Skip to main content
How do I whitelist using Microsoft Defender?
Soumalya Mitra avatar
Written by Soumalya Mitra
Updated over a week ago

Microsoft by default enables safe links policy that analyses all links inside an email and restricts its access if it is indicated as a phishing link. Since Right-Hand URLs are used for phishing simulations, sometimes Microsoft classifies these links as suspicious and restricts access to these URLs. To ensure the successful execution of phishing simulation, we encourage companies to whitelist our URLs by creating a safe links policy. This article will help you with the process of creating a safe links policy for Right-Hand URLs.

How to Skip Safe Links Policy For Phishing Readiness?

  1. Open Microsoft Admin Exchange in your browser.

  2. Navigate to Mail flow on the left sidebar and click Rules.


  3. Click the + icon and then click Bypass spam filtering.

  4. In the new window that appears, type a name for the rule and click Apply this rule if

  5. Now click the + icon and type the Right-Hand IP Address and then click OK.

  6. From the Do the following… drop-down, select modify the message properties and click set a message header. The Set the message to this value option will appear in the Apply this rule if tab.

  7. Click the Enter text button after "Set the message header" and type the following text in the message header "X-MS-Exchange-Organization-SkipSafeLinksProcessing" and click OK.

  8. Click Enter text button after "to the value" and type 1 and click OK.

  9. Click on add action and then click Save.

  10. Verify if the policy exists in the list of rules.

Now all campaign emails from Right-Hand will bypass Windows Defender Safe Links Policy.

Did this answer your question?