LogoLogo
Get Demo
  • 💫NEXT-GENERATION PRODUCT
    • Introduction
    • Getting Started
      • 1. Invite System Users
      • 2. Add Target Users
        • Add Users via CSV
        • Add users via SCIM
          • SCIM Setup in Azure AD
          • SCIM Setup in Okta
          • SCIM Setup in Onelogin
          • SCIM Setup in Jumpcloud
        • Add users via LDAP
        • Add Users via API
      • 3. Email Deliverability
        • Microsoft 365
          • M365: Direct Email Creation
          • M365: Whitelisting
        • Google Workspace
          • Google: Direct Email Creation
          • Google: Whitelisting
        • Exchange 2013 and 2016
      • 4. Track Opened Emails
      • 5. Allow Phishing URLs
        • Whitelist for Office 365
        • Whitelist for Google Workspace
        • Whitelist for Exchange 2013/2016
        • Whitelist in Security Solutions
      • 6. Setup Phishing Reporter
        • Step 1. Download Phishing Reporter
        • Step 2. Deploy Phishing Reporter
          • How to Deploy Add-In in Microsoft 365
          • How to Deploy Add-In in Exchange Admin Center
          • How to Deploy Add-In in Google Workspace
          • How to Deploy Add-In in Outlook
            • Troubleshooting Phishing Reporter Add-In on Outlook Desktop
      • 7. Incident Responder Setup
        • Step 1. Integrate Threat Intel Partners
        • Step 2. Mail Configurations
          • Microsoft 365
          • Google Workspace (Gsuite)
          • Exchange (EWS)
    • Platform
      • Dashboard
        • Dashboard Widgets
        • Incident Responder Widgets
        • Threat Sharing Widgets
        • Phishing Simulator Widgets
      • Threat Intelligence
      • Email Threat Simulator
        • Start Scan
        • View Scan Report
        • Create Trusted Account on Exchange
        • Start Scan on O365 Email Account
        • Start Scan on Google Workspace Email Account
      • Threat Sharing
        • Communities
        • Incidents
      • Phishing Simulator
        • Manage Phishing Scenarios
          • Phishing Scenarios
          • Email Templates
          • Landing Pages
        • Phishing Campaign Manager
        • Phishing Campaign Reports
        • Settings
          • DNS Services and Domains
          • Exclude IP Address
      • Callback Simulator
        • Manage Callback Scenarios
          • Callback Scenarios
          • Callback Email Templates
          • Callback Templates
        • Callback Campaign Manager
        • Callback Campaign Reports
        • Settings
          • Callback Phone Numbers
      • Vishing Simulator
        • Vishing Templates
        • Vishing Campaign Manager
        • Vishing Campaign Reports
      • Smishing Simulator
        • Manage Smishing Scenarios
          • Smishing Scenarios
          • Text Message Templates
          • Landing Page Templates
        • Smishing Campaign Manager
        • Smishing Campaign Reports
        • Settings
          • Manage DNS and Domains
          • Exclude IP Addresses
      • Quishing Simulator
        • Manage Quishing Scenarios
          • Quishing Scenarios
          • Quishing Templates
          • Quishing Landing Page Templates
        • Quishing Campaign Manager
        • Quishing Campaign Reports
        • Settings
          • DNS and Domains
          • Excluding IP Address
      • Awareness Educator
        • Training Library
        • Enrollments
        • Certificates
        • Training Reports
        • Training Completion Queries
      • Incident Responder
        • Incident Responder Dashboard
        • Investigations
        • Integrations
        • Playbook
        • Mail Configurations
          • Microsoft 365
          • Exchange
          • Google Workspace
        • Cross Company Integration
      • Phishing Reporter
        • Phishing Reporter Customization
        • Phishing Reporter Deployment
          • How to Deploy the Add-in in Microsoft 365
          • Phishing Reporter Page View Failure Due to Deprecated Exchange Online Tokens
          • Microsoft Ribbon Phishing Reporter
          • How to Deploy the Add-in in Exchange Admin Center
          • How to Deploy the Add-in in Google Workspace
          • Phishing Reporter Announcement Email Template
        • Diagnostic Tool
        • Integrating Microsoft Phishing Reporting Button with Keepnet
        • Troubleshooting Phishing Reporter on Outlook Desktop
      • Reports
        • Advanced Reports
        • Executive Reports
        • Scheduled Reports
        • Gamification Report
      • Company
        • Target Users
        • Companies
          • Company Groups
        • Company Settings
          • Privacy
            • Account Privacy
            • Data Privacy
          • AI Ally Settings
          • SMTP Settings
          • Direct Email Creation
            • Direct Email Creation for Google Workspace
            • Direct Email Creation for Microsoft 365
          • Notification Templates
          • Google User Provisioning
          • REST API
          • White Labeling
          • Proxy Settings
          • SAML Settings
            • How to Configure SAML on ADFS
            • How to Configure SAML on Google Workspace
            • How to Configure SAML on Azure AD
            • How to Configure SAML on CyberArk
            • How to Configure SAML on Okta
          • SCIM Settings
            • Getting Started with SCIM
            • Azure AD SCIM Integration
            • Okta SCIM Integration
            • Onelogin SCIM Integration
            • Jumpcloud SCIM Integration
          • SIEM Integrations
            • Splunk Integration
            • Syslog Integration
          • LDAP
          • Allowed Domains
        • System Users
          • People
          • Roles
        • Audit Log
        • Job Log
      • Free Phishing Email Analysis Service
    • Miscellaneous
      • Whitelisting
        • How to Whitelist an IP Address in Office 365
        • How to Whitelist an IP Address in Exchange 2013 and 2016
        • How to Whitelist an IP Address in Google Workspace
        • How to Whitelist in Mimecast
        • Whitelisting in Other Security Solutions
        • Whitelisting the Pictures on Microsoft Outlook Apps
        • Keepnet Tools Whitelisting Guidelines
        • Understanding Email Delivery Errors
        • Tracking Email Opens in Phishing Simulations
      • User Profile
      • Multi-Factor Authentication (MFA) Settings
      • On-Premise Requirement Checker
      • Platform Requirements
        • Portal UI Requirements
        • Phishing Reporter Requirements
        • Diagnostic Tool Requirements
      • Maintenance Tool
      • Understanding the Preferred Language Setting
  • 📚RESOURCES
    • Platform Security
    • Volume & Performance
    • Customer Help Desk
    • Product Update/Maintenance
    • Research Methodology
    • Release Notes
      • 2025
      • 2024
      • 2023
      • 2022
      • 2021
      • 2020
  • ⚖️Legal Hub
    • For Customers
      • Customer Terms of Service
      • Product Specific Terms
      • Jurisdiction Specific Terms
      • Data Processing Agreement
      • Regional Data Hosting Policy
      • Product and Services Catalog
      • Acceptable Use Policy
      • Keepnet Security Program
      • Microsoft CoPilot Usage Policy
    • For Everyone
      • Website
        • Terms of Use
        • Privacy Policy
        • Cookie Policy
      • Free Phishing Email Analysis
        • Terms of Service
        • Privacy Policy
      • Transparency Report
Powered by GitBook

