LogoLogo
Get Demo
  • πŸ’«NEXT-GENERATION PRODUCT
    • Introduction
    • Getting Started
      • 1. Invite System Users
      • 2. Add Target Users
        • Add Users via CSV
        • Add users via SCIM
          • SCIM Setup in Azure AD
          • SCIM Setup in Okta
          • SCIM Setup in Onelogin
          • SCIM Setup in Jumpcloud
        • Add users via LDAP
        • Add Users via API
      • 3. Email Deliverability
        • Microsoft 365
          • M365: Direct Email Creation
          • M365: Whitelisting
        • Google Workspace
          • Google: Direct Email Creation
          • Google: Whitelisting
        • Exchange 2013 and 2016
      • 4. Track Opened Emails
      • 5. Allow Phishing URLs
        • Whitelist for Office 365
        • Whitelist for Google Workspace
        • Whitelist for Exchange 2013/2016
        • Whitelist in Security Solutions
      • 6. Setup Phishing Reporter
        • Step 1. Download Phishing Reporter
        • Step 2. Deploy Phishing Reporter
          • How to Deploy Add-In in Microsoft 365
          • How to Deploy Add-In in Exchange Admin Center
          • How to Deploy Add-In in Google Workspace
          • How to Deploy Add-In in Outlook
            • Troubleshooting Phishing Reporter Add-In on Outlook Desktop
      • 7. Incident Responder Setup
        • Step 1. Integrate Threat Intel Partners
        • Step 2. Mail Configurations
          • Microsoft 365
          • Google Workspace (Gsuite)
          • Exchange (EWS)
    • Platform
      • Dashboard
        • Dashboard Widgets
        • Incident Responder Widgets
        • Threat Sharing Widgets
        • Phishing Simulator Widgets
      • Threat Intelligence
      • Email Threat Simulator
        • Start Scan
        • View Scan Report
        • Create Trusted Account on Exchange
        • Start Scan on O365 Email Account
        • Start Scan on Google Workspace Email Account
      • Threat Sharing
        • Communities
        • Incidents
      • Phishing Simulator
        • Manage Phishing Scenarios
          • Phishing Scenarios
          • Email Templates
          • Landing Pages
        • Phishing Campaign Manager
        • Phishing Campaign Reports
        • Settings
          • DNS Services and Domains
          • Exclude IP Address
      • Callback Simulator
        • Manage Callback Scenarios
          • Callback Scenarios
          • Callback Email Templates
          • Callback Templates
        • Callback Campaign Manager
        • Callback Campaign Reports
        • Settings
          • Callback Phone Numbers
      • Vishing Simulator
        • Vishing Templates
        • Vishing Campaign Manager
        • Vishing Campaign Reports
      • Smishing Simulator
        • Manage Smishing Scenarios
          • Smishing Scenarios
          • Text Message Templates
          • Landing Page Templates
        • Smishing Campaign Manager
        • Smishing Campaign Reports
        • Settings
          • Manage DNS and Domains
          • Exclude IP Addresses
      • Quishing Simulator
        • Manage Quishing Scenarios
          • Quishing Scenarios
          • Quishing Templates
          • Quishing Landing Page Templates
        • Quishing Campaign Manager
        • Quishing Campaign Reports
        • Settings
          • DNS and Domains
          • Excluding IP Address
      • Awareness Educator
        • Training Library
        • Enrollments
        • Certificates
        • Training Reports
        • Training Completion Queries
      • Incident Responder
        • Incident Responder Dashboard
        • Investigations
        • Integrations
        • Playbook
        • Mail Configurations
          • Microsoft 365
          • Exchange
          • Google Workspace
        • Cross Company Integration
      • Phishing Reporter
        • Phishing Reporter Customization
        • Phishing Reporter Deployment
          • How to Deploy the Add-in in Microsoft 365
          • Phishing Reporter Page View Failure Due to Deprecated Exchange Online Tokens
          • Microsoft Ribbon Phishing Reporter
          • How to Deploy the Add-in in Exchange Admin Center
          • How to Deploy the Add-in in Google Workspace
          • Phishing Reporter Announcement Email Template
        • Diagnostic Tool
        • Integrating Microsoft Phishing Reporting Button with Keepnet
        • Troubleshooting Phishing Reporter on Outlook Desktop
      • Reports
        • Advanced Reports
        • Executive Reports
        • Scheduled Reports
        • Gamification Report
      • Company
        • Target Users
        • Companies
          • Company Groups
        • Company Settings
          • Privacy
            • Account Privacy
            • Data Privacy
          • AI Ally Settings
          • SMTP Settings
          • Direct Email Creation
            • Direct Email Creation for Google Workspace
            • Direct Email Creation for Microsoft 365
          • Notification Templates
          • Google User Provisioning
          • REST API
          • White Labeling
          • Proxy Settings
          • SAML Settings
            • How to Configure SAML on ADFS
            • How to Configure SAML on Google Workspace
            • How to Configure SAML on Azure AD
            • How to Configure SAML on CyberArk
            • How to Configure SAML on Okta
          • SCIM Settings
            • Getting Started with SCIM
            • Azure AD SCIM Integration
            • Okta SCIM Integration
            • Onelogin SCIM Integration
            • Jumpcloud SCIM Integration
          • SIEM Integrations
            • Splunk Integration
            • Syslog Integration
          • LDAP
          • Allowed Domains
        • System Users
          • People
          • Roles
        • Audit Log
        • Job Log
      • Free Phishing Email Analysis Service
    • Miscellaneous
      • Whitelisting
        • How to Whitelist an IP Address in Office 365
        • How to Whitelist an IP Address in Exchange 2013 and 2016
        • How to Whitelist an IP Address in Google Workspace
        • How to Whitelist in Mimecast
        • Whitelisting in Other Security Solutions
        • Whitelisting the Pictures on Microsoft Outlook Apps
        • Keepnet Tools Whitelisting Guidelines
        • Understanding Email Delivery Errors
        • Tracking Email Opens in Phishing Simulations
      • User Profile
      • Multi-Factor Authentication (MFA) Settings
      • On-Premise Requirement Checker
      • Platform Requirements
        • Portal UI Requirements
        • Phishing Reporter Requirements
        • Diagnostic Tool Requirements
      • Maintenance Tool
      • Understanding the Preferred Language Setting
  • πŸ“šRESOURCES
    • Platform Security
    • Volume & Performance
    • Customer Help Desk
    • Product Update/Maintenance
    • Research Methodology
    • Release Notes
      • 2025
      • 2024
      • 2023
      • 2022
      • 2021
      • 2020
  • βš–οΈLegal Hub
    • For Customers
      • Customer Terms of Service
      • Product Specific Terms
      • Jurisdiction Specific Terms
      • Data Processing Agreement
      • Regional Data Hosting Policy
      • Product and Services Catalog
      • Acceptable Use Policy
      • Keepnet Security Program
      • Microsoft CoPilot Usage Policy
    • For Everyone
      • Website
        • Terms of Use
        • Privacy Policy
        • Cookie Policy
      • Free Phishing Email Analysis
        • Terms of Service
        • Privacy Policy
      • Transparency Report
Powered by GitBook

