Step 2. Deploy Phishing Reporter
This section describes in detail how to deploy the Phishing Reporter add-in to users in Microsoft 365, Exchange, or Google Workspace platforms.
Shortcuts
FAQ
Q: The add-in was deployed to one of the listed email servers more than 12 hours ago but is still not visible on users' email applications. What can I do?
A: You can try to re-deploy the add-in. If it still does not appear, you should contact the support team of the email service provider.
Q: Can an Attacker hijack Outlook Add-in?
A: The platform uses “Code Signing with Microsoft Authenticode” to protect tools against hacking attempt. For more information, please click here.
Q: Is it possible to centralise the distribution of add-in?
A: Yes, it is. Many institutions manage the add-in (install, uninstall, enable, disable) with central administration tools, such as Microsoft SCCM, IBM Bigfix.
Q: Does the Phishing Reporter Add-In work with the Outlook application on iOS?
A: Yes, if you distribute the Phishing Reporter Add-In as an XML package (Microsoft 365), it will be available in both OWA/Outlook applications and will also function within the Outlook application on iOS.
Last updated