PhishFirewall offers a variety of features, analytics, and resources that we want to ensure all of our clients can fully take advantage of.
Administration
Sync
User Database
Groups
Users Activity
User Actions
Mailing History
User Analytics
Phish Reports
Intergrations
API Manager
Phish Emails
Email settings
Administration
API Manager
Users Activity
Phish Reports
Intergrations
Phish Emails
Your Phish Click Rate can be found In your Back office, which you can log into here.
Then You will find User Analytics on the left hand menu.
From that you will see your organizations Overall Phish Click Rate on the Executive Summary Tab.
If you swap over to the Breach Analysis Tab , you will find a graph showing your Phish Click rate on a month by month basis.
Both can be filtered based on Tenant, Location, and Department.
Your Phish Click Rate can be found In your Back office, which you can log into here.
Then You will find User Analytics on the left hand menu.
From that you will see your organizations Engagement Rate on the Executive Summary Tab.
If you swap over to the Education Analytics , you will find a graph showing your Engagement Rate based on Location, or Department.
Of Course, You can find that information in the User Report Card.
You can find User Report Card In your Back office, which you can log into here.
You will find User Analytics on the left hand menu.
From that you will navigate the the User Report Card Tab.
Of Course, You can find that information under User Actions.
You can find User Actions In your Back office, which you can log into here.
You will find User Actions on the left hand menu. This shows you the daily activity, for any 31 day window.
Of Course, You can find that information under User Actions.
You can find User Actions In your Back office, which you can log into here.
You will find User Actions on the left hand menu.
From that you will Select the User Actions Tab.
1. Go to admin.phishfirewall.com and sign in
2. Go to the top right-hand corner and select the dropdown by your name
3. From that you will Select details.
5. Enter The New Admins Email Address
6. Select the Role, Either Admin for access to all Tenants, or Tennant Admin for access to specified Organization.
NOTE: The Admin role has access to all sub-tenants, the Tenant Admin will only have access to the Tennant selected.
7. If you want the Admin to have the ability to manage the Sync Connectors, ensure that new sync access is enabled, leave unchecked if they just need access to the Reported Phishing tool, or Analytics.
8. Select the associated organization for the Admin or Tennant Admin.
9. Click Send Invite, and we will send instructions for account setup to the supplied Email.
You are done!
1. Go to admin.phishfirewall.com and sign in
2. Go to the top right-hand corner and select the dropdown by your name
3. From that you will Select details.
1. Go to admin.phishfirewall.com and sign in
2. Go to the top right-hand corner and select the dropdown by your name
3. From that you will Select Customer Support.
1. Go to admin.phishfirewall.com and sign in
2. Select Reported Phish from the Left Side Menu
3. From that you will see all of the reported emails, that have not been categorized.
4. Click view details next to the desired Email to Open up an expanded view, Now You will be able to see the important, details related to the sender, and the links that are contained.
5. You can Click The Preview Snapshot Email, to view an image of the rendered email.
6. You can select the view Raw File to bring up a file containing the code of the Email, broken down by headings with the ability to copy sections.
7. Now You Will Select Phish, Not Phish, or Spam.
Phish - If the email appears to be malicious.
Spam - If the email appears to be Generic Spam Marketing Content.
Not Phish - If the email appears to be not malicious, or spam.
Based on your response, the end user will receive an email that informs them of the results. It will send a short informational email to help identify Spam, or other non-malicious emails if not a phishing email. And, it will congratulate them for helping protect your organization if they correctly reported a malicious email. This is all done autonomously.