Why access may be blocked
Many organizations enforce network and email security policies that restrict access to external applications. These policies include but are not limited to: Domain filtering, SSL inspection rules, email scanning, blocked CDN traffic, or Remote Browser Isolation (RBI). Because dealhead relies on multiple sub-domains, CDNs, and authenticated email flows, restrictive security controls may cause:
Inability to log in or maintain a session
Blocked API calls or missing data
Visual artifacts in tab titles or watermarks indicating the session is isolated
Pages, dashboards, or documents failing to load
2FA or password reset emails routed to spam or quarantine
Loss of real-time collaboration or updates
To ensure seamless access, dealhead must be reachable over the organization’s network and email security systems without interference.
What we are requesting
To ensure your users can fully access and authenticate into dealhead — including application functionality and required system emails — please allow the following domains and email senders.
1. Domain Allow-Listing (Network Access)
Please allow the following domains within your organization’s firewall, proxy, and networking tools:
*.dealhead.com
*.azurefd.net
*.msedge.net
dealhead uses Azure Front Door, a Microsoft-managed global CDN and traffic optimization layer. Some IT environments block CDN domains by default, which can prevent pages, authentication flows, or static assets from loading. Allowing the domains above ensures consistent platform access.
Core dealhead Domains
These are actively used in production and must be reachable:
www.dealhead.com — Corporate website and public resources
app.dealhead.com — Primary production application
login.dealhead.com — Authentication (Azure AD B2C)
If wildcard domain rules are not permitted, these domains should be explicitly added.
2. Email Allow-Listing (Authentication & Notifications)
To ensure delivery of invitations, password resets, and two-factor authentication codes, your mail gateway must allow authenticated messages (SPF, DKIM, DMARC) from:
Displayed sender example for 2FA emails:
Microsoft on behalf of dealhead
To prevent login failures or broken authentication links:
Do not rewrite or “link-sanitize” URLs in dealhead emails
Do not quarantine or bulk-filter these senders
Ensure deep-link URLs pointing to
*.dealhead.comare allowedEnsure no anti-spoofing rules block Microsoft-initiated messages
3. Browser Isolation & Endpoint Security
If your organization uses Remote Browser Isolation (RBI) or Secure Web Gateway (SWG) agents (e.g., Netskope, Zscaler, Cisco Umbrella, Menlo Security), the dealhead application may be forced into a "read-only" or "isolated" container if categorized as "Uncategorized" or "Unknown."
Symptoms of interfering security agents:
Users see an asterisk
*in the browser tab title (often confused with "unsaved work").Users cannot copy/paste data into or out of the application.
File uploads (drag-and-drop) fail silently.
Request: Please create a policy exception to bypass isolation (send traffic direct-to-net) for *.dealhead.com.
Recommended IT Configuration Steps
Network & Firewall
Allow HTTPS (TCP 443) to all domains listed above
If SSL inspection is enabled, ensure:
TLS interception does not break dealhead authentication
Your appliance trusts the certificate chain used by dealhead
Allow scripts, embedded content, and authentication flows from
*.dealhead.comPermit long-lived requests or WebSocket-type connections
DNS & Filtering
Ensure DNS resolution for all dealhead sub-domains
Do not block
.azurefd.netor.msedge.net(Azure CDN traffic)
Email Systems
Approve senders:
Allow all emails from:
@dealhead.com
Check spam/quarantine systems for false positives
Allow deep links pointing to
*.dealhead.com
If your IT environment requires IP allow-listing instead of domain allow-listing, contact us for the most up-to-date ranges.
Security & Compliance
We understand that many organizations operate under strict security, governance, and compliance requirements. dealhead is architected to meet enterprise-grade expectations and to ensure that network and email allow-listing introduces no additional security risk.
Platform Security Highlights
All traffic between users and the dealhead platform is encrypted using TLS 1.2+
User authentication and identity management are handled through Microsoft Azure AD B2C
All sub-domains and services are hosted within secure, SOC-compliant cloud infrastructure
Wildcard allow-listing applies only to the
dealhead.comdomain — no third-party domains or external services are includedSystem emails (including 2FA and authentication flows) are fully authenticated using SPF, DKIM, and DMARC
Security Documentation & Trust Center
For detailed security documentation, audit reports, policies, and continuous compliance information, please visit our Trust Center:
Next steps
Please provide this document to your internal IT/security team.
Once your configuration updates are completed, let your dealhead account manager or our support team know so we can verify access and assist with any final checks.
If your security team requires additional information — such as data flow diagrams, penetration testing summaries, or IP ranges — we will provide it upon request.
Getting Support
For questions or further assistance, please contact [email protected] or open a ticket through our Help Center. Our technical team is available to work directly with your IT department to ensure full and secure access.