Copyright © Keepnet Labs LTD. All rights reserved.

On this page
  • Managing Target Users
  • Methods for Adding Target Users
  • 1. Adding Target Users via XLS(x) or CSV Files
  • 2. Adding Target Users Manually
  • 3. Adding Target Users via SCIM
  • 4. Adding Target Users via Google Workspace
  • 5. Adding Target Users via LDAP
  • 6. Adding Target Users via API
  • Adding Target Users to Groups
  • Deleting Target Users
  • Deleting Groups
  • Repeat Offenders
  • New Hires
  • Non-Simulated Users
  • Untrained Users
  • View User Activity Timeline
  • Video Tutorial
  • FAQ
  • Q: Is it possible to add a target user with any domain name?
  • Q: Would the remaining license count increase when a target user is deleted?
  • Q: What will happen when the license count is exceeded?
  • Q: What will happen when the license date is expired?
  • Q: Can I add a custom column under the "People" page in Target Users?

Was this helpful?

Export as PDF
  1. NEXT-GENERATION PRODUCT
  2. Platform
  3. Company

Target Users

PreviousCompanyNextCompanies

Last updated 3 months ago

Was this helpful?

The Target Users are those who receive e-mails that will be sent through the platform. This document explains how to add target users to the platform so that it can send training, phishing, campaigns, and other emails to them.

Managing Target Users

You can manage all target users from the Company > Target Users menu. You may create, remove, modify, and add target users to a group on this page.

The platform will notify the system user to validate the email domains after creating the target users on the platform. For more information, click .

Methods for Adding Target Users

1. Adding Target Users via XLS(x) or CSV Files

You can easily add target users to the system by importing a list on an Excel file. To use this option, please follow the steps below:

  • Go to the Company > Target Users menu.

  • Click the "New" button.

  • Click the "Import from a file" option.

  • To view a sample sheet, please click "DOWNLOAD EXAMPLE SHEET" on the target users page.

After downloading a sample sheet, it's time to fill in the required fields. Please open the sheet file and fill in the following fields.

  • First Name: It's required.

  • Last Name: It's required.

  • Email Address: It's required.

  • Phone Number: It's optional.

  • Department: It's optional.

  • Time Zone: It's optional. Please see the following information if you prefer to use the time zone for your target users in your sheet file.

  • Priority: It's optional.

The downloaded spreadsheet has time zones in SHEET2. Please copy all time zones from the "Time Zone" column in SHEET2 and paste them properly for your target user's time zone column.

