LogoLogo
Get Demo
  • 💫NEXT-GENERATION PRODUCT
    • Introduction
    • Getting Started
      • 1. Invite System Users
      • 2. Add Target Users
        • Add Users via CSV
        • Add users via SCIM
          • SCIM Setup in Azure AD
          • SCIM Setup in Okta
          • SCIM Setup in Onelogin
          • SCIM Setup in Jumpcloud
        • Add users via LDAP
        • Add Users via API
      • 3. Email Deliverability
        • Microsoft 365
          • M365: Direct Email Creation
          • M365: Whitelisting
        • Google Workspace
          • Google: Direct Email Creation
          • Google: Whitelisting
        • Exchange 2013 and 2016
      • 4. Track Opened Emails
      • 5. Allow Phishing URLs
        • Whitelist for Office 365
        • Whitelist for Google Workspace
        • Whitelist for Exchange 2013/2016
        • Whitelist in Security Solutions
      • 6. Setup Phishing Reporter
        • Step 1. Download Phishing Reporter
        • Step 2. Deploy Phishing Reporter
          • How to Deploy Add-In in Microsoft 365
          • How to Deploy Add-In in Exchange Admin Center
          • How to Deploy Add-In in Google Workspace
          • How to Deploy Add-In in Outlook
            • Troubleshooting Phishing Reporter Add-In on Outlook Desktop
      • 7. Incident Responder Setup
        • Step 1. Integrate Threat Intel Partners
        • Step 2. Mail Configurations
          • Microsoft 365
          • Google Workspace (Gsuite)
          • Exchange (EWS)
    • Platform
      • Dashboard
        • Dashboard Widgets
        • Incident Responder Widgets
        • Threat Sharing Widgets
        • Phishing Simulator Widgets
      • Threat Intelligence
      • Email Threat Simulator
        • Start Scan
        • View Scan Report
        • Create Trusted Account on Exchange
        • Start Scan on O365 Email Account
        • Start Scan on Google Workspace Email Account
      • Threat Sharing
        • Communities
        • Incidents
      • Phishing Simulator
        • Manage Phishing Scenarios
          • Phishing Scenarios
          • Email Templates
          • Landing Pages
        • Phishing Campaign Manager
        • Phishing Campaign Reports
        • Settings
          • DNS Services and Domains
          • Exclude IP Address
      • Callback Simulator
        • Manage Callback Scenarios
          • Callback Scenarios
          • Callback Email Templates
          • Callback Templates
        • Callback Campaign Manager
        • Callback Campaign Reports
        • Settings
          • Callback Phone Numbers
      • Vishing Simulator
        • Vishing Templates
        • Vishing Campaign Manager
        • Vishing Campaign Reports
      • Smishing Simulator
        • Manage Smishing Scenarios
          • Smishing Scenarios
          • Text Message Templates
          • Landing Page Templates
        • Smishing Campaign Manager
        • Smishing Campaign Reports
        • Settings
          • Manage DNS and Domains
          • Exclude IP Addresses
      • Quishing Simulator
        • Manage Quishing Scenarios
          • Quishing Scenarios
          • Quishing Templates
          • Quishing Landing Page Templates
        • Quishing Campaign Manager
        • Quishing Campaign Reports
        • Settings
          • DNS and Domains
          • Excluding IP Address
      • Awareness Educator
        • Training Library
        • Enrollments
        • Certificates
        • Training Reports
        • Training Completion Queries
      • Incident Responder
        • Incident Responder Dashboard
        • Investigations
        • Integrations
        • Playbook
        • Mail Configurations
          • Microsoft 365
          • Exchange
          • Google Workspace
        • Cross Company Integration
      • Phishing Reporter
        • Phishing Reporter Customization
        • Phishing Reporter Deployment
          • How to Deploy the Add-in in Microsoft 365
          • Phishing Reporter Page View Failure Due to Deprecated Exchange Online Tokens
          • Microsoft Ribbon Phishing Reporter
          • How to Deploy the Add-in in Exchange Admin Center
          • How to Deploy the Add-in in Google Workspace
          • Phishing Reporter Announcement Email Template
        • Diagnostic Tool
        • Integrating Microsoft Phishing Reporting Button with Keepnet
        • Troubleshooting Phishing Reporter on Outlook Desktop
      • Reports
        • Advanced Reports
        • Executive Reports
        • Scheduled Reports
        • Gamification Report
      • Company
        • Target Users
        • Companies
          • Company Groups
        • Company Settings
          • Privacy
            • Account Privacy
            • Data Privacy
          • AI Ally Settings
          • SMTP Settings
          • Direct Email Creation
            • Direct Email Creation for Google Workspace
            • Direct Email Creation for Microsoft 365
          • Notification Templates
          • Google User Provisioning
          • REST API
          • White Labeling
          • Proxy Settings
          • SAML Settings
            • How to Configure SAML on ADFS
            • How to Configure SAML on Google Workspace
            • How to Configure SAML on Azure AD
            • How to Configure SAML on CyberArk
            • How to Configure SAML on Okta
          • SCIM Settings
            • Getting Started with SCIM
            • Azure AD SCIM Integration
            • Okta SCIM Integration
            • Onelogin SCIM Integration
            • Jumpcloud SCIM Integration
          • SIEM Integrations
            • Splunk Integration
            • Syslog Integration
          • LDAP
          • Allowed Domains
        • System Users
          • People
          • Roles
        • Audit Log
        • Job Log
      • Free Phishing Email Analysis Service
    • Miscellaneous
      • Whitelisting
        • How to Whitelist an IP Address in Office 365
        • How to Whitelist an IP Address in Exchange 2013 and 2016
        • How to Whitelist an IP Address in Google Workspace
        • How to Whitelist in Mimecast
        • Whitelisting in Other Security Solutions
        • Whitelisting the Pictures on Microsoft Outlook Apps
        • Keepnet Tools Whitelisting Guidelines
        • Understanding Email Delivery Errors
        • Tracking Email Opens in Phishing Simulations
      • User Profile
      • Multi-Factor Authentication (MFA) Settings
      • On-Premise Requirement Checker
      • Platform Requirements
        • Portal UI Requirements
        • Phishing Reporter Requirements
        • Diagnostic Tool Requirements
      • Maintenance Tool
      • Understanding the Preferred Language Setting
  • 📚RESOURCES
    • Platform Security
    • Volume & Performance
    • Customer Help Desk
    • Product Update/Maintenance
    • Research Methodology
    • Release Notes
      • 2025
      • 2024
      • 2023
      • 2022
      • 2021
      • 2020
  • ⚖️Legal Hub
    • For Customers
      • Customer Terms of Service
      • Product Specific Terms
      • Jurisdiction Specific Terms
      • Data Processing Agreement
      • Regional Data Hosting Policy
      • Product and Services Catalog
      • Acceptable Use Policy
      • Keepnet Security Program
      • Microsoft CoPilot Usage Policy
    • For Everyone
      • Website
        • Terms of Use
        • Privacy Policy
        • Cookie Policy
      • Free Phishing Email Analysis
        • Terms of Service
        • Privacy Policy
      • Transparency Report
Powered by GitBook

