All pages
Powered by GitBook
1 of 8

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

How to Deploy the Add-in in Microsoft 365

Deploy the Add-in

  • Log in to Microsoft 365 Admin Center and go to Add-ins.

  • Click +Deploy Add-in and click Next. Under Deploy a custom add-in, click Download custom apps.

  • Select I have the manifesto.xml file.

  • Click Upload.

Now proceed to Configure Add-in.

Configure Add-In

Assign the users who will have access to the add-in. Choose one of the following:

  • Everyone: The add-in will be installed on every user under the Microsoft 365 tenant (recommended).

  • Specific Users/Groups: The add-in will be installed on the selected group or user.

  • Just me: The add-in will be installed only on your mail account.

Now proceed to the Deployment Method.

Deployment Method

Select a Deployment Method.

  • Fixed (Default, Recommended)

  • Available

  • Optional

Click Deploy.

You will receive an email notification confirming your successful deployment. It may take up to 24 hours for the add-in to be displayed on the users' email applications. Users may need to relaunch email applications.​

Once you have received notification that the deployment was successful, click on Next, and then Finish to complete the process.

Uninstall the Add-in

To uninstall the Phishing Reporter add-in from Microsoft 365 user accounts, follow these steps:

  • Log in to and go to .

  • Select the add-in you want to uninstall.

  • Click Remove add-in and then Remove to complete the process.

It may take up to 24 hours for the add-in to be uninstalled. Users may need to relaunch email applications.​

Video Tutorial

Microsoft 365 Admin Center
Add-ins

Phishing Reporter Page View Failure Due to Deprecated Exchange Online Tokens

The Phishing Reporter Page View feature fails due to Microsoft's deprecation of legacy Exchange Online tokens earlier than expected date, June 2025.

Affected Systems

  • Microsoft 365 users utilizing the Phishing Reporter Page View feature.

Symptoms

If you are using the Phishing Reporter Page View version, it may fail with the following empty message:

Root Cause

Microsoft has deprecated legacy Exchange Online tokens, which the Phishing Reporter previously relied upon for authentication and access.

Short Term Solution

Customers can turn on legacy Exchange Online tokens following below documentation.

It can take up to 24 hours before all requests from Outlook add-ins for legacy tokens are allowed.

Long-Term Solution

A more permanent solution, we highly recommend using Microsoft Ribbon Phishing Reporter that utilises Graph API and no dependency on Exchange Online tokens.

FAQ:

Q: Why is it happening now?

A: Legacy tokens turned off for all tenants before the scheduled date before June.

Date
Legacy tokens status

Phishing Reporter Deployment

This section describes in detail how to deploy the Phishing Reporter add-in to users in Microsoft 365, Exchange, or Google Workspace platforms.

For instructions on the required initial installation of the add-in, please refer to the explanation provided here: .

Shortcuts

Feb 17th, 2025

Legacy tokens turned off for all tenants. Admins can reenable legacy tokens via PowerShell.

Jun 2025

Legacy tokens turned off for all tenants. Admins can no longer reenable legacy tokens via PowerShell and must contact Microsoft for any exception.

Oct 2025

Legacy tokens turned off for all tenants. Exceptions are no longer allowed.

https://learn.microsoft.com/en-us/office/dev/add-ins/outlook/turn-exchange-tokens-on-off
https://learn.microsoft.com/en-us/office/dev/add-ins/outlook/faq-nested-app-auth-outlook-legacy-tokens
Picture 1: Exchange Online Powershell - Allow Legacy Token Sample
  • How to Deploy Microsoft Page View Phishing Reporter

  • How to Deploy the Add-in in Exchange Admin Center

  • How to Deploy the Add-in in Google Workspace

  • Phishing Reporter Announcement Email Template

  • Comparison: Ribbon vs Page View vs MSI Outlook Phishing Reporter (Microsoft 365)

    Use this chart to determine which Phishing Reporter add-in is best suited for your Microsoft 365 environment. The right choice depends on how your employees access Outlook—whether through desktop apps, web browsers, or mobile devices.

    Feature / Platform
    Ribbon Phishing Reporter
    Page View Phishing Reporter
    MSI Outlook Add-in

    Outlook on Windows (Classic)

    ✅ Supported (only version 2404 build 17530.15000)

    ✅ Supported

    ✅ Supported

    Outlook on Windows (New)

    ✅ Supported

    ✅ Supported

    ❌ Not Supported

    Outlook Classic 2016+ on Windows (Exchange)

    ❌ Not Supported

    FAQ

    Q: The add-in was deployed to one of the listed email servers more than 12 hours ago but is still not visible on users' email applications. What can I do?

    A: You can try to re-deploy the add-in. If it still does not appear, you should contact the support team of the email service provider.

    Q: Can an Attacker hijack Outlook Add-in?

    A: The platform uses “Code Signing with Microsoft Authenticode” to protect tools against hacking attempt. For more information, please click here​.

    Q: Is it possible to centralise the distribution of add-in?

    A: Yes, it is. Many institutions manage the add-in (install, uninstall, enable, disable) with central administration tools, such as Microsoft SCCM, IBM Bigfix.

    Q: Does the Phishing Reporter Add-In work with the Outlook application on iOS?

    A: Yes, if you distribute the Phishing Reporter Add-In as an XML package (Microsoft 365), it will be available in both OWA/Outlook applications and will also function within the Outlook application on iOS.

    Q: Does the Phishing Reporter Add-In work in shared mailboxes in O365?

    A: The add-in works in shared mailboxes in the Outlook Desktop Application. However, it is not supported in shared mailboxes in OWA (Outlook Web Access).

    Q: Does the new Outlook application on Windows 11 support MSI-based add-ins?

    A: No, the new Outlook application on Windows 11 does not support MSI-based add-ins. It is designed to work primarily with web-based add-ins such as XML add-in of Keepnet Phishing Reporter. If you need MSI-based add-ins, we recommend using the classic Outlook for Windows desktop application. For more information, please find information under the "Extensibility" section in this document.

    Q: Can I use the O365 XML Add-In on OWA in a mobile browser?

