Erika Maharjan
Articles
-
Learning Paths > Timeline
Timeline located under Learning Paths provides a visual breakdown of training and phishing simulation and its applicable metrics over a specific period. This article explains and captures the impor...
-
Change Learner Sophistication Levels
With Learners sophistication level change, you can continually challenge learners by delivering more sophisticated phishing email templates. There are 3 levels of sophistication in your Phriendly ...
-
Whitelisting : Google Workspace
We want to ensure our Phriendly Phishing simulation phishing emails are received by your staff. Most email providers will automatically catch suspicious emails, therefore; they are caught in junk a...
-
Phish Focus : Search and filter emails
This article will show you how to search and filter emails in Phish Focus inbox. Search email from within Phish Focus Chose from one of the 3 tabs - Received, In Review and Resolved. Select one ta...
-
Phriendly Phishing's IP Addresses, Domains
Our Domains and IP addresses are listed below. Whitelist these on any application or third-party software that may block us such as Mail gateways and spam filter Firewall Anti Virus Endpoint Securi...
-
Learner Experience : Baseline, Training, Campaign and Spear Phishing blocks
When a Learner is scheduled to receive an email from Phriendly Phishing, it is important to understand that the User Experience is different depending on the type of email they receive. Our emails...
-
Download Learners Training Certificates
When a learner completes a learning course they will receive a Training Certificate. Platform Admins can also download these certificates. How to Download Training CertificatesGo to the Training Re...
-
O365 - Creating Mail Flow Rule
We want to ensure our Phriendly Phishing simulation phishing emails are received by your staff. Most email providers will automatically catch suspicious emails; therefore, they are caught in junk a...
-
Whitelisting : Third Party Mail Filtration Services
Below is a list of articles that can assist you in whitelisting your mail filters. You'll need our IP addresses, hostnames, or header data when you whitelist by following the guidelines in these pa...
-
Un-install and Re-install : Phish Reporter O365 (Ribbon and Non Ribbon Version)
This article takes you through the steps to un-install the Phish Reporter Outlook add-in in O365. Log in to Microsoft Admin Centre or navigate directly to IntegratedApps link. Proceed per below ...