LogoLogo
Get Demo
  • 💫NEXT-GENERATION PRODUCT
    • Introduction
    • Getting Started
      • 1. Invite System Users
      • 2. Add Target Users
        • Add Users via CSV
        • Add users via SCIM
          • SCIM Setup in Azure AD
          • SCIM Setup in Okta
          • SCIM Setup in Onelogin
          • SCIM Setup in Jumpcloud
        • Add users via LDAP
        • Add Users via API
      • 3. Email Deliverability
        • Microsoft 365
          • M365: Direct Email Creation
          • M365: Whitelisting
        • Google Workspace
          • Google: Direct Email Creation
          • Google: Whitelisting
        • Exchange 2013 and 2016
      • 4. Track Opened Emails
      • 5. Allow Phishing URLs
        • Whitelist for Office 365
        • Whitelist for Google Workspace
        • Whitelist for Exchange 2013/2016
        • Whitelist in Security Solutions
      • 6. Setup Phishing Reporter
        • Step 1. Download Phishing Reporter
        • Step 2. Deploy Phishing Reporter
          • How to Deploy Add-In in Microsoft 365
          • How to Deploy Add-In in Exchange Admin Center
          • How to Deploy Add-In in Google Workspace
          • How to Deploy Add-In in Outlook
            • Troubleshooting Phishing Reporter Add-In on Outlook Desktop
      • 7. Incident Responder Setup
        • Step 1. Integrate Threat Intel Partners
        • Step 2. Mail Configurations
          • Microsoft 365
          • Google Workspace (Gsuite)
          • Exchange (EWS)
    • Platform
      • Dashboard
        • Dashboard Widgets
        • Incident Responder Widgets
        • Threat Sharing Widgets
        • Phishing Simulator Widgets
      • Threat Intelligence
      • Email Threat Simulator
        • Start Scan
        • View Scan Report
        • Create Trusted Account on Exchange
        • Start Scan on O365 Email Account
        • Start Scan on Google Workspace Email Account
      • Threat Sharing
        • Communities
        • Incidents
      • Phishing Simulator
        • Manage Phishing Scenarios
          • Phishing Scenarios
          • Email Templates
          • Landing Pages
        • Phishing Campaign Manager
        • Phishing Campaign Reports
        • Settings
          • DNS Services and Domains
          • Exclude IP Address
      • Callback Simulator
        • Manage Callback Scenarios
          • Callback Scenarios
          • Callback Email Templates
          • Callback Templates
        • Callback Campaign Manager
        • Callback Campaign Reports
        • Settings
          • Callback Phone Numbers
      • Vishing Simulator
        • Vishing Templates
        • Vishing Campaign Manager
        • Vishing Campaign Reports
      • Smishing Simulator
        • Manage Smishing Scenarios
          • Smishing Scenarios
          • Text Message Templates
          • Landing Page Templates
        • Smishing Campaign Manager
        • Smishing Campaign Reports
        • Settings
          • Manage DNS and Domains
          • Exclude IP Addresses
      • Quishing Simulator
        • Manage Quishing Scenarios
          • Quishing Scenarios
          • Quishing Templates
          • Quishing Landing Page Templates
        • Quishing Campaign Manager
        • Quishing Campaign Reports
        • Settings
          • DNS and Domains
          • Excluding IP Address
      • Awareness Educator
        • Training Library
        • Enrollments
        • Certificates
        • Training Reports
        • Training Completion Queries
      • Incident Responder
        • Incident Responder Dashboard
        • Investigations
        • Integrations
        • Playbook
        • Mail Configurations
          • Microsoft 365
          • Exchange
          • Google Workspace
        • Cross Company Integration
      • Phishing Reporter
        • Phishing Reporter Customization
        • Phishing Reporter Deployment
          • How to Deploy the Add-in in Microsoft 365
          • Phishing Reporter Page View Failure Due to Deprecated Exchange Online Tokens
          • Microsoft Ribbon Phishing Reporter
          • Microsoft Page View Phishing Reporter
          • How to Deploy the Add-in in Exchange Admin Center
          • How to Deploy the Add-in in Google Workspace
          • Phishing Reporter Announcement Email Template
        • Diagnostic Tool
        • Integrating Microsoft Phishing Reporting Button with Keepnet
        • Troubleshooting Phishing Reporter on Outlook Desktop
      • Reports
        • Advanced Reports
        • Executive Reports
        • Scheduled Reports
        • Gamification Report
      • Company
        • Target Users
        • Companies
          • Company Groups
        • Company Settings
          • Privacy
            • Account Privacy
            • Data Privacy
          • AI Ally Settings
          • SMTP Settings
          • Direct Email Creation
            • Direct Email Creation for Google Workspace
            • Direct Email Creation for Microsoft 365
          • Notification Templates
          • Google User Provisioning
          • REST API
          • White Labeling
          • Proxy Settings
          • SAML Settings
            • How to Configure SAML on ADFS
            • How to Configure SAML on Google Workspace
            • How to Configure SAML on Azure AD
            • How to Configure SAML on CyberArk
            • How to Configure SAML on Okta
          • SCIM Settings
            • Getting Started with SCIM
            • Azure AD SCIM Integration
            • Okta SCIM Integration
            • Onelogin SCIM Integration
            • Jumpcloud SCIM Integration
          • SIEM Integrations
            • Splunk Integration
            • Syslog Integration
          • LDAP
          • Allowed Domains
        • System Users
          • People
          • Roles
        • Audit Log
        • Job Log
      • Free Phishing Email Analysis Service
    • Miscellaneous
      • Whitelisting
        • How to Whitelist an IP Address in Office 365
        • How to Whitelist an IP Address in Exchange 2013 and 2016
        • How to Whitelist an IP Address in Google Workspace
        • How to Whitelist in Mimecast
        • Whitelisting in Other Security Solutions
        • Whitelisting the Pictures on Microsoft Outlook Apps
        • Keepnet Tools Whitelisting Guidelines
        • Understanding Email Delivery Errors
        • Tracking Email Opens in Phishing Simulations
      • User Profile
      • Multi-Factor Authentication (MFA) Settings
      • On-Premise Requirement Checker
      • Platform Requirements
        • Portal UI Requirements
        • Phishing Reporter Requirements
        • Diagnostic Tool Requirements
      • Maintenance Tool
      • Understanding the Preferred Language Setting
  • 📚RESOURCES
    • Platform Security
    • Volume & Performance
    • Customer Help Desk
    • Product Update/Maintenance
    • Research Methodology
    • Release Notes
      • 2025
      • 2024
      • 2023
      • 2022
      • 2021
      • 2020
  • ⚖️Legal Hub
    • For Customers
      • Customer Terms of Service
      • Product Specific Terms
      • Jurisdiction Specific Terms
      • Data Processing Agreement
      • Regional Data Hosting Policy
      • Product and Services Catalog
      • Acceptable Use Policy
      • Keepnet Security Program
      • Microsoft CoPilot Usage Policy
    • For Everyone
      • Website
        • Terms of Use
        • Privacy Policy
        • Cookie Policy
      • Free Phishing Email Analysis
        • Terms of Service
        • Privacy Policy
      • Transparency Report
Powered by GitBook

