Sophos Central Phish Threat



  1. Sophos Central Phish Threat Datasheet
  2. Sophos Central Phish Threat Analysis
  3. Sophos Central Phish Threat Trial
  • Phish Threat Phish Threat lets you test your users' response to phishing campaigns. Sophos Phish Threat allows you to simulate phishing attacks and assess how your users respond to them. It also allows you to distribute anti-phishing training to your users.
  • I have a question regarding the Phish Threat package for Sophos Central. Once a license is used, is it gone for good? Or can you remove a person (without removing them from AD) from the Phish campaign and recover that license to use on another person later.

Phish Threat What to do. Sophos Central and Phish Threat V1 use different user lists that are located in separate databases. Deleting a user from the Sophos Central user list, will not permanently remove the user if that user is also located in Phish Threat. Sophos Central Admin User List Phish Threat V1 User List. If the Phish Threat V2 IP address and domain names are not included in the allow list, Office 365 executes the links making it appear as an end user has clicked on the links. To ensure the proper execution of Phish Threat V2 with Office 365, set up an exception for the Phish Threat V2 IP addresses and domains for both Safe Links and Safe. Central user management Phish Threat is fully integrated with Sophos Central, utilizing the global user list for simplified management: AD sync Synchronize users and groups from Active Directory: Multi-region SOC 2 Compliant hosting Available in the United States, Ireland and Germany.

Our mission at Sophos is to provide the best security solutions on the market and to make them easier to understand, deploy and manage than any of our competitors’ offerings.

From our continuous assessment of the threat landscape, two things are abundantly clear: first, that email is one of the most problematic sources of infection; and second, it’s the ordinary, well-meaning people who often let poisonous emails into their organizations.

It’s easy to be tricked into clicking on a malicious email. So wouldn’t it be great to create a culture where the first instinct of each user was to think twice — even if just for a moment — before clicking on links, downloading attachments or running software that arrived via email? Think of how many threats could be neutralized before they even have a chance to make their way on to corporate networks.

So we’re excited to be able to help create that culture by announcing Sophos Phish Threat, a phishing attack simulator that’s powerful, thoughtful and very easy to use. You’ll be up and running in minutes, with campaigns to help your users learn to spot phishing links, dangerous attachments, and bogus scripts meant to cripple your organization before they have a chance to do harm.

Simply choose a campaign type, select one or more training modules, pick a simulated phishing message, and decide which users to test. Then sit back as the results roll in: top-notch reporting tells you how many messages have been sent out, who’s clicked, and, of those, who’s gone through the required modules. It couldn’t be easier.

Sophos Phish Threat is the outcome of our worldwide hunt for the right technology to offer. That hunt led us to Silent Break Security and its Phish Threat application.

The simulator was developed by Brady Bloxham, the founder of the company, whose pedigree as a former National Security Agency analyst helped convince us that it’s a perfect fit alongside our other best-of-breed solutions in the Sophos Central Admin management console. Brady’s product and team are the perfect addition to the Sophos family and we’re delighted to have them join us.

Sophos Phish Threat is available today in North America and will be available soon in other regions. Give it a try for free and let us know what you think!

Sophos Central Phish Threat Datasheet

If you’re lucky enough to be attending RSA 2017, visit us at booth 3201 to see Sophos Phish Threat and many of our other industry-leading products in action.

The Reports pages provide detailed reports on Sophos Phish Threat features.

The reports that you can see depend on your license.

You can customize reports, save them and send them out as scheduled emails.

Note A report may not support all the customization or viewing options.
Threat

Limit report data to a specific time range

In some reports, you can limit report data to a specific date range by entering a From and To date.

Sophos Central Phish Threat Analysis

In some reports, you can select a time period.

Filter reports

In some reports, you can filter the displayed information by clicking on the category tiles. For example in the Computers report you can show all the active computers by clicking on Active.

You may also be able to filter by groups.

You can also use Search to filter for specific information.

Print or export reports

You can print or export your reports.

  • Print: Click this to open a printer-friendly view. Then press Ctrl+P to open the printer dialog.
  • Export to CSV: Click this to export the current view as a comma separated file.
  • Export to PDF: Click this to export the current view as a PDF file.

Save and email custom reports

You can create and save custom reports. A list of the saved reports is shown at the top of the Logs & Reports page.

Phish

You can also choose to send custom reports by email and set up a schedule for them. You can save as many reports as you like, but you can only schedule up to 25.

  1. Set up the report by selecting the appropriate filters.
  2. Click Save as Custom Report.

    This opens the Save Report dialog.

  3. Enter a Name for the report.
  4. If you want to send the report by email, select one of these options:
    • Send a link to the report.
    • Attach the report to the email.

    We recommend that you send a link if the report includes personally identifiable information.

    You need to enter Sophos Central sign-in credentials to view reports from a link.

  5. Select the Frequency. You can choose from monthly or weekly.
  6. Select the format: PDF or CSV.
  7. Click Save.

The email is received by the user who signs in and creates the report.

Sophos Central Phish Threat Trial

Note Scheduled emails stop after six months. You can reschedule them if you want to.