TSAT tool is used for various simulations for the purpose of raising awareness among the users. These simulations can be done using various attack vectors such as Phishing ,QR code,Attachment, Ransomware, Smishing, Vishing & Whatsapp Phishing.
Here’s a guide on how to get familiar with TSAT (Threatcop Security and Awareness Training) tool
When you begin using the tool, you'll notice a section that lists different tabs. Each tab represents a specific function, such as toggling around the number of attacks, clicks, hacks, campaigns, and templates in your TSAT portal. You can easily navigate between these tabs to access and control these features.
This part displays two important metrics: the Average Phish Risk Rate and the Average Breach Time. These numbers reflect your organization's current security status by showing the ratio of emails sent to data submitted and the time it takes for a simulated cyber attack to breach your organization, respectively
Next, you'll find a section similar to the one below, providing details on your license expiration date and highlighting the top 5 employees who may be more vulnerable in your organization.
Also, to view the recent activity on the TSAT portal you can scroll below to access the same on the portal.
Further along, you'll discover all the essential options for running a successful simulation conveniently located on the left side of the page in the sidebar menu.
Verifying Domain:
Domain verification is required to ensure that phishing emails sent through our tool can only be sent to employees within your organization. This prevents misuse by sending emails to unrelated domains outside your company. For example, if your company's domain is abc.com, you can only send emails to users with email addresses that also belong to the abc.com domain.
1.Access Domain Settings: Log in to your dashboard.Click on the user profile button located at the top right corner.Select "Settings" from the options that appear.Locate the "Domain" button and click on it.
2.Enter and Verify Domain: In the provided field, enter your company's domain name (e.g., "abc.com") and then click on verify.
3.Follow the instructions to verify the domain by adding a TXT record to your DNS.
4.Allow Time for Verification:The domain verification process typically takes a few hours.While you wait for verification, you can proceed with selecting and setting up your phishing campaign.
To start a campaign :
We begin by crafting a campaign template. Simply navigate to the sidebar menu, specifically the campaign template section, where you can easily create a template for the attack strategy of your preference.
Campaign Template Selection:
Click Campaign Template to access our library of pre-made templates.
1.Use the filters on the dashboard to narrow your search:
Template Library Selection: Choose from All Templates,Custom Templates (made or cloned by you), System Templates(made by our company and up-to-date), or Community Templates (shared by other clients).
Note: We recommend using System Templates.
2.Select Language Filter: Choose your preferred language from the drop-down menu (mostly English and Arabic available).
3.Attack Vector Selection: Pick the attack vector you want to use for your campaign. We offer: Phishing, QR Code, Attachment, Ransomware, Smishing, Vishing, & WhatsApp.
4.Template Category Selection: Select the relevant category for your campaign (e.g., Human Resources, E-commerce, Insurance, Finance, Accounting). This will filter the templates displayed to those suitable for your chosen attack vector.
Link to whitelist :
Exchange 2016 0r Office O365 Microsoft 365 ATP
G Suite AD Integration Azure AD Integration
User Import Through CSV
Running the Campaign:
1.Select the desired template. Hover over the template tile, click the three dots, and then choose Create Campaign.
2.Provide a campaign name. Select the users or groups you want to target, and then click Send Now.
3.A screen will appear where you can see the real-time statistics of the campaign initiated.
Exploring Report section:
1.Once the campaign is successfully executed, you can check the reports under the "Reports" section in the sidebar menu. Additionally, access other reports like Click Reports, Breach/Incidents, Repeat Offenders, and Course Analytics (on TLMS portal).
Exploring EVS (Employee Vulnerability Score):
1.Locate the EVS button in the Other menu on the left side of your dashboard.
Clicking this button will display the EVS (Employee Vulnerability Score) for the most recently launched campaign. This score is assigned to each user based on their performance in the phishing campaign.
2.To view the overall EVS for all campaigns conducted to date, click the Sync EVS button located at the top right corner of the dashboard.
Note: The above points are essential for running a campaign. The points below will help you understand more functionalities of the tool.
To explore functionalities:
Adding Landing URL : click here to view
Creating AI based Template : click here to view
Creating New template: click here to view
Importing users through Azure AD: click here to view
Importing users through Gsuite AD: click here to view
Creating New Template:click here to view
How to read campaign data: click here to view