Customer: Create and Manage Phishing Campaigns
Follow the steps below to schedule phishing campaigns that use system-recommended lures. The campaigns you create will automatically send simulated phishin...
Go to Phishing Simulation > Phishing Campaigns to see details of all active, completed and deleted phishing campaigns. They are divided into two groups,...
You can drill down to specific details about a phishing campaign by going to Phishing Simulation > Phishing Campaigns. For example, you can see who is e...
From the Campaign Details page, you can drill down to a user, and select the lure content that they have been sent or are scheduled to receive. If the user...
With the Phishing Simulation solution, you can create and monitor campaigns and assess how users respond to phishing threats. The Phishing Simulation email...