some of these “spoofed” emails or phishing attempts that would normally be caught and stopped by Office 365 intelligence and security measures are instead sent straight to your inbox—where you’re more likely to fall prey to the attack.
Whitelisting a single email address in Office 365 helps prevent this type of threat because only one single email address is given the “go ahead,” while all others are still subject to Office 365 security screenings.
Of course, the address you’ve whitelisted is still at risk of being spoofed, so it’s always important to stick to email security best practices and never give sensitive information out over email.
The risk of phishing attacks is why Exchange Online Protection will ignore any domains you’ve whitelisted by default.
Microsoft states any email addresses or domains in your safe senders and recipients list are never sent to your Junk Email Folder. However, if your organization has Exchange Online Protection, email addresses added to the Safe Senders list will be honored, but not Safe Domains added by users:
EOP will honor your users’ Safe Senders and Recipients, but not Safe Domains. This is true regardless of whether the domain is added through Outlook on the Web or added in Outlook and synchronized using Directory Sync.
This can be a helpful if you’re troubleshooting why email domains you’ve added to your safe senders list may still be going to your junk mail. Try adding only the specific email addresses you need to your list instead.
Now that we’ve gotten some of the preliminary pieces out of the way, let’s get to how you actually add email addresses to this list.
There are two ways end users can add email address to their safe senders list:
This article will include directions for both methods.
This email address is now whitelisted in Office 365.
The Outlook Web App recently received a facelift. If you’re on the new version, use these instructions. If you’re on the old version, use the whitelisting instructions in the next section.
INSIGHTS
Subscribe to our blog to learn about the latest IT trends and technology best practices.