After your file is ready, please follow the steps below:

  • Go to the Company > Target Users menu.

  • Click the "New" button.

  • Click the "Import from a file" option.

  • Click Upload File, choose the file on your computer, and click NEXT.

  • The Map Fields tab will require you to match the titles to the fields on the platform.

  • When you complete matching the fields, click NEXT.

  • Then either pick the users you wish to add and click IMPORT SELECTED, or click IMPORT ALL to add all the users to the platform.

2. Adding Target Users Manually

​​From the left menu, select Company > Target Users. Then, click New and click "Add users manually" on the new page. Fill out the required boxes in the "Add New User" window to add a new target user to the system.

Field
Description

First name

Specify the first name information of the target user.

Last name

Specify the last name information of the target user.

Email

Specify the email information of the target user.

Phone Number

You may add target user's phone number.

Department

Specify the department information of the target user.

Time Zone

Select a time zone and send campaigns to the target user in their own time zone.

Target Groups

Add the new user to the target group(s).

Proritiy

Specify the priority information of the target user. If the priority is high, the user will get the email first.

Active

Disable the target user on the platform. Disabled users won't receive training or simulation emails.

3. Adding Target Users via SCIM

SCIM (System for Cross-domain Identity Management) is a standard that automates the sharing of user identity information (e.g., first name, last name, email, phone number) across multiple identity platforms. Keepnet's platform supports SCIM integration to automate and synchronize target user data from identity providers to the platform.

To use this option, please follow the steps below:

  • Go to the Company > Target Users menu.

  • Click the "New" button.

  • Click the "SCIM Sync" option.

4. Adding Target Users via Google Workspace

The Google Workspace User Sync feature allows you to automatically import and synchronize user information (e.g., first name, last name, email, phone number) from Google Workspace into Keepnet's platform. This ensures that your user data is always up to date without the need for manual updates.

To use this option, please follow the steps below:

  • Go to the Company > Target Users menu.

  • Click the "New" button.

  • Select the "Google Sync" option.

5. Adding Target Users via LDAP

LDAP is a standard protocol that allows platforms to access an Active Directory to retrieve user information, such as name, surname, email, department, phone number, and other details, enabling automatic synchronization with the platform. The benefits of LDAP include automating user management, saving time, reducing stress, and minimizing manual user management tasks.

To use this option, please follow the steps below:

  • Go to the Company > Target Users menu.

  • Click the "New" button.

  • Click the "Import from LDAP" option.

6. Adding Target Users via API

Using the platform's APIs, target users may be effortlessly migrated. The API endpoints that are required are detailed below.

You need to create Rest API keys on the platform from here in order to use this API import option.

Use your own domain if you are using an on-premise version. e.g. https://api.PLATFORM_DOMAIN/docs/index.html

Instructions for adding target users using an API

POST ​/api​/target-users

  • Click the Authorize button on the top right side of the page.

  • Complete the authorization step with the Client ID and Client Secret key that you created on the platform.

  • Make sure that the api1 option is checked (✓) on the Scopes section.

  • Then use this endpoint to add a new target user to the platform.

The most up-to-date format of the body content that you need to use for requesting an API is available on the Swagger interface.

Searching for a user using API

POST ​/api​/target-users​/search

  • Click the Authorize button on the top right side of the page.

  • Complete the authorization step with the Client ID and Client Secret key that you created on the platform.

  • Make sure that the api1 option is checked (✓) on the Scopes section.

  • Then use this endpoint to search for a target user on the platform.

The most up-to-date format of the body content that you need to use for requesting an API is available on the Swagger interface.

Editing Target Users using API

PUT ​/api​/target-users​/{resourceId}

  • Click the Authorize button on the top right side of the page.

  • Complete the authorization step with the Client ID and Client Secret key that you created on the platform.

  • Make sure that the api1 option is checked (✓) on the Scopes section.

  • Then use this endpoint to edit a target user on the platform.

The most up-to-date format of the body content that you need to use for requesting an API is available on the Swagger interface.

Deleting Target Users using API

DELETE ​/api​/target-users​/{resourceId}

  • Click the Authorize button on the top right side of the page.

  • Complete the authorization step with the Client ID and Client Secret key that you created on the platform.

  • Make sure that the api1 option is checked (✓) on the Scopes section.

  • Then use this endpoint to delete a target user on the platform.

The most up-to-date format of the body content that you need to use for requesting an API is available on the Swagger interface.

Adding Target Users to Groups

You may create new groups by clicking the New button on the Company > Target Users > Group menu.

To add target users to a group, click ⁞ icon under the Action column and click Add users to the group. Select the users you want to add to a group and click “Add Selected Users” to complete the process.

