Support Garden
English
Español - México
Submit an Idea
Sign in
Español - México
Phishing Simulator Tool
Teams Platform
About Teams Platform
Reporting and Analytics
Teams Platform FAQs
Teams: CyberEscape Online Participant FAQs
Training Platform
About Training Site
Training Marketing Material
Technical Support
Reports and Analytics
Training Site FAQs
Training Email Notifications
Phishing Simulator Tool
About Phishing Tool
Technical Support
Reporting and Analytics
Phishing Tool FAQs
Unify Insights
Overview
Administration
Recommended Use Cases
Content Marketing & Resources
Training Collections
Teams (CyberEscape Online) Collections
Campaign in a Box
Mini Box
Infographics
End User Blogs
Additional Product Resources
Contact Support
Product Video Courses
Training Video Courses
Teams: CyberEscape Online Video Courses
Product Onboarding and Integrations
Overview
Whitelisting
Product Compliance
Unify Integrations
Unify Onboarding
Living Security Departments
Engineering
Back to home
Support Garden
Phishing Simulator Tool
Teams Platform
About Teams Platform
Reporting and Analytics
Teams Platform FAQs
Teams: CyberEscape Online Participant FAQs
Training Platform
About Training Site
Training Marketing Material
Technical Support
Reports and Analytics
Training Site FAQs
Training Email Notifications
Phishing Simulator Tool
About Phishing Tool
Technical Support
Reporting and Analytics
Phishing Tool FAQs
Unify Insights
Overview
Administration
Recommended Use Cases
Content Marketing & Resources
Training Collections
Teams (CyberEscape Online) Collections
Campaign in a Box
Mini Box
Infographics
End User Blogs
Additional Product Resources
Contact Support
Product Video Courses
Training Video Courses
Teams: CyberEscape Online Video Courses
Product Onboarding and Integrations
Overview
Whitelisting
Product Compliance
Unify Integrations
Unify Onboarding
Living Security Departments
Engineering
Phishing Simulator Tool
Articles and FAQs to set up, integrate, and leverage the phishing simulator tool.
About Phishing Tool
Phishing: Training Audience Integration
How to Add System Users to the Phish Simulator Tool
Overview: Phishing Simulation Tool
Phishing: Dashboard
Phishing: Scenarios
Phishing: Campaign Manager
Phishing: Scenarios Settings
Phishing: Phishing Reporter
Phishing: Campaign Reports
Phishing: Target Users
See more
Technical Support
Policy Considerations for Living Security Phish in Mimecast
How to Whitelist an IP Address in Office 365 for Living Security Phish
How to Deploy the Add-in in Google Workspace
Installation/Deployment of the Phish Tool Button in Google
How to configure Direct Email Creation for O365
Policy Considerations for Living Security Phish in Proofpoint
More whitelisting considerations for Living Security Phish
How to Whitelist an IP Address in Google Workspace
How to Whitelist in Barracuda
Getting Started: Phishing Reporter Customization and Deployment
Phishing Reporter Deployment for Exchange Admin Center
How to Identify and Address False Positives on the Phishing Tool
Living Security Phish Simulation Domains
Living Security Phish - Establishing a SCIM integration
How to Whitelist Phish in Cisco Ironport
How to Whitelist an IP Address in Exchange 2013 and 2016
Living Security Phish: IP Addresses and Host Names
Phishing Reporter Deployment for Microsoft 365
Living Security Phish REST API
Generating an API Key for Living Security Phish
Getting Started: Phish Whitelisting
Microsoft 365 Deployment of Phishing Button
Integrating LDAP with Living Security Phish
Getting Started: Phish Integrations
Integrating a SIEM solution with Living Security Phish
Getting Started: Vishing Simulator
Vishing Simulator: Campaign Manager
Getting Started: Incident Responder
Incident Responder Fundamentals
Incident Responder: Investigations
Incident Responder: Playbooks
Incident Responder: Mail Configurations
How to integrate the Microsoft 365 environment with Incident Responder
Whitelisting the Pictures in Microsoft Outlook
See more
Reporting and Analytics
Phish Campaign Reports
Phishing Tool FAQs
Launching a Phishing Campaign
Phishing in Three Easy Steps
How to Edit or Upload a Target User Group
How Do I Fast Launch a Phishing Email?
Phishing: How to Verify Allowed Domains
See more