1. Home
  2. Product Manual (2.0)
  3. Awareness
  4. Phishing
  5. How to: whitelist RESPONSUM phishing campaigns in your Google Workspace

How to: whitelist RESPONSUM phishing campaigns in your Google Workspace

IMPORTANT NOTE: Since 1/12/22, our phishing IP changed from to


This guide will cover how to whitelist phishing campaigns sent by the RESPONSUM phishing email server in your Google Workspace environment.

After following the steps in this guide, your employees working via Gmail for mail traffic will receive our simulated phishing emails.

The following steps need to be taken:

  1. Add our phishing server IP to your Google (Google Workspace) admin portal
  2. Whitelist our phishing server IP with any other Email processing applications (if applicable)

Once the settings have been applied on your environment, it can take some time for the changes to take effect. Send an email to support@responsum.eu once the whitelisting was executed. We will send out a test email to see if the settings are set correctly. 

To keep in mind:

  • We use our ispmail.link domain for DKIM email signing. So emails will originate from this domain and our IP:
  • Google often releases new changes that might impact email delivery to the end-user. If emails are being quarantined/sent to spam (to be checked in the email logs), feel free to contact us via support@responsum.eu. This way we can assist in fine-tuning the setup.
  • If a “Spoofed” email address (Any email address that you or RESPONSUM does not own, ex. google.com) is used in a scenario as From address, Google will append a “Via:” textnext to the FROM address to notify the user that it was sent from another location:
    • To prevent this, you can use the DKIM signing domain (ispmail.link) in your From address in the Scenario. You can append as many sub-domain entries to the main domain as needed to make it look as if it originated from another location. (Ex. the Convodo Scenario From address above can be changed to noreply@convodo.com.ispmail.link)



Log into your Google (Google Workspace) admin portal via admin.google.com using an account with administrative privileges (Administrator). Once logged in, select “Apps” from the tiled overview page.


On the next screen shown, select “Google Workspace”


Select the “Gmail” service from the list of services


Scroll down to the bottom of the page and select “Spam, Phishing and Malware”


Google uses “Organizational units” or “Organizations” to define different settings for different parts of your company. You have two options here:

  1. If you want to apply the Whitelisting of our Phishing server IP address over your entire company Gmail, select the top-level organization (in this example RESPONSUM).
  2. If you want to apply the Whitelisting of our Phishing server IP address only to a certain “organizational Unit” or “Organization” within your company, select this specific “organizational unit” or “Organization”

Once decided on which “Organizational Unit” to apply the setting, search for the Email whitelist setting. Add in this setting the following IP address of our phishing server:


Press “Save changes” at the bottom of the page to confirm the change made. For this change to take effect, it can take up to one hour.


If you have any other services that process the email before they are received by Google mail servers (External Spam Filter…), make sure to also whitelist our IP ( and DKIM signing domain (ispmail.link) with these services as they could still block our emails.

Updated on December 2, 2022

Was this article helpful?

Related Articles