# Phishing Scenarios

The [**Phishing Simulator**](https://keepnetlabs.com/products/phishing-simulator) **> Phishing Scenarios > Scenarios** page provides a selection of ready-to-use phishing campaigns. These standard system scenarios are available to all clients and can be launched with just a few clicks. You also have the option to customize a scenario to your needs or to create a unique phishing campaign.

The components of the **Scenarios** page are explained below.

<table><thead><tr><th width="150"></th><th width="590.1428571428571"></th></tr></thead><tbody><tr><td>Scenario name</td><td>The name of the phishing template</td></tr><tr><td>Category</td><td>Category is used to classify phishing scenarios by threat type.</td></tr><tr><td>Method</td><td><p>The phishing technique.</p><ul><li><strong>Data Submit:</strong> Used to detect target users who submit data on the landing page</li><li><strong>Attachment:</strong> Used to detect target users who download the attachment in the phishing simulation email</li><li><strong>Click-Only:</strong> Used to detect target users who click unknown links in the phishing email.</li><li><strong>MFA:</strong> Used to detect target users who enter their MFA codes on the landing page</li></ul></td></tr><tr><td>Languages</td><td>Filter scenarios based on your preferred languages.</td></tr><tr><td>Roles</td><td>Filter scenarios based on the roles.</td></tr><tr><td>Tags</td><td>Tags can be added to the phishing scenario to enable viewing using related tag lists.</td></tr><tr><td>Difficulty</td><td>The level of difficulty to recognize a phishing attempt <strong>(Easy, Medium, Hard).</strong> Please <a href="/pages/ucto9lOcZl07Ay1czet4#q-how-is-the-difficulty-level-determined">click here</a> to see how the difficulty level is determined.</td></tr><tr><td>Created By</td><td><p><strong>System:</strong> Standard phishing scenario templates provided with the product.</p><p><strong>Custom:</strong> Phishing scenarios created or customized by system users.</p></td></tr><tr><td>Date Created</td><td>The date and time the phishing scenario was created.</td></tr></tbody></table>

{% hint style="info" %}
Keepnet uses a tiny, 1x1 pixel image from a remote URL to track when files are opened in Microsoft Office applications like Excel, Word.\
\
This method does not work with Macbook Numbers, which does not support URL-based images in cells, preventing file tracking.\
\
For broader compatibility in phishing attacks across Microsoft, Mac, and Android devices, use HTML file attachments, which support complex elements across diverse devices and software environments.
{% endhint %}

## Phishing Scenario Actions

This section explains how to initiate a phishing campaign.

### How to Launch a Phishing Campaign

Once you have selected a phishing template for your campaign and identified the targets, click on the **Launch '➤'** button in the **Actions** menu on the far right of the page.

You will be presented with options to specify or modify various elements of the campaign.

#### Campaign Settings

<table><thead><tr><th width="150"></th><th width="576.3496376811595"></th></tr></thead><tbody><tr><td>Campaign Name</td><td>The name used to identify the phishing campaign and the name that will be used on the report generated at the conclusion of the campaign</td></tr><tr><td>Target Groups</td><td>The group(s) selected to receive the phishing campaign message</td></tr><tr><td>Mark as Test</td><td>The phishing report can be removed from other reporting areas of the platform</td></tr><tr><td>Limit Recipients</td><td>The phishing campaign can be designed to be sent to random users in the target group according to a percentage or user count.</td></tr></tbody></table>

#### Campaign Summary

Once you designed the proposed campaign and clicked the **Next** button, you will be provided with a summary. The components are explained below.

<table><thead><tr><th width="166.19942884934343"></th><th width="576.3496376811595"></th></tr></thead><tbody><tr><td>Scenario Info</td><td>Basic information about the phishing campaign</td></tr><tr><td>Settings</td><td>Settings information of the phishing campaign</td></tr><tr><td>Other</td><td>Any other additional information about the campaign</td></tr><tr><td>Target Users</td><td>The users to whom the phishing campaign will be sent</td></tr><tr><td>Email that will be sent to users</td><td>Preview of the phishing email that will be sent</td></tr><tr><td>Landing page for users who click the phishing link</td><td>Preview of the landing page when a user clicks the phishing link used in this campaign</td></tr></tbody></table>

### How to Edit a Phishing Campaign

Click on the three dots '⋮' button in the **Actions** option on the far right of the relevant page, and then click the **Edit** button.

