LogoLogo
Get Demo
  • 💫NEXT-GENERATION PRODUCT
    • Introduction
    • Getting Started
      • 1. Invite System Users
      • 2. Add Target Users
        • Add Users via CSV
        • Add users via SCIM
          • SCIM Setup in Azure AD
          • SCIM Setup in Okta
          • SCIM Setup in Onelogin
          • SCIM Setup in Jumpcloud
        • Add users via LDAP
        • Add Users via API
      • 3. Email Deliverability
        • Microsoft 365
          • M365: Direct Email Creation
          • M365: Whitelisting
        • Google Workspace
          • Google: Direct Email Creation
          • Google: Whitelisting
        • Exchange 2013 and 2016
      • 4. Track Opened Emails
      • 5. Allow Phishing URLs
        • Whitelist for Office 365
        • Whitelist for Google Workspace
        • Whitelist for Exchange 2013/2016
        • Whitelist in Security Solutions
      • 6. Setup Phishing Reporter
        • Step 1. Download Phishing Reporter
        • Step 2. Deploy Phishing Reporter
          • How to Deploy Add-In in Microsoft 365
          • How to Deploy Add-In in Exchange Admin Center
          • How to Deploy Add-In in Google Workspace
          • How to Deploy Add-In in Outlook
            • Troubleshooting Phishing Reporter Add-In on Outlook Desktop
      • 7. Incident Responder Setup
        • Step 1. Integrate Threat Intel Partners
        • Step 2. Mail Configurations
          • Microsoft 365
          • Google Workspace (Gsuite)
          • Exchange (EWS)
    • Platform
      • Dashboard
        • Dashboard Widgets
        • Incident Responder Widgets
        • Threat Sharing Widgets
        • Phishing Simulator Widgets
      • Threat Intelligence
      • Email Threat Simulator
        • Start Scan
        • View Scan Report
        • Create Trusted Account on Exchange
        • Start Scan on O365 Email Account
        • Start Scan on Google Workspace Email Account
      • Threat Sharing
        • Communities
        • Incidents
      • Phishing Simulator
        • Manage Phishing Scenarios
          • Phishing Scenarios
          • Email Templates
          • Landing Pages
        • Phishing Campaign Manager
        • Phishing Campaign Reports
        • Settings
          • DNS Services and Domains
          • Exclude IP Address
      • Callback Simulator
        • Manage Callback Scenarios
          • Callback Scenarios
          • Callback Email Templates
          • Callback Templates
        • Callback Campaign Manager
        • Callback Campaign Reports
        • Settings
          • Callback Phone Numbers
      • Vishing Simulator
        • Vishing Templates
        • Vishing Campaign Manager
        • Vishing Campaign Reports
      • Smishing Simulator
        • Manage Smishing Scenarios
          • Smishing Scenarios
          • Text Message Templates
          • Landing Page Templates
        • Smishing Campaign Manager
        • Smishing Campaign Reports
        • Settings
          • Manage DNS and Domains
          • Exclude IP Addresses
      • Quishing Simulator
        • Manage Quishing Scenarios
          • Quishing Scenarios
          • Quishing Templates
          • Quishing Landing Page Templates
        • Quishing Campaign Manager
        • Quishing Campaign Reports
        • Settings
          • DNS and Domains
          • Excluding IP Address
      • Awareness Educator
        • Training Library
        • Enrollments
        • Certificates
        • Training Reports
        • Training Completion Queries
      • Incident Responder
        • Incident Responder Dashboard
        • Investigations
        • Integrations
        • Playbook
        • Mail Configurations
          • Microsoft 365
          • Exchange
          • Google Workspace
        • Cross Company Integration
      • Phishing Reporter
        • Phishing Reporter Customization
        • Phishing Reporter Deployment
          • How to Deploy the Add-in in Microsoft 365
          • Phishing Reporter Page View Failure Due to Deprecated Exchange Online Tokens
          • Microsoft Ribbon Phishing Reporter
          • How to Deploy the Add-in in Exchange Admin Center
          • How to Deploy the Add-in in Google Workspace
          • Phishing Reporter Announcement Email Template
        • Diagnostic Tool
        • Integrating Microsoft Phishing Reporting Button with Keepnet
        • Troubleshooting Phishing Reporter on Outlook Desktop
      • Reports
        • Advanced Reports
        • Executive Reports
        • Scheduled Reports
        • Gamification Report
      • Company
        • Target Users
        • Companies
          • Company Groups
        • Company Settings
          • Privacy
            • Account Privacy
            • Data Privacy
          • AI Ally Settings
          • SMTP Settings
          • Direct Email Creation
            • Direct Email Creation for Google Workspace
            • Direct Email Creation for Microsoft 365
          • Notification Templates
          • Google User Provisioning
          • REST API
          • White Labeling
          • Proxy Settings
          • SAML Settings
            • How to Configure SAML on ADFS
            • How to Configure SAML on Google Workspace
            • How to Configure SAML on Azure AD
            • How to Configure SAML on CyberArk
            • How to Configure SAML on Okta
          • SCIM Settings
            • Getting Started with SCIM
            • Azure AD SCIM Integration
            • Okta SCIM Integration
            • Onelogin SCIM Integration
            • Jumpcloud SCIM Integration
          • SIEM Integrations
            • Splunk Integration
            • Syslog Integration
          • LDAP
          • Allowed Domains
        • System Users
          • People
          • Roles
        • Audit Log
        • Job Log
      • Free Phishing Email Analysis Service
    • Miscellaneous
      • Whitelisting
        • How to Whitelist an IP Address in Office 365
        • How to Whitelist an IP Address in Exchange 2013 and 2016
        • How to Whitelist an IP Address in Google Workspace
        • How to Whitelist in Mimecast
        • Whitelisting in Other Security Solutions
        • Whitelisting the Pictures on Microsoft Outlook Apps
        • Keepnet Tools Whitelisting Guidelines
        • Understanding Email Delivery Errors
        • Tracking Email Opens in Phishing Simulations
      • User Profile
      • Multi-Factor Authentication (MFA) Settings
      • On-Premise Requirement Checker
      • Platform Requirements
        • Portal UI Requirements
        • Phishing Reporter Requirements
        • Diagnostic Tool Requirements
      • Maintenance Tool
      • Understanding the Preferred Language Setting
  • 📚RESOURCES
    • Platform Security
    • Volume & Performance
    • Customer Help Desk
    • Product Update/Maintenance
    • Research Methodology
    • Release Notes
      • 2025
      • 2024
      • 2023
      • 2022
      • 2021
      • 2020
  • ⚖️Legal Hub
    • For Customers
      • Customer Terms of Service
      • Product Specific Terms
      • Jurisdiction Specific Terms
      • Data Processing Agreement
      • Regional Data Hosting Policy
      • Product and Services Catalog
      • Acceptable Use Policy
      • Keepnet Security Program
      • Microsoft CoPilot Usage Policy
    • For Everyone
      • Website
        • Terms of Use
        • Privacy Policy
        • Cookie Policy
      • Free Phishing Email Analysis
        • Terms of Service
        • Privacy Policy
      • Transparency Report
Powered by GitBook

