Documentation forSolarWinds Service Desk

Allow IP addresses

On this page


SolarWinds recommends that the information in this document be shared with your network and email administrators.

There are many ways to block unwanted emails in SolarWinds Service Desk while allowing legitimate business email into your organization. To ensure authorized email notifications are not blocked or misclassified, your organization’s email administrator can allow your company's mail server to permit SWSD to send emails on behalf of your domain. This ensures you receive proper notifications from the application.

Some network features let emails from a predefined source route to your email inbox rather than being filtered as spam/junk mail. While SolarWinds tries to maintain a static set of IP addresses for its application and servers, it is possible that IP addresses will change.

Allowed IP addresses

Ensure that your network administrator allows the following IP addresses:

  • US IP addresses:
  • EU IP addresses:

Other email standards

In addition to allowing IP addresses, your email administrator may choose to implement email standards such as SPF, DKIM, and DMARC. These standards allow SWSD to send emails on behalf of your domain. This helps you improve email deliverability while preventing unwanted email.

Below are additional details on how to deploy these standards across email notifications from SWSD.


If you plan to use SWSD to send emails from your domain, add the IP addresses to your SPF record on your DNS server.


If your email policy requires emails sent from your domain to be DKIM, that is, authorized by your domain, you will need to contact support. SolarWinds will walk you through a short process, such as adding the relevant records to your DNS server, allowing SWSD to send DKIM-signed emails from your domain.


If your organization enforces a DMARC policy for emails, you will need to apply the SPF and DKIM steps above. In addition, SolarWinds recommends you allow our email links to ensure you receive links within emails sent by SWSD. These links come from the following domains:


If you use Office 365, you may need to add the above email links to the Office 365 threat management safe links area. See Safe Links in Microsoft Defender for Office 365 for guidance. Edit the default policy or create a new one (Settings > Do not rewrite the following URLs) by adding and **. Examples: or

Save and wait for 30-60 minutes, then test a new ticket.

Related topics

Email settings