Exploring the Reports Section in TSAT

Exploring the Reports Section in TSAT

In TSAT) the Reports section serves as a robust repository of insights, providing a comprehensive analysis of campaign performance, user behavior, and incident response. Let's delve into the Reports section of TSAT, exploring its various subsections and the wealth of information they offer.
  1. Campaign Analytics

The Campaign Analytics sub-section furnishes organizations with an in-depth overview of all campaigns executed within TSAT, offering a wealth of metrics and graphical representations to assess performance and identify areas for improvement.



Key metrics include:
  • Number of emails sent, opened, and reported as suspicious
  • Links clicked and data submitted
  • Visual depiction of high-risk categories, phish risk, and high-risk groups
  1. Click Reports

The Click Reports sub-section provides detailed analysis of malicious links clicked by users, shedding light on potential security breaches and user behavior.



Key insights include:
  • Total clicks and average click rate
  • Country-wise distribution of clicks
  • Category click response and group-wise click rate
  • Top 5 countries with the highest click rates
  1. Breach/ Incident

The Breach/Incident sub-section equips organizations with tools to swiftly respond to security breaches and incidents, minimizing impact and mitigating risks.



Key metrics and insights include:
  • Average breach time and incident report time
  • Visual representation of campaign breach, category response, and group response
  • First breach response time for timely incident resolution
  1.  Repeat Offenders

The Repeat Offenders sub-section focuses on identifying and addressing repeat offenders within the organization, enabling targeted interventions and risk mitigation strategies.



Key data points and graphs include:
  • Total number of users, offenders, and repeat offenders
  • Graphical representation of top offenders and employee threat profile
  • Analysis of offenders and repeat offenders by category and department
  1. Filters in TSAT Reports

In TSAT's Reports section, filters streamline analysis for sharper insights:
  1. Time Frame: Choose from Last 24 Hours, Last 7 Days, Last 30 Days or custom time range for focused monitoring.
  2. Attack Vector: Filter by Phishing, Smishing, Ransomware or Vishing to pinpoint specific threats.
  3. Credential Harvesting: Distinguish campaigns with credential harvesting enabled or disabled for targeted scrutiny.
  4. Campaign Selection: Analyze all campaigns or selectively filter by campaign name for tailored assessment.
  5. Location: Gain geographic insights to address regional-specific threats.


    • Related Articles

    • TSAT User Guide

      TSAT tool is used for various simulations for the purpose of raising awareness among the users. These simulations can be done using various attack vectors such as Phishing ,QR code,Attachment, Ransomware, Smishing, Vishing & Whatsapp Phishing. Here’s ...
    • Whitelist TSAT in Cisco Ironport

      If you’re using Cisco Ironport for spam filtering, you might want to whitelist certain sources to ensure important emails and notifications get through to your end users. This guide will walk you through the process of whitelisting in Cisco Ironport, ...
    • How license work on TSAT

      License A license is a legal agreement or authorization that outlines the terms and conditions under which a user or organization can access and use a specific dashboard. The license typically includes key information such as the expiration date of ...
    • How to configure Azure AD with TSAT.

      To begin, access the Azure Portal using your Azure account by visiting the URL: https://portal.azure.com. Next, proceed to "Azure Active Directory" or utilize the search bar to locate "App registrations." Click on the "New registration" option to ...
    • How to Integrate Gsuite AD with TSAT

      1. Access the Console by navigating to console.cloud.google.com. 2. Begin by creating a new project. 3. Go to APIs & Services and select OAuth consent screen. 4. Add the necessary domains. 5.Click on save and continue. 6.Scope section will open,click ...