LogoLogo
Get Demo
  • 💫NEXT-GENERATION PRODUCT
    • Introduction
    • Getting Started
      • 1. Invite System Users
      • 2. Add Target Users
        • Add Users via CSV
        • Add users via SCIM
          • SCIM Setup in Azure AD
          • SCIM Setup in Okta
          • SCIM Setup in Onelogin
          • SCIM Setup in Jumpcloud
        • Add users via LDAP
        • Add Users via API
      • 3. Email Deliverability
        • Microsoft 365
          • M365: Direct Email Creation
          • M365: Whitelisting
        • Google Workspace
          • Google: Direct Email Creation
          • Google: Whitelisting
        • Exchange 2013 and 2016
      • 4. Track Opened Emails
      • 5. Allow Phishing URLs
        • Whitelist for Office 365
        • Whitelist for Google Workspace
        • Whitelist for Exchange 2013/2016
        • Whitelist in Security Solutions
      • 6. Setup Phishing Reporter
        • Step 1. Download Phishing Reporter
        • Step 2. Deploy Phishing Reporter
          • How to Deploy Add-In in Microsoft 365
          • How to Deploy Add-In in Exchange Admin Center
          • How to Deploy Add-In in Google Workspace
          • How to Deploy Add-In in Outlook
            • Troubleshooting Phishing Reporter Add-In on Outlook Desktop
      • 7. Incident Responder Setup
        • Step 1. Integrate Threat Intel Partners
        • Step 2. Mail Configurations
          • Microsoft 365
          • Google Workspace (Gsuite)
          • Exchange (EWS)
    • Platform
      • Dashboard
        • Dashboard Widgets
        • Incident Responder Widgets
        • Threat Sharing Widgets
        • Phishing Simulator Widgets
      • Threat Intelligence
      • Email Threat Simulator
        • Start Scan
        • View Scan Report
        • Create Trusted Account on Exchange
        • Start Scan on O365 Email Account
        • Start Scan on Google Workspace Email Account
      • Threat Sharing
        • Communities
        • Incidents
      • Phishing Simulator
        • Manage Phishing Scenarios
          • Phishing Scenarios
          • Email Templates
          • Landing Pages
        • Phishing Campaign Manager
        • Phishing Campaign Reports
        • Settings
          • DNS Services and Domains
          • Exclude IP Address
      • Callback Simulator
        • Manage Callback Scenarios
          • Callback Scenarios
          • Callback Email Templates
          • Callback Templates
        • Callback Campaign Manager
        • Callback Campaign Reports
        • Settings
          • Callback Phone Numbers
      • Vishing Simulator
        • Vishing Templates
        • Vishing Campaign Manager
        • Vishing Campaign Reports
      • Smishing Simulator
        • Manage Smishing Scenarios
          • Smishing Scenarios
          • Text Message Templates
          • Landing Page Templates
        • Smishing Campaign Manager
        • Smishing Campaign Reports
        • Settings
          • Manage DNS and Domains
          • Exclude IP Addresses
      • Quishing Simulator
        • Manage Quishing Scenarios
          • Quishing Scenarios
          • Quishing Templates
          • Quishing Landing Page Templates
        • Quishing Campaign Manager
        • Quishing Campaign Reports
        • Settings
          • DNS and Domains
          • Excluding IP Address
      • Awareness Educator
        • Training Library
        • Enrollments
        • Certificates
        • Training Reports
        • Training Completion Queries
      • Incident Responder
        • Incident Responder Dashboard
        • Investigations
        • Integrations
        • Playbook
        • Mail Configurations
          • Microsoft 365
          • Exchange
          • Google Workspace
        • Cross Company Integration
      • Phishing Reporter
        • Phishing Reporter Customization
        • Phishing Reporter Deployment
          • How to Deploy the Add-in in Microsoft 365
          • Phishing Reporter Page View Failure Due to Deprecated Exchange Online Tokens
          • Microsoft Ribbon Phishing Reporter
          • How to Deploy the Add-in in Exchange Admin Center
          • How to Deploy the Add-in in Google Workspace
          • Phishing Reporter Announcement Email Template
        • Diagnostic Tool
        • Integrating Microsoft Phishing Reporting Button with Keepnet
        • Troubleshooting Phishing Reporter on Outlook Desktop
      • Reports
        • Advanced Reports
        • Executive Reports
        • Scheduled Reports
        • Gamification Report
      • Company
        • Target Users
        • Companies
          • Company Groups
        • Company Settings
          • Privacy
            • Account Privacy
            • Data Privacy
          • AI Ally Settings
          • SMTP Settings
          • Direct Email Creation
            • Direct Email Creation for Google Workspace
            • Direct Email Creation for Microsoft 365
          • Notification Templates
          • Google User Provisioning
          • REST API
          • White Labeling
          • Proxy Settings
          • SAML Settings
            • How to Configure SAML on ADFS
            • How to Configure SAML on Google Workspace
            • How to Configure SAML on Azure AD
            • How to Configure SAML on CyberArk
            • How to Configure SAML on Okta
          • SCIM Settings
            • Getting Started with SCIM
            • Azure AD SCIM Integration
            • Okta SCIM Integration
            • Onelogin SCIM Integration
            • Jumpcloud SCIM Integration
          • SIEM Integrations
            • Splunk Integration
            • Syslog Integration
          • LDAP
          • Allowed Domains
        • System Users
          • People
          • Roles
        • Audit Log
        • Job Log
      • Free Phishing Email Analysis Service
    • Miscellaneous
      • Whitelisting
        • How to Whitelist an IP Address in Office 365
        • How to Whitelist an IP Address in Exchange 2013 and 2016
        • How to Whitelist an IP Address in Google Workspace
        • How to Whitelist in Mimecast
        • Whitelisting in Other Security Solutions
        • Whitelisting the Pictures on Microsoft Outlook Apps
        • Keepnet Tools Whitelisting Guidelines
        • Understanding Email Delivery Errors
        • Tracking Email Opens in Phishing Simulations
      • User Profile
      • Multi-Factor Authentication (MFA) Settings
      • On-Premise Requirement Checker
      • Platform Requirements
        • Portal UI Requirements
        • Phishing Reporter Requirements
        • Diagnostic Tool Requirements
      • Maintenance Tool
      • Understanding the Preferred Language Setting
  • 📚RESOURCES
    • Platform Security
    • Volume & Performance
    • Customer Help Desk
    • Product Update/Maintenance
    • Research Methodology
    • Release Notes
      • 2025
      • 2024
      • 2023
      • 2022
      • 2021
      • 2020
  • ⚖️Legal Hub
    • For Customers
      • Customer Terms of Service
      • Product Specific Terms
      • Jurisdiction Specific Terms
      • Data Processing Agreement
      • Regional Data Hosting Policy
      • Product and Services Catalog
      • Acceptable Use Policy
      • Keepnet Security Program
      • Microsoft CoPilot Usage Policy
    • For Everyone
      • Website
        • Terms of Use
        • Privacy Policy
        • Cookie Policy
      • Free Phishing Email Analysis
        • Terms of Service
        • Privacy Policy
      • Transparency Report
Powered by GitBook

