TOP 10 INKY FALSE POSITIVES (CHEAT SHEET)
🎯 RULE #1 (FOR ALL BELOW)
👉 Allow by DOMAIN (not individual email)
👉 Verify first—don’t blindly allow
🟢 1. E-Signature Platforms
Common domains:
docusign.netdocusign.comadobesign.com
Why flagged:
- External sender + embedded links + urgency language
Helpdesk action:
- Confirm user was expecting it
- Allow domain if legitimate
🟢 2. Accounting / Finance Platforms
Common domains:
intuit.comquickbooks.combill.com
Why flagged:
- Payment language + invoice links = phishing-like
Action:
- Verify vendor
- Allow domain (finance-critical)
🟢 3. Payroll / HR Systems
Common domains:
adp.compaychex.comworkday.com
Why flagged:
- Credential prompts + external login links
Action:
- Confirm tenant-specific usage
- Allow domain
🟢 4. Cloud Storage / File Sharing
Common domains:
dropbox.combox.comsharepointonline.com
Why flagged:
- “You’ve been shared a file” = classic phishing pattern
Action:
- Confirm sender
- Allow domain (very common)
🟢 5. Ticketing / Support Systems
Common domains:
zendesk.comfreshservice.comservicenow.com
Why flagged:
- Automated emails + links + external domain
Action:
- Confirm internal system integration
- Allow domain
🟢 6. Marketing / Bulk Email Platforms
Common domains:
mailchimp.comsendgrid.nethubspotemail.net
Why flagged:
- Bulk send + tracking links
Action:
- Verify legitimate sender
- Allow selectively (not blanket all marketing)
🟢 7. Banking / Payment Notifications
Common domains:
chase.combankofamerica.comstripe.com
Why flagged:
- Financial urgency + links
Action:
- DOUBLE verify (high risk spoof target)
- Allow only after confirmation
🟢 8. Shipping / Logistics
Common domains:
ups.comfedex.comusps.com
Why flagged:
- “Package delivery” = top phishing theme
Action:
- Confirm user expecting shipment
- Allow domain cautiously
🟢 9. Internal Systems (Big One for You)
Examples:
- SAP notifications
- Monitoring tools (SolarWinds, Nagios, etc.)
- Backup alerts
Why flagged:
- Automated + HTML-heavy + sometimes spoof-like
Action:
- Identify sending domain/IP
- Allow domain immediately
👉 This is #1 enterprise false positive source
🟢 10. Calendar / Meeting Systems
Common domains:
zoom.usteams.microsoft.comwebex.com
Why flagged:
- External invites + embedded join links
Action:
- Allow domain
- Very common + low risk if verified
🚨 RED FLAGS (DO NOT AUTO-ALLOW)
Even if it looks like the above, DO NOT allow if:
- Domain is slightly off:
docusign-secure.net-
paypaI.com(capital i)
- User wasn’t expecting it
- Urgency + payment request
- New sender + finance-related
👉 These are real phishing attempts
⚡ HELPDESK QUICK DECISION TABLE
| Situation | Action |
|---|---|
| Known vendor + expected | Allow domain |
| Known vendor + unexpected | Verify first |
| Slightly misspelled domain | BLOCK |
| Finance-related + unusual | ESCALATE |
| Internal system flagged | Allow domain |
🧠 PRO TIP (HIGH VALUE)
Build your “early allow list” BEFORE pilot expansion:
Start with:
- Finance platforms
- HR/payroll
- Internal systems
- Ticketing
👉 This eliminates 80% of false positives upfront