Phishing Simulator Tool
Articles and FAQs to set up, integrate, and leverage the phishing simulator tool.
About Phishing Tool
- Simulated Phishing Delivery Localization
- Phishing: From Scam of the Week to Deepfakes
- Overview: Phishing Simulation Tool
- Phishing: Dashboard
- How to Attach Training Pages to a Phishing Campaign
- Phishing: Scenarios
- Phishing: Campaign Manager
- Phishing: Scenarios Settings
- Phishing: Campaign Reports
- Phishing: Target Users
- Considerations for a successful smishing campaign
- Phishing: Managing Targeted Users - Training Audience Integration
- Phishing Simulator Email Templates
Technical Support
- Phishing - Map Telephone Numbers from Azure (smishing, vishing)
- Phishing: Microsoft Graph Authentication Error
- Phishing - Trusted Zone in Outlook (recommended)
- Phishing - How to Send Only Simulation Emails to the platform via the Microsoft button
- Getting Started: Phish Whitelisting
- Microsoft 365 Deployment of Phishing Button
- Integrating LDAP with Living Security Phish
- Living Security Phish - Establishing a SCIM integration
- Getting Started: Phish Integrations
- Integrating a SIEM solution with Living Security Phish
- Generating an API Key for Living Security Phish
- Getting Started: Vishing Simulator
- Vishing Simulator: Campaign Manager
- Installation/Deployment of the Phish Tool Button in Google
- Getting Started: Incident Responder
- Incident Responder Fundamentals
- How to Whitelist an IP Address in Exchange 2013 and 2016
- How to Whitelist an IP Address in Office 365 for Living Security Phish
- Incident Responder: Investigations
- How to Whitelist an IP Address in Google Workspace
- Incident Responder: Playbooks
- Incident Responder: Mail Configurations
- More whitelisting considerations for Living Security Phish
- Policy Considerations for Living Security Phish in Mimecast
- How to integrate the Microsoft 365 environment with Incident Responder
- Policy Considerations for Living Security Phish in Proofpoint
- Whitelisting Images in Microsoft Outlook
- Living Security Phish REST API
- Smishing Campaign Manager
- Getting Started: Smishing Simulator
- Getting Started: Phishing Reporter Customization and Deployment
- Smishing Campaign Reports
- Phishing Reporter Deployment for Microsoft 365
- Phishing Simulator Phone Numbers
- How to Whitelist Phish in Cisco Ironport
- Living Security Phish: IP Addresses and Host Names
- Phishing Reporter Diagnostic Tool
- Living Security Phish Simulation Domains - Truncated
- Phishing Reporter Diagnostic Tool Requirements
- How to Deploy the Add-in in Google Workspace
- Phishing Maintenance Tool
- How to Identify and Address False Positives on the Phishing Tool
- Troubleshooting the Phishing Reporter on Outlook Desktop
- How to configure Direct Email Creation for Google Workspace
- Phishing Reporter Deployment for Exchange Admin Center
- How to configure Direct Email Creation for O365
- Getting Started: Phish Direct Email Creation (DEC)
- How to Disable The Microsoft Report Button in Outlook
- Phishing: Traditional and Direct Email Creation whitelisting methods compared
- Phish Splunk Integration
- How to Whitelist in Barracuda
- Phishing Simulator Syslog Integration
- Integrating the Microsoft Phishing Reporter Button with our Phishing Tool
- Microsoft Ribbon Phishing Reporter
- Phishing Reporter Page View Failure Due to Deprecated Exchange Online Tokens
- Microsoft Page View Phishing Reporter
- Whitelist Phish Link Domains in Microsoft Defender SmartScreen
Reporting and Analytics
Phishing Tool FAQs
- Phishing - Why does Outlook Preview register as an Open in reporting?
- Phishing - Domain Integrity
- How to Create a Scenario with Just-in-time Learning Page
- Phishing: How to Verify Allowed Domains
- Phishing difficulty levels explained
- How do I add users to Phishing?
- How Do I Fast Launch a Phishing Email?
- Launching a Phishing Campaign
- How to Edit or Upload a Target User Group
- Phishing in Three Easy Steps