Welcome to the Phriendly Phishing phamily! We are excited to have you come on board and look forward to working with you!
This page will outline the information and onboarding process you need to know to get started with your Phriendly Phishing subscription.
1. To get started please fill out the Phriendly Phishing subscription requirements checklist that will be sent to you through email from our email@example.com. Please submit this back to us once completed.
2. After our support team has configured your Phriendly Phishing account, you will receive an activation email to setup your administrative account.
Once your administrative account has been setup, visit Updating Admin account and Change Password to learn how to update your details and change your password.
You can log into the Phriendly Phishing Portal by following the below link.
3. Log into your Phriendly Phishing account to configure your AD User synchronisation that enables you to connect your Active Directory service to your Phriendly Phishing account. This ensures all staff are automatically added and removed from the Phriendly Phishing Portal.
When used in conjunction with the Auto Enrolment feature all synchronised students will automatically be scheduled in a learning path workflow.
We integrate with 3 different Active Directory services. Please click on your service below for the applicable installation guide.
4. Generate a whitelist test to ensure the Phriendly Phishing emails are getting through to your staff.
Phish Reporter Outlook add-in empowers your employees to report suspicious emails with one click for analysis and mitigation. And best of all, it’s FREE.
If you'd like to setup this feature, please follow this article to configure your settings.
Congratulations, you are all setup and ready to launch the Phriendly Phishing learning solution. Schedule your Onboarding meeting with our Customer Success and Support team to kick things off.
If you would like to learn more about the Phriendly Phishing learning method before your onboarding meeting, please review the Phriendly Phishing learning method overview.