When your MX record points to M365
Overview
This guide ensures that Cyberhook phishing simulation and training emails are successfully delivered to users' inboxes in Microsoft 365, bypassing filtering mechanisms such as Microsoft Defender for Office 365 (formerly ATP), and are not marked as threats.
Applies to environments where the MX record points directly to M365.
1. Configure Advanced Delivery
Steps:
- Go to the Microsoft Defender portal
- Navigate to: Email & Collaboration > Policies & Rules > Threat policies > Advanced delivery
- Select the Phishing simulation tab
- Click Add
- Add the DKIM domain (e.g.,
ct-sendrig.site) - Add the sending IP (e.g.,
51.178.182.159) - Click Save

This ensures emails are correctly categorized as phishing simulations and not treated as threats.
2. Bypass Link Scanning (Defender)
Create a mail flow rule:
- Go to the Exchange Admin Center
- Navigate to: Mail Flow > Rules > Add a rule
- Name the rule:
SUCURILABS - Bypass Defender Links - Click More options
- Condition:
- Apply this rule if: The sender > IP address is…
51.178.182.159 - Action: Do the following: Modify the message properties > set a message header
- Header name:
X-MS-Exchange-Organization-SkipSafeLinksProcessing - Value:
1
- Header name:
-
Click Next > Finish

Validation
- Use Threat Explorer and filter by
System override source > Phishing simulationto verify email delivery through the simulation policy. - Confirm emails land in the inbox and are not marked as junk or phishing.