Phishing Reporter Deployment
This section describes in detail how to deploy the Phishing Reporter add-in to users in Microsoft 365, Exchange, or Google Workspace platforms.
For instructions on the required initial installation of the add-in, please refer to the explanation provided here: Phishing Reporter Customization.

Shortcuts

FAQ

Q: The add-in was deployed to one of the listed email servers more than 12 hours ago but is still not visible on users' email applications. What can I do?

A: You can try to re-deploy the add-in. If it still does not appear, you should contact the support team of the email service provider.

Q: Is it possible to centralize the distribution of the Phishing Reporter add-in?

A: Yes, we can. Many institutions manage the add-in (install, uninstall, enable, disable) with central administration tools, for example, Microsoft SCCM and IBM Bigfix.

Q: Can an Attacker hijack Outlook Add-in?

A: The platform uses “Code Signing with Microsoft Authenticode” to protect tools against hacking attempt. For more information, please click here​.

Q: Is it possible to centralise the distribution of add-in?

A: Yes, it is. Many institutions manage the add-in (install, uninstall, enable, disable) with central administration tools, such as Microsoft SCCM, IBM Bigfix.
Copy link
On this page
Shortcuts
FAQ
Q: The add-in was deployed to one of the listed email servers more than 12 hours ago but is still not visible on users' email applications. What can I do?
Q: Is it possible to centralize the distribution of the Phishing Reporter add-in?
Q: Can an Attacker hijack Outlook Add-in?
Q: Is it possible to centralise the distribution of add-in?