Allow IP addresses
On this page
There are many ways to block unwanted emails while allowing legitimate business email into your organization. To ensure authorized email notifications are not blocked or misclassified, your organization’s email administrator can allow your company's mail server to permit SWSD to send emails on behalf of your domain. This ensures you receive proper notifications from the application.
Some network features allow emails from a predefined source to route to your email Inbox rather than being filtered as spam/junk mail. While SolarWinds tries to maintain a static set of IP addresses for its application and servers, it is possible that IP addresses will change.
Ensure that your network administrator allows the following IP addresses:
- US IP addresses:
- EU IP addresses:
In addition to allowing IP addresses, your email administrator may choose to implement email standards such as SPF, DKIM, and DMARC. These standards allow SWSD to send emails on behalf of your domain. This helps you improve email deliverability while preventing unwanted email.
The following capabilities are currently available only to customers using US data centers.
Below are additional details on how to deploy these standards across email notifications from SWSD.
If you plan to utilize SWSD to send emails from your domain, add the IP addresses to your SPF record on your DNS server.
If your email policy requires emails sent from your domain to be DKIM, that is, authorized by your domain, you will need to contact support. SolarWinds will walk you through a short process, such as adding the relevant records to your DNS server, allowing SWSD to send DKIM-signed emails from your domain.
If your organization enforces a DMARC policy for emails, you will need to apply the SPF and DKIM steps above. In addition, SolarWinds recommends you allow our email links to ensure you receive links within emails sent by SWSD. These links come from the following domains:
If you use Office 365, you may need to add the above email links to the Office 365 threat management safe links area. See Safe Links in Microsoft Defender for Office 365 for guidance. Edit the default policy or create a new one (Settings > Do not rewrite the following URLs) by adding samanage.com and *samanage.com/*. Examples: app.samanage.com/login or login.samanage.com.
Save and wait for 30-60 minutes, then test a new ticket.