Signing up
- When a user (IT Administrators) signs up, they enter the details below in the sign-up form and receive a verification email.
- When the user verifies the email they will have access to the standard level of the product.
Data transmitted to Trend Micro |
|
---|---|
Feature Configuration Location |
The Sign Up page can be accessed from the Phish Insight Homepage or directly on this URL https://cloud.phishinsight.trendmicro.com/auth/sign-up. Click the image to enlarge. |
Creating a campaign - Uploading Recipients
- Customer's IT administrators can upload the list of recipients of the service in the following ways:
- CSV file
- Active directory integration
- Manual data entry
Data Collected |
|
---|---|
Console Location | https://cloud.phishinsight.trendmicro.com/user-management/users
Click the image to enlarge. |
Campaign Interactions
When the employee receives the phishing simulation email, they may:
- Click on the link and enter data on our simulated phishing webpages
- Respond to the email if it is a business email compromise simulation.
We will store both the username (or alternative user identifier credentials as identified below) and the reply received from the employee.
Data Transmitted to Trend Micro |
|
---|---|
Feature Configuration Location | Username or other user identifier is collected from our simulated phishing landing pages
Click the image to enlarge. It is also possible to collect the reply data from a BEC Simulation. Reply data is at the discretion of the employee, it may be an automatic out-of-office email, a facetious response, it may include the employee’s signature block and any other information provided by the employee. Click the image to enlarge. |