    A: No, you can't use the add-in if you open OWA in a mobile browser. Microsoft 365 does not support third-party add-ins in mobile browsers for OWA. Please use the Outlook app instead.

    Phishing Reporter Customization
    How to Deploy Microsoft Ribbon Phishing Reporter

    ✅ Supported

    ✅ Supported

    Outlook on MacOS (Microsoft 365)

    ✅ Supported (Version 16.81 (23121700) or later)

    ✅ Supported

    ❌ Not Supported

    Outlook on MacOS (Exchange)

    ❌ Not Supported

    ❌ Not Supported

    ❌ Not Supported

    Outlook on Web MacOS (Exchange)

    ❌ Not Supported

    ✅ Supported

    ❌ Not Supported

    Outlook on the Web (Microsoft 365)

    ✅ Supported

    ✅ Supported

    ❌ Not Supported

    Outlook on the Web (Exchange)

    ❌ Not Supported

    ✅ Supported

    ❌ Not Supported

    Outlook on iOS (Microsoft 365)

    ❌ Not Supported

    ✅ Supported

    ❌ Not Supported

    Outlook on Android (Microsoft 365)

    ❌ Not Supported

    ✅ Supported

    ❌ Not Supported

    Outlook on iOS (Exchange)

    ❌ Not Supported

    ❌ Not Supported

    ❌ Not Supported

    Outlook on Android (Exchange)

    ❌ Not Supported

    ❌ Not Supported

    ❌ Not Supported

    Shared Mailboxes (Outlook Desktop)

    ❌ Not Supported

    ❌ Not Supported

    ✅ Supported (only within Classic Outlook)

    Shared Mailboxes (Microsoft 365)

    ❌ Not Supported

    ❌ Not Supported

    ❌ Not Supported

    Mobile Browser (OWA)

    ❌ Not Supported

    ❌ Not Supported

    ❌ Not Supported

    Installation Method

    Deploy via Microsoft 365 Admin Center (Manifest XML)

    Deploy via Microsoft 365 Admin Center (Manifest XML)

    Manual deployment via GPO or SCCM Tools

    User Experience

    Ribbon button

    Side panel in reading view

    Ribbon button (Classic Outlook interface only)

    How to Deploy the Add-in in Exchange Admin Center

    Requirements

    In order to use the Phishing Reporter add-in in the Exchange environment, your platform must meet the following requirements.

    • Exchange 2013 - version (15.0.847.32) or above

    • Exchange 2016 - version (15.1.225.42) or above

    • Exchange 2019

    Deploy Add-in

    To deploy the Phishing Reporter add-in, follow the steps below.

    • Log in to the Microsoft 365 Admin interface.

    • Go to Microsoft 365 Admin Center > Settings > Integrated Apps > Add-ins.

      • If you have Exchange 2013 or a different Exchange Admin interface, you can try Exchange Admin Center > Organization > Apps. You may also search the 'add-ins' word to find the related place.

    It may take up to 12 hours for the add-in to be displayed on users' email applications. Users may need to relaunch their email applications.

    Uninstall the Add-in

    To uninstall the Phishing Reporter add-in from Exchange Admin Center user accounts, follow these steps:

    • Log in to the Microsoft 365 Admin Center.

    • Go to Microsoft 365 Admin Center > Settings > Integrated Apps > Add-ins.

      • If you have Exchange 2013 or a different Exchange Admin interface, you can try Exchange Admin Center > Organization > Apps. You may also search the 'add-ins' word to find the related place.

    It may take up to 12 hours for the add-in to be uninstalled. Users may need to relaunch email applications.​

    Video Tutorial

    Click the (+) button and select Add from file. Install the Phishing Reporter .xml file that you previously downloaded and click Next.

  • Make sure that these options are selected:

    • Make this add-in available to users in your organization

    • Mandatory is always enabled

    • Users can't disable this add-in.

  • Click Save to complete the process.

  • Click the add-in you want to uninstall.

  • Click the trash bin icon and then click Yes to complete the process.

  • Phishing Reporter Announcement Email Template

    This text has been prepared for customers to use who want to inform their users about the Phishing Reporter add-in.

    Email Template

    Dear …. Team,

    ​We are happy to announce to you a new email function: “Suspicious (Phishing) E-mail Reporter”.​This add-in will help you to easily and instantly report suspicious emails to Information Security Team for analysis.

    Please read the instructions below to understand how to use this add-in.​

    What is the Phishing Reporter add-in?

    ​The Phishing Reporter add-on is a button placed on your email menu bar. This button will enable you to report suspicious emails to us. ​It will also give us the opportunity to timely identify email-born cyber threats and take action before any damage occurs.​

    What will the add-on bring?

    • You can report email attacks with a single click.

    • Timely notifications of "Phishing" attacks will help the information security team be more proactive and reinforce our company’s cybersecurity posture.

    • The add-in will help you be more aware of cyber risks.

    A Sample Usage

    1. The user clicks on the “Report Phishing” button to report the suspicious email, then he/she is asked whether to delete the original email or not.

    2. At the end of this process, the result of the analysis of the suspicious email you reported will be sent to you via email.

    3. The user is then appreciated for his/her attentive action.

    Microsoft Ribbon Phishing Reporter

    The Microsoft Ribbon Phishing Reporter allows your users to easily report suspicious emails and help protect your organization from cyberattacks. When you integrate the Phishing Reporter with Microsoft's integrated spam-reporting feature, the Phishing Reporter will appear in the Outlook ribbon.

    When your users click the Phishing Reporter to report an email, they can provide your IT team with an early warning about potential threats. You can receive reported emails in the Microsoft 365 Defender platform and the Keepnet Incident Responder page.

    To learn how to install the Microsoft Ribbon Phishing Reporter and how your users can use the Phishing Reporter in their mail clients, see the sections below.

    If you use the phishing feature in the Keepnet Incident Responder menu, the Microsoft Ribbon Phishing Reporter will also track if your users report our simulated phishing emails. You can use this feature to see which users successfully identify potential threats.

    Microsoft Ribbon Phishing Reporter User Experience

    Here is an example view of the ribbon phishing reporter on Outlook.

    • When using the new Outlook Ribbon, clicking the Phishing Report button opens a pop-up window instead of a side panel.

