Have your IT administrator whitelist the following domains:
These domains are registered to IP addresses: 104.37.180.1
If your organization uses spam filtering software such as the ones listed below, you can have your IT administrator customize the settings per the associated links to prevent the phishing emails from being blocked:
Please note: Microsoft does not recommend using transport rules for phishing simulations.
The phishing simulations closely resemble emails received on a regular basis. They are created to look very similar to those sent by large, well-known corporations such as Google, Amazon, Chase, etc.
New email templates are carefully created and selected for each client and phishing period. Factors such as the time of year, client type (town vs. school), and location are all taken into consideration when designing simulations.
All URLs within phishing simulation emails link to Xcitium's own training domains. Upon clicking one of these links, the victim is sent to a landing page that provides education on how they could have identified the simulated phishing attempt and how to avoid clicking on potentially malicious URLs in the future.
Phishing simulations normally run for one to two weeks, Monday through Friday.
Users that receive the simulated phishing emails will not be negatively impacted in any way.
No. Xcitium can only use an email address provided by your organization.
You can add/remove users (one at a time or in bulk) by uploading a list through the online portal at insight.d2cybersecurity.com. Please confirm there are no typos on your list before submitting to ensure all users receive the simulated phishing emails.
Log in to your Insight portal and navigate to User Menu → Service Settings → Vulnerability Assessment
Enter the following information:
Once completed, save the information. If you need assistance, please contact d2support@xcitium.com.
Vulnerability Scanning and External Penetration Testing are conducted against your public IPs and domains. Please keep in mind the private IPs in the ranges listed below are not valid IPs for those services:
In general, any IP in the following ranges is a private IP used inside a network/firewall and not suitable for external scans:
Vulnerability Scanning and External Penetration Testing are conducted against your public IPs and domains. The following private IP ranges are not valid for those services:
After your training course is configured, every trainee added to your organization will be automatically enrolled. They will receive a welcome email with their credential information.
Your organization has enrolled you in Xcitium Cybersecurity's Cyber Awareness Education program, and you have not yet fully completed your courseware.
Download our collection of professionally designed cybersecurity awareness posters for use in your workspace. Each poster combines bright visuals and useful tips to keep viewers mindful of cybersecurity best practices.
When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer.
Lock In 10 Free Hours of Incident Response