Skip to main content

Ongoing Campaign Progress

View an Ongoing Campaign

Updated over a month ago

Reviewing campaign data is essential to understanding employee behavior across your organization.

Human vigilance can become the first firewall of your company.

To do this, three conditions must be met:

  • Ensure employees have the theoretical knowledge required to recognize a threat.

  • Ensure they apply this knowledge when facing a real, sometimes subtle threat.

  • Ensure they become proactive in reporting suspicious activity.


1 – Objectives

  • Understand the evolution and results of a phishing campaign

  • Analyze employee behavior when exposed to threats

  • Measure the overall performance of a campaign

  • Identify improvement areas to strengthen human security


2 – Prerequisites

  • Access to the Phishing Simulation module

  • At least one campaign completed or in progress

  • Necessary rights to view detailed campaign data


3 – Access campaign data

3.1 – Access the campaign list

Click Campaigns in the Phishing Simulation module.

3.2 – Open a campaign’s data

Click the campaign name to view all associated information.

Arsen active campaign list showing a recurring campaign identified with a scheduler icon.


4 – View the campaign timeline

Review the timeline to understand the different statuses the campaign goes through.

Progress bar showing the stages of a campaign: Scheduled, Running, Completed.


5 – Read campaign data

5.1 – View key indicators

Access the summary table showing:

  • Total number of targets

  • Total number of delivered emails

  • Total number of bounced emails

Live campaign view showing real-time statistics: total targets, delivered, opened, clicked, reported, compromised.

📚 Note
Two types of bounces exist:

  • Hard bounce: the email can never be delivered

  • Soft bounce: the email is temporarily undeliverable; another attempt will be made

⚠️ The bounce counter is cumulative, even if the email is eventually delivered.

5.2 – Analyze employee interactions

Review:

  • Number of email opens

  • Number of clicks

  • Number of compromises (credentials entered)

  • Number of phishing reports

5.3 – Analyze reaction times

View average and median metrics for:

  • Time between email delivery and click

  • Time between email delivery and compromise

  • Time between click and compromise

Table showing average and median click and compromise times for a phishing campaign.

5.4 – View the security score

Check the security score obtained for this campaign.
A dedicated link provides details on how it is calculated.


6 – View a collaborator’s event history and password entropy

User event history showing Sent, Delivered, Clicked, Compromised with access to payload.

6.1 – Access detailed user activity

Click the collaborator’s name to see all actions they performed during the campaign.

6.2 – View event information

For each event, review:

  • Exact date and time

  • Event details via Show Payload

Detailed user view showing Reported and Compromised events with payload data displayed.

For compromise events, you can view:

  • Password strength (weak, medium, strong)

  • Password entropy estimating the time required to brute-force it

User row showing Compromised status with password icon indicating credential-based compromise.


7 – Export campaign data

7.1 – Access the export

The campaign must be in Completed status.

Click Export Campaign when it becomes available.

7.2 – Choose the export format

Two formats are available:

  • CSV file (structured spreadsheet format)

  • PDF consolidated report

Campaign results dashboard showing key statistics and the “Export Campaign” button.

Did this answer your question?