    • The pop-up provides the same reporting options but appears as a temporary dialog in the center of the screen.

    • This is the default experience for some Outlook versions, including Outlook on Windows with the new Ribbon UI.

    Supported clients

    The following table identifies which Outlook clients support the integrated spam-reporting feature. See the .

    Client
    Status

    * In Outlook on the web and the new Outlook on Windows, the integrated spam-reporting feature isn't supported for . Microsoft 365 Consumer accounts (, Hotmail, ) are for personal use and don’t support the integrated spam-reporting feature in Outlook on the web or the new Outlook on Windows.

    Prerequisites

    Before you can install the Microsoft Ribbon Phishing Reporter for your organization, your organization will need to have a Microsoft 365 mail server and license. The Phishing Reporter is compatible with the above email clients and requirements.

    The Microsoft Ribbon Phishing Reporter supports installation for . This feature requires that Graph API and Nested App Authentication single sign-on (NAA-SSO) permissions are authorized in your Microsoft 365 tenant. See installation steps 5 through 9 below for how to authorize these permissions.

    How to Install the Microsoft Ribbon Phishing Reporter

    1. Customize for your organization's needs

    2. Go to Phishing Reporter, scroll down to the bottom and click the Manage and Download button.

    3. Click 'Authorize' for Delegated Access permissions.

    Suggested to authorize Application-Level Access only for organizations using Conditional Access or Advanced Identity Policies, since managed device or policy restrictions may cause token acquisition to fail when using delegated permissions. Please click for more information.

    1. Log in to your Microsoft 365 account using your admin credentials.

    2. Once you log in, the Permissions requested pop-up window will display. Read the permissions, then click Accept.

    1. Once you accept the permissions, the GRAPH APIs Authorization Successful window will display.

    1. Click the Download icon below the Microsoft Ribbon Phishing Reporter option to download the PhishingReporterRibbon.xml file.

    2. In a new tab of your browser, log in to your Microsoft 365 admin center.

    1. From the menu on the left side of the page, click Settings.

    2. From the Settings drop-down menu, select Integrated apps.

    1. Click Add-ins at the top-right corner of the page. The Add-ins page will open

    1. On the Add-ins page, click Deploy Add-In. The Deploy a new add-in pop-up window will open.

    1. In the pop-up window, click Next.

    1. Click Upload custom apps.

    1. Select the I have the manifest file (.xml) on this device option. Then, click Choose File and select the PhishingReporterRibbon.xml file that you downloaded in step 6.

    1. Click Upload to install the Phishing Reporter. The Configure add-in pop-up window will open.

    1. From the pop-up window, select which users will have access to the Phishing Reporter and which method you would like to use to deploy the Phishing Reporter.

    We recommend that you allow all users to access the Phishing Reporter. We also recommend that you use the Fixed deployment method.

    1. Click Next, and additional app permissions will display.

    2. Once you have read the permissions, click Save. The Deploy Phishing Reporter pop-up window will open.

    The expected timeframe for the Phishing Reporter to deploy is 24 hours, but timeframes can vary. For more information about deploying add-ins, see Microsoft's article.

    1. Once the pop-up window displays a confirmation that the add-in successfully deployed, click Next. The Announce add-in pop-up window will open and display a message about announcement recommendations from Microsoft.

    After you install and deploy the Phishing Reporter, you might receive an email from your mail service provider that contains information you can use to help you announce the Phishing Reporter add-in to your users. Keepnet does not send the email about the Phishing Reporter’s intended usage and benefits.

    1. Click Close to close the pop-up window.

    Troubleshooting Microsoft Ribbon Phishing Reporter

    We were unable to process this item. Please try again later.

    "We were unable to process this item. Please try again later." message in the Ribbon Phishing Reporter in Outlook.

    The suggested solution is to ""

    It is recommended because:

    1. Compatibility Issues with Classic Outlook

    • The Microsoft Ribbon Phishing Reporter add-in might not be fully supported or optimized in the classic (legacy) Outlook for Windows except Version 2404 (Build 17530.15000). See

    • Microsoft is shifting support toward New Outlook, which has improved integration with cloud-based services and add-ins.

    1. Performance & Connectivity Fixes in New Outlook

    • New Outlook is built on a web-based architecture, offering better compatibility with Microsoft 365 cloud services, including phishing reporting.

    • It resolves time-out errors caused by outdated local add-in frameworks.

    1. Bug Fixes & Updates

    • Microsoft frequently updates the New Outlook, while the classic version may have outdated code that affects add-in performance.

    1. Cloud Integration & Service Connectivity

    • The Phishing Reporter add-in relies on Microsoft 365 cloud APIs to submit reports.

    • If the classic Outlook version struggles with these connections, switching to the New Outlook can ensure a more stable connection.

    Try Enabling "New Outlook" as suggested.

    Troubleshooting: Microsoft Graph Authentication Error (AADSTS530004)

    The following issue occurs because Microsoft Conditional Access requires devices or sessions to be compliant before granting access to protected resources. When the Keepnet Phishing Reporter add-in attempts to connect via Delegated Access (i.e., on behalf of a signed-in user), the organization’s Conditional Access policies may block the request if it does not originate from a compliant or trusted device.

    This is common when:

    • The organization enforces device compliance via Intune or Azure AD.

    • The user accessing the Phishing Reporter add-in is considered an external identity.

    What Is Application-Level Access?

    Application-level permissions allow the Keepnet Phishing Reporter add-in to access Microsoft 365 mailboxes and perform phishing reporting tasks without requiring a signed-in user. The add-in authenticates using its own identity instead of a user’s.

    When enabled, the Phishing Reporter add-in acts as a trusted service with organization-wide permissions granted by an administrator. This ensures that Keepnet can operate under Conditional Access, perform automated operations, and maintain consistent behavior even when users are not logged in.

    Delegated vs Application-Level Access

    Access Type
    Description
    Scope
    Typical Use Case

    Why Application-Level Access Is Required

    If your organization enforces Conditional Access, device compliance, or automated identity checks, Delegated Access will fail because it depends on the user’s compliance state.

    Application-Level Access ensures:

    • Uninterrupted operation of the Phishing Reporter add-in across all mailboxes.