Copyright © Keepnet Labs LTD. All rights reserved.

On this page
  • How to Access Gamification Report
  • How to Understand Gamification Report
  • Understanding Points and Performance Calculations
  • Simulations Scoring
  • Security Awareness Training Scoring
  • Reporting Phishing Emails Scoring
  • Performance Percentage Calculation
  • Tutorial Video
  • FAQ
  • Q: I don't see total target users in my gamification report; why is that?

Was this helpful?

Export as PDF
  1. NEXT-GENERATION PRODUCT
  2. Platform
  3. Reports

Gamification Report

The Gamification Report motivates users to actively engage in phishing simulations (Phishing, Callback, Vishing, Smishing, Quishing) and security awareness training by using a points system. Users earn points for positive actions and lose points for risky behaviors, helping to improve security awareness.

The feature includes a leaderboard to display top performers, with Gold, Silver, and Bronze badges for the top three. It also provides a live ranking view and an all-time top 10 list, making it easy for administrators to monitor progress and recognize achievements, fostering a more security-conscious workplace.

How to Access Gamification Report

  • Log in to the platform.

  • Go to Reports > Gamification Report page from the left-hand menu to access the report.

How to Understand Gamification Report

The Gamification Report comprises several key components:

  • Leaderboard: Displays user rankings based on points accumulated through actions in simulations and training.

    • Top Performers: Highlights the top three users for a chosen timeframe, awarding Gold, Silver, and Bronze badges accordingly. These are your top three most security-aware users.

    • Ongoing Period Ranking: Provides a live ranking table of users in the selected date range period, detailing rank, name, email, department, performance, total points.

  • Details: Click the "Details" button to view a user's statistics. Use filters like Activity Type, Product, or Difficulty Level to find specific information.

