Using the Phishing Campaign Wizard
1. Navigate To Phishing
Before you can use the phishing Wizard, you will need to Navigate to phishing
2. Target Domain
Before you create a phishing campaign, please make sure you have verified your target domain.
If you have not set up your target domain; take a look at our guide Adding A Target Domain
3. Phishing Simulator
In the Phishing Simulator you will see a table showing phishing campaigns that have been created, as well as their status and action icons.
4. Phishing Campaign
To create a phishing campaign using the phishing wizard, click the 'create a phishing campaign' button that can be found to the right of the add button.
5. Campaign Name
You will then be asked to create a campaign name. Enter the name you would like for the phishing campaign.
6. Covert Mode
Before you can launch the wizard, you will be asked if you want to run the phishing campaign in covert mode.
Covert mode disables the training at the end of the simulated phishing campaign that the end user would normally be presented. Instead, the end user can view the training in the "phishing results tab" within manage.
To enable covert mode, tick the 'enabling covert mode' box that can be found underneath the campaign name.
7. Launch Wizard
Once you have filled in the campaign name and have decided if the campaign will run in covert mode, click 'Launch Wizard'.
8. Assign Target Groups
The next stage is selecting which user groups that you wish to target with this new campaign.
A list of user groups will be shown giving you the option to select multiple.
Displayed below the user group selection is a list of user groups that have been selected (Everyone will be selected by default). If you change your mind about a user group then click on the red ‘X’ to remove it from the selection.
9. Campaign Dates
Next, you are asked to specify the dates the campaign will run using the calendar to select days, and specify a start and end time throughout the day.
10. Select Template
The next page will ask you to specify which campaign templates to use. You can select multiple templates, and just like the target user groups, the selected templates will be shown below giving you the opportunity to change your mind by clicking on the red ‘X’ to remove a template from your selection.
11. Checklist
Before completing the creation of the campaign, a checklist will be presented which you must follow before moving on to the next stage.
If there are user accounts that have yet been activated that fall into the target user group(s), you will need to specify if you wish to target them or not.
You will also need to ensure that your company will not block the emails by using the information such as our mail server details and the website domains the phishing emails will point to.
Once you have read the information and performed any necessary tasks, tick the confirmation box and then click ‘Next step’.
12. Final Check
Before the campaign is created, you will be given an opportunity to review the details of the campaign, making any adjustments as required by clicking the ‘Edit’ icon for each of the detail panels.
If you are happy with the way the campaign is configured, click ‘Done’ to complete the process.
Enjoyed using our product?
Help us out by leaving a review for on Gartner Peer Insights!
It only takes 5 minutes of your time and every review helps us immensely to reach new clients. Thank you so much.