    • Centralized and consistent access across departments and tenants.

    • Secure authentication compatible with Conditional Access requirements.

    When to Use Application-Level Access

    Use Application-Level Access if:

    • You require organization-wide authentication for all users.

    • Conditional Access or advanced identity enforcement is active.

    • Consistency across departments/regions is needed.

    Security Notes

    • Admin Consent Required: Only global administrators can grant Application-Level permissions.

    • Least Privilege Principle: Assign only the permissions needed for the Phishing Reporter add-in to operate.

    • Governance: Regularly audit app-only permissions to ensure compliance.

    Keepnet Recommendation

    Use Application-Level Access for:

    • Reliable, organization-wide authentication and identity mapping.

    • Compatibility with Conditional Access and advanced identity controls.

    Keep Delegated Access for:

    • End-user actions like phishing report submission from the Outlook ribbon.

    Additional References

    Summary

    This error (AADSTS530004) indicates that your Microsoft 365 tenant blocks delegated access under Conditional Access rules.

    To resolve it, configure Application-Level Access (App-only) for the Keepnet Phishing Reporter add-in and reauthorize the application with admin consent

    How Microsoft Ribbon Phishing Reporter Buttons Look on Outlook Platforms

    Microsoft Ribbon Phishing Reporter helps users report suspicious emails quickly and easily across multiple email platforms. This section visually showcases how the Phishing Reporter button appears in different environments—Outlook Desktop (New/Classic), Outlook Web (OWA), Outlook on Mac, Mobile (IOS/Android).

    New Outlook

    In the redesigned New Outlook interface, the Phishing Reporter button is placed conveniently in the top toolbar when viewing an email.

    1. Open your Inbox.

    2. Select the suspicious email.

    3. Click the Phishing Reporter button in the toolbar at the top.

    Classic Outlook

    In Classic Outlook, the reporter button is accessible directly from the ribbon while reading or previewing an email.

    1. Click Inbox from your folder list.

    2. Open the email you want to report.

    3. Click the Phishing Reporter button on the ribbon toolbar.

    Outlook Web App (OWA)

    If you’re using Outlook on the web, the reporter button is clearly visible in the action toolbar when viewing a message.

    1. Go to your Inbox.

    2. Open the suspicious email.

    3. Click the Phishing Reporter icon in the top menu.

    Outlook for Mac

    For Outlook on macOS, the reporter button is available under the Report dropdown.

    1. Select the email in your Inbox.

    2. Click the Report dropdown from the top toolbar.

    3. Choose Phishing Reporter.

    Outlook Mobile (iOS / Android)

    The mobile version of Outlook provides access to the reporter through the contextual options menu:

    1. While viewing a suspicious email, tap the three dots (•••) in the upper-right.

    2. Tap on the Suspicious Email Reporter icon.

    Frequently Asked Questions (FAQs)

    Q: Can I show a confirmation prompt before deleting a reported email?

    A: No, Microsoft Ribbon Phishing Reporter automatically deletes the reported email and does not provide an option to prompt employees for confirmation before deletion.

    Q: Does the Ribbon work on Outlook Mobile for iPhone or Android?

    A: As of March 2025, Microsoft does not support Outlook Mobile. Please refer to the supported clients list for updates:

    Q: Can I change the window size of the Ribbon message (e.g., set a fixed width and height)?

    A: No, Microsoft does not allow modifications to the pop-up box. Its size is automatically adjusted.

    Q: Can I provide a language selection option for users to choose their preferred language for pop-up messages?

    A: No, Microsoft does not support adding a language selection option within the pop-up. The language is automatically set based on the user’s Outlook language settings.

    Q: I see the Microsoft Ribbon Phishing Reporter in Outlook Desktop on my MacBook, but it doesn't work. Why?

    A: Microsoft currently provides the Ribbon Phishing Reporter for preview purposes only on Outlook Desktop for Mac. While it may be visible, it is not fully functional. Please refer to the supported clients list for details:

    Q: If Microsoft automatically deletes the reported email, can it be recovered?

    A: Yes, after an email is reported, Microsoft displays a message confirming its deletion. This message includes an "Undo" option, allowing employees to recover the reported email if needed.

    Q: Can I use the Ribbon Add-in and Page View Add-in together?

    A: Yes, you can deploy both of them, and your employees can use either the Ribbon Add-in or the Page View Add-in based on their preference.

    Q: Why can't I report multiple emails at the same time in Classic Outlook on Windows?

    A: In classic Outlook on Windows, the Phishing Reporter processes one reported message at a time. If you attempt to report another email while the first one is still being processed, a notification dialog will appear, informing you that the previous report is still in progress.

    To report multiple emails, please wait for the current report to complete before submitting the next one. This limitation ensures that each report is properly processed without conflicts.

    Q: What Permissions are Required for Microsoft Graph API

    A: The Microsoft Ribbon Phishing Reporter requires specific Microsoft Graph API permissions to function effectively within an organization’s Microsoft 365 environment. These permissions allow the application to interact with users’ emails, retrieve necessary details for reporting phishing attempts, and ensure smooth integration with the email infrastructure.

    Below is a breakdown of the permissions required and their purpose:

    1. Mail Permissions

    • Mail.Read: Allows the Phishing Reporter to read the user’s email to retrieve necessary email details such as headers, attachments, and content.

    • Mail.Read.Shared: Extends read access to shared mailboxes, ensuring that the application can retrieve phishing emails reported from shared accounts.

    • Mail.ReadWrite: Provides both read and write access to the user’s mailbox, enabling modifications or tagging of emails as needed.

    2. User Profile Permissions

    • profile: Allows the Microsoft Ribbon Phishing Reporter to retrieve basic user profile information, ensuring accurate reporting and tracking.

    Tutorial Video

    This video tutorial shows the documentation steps for deploying Microsoft Ribbon Phishing Reporter add-in on M365.

    Mail.ReadWrite.Shared
    : Extends read and write permissions to shared mailboxes for better handling of phishing reports.
  • Mail.Send: Enables the application to send emails, which may be necessary when forwarding reported phishing emails.

