Search
Close this search box.

Office 365 Working with OpenDNS

Avatar photo
Anthony Lewis

Office 365 Working with OPENDNS

We ran into some issues the other day with our client running Office365. Activation and a few other issues due to OpenDNS Enterprise running on their network. We worked with support and got the full list of domains to white list so we felt it appropriate to share this list.

Here is the full list:

  • office365.com
  • static.meteorsolutions.com
  • cdnt.meteorsolutions.com
  • go.accmgr.com
  • ib.adnxs.com
  • microsoft.com
  • s.clicktale.net
  • ots.optimize.webtrends.com
  • service.optify.net
  • portal.microsoftonline.com
  • view.atdmt.com
  • m.webtrends.com
  • sales.liveperson.net
  • ec.atdmt.com
  • www.bizographics.com
  • tags.rtbidder.net
  • ad.doubleclick.net
  • www.googleadservices.com
  • bs.serving-sys.com
  • id.impressiondesk.com
  • segment-pixel.invitemedia.com
  • pixel.quantserve.com
  • p.rfihub.com
  • tmx.technoratimedia.com
  • r.turn.com
  • pixel.rubiconproject.com
  • img.bizographics.com
  • cm.g.doubleclick.net
  • idcs.interclick.com
  • ds.serving-sys.com
  • ad.yieldmanager.com
  • googleads.g.doubleclick.net
  • g-pixel.invitemedia.com
  • microsoftonline-p.com
  • msecnd.net
  • office.microsoft.com
  • login.live.com

Contact us with any questions!

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.

Other resources that might be of interest to you.

Discover the Dangers of End-of-Life Software and Systems

End-of-Life Software In a recent webinar, we covered the topic of vulnerability and patch management. This post will drill down into the headache surrounding of end-of-life (EOL) software. The category of software is also known end-of-support (EOS) sof
Avatar photo
Bill Bowman
>>Read More

Phishing Awareness

Phishing Phishing attacks use email or malicious websites to infect your machine with malware and viruses to collect personal and financial information. Cybercriminals attempt to lure users to click on a link or open an attachment that infects their co
Avatar photo
Alan Villasenor
>>Read More

Cyber Insurance vs Cyber Threats

Cyber insurance is no substitute for prevention, but it should still be treated as a preventative step, often a step (or several steps) behind zero-day threats. What Does Cyber Insurance Cover? After a ransomware outbreak, it’s common to think, “insura
Avatar photo
Jared Sholley
>>Read More