Copyright © Keepnet Labs LTD. All rights reserved.

On this page
  • Campaign Manager Components
  • Actions
  • Campaign Instances
  • Actions
  • Create a Campaign
  • Campaign Settings
  • Phishing Scenarios
  • Target Audience
  • Delivery Settings
  • Campaign Summary
  • Video Tutorial
  • FAQ
  • Q: Is it possible to remove the phishing simulation email from target users’ inboxes once the campaign has been launched?
  • Q: Can I change the date and time of the campaign after it has been scheduled?
  • Q: Is there a way to exclude phishing campaigns from showing up in the reports section, for example, if they were launched for testing purposes?
  • Q: Why do callback emails contain the "X-MS-Exchange-Organization-SkipSafeLinksProcessing: true" header?

Was this helpful?

Export as PDF
  1. NEXT-GENERATION PRODUCT
  2. Platform
  3. Callback Simulator

Callback Campaign Manager

Launch a callback campaign targeting users with enhanced options like Expiration Date, Mark As Test, Multiple Scenario Selection, SMTP or DEC delivery, Frequency or Distribution via the Campaign Manager.

Campaign Manager Components

The components of the Campaign Manager page are explained below.

Campaign Name

The name of the campaign

"Instance" information indicating the number of times the campaign has been launched is available next to the campaign name

Target Users

The target users who will receive the callback phishing email

Status

Status information of the campaign. (idle, running, completed, paused, canceled, error)

  • Idle = The campaign is launched and has not started yet

  • Running = The campaign is in progress

  • Completed = The campaign is delivered to all target users

  • Paused = The campaign has been temporarily suspended

  • Canceled = The campaign has been withdrawn

  • Error = The status field displays an error message if there is a delivery problem

Scenarios

Shows how many scenarios has been launched in the campaign.

Created By

The source of the phishing campaign (system, custom)

Email Delivery

Date Created

The date and time the campaign was created

Last Launch

The date of the most recent use of the campaign

Actions

These settings give you the ability to edit, preview, or delete campaigns, as well as create new instances. You can also resend a campaign to specific users.

Click on the three dots “︙” button under the Action heading to adjust the following features.

Preview

Click the eye icon to preview the campaign

Edit

Change the settings of the relevant campaign

Create New Instance

Relaunch the campaign with the same settings to target groups

Delete

Delete the campaign

Campaign Instances

In the Campaign Name column, the Instances option will provide details of the campaign, such as how many times it has been launched and the users targeted.

The components of the Campaign Instances page are explained below.

Frequency

If you have selected multiple scenarios, it shows how often you selected the scenarios to be sent randomly to the selected groups.

Target Users

The number of target users who will receive the campaign

Start Time

The date and time that the campaing was started

Status

Current status of the campaign (idle, running, completed, canceled, error)

Date Created

The creation date of the campaign

Actions

You can delete, pause, or resume a paused instance on the Campaign Instances page as well as you also have the option to view detailed reports of an instance or resend the campaign.

