Using the Phishing Campaign Wizard

1. Navigate To Phishing

Before you can use the phishing Wizard, you will need to Navigate to phishing

2. Target Domain

Before you create a phishing campaign, please make sure you have verified your target domain.

If you have not set up your target domain; take a look at our guide Adding A Target Domain

3. Phishing Simulator

In the Phishing Simulator you will see a table showing phishing campaigns that have been created, as well as their status and action icons.

Screenshot of the phishing campaigns

4. Phishing Campaign

To create a phishing campaign using the phishing wizard, click the 'create a phishing campaign' button that can be found to the right of the add button.

Screenshot of the create a phishing campaign button

5. Campaign Name

You will then be asked to create a campaign name. Enter the name you would like for the phishing campaign.

Screenshot of campaign name

6. Covert Mode

Before you can launch the wizard, you will be asked if you want to run the phishing campaign in covert mode.

Covert mode disables the training at the end of the simulated phishing campaign that the end user would normally be presented. Instead, the end user can view the training in the "phishing results tab" within manage.

To enable covert mode, tick the 'enabling covert mode' box that can be found underneath the campaign name.

Screenshot of covert mode button

7. Launch Wizard

Once you have filled in the campaign name and have decided if the campaign will run in covert mode, click 'Launch Wizard'.

Screenshot of the launch wizard button

8. Assign Target Groups

The next stage is selecting which user groups that you wish to target with this new campaign.

A list of user groups will be shown giving you the option to select multiple.

Displayed below the user group selection is a list of user groups that have been selected (Everyone will be selected by default). If you change your mind about a user group then click on the red ‘X’ to remove it from the selection.

Screenshot of the assign groups section

9. Campaign Dates

Next, you are asked to specify the dates the campaign will run using the calendar to select days, and specify a start and end time throughout the day.

Screenshot of the phishing timeline

10. Select Template

The next page will ask you to specify which campaign templates to use. You can select multiple templates, and just like the target user groups, the selected templates will be shown below giving you the opportunity to change your mind by clicking on the red ‘X’ to remove a template from your selection.

Screenshot of the phishing templates

11. Checklist

Before completing the creation of the campaign, a checklist will be presented which you must follow before moving on to the next stage.

If there are user accounts that have yet been activated that fall into the target user group(s), you will need to specify if you wish to target them or not.

You will also need to ensure that your company will not block the emails by using the information such as our mail server details and the website domains the phishing emails will point to.

Once you have read the information and performed any necessary tasks, tick the confirmation box and then click ‘Next step’.

Screenshot of the next button

12. Final Check

Before the campaign is created, you will be given an opportunity to review the details of the campaign, making any adjustments as required by clicking the ‘Edit’ icon for each of the detail panels.

If you are happy with the way the campaign is configured, click ‘Done’ to complete the process.

Enjoyed using our product?

Help us out by leaving a review for on Gartner Peer Insights!

It only takes 5 minutes of your time and every review helps us immensely to reach new clients. Thank you so much.

Related Articles