Phishing Campaign Reports
This section describes the basic functionalities of phishing campaign reports where you can find from the Reports > Campaign Reports menu.
The components of the Campaign Reports page are explained below.
Campaign Name | Name of the phishing campaign |
Last Launch | Date and time the phishing scenario was last sent to a target user group |
Target Users | Number of target users to whom the phishing scenario was sent |
Status | Current status of the phishing campaign (idle, running, completed, paused, error, canceled) |
Method | List the campaigns based on the methods below.
|
Email Delivery | List the campaigns by filtering the specific the SMTP settings. |
Created By | Name of the company that created the phishing campaign |
Date Created | Date and time that the phishing scenario was first created |
User Stats | Pie chart summary of the phishing scenario (no response, clicked, opened, submitted data) |
Progress | Percentage of completion of the distribution of an active phishing scenario. The progress field is updated to Completed status when 100% of the phishing scenario emails have been sent to the targeted users. |
Action | Options available include View Report, which provides a summary of a selected phishing scenario, and the Delete button, which will delete the report. |
View Report Details
You can review the details of a phishing scenario report by selecting the desired campaign and clicking on the Action > View Report button.
Summary
The Summary provides a brief synopsis of the phishing scenario and options for further action.
Download Report | An .xls format version of the phishing scenario report is available for download by clicking the Download Report button. |
Resend Campaign | Resend the phishing scenario to the same target user group with the same settings by clicking the Resend Campaign button. |
Summary Widgets
This section provides the opportunity to display the results of the campaign in a useful pie chart presentation.
Opened Email | The number and percentage of target users who opened the phishing email |
Clicked Email | The number and percentage of target users who clicked on the URL in the phishing email. |
Submitted Data | The number and percentage of target users who submitted data on the landing page of the phishing scenario. |
Opened Attachment | The number and percentage of target users who opened the attachment file. |
Phishing Reporters | The number and percentage of target users who reported the simulated phishing email by using the platform's suspicious email reporter add-in. |
No Response | The number and percentage of target users who did not take any action in response to the phishing e-mail. |
Campaign Info
Target Users | The total number of users selected to receive the phishing campaign email. |
Campaign Lifetime | The date and time the phishing campaign will be terminated. No additional data will be processed in the phishing report after the expired date. |
Languages | Language used in the phishing scenario. |
Email Delivery
Delivery Start - End | The date and time the campaign was started and was/will be ended to complete sending the email to all selected users. |
Duration | It shows how long it took to send the campaign email to all selected users. |
Delivery Status | Out of the total number of chosen users, it displays how many of them successfully received the campaign email and how many did not. Please go to Sending Report menu to see more information. |
Phishing Scenarios
This section displays general information about the content of the phishing scenario. If you selected multiple scenarios, you can switch between them to preview.
Name | Name of the phishing scenario. |
Method | Phishing scenarios can be created in one of several forms.
|
Difficulty | Difficulty level of the phishing scenario (easy, medium, hard) |
Language | Language used in the phishing scenario. |
Email that will be sent to users
This section displays details of the sender’s name, the difficulty level, and the phishing scenario type sent to the target users.
You can preview the email template design of the phishing scenario sent to the target users by clicking on the Preview button.
Landing Page for Users Who Clicked on the Phishing Link
The URL, difficulty level, and scenario type of the landing page content of the phishing scenario sent to the target users are displayed here.
You can preview the landing page design of the phishing scenario sent to the target users by clicking on the Preview button.
Opened
This section displays the information of the target users who opened the phishing scenario email.
First Name | First name of the target user |
Last Name | Last name of the target user |
Email Address | Email address of the target user |
Department | Department of the target user |
Scenario Name | Name of the phishing scenario that is sent to user |
Last Opened | Date and time a target user last opened the phishing email |
Times Opened | Number of times a target user opened the phishing email |
Hide Sandbox Activity | If a sandbox solution has analyzed the simulated phishing email that is generated for the target user, you can choose to show or hide this false positive information in the menu. |
Activity Type | List the human or sandbox activities by using one of the following options.
|
Action | The Resend button allows you to resend the same phishing email. The Details option shows the date and time a user opened the phishing email, the user agent, browser information, geolocation, IP information, and other information. |
Clicked
This section provides details of the target users who clicked on the phishing link.
First Name | First name of the target user |
Last Name | Last name of the target user |
Email Address | Email address of the target user |
Department | Department of the target user |
Scenario Name | Name of the phishing scenario that is sent to user |
Last Clicked | Date and time the user last clicked on the URL in the phishing email |
Times Clicked | Number of times the user clicked on the phishing link |
Hide Sandbox Activity | If a sandbox solution has analyzed the simulated phishing email that is generated for the target user, you can choose to show or hide this false positive information in the menu. |
Activity Type | List the human or sandbox activities by using one of the following options.
|
Action | The Resend button allows you to resend the same phishing email. The Details option shows the date and time a user opened the phishing email, the user agent, browser information, geolocation, IP information, and other information. |
Submitted Data
This section displays details of a target user who submitted data on the landing page of the phishing scenario.