Launch

Resend a campaign to a selected group

View Report

Access detailed reports of a campaign

Delete

Delete the campaign report

Stop

Terminate an active campaign

Create a Campaign

Click on "+ NEW" on the Callback Simulator > Campaign Manager page to create a new callback phishing campaign to set up to launch target users in four simple steps:

  • Campaign Settings

  • Callback Scenarios

  • Target Audience

  • Delivery Settings

  • Campaign Summary

Campaign Settings

Enter basic information about this campaign. The components of the Campaign Info page are explained below.

Campaign Name

The name of the campaign

Tracking Duration

Select the time period you want to keep this campaign active

Mark As Test

Select this box if you want to exclude the results of the campaign from the overall company score

Phishing Scenarios

Select one scenario to send selected target users or select multiple phishing scenarios to distribute randomly.

If multiple scenarios are selected, each user will receive a random scenario.

Scenarios

Select scenarios to be sent to selected target users.

Language

Filter scenarios according to their language.

Voice

Filter scenarios according to AI voices.

Difficulty

Filter scenarios according to their difficulty level.

Target Audience

Select target groups for your campaign.

Target Audience

Choose one or several recipient groups to send the selected phishing scenarios to.

Limit Recipients

  • Send only to users with an active phishing reporter add-in: Select this option to send the campaign only to users with an active phishing reporter add-in.

  • Send this campaign to randomly selected users: Choose this option to send the phishing campaign to randomly selected users within the target group. You have the option to choose a percentage of the group or a specific number of users.

Delivery Settings

Set email delivery options.

The components of the Delivery Settings page are explained below.

Email Delivery

Frequency

If you have selected multiple scenarios, you can choose how often you would like to send the scenarios randomly to the selected groups.

Schedule

The date and time of the campaign launch:

  • Schedule for: Check this box to begin the campaign on a specific date.

  • Save for later: Check this box if you want to send the campaign later. To send now, click the "Now" button after opening the date and time pop-up.

Distribution

When you launch a phishing campaign to a large audience, this feature ensures that the emails are not blocked or quarantined by the recipient's email server. It achieves this by distributing the emails over a period of time rather than sending them all at once.

  • Send emails when the campaign starts: As the campaign begins, emails are immediately dispatched to the selected target users.

  • Send emails on defined days and hours: You can determine the specific days and times when emails will be delivered to the chosen target users.

    • Sending limit per batch: Define the quantity of emails you'd like to send to the recipients in each batch during the chosen days and times.

    • Send emails with delay every: Decide on the duration of the pause between sending each batch, whether it's in seconds, minutes, or hours.

The system will automatically determine and show you the duration required to send the campaign to the designated number of recipients based on your chosen settings.

Campaign Summary

All of the phishing campaign details are easily accessible on one page, along with a preview of the callback email template and callback template.

The components of the Campaign Summary page are explained below.

Scenario Info

The name of the campaign, the difficulty level and the tracking duration are listed.

Settings

Date and time of the campaign, the number of emails to be sent in batch, and the email delivery info

Other

Other additional enabled settings will appear here such as "mark as test" option.

Target Users

The target users who will receive the callback campaign.

Click on Preview to see the target users count and target user groups.

Email to be sent

The phishing email template selected for the campaign

Click Preview to see how it will be displayed in the target users’ inboxes

Callback Template

The selected callback template for the campaign.

Click Preview to see how it will be displayed in the target users’ browsers

Schedule

By enabling the frequency feature, you can view the date and time when the scenarios will be delivered to the selected groups.

Click Start to launch the campaign.

Click Cancel to rescind all of the actions, then click Quit in the pop-up window. If you want to make additional edits, click Continue Editing.

Video Tutorial

This tutorial explains the features of the Campaign Manager, including Scheduling, Targeting Multiple Groups, SMTP Delay, Expiration Date, Multiple Scenarios, and Randomization. These options help you customize and launch the callback campaign for your target users.

FAQ

Q: Is it possible to remove the phishing simulation email from target users’ inboxes once the campaign has been launched?

A: Yes. The investigation feature of the Incident Responder product gives you the capability to delete the phishing simulation email.

Q: Can I change the date and time of the campaign after it has been scheduled?

A: Yes. You can adjust the campaign settings at any time before the launch date.

Q: Is there a way to exclude phishing campaigns from showing up in the reports section, for example, if they were launched for testing purposes?

A: Yes. At the beginning of the campaign creation, enable the "Mark As Test" feature to exclude the campaign report from the overall company score.

Q: Why do callback emails contain the "X-MS-Exchange-Organization-SkipSafeLinksProcessing: true" header?

A: This header prevents Microsoft Defender from analyzing links in callback emails, ensuring accurate test results and preventing false positives.

PreviousCallback TemplatesNextCallback Campaign Reports

Last updated 1 month ago

Was this helpful?

The selected email delivery option, or rule.

Before launching a phishing campaign, you must create a .

Choose the email delivery settings, which can be either or .

💫
target user group
SMTP
DEC
SMTP
DEC