Articles on: ๐Ÿš€ Campaigns

How to access acquired data from a campaign?

Consulting campaign data is essential for understanding employee behavior within your company.

The data measured during a campaign is a snapshot in time that allows you to assess your company's level of vulnerability.

Humans can become the first line of defense for your company. To achieve this, three conditions must be met:

๐Ÿ“š Ensure that employees have the necessary theoretical knowledge to identify a threat.
โœ๏ธ Ensure they have the reflex to mobilize this knowledge in the face of a concrete threat, even if it is difficult to identify.
๐Ÿ™‹โ€โ™‚๏ธ Ensure that they become proactive in reporting threats.

Summary



Accessing campaign data
Visualizing campaign steps
Reading campaign macro data
Reading a collaborator's action history in a campaign
Exporting campaign data

Accessing campaign data



To access campaign data, click on the Campaigns section in the Phishing Simulation category.

Then click on the name of the campaign to view its data.



Viewing the stages of a campaign



A campaign progresses through different statuses as shown in the timeline below:




Reading macro data from a campaign



You have a table presenting the main data collected on the campaign as soon as you arrive on the campaign, just below the timeline.

It shows:

The reminder of the number of target(s)

The total number of emails delivered. Sometimes, some emails do not reach their targets for various reasons, such as the departure of the employee from the company, a full inbox...

โ˜๏ธThere are two types of errors:

๐Ÿ”ด The "hard bounce": the email cannot be sent definitively
๐ŸŸ  The "soft bounce": the email cannot be sent momentarily, but a new attempt will be made later.

๐Ÿงฎ The count of these errors is located just next to the number of delivered emails. Note that this is an additional counter, which means that even if an email successfully reaches the inbox after a failure, this failure is still counted and does not subtract from the number of emails that did not succeed after an attempted send.

3.The count of email opens.

The count of clicks on the link in the email.

The count of compromises, i.e., the number of targets who entered the identifier/password pair on the landing page pointed to by the phishing email.

The count of reports from employees.

You have average and median data on the time between email reception and click, the time between email reception and compromise, and finally the time taken between click and compromise.



Finally, you have the security score obtained on this campaign. To learn more about the security score, click here.

Reading the history of a collaborator's actions in a campaign



To access the details of a collaborator's actions in a campaign, you must click on the employee's name and expand the list of events acquired following their actions.



By clicking on the Show Payload button below an event, you will have access to the details of your employee's connection.



For each event, you also have the precise date and time of the event. You have a way to see and understand your collaborator's behavior in the face of the threat.

Exporting campaign data



To export your campaign data, you have an Export Campaign button that appears when the campaign is in Completed status.

You can then export your campaign data in different formats:

In an ordered spreadsheet in .csv format
In a consolidated PDF file.

Updated on: 13/04/2023

Was this article helpful?

Share your feedback

Cancel

Thank you!