Recipients are the target users for your phishing simulation campaigns. These individuals represent your organization's user base and are the focus of your security awareness training initiatives. Each recipient profile contains demographic and organizational information that can be used to personalize campaign content and track individual susceptibility patterns.
Important: Recipients must be organized into groups before they can be included in campaigns. This group-based approach enables efficient targeting and campaign management across different organizational segments.
The recipients page displays all registered users along with their detailed information,
including organizational data and security awareness metrics. Recipients flagged as
Repeat Offenders
are clearly marked for targeted follow-up training.
Personalization: All recipient profile fields can be used as variables in email templates and phishing pages, enabling highly personalized and realistic simulation scenarios.
Each recipient's dedicated page provides comprehensive analytics and behavioral insights, enabling targeted security awareness training and personalized follow-up strategies. This detailed view helps security teams identify high-risk individuals and track improvement over time.
Use the Export Events
button to download comprehensive data including recipient profile
information and complete interaction history for reporting and analysis purposes.
The metrics cards provide instant visibility into each recipient's security awareness performance and susceptibility patterns across all campaigns:
Metric | Description |
---|---|
Total Campaigns | Number of phishing simulations this recipient has participated in |
Emails Opened | Unique email opens tracked via embedded tracking pixels |
Initial Link Clicks | First-time clicks on phishing links per campaign, indicating initial susceptibility to social engineering |
Data Submissions | Number of campaigns where recipient submitted personal information through phishing forms |
Repeat Offenses (Links) | Pattern of clicking phishing links across multiple campaigns, indicating persistent vulnerability to social engineering attacks |
Repeat Offenses (Data) | Pattern of submitting sensitive information across multiple campaigns, showing high-risk behavior requiring immediate attention |
Individual recipient creation allows you to manually add users to your phishing simulation database with detailed organizational and contact information. This method is ideal for small teams or when you need precise control over recipient data and personalization variables.
Each field serves as a personalization variable for email templates and landing pages, enabling highly targeted and realistic phishing simulations:
Field | Description and Usage |
---|---|
Email Address | Primary email address for campaign delivery and unique recipient identification |
First Name | Given name for personalized email greetings and content (e.g., "Alice") |
Last Name | Family name for formal communications and full name references (e.g., "Anderson") |
Phone Number | Contact number for multi-channel simulations and identity verification scenarios |
Extra Identifier | Additional unique identifier such as employee ID, username, or badge number for enhanced personalization |
Job Position | Professional title or role for targeted campaigns based on organizational hierarchy and responsibilities |
Department | Organizational unit for department-specific campaigns and targeted security awareness training |
City/Location | Geographic location for regional campaigns and location-specific social engineering |
Country | National location for international organizations and compliance requirements |
Additional Notes | Custom field for special considerations, training status, or other relevant information |
Privacy Recommendation: Follow data minimization principles by collecting only the information necessary for your specific campaign objectives. For basic campaigns, an email address may be sufficient for effective simulation delivery.
CSV import functionality enables efficient bulk addition of recipients from existing databases, HR systems, or directory services. This method is essential for large organizations needing to quickly populate their phishing simulation database with hundreds or thousands of users.
Your CSV file must include a header row with column names matching the recipient profile fields. The system automatically maps columns to recipient attributes based on these headers.
Here's an example of a properly formatted CSV file:
Email,Phone,ExtraIdentifier,FirstName,LastName,Position,Department,City,Country,Misc "[email protected]","+1-555-0191","EMP001","Marcus","Jenkins","Solutions Architect","Engineering","Portland","USA","Kubernetes Expert" "[email protected]","+7-916-555-0847","EMP002","Elena","Popov","Data Scientist","Analytics","Moscow","Russia","ML Specialist" "[email protected]","+91-555-8273","EMP003","Raj","Patel","DevOps Engineer","Operations","Mumbai","India","Docker Certified" "[email protected]","+47-555-9182","EMP004","Hannah","Berg","Product Owner","Product","Oslo","Norway","Agile Coach"
Flexible Column Ordering: The header columns can be arranged in any order as long as the column names exactly match the expected recipient field names. This flexibility allows you to use existing data exports without reformatting.
Data Processing: The import process validates email addresses, removes duplicates, and provides detailed feedback on any data quality issues encountered during the import process.
Recipient groups serve as the organizational foundation for campaign targeting, allowing you to segment users based on departments, locations, risk levels, or any other organizational criteria. This group-based approach enables precise campaign targeting and efficient management of large user populations across different organizational segments.
Click on any group name to access detailed group management functions, including member administration, group statistics, and campaign history. Each group page provides comprehensive tools for managing group membership and analyzing group-specific security awareness metrics.
The group management dashboard provides comprehensive tools for administering group membership, analyzing group performance, and managing recipient assignments. This centralized interface enables efficient administration of large user populations and targeted campaign planning.
The group dashboard offers multiple methods for managing group membership to accommodate different organizational workflows and data sources:
Add Recipients
to individually select and
add existing recipients to the group using the search interfaceImport from CSV
to perform large-scale member
additions from external data sourcesThe individual recipient addition interface provides precise control over group membership by allowing you to search and select existing recipients from your database. This method is ideal for small adjustments to group composition or when adding specific high-value targets to specialized campaigns.
Use the Recipients
search field to find users by typing their name, email address,
or other identifying information. The auto-complete functionality helps quickly locate specific
individuals from large recipient databases.
Group-specific CSV import enables efficient bulk addition of recipients directly to specific groups while simultaneously creating new recipient profiles as needed. This streamlined workflow is particularly valuable for onboarding new departments or organizational units into your security awareness program.
Use the same CSV format as global recipient import:
Email,Phone,ExtraIdentifier,FirstName,LastName,Position,Department,City,Country,Misc "[email protected]","+1-555-0191","EMP001","Marcus","Jenkins","Solutions Architect","Engineering","Portland","USA","Kubernetes Expert" "[email protected]","+7-916-555-0847","EMP002","Elena","Popov","Data Scientist","Analytics","Moscow","Russia","ML Specialist" "[email protected]","+91-555-8273","EMP003","Raj","Patel","DevOps Engineer","Operations","Mumbai","India","Docker Certified" "[email protected]","+47-555-9182","EMP004","Hannah","Berg","Product Owner","Product","Oslo","Norway","Agile Coach"
Flexible Headers: Column headers can be arranged in any order, providing compatibility with existing organizational data exports and HR system formats.
Group creation establishes the organizational framework for your phishing simulation campaigns. Strategic group design enables targeted campaigns based on job functions, security clearance levels, geographic locations, or risk assessments, maximizing the effectiveness of your security awareness training program.
Begin by providing a descriptive name that clearly identifies the group's purpose and target audience. Consider using naming conventions that reflect organizational structure, such as:
After creating a group, access comprehensive management functions by clicking the group name
or selecting View
from the actions menu. This opens the group dashboard where you
can: