Old UI
  • Documentation Platform
    • Technical Guide
      • Whitelisting
        • Whitelisting the Pictures on Microsoft Outlook Apps
      • Minimum Requirements
      • On-Premise Requirements
        • Restricting the Access to Portal According IP
          • How to Import SSL Certificates in IIS
        • Why does the disk on the server fill up fast?
      • Getting Started
      • Phishing Simulator
      • Awareness Educator
      • Incident Responder
        • How does investigation mechanism work?
          • Benefits of Phishing Incident Responder
          • Reverse Engineering Support
          • Privacy and Security
          • Audit
          • Integrations
        • API Settings
          • Configuration steps for Office 365: Microsoft Graph App Configuration
          • Exchange Mail Configuration
          • GSuite API Configuration Guide
          • Gsuite Mail Configration
        • Analysing Suspicious Emails
          • Starting an Automatic Incident Investigation
          • Starting a Manual Incident Investigation
          • Playbook
        • FAQ (Incident Responder&Phishing Reporter)
      • Phishing Reporter Add-In
        • Installation
        • Microsoft Defender Email Reporter Add-In
      • Email Threat Simulator (ETS)
        • Creating a Trusted Account for E-mail Security Tests
          • Restriction of the Authority of the Test Account
          • Restrict Email Address
          • Enable Mailbox Audit Logging for Test Account
        • Dashboard
        • Quick Scan
        • Advanced Scan
        • Interpretation of ETS Report
        • FAQ ( ETS)
      • Threat Intelligence
        • FAQ (Threat Intelligence)
      • Report Manager
        • Phishing Campaign Report List
          • Phishing Campaign Summary
          • Statistics
          • Opened Email
          • Clicked Link in The Phishing Campaign Email
          • Submitted Form
          • Opened Attachment
          • Phishing Reporter
          • Campaign No response
          • Email Delivery Report
          • Phishing User Compare
          • Departments
        • Training Campaign Reports
          • Training Summary
          • Training Statistics
          • Opened Training Email
          • Clicked Training Link
          • View Duration
          • No Response
          • Sending Report
          • Training User Compare
          • Exam
        • Users KPI
          • User-based Grade
          • Department-based Grade
          • Target Group based grade
          • Company-based grade
        • Advanced Reporting
      • Company
        • User Role Management
      • Advanced Settings
        • Allow Email Domains
        • White Labelling
        • LDAP Settings
        • SCIM Integrations
        • Notification Templates
          • Short Codes
          • Using Notification Templates
        • Data Anonymisation
      • Available for Option
      • API Guide
        • REST API for Incident Responder (IR) Operation
        • REST API for SSO Authentication
      • Diagnostic Tool
        • FAQ
    • Maintenance Tool
    • FAQ (All Modules)
      • Video Tutorials
        • Quick Start
        • Google Workspace API Configuration Guide
        • On Premise Requirement Checker Video
        • Phishing Reporter Installation & Deployment
Powered by GitBook
On this page
  • 1.1. Score
  • 1.2. Phishing Score
  • 1.3. Vulnerability Score
  • 1.4. CTI (Cyber Threat Intelligence) Score
  • 1.5. Last Scan and Vulnerability Trend
  • 1.6. Most Recent Vulnerabilities
  • 1.7. Recent Data Leakage
  1. Documentation Platform
  2. Technical Guide
  3. Email Threat Simulator (ETS)

Dashboard

PreviousEnable Mailbox Audit Logging for Test AccountNextQuick Scan

Last updated 2 years ago

The dashboard section is the page on which you can see the score, phishing score, vulnerability score, CTI score and the last scan and vulnerability trend.

1.1. Score

This is your overall score of ETS. It is the sum of phishing score, vulnerability score and CTI score.

1.2. Phishing Score

This is the data fetched from your phishing campaigns. It is the company’s phishing campaign score.

1.3. Vulnerability Score

This is the vulnerability score of the campaign, which is calculated by vulnerability level. ETS generates score according to severity value of the emails those bypass email services and gets to the inbox, or the emails are blocked.

1.4. CTI (Cyber Threat Intelligence) Score

If there is a leak related to the company, the score goes up to 100, which means that the situation is not good for the company.

1.5. Last Scan and Vulnerability Trend

This section illustrates the last scans in graphics, in which is it possible to see how many tests the company run, how many emails got to the inbox and didn't or progress on company vulnerability.

1.6. Most Recent Vulnerabilities

This section demonstrates which of the email-based attacks got to inbox most.

1.7. Recent Data Leakage

This section reveals the leaks in the last ETS test.

Picture 1. ETS Dashboard