First Name | First name of the target user |
Last Name | Last name of the target user |
Email Address | Email address of the target user |
Department | Department of the target user |
Password Complexity | Complexity level of the password submitted on the landing page of the phishing email. (very weak, weak, medium, strong, very strong) TIP: The platform only captures the length and the first character of a password. |
Scenario Name | Name of the phishing scenario that is sent to user |
Last Submission | Date and time that the user last submitted data on the landing page of the phishing scenario |
Times Submitted | Number of times that the target user submitted data on the landing page of the phishing scenario |
Action | The Resend button allows you to resend the same phishing email. The Details option shows the date and time a user opened the phishing email, the user agent, browser information, geolocation, IP information, and other information. |
Opened Attachment
This section displays the details of a target user who opened the attachment file.
First Name | First name of the target user |
Last Name | Last name of the target user |
Email Address | Email address of the target user |
Department | Department of the target user |
Scenario Name | Name of the phishing scenario that is sent to user |
Last Opened | Date and time that the user last opened the attachment file |
Times Opened | Number of times that the target user opened the attached file |
Action | The Resend button allows you to resend the same phishing email. The Details option shows the date and time a user opened the phishing email, the user agent, browser information, geolocation, IP information, and other information. |
No Response
This section displays the details of target users who did not take any action in response to the phishing email.
First Name | First name of the target user |
Last Name | Last name of the target user |
Email Address | Email address of the target user |
Department | Department of the target user |
Scenario Name | Name of the phishing scenario that is sent to user |
Last Send Date | Date and time that the phishing email was sent to the target user |
Action | The Resend button allows you to resend the same phishing email. |
Phishing Reporter
This section provides details of target users who reported phishing emails using the phishing reporter add-in.
Additional information on the Phishing Reporter is available here.
First Name | First name of the target user |
Last Name | Last name of the target user |
Email Address | Email address of the target user |
Department | Department of the target user |
Scenario Name | Name of the phishing scenario that the user reported. |
Last Reported | Date and time when a user reported the phishing email using the phishing reporter add-in. |
Times Reported | Number of times that a user reported the phishing email using the phishing reporter add-in. |
Action | The Resend button allows you to resend the same phishing email. The Details option shows the date and time a user opened the phishing email, the user agent, browser information, geolocation, IP information, and other information. |
Sending Report
This section provides a summary report of the delivery of the phishing email to the target users.
First Name | First name of the target user |
Last Name | Last name of the target user |
Email Address | Email address of the target user |
Department | Department of the target user |
Scenario Name | Name of the phishing scenario that is sent to user |
Email Delivery | Which SMTP is used to deliver the simulation emails to the users. |
Date Sent | The last date and time that the email has been sent to target user. |
Delivery Status | Status of the phishing email sent to the target user
|
Action | The Resend button allows you to resend the same phishing email. The Details button allows you to see the email delivery details. |
Tutorial Video
This tutorial describes the basic functionalities of phishing campaign reports which you can find in the Campaign Reports menu.
FAQ
Q: Can I download a phishing scenario report?
A: Yes. You can download a report that provides details of the campaign by clicking on the Download Report button.
Q: Can I change the content of the report of the phishing scenario?
A: No. The information in the report cannot be changed.
Q: Can I resend the scenario to users who did not open the email?
A: Yes. The resend function allows you to send the phishing scenario to any user you select.
Q: Can I check on the status of the campaign?
A: Yes. The Sending Report option provides you with a view of the current activity of the phishing scenario.
Q: Can I import reports into my own reporting tool (e.g., Qlik Sense, Tableau, PowerBI)?
A: Yes. You can transfer all of our reports through an API, enabling you to use the information as needed to suit your business. Additional information on APIs is available here.
Q: What are the differences between the Only Opened Emails, Only Clicked Links vs Opened Emails and Clicked Links tabs in the downloaded excel report?
A: The differences are explained below.
"Only Opened Emails" will show the users who only opened the email and didn't go further, such as clicking the link.
"Only Clicked Links" will show the users who opened the email and then clicked the link and didn't go further, such as data submission.
"Opened Emails" will show the users who opened emails. It doesn't matter if user clicked the link or submitted any data.
"Clicked Links" will show the users who opened and then clicked the link. It doesn't matter if the user submitted any data.
Q: How do you determine if a "user agent" belongs to a sandbox or a real email user?
A: Please see below how the Sandbox Activity Detection feature works to identify false positive clicks.
Rule 1: User Agent Signatures: We have a list of 10+ sandbox user agent patterns. If a user action matches these, it's flagged as sandbox activity.
Rule 2: Honeypot Link: We embed invisible "Honeypot" links in our emails. While humans can't see or click them, sandboxes often access them, revealing their presence.
Rule 3: Request Header Analysis: By examining request headers, we can identify unique characteristics that differentiate sandbox activities from real user actions.
Last updated