Documentation forSolarWinds Service Desk

Allowing IP Addresses

There are many ways to block unwanted emails while allowing legitimate business email into your organization. In order to ensure authorized email notifications are not blocked or misclassified, you can allow the mail server to permit SWSD to send emails on behalf of your domain. This ensures you receive proper notifications from the application.

Some network features allow emails from a predefined source to route to your email Inbox rather than being filtered as spam/junk mail. While SolarWinds tries to maintain a static set of IP addresses for our application and servers, it is possible that our IP addresses will change.

Allowed IP Addresses

These are the IP addresses that need to be accepted:

  • 149.72.147.186
  • 167.89.101.239
  • 168.245.40.44
  • 142.0.180.120

Other Email Standards

In addition to allowing IP addresses, you may choose to implement email standards such as SPF, DKIM, and DMARC. These standards allow SWSD to send emails on behalf of your domain. This helps you improve email deliverability while preventing unwanted email.

The following capabilities are currently available only to customers using US data centers.

Below are additional details on how to deploy these standards across email notifications from SWSD.

SPF

If you plan to utilize SWSD to send emails from your domain, add the IP addresses to your SPF record on your DNS server.

DKIM

If your email policy requires emails sent from your domain to be DKIM, that is, authorized by your domain, you will need to contact support. SolarWinds will walk you through a short process, such as adding the relevant records to your DNS server, allowing SWSD to send DKIM-signed emails from your domain.

DMARC

If your organization enforces a DMARC policy for emails, you will need to apply the SPF and DKIM steps above. In addition, SolarWinds recommends you allow our email links to ensure you receive links within emails sent by SWSD. These links come from the following domains:

  • samanage.com
  • emails.samanage.com
  • mailer.samanage.com
  • secure_mailer.samanage.com
  • Url944.samanage.com
  • Url3518.samanage.com

If you use Office 365, you may have to add the above email links to the Office 365 threat management safe links area. To do this: Login to the Office 365 portal. Navigate to Admin Centers > Security & Compliance > Threat Management > Safe Links > Policies that apply to specific recipients. Edit the default policy or create a new one (Settings > Do not rewrite the following URLs) by adding samanage.com and *samanage.com*. Save and wait for 30-60 minutes, then test a new ticket.