Common Workflows
16.1 Running Your First Campaign
Section titled “16.1 Running Your First Campaign”Follow these steps to run your first phishing simulation:
-
Add your contacts via CSV import (Settings → Contacts).
-
Create at least one group and assign your contacts to it (Settings → Groups).
-
Verify your sending domain (Settings → Secured Domains).
-
Browse the template library and find a suitable phishing template (Templates).
-
Click Quick Launch on the template, or create a new campaign manually (Campaigns → New Campaign).
-
Walk through the 6-step wizard: configure settings, customize the email, set up the landing page, choose a post-click action, select recipients, and review.
-
Send a test email to yourself and verify everything looks correct.
-
Start or schedule the campaign.
-
Monitor results on the campaign dashboard.
16.2 Ongoing Phishing Program
Section titled “16.2 Ongoing Phishing Program”For a continuous security awareness program:
-
Schedule recurring campaigns to automatically repeat at set intervals.
-
Use different templates each time to test various attack vectors.
-
Monitor the Trend Dashboard to track improvement over time.
-
Focus additional training on departments or groups with higher click rates.
-
Export cumulative reports for quarterly management reviews.
-
Regularly update your contact list as employees join and leave.
16.3 Responding to High-Risk Users
Section titled “16.3 Responding to High-Risk Users”When the platform identifies users with high risk scores (red badges):
-
Review their profile to see which campaigns they fell for.
-
Check if they completed the assigned training courses.
-
Consider assigning them to a special group for additional targeted campaigns.
-
Use the contact filters to find all high-risk users across the organization.