### How to Preview a Phishing Campaign

Click on the three dots '⋮' button in the **Actions** option on the far right of the relevant page, and then click the **Preview** button to view what will be sent to the targeted users.

### How to Duplicate a Phishing Campaign

Click on the three dots '⋮' button in the **Actions** option on the far right of the relevant page, and then click the **Duplicate** button to recreate a previous campaign.

### How to Delete a Phishing Campaign

Click on the three dots '⋮' button in the **Actions** option on the far right of the relevant page, and then click the **Delete** button to delete a phishing campaign.

### How to View Scenario Statistics

This option gives you an overview of phishing templates on the platform, grouped by region (e.g., EMEA, NAM), brand (e.g., Microsoft, Google), industry (e.g., finance, IT), attack type (e.g., click-only), language, and emotional triggers (e.g., urgency, excitement). It helps you explore and select the most relevant templates for your campaigns.

To access it, go to **Phishing** **Simulator > Scenarios** and click the "**Scenario** **Statistics**" button at the top-right of the scenarios page.

### How to View Scam of the Week Scenarios

The **Scam of the Week** category highlights phishing scenarios that are based on the most recent and trending cybersecurity threats. These scenarios are updated weekly and curated by security experts to help you quickly launch timely and realistic phishing simulations.

To view scam of the week scenarios, go to **Phishing Simulator > Phishing Scenarios**, select **Scam of the Week** from the **Category** filter.

## How to Add a New Phishing Scenario

Phishing scenarios have two components: the phishing email template and the landing page. Follow the steps below to add a new phishing scenario:

1. Click the **+NEW** button in the upper right corner of the **Phishing Simulator > Phishing Scenarios** page.
2. Complete the required fields on the first page, then click **Next**.
   1. **Scenario Name:** Enter a name for your scenario.
   2. **Description:** Describe the template briefly for your reference.
   3. **Category:** Select the threat type that classifies your phishing scenario.
   4. **Method:** Choose the appropriate phishing strategy for your scenario.
      1. **Click-Only:** Redirect users to a specific landing page, and see who clicks the phishing link within the report.
      2. **Data Submission:** Redirect users to a page where they must enter requested credentials and see who submits this information in the report.
      3. **Attachment:** Redirect users to download a file attached within the simulated email, and see who opens the file within the report.
      4. **MFA:** Redirect users to a Multi-Factor Authentication (MFA) page where they must input a received MFA code to continue, and see who submits MFA codes in the report.
   5. **Roles:** Add roles to the scenario that fit specific roles.
   6. **Tags:** Define tags for the scenario.
   7. **Make Available For:** Make your scenario available to be used by the other customers under your organization. This feature is only available to admins who have Reseller permissions.
   8. Click **Next** to go to the **Email** **Template** page.
   9. On the **Email Template** page\*\*,\*\* select the e-mail template you want to use and then click the **Next** button.
   10. Select the **Landing Page** template you want to use and then click the **Next** button to move on to the **Summary** page.
       1. If the **MFA** **method** is selected, you'll find a sub-menu titled **"MFA Settings"** on the **Landing** **Page**. Here, you can customize the "**Sender** **Phone** **Number"** and the text for the "**SMS** **Verification** **Message".**
       2. If the **Attachment** **method** is selected, the Landing Page selection is not supported for this method. The attachment scenarios only support Word, PowerPoint, Excel or HTML files.
   11. The **Summary** page provides you with an overview of the proposed phishing campaign, including the type of campaign, the targeted users, and other important details.

Now you can click the **Save** button to create your scenario. Now, you are ready to launch your scenario either using [Fast Launch](#how-to-launch-a-phishing-campaign) or [Campaign Manager](/next-generation-product/platform/phishing-simulator/phishing-campaign-manager.md#create-a-campaign).

