1. Phishing Campaigns
WatchDog Security Help Center
Admin Guide
  • Docs Home
  • Admin Guide
  • User Guide
  • MSP Guide
  • Getting Started
  • Create Your Free Organization
  • Domain Reservation
  • Company Management
    • Manage Branding
    • Delete Organization
  • Notification Center
    • Organization Events
    • User Events
    • Configure Notification Settings
    • User Notification Override
  • Posture Management
    • View Integrations
    • Configure Automated Integrations
    • Manage Automated Monitors
    • Configure Manual Integrations
    • Manage Manual Monitors
  • WatchDog University
    • Assigning Courses using WatchDog University
    • Auditing Course Completion
    • Downloading a Certificate of Completion
  • Policy Management
    • Create Policy
    • Publish Policy
    • Track Policy Acceptance
    • Send Policy Reminder
    • Update Policy
    • Download Policy Version
    • Delete Policy
    • Retire Policy
  • Risk Management
    • Perform A Risk Assessment
    • View and Manage Risks in Risk Register
    • Create Manual Risk
    • Edit and Manage Risk
    • Manage Risk Tasks
    • Manage Risk Lifecycle
  • Vendor Management
    • Add Vendor
    • Track Security Events
    • Manage Vendor Documents
    • Perform Vendor Assessments
    • Classify Vendor Risk
  • Inventory
    • Add Inventory Item
    • Update Inventory Item
    • Auto Populate Inventory
  • Compliance Center
    • Add Compliance Framework
    • Edit Compliance Framework
    • Assigning Control Owners
    • Pause Monitors and Documents
    • Manage Compliance Documents
    • Schedule Audit
    • Automated Monitoring
    • Cross-Framework Reuse
    • Progress Tracking
  • Trust Center
    • Customize Trust Center
    • Manage Trust Center Access
    • Monitor Access Activity (Events)
    • Custom Domain Setup
  • Vulnerabilities
    • Centralized Vulnerability Tracking
    • Import Vulnerabilities
    • Create Manual Vulnerabilities
    • Assign And Collaborate On Vulnerabilities
    • Configure Time To Remediate (TTR)
  • Control Panel
    • Manage Support Access
    • Phishing Campaigns
      • Creating an Allowlist for Phishing Simulations in Microsoft 365
      • Configure Google Workspace Allowlist for Phishing Simulations
  • User Management
    • Add Users
    • Configure Directory Sync
    • Manage User Access
    • Assign Licenses
    • Manage Invites And Users
    • Change Account Owner
    • Reset 2FA
  • Integrations
  1. Phishing Campaigns

Configure Google Workspace Allowlist for Phishing Simulations

WatchDog Security Automated Phishing Campaigns simulate real phishing attacks to train users and identify risk.
Google Workspace may block these emails by default, as they resemble real phishing attempts. To ensure successful delivery, you must configure an allowlist and optionally create a Content Compliance Policy.

Configure Email Allowlist#

This ensures phishing simulations are not blocked by Google spam filtering.
1
Open Google Admin
Navigate to Google Admin Console
2
Open Gmail Settings
Go to Apps → Google Workspace → Gmail.
3
Open Spam Settings
Select Spam, Phishing and Malware.
4
Add Whitelist IP
Enter 69.147.224.210 under Email whitelist.
5
Save Changes
Click Save to apply the allowlist.

Configure Content Compliance Policy (Optional)#

Only required if using WatchDog Email Security Firewall.
1
Open Google Admin
Navigate to Google Admin Console
2
Open Gmail Settings
Go to Apps → Google Workspace → Gmail.
3
Open Compliance Settings
Select Compliance then open Content Compliance.
4
Add New Rule
Click Add or Add Another to create a new rule.
5
Name The Rule
Enter WatchDog Phishing Simulation Allowlist.
6
Set Message Scope
Select Inbound under Email messages to affect.
7
Add Expression
Add Metadata match with Source IP set to 69.147.224.210.
8
Add Header
Enable Add custom headers and set X-CLOUD-SEC-AV-Info.
9
Set Header Value
Enter [portalname],google_mail,inline replacing [portalname].
10
Save Rule
Click Save to apply the policy.

What Happens Next#

Phishing simulation emails bypass Google Workspace spam filtering.
Users receive phishing simulations directly in their inbox.
Email delivery reliability improves for automated campaigns.
Campaign tracking reflects accurate user interaction.

Troubleshooting#

Phishing Emails Not Delivered
If emails are not reaching users:
Verify Email whitelist includes the correct IP
Check spam or quarantine folders
Confirm Gmail security settings are not overriding rules
Content Compliance Rule Not Working
Cannot Access Google Admin Settings
Emails Blocked by Third Party Tools
Modified at 2026-03-18 21:15:27
Previous
Creating an Allowlist for Phishing Simulations in Microsoft 365
Next
User Management
Built with