Erika Maharjan
Articles
-
Overview of Learning Paths
Learning Path shows you a timeline of all phishing and training activities set up in a calendar view. Admins can view the ongoing progress or results of these activities by selecting the block on t...
-
Learning Paths > Timeline
Timeline located under Learning Paths provides a visual breakdown of training and phishing simulation and its applicable metrics over a specific period. This article explains and captures the impor...
-
Change Learner Sophistication Levels
With Learners sophistication level change, you can continually challenge learners by delivering more sophisticated phishing email templates. There are 3 levels of sophistication in your Phriendly ...
-
Whitelisting : Google Workspace
We want to ensure our Phriendly Phishing simulation phishing emails are received by your staff. Most email providers will automatically catch suspicious emails, therefore; they are caught in junk a...
-
Phish Focus : Search and filter emails
This article will show you how to search and filter emails in Phish Focus inbox. Search email from within Phish Focus Chose from one of the 3 tabs - Received, In Review and Resolved. Select one ta...
-
Phriendly Phishing's IP Addresses, Domains
Our Domains and IP addresses are listed below. Whitelist these on any application or third-party software that may block us such as Mail gateways and spam filter Firewall Anti Virus Endpoint Securi...
-
Download Learners Training Certificates
When a learner completes a learning course they will receive a Training Certificate.How to download learner training certificatesGo to the Training Results tab in the dashboard.Search and filter by...
-
Training : Schedule Training blocks
Platform Admins can schedule trainings in two different ways, dependent on your needs or preference. Via Individual Course You can schedule training directly from a specific course. This method ...
-
O365 - Creating Mail Flow Rule
We want to ensure our Phriendly Phishing simulation phishing emails are received by your staff. Most email providers will automatically catch suspicious emails; therefore, they are caught in junk a...
-
Whitelisting : Third Party Mail Filtration Services
Below is a list of articles that can assist you in whitelisting your mail filters. You'll need our IP addresses, hostnames, or header data when you whitelist by following the guidelines in these pa...