Phishing Campaign Reports

This section describes the basic functionalities of phishing campaign reports, which you can find from the Phishing Simulator > Campaign Manager and click the Instances button to access the reports of the phishing campaign.

Once you go inside the Instances of a campaign, you will see reports for that campaign; click on the View Report button under the Actions column to access the phishing campaign report.

View Report Details

In a campaign report, there are many sub-menus that provide valuable statistics about your phishing campaign. Here are the following menus on a campaign report:

Summary

The Summary provides a brief synopsis of the phishing scenario and options for further action.

Summary Widgets

This section provides the opportunity to display the results of the campaign in a useful pie chart presentation.

Campaign Info

Scenario Info

Email Delivery

Phishing Scenarios

This section displays general information about the content of the phishing scenario. If you selected multiple scenarios, you can switch between them to preview.

Email that will be sent to users

This section displays details of the sender’s name, the difficulty level, and the phishing scenario type sent to the target users.

You can preview the email template design of the phishing scenario sent to the target users by clicking on the Preview button.

The URL, difficulty level, and scenario type of the landing page content of the phishing scenario sent to the target users are displayed here.

You can preview the landing page design of the phishing scenario sent to the target users by clicking on the Preview button.

Opened

This section displays the information of the target users who opened the phishing scenario email.

Clicked

This section provides details of the target users who clicked on the phishing link.

Submitted Data

This section displays details of a target user who submitted data on the landing page of the phishing scenario.

Opened Attachment

This section displays the details of a target user who opened the attachment file.

No Response

This section displays the details of target users who did not take any action in response to the phishing email.

Phishing Reporter

This section provides details of target users who reported phishing emails using the phishing reporter add-in.

Additional information on the Phishing Reporter is available here.

Sending Report

This section provides a summary report of the delivery of the phishing email to the target users.

Tutorial Video

This tutorial describes the basic functionalities of phishing campaign reports which you can find in the Campaign Reports menu.

FAQ

Q: Can I download a phishing scenario report?

A: Yes. You can download a report that provides details of the campaign by clicking on the Download Report button.

Q: Can I change the content of the report of the phishing scenario?

A: No. The information in the report cannot be changed.

Q: Can I resend the scenario to users who did not open the email?

A: Yes. The resend function allows you to send the phishing scenario to any user you select.

Q: Can I check on the status of the campaign?

A: Yes. The Sending Report option provides you with a view of the current activity of the phishing scenario.

Q: Can I import reports into my own reporting tool (e.g., Qlik Sense, Tableau, PowerBI)?

A: Yes. You can transfer all of our reports through an API, enabling you to use the information as needed to suit your business. Additional information on APIs is available here.

A: The differences are explained below.

  • "Only Opened Emails" will show the users who only opened the email and didn't go further, such as clicking the link.

  • "Only Clicked Links" will show the users who opened the email and then clicked the link and didn't go further, such as data submission.

  • "Opened Emails" will show the users who opened emails. It doesn't matter if user clicked the link or submitted any data.

  • "Clicked Links" will show the users who opened and then clicked the link. It doesn't matter if the user submitted any data.

Q: How do you determine if a "user agent" belongs to a sandbox or a real email user?

A: Please see below how the Sandbox Activity Detection feature works to identify false positive clicks.

  1. Rule 1: User Agent Signatures: We have a list of 10+ sandbox user agent patterns. If a user action matches these, it's flagged as sandbox activity.

  2. Rule 2: Honeypot Link: We embed invisible "Honeypot" links in our emails. While humans can't see or click them, sandboxes often access them, revealing their presence.

  3. Rule 3: Request Header Analysis: By examining request headers, we can identify unique characteristics that differentiate sandbox activities from real user actions.

Last updated

Copyright © Keepnet Labs LTD. All rights reserved.