  • Date Range: Select a specific timeframe for viewing user performance data for that period.

  • Filtering and Sorting: The leaderboard table supports search, filtering, and sorting functionalities, allowing administrators to view specific groups or individuals.

  • Export Options: Download the leaderboard data in CSV, Excel, or PDF formats for further analysis.

Understanding Points and Performance Calculations

The Gamification Report awards points for positive actions and deducts points for risky actions. This scoring system applies across different simulation types (Phishing, Callback, Vishing, Smishing, Quishing) and Security Awareness Training.

Simulations Scoring

Each simulation type has specific actions with associated points based on the difficulty level (Easy, Medium, Hard):

  1. Phishing Simulation

    • No Response: 0 points.

    • Opened Email: 0 points.

    • Clicked Link:

      • Easy: -200 points

      • Medium: -100 points

      • Hard: -50 points

    • Submitted Data:

      • Easy: -400 points

      • Medium: -200 points

      • Hard: -100 points

    • Opened Attachment:

      • Easy: -300 points

      • Medium: -150 points

      • Hard: -75 points

    • Submitted MFA Code:

      • Easy: -400 points

      • Medium: -200 points

      • Hard: -100 points

  2. Callback Simulation

    • No Response: 0 points.

    • Opened Email: 0 points.

    • Called Back:

      • Easy: -200 points

      • Medium: -100 points

      • Hard: -50 points

    • Entered Digits (in response to the call):

      • Easy: -300 points

      • Medium: -150 points

      • Hard: -75 points

  3. Vishing Simulation

    • No Response: 0 points.

    • Answered Call:

      • Easy: -100 points

      • Medium: -50 points

      • Hard: -25 points

    • Vished (followed scam instructions):

      • Easy: -300 points

      • Medium: -150 points

      • Hard: -75 points

  4. Smishing Simulation

    • No Response: 0 points.

    • Clicked Link:

      • Easy: -200 points

      • Medium: -100 points

      • Hard: -50 points

    • Submitted Data:

      • Easy: -300 points

      • Medium: -150 points

      • Hard: -75 points

    • Submitted MFA Code:

      • Easy: -400 points

      • Medium: -200 points

      • Hard: -100 points

  5. Quishing (QR Code Phishing)

    • No Response: 0 points.

    • Scanned QR Link:

      • Easy: -200 points

      • Medium: -100 points

      • Hard: -50 points

    • Submitted Data:

      • Easy: -300 points

      • Medium: -150 points

      • Hard: -75 points

    • Submitted MFA Code:

      • Easy: -400 points

      • Medium: -200 points

      • Hard: -100 points


Security Awareness Training Scoring

  1. No Response: 0 points.

  2. Opened Email (but did not click): -100 points.

  3. Clicked Training Link: +50 points.

  4. Completed Training: +100 points.

  5. Passed Exam: +200 points.

  6. Failed Exam: -150 points.

  7. Joined Training within 24 Hours: +100 extra points.

  8. Joined 1-3 Days After Invitation: 0 points.

  9. Joined After 3 Days: -50 points.

Reporting Phishing Emails Scoring

If users report suspicious emails promptly, they receive additional points based on the time taken to report:

Time Taken
Easy Points
Medium Points
Hard Points

Within 5 Minutes

+100

+200

+400

5-10 Minutes

+75

+150

+300

After 10 Minutes

+50

+100

+200

Performance Percentage Calculation

The Performance Percentage helps to measure a user’s performance based on the points they have earned compared to the maximum points they could have achieved.

The formula is:

Performance Percentage = (Total Points Earned / Total Possible Points) * 100

  • Total Points Earned: The total points the user has scored from their actions in simulations and training.

  • Total Possible Points: The highest possible points the user could have earned from all the simulations they participated in.

Special Rules:

  • If the user’s Total Points are negative, their Performance Percentage is set to 0%.

  • If the user’s Total Points are positive, the percentage is calculated using the formula above.

Interpreting the Performance Percentage:

  • 80% or higher: This is considered good performance.

  • Below 50%: This suggests the user may need more training.

Tutorial Video

This tutorial provides a detailed description of the Gamification Report product. You can understand the basic functions of the Gamification Report page and use the Gamification Report by following this tutorial.

FAQ

Q: I don't see total target users in my gamification report; why is that?

A: The "No Response" users are not shown on the gamification report. The users who had interaction with the simulation and training are shown on the report as explained in the document.

PreviousScheduled ReportsNextCompany

Last updated 3 months ago

Was this helpful?

For more information, please contact .

💫
support