  • Mail.Send.Shared: Allows the application to send emails from shared mailboxes when the user has the appropriate permissions.

  • Outlook on the web

    Supported*

    New Outlook on Windows

    Supported*

    Classic Outlook on Windows

    Version 2404 (Build 17530.15000)

    Supported

    Outlook on Mac

    Version 16.81 (23121700) or later

    Only in Preview, Not Fully Functional (see Preview the integrated spam-reporting feature in Outlook on Mac)

    Outlook on Android

    Not available

    Outlook on iOS

    Not available

    Delegated Access

    Add-in acts on behalf of a user, limited by that user’s permissions.

    User-based

    When a user reports a phishing email from Outlook.

    Application-Level Access

    Add-in acts as itself, using admin-granted permissions.

    Tenant-wide

    When the Phishing Reporter add-in performs identity mapping, mailbox scans, or Conditional Access operations.

    full list here from Microsoft official documentation
    Microsoft 365 consumer accounts
    Outlook.com
    Live.com
    shared mailboxes
    Phishing Reporter
    here
    Deploy add-ins in the Microsoft 365 admin center
    Toggling on New Outlook
    Supported Clients
    Microsoft Docs: Conditional Access and Compliant Devices
    Microsoft Docs: On-Behalf-Of Flow
    Supported Clients
    Supported Clients
    We were unable to process this item issue on Microsoft Ribbon Phishing Reporter
    Toggling on New Outlook
    Screenshot reference of the error:

    Microsoft Page View Phishing Reporter

    The Microsoft Page View Phishing Reporter is a Microsoft Outlook add-in developed by Keepnet that enables your users to quickly and securely report suspicious emails with a single click—directly from their email view pane. This helps your organization detect threats early and respond to phishing attempts more effectively.

    Which Outlook Platforms and Browsers Are Supported?

    The Microsoft Page View Phishing Reporter is built using the Microsoft Graph API and is designed to provide a seamless, modern experience across all major Outlook platforms. Unlike the traditional Microsoft Ribbon Phishing Reporter that appears in the toolbar, the Page View version is embedded directly within the email view pane, providing a more integrated user interface.

    to view the list of compatible Outlook platforms that support the Microsoft Page View Phishing Reporter.

    This cross-platform and cross-browser support ensures that your users can report suspicious emails consistently and securely on Outlook platforms, regardless of the device or environment they’re using.

    Where Are Reported Emails Sent?

    When a user clicks the Phishing Reporter button, the reported suspicious email is sent to one or more destinations, depending on your organization's needs:

    • 📌 Microsoft 365 Defender portal Emails can be submitted directly to Microsoft for further analysis and contribution to spam/phishing intelligence (optional setup). Please refer to for setup.

    • 📌 SOC or IT team's inbox The reported email can be forwarded to your designated inbox for internal analysis and response (optional setup). Please for more information.

    • 📌 Keepnet Incident Responder (if licensed) If your organization uses , the reported email is also logged in the portal for case management, automated response, and automated analysis.

    This flexible approach allows your organization to respond quickly to threats using your preferred tools and workflows.

    What Happens When Users Report Simulated Emails?

    If you are running simulated phishing campaigns such as , , through Keepnet, the Phishing Reporter can automatically detect and log when a user reports a simulated phishing emails.

    This allows you to:

    • Track individual user performance,

    • Identify who successfully recognized phishing simulation campaign emails, and

    • Generate behavior-based metrics for awareness training.

    This feature helps improve your organization’s overall security posture by providing real-time insight into user vigilance. Please see the following hint for the 'real-time insights into user vigilance' explanation.

    If the "Turn off email forwarding for reported Phishing Simulation Emails" option is enabled by the admin while customizing the phishing reporter button, a pop-up message will appear thanking the user for their awareness each time they report simulation emails, reinforcing positive behavior. Please for more information about this option.

    What Happens When an Employee Reports an Email

    When an employee uses the Page View Phishing Reporter Add-in to report a suspicious email, the reported email will be sent with a detailed report directly to your designated SOC or IT email address.

    If you purchased the product, the email will also be sent for automated analysis, automated response, and case management.

    The email that is sent to the SOC/IT team inbox includes:

    • The attached original email as an .eml or .msg file

    • The attached full message header of the original reported email as a headers.txt file

    • The reporting reason selected by the employee (e.g., spam, phishing, unsure)

    This structured report helps your security team quickly understand the context and take action, without needing to follow up with the reporting user.

    Microsoft Page View Phishing Reporter User Experience

    Here is an example view of the Microsoft Page View Phishing Reporter button on the New Outlook Desktop.

    • When using the Phishing Reporter button, clicking the report button opens a side panel instead of the pop-up window.

    How to Install the Microsoft Page View Phishing Reporter

    1. Before deploying the button, we recommend customizing it. This can be done in the Add-In Settings tab under the menu on the Keepnet platform.

    2. Once customization is complete, stay on the Settings tab. Scroll down to the bottom and click Manage and Download. A pop-up will appear — select Authorize for Delegated Access to proceed.

    Suggested to authorize Application-Level Access only for organizations using Conditional Access or Advanced Identity Policies, since managed device or policy restrictions may cause token acquisition to fail when using delegated permissions. Please click for more information.

    1. Log in to your account using your global admin credentials.

    2. Once you log in, the Permissions requested pop-up window will display. Read the permissions, then click Accept.

    Understanding Required Microsoft Graph API Permissions

    The Microsoft Page View Phishing Reporter requires specific Microsoft Graph API permissions to function effectively within an organization’s Microsoft 365 environment. These permissions allow the application to interact with users’ emails, retrieve necessary details for reporting phishing attempts, and ensure smooth integration with the email infrastructure.

    Below is a breakdown of the permissions required and their purpose:

    1. Mail Permissions

    • Mail.Read: Allows the Phishing Reporter to read the user’s email to retrieve necessary email details such as headers, attachments, and content.

    • Mail.Read.Shared: Extends read access to shared mailboxes, ensuring that the application can retrieve phishing emails reported from shared accounts.

    • Mail.ReadWrite: Provides both read and write access to the user’s mailbox, enabling modifications or tagging of emails as needed.

