<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Best way to whitelist KnowBe4 Phishing domains? in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Best-way-to-whitelist-KnowBe4-Phishing-domains/m-p/65030#M13292</link>
    <description>&lt;P&gt;So probably an obvious answer to this, but... long story short I need to whitelist the below. These are for phishing training from KnowBe4.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way to import these given they're not all the same classification? Or is it better to attempt to treat these all like a host objects and hope their AWS IP's don't change?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry if it's a silly question. They also don't have CP listed in their documentation so i'd like something to forward on to them to add to it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Online-banking.kb4.io,&lt;BR /&gt;En-us.secureconnection.moneytransaction.kb4.io,&lt;BR /&gt;Mail.kb4.io,&lt;BR /&gt;Breakingnews.comano.us,&lt;BR /&gt;Secure-mail.web.magnetonics.com,&lt;BR /&gt;Socialmedia-insights.bloemlight.com,&lt;BR /&gt;Messaging-security.comano.us,&lt;BR /&gt;Do.not.click.on.this.link.instantrevert.net,&lt;BR /&gt;ftp.phishing.guru,&lt;BR /&gt;test.user-click.phishtrain.org,&lt;BR /&gt;password-changes.phishwall.net,&lt;BR /&gt;Robust-backend.ancillarycheese.com,&lt;BR /&gt;Web-login.malwarebouncer.com,&lt;BR /&gt;https.file-transfers.ancillarycheese.com,&lt;BR /&gt;guru.phishing.guru,&lt;BR /&gt;http.&lt;A href="http://www.secure.kb4.io" target="_blank"&gt;www.secure.kb4.io&lt;/A&gt;,&lt;BR /&gt;su.onamoc.comano.us,&lt;BR /&gt;https.secure-links.bloemlight.com,&lt;BR /&gt;dontclickthis.knowbe4.com,&lt;BR /&gt;us-api.mimecast.com,kb4.io,&lt;BR /&gt;addto.password.land,&lt;BR /&gt;05kqatnrJ9s0sNAh9.phish.farm,&lt;BR /&gt;secure.payment-gateway.microransom.us,&lt;BR /&gt;cardpayments.microransom.us.&lt;BR /&gt;crypt.single-sign-on.password.land.&lt;BR /&gt;oldmacdonald.had-a.phish.farm.&lt;BR /&gt;login.gogie.com,000000000000.phish.farm,&lt;BR /&gt;report-scam.malwarebouncer.com,&lt;BR /&gt;spamchallenge.msftemail.com,&lt;BR /&gt;gmail.net-login.com,&lt;BR /&gt;kn0wbe4.compromisedblog.com,&lt;BR /&gt;welsfargo.com-onlinebanking.com,&lt;BR /&gt;bofa.com-onlinebanking.com,&lt;BR /&gt;chase.com-onlinebanking.com,&lt;BR /&gt;capital1.com-onlinebanking.com,&lt;BR /&gt;2fa.com-token-auth.com,&lt;BR /&gt;token.onelogin.com-token-auth.com,&lt;BR /&gt;cnn.compromisedblog.com,&lt;BR /&gt;employeeportal.net-login.com,&lt;BR /&gt;34.75.2O2.lOl,&lt;/P&gt;&lt;P&gt;strongencryption.org.&lt;BR /&gt;protected-forms.com,&lt;BR /&gt;safe-site.protected-forms.com,&lt;BR /&gt;https.protected-forms.com,&lt;BR /&gt;secured-login.net,&lt;BR /&gt;singlesignon.secured-login.net,&lt;BR /&gt;googl-e.secured-login.net,&lt;BR /&gt;salesfarce.secured-login.net,&lt;BR /&gt;webmail.strongencryption.org.&lt;BR /&gt;login.strongencryption.org.&lt;BR /&gt;account.secured-login.net,&lt;BR /&gt;drive.secured-login.net,&lt;BR /&gt;form.secured-login.net,&lt;BR /&gt;tls.secured-login.net,&lt;BR /&gt;certificate.strongencryption.org.&lt;BR /&gt;office.strongencryption.org.&lt;BR /&gt;suite.strongencryption.org.&lt;BR /&gt;http.protected-forms.com,&lt;BR /&gt;internet.protected-forms.com,&lt;BR /&gt;submit.protected-forms.com,&lt;BR /&gt;*.kb4.io,&lt;BR /&gt;*.comano.us.