Copyright © Keepnet Labs LTD. All rights reserved.

On this page
  • Which Outlook Platforms and Browsers Are Supported?
  • Where Are Reported Emails Sent?
  • What Happens When Users Report Simulated Emails and Training Enrollments?
  • What Happens When an Employee Reports an Email
  • Microsoft Page View Phishing Reporter User Experience
  • How to Install the Microsoft Page View Phishing Reporter
  • Frequently Asked Questions (FAQs)
  • Q: Can I show a confirmation prompt before deleting a reported email?
  • Q: Does the Microsoft Page View Phishing Reporter work on Outlook Mobile for iPhone or Android?
  • Q: Can I customize the Microsoft Page View Phishing Reporter side panel message, such as setting a fixed width and height?
  • Q: Can users choose their preferred language for the Phishing Reporter button pop-up messages?
  • Q: If we set the Phishing Reporter button to delete reported emails automatically, can the email be recovered?

Was this helpful?

Export as PDF
  1. NEXT-GENERATION PRODUCT
  2. Platform
  3. Phishing Reporter
  4. Phishing Reporter Deployment

Microsoft Page View Phishing Reporter

PreviousMicrosoft Ribbon Phishing ReporterNextHow to Deploy the Add-in in Exchange Admin Center

Last updated 1 day ago

Was this helpful?

The Microsoft Page View Phishing Reporter is a Microsoft Outlook add-in developed by Keepnet that enables your users to quickly and securely report suspicious emails with a single click—directly from their email view pane. This helps your organization detect threats early and respond to phishing attempts more effectively.

Which Outlook Platforms and Browsers Are Supported?

The Microsoft Page View Phishing Reporter is built using the Microsoft Graph API and is designed to provide a seamless, modern experience across all major Outlook platforms. Unlike the traditional that appears in the toolbar, the Page View version is embedded directly within the email view pane, providing a more integrated user interface.

✅ Supported Outlook Platforms:

  • Outlook Web App (OWA)

  • Outlook Classic Desktop (Windows)

  • Outlook New Desktop (Windows)

  • Outlook Desktop App (macOS)

  • Outlook Mobile App (iOS and Android)

✅ Supported Browsers (on both Mac and Windows):

  • Google Chrome

  • Microsoft Edge

  • Mozilla Firefox

  • Safari

  • Opera

This cross-platform and cross-browser support ensures that your users can report suspicious emails consistently and securely on Outlook platforms, regardless of the device or environment they’re using.

