Erika Maharjan
Articles
-
Phish Focus : Search and filter emails
This article will show you how to search and filter emails in Phish Focus inbox. Search email from within Phish Focus Chose from one of the 3 tabs - Received, In Review and Resolved. Select one ta...
-
Phriendly Phishing's IP Addresses, Domains
Our Domains and IP addresses are listed below. Whitelist these on any application or third-party software that may block us such as Mail gateways and spam filter Firewall Anti Virus Endpoint Securi...
-
Download Learners Training Certificates
When a learner completes a learning course they will receive a Training Certificate.How to download learner training certificatesGo to the Training Results tab in the dashboard.Search and filter by...
-
Training : Schedule Training blocks
Platform Admins can schedule trainings in two different ways, dependent on your needs or preference. Via Individual Course You can schedule training directly from a specific course. This method ...
-
O365 - Creating Mail Flow Rule
We want to ensure our Phriendly Phishing simulation phishing emails are received by your staff. Most email providers will automatically catch suspicious emails; therefore, they are caught in junk a...
-
Whitelisting : Third Party Mail Filtration Services
Below is a list of articles that can assist you in whitelisting your mail filters. You'll need our IP addresses, hostnames, or header data when you whitelist by following the guidelines in these pa...
-
Un-install and Re-install : Phish Reporter O365 (Ribbon and Non Ribbon Version)
This article takes you through the steps to un-install the Phish Reporter Outlook add-in in O365. Log in to Microsoft Admin Centre or navigate directly to IntegratedApps link. Proceed per below ...
-
Add a Credential Capture to Email Template
Credential phishing attacks are commonly used to impersonate a brand. Typically, the phishing email will include a link to a website that will attempt to capture the victim's credentials. This meth...
-
Phish Focus : Learner Experience
Phish Focus allows you to take greater advantage of your human firewall. You can easily manage and action emails that have been reported by Learners through the Phish Reporter. See below for Learne...
-
Enable Impact Report
The Impact Report allows Admins to assign a $$ value to an action to quickly determine the potential impact to your organisation. This can be used to show stakeholders the benefit and need for secu...