&lt;BR /&gt;*.magnetonics.com,&lt;BR /&gt;*.bloemlight.com,&lt;BR /&gt;*.instantrevert.net,&lt;BR /&gt;*.phishing.guru.&lt;BR /&gt;*.phishtrain.org.&lt;BR /&gt;*.phishwall.net,&lt;BR /&gt;*.ancillarycheese.com,&lt;BR /&gt;*.malwarebouncer.com,&lt;BR /&gt;*.knowbe4.com,&lt;BR /&gt;*.password.land.&lt;BR /&gt;*.phish.farm.&lt;BR /&gt;*.microransom.us.&lt;BR /&gt;*.msftemail.com,&lt;BR /&gt;*.net-login.com,&lt;BR /&gt;*.compromisedblog.com,&lt;BR /&gt;*.com-onlinebanking.com,&lt;BR /&gt;*.com-token-auth.com,&lt;BR /&gt;*.2O2.lOl,&lt;/P&gt;</description>
    <pubDate>Tue, 15 Oct 2019 20:36:00 GMT</pubDate>
    <dc:creator>Mike_Lutgendorf</dc:creator>
    <dc:date>2019-10-15T20:36:00Z</dc:date>
    <item>
      <title>Best way to whitelist KnowBe4 Phishing domains?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-way-to-whitelist-KnowBe4-Phishing-domains/m-p/65030#M13292</link>
      <description>&lt;P&gt;So probably an obvious answer to this, but... long story short I need to whitelist the below. These are for phishing training from KnowBe4.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way to import these given they're not all the same classification? Or is it better to attempt to treat these all like a host objects and hope their AWS IP's don't change?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry if it's a silly question. They also don't have CP listed in their documentation so i'd like something to forward on to them to add to it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Online-banking.kb4.io,&lt;BR /&gt;En-us.secureconnection.moneytransaction.kb4.io,&lt;BR /&gt;Mail.kb4.io,&lt;BR /&gt;Breakingnews.comano.us,&lt;BR /&gt;Secure-mail.web.magnetonics.com,&lt;BR /&gt;Socialmedia-insights.bloemlight.com,&lt;BR /&gt;Messaging-security.comano.us,&lt;BR /&gt;Do.not.click.on.this.link.instantrevert.net,&lt;BR /&gt;ftp.phishing.guru,&lt;BR /&gt;test.user-click.phishtrain.org,&lt;BR /&gt;password-changes.phishwall.net,&lt;BR /&gt;Robust-backend.ancillarycheese.com,&lt;BR /&gt;Web-login.malwarebouncer.com,&lt;BR /&gt;https.file-transfers.ancillarycheese.com,&lt;BR /&gt;guru.phishing.guru,&lt;BR /&gt;http.&lt;A href="http://www.secure.kb4.io" target="_blank"&gt;www.secure.kb4.io&lt;/A&gt;,&lt;BR /&gt;su.onamoc.comano.us,&lt;BR /&gt;https.secure-links.bloemlight.com,&lt;BR /&gt;dontclickthis.knowbe4.com,&lt;BR /&gt;us-api.mimecast.com,kb4.io,&lt;BR /&gt;addto.password.land,&lt;BR /&gt;05kqatnrJ9s0sNAh9.phish.farm,&lt;BR /&gt;secure.payment-gateway.microransom.us,&lt;BR /&gt;cardpayments.microransom.us.&lt;BR /&gt;crypt.single-sign-on.password.land.&lt;BR /&gt;oldmacdonald.had-a.phish.farm.&lt;BR /&gt;login.gogie.com,000000000000.phish.farm,&lt;BR /&gt;report-scam.malwarebouncer.com,&lt;BR /&gt;spamchallenge.msftemail.com,&lt;BR /&gt;gmail.net-login.com,&lt;BR /&gt;kn0wbe4.compromisedblog.com,&lt;BR /&gt;welsfargo.com-onlinebanking.com,&lt;BR /&gt;bofa.com-onlinebanking.com,&lt;BR /&gt;chase.com-onlinebanking.com,&lt;BR /&gt;capital1.com-onlinebanking.com,&lt;BR /&gt;2fa.com-token-auth.com,&lt;BR /&gt;token.onelogin.com-token-auth.com,&lt;BR /&gt;cnn.compromisedblog.com,&lt;BR /&gt;employeeportal.net-login.com,&lt;BR /&gt;34.75.2O2.lOl,&lt;/P&gt;&lt;P&gt;strongencryption.org.