Copyright © Keepnet Labs LTD. All rights reserved.

On this page
  • How to Use the Threat Sharing Community
  • How to create a Community?
  • Community Settings
  • How to Transfer Ownership of a Community
  • Members Page

Was this helpful?

Export as PDF
  1. NEXT-GENERATION PRODUCT
  2. Platform
  3. Threat Sharing

Communities

How to Use the Threat Sharing Community

You must either a) create a community, or b) become a member of an existing community. You can access the Communities page by Dashboard > Threat Sharing > Communities. The sub pages of the community page are explained below.

Your Communities

The communities you are enrolled in

All

All Communities on the platform

Invitations

Invitations waiting for you to accept or decline

The fields of the community page are explained below.

Community Name

The name of the post

Users

Number of users in the community

Industry

The industry for to the community

Last Update

The date and time the last post was made

Three Dots (Actions)

  • Edit Community

  • Notification Settings

  • Leave

  • Delete

A search window is available to help quickly find a name on the community homepage.

How to create a Community?

Go to Dashboard > Threat Sharing > Communities and click on the Create Community button.

Next, you will be asked to enter the following from the table below:

Community Name

The name for your community

Community Description

A description of the community with its rules and goals (max. 300 words)

Industry

The industry most relevant to the community

Privacy

  • Public: Anyone can find the community and see posted threats

  • Private: Only members invited by the community owner can see posted threats, but the name of the community is listed publicly in the communities list

  • Hidden: Only members can see posted threats and the name of the group is not displayed in the list of communities

Please read and accept the terms and conditions. Then click on Create to complete the process.

After creating your community, you will be directed to the new Threat Sharing Community homepage.

You will now be able to post your first incident.

Community Settings

Go to Dashboard > Threat Sharing > Communities and click on the Three Dots. You will be able to edit the interaction with the fields in the table below.

Edit Community

Edit the general information and settings of the community.

Notification Settings

  • Enable Email notifications

  • Disable Email notifications

NOTE: If you disable the first notifications setting, no notifications will be sent out to the community to inform them of posted incidents.

Leave

To withdraw from the community. NOTE: You will no longer be able to post incidents to this community; you will have to rejoin or be re-invited.

Delete

To delete the community

How to Transfer Ownership of a Community

If you no longer wish to be the owner of a community, you have the option to transfer ownership to a fellow member.

  • Go to the Communities dashboard

  • Select the community for which ownership is to be transferred

  • Go to Members menu

  • Select the member who will be the new owner

  • Click on the three dots to the right of the member’s name and click 'Assign as owner' button

  • Confirm that you are willing to give admin privileges (includes rights to remove users and delete the community) to the new owner

  • Click Accept to complete the transfer of ownership

  • A message will appear to confirm that the transfer of the community’s ownership has been successful.

Invite new members to your Community

Once a community has been established, you are able to invite members to join the group. A maximum of five can be invited at one time.

To invite new members;

  • Go to the right-hand pane of the community homepage

  • Under About Community, click +Invite and enter the email address of the invite

  • Click Invite to send your request

Requests

Individuals who are not currently members of the community can request to join. These requests are visible under the Requests option on the community homepage.

Members Page

The names of the members of your threat sharing community are visible under the Members page. You wil be able to see the following information.

Company

The Company that created the threatsharing community

Users

The number of users

Industry

The industry for the community

Posts

The number of posts made

Three Dots (Actions)

See posted incidents

A search window is available to help quickly find a name on the community homepage.

Incidents Page

The names of the incidents of your threat sharing community are visible under the Incidents Page. You will be able to see the following information.

Incident Name

The name of the post

Created by

The name of the user that created the post and the company that the user belongs to

Date Created

The date and time the post was made

Security Label

Details

A preview of the reported threat

Three Dots (Actions)

See posted incidents

A search window is available to help quickly find a name on the community homepage.

PreviousThreat SharingNextIncidents

Last updated 1 month ago

Was this helpful?

Security labels to inform recipients about how to share sensitive information. Please visit for more information.

💫
Traffic Light Protocol