Old UI
  • Documentation Platform
    • Technical Guide
      • Whitelisting
        • Whitelisting the Pictures on Microsoft Outlook Apps
      • Minimum Requirements
      • On-Premise Requirements
        • Restricting the Access to Portal According IP
          • How to Import SSL Certificates in IIS
        • Why does the disk on the server fill up fast?
      • Getting Started
      • Phishing Simulator
      • Awareness Educator
      • Incident Responder
        • How does investigation mechanism work?
          • Benefits of Phishing Incident Responder
          • Reverse Engineering Support
          • Privacy and Security
          • Audit
          • Integrations
        • API Settings
          • Configuration steps for Office 365: Microsoft Graph App Configuration
          • Exchange Mail Configuration
          • GSuite API Configuration Guide
          • Gsuite Mail Configration
        • Analysing Suspicious Emails
          • Starting an Automatic Incident Investigation
          • Starting a Manual Incident Investigation
          • Playbook
        • FAQ (Incident Responder&Phishing Reporter)
      • Phishing Reporter Add-In
        • Installation
        • Microsoft Defender Email Reporter Add-In
      • Email Threat Simulator (ETS)
        • Creating a Trusted Account for E-mail Security Tests
          • Restriction of the Authority of the Test Account
          • Restrict Email Address
          • Enable Mailbox Audit Logging for Test Account
        • Dashboard
        • Quick Scan
        • Advanced Scan
        • Interpretation of ETS Report
        • FAQ ( ETS)
      • Threat Intelligence
        • FAQ (Threat Intelligence)
      • Report Manager
        • Phishing Campaign Report List
          • Phishing Campaign Summary
          • Statistics
          • Opened Email
          • Clicked Link in The Phishing Campaign Email
          • Submitted Form
          • Opened Attachment
          • Phishing Reporter
          • Campaign No response
          • Email Delivery Report
          • Phishing User Compare
          • Departments
        • Training Campaign Reports
          • Training Summary
          • Training Statistics
          • Opened Training Email
          • Clicked Training Link
          • View Duration
          • No Response
          • Sending Report
          • Training User Compare
          • Exam
        • Users KPI
          • User-based Grade
          • Department-based Grade
          • Target Group based grade
          • Company-based grade
        • Advanced Reporting
      • Company
        • User Role Management
      • Advanced Settings
        • Allow Email Domains
        • White Labelling
        • LDAP Settings
        • SCIM Integrations
        • Notification Templates
          • Short Codes
          • Using Notification Templates
        • Data Anonymisation
      • Available for Option
      • API Guide
        • REST API for Incident Responder (IR) Operation
        • REST API for SSO Authentication
      • Diagnostic Tool
        • FAQ
    • Maintenance Tool
    • FAQ (All Modules)
      • Video Tutorials
        • Quick Start
        • Google Workspace API Configuration Guide
        • On Premise Requirement Checker Video
        • Phishing Reporter Installation & Deployment
Powered by GitBook
On this page
  • This is the option that you can use to customise profiles, policies and schedules.
  • 3.1. Creating a new Profile
  • 3.2. Creating a New Policy
  • 3.3. Creating a Schedule Scan
  • 4. Profiles
  • 4.1. Create
  • 5. Policies
  • 6. Schedules
  • 6.1. Selecting a company
  • 6.2. Create
  • 7. Reports
  • 8. Plugins
  • 8.1. Create Plugins
  1. Documentation Platform
  2. Technical Guide
  3. Email Threat Simulator (ETS)

Advanced Scan

PreviousQuick ScanNextInterpretation of ETS Report

Last updated 2 years ago

This is the option that you can use to customise profiles, policies and schedules.

3.1. Creating a new Profile

This is the section in which you can find SMTP, POP3, IMAP or OWA access information of the email service which is to be tested.

3.1.1. Profile Information

In order to create a profile, this wizard helps you to complete settings.

3.1.2. SMTP

SMTP is the mail sending protocol used in order to define the validity of the credentials given by the companies by connecting with the SMTP information they provided.

3.1.3. POP3 & IMAP

Pop3 and IMAP are protocols that allow us to access emails in the mail server to our computer.

3.2. Creating a New Policy

The policy is a section that includes ETS attack vectors, and it is customised on the screenshot below.

3.2.1. Profile

We apply the policy to the profile(s) that we created in the previous steps.

3.2.2. Plugins

This section enables us to select plugins for customising the policy. For example, you can test your email service only by using a specific threat vector-like ransomware or Malicious Attachments or only test with Meterpreter Sample 1.

3.3. Creating a Schedule Scan

3.3.1. Schedule

We can schedule tests daily, weekly, monthly and yearly intervals.

4. Profiles

4.1. Create

In order to create a profile, the wizard helps you to complete settings. You can find SMTP, POP3, IMAP or OWA access information of the email service, which is to be tested.

5. Policies

The policy is a section that includes ETS attack vectors, and it is customised on the screenshot below.

6. Schedules

We can see a list of our scheduled tests, and we can access their reports.

6.1. Selecting a company

This feature is for Root and reseller accounts. You can select a company to see their schedules of ETS.

6.2. Create

You can create a new ETS schedule.

7. Reports

You can access the reports of all tests.

8. Plugins

Each email-based attack type on ETS named as a plugin. You can list all categories and plugins on this page.

8.1. Create Plugins

You can create a new plugin (a new email-based attack vector) here.

8.1.1. Plugin Information

Name

Definition

Plugin Category *

Select a category

Plugin Name *

Type a plugin name

Plugin Body *

Explain plugin details

Synopsis *

Explain the plugin shortly

Description *

Explain plugin details

Solution *

Type solutions

PublicationDate

The date when the Plugin published

Risk Factor *

Type the Risk Factor of

Effect *

The systems it will affect

8.1.2. Mail Content

Name

Explanation

EML *

Upload the plugin in EML file format

Header Name

Add the name to the Header optionally.

Header Value

Add the value to the Header optionally.

Picture 9. Plugins
Picture 4. Profile Creation Screen
Picture 5. Profile
Picture 6. Creating a New Policy
Picture 7. Creating a New Profile
Picture 6. Creating a New Policy