&lt;BR /&gt;protected-forms.com,&lt;BR /&gt;safe-site.protected-forms.com,&lt;BR /&gt;https.protected-forms.com,&lt;BR /&gt;secured-login.net,&lt;BR /&gt;singlesignon.secured-login.net,&lt;BR /&gt;googl-e.secured-login.net,&lt;BR /&gt;salesfarce.secured-login.net,&lt;BR /&gt;webmail.strongencryption.org.&lt;BR /&gt;login.strongencryption.org.&lt;BR /&gt;account.secured-login.net,&lt;BR /&gt;drive.secured-login.net,&lt;BR /&gt;form.secured-login.net,&lt;BR /&gt;tls.secured-login.net,&lt;BR /&gt;certificate.strongencryption.org.&lt;BR /&gt;office.strongencryption.org.&lt;BR /&gt;suite.strongencryption.org.&lt;BR /&gt;http.protected-forms.com,&lt;BR /&gt;internet.protected-forms.com,&lt;BR /&gt;submit.protected-forms.com,&lt;BR /&gt;*.kb4.io,&lt;BR /&gt;*.comano.us.&lt;BR /&gt;*.magnetonics.com,&lt;BR /&gt;*.bloemlight.com,&lt;BR /&gt;*.instantrevert.net,&lt;BR /&gt;*.phishing.guru.&lt;BR /&gt;*.phishtrain.org.&lt;BR /&gt;*.phishwall.net,&lt;BR /&gt;*.ancillarycheese.com,&lt;BR /&gt;*.malwarebouncer.com,&lt;BR /&gt;*.knowbe4.com,&lt;BR /&gt;*.password.land.&lt;BR /&gt;*.phish.farm.&lt;BR /&gt;*.microransom.us.&lt;BR /&gt;*.msftemail.com,&lt;BR /&gt;*.net-login.com,&lt;BR /&gt;*.compromisedblog.com,&lt;BR /&gt;*.com-onlinebanking.com,&lt;BR /&gt;*.com-token-auth.com,&lt;BR /&gt;*.2O2.lOl,&lt;/P&gt;</description>
      <pubDate>Tue, 15 Oct 2019 20:36:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-way-to-whitelist-KnowBe4-Phishing-domains/m-p/65030#M13292</guid>
      <dc:creator>Mike_Lutgendorf</dc:creator>
      <dc:date>2019-10-15T20:36:00Z</dc:date>
    </item>
    <item>
      <title>Re: Best way to whitelist KnowBe4 Phishing domains?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-way-to-whitelist-KnowBe4-Phishing-domains/m-p/116595#M21687</link>
      <description>&lt;P&gt;I have the same requirement, at the moment phishing campaign traffic being dropped by DNS trap&lt;/P&gt;</description>
      <pubDate>Thu, 22 Apr 2021 07:49:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-way-to-whitelist-KnowBe4-Phishing-domains/m-p/116595#M21687</guid>
      <dc:creator>ajoubert</dc:creator>
      <dc:date>2021-04-22T07:49:34Z</dc:date>
    </item>
    <item>
      <title>Re: Best way to whitelist KnowBe4 Phishing domains?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-way-to-whitelist-KnowBe4-Phishing-domains/m-p/118996#M22152</link>
      <description>&lt;P&gt;I have the same requirement. Any help here would be greatly appreciated.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;</description>
      <pubDate>Thu, 20 May 2021 21:55:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-way-to-whitelist-KnowBe4-Phishing-domains/m-p/118996#M22152</guid>
      <dc:creator>ScottG67</dc:creator>
      <dc:date>2021-05-20T21:55:50Z</dc:date>
    </item>
    <item>
      <title>Re: Best way to whitelist KnowBe4 Phishing domains?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-way-to-whitelist-KnowBe4-Phishing-domains/m-p/119002#M22154</link>
      <description>&lt;P&gt;Two main places I had to allow the KnowBe4 domains&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Add an Access Control rule for URL Filtering.&amp;nbsp; Create a custom application/site with the domain list and allow it.&amp;nbsp; &amp;nbsp;Even so, IPS would still kick in and block the users so..&lt;/LI&gt;&lt;LI&gt;Threat Prevention, add a Global Exception to your protected scope with the destination of the custom app/site list and change Action to Detect instead of prevent and also add Logging.&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Fri, 21 May 2021 00:51:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-way-to-whitelist-KnowBe4-Phishing-domains/m-p/119002#M22154</guid>
