Old UI
  • Documentation Platform
    • Technical Guide
      • Whitelisting
        • Whitelisting the Pictures on Microsoft Outlook Apps
      • Minimum Requirements
      • On-Premise Requirements
        • Restricting the Access to Portal According IP
          • How to Import SSL Certificates in IIS
        • Why does the disk on the server fill up fast?
      • Getting Started
      • Phishing Simulator
      • Awareness Educator
      • Incident Responder
        • How does investigation mechanism work?
          • Benefits of Phishing Incident Responder
          • Reverse Engineering Support
          • Privacy and Security
          • Audit
          • Integrations
        • API Settings
          • Configuration steps for Office 365: Microsoft Graph App Configuration
          • Exchange Mail Configuration
          • GSuite API Configuration Guide
          • Gsuite Mail Configration
        • Analysing Suspicious Emails
          • Starting an Automatic Incident Investigation
          • Starting a Manual Incident Investigation
          • Playbook
        • FAQ (Incident Responder&Phishing Reporter)
      • Phishing Reporter Add-In
        • Installation
        • Microsoft Defender Email Reporter Add-In
      • Email Threat Simulator (ETS)
        • Creating a Trusted Account for E-mail Security Tests
          • Restriction of the Authority of the Test Account
          • Restrict Email Address
          • Enable Mailbox Audit Logging for Test Account
        • Dashboard
        • Quick Scan
        • Advanced Scan
        • Interpretation of ETS Report
        • FAQ ( ETS)
      • Threat Intelligence
        • FAQ (Threat Intelligence)
      • Report Manager
        • Phishing Campaign Report List
          • Phishing Campaign Summary
          • Statistics
          • Opened Email
          • Clicked Link in The Phishing Campaign Email
          • Submitted Form
          • Opened Attachment
          • Phishing Reporter
          • Campaign No response
          • Email Delivery Report
          • Phishing User Compare
          • Departments
        • Training Campaign Reports
          • Training Summary
          • Training Statistics
          • Opened Training Email
          • Clicked Training Link
          • View Duration
          • No Response
          • Sending Report
          • Training User Compare
          • Exam
        • Users KPI
          • User-based Grade
          • Department-based Grade
          • Target Group based grade
          • Company-based grade
        • Advanced Reporting
      • Company
        • User Role Management
      • Advanced Settings
        • Allow Email Domains
        • White Labelling
        • LDAP Settings
        • SCIM Integrations
        • Notification Templates
          • Short Codes
          • Using Notification Templates
        • Data Anonymisation
      • Available for Option
      • API Guide
        • REST API for Incident Responder (IR) Operation
        • REST API for SSO Authentication
      • Diagnostic Tool
        • FAQ
    • Maintenance Tool
    • FAQ (All Modules)
      • Video Tutorials
        • Quick Start
        • Google Workspace API Configuration Guide
        • On Premise Requirement Checker Video
        • Phishing Reporter Installation & Deployment
Powered by GitBook
On this page
  • Using with System User > Roles
  • Using with Training Module
  • Using with SMTP Setting
  1. Documentation Platform
  2. Technical Guide

Available for Option

PreviousData AnonymisationNextAPI Guide

Last updated 1 year ago

We offer the "Available for" option to set some features to be ready for use or be present.

Available for option can be used with the followings:

-- System User > Roles

-- Training

-- SMTP Settings

Using with System User > Roles

To use the Available for option with roles, go to Company > System Users > Roles.

Then, under the Available for section, you will see two options:

1- My Company Only: If you select this option, the privileges that are assigned for the roles you have created will be available for only your company.

2- Select Companies: If you have more than one companies or group of companies registered under your account, you are able to open privileges for them. As a use case, see Figure 2, for example. The privileges specified will be available only for "Starr Bank Limited".

Using with Training Module

It is also possible to use this feature with the training module. You can make present any training content to only your company or a specific company or group of companies.

To set this feature, go to Awareness Educator > Training list, select your training and click on the Edit training icon and go to Course Info. Here, choose one of the two options; see the Figure 3. below.

Using with SMTP Setting

Available for option also helps organisations to make present SMTP usage privileges to only their own company or a specific company or group of companies.

To set this feature, go to Company > SMTP Setting list select one of your existing SMTP and click on the Edit icon or create a new SMTP. Here, choose one of the two options; see the Figure 4. below.

1. Roles
2.Select Companies Option
3. Using Available for option with Training Module
4. Using Available for option for SMTP Settings