| Online Documentation
deutsch english polski

G DATA Phishing Simulation

    • General product information
      • Scope of services of the standard campaign and possible additional services of your G DATA Awareness Phishing Simulation
      • The course of a phishing simulation campaign
      • The G DATA Awareness Manager
      • Whitelisting
      • Information regarding automatic downloads of images by e-mail clients
      • Invite others to collaborate in the G DATA Awareness Manager
      • Report suspected phishing emails directly via a button in Outlook
    • Step-by-step instructions
      • Entering participants manually
      • Import participants via csv file
      • Grouping participants
      • Microsoft Exchange Online and Microsoft Defender standard setup for a Phishing Simulation
      • Whitelist IP addresses, Exchange Online (Office 365)
      • Whitelist IP addresses used by G DATA in the spam filter, Exchange Online (Office 365)
      • Whitelisting, Exchange Server 2019
      • Bypassing Advanced Threat Protection in Defender P1 for links and attachments
      • Sending test mails
      • Installation of the G DATA phishing report button in Outlook via Exchange Online
      • Uninstalling the G DATA phishing report button in Outlook via Exchange Online
      • Installation of the G DATA phishing report button in Outlook via Exchange Server 2019
      • Uninstalling the G DATA phishing report button in Outlook via Exchange 2019
    • Frequently asked questions
      • Which categories are considered in a G DATA phishing simulation?
      • What happens to sensitive data entered by a participant via a link?
      • Can I abort a phishing simulation?
      • Can phishing campaigns be created in different languages via the Awareness Manager?
      • When is an attachment considered open?
      • When is an e-mail considered opened?
      • Where can participants find the button for reporting recognised phishing emails?
      • What feedback do participants receive after reporting a phishing e-mail?
      • What do you need to know when whitelisting in a Microsoft hybrid environment and when using third-party antivirus software?
  • G DATA Phishing Simulation
  • Frequently asked questions

G DATA Phishing Simulation

  • Which categories are considered in an G DATA Phishing Simulation?

  • What happens to sensitive data entered by a participant via a link?

  • Can I abort a phishing simulation?

  • Can phishing campaigns be created in different languages via the Awareness Manager?

  • When is an attachment considered as opened?

  • When is an e-mail considered as opened?

  • Where can participants find the button for reporting recognised phishing emails?

  • What feedback do participants receive after reporting a phishing e-mail?

  • What do you need to know when whitelisting in a Microsoft hybrid environment and when using third-party antivirus software?

Uninstalling the G DATA phishing report button in Outlook via Exchange 2019 Which categories are considered in a G DATA phishing simulation?

Content © 2023 G DATA CyberDefense AG. All rights reserved.
This page was built by using the Antora default UI, The source code for this UI is licensed under the terms of the MPL-2.0 license

  • Impressum
  • Datenschutzerklärung
  • Kontakt