Where Are Reported Emails Sent?

When a user clicks the Phishing Reporter button, the reported suspicious email is sent to one or more destinations, depending on your organization's needs:

  • 📌 Microsoft 365 Defender portal Emails can be submitted directly to Microsoft for further analysis and contribution to spam/phishing intelligence (optional setup).

This flexible approach allows your organization to respond quickly to threats using your preferred tools and workflows.

What Happens When Users Report Simulated Emails and Training Enrollments?

This allows you to:

  • Track individual user performance,

  • Identify who successfully recognized phishing simulation campaign emails, and

  • Generate behavior-based metrics for awareness training.

This feature helps improve your organization’s overall security posture by providing real-time insight into user vigilance. Please see the following hint for the 'real-time insights into user vigilance' explanation.

What Happens When an Employee Reports an Email

When an employee uses the Page View Phishing Reporter Add-in to report a suspicious email, the reported email will be sent with a detailed report directly to your designated SOC or IT email address.

The email that is sent to the SOC/IT team inbox includes:

  • The attached original email as an .eml or .msg file

  • The attached full message header of the original reported email as a headers.txt file

  • The reporting reason selected by the employee (e.g., spam, phishing, unsure)

  • Any additional comments the employee entered in the message box

This structured report helps your security team quickly understand the context and take action, without needing to follow up with the reporting user.

Microsoft Page View Phishing Reporter User Experience

Here is an example view of the Microsoft Page View Phishing Reporter button on the New Outlook Desktop.

  • When using the Phishing Reporter button, clicking the report button opens a side panel instead of the pop-up window.

How to Install the Microsoft Page View Phishing Reporter

  1. Once customization is complete, stay on the Settings tab. Scroll down to the bottom and click Manage and Download. A pop-up will appear—select Connect Account to proceed.

  1. Once you log in, the Permissions requested pop-up window will display. Read the permissions, then click Accept.

Understanding Required Microsoft Graph API Permissions

The Microsoft Page View Phishing Reporter requires specific Microsoft Graph API permissions to function effectively within an organization’s Microsoft 365 environment. These permissions allow the application to interact with users’ emails, retrieve necessary details for reporting phishing attempts, and ensure smooth integration with the email infrastructure.

Below is a breakdown of the permissions required and their purpose:

1. Mail Permissions

  • Mail.Read: Allows the Phishing Reporter to read the user’s email to retrieve necessary email details such as headers, attachments, and content.

  • Mail.Read.Shared: Extends read access to shared mailboxes, ensuring that the application can retrieve phishing emails reported from shared accounts.

  • Mail.ReadWrite: Provides both read and write access to the user’s mailbox, enabling modifications or tagging of emails as needed.

  • Mail.ReadWrite.Shared: Extends read and write permissions to shared mailboxes for better handling of phishing reports.

  • Mail.Send: Enables the application to send emails, which may be necessary when forwarding reported phishing emails.

  • Mail.Send.Shared: Allows the application to send emails from shared mailboxes when the user has the appropriate permissions.

  • Mail.ReadBasic.All: Grants the application basic read-only access to all users’ mailboxes, allowing it to retrieve minimal message details (such as subject and sender address, attachment, body of the email) across the organization for lightweight analysis in Incident Responder or display the infomation of the reported email when it sent to SOC/IT email address.

  • Application.ReadWrite.All: Allows the application to read and write all applications in the directory. This is typically required when managing or registering applications programmatically to ensure integration with security tools like phishing reporters.

2. User Profile Permissions

  • openid: Grants access to the user's unique ID, helping in authentication and identity verification.

  • profile: Allows the Microsoft Page View Phishing Reporter to retrieve basic user profile information, ensuring accurate reporting and tracking.

  • User.Read.All: Provides the application with read access to the full set of user profiles in the directory, allowing it to collect necessary user metadata such as the userid for report association.

  1. Once you accept the permissions, the GRAPH Authorization Successful window will display.

  1. Click the Download button for the Page View button under the Microsoft 365 to download the Microsoft365PhishingReporterAddin.xml file.

  1. From the menu on the left side of the page, click Settings.

  2. From the Settings drop-down menu, select Integrated apps.

  1. Click Add-ins at the top-right corner of the page.

  1. On the add-ins page, click Deploy Add-In.

  1. In the pop-up window, click Next.

  1. Click the Upload custom apps button.

  1. Select the 'I have the manifest file (.xml) on this device' option. Then, click Choose File and select the Microsoft365PhishingReporterAddin.xml file that you downloaded in step 6.

  1. Click Upload to install the Microsoft Page View Phishing Reporter add-in.

  1. From the pop-up window, select which users will have access to the Microsoft Page View Phishing Reporter and which method you would like to use to deploy the Phishing Reporter.

We recommend that you allow all users to access the Phishing Reporter. We also recommend that you use the 'Fixed' deployment method.

  1. Click Next, and additional app permissions will display.

  2. Once you have read the permissions, click Save.

  1. Once the pop-up window displays a confirmation that the add-in has been successfully deployed, click Next. The Announce add-in pop-up window will open and display a message about announcement recommendations from Microsoft.

After you install and deploy the Phishing Reporter, you might receive an email from your mail service provider that contains information you can use to help you announce the Phishing Reporter add-in to your users. Keepnet does not send the email about the Phishing Reporter’s intended usage and benefits.

  1. Click Close to close the pop-up window.

Frequently Asked Questions (FAQs)

Q: Can I show a confirmation prompt before deleting a reported email?

A: Yes. To enable a confirmation prompt, go to the Phishing Reporter menu and select the Settings tab. Within the tab, scroll down to the Dialog Box Settings section. Locate the Delete Reported Emails option, and select With Confirmation from the dropdown menu.

Q: Does the Microsoft Page View Phishing Reporter work on Outlook Mobile for iPhone or Android?

Q: Can I customize the Microsoft Page View Phishing Reporter side panel message, such as setting a fixed width and height?

A: No, Microsoft does not allow customization of the size of the side panel. Its size is automatically adjusted.

Q: Can users choose their preferred language for the Phishing Reporter button pop-up messages?

Q: If we set the Phishing Reporter button to delete reported emails automatically, can the email be recovered?

A: Yes, if you use the 'Delete reported emails' option with 'Automatically', the reported email will be deleted automatically. The email will be sent to the Trash folder, where you can visit the folder and restore the deleted email.

📌 SOC or IT team's inbox The reported email can be forwarded to your designated inbox for internal analysis and response (optional setup). Please for more information.

📌 Keepnet Incident Responder (if licensed) If your organization uses , the reported email is also logged in the portal for case management, automated response, and automated analysis.

If you are running simulated phishing campaigns such as , , or sending training enrollments on the through Keepnet, the Phishing Reporter can automatically detect and log when a user reports a simulated phishing emails or training enrollment email.

If the "Turn off email forwarding for reported Phishing Simulation Emails" option is enabled by the admin while customizing the phishing reporter button, a pop-up message will appear thanking the user for their awareness each time they report simulation emails or training enrollment emails, reinforcing positive behavior. Please for more information about this option.

If you purchased the product, the email will also be sent for automated analysis, automated response, and case management.

Before deploying the button, we recommend customizing it. This can be done in the Add-In Settings tab under the menu on the Keepnet platform.

Log in to your account using your global admin credentials.

In a new tab of your browser, log in to your .

The expected timeframe for the Phishing Reporter to deploy is 12 hours, but timeframes can vary. For more information about deploying add-ins, see Microsoft's article.

A: Yes, it works. Please visit to view the supported Outlook environments.

A: Yes, you can add multiple languages from the . When an employee reports an email, the reporting side panel will appear, and they will be able to select their preferred language from the available language options before proceeding with the reporting.

💫
Microsoft Ribbon Phishing Reporter
Keepnet’s Incident Responder
Phishing Simulator
Callback Simulator
Quishing Simulator
Awareness Educator
Keepnet Incident Responder
Phishing Reporter
Microsoft 365
Microsoft 365 admin center
Deploy add-ins in the Microsoft 365 admin center
Phishing Reporter customization page
here
visit here
see here
Picture 1: View of Microsoft Page View Phishing Reporter button on New Outlook Desktop App
Picture 2: Reporting side panel of Microsoft Page View Phishing Reporter Button on New Outlook Desktop App
Picture 3: Download Button panel on Phishing Reporter page
Picture 4: Required Graph API Permissions for Microsoft Page View Phishing Reporter button
Picture 5: Graph Authorization Successfull message on Phishing Reporter page
Picture 6: Microsoft 365 Admin Center
Picture 6: Integrated Apps on Microsoft 365 Admin Center
Picture 7: Add-Ins button access on Integrated Apps page
Picture 8: Click deploy add-In button
Picture 9: Deploy a new add-in pop-up message.
Picture 10: Deploy a custom add-in page
Picture 11: Uploading XML file to deploy the Microsoft Page View Phishing Reporter add-in
Picture 12: Deployment Settings for Microsoft Page View Phishing Reporter add-in
Picture 13: The list of permissions that are used by the Microsoft Page View Phishing Reporter add-in
Picture 14: Successful deployment message of Microosft Page View Phishing Reporter add-in
Picture 15: Default announcement message provided by Microsoft to inform employees