Copyright Β© Keepnet Labs LTD. All rights reserved.

On this page
  • Callback Templates Lists
  • How to Create a Callback Template
  • Utilizing Merge Tags in Callback Templates
  • Video Tutorial
  • FAQ
  • Q: Can I restore a deleted template?
  • Q: Can I use a different file type than MP3 for the Invalid Dial Notice?
  • Q: Can I upload an MP3 file with a size of more than 1MB?

Was this helpful?

Export as PDF
  1. NEXT-GENERATION PRODUCT
  2. Platform
  3. Callback Simulator
  4. Manage Callback Scenarios

Callback Templates

The Callback Templates page will show you all the available templates you have to send to your target users. From this page, you can create, edit, or delete any callback templates that you would like.

Callback Templates Lists

The components of the Vishing Template page are explained below.

Template Name

Name of the callback template

Language

The language available for the template

Voice

List the available templates sorted by AI voice

Difficultly

Created By

The company that created the template

Date Created

Date and time the training item was created

Available For

The companies that this template is available for

Tags

Tags assigned to the template to facilitate search efforts

Actions > Preview

Preview the template before launching to target users

Actions > Edit

Edit and customize the template

Actions > Duplicate

Duplicate the template for editing and customization

Actions > Delete

Permanently delete the template

How to Create a Callback Template

Follow the steps below to create a new callback template.

  • Click on the +NEW button on the Callback Templates page.

  • On the Template Info page, complete the following fields:

    • Select the difficulty level: The difficulty rating for the template

    • Template name: Name of the callback template

    • Description: The brief description for the template

    • Tags: Tags assigned to the template to facilitate search efforts

  • If you’re a Reseller, you can choose what companies this template is available for

  • Click Next

  • On the Dialog Settings page complete the following fields:

    • Select the Language and Voice that the callback template will be voiced in

    • Enter a message for the Caller Greeting. The caller is expected to enter a 6-digit phishing code at the end of the call greeting message.

    • Enter the Steps that define your callback template

      • Select Text-To-Speech or MP3 steps to create your callback campaign.

        • Text-to-speech: The text written by the admin will be narrated by the AI in the chosen language and voice.

        • MP3 Audio File: The mp3 voice file will be played to the end user.

        • Pause: The call will be held on in silence in seconds after the previous step is completed before the second step is played.

      • Next, enter the number of number digits that the end user will have to enter to move on to the next step.

        • Leave by default zero if no required digit must be dialed by the end user for the related step.

      • You need to choose one step, β€œDigit Entering Step”, in order to mark the end user as phished on the report if the user comes to the related marked step.

      • Finally, complete the fields for Invalid Dialing Notice. This notice will be played when the user fails to enter the requested amount of digits correctly.

        • Under Methods, select if you would like to use voice to text or if you would like to upload an mp3 file.

          • If you select the voice-to-text option, enter the text for the AI to narrate

  • Once you are happy with your template, click Save.

You can add up to five steps for your callback template.

Utilizing Merge Tags in Callback Templates

Here's a list of merge tags to help you make your callback template more personal. Adding these tags can make your phishing campaign more tailored to the recipient.

Merge Tag
Description

Full Name

Inserts the target user's first and last name.

First Name

Inserts the target user's first name.

Last Name

Inserts the target user's last name.

Company Name

Displays your organization's name, sourced from the company profile.

Video Tutorial

Callback Templates are designed to create voice phishing steps for your target audience. You can see how to create, edit, and delete the callback templates from the following video.

FAQ

Q: Can I restore a deleted template?

A: No. Once an item has been deleted, it is no longer available.

Q: Can I use a different file type than MP3 for the Invalid Dial Notice?

A: No. The platform only supports MP3.

Q: Can I upload an MP3 file with a size of more than 1MB?

A: No. The platform only supports MP3 files of 1MB size.

PreviousCallback Email TemplatesNextCallback Campaign Manager

Last updated 1 year ago

Was this helpful?

The level of difficulty to recognize a phishing attempt (Easy, Medium, Hard). Please to see how the difficulty level is determined.

πŸ’«
click here