Sophos Whitelisting
Sophos Whitelisting Using Sophos security software, you can safelist (whitelist) VENZA to allow your users to receive our simulated phishing and system emails. If you
Generating the Risk Score Card
Navigating the VENZA System™ Dashboard
Accessing The New VENZA System™
Generating the Executive Summary
Bulk-Upload Multiple New Users
Phishing Campaign False Positives
Certifying Group Training Attendees
How to Assign Courses and Learning Paths
Generate the Phishing Simulation Report
Phishing Simulations with VENZA
Course Navigation Troubleshooting
How to Run the Training Percentage Report
Set up Auto-Reports in VENZA Peak
Sophos Whitelisting Using Sophos security software, you can safelist (whitelist) VENZA to allow your users to receive our simulated phishing and system emails. If you
Mimecast Whitelisting Using Mimecast security software, you can safelist (whitelist) VENZA to allow your users to receive our simulated phishing and system emails. If you run
Microsoft 365 Whitelisting These instructions will help you configure the delivery of third-party phishing simulations to Microsoft 365 Defender. NOTE: You must be assigned permissions
Gmail Whitelisting These instructions will help you configure the delivery of third-party phishing simulations to Google Gmail. NOTE: You must have an administrator account to perform
Fortinet Whitelisting Using Fortinet security software, you can safelist (whitelist) VENZA to allow your users to receive our simulated phishing and system emails. If you run
Cisco Whitelisting Using Cisco Ironport security software, you can safelist (whitelist) VENZA to allow your users to receive our simulated phishing and system emails. If you
Email Whitelisting Whitelisting is a cybersecurity and information technology (IT) term that refers to allowing certain email domains (e.g., example@domain.com) and internet protocols (IPs) through
Phishing Campaign False Positives What’s a false positive? A false positive occurs when a system reports an event, such as a target clicking on a
How to Generate the Phishing Report This article will provide you with information on how to run and read the Phishing Report, so you can
Phishing Simulations with VENZA To train personnel to recognize and report phishing attempts, VENZA provides phishing campaigns as part of the Denali and Everest packages. These