Phishing & Security Awareness Training
Find out how to configure your Phishing Awareness, Breach Intelligence and Training platform
Getting Started
- Quickstart Guide
- Getting Started - Overview and Prerequisites
- The Phishing Tackle Dashboard
- Should I Inform The Top-Level of My Organisation About Security Awareness Training?
- How do I create a test phishing campaign?
- Step 1 - Add your organisation's settings
Allowlisting
- Allowlisting - A quickstart guide
- What is Allowlisting and why do I need to do it
- Allowlisting Technical Information
- Allowlisting via Microsoft Advanced Delivery
- Allowlisting by IP address in Exchange 2013, 2016, or Microsoft 365 (formerly Office 365)
- Allowlisting by Hostname in Exchange 2013, 2016, or Microsoft 365 (formerly Office 365)
Organisation Settings
- Domain Pools
- How to set a default phishing simulation sending method
- How To Find Phishing Tackle's Media Embed Codes
- Auto-show Next Training Content
- Force Linear Training for Delegates
- Show QR codes on video training content lists
White Labelling
Recipients
- How to add recipients to Phishing Tackle
- How to create a test group
- Manually Adding and Editing Recipients
- How to archive a recipient
- Importing Recipients from a Comma Separated Value file (.CSV)
- How to format a CSV file
Templates (emails and landing pages)
- The Phishing Email Template Library
- Email Template Overview
- How to clone a phishing email template
- Testing/Reviewing Email Templates
- Creating and Editing Phishing Email Templates
- Why are the images in my email template a different size to what I expected?
Phishing
- Email Template Header and Footer Placeholders
- Alarm Bells
- QR code phishing
- Attachments with Macros, What are they and how do they work?
- False Positives in Simulated Phishing Emails
- How to create a Smishing Campaign
SMS Phishing ("Smishing")
Tag Management
Unified Security Platform (USP)
Policies & Bulletins
Recipient Synchronisation
- Configure Synchronisation and Delivery Using Microsoft 365 (formerly Office 365) / Azure Active Integration
- Include/Exclude Rules for Microsoft 365 / Azure Active Integration and Handling Shared Mailboxes
- Azure Active Integration how to update an expired secret key
- Configure Google Instant Sync and Gmail Active Delivery
- How to upgrade to Google Instant Sync from Google Workspace Sync
- Include/Exclude Rules For Google Instant Sync
Training
- How do I create a new training course
- The End-User Training Dashboard
- Training Course Delegate Management
- Media Library
- Suggested Training for Cyber Awareness
- How to create a quiz
Phish Hook Button
- Phish Hook Button - Overview
- How to use the Phish Hook Button
- Phish Hook Button - Centralised Deployment
- Phish Hook Button - Manual / Sideloading Installation
- Phish Hook button with Microsoft Exchange/365 Shared Mailboxes
- How to use the Phish Hook button in the "New" Outlook
PhishTAIL
PhishNet
Platform
- What should I do if I have forgotten my password?
- How to access and use the 'My Profile' settings
- How to Add and Manage Two-Factor Authentication (2FA) to Your Phishing Tackle Account
- The Common Vulnerabilities and Exposures (CVE) System
- Understanding The Signup / Login Process and Forgotten Passwords
- User Management
API
Integrations
- Using Webhooks to trigger external events
- How to configure SAML 2.0 for OKTA
- How to configure SAML2 Single Sign on - Overview
- How to configure SAML 2.0 for Microsoft Azure
- How to configure SAML 2.0 for OneLogin
- How to configure SAML 2.0 for Google Workspace