    2. User Profile Permissions

    • profile: Allows the Microsoft Page View Phishing Reporter to retrieve basic user profile information, ensuring accurate reporting and tracking.

    1. Once you accept the permissions, the GRAPH Authorization Successful window will display.

    1. Click the Download button for the Page View button under the Microsoft 365 to download the Microsoft365PhishingReporterAddin.xml file.

    2. In a new tab of your browser, log in to your .

    1. From the menu on the left side of the page, click Settings.

    2. From the Settings drop-down menu, select Integrated apps.

    1. Click Add-ins at the top-right corner of the page.

    1. On the add-ins page, click Deploy Add-In.

    1. In the pop-up window, click Next.

    1. Click the Upload custom apps button.

    1. Select the 'I have the manifest file (.xml) on this device' option. Then, click Choose File and select the Microsoft365PhishingReporterAddin.xml file that you downloaded in step 6.

    1. Click Upload to install the Microsoft Page View Phishing Reporter add-in.

    1. From the pop-up window, select which users will have access to the Microsoft Page View Phishing Reporter and which method you would like to use to deploy the Phishing Reporter.

    We recommend that you allow all users to access the Phishing Reporter. We also recommend that you use the 'Fixed' deployment method.

    1. Click Next, and additional app permissions will display.

    2. Once you have read the permissions, click Save.

    The expected timeframe for the Phishing Reporter to deploy is 12 hours, but timeframes can vary. For more information about deploying add-ins, see Microsoft's article.

    1. Once the pop-up window displays a confirmation that the add-in has been successfully deployed, click Next. The Announce add-in pop-up window will open and display a message about announcement recommendations from Microsoft.

    After you install and deploy the Phishing Reporter, you might receive an email from your mail service provider that contains information you can use to help you announce the Phishing Reporter add-in to your users. Keepnet does not send the email about the Phishing Reporter’s intended usage and benefits.

    1. Click Close to close the pop-up window.

    Troubleshooting

    Microsoft Graph Authentication Error (AADSTS530004)

    The following issue occurs because Microsoft Conditional Access requires devices or sessions to be compliant before granting access to protected resources. When the Keepnet Phishing Reporter add-in attempts to connect via Delegated Access (i.e., on behalf of a signed-in user), the organization’s Conditional Access policies may block the request if it does not originate from a compliant or trusted device.

    This is common when:

    • The organization enforces device compliance via Intune or Azure AD.

    • The user accessing the Phishing Reporter add-in is considered an external identity.

    What Is Application-Level Access?

    Application-level permissions allow the Keepnet Phishing Reporter add-in to access Microsoft 365 mailboxes and perform phishing reporting tasks without requiring a signed-in user. The add-in authenticates using its own identity instead of a user’s.

    When enabled, the Phishing Reporter add-in acts as a trusted service with organization-wide permissions granted by an administrator. This ensures that Keepnet can operate under Conditional Access, perform automated operations, and maintain consistent behavior even when users are not logged in.

    Delegated vs Application-Level Access

    Access Type
    Description
    Scope
    Typical Use Case

    Why Application-Level Access Is Required

    If your organization enforces Conditional Access, device compliance, or automated identity checks, Delegated Access will fail because it depends on the user’s compliance state.

    Application-Level Access ensures:

    • Uninterrupted operation of the Phishing Reporter add-in across all mailboxes.

    • Centralized and consistent access across departments and tenants.

    • Secure authentication compatible with Conditional Access requirements.

    When to Use Application-Level Access

    Use Application-Level Access if:

    • You require organization-wide authentication for all users.

    • Conditional Access or advanced identity enforcement is active.

    • Consistency across departments/regions is needed.

    Security Notes

    • Admin Consent Required: Only global administrators can grant Application-Level permissions.

    • Least Privilege Principle: Assign only the permissions needed for the Phishing Reporter add-in to operate.

    • Governance: Regularly audit app-only permissions to ensure compliance.

    Keepnet Recommendation

    Use Application-Level Access for:

    • Reliable, organization-wide authentication and identity mapping.

    • Compatibility with Conditional Access and advanced identity controls.

    Keep Delegated Access for:

    • End-user actions like phishing report submission from the Outlook ribbon.

    Additional References

    Summary

    This error (AADSTS530004) indicates that your Microsoft 365 tenant blocks delegated access under Conditional Access rules.

    To resolve it, configure Application-Level Access (App-only) for the Keepnet Phishing Reporter add-in and reauthorize the application with admin consent

    Microsoft Graph Authentication Error (AADSTS50076)

    The following issue occurs because Microsoft Conditional Access or another security policy now requires multi-factor authentication (MFA) to access Microsoft Graph. When the Keepnet Phishing Reporter add-in attempts to authenticate using the On-Behalf-Of (OBO) flow, the request fails with the following error:

    Unknown error: {"data":{},"status":"FAILED", "message":"OnBehalfOfCredential authentication failed: || AADSTS50076: Due to a configuration change made by your administrator, or because you moved to a new location, you must use multi-factor authentication to access '00000003-0000-0000-c000-000000000000'. Trace ID: Correlation ID: Timestamp: . The returned error contains a claims challenge."}

    Why This Happens

    This is common when:

    • The organization has recently enabled or updated Conditional Access policies that enforce MFA for Microsoft Graph or specific applications.

    • The signed-in user has not yet completed MFA on the current device/session.

    • The claims challenge returned by Azure AD is not handled by the application during the On-Behalf-Of flow.

    How to Resolve

    Ask your Azure AD / M365 administrator to:

    1. Confirm MFA and Conditional Access requirements

      1. Review the Conditional Access policies that apply to the Keepnet Phishing Reporter add-in and Microsoft Graph.

    2. Ensure the user satisfies MFA

      1. Have the affected user sign in to Microsoft 365 or Outlook and complete the required multi-factor authentication (e.g., Authenticator app, SMS, FIDO key).

    If the error persists after the user has completed MFA and policies have been verified, share the Trace ID, Correlation ID, and Timestamp from the error message with your Azure AD administrator for further investigation.

