2. Understanding Phishing Scenarios Page
3. Creating Quick Phishing Campaign
4. SMTP And LDAP Settings
4.1. Testing of SMTP Settings
5. Importing Target Users into the System
6. Phishing Template Management
6.1. Cloning and Customising Default Phishing Templates
6.2. Previewing and Deleting Phishing Templates
6.3. Creating a New Phishing Template
7. Phishing Campaign Management
7.1. Creating a New Campaign
7.3. Reporting the Phishing Campaign
7.4. Scheduling a Phishing Campaign
8. FAQ (Phishing Simulator)
Q: Can I schedule a phishing campaign?
Q: Can I set the phishing campaign sending limit?