What are all the possible error logs in the User .csv?

What are all the possible error logs in the User .csv?

One of the most commonly used and dependable methods for adding users to the Threatcop tool is by uploading a .csv file through the dashboard. However, before proceeding with the user upload, it is crucial to consider the following points to prevent any issues during the import:
  1. Ensure there are no duplicate details in the uploaded data.
  2. Verify that there are no spaces between the entered details.
  3. Avoid including any special characters in the data, as it is not recommended.
  4. Only use verified domains when entering information in the .csv file.
The .csv has the fields as shown in the below image:



To use a specific domain when uploading user emails in a .csv file, refer to the mentioned article for guidance on adding and verifying the chosen domain: How to add and Verify your domain?

Please ensure that the specified fields are filled in with the following details for the respective simulations:
For Ransomware and Phishing Simulation:
For Whatsapp, Smishing, and Vishing Simulation:
First name
First name
Last name
Last name
Email
Email
Position
Position
managerEmail
managerEmail

Phone



    • Related Articles

    • What is the Difference Between CSV And Event CSV ?

      There are 2 methods to retrieve the campaign details regarding Email Open, Link Click and Data Submitted, etc. 1. CSV : This is a CSV which includes all the details related to the campaign such as : First Name, Last Name, Email ID, Email Sent, Email ...
    • TSAT User Guide

      TSAT tool is used for various simulations for the purpose of raising awareness among the users. These simulations can be done using various attack vectors such as Phishing ,QR code,Attachment, Ransomware, Smishing, Vishing & Whatsapp Phishing. Here’s ...
    • IAM User in TSAT

      IAM refers to Identity and Access Management. This feature enables administrators to manage user identities and control their access to resources within the tool's ecosystem. With IAM, administrators can create, modify, and delete user accounts, ...
    • Do you provide user-specific awareness?

      We have user-specific awareness content in context to our matrix of vulnerability. We give basic awareness training to every employee the simulation has been run on. We also give user-specific instantaneous awareness to those employees who have ...
    • How to Add a IAM User and Assign Roles in the TSAT Portal

      Step-by-Step Guide Login to the TSAT Portal Access the portal using your login credentials. Navigate to IAM and Users In the main menu, go to IAM. Under IAM, select Users. Add a New User Click on the + Add User button. Enter User Details Fill in the ...