Old UI
  • Documentation Platform
    • Technical Guide
      • Whitelisting
        • Whitelisting the Pictures on Microsoft Outlook Apps
      • Minimum Requirements
      • On-Premise Requirements
        • Restricting the Access to Portal According IP
          • How to Import SSL Certificates in IIS
        • Why does the disk on the server fill up fast?
      • Getting Started
      • Phishing Simulator
      • Awareness Educator
      • Incident Responder
        • How does investigation mechanism work?
          • Benefits of Phishing Incident Responder
          • Reverse Engineering Support
          • Privacy and Security
          • Audit
          • Integrations
        • API Settings
          • Configuration steps for Office 365: Microsoft Graph App Configuration
          • Exchange Mail Configuration
          • GSuite API Configuration Guide
          • Gsuite Mail Configration
        • Analysing Suspicious Emails
          • Starting an Automatic Incident Investigation
          • Starting a Manual Incident Investigation
          • Playbook
        • FAQ (Incident Responder&Phishing Reporter)
      • Phishing Reporter Add-In
        • Installation
        • Microsoft Defender Email Reporter Add-In
      • Email Threat Simulator (ETS)
        • Creating a Trusted Account for E-mail Security Tests
          • Restriction of the Authority of the Test Account
          • Restrict Email Address
          • Enable Mailbox Audit Logging for Test Account
        • Dashboard
        • Quick Scan
        • Advanced Scan
        • Interpretation of ETS Report
        • FAQ ( ETS)
      • Threat Intelligence
        • FAQ (Threat Intelligence)
      • Report Manager
        • Phishing Campaign Report List
          • Phishing Campaign Summary
          • Statistics
          • Opened Email
          • Clicked Link in The Phishing Campaign Email
          • Submitted Form
          • Opened Attachment
          • Phishing Reporter
          • Campaign No response
          • Email Delivery Report
          • Phishing User Compare
          • Departments
        • Training Campaign Reports
          • Training Summary
          • Training Statistics
          • Opened Training Email
          • Clicked Training Link
          • View Duration
          • No Response
          • Sending Report
          • Training User Compare
          • Exam
        • Users KPI
          • User-based Grade
          • Department-based Grade
          • Target Group based grade
          • Company-based grade
        • Advanced Reporting
      • Company
        • User Role Management
      • Advanced Settings
        • Allow Email Domains
        • White Labelling
        • LDAP Settings
        • SCIM Integrations
        • Notification Templates
          • Short Codes
          • Using Notification Templates
        • Data Anonymisation
      • Available for Option
      • API Guide
        • REST API for Incident Responder (IR) Operation
        • REST API for SSO Authentication
      • Diagnostic Tool
        • FAQ
    • Maintenance Tool
    • FAQ (All Modules)
      • Video Tutorials
        • Quick Start
        • Google Workspace API Configuration Guide
        • On Premise Requirement Checker Video
        • Phishing Reporter Installation & Deployment
Powered by GitBook
On this page
  • Company List
  • New Company
  • System Users
  • Set Multi-Factor Authentication (MFA) for System User
  • Target Users
  • SMTP Setting List
  1. Documentation Platform
  2. Technical Guide

Company

PreviousAdvanced ReportingNextUser Role Management

Last updated 1 year ago

In the Company section, you have a number of options like configuring your company or sub-company settings or adding a new company to the system or a new user to your company or sub-/companies.

Company List

In the Company List, you will see your own company and the other companies registered under your brand (your sub-companies).

You can edit, add a new user to a specific company under your brand, and track the logs under the Action tab. See the highlighted area in the screenshot below.

New Company

You can also add a new company under your brand. Go to Company > New Company and fill in the related fields.

Title

Description

Name

The admin name of the sub-company

Surname

The admin surname of the sub-company

Email

The admin email of the sub-company

Phone Number

The admin phone number of the sub-company

License expire date

The expiry date of product usage

Company logo

You can add the company logo here. The aspect ratio logos are automatically adjusted. However, for the best results, the logo size must be 170px x 61px.

Company Name

The name of the sub-company.

Site URL

Web page URL of the sub-company

Address

The address of sub-company

Country

The country of the sub-company

Industry

The industry that sub-company belongs

Licenses

License information of the sub-company. Note that each email corresponds to one license.

System Users

System users are the Admins that manage Dashboard. To add a new system user or edit the existing ones Go to Company> System Users.

To edit an existing system user, for instance, find out the relevant user on the system users list and click the Edit icon - see screenshot below.

Then, you can edit the user like in the screenshot below. You can change his name, phone number, status (if you choose Passive, he will not able to use Dashboard), and his role.

Set Multi-Factor Authentication (MFA) for System User

MFA is an additional authentication mechanism and a layer of security applied to ensure that access to the Platform is allowed only after two pieces of evidence are provided.

How to enable multi-factor authentication?

You can follow the steps below to enable MFA on the platform and add extra security to your account.

If you cannot access multiple authentication applications, the platform may send a code to your phone so that you can recover your account. Therefore, before activating the multi-factor authentication, keep your mobile phone ready to get codes.

  1. Click on Company in the left menu.

  2. Then select System Users.

  3. Find your own user in the list and click the edit button.

  4. On this page, you can see and update your phone number.

Download a multi-authentication app to your mobile device. The list of applications supported by the platform is as follows:

  1. Microsoft Authenticator

  2. Google Authenticator

  3. Authy

  4. Duo Mobile

  5. LastPass Authenticator

Then login to the platform:

  1. Click on your name in the top left menu.

  2. Click on Security Select the Multi-factor Authentication option.

  3. Log in to the multi-authentication application from your mobile device and scan the QR code that appears on the platform.

  4. If you have trouble reading the QR code, you can enter the code given to you on the screen.

  5. After scanning the QR code, enter the code shown to you by the multi-authentication application on the platform.

  6. Then activate MFA by clicking the confirm button.

An Alternative Access Scenario

The platform can send a code to your phone via SMS so that you can log in to your account in case you lose your mobile device or cannot access the multi-authentication application.

If you face such a situation, select the Can't login option at the bottom of the screen while on the multi-authentication screen. The platform will send an SMS to your phone number registered in the system and you can log in with the code in this SMS.

Account Recovery

Target Users

Target Users are your target group that is to take phishing simulation campaigns or cybersecurity training emails.

SMTP Setting List

To use Dashboard efficiently, you have to configure your SMTP settings.

If there is a situation where you cannot log in to your account in any way, you can contact the and create a recovery request for your account.

Support team
Company List
Editing, Adding a New User to the Company, or Tracking the Logs
Adding a New Company
Figure 1. Editing a System User
Figure 2. Editing a System User