    How Microsoft Page View Phishing Reporter Buttons Look on Outlook Platforms

    The Microsoft Page View Phishing Reporter button enables users to report suspicious emails quickly and efficiently across various Outlook environments. This guide visually demonstrates how the Phishing Reporter button appears and can be accessed in different Outlook platforms: New Outlook, Classic Outlook, Outlook Web App (OWA), Outlook for Mac, and Outlook Mobile (iOS/Android).

    New Outlook

    In the redesigned New Outlook interface, the Phishing Reporter button is located in the right-hand apps panel while viewing an email.

    1. Go to your Inbox.

    2. Select the suspicious email.

    3. Click the Apps icon (grid icon) on the right-hand side panel.

    4. Choose Phishing Reporter from the list.

    Classic Outlook

    In the Classic Outlook interface, the button is integrated into the ribbon toolbar at the top.

    1. Navigate to your Inbox.

    2. Open the email you want to report.

    3. Click the Phishing Reporter button on the ribbon at the top of the message window.

    Outlook Web App (OWA)

    For users accessing Outlook via a web browser:

    1. Open your Inbox in Outlook on the web.

    2. Select the suspicious email.

    3. Click the Apps icon (grid icon) located in the message view panel.

    4. Click on Phishing Reporter.

    Outlook for Mac

    In macOS versions of Outlook, the button is accessible through the top toolbar options.

    1. Go to your Inbox and select the suspicious email.

    2. Click the three-dot icon (•••) in the top-right corner.

    3. Select Phishing Reporter from the dropdown menu.

    Outlook Mobile (iOS / Android)

    On mobile devices, the reporting option is available via the message action menu:

    1. While viewing the suspicious email, tap the three-dot menu (•••) in the top-right corner.

    2. Tap on the Phishing Reporter icon from the list of options.

    Why Do Some Users See a Popup or Redirection?

    When using Keepnet’s Phishing Reporter, most users can report phishing emails with a single click — seamlessly and silently. However, some users may occasionally see a popup window or get redirected briefly to Microsoft’s login screen.

    This behavior is expected, safe, and part of Microsoft’s secure authentication process.

    What Is Supposed to Happen?

    Keepnet’s Phishing Reporter is designed to authenticate users automatically in the background. In most cases, if the user is already signed into Microsoft 365, the system can confirm their identity silently without any additional steps.

    So Why Is There Sometimes a Pop-up or Redirection?

    A small number of users may see a sign-in prompt because:

    • They haven’t used the add-in before, and the system needs their permission

    • Their Microsoft 365 session has expired, and reauthentication is required

    • Their browser or security settings block silent sign-in, which is common in private/incognito mode or stricter corporate environments

    • Microsoft requires additional verification, such as multi-factor authentication

    In any of these cases, the system must briefly show a popup or redirect them to sign in securely before proceeding.

    Will This Happen Every Time?

    No. Once a user has signed in and given the necessary permissions, their session is remembered. They typically won’t be asked to sign in again unless:

    • Their session expires (after days or weeks)

    • Company policy or security tools clear their session

    • New permissions are requested

    Bottom Line

    Popups or redirections are not errors — they’re part of Microsoft’s secure identity verification process. They ensure that only authorized users can access sensitive data and perform actions like reporting emails.

    Keepnet follows Microsoft’s best practices to provide the most seamless experience possible, while maintaining strict security and compliance.

    Frequently Asked Questions (FAQs)

    Q: Can I show a confirmation prompt before deleting a reported email?

    A: Yes. To enable a confirmation prompt, go to the Phishing Reporter menu and select the Settings tab. Within the tab, scroll down to the Dialog Box Settings section. Locate the Delete Reported Emails option, and select With Confirmation from the dropdown menu.

    Q: Does the Microsoft Page View Phishing Reporter work on Outlook Mobile for iPhone or Android?

    A: Yes, it works. Please visit to view the supported Outlook environments.

    Q: Can I customize the Microsoft Page View Phishing Reporter side panel message, such as setting a fixed width and height?

    A: No, Microsoft does not allow customization of the size of the side panel. Its size is automatically adjusted.

    Q: Can users choose their preferred language for the Phishing Reporter button pop-up messages?

    A: Yes, you can add multiple languages from the . When an employee reports an email, the reporting side panel will appear, and they will be able to select their preferred language from the available language options before proceeding with the reporting.

    Q: If we set the Phishing Reporter button to delete reported emails automatically, can the email be recovered?

    A: Yes, if you use the 'Delete reported emails' option with 'Automatically', the reported email will be deleted automatically. The email will be sent to the Trash folder, where you can visit the folder and restore the deleted email.

    Q: Does the Microsoft Page View Phishing Reporter button work on the native Mail client of Apple on IOS mobile?

    A: No, it is not supported.

    Tutorial Video

    This video tutorial shows the documentation steps for deploying the Microsoft Page View Phishing Reporter add-in on M365.

    How to Deploy the Add-in in Google Workspace

    Deployment Steps

    Create Script

    To deploy the Phishing Reporter add-in to users in Google Workspace, follow these steps:

    Any additional comments the employee entered in the message box

    Mail.ReadWrite.Shared
    : Extends read and write permissions to shared mailboxes for better handling of phishing reports.
  • Mail.Send: Enables the application to send emails, which may be necessary when forwarding reported phishing emails.

  • Mail.Send.Shared: Allows the application to send emails from shared mailboxes when the user has the appropriate permissions.

  • After successfully completing MFA, retry using the Phishing Reporter add-in.

  • Review claims challenge handling (for advanced configurations)

    1. If you are using custom integration or the Microsoft Authentication Library (MSAL) with the OBO flow, make sure that claims challenges are correctly handled as described in Microsoft’s documentation:

    2. Handling MFA and Conditional Access claims: https://aka.ms/msal-conditional-access-claims

    3. Handling claims in On-Behalf-Of flow: https://aka.ms/msal-conditional-access-claims-obo

  • They’re on a new device or browser that Microsoft doesn’t recognize

  • Delegated Access

    Add-in acts on behalf of a user, limited by that user’s permissions.

    User-based

    When a user reports a phishing email from Outlook.

    Application-Level Access

    Add-in acts as itself, using admin-granted permissions.

    Tenant-wide

    When the Phishing Reporter add-in performs identity mapping, mailbox scans, or Conditional Access operations.