## How to Create a Scenario with Just-in-time Learning Page

The **Just-in-time Learning Page** is an intelligent feature that automatically highlights warning signs (red flags) in simulated phishing emails. It provides employees with instant, contextual training at the exact moment of risk.

When a user reaches the Just-in-Time (JIT) learning page (red flags in the simulated email), the platform shows **how many points they will earn** before they start reviewing the red flags. After they complete the training, it confirms **how many points they earned**. This makes rewards clear and the experience more motivating.

To set this up, you first need to create both the **Just-in-time Learning Page** and the **Red Flag Email Template**. Once completed, you can combine them to build a phishing scenario and launch it to your employees.

[Here's a quick video tutorial!](https://www.loom.com/share/e899debb32cb491b8e97c064fabb7a7a?sid=6b725e25-86e8-4269-b783-e8d2ef0d26d8)

If you are ready, please follow the steps to create a scenario.

{% hint style="warning" %}
Before you proceed with this section, please make sure you have created the [just-in-time learning page](/next-generation-product/platform/phishing-simulator/manage-phishing-scenarios/landing-pages.md#how-to-add-a-new-just-in-time-learning-page) and [red flag email template](/next-generation-product/platform/phishing-simulator/manage-phishing-scenarios/email-templates.md#how-to-add-a-new-email-template-with-red-flags).
{% endhint %}

1. Click the **+NEW** button in the upper right corner of the **Phishing Simulator > Phishing Scenarios** page.
2. Complete the required fields on the first page, then click **Next**.
   1. **Scenario Name:** Enter a name for your scenario.
   2. **Description:** Describe the template briefly for your reference.
   3. **Category:** Select the threat type that classifies your phishing scenario.
   4. **Method:** Choose the appropriate phishing strategy for your scenario. Please make sure the method is the same as your email template and landing page category.
      1. **Click-Only:** Redirect users to a specific landing page, and see who clicks the phishing link within the report.
      2. **Data Submission:** Redirect users to a page where they must enter requested credentials and see who submits this information in the report.
      3. **Attachment:** Redirect users to download a file attached within the simulated email, and see who opens the file within the report.
      4. **MFA:** Redirect users to a Multi-Factor Authentication (MFA) page where they must input a received MFA code to continue, and see who submits MFA codes in the report.
   5. **Roles:** Add roles to the scenario that fit specific roles.
   6. **Tags:** Define tags for the scenario.
   7. **Make Available For:** Make your scenario available to be used by the other customers under your organization. This feature is only available to admins who have Reseller permissions.
   8. Click **Next** to go to the **Email** **Template** page.
   9. On the **Email Template** page\*\*,\*\* select the **red flags email template** you created and then click the **Next** button.
   10. On the **Landing Page** page, select the **just-in-time learning page** and then click the **Next** button to move on to the **Summary** page.
       1. If the **MFA** **method** is selected, you'll find a sub-menu titled **"MFA Settings"** on the **Landing** **Page**. Here, you can customize the "**Sender** **Phone** **Number"** and the text for the "**SMS** **Verification** **Message".**
   11. The **Summary** page provides you with an overview of the proposed phishing campaign, including the type of campaign, the targeted users, and other important details.

Now you can click the **Save** button to create your scenario. Now, you are ready to launch your just-in-time learning page scenario either using [Fast Launch](#how-to-launch-a-phishing-campaign) or [Campaign Manager](/next-generation-product/platform/phishing-simulator/phishing-campaign-manager.md#create-a-campaign).

## Video Tutorial

This tutorial will cover the **Scenarios** that are created by combining the **Email** **Template** and/or **Landing** **Page** and making the campaign ready to send to the target users.

{% embed url="<https://youtu.be/y1BPobrQXIU>" %}

## FAQs

### Q: Can I add a landing page to Attachment scenarios?

A: No. Landing pages are not supported for Attachment scenarios. These scenarios only support Word, Excel, PowerPoint, and HTML attachments. User activity is tracked when the attachment is opened or executed on the device, which is an action users should normally avoid.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://doc.keepnetlabs.com/next-generation-product/platform/phishing-simulator/manage-phishing-scenarios/phishing-scenarios.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