      <dc:creator>George_Casper</dc:creator>
      <dc:date>2021-05-21T00:51:36Z</dc:date>
    </item>
    <item>
      <title>Re: Best way to whitelist KnowBe4 Phishing domains?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-way-to-whitelist-KnowBe4-Phishing-domains/m-p/119498#M22228</link>
      <description>&lt;P&gt;I got this figured out for the KnowBe4 domains.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;I created a &lt;STRONG&gt;Custom Application Site&lt;/STRONG&gt; object containing the &lt;STRONG&gt;full domain names (Site Names)&amp;nbsp;&lt;/STRONG&gt;provided by KnowBe4.&lt;/LI&gt;&lt;OL&gt;&lt;LI&gt;I was able to add all of these 53 domains via a CSV that I got from the KNowBe4 service. So at least I didn’t have to type them all in.&lt;/LI&gt;&lt;/OL&gt;&lt;LI&gt;I then created &lt;STRONG&gt;domain objects&lt;/STRONG&gt; for all of the &lt;STRONG&gt;root domains&lt;/STRONG&gt;. The root domains were also supplied by KnowBe4.&lt;/LI&gt;&lt;LI&gt;I then created a rule under the “&lt;STRONG&gt;Internet Access&lt;/STRONG&gt;” &amp;nbsp;that allows&amp;nbsp;to the root domains I created above. On the &lt;STRONG&gt;HTTP&lt;/STRONG&gt; and &lt;STRONG&gt;HTTPS&lt;/STRONG&gt; services/Applications&lt;/LI&gt;&lt;LI&gt;I then had to create a &lt;STRONG&gt;Global Exception&lt;/STRONG&gt; That allowed&amp;nbsp;to&amp;nbsp;the &lt;STRONG&gt;Protection/Site/File&lt;/STRONG&gt; being the &lt;STRONG&gt;Custom Application Site&lt;/STRONG&gt; I created back in step #1 with the services being &lt;STRONG&gt;HTTP, HTTPS&lt;/STRONG&gt; I set the Action to &lt;STRONG&gt;Detect&lt;/STRONG&gt;.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 May 2021 18:11:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-way-to-whitelist-KnowBe4-Phishing-domains/m-p/119498#M22228</guid>
      <dc:creator>ScottG67</dc:creator>
      <dc:date>2021-05-26T18:11:48Z</dc:date>
    </item>
    <item>
      <title>Re: Best way to whitelist KnowBe4 Phishing domains?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-way-to-whitelist-KnowBe4-Phishing-domains/m-p/258360#M43608</link>
      <description>&lt;P&gt;Just helped a customer with this list. There are a few new URLs to add to this:&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;confirm.succesful.org&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;document.cert-sha256.com&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;oops.yourgunnalovetraining.com&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;secure.cert-sha256.com&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;submit.succesful.org&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;think.yourgunnalovetraining.com&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Sep 2025 23:49:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-way-to-whitelist-KnowBe4-Phishing-domains/m-p/258360#M43608</guid>
      <dc:creator>Thagore</dc:creator>
      <dc:date>2025-09-26T23:49:10Z</dc:date>
    </item>
  </channel>
</rss>