Deleting Target Users

To delete target users on the platform, go to the Company > Target Users > People menu and select the user(s) that you want to remove. Click ⁞ icon under the Action column and click “Delete” to complete the process.

Deleting Groups

To delete target user groups on the platform, go to the Company > Target Users > Group menu and select the group(s) that you want to remove. Click ⁞ icon under the Action column and click “Delete” to complete the process.

Deleting a target user group will not delete the users defined in the group. It will only delete the group.

Repeat Offenders

Repeat Offenders is an automated target group that includes users who have been phished two or more times in the last 3 months across all phishing simulation campaigns such as from Vishing Simulator, Quishing Simulator, Phishing Simulator, Callback Simulator and Smishing Simulator. You can view the risky users and send them training more frequently.

There are two ways to see the repeat offender users.

  1. Go to Company > Target Users > Groups. There, you will find the Repeat Offenders target group, which contains users who have been phished multiple times.

  2. Go to Company > Target Users. There, you will see a banner labeled Repeat Offenders. Click the SEE REPEAT OFFENDERS button to view users who have been phished multiple times.

New Hires

New Hires is an automated target group designed to include new employees in your organization for a period of 30 days. This group ensures that new hires receive focused training and simulations, helping them quickly adapt to your organization's security culture.

The training and simulations for this group are selected and assigned by system admins. This ensures that the content is tailored to improve their awareness and preparedness against potential security threats. After the 30-day period, the new hires are automatically removed from the group.

To view the New Hires group:

  1. Go to Company > Target Users > Groups

    • Here, you will find the New Hires group listed.

By using the New Hires group, you can ensure that your newest team members are equipped with the knowledge and skills necessary to maintain a strong security posture from day one.

Non-Simulated Users

The Non-Simulated Users group is an automated target group designed to include users who have not yet participated in any phishing simulations. Users are automatically added to this group and remain in it until they engage in their first simulation. This allows organizations to focus on users who have not been exposed to phishing scenarios, helping them build security awareness from the ground up.

Simulations for this group can be specifically tailored to introduce users to phishing risks and improve their ability to recognize potential threats. Once a user completes a simulation, they are automatically removed from the group.

To view the Non-Simulated Users group:

  1. Go to Company > Target Users > Groups

    • Here, you will find the Non-Simulated Users group listed.

By utilizing the Non-Simulated Users group, you can ensure that employees who have not yet participated in phishing simulations receive the necessary exposure to enhance their awareness and resilience against social engineering attacks.

Untrained Users

The Untrained Users group is an automated target group that includes users who have not enrolled in any training courses. Users are automatically assigned to this group until they complete at least one training session. This allows organizations to prioritize security awareness training for employees who have yet to engage with learning modules.

Training content for this group can be tailored to provide essential cybersecurity knowledge, ensuring that users gain the skills needed to protect against evolving threats. Once a user enrolls in a training course, they are automatically removed from the group.

To view the Untrained Users group:

  1. Go to Company > Target Users > Groups

    • Here, you will find the Untrained Users group listed.

By using the Untrained Users group, you can ensure that employees who have not yet undergone cybersecurity training receive structured learning, equipping them with the necessary knowledge to maintain a strong security posture.

View User Activity Timeline

Video Tutorial

The Target Users are those who receive e-mails that will be sent through the platform. This video tutorial explains how to add target users to the platform so that it can send training, phishing, campaigns, and other emails to them.

FAQ

Q: Is it possible to add a target user with any domain name?

A: You can only add e-mail addresses with authorized domains. Contact your Account Manager or Support Team if you wish to add users with a different domain address.

Q: Would the remaining license count increase when a target user is deleted?

A: No, when a target user is added, your remaining license is reduced appropriately, but your license is not increased when the target user is deleted.

Q: What will happen when the license count is exceeded?

A: The system will warn the admin when add a new user although the license count is exceeded. If the admin goes further and adds new users, each unique user will be charged. Please contact the support team for the additional license.

Q: What will happen when the license date is expired?

A: All data will stay remain but the admin will not be able to login into the platform. Please contact the support team to renew the license.

Q: Can I add a custom column under the "People" page in Target Users?

A: Yes, go to Company > Target Users > People and click the Settings button to open table settings. After that, click the EDIT FIELDS button to create or manage any custom fields.

Please click to learn how to set up or synchronize your employees' information via SCIM on the platform.

Please click to learn how to set up or synchronize your employees' information via Google Workspace on the platform.

Please click to learn how to set up and synchronize your employees' information via LDAP integration.

Go to the Swagger .

Go to the Swagger .

Go to the Swagger .

Go to the Swagger .

The new User Activity Timeline button under the Company > Target Users > Actions column allows admins to view a target user's activity history across simulations, reporting and training. This helps track performance and engagement. For more details, visit documentation.

💫
here
here
here
here
link
link
link
link
Gamification Report