Add phishing simulation URLs to the Microsoft Edge Allowed Domains list in Microsoft Entra ID to keep simulation links from triggering Microsoft Defender SmartScreen warnings.
Before you begin
Before you start, make sure you have:-
Administrative access to Microsoft Entra ID
-
Permission to configure group policy objects (GPOs)
-
Permission to download and install policy files for Microsoft Edge
Adding phishing simulation URLs to the Microsoft Edge Allowed Domains list involves
downloading policy files, modifying group policy settings, and applying the changes
to make sure simulation links function correctly.
Procedure
- Download the Microsoft Edge policy files.
- Go to the Microsoft Edge Business Download page.
- Scroll to the section labeled "Looking for an older version of Edge?"
- Select the latest options for Select channel version, Select build, and Platform.
- Click Get Policy Files to download
MicrosoftEdgePolicyTemplates.cab
.
- Prepare the policy files.
- Double-click the downloaded CAB file and extract
MicrosoftEdgePolicyTemplates.zip
to a temporary folder. - Go to the extracted folder and open
\windows\admx
. - Copy
msedgeupdate.admx
andmsedge.admx
toC:\Windows\PolicyDefinitions
.
- Double-click the downloaded CAB file and extract
- Install language-specific templates.
- Return to the extracted folder and go to
\windows\admx\<Appropriate Language>
(for example, en-US). - Copy
msedge.adml
andmsedgeupdate.adml
toC:\Windows\PolicyDefinitions\<Appropriate Language>
.
- Return to the extracted folder and go to
- Record the Security Awareness sending IP addresses.
- On the Trend Vision One console, go to .
- Click the settings icon ().
- Click Settings and copy the sending IP addresses and simulation URLs.
Important
The sending IP addresses change over time. Check the list before launching a training campaign or phishing simulation.
- Configure the group policy.
- Open the Group Policy Management Editor.
- Go to .
- Enable Configure the list of domains for which Microsoft Defender SmartScreen won’t trigger warnings and click Show.
- In the window that appears, add the URLs and IP addresses you copied from Security Awareness.
- Click OK, then Apply, and OK again to save and close the settings.
- Apply and verify the GPO.
- Link the newly configured GPO to the appropriate Organizational Unit (for example, Domain Controllers).
- On a target device, open a CLI as Administrator and run
gpupdate /force
to apply the GPO to the device. - Open regedit and go to
HKLM\SOFTWARE\Policies\Microsoft\Edge\SmartScreenAllowListDomains
to verify the URLs are listed. - Try to access a phishing simulation URL to make sure the page is accessible and displays correctly.