    Click here
    this document
    visit here
    Keepnet’s Incident Responder
    Phishing Simulator
    Callback Simulator
    Quishing Simulator
    see here
    Keepnet Incident Responder
    Phishing Reporter
    here
    Microsoft 365
    Microsoft 365 admin center
    Deploy add-ins in the Microsoft 365 admin center
    Microsoft Docs: Conditional Access and Compliant Devices
    Microsoft Docs: On-Behalf-Of Flow
    here
    Phishing Reporter customization page
    Picture 1: View of Microsoft Page View Phishing Reporter button on New Outlook Desktop App
    Picture 2: Reporting side panel of Microsoft Page View Phishing Reporter Button on New Outlook Desktop App
    Picture 3: Download Button panel on Phishing Reporter page
    Picture 4: Required Graph API Permissions for Microsoft Page View Phishing Reporter button
    Picture 5: Graph Authorization Successfull message on Phishing Reporter page
    Picture 6: Microsoft 365 Admin Center
    Picture 6: Integrated Apps on Microsoft 365 Admin Center
    Picture 7: Add-Ins button access on Integrated Apps page
    Picture 8: Click deploy add-In button
    Picture 9: Deploy a new add-in pop-up message.
    Picture 10: Deploy a custom add-in page
    Picture 11: Uploading XML file to deploy the Microsoft Page View Phishing Reporter add-in
    Picture 12: Deployment Settings for Microsoft Page View Phishing Reporter add-in
    Picture 13: The list of permissions that are used by the Microsoft Page View Phishing Reporter add-in
    Picture 14: Successful deployment message of Microosft Page View Phishing Reporter add-in
    Picture 15: Default announcement message provided by Microsoft to inform employees
    Screenshot reference of the error:
  • Go to script.google.com and click on the New Project button.

  • The new script file that is opened is saved with a project name.

  • In the Code.gs, paste the script code provided by the platform and save it.

  • Go to the settings icon and click Project Settings.

  • In the project settings, click: Show "appsscript.json" manifest file in editor.

  • Save the appscript.json file. Copy and save the manifest code.

  • Create Project

    • Go to console.cloud.google.com and create a new project.

    • Name your project and select the location. Then click on Create to start your project.

    • Go to the API & Services page. Open the OAuth content screen page from the left menu and select your project.

    • Please make sure the User type option selected is Internal.

    • Click Create

    OAuth Content Screen Configuration

    • On the OAuth content screen, fill in the App Name, User Support Email, App Logo and Developers Contact Email Address. Then click Save and Continue.

    • After that, click the Save and Continue button again on the Scope screen without making any changes. Then click Back to Dashboard.

    • Go to API & Services, open the Library page to search Gmail API, and then enable it.

    • Go to Project Settings and copy the Project Number.

    Change the Project Number of Script

    • Go to Project Settings, find the "Cloud Platform Project" title, and click on the Change Project button on script.google.com.

    • Paste the Project Number in the designated field and click Set Project.

    • Confirm the project change.

    The change is enabled once the project change is confirmed.

    Testing the Add-in

    If you don't want to test the add-in in your Gmail account, please go to the "Enable Google Workspace Marketplace SDK" part to distribute the add-in to the organization.

    If you want to test and see the add-in functionality, logos, add-in name, description, and more information, you can deploy the add-in to your Gmail account for test purposes and remove it anytime.

    • Go to script.google.com

    • Select the add-in project.

    • Click on Deploy >Test Deployments > Install button.

    • Click Done.

    The add-in will appear on your Gmail account shortly.

    Enable Google Workspace Marketplace SDK

    • From the Library page, search for the Google Workspace Marketplace SDK and click on it.

    • Click the Enable button and activate Google Workspace Marketplace SDK.

    • Go back to script.google.com and click on the Deploy > New Deployment button.

    • Enter information in the Description field, click the Deploy button, and copy the Deployment ID.

    • Go back to the Console Cloud. Go to the API & Services page, find “Google Workspace Marketplace SDK” and click on it.

    • Go to the App Configuration tab and enable the Google Workspace add-on option and check Deploy using Apps Script Deployment ID.

    • Then paste the Deployment ID to the deployment field on the page and then fill in the following fields.

      • Developer Name with Keepnet Labs.

      • Fill in the Developer Website URL with https://keepnetlabs.com

    • Before saving, do not forget to select the Private option and then click Save.

    • Go to the Google Workspace Marketplace SDK page and click the Manage button to see the Store Listing menu.

      • Select the Category as "Web Project".

      • Select the Language as "English".

    • Fill in the Terms of Service URL, Private Policy URL, and Support URL with https://keepnetlabs.com for the add-in.

    • Under Distribution, select the Region that you will be deploying the add-in to and click Publish.

    Deploy Add-in

    Please follow up the following steps to deploy the add-in to your target users.

    • To deploy the add-in, go to mail.google.com and click on the Google Apps icon in the top right-hand corner of the screen.

    • Scroll down to More from Google Workspace Marketplace and click on it.

    • Click Internal Apps and find the add-in

    • Click the Admin Install button to start the deployment process.

    • Click Continue to start the distribution of the extension.

    • Accept the required permissions to complete the deployment.

    It may take up to 24 hours for this app to be installed for your entire Google Workspace domain or organizational unit.

    Uninstall the Add-in

    • Go to Google Admin > Apps > Google Workspace Marketplace apps > App list on the left menu.

    • Click on the Phishing Reporter add-in you want to uninstall.

    • Click the Delete App to complete the process.

    It may take up to 24 hours for this app to be uninstalled for your entire Google Workspace domain or organizational unit.

    FAQ

    Q: Does Google charge if we deploy the add-in?

    A: No, there is no charge by Google.

    Q: Can I use my phishing reporter add-in in the Gmail app on iOS or Android?

    A: Yes, you can use the Phishing Reporter add-in in the Gmail App on Android or IOS.

    15KB
    Add-In Logos.zip
    archive
    Open
    Default Phishing Reporter Add-In Logos
    Fill in the Developer Email with [email protected].

    Upload your company logos. If you prefer, you can use the default logos below.