Office 365 Working with OpenDNS

Avatar photo
Anthony Lewis

Office 365 Working with OPENDNS

We ran into some issues the other day with our client running Office365. Activation and a few other issues due to OpenDNS Enterprise running on their network. We worked with support and got the full list of domains to white list so we felt it appropriate to share this list.

Here is the full list:

  • office365.com
  • static.meteorsolutions.com
  • cdnt.meteorsolutions.com
  • go.accmgr.com
  • ib.adnxs.com
  • microsoft.com
  • s.clicktale.net
  • ots.optimize.webtrends.com
  • service.optify.net
  • portal.microsoftonline.com
  • view.atdmt.com
  • m.webtrends.com
  • sales.liveperson.net
  • ec.atdmt.com
  • www.bizographics.com
  • tags.rtbidder.net
  • ad.doubleclick.net
  • www.googleadservices.com
  • bs.serving-sys.com
  • id.impressiondesk.com
  • segment-pixel.invitemedia.com
  • pixel.quantserve.com
  • p.rfihub.com
  • tmx.technoratimedia.com
  • r.turn.com
  • pixel.rubiconproject.com
  • img.bizographics.com
  • cm.g.doubleclick.net
  • idcs.interclick.com
  • ds.serving-sys.com
  • ad.yieldmanager.com
  • googleads.g.doubleclick.net
  • g-pixel.invitemedia.com
  • microsoftonline-p.com
  • msecnd.net
  • office.microsoft.com
  • login.live.com

Contact us with any questions!

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.

Other resources that might be of interest to you.

Managed Detection and Response (MDR): Don’t Let Cyber Zombies Infiltrate Your Network

Grab your baseball bats, axes, shovels, or whatever your choice of weapons is. It’s time for the cyber zombie apocalypse. Hunkering down in your secure network fortress isn’t an option anymore; the cyber zombies (malware, ransomware, and hackers) are b
Vivian Lee
>>Read More

MFA and EDR is a Minimum, Disaster Recovery is Required

   Disaster Recovery Should Be Mandatory Businesses of all sizes are becoming increasingly reliant on technology to drive their operations. However, this growing dependence on technology also opens the door to various cybersecurity threats that
Avatar photo
Art Ocain
>>Read More

Cyber Resilience Framework: How to Develop a Resilience Strategy

Your cyber resilience framework defines the techniques and processes your business uses to protect its sensitive data, services, and uptime. Frameworks will vary depending on your geographic operations, industry, and datasets, but many of the fundament
Jesse Sumrak
>>Read More