Skip to main content

Scenarios Library

Phishing scenario catalogue

Updated over a month ago

This article explains how phishing scenarios work, how they are used to evaluate employees, and the available actions in the scenario library.


1 – Objectives

  • Filter and navigate the list of scenarios

  • Select or create scenarios adapted to your organisation


2 – Prerequisites

  • Admin-level permissions to manage scenarios

  • Access to Phishing Simulation → Scenarios


3 – Understanding what a scenario is

3.1 – Definition

A scenario is used to evaluate an employee up to the point of potential compromise.

Compromise occurs when the user enters their credentials into a fake landing page.

3.2 – Components of a scenario

A scenario always includes two elements:

  • A phishing email containing a malicious link

  • A landing page designed to capture credentials

3.3 – Using the scenario library

The scenario list acts as a library of realistic simulations.

The effectiveness of a campaign relies heavily on scenario selection: the more credible and contextualised the scenario is, the harder it will be to detect.

To access the library, click Scenarios under Phishing Simulation in the left navigation menu.

“Scenarios” tab showing an active filter with empty search field and a list of AI-Powered scenarios in the library.


4 – Filter and search for a scenario

4.1 – Use filters

Filter the scenarios to display only those relevant to your internal environment.
Filters may include:

  • Language

  • Difficulty level

Scenario search interface with search field highlighted in the Vendors filter section.
  • Vendor (industry, service type, or associated digital ecosystem)

Recherche d’un scénario par nom dans le panneau latéral gauche, champ de recherche mis en surbrillance dans la section Vendors.

4.2 – Search by name

Use the search bar to quickly locate a specific scenario.

Scenario search panel showing search field in use.

4.3 – Access custom and favorite scenarios

  • Click My Scenarios to display duplicated or edited scenarios

  • Click the star icon to add a scenario to your favorites
    → Favorited scenarios automatically appear at the top

My Scenarios section filtered with search field active.


5 – Available actions on a scenario

The library provides 5 key actions:

  • Add to favorites (click the star)

  • Preview the phishing email

  • Preview the credential-harvesting landing page

  • Preview the training page (used in Training Campaigns after compromise)

  • Duplicate a scenario to customise it

Arsen scenario card with visible action menu: preview, duplicate, edit.


6 – Create a new scenario

If you are comfortable with HTML/CSS:

  • Go to My Scenarios

  • Click Create a new scenario

  • Build:

    • the phishing email

    • the landing page

    • all required components

My Scenarios view with “Create a new scenario” highlighted in the top-right corner.


7 – Understanding scenario difficulty levels

7.1 – Available difficulty levels

Scenarios are classified into three categories:

  • Easy

  • Medium

  • Hard

Scenario creation screen with scenario name filled in and difficulty set to Medium.

7.2 – Factors influencing difficulty

Several factors impact how difficult a scenario is to detect:

  • Credibility of the sender domain

  • URL subtlety on the landing page

  • Presence or absence of spelling errors

  • Simulated suspicious login from an unexpected country

  • Similarity to tools used internally

  • Urgency of the message (urgency increases compromise rates)

Did this answer your question?