Old UI
  • Documentation Platform
    • Technical Guide
      • Whitelisting
        • Whitelisting the Pictures on Microsoft Outlook Apps
      • Minimum Requirements
      • On-Premise Requirements
        • Restricting the Access to Portal According IP
          • How to Import SSL Certificates in IIS
        • Why does the disk on the server fill up fast?
      • Getting Started
      • Phishing Simulator
      • Awareness Educator
      • Incident Responder
        • How does investigation mechanism work?
          • Benefits of Phishing Incident Responder
          • Reverse Engineering Support
          • Privacy and Security
          • Audit
          • Integrations
        • API Settings
          • Configuration steps for Office 365: Microsoft Graph App Configuration
          • Exchange Mail Configuration
          • GSuite API Configuration Guide
          • Gsuite Mail Configration
        • Analysing Suspicious Emails
          • Starting an Automatic Incident Investigation
          • Starting a Manual Incident Investigation
          • Playbook
        • FAQ (Incident Responder&Phishing Reporter)
      • Phishing Reporter Add-In
        • Installation
        • Microsoft Defender Email Reporter Add-In
      • Email Threat Simulator (ETS)
        • Creating a Trusted Account for E-mail Security Tests
          • Restriction of the Authority of the Test Account
          • Restrict Email Address
          • Enable Mailbox Audit Logging for Test Account
        • Dashboard
        • Quick Scan
        • Advanced Scan
        • Interpretation of ETS Report
        • FAQ ( ETS)
      • Threat Intelligence
        • FAQ (Threat Intelligence)
      • Report Manager
        • Phishing Campaign Report List
          • Phishing Campaign Summary
          • Statistics
          • Opened Email
          • Clicked Link in The Phishing Campaign Email
          • Submitted Form
          • Opened Attachment
          • Phishing Reporter
          • Campaign No response
          • Email Delivery Report
          • Phishing User Compare
          • Departments
        • Training Campaign Reports
          • Training Summary
          • Training Statistics
          • Opened Training Email
          • Clicked Training Link
          • View Duration
          • No Response
          • Sending Report
          • Training User Compare
          • Exam
        • Users KPI
          • User-based Grade
          • Department-based Grade
          • Target Group based grade
          • Company-based grade
        • Advanced Reporting
      • Company
        • User Role Management
      • Advanced Settings
        • Allow Email Domains
        • White Labelling
        • LDAP Settings
        • SCIM Integrations
        • Notification Templates
          • Short Codes
          • Using Notification Templates
        • Data Anonymisation
      • Available for Option
      • API Guide
        • REST API for Incident Responder (IR) Operation
        • REST API for SSO Authentication
      • Diagnostic Tool
        • FAQ
    • Maintenance Tool
    • FAQ (All Modules)
      • Video Tutorials
        • Quick Start
        • Google Workspace API Configuration Guide
        • On Premise Requirement Checker Video
        • Phishing Reporter Installation & Deployment
Powered by GitBook
On this page
  • Q: There are users who have quit their job. How can I report them?
  • Q: Some users have the add-in enabled, but they seem offline on the interface. Why?
  • Q: How do I know if the add-in is disabled by the user or by Outlook?
  • Q: How do I report add-in details to different teams?
  • Q: Can I have different teams log into the Keepnet Portal and see only the Outlook detail report page?
  1. Documentation Platform
  2. Technical Guide
  3. Diagnostic Tool

FAQ

PreviousDiagnostic ToolNextMaintenance Tool

Last updated 1 year ago

Q: There are users who have quit their job. How can I report them?

A: The Keepnet portal can automatically match user accounts with . Once you have made this definition, if a user account is disabled or deleted in Active Directory, you will be able to view these details as described in Scenario 6

Q: Some users have the add-in enabled, but they seem offline on the interface. Why?

A: If the add-in is installed and active, but seems Offline, then the Outlook application is closed. If Outlook is still running, but it is still Offline, it means that there is a communication problem between the add-in and the server. You can easily detect this problem from the logs created by the add-in on the user's computer or get support from our support team.

Q: How do I know if the add-in is disabled by the user or by Outlook?

A: If you see the “Deactivated" notification, then it is disabled by the user. If it says “Disabled", it means that it is disabled by Outlook. You can verify this from the interface of Outlook Desktop in the File> Options> Add-Ins window.

Q: How do I report add-in details to different teams?

A: Using the “Schedule Report” feature, you can send user details to any email address at specific times.

Q: Can I have different teams log into the Keepnet Portal and see only the Outlook detail report page?

A: With the “” feature, you can authorise any user.

LDAP queries from the Active Directory server
User Role Management