Old UI
  • Documentation Platform
    • Technical Guide
      • Whitelisting
        • Whitelisting the Pictures on Microsoft Outlook Apps
      • Minimum Requirements
      • On-Premise Requirements
        • Restricting the Access to Portal According IP
          • How to Import SSL Certificates in IIS
        • Why does the disk on the server fill up fast?
      • Getting Started
      • Phishing Simulator
      • Awareness Educator
      • Incident Responder
        • How does investigation mechanism work?
          • Benefits of Phishing Incident Responder
          • Reverse Engineering Support
          • Privacy and Security
          • Audit
          • Integrations
        • API Settings
          • Configuration steps for Office 365: Microsoft Graph App Configuration
          • Exchange Mail Configuration
          • GSuite API Configuration Guide
          • Gsuite Mail Configration
        • Analysing Suspicious Emails
          • Starting an Automatic Incident Investigation
          • Starting a Manual Incident Investigation
          • Playbook
        • FAQ (Incident Responder&Phishing Reporter)
      • Phishing Reporter Add-In
        • Installation
        • Microsoft Defender Email Reporter Add-In
      • Email Threat Simulator (ETS)
        • Creating a Trusted Account for E-mail Security Tests
          • Restriction of the Authority of the Test Account
          • Restrict Email Address
          • Enable Mailbox Audit Logging for Test Account
        • Dashboard
        • Quick Scan
        • Advanced Scan
        • Interpretation of ETS Report
        • FAQ ( ETS)
      • Threat Intelligence
        • FAQ (Threat Intelligence)
      • Report Manager
        • Phishing Campaign Report List
          • Phishing Campaign Summary
          • Statistics
          • Opened Email
          • Clicked Link in The Phishing Campaign Email
          • Submitted Form
          • Opened Attachment
          • Phishing Reporter
          • Campaign No response
          • Email Delivery Report
          • Phishing User Compare
          • Departments
        • Training Campaign Reports
          • Training Summary
          • Training Statistics
          • Opened Training Email
          • Clicked Training Link
          • View Duration
          • No Response
          • Sending Report
          • Training User Compare
          • Exam
        • Users KPI
          • User-based Grade
          • Department-based Grade
          • Target Group based grade
          • Company-based grade
        • Advanced Reporting
      • Company
        • User Role Management
      • Advanced Settings
        • Allow Email Domains
        • White Labelling
        • LDAP Settings
        • SCIM Integrations
        • Notification Templates
          • Short Codes
          • Using Notification Templates
        • Data Anonymisation
      • Available for Option
      • API Guide
        • REST API for Incident Responder (IR) Operation
        • REST API for SSO Authentication
      • Diagnostic Tool
        • FAQ
    • Maintenance Tool
    • FAQ (All Modules)
      • Video Tutorials
        • Quick Start
        • Google Workspace API Configuration Guide
        • On Premise Requirement Checker Video
        • Phishing Reporter Installation & Deployment
Powered by GitBook
On this page
  1. Documentation Platform
  2. Technical Guide
  3. Email Threat Simulator (ETS)

Interpretation of ETS Report

PreviousAdvanced ScanNextFAQ ( ETS)

Last updated 2 years ago

The report interface contains all the details of the simulation result. Suggestions for findings and references contain guiding details for you to develop solutions.

Successful attacks are reported as “failed”, which is a problem that you are affected by and should be resolved

Failed attacks are reported as “pass”. This indicates that you are not affected by such attacks.

The summary of the results is listed as follows.

Secure: Malicious email samples are failed to bypass your security solutions and get to your inbox. You're safe!

Insecure: Malicious email samples are able to bypass your security solutions and get to your inbox. You're not safe!

Unchecked: When the integration is not made to get the sent email samples status, then information is not available.

Scorecards and Development Chart

The platform's ETS gives scores from A to F according to the results. The calculation of these points is as follows;

  • A=90-100

  • B=80-90

  • C=60-80

  • D=40-60

  • F=0-40

And the score tables point out:

  • Score: The score calculated according to the average of Phishing, Vulnerability, CTI (Cyber Threat Intelligence) scores.

  • Phishing Score: The score you have calculated according to what you have received from Our Phishing simulator.

  • Vulnerability Score: The score is created based on the results of the weakness scan.

  • CTI Score: The percentage of points awarded by the cyber intelligence services.

Email Threat Simulation Scorecard

The last 7 scan results provide visuals to report for your progress. You can see your progress based on Passed, Failed and Unchecked output.

Getting Help

Please feel free to contact us with any questions you may have.

Email Threat Simulation Scorecard

support@keepnetlabs.com