If your organisation or you are working with an organisation that has a strict firewall, it could prevent AQai's emails from being delivered and/or it could block access to any or all of AQai's platforms, including taking the assessment.
You may need to request your or your client's IT department to whitelist the AQai domain. They will need to do that for the following domains:
- adaptai.co (AQai's email domain)
- aqai.io (AQai's email domain and website)
- https://app.aqai.io/ (the assessment platform)
- https://help.aqai.io/ (this help and support platform)
- To take the assessment:
- 34.77.31.159
- 23.251.142.192
- https://aqai.thinkific.com/ (the certification platform)
What does whitelisting mean and how does a company do it?
The organisation's IT department will already know how to do this but for your understanding, whitelisting is the process of allowing a specific domain or IP address to bypass security filters and access a network or system. If an organization wants to whitelist the domain of another company, they can follow these general steps:
-
Identify the domain name of the company that needs to be whitelisted. This can usually be found in their email address or website address.
-
Determine the security tool or system that needs to be configured to allow access to the whitelisted domain. This could be a firewall, an email spam filter, or an antivirus program.
-
Access the settings for the security tool or system and locate the whitelist configuration option.
-
Add the domain name of the company to the whitelist configuration. This may involve entering the domain name or IP address into a text field or selecting it from a dropdown menu.
-
Save the changes to the whitelist configuration and test to ensure that the whitelisted domain is now able to access the network or system without any issues.
-
Monitor the traffic from the whitelisted domain to ensure that it is not posing any security risks or causing any disruptions.
It's important to note that whitelisting a domain should only be done after careful consideration of the potential security risks and should be done in conjunction with other security measures such as regular monitoring and updates to security systems.
Comments
0 comments
Please sign in to leave a comment.