Overview... 3 Provisioning Sites for Security Awareness Training... 3 Understanding Phishing Simulations... 6 Understanding Types...
|
|
- Oswald Parks
- 6 years ago
- Views:
Transcription
1
2 Overview... 3 Provisioning Sites for Security Awareness Training... 3 Understanding Phishing Simulations... 6 Understanding Types... 6 Understanding Programs and Campaign Scheduling... 6 Welcome Phishing Campaign... 7 Training Campaign... 8 Campaign Summary Reports... 9 Saving Custom Templates Understanding Events Managing Spam Filters Whitelisting s in Office Whitelisting s in Google Apps Whitelisting s in AppRiver Whitelisting s in Mimecast Whitelisting s in Exchange 2013 or Exchange Page Webroot Inc. All rights reserved. Proprietary and Confidential Information March 22, 2018
3 As our client, you will be able to build your phishing simulations through our easy to use Simulation Wizard. Using the wizard, you will be able to: Import your company s target list. Add your bait and lure page by either choosing from our pre-canned templates, or writing your own content. Send a test to test the simulation. Schedule and launch your simulation against your targets. Watch reports in real-time: processing and delivery opens and clicks Data post attempts to the lure page To enable Webroot Security Awareness Training within the web console, you can do either of the following: Provision when creating a new site. Enable for an existing site. To enable provisioning for a new site: 1. Select the Enable Security Awareness Training checkbox on the final step of new site creation. 2. Click the Finish button. Page Webroot Inc. All rights reserved. Proprietary and Confidential Information March 22, 2018
4 To enable provision for an existing site: 1. For the site you want to enable, click the Manage button. 2. Click the Security Awareness Training tab. 3. Select the Enable Security Awareness Training checkbox. 4. Select Full or Free 30 Day Trial radio button. 5. Click the Save Changes button. Page Webroot Inc. All rights reserved. Proprietary and Confidential Information March 22, 2018
5 6. At any time, under the Security Awareness Training tab, you can view the Security Awareness Training status and target user count. 7. After the settings are saved, as needed, click the Go To Security Awareness Console button. 8. Additionally, in the Site tab, you can launch the Security Awareness Training console by clicking on the Go To Security Awareness Training Console button. Page Webroot Inc. All rights reserved. Proprietary and Confidential Information March 22, 2018
6 By default, phishing simulations are only available to launch against your authorized domains. You will not be able to target addresses outside of your authorized domains list. These types of tests are generally ran by your company IT or security team. Before running any simulations against your organization, you should consult with your company s IT and/or security team to alert them of the tests, and maximize the success of your simulation. If you are a security consultant, you can contact us to become a verified security consultant to launch campaigns for your clients. Note: addresses on ISP or public domains etc.,) are restricted and cannot be used within the Securecast service. Target addresses must be valid company or organization addresses. There are two types of addresses that you enter: Authorized Domain Address (Admin) This is your own address on your company s or organization s domain. When you add an Authorized Domain address, you will be sent a validation link to your inbox. Click that link to verify that you are the owner of the box, and have an account on your company s/organization s domain. This will allow you to import target addresses on that domain. Target Addresses (End-Users) These are your company s or organization s employee s or member s addresses that you will target your simulation toward. These are needed by the simulation in order to deliver the bait . Programs is a feature set that allows you to schedule multiple campaign tasks with the goal of helping automate your training program. Tasks available for scheduling include: Welcome s are generally used for sending out an introduction to your new Security Awareness program to end users, management, IT staff, etc. You can use the Welcome task as the first introductory to your users or consider scheduling it after your first Phishing Campaign to introduce Security Awareness after a baseline phishing simulation has been run. Welcome s are also a new template type and can be created, edited and managed under Settings > in the menu. This is an task that can be scheduled at a date and time you specify by populating the Send Date field. Page Webroot Inc. All rights reserved. Proprietary and Confidential Information March 22, 2018
7 To create a new Welcome Template: 1. Click the New Template button. 2. Under the Settings > menu, enter Welcome . This task will schedule a phishing campaign to be run at a date and time you specify. You can schedule multiple phishing campaign tasks to help automate your security awareness program. To create a phishing campaign: 1. Do one of the following: In the Task field, enter a unique name for the campaign. From the Campaign drop-down menu, select the phishing campaign you want to schedule. 2. Populate the Start Date field to set the date and time you want to send your Phishing Campaign. 3. Populate the End Date field to determine when to complete the campaign and finalize reporting. Page Webroot Inc. All rights reserved. Proprietary and Confidential Information March 22, 2018
8 4. Select recipient targets can be selected from the picker individually or by entering tags. 5. Select the Send report after this campaign closes checkbox to schedule a campaign summary report to be sent to addresses you enter. Note: Phishing campaigns are scheduled using Programs and can be created and configured using Campaigns or Create New Campaign options in the menu. This task will schedule a training campaign to be run at a date and time you specify very similar to a phishing campaign. You can schedule multiple training campaign tasks to help automate your security awareness program. To create a training campaign: 1. Do either of the following: When creating a new training campaign, enter a unique name. From the Campaign drop-down menu, select the existing training campaign you want to schedule. 2. Populate the Start Date field to set the date and time you want to send your Training Campaign. 3. Populate the End Date field to determine when to complete the campaign and finalize reporting. 4. Select recipient targets can be selected from the picker individually or by entering tags. 5. Select the Send report after this campaign closes checkbox to schedule a campaign summary report to be sent to addresses you enter. Note: Training campaigns are scheduled using Programs and can be created and configured using Campaigns or Create New Campaign options in the menu. Page Webroot Inc. All rights reserved. Proprietary and Confidential Information March 22, 2018
9 The campaign summary report is a report in PDF format that contains a summary of important details about the campaign run including the following: Name of campaign Date of campaign Key statistics, along with a summary of the campaign templates used To send a campaign summary report at the conclusion of a phishing or training campaign, follow this procedure. To send a campaign: 1. Select the Send a report after this campaign closes checkbox. 2. Click the Add button to determine who will receive the report. 3. To add multiple recipients, clicking the Add button again to expand additional recipient settings boxes. This is an optional step. Note: Reports can be sent to any valid address including distribution lists. Page Webroot Inc. All rights reserved. Proprietary and Confidential Information March 22, 2018
10 New Program Screen Populated programs Screen Page Webroot Inc. All rights reserved. Proprietary and Confidential Information March 22, 2018
11 You can use templates to edit an existing template, or create a template from scratch within the template editor. To save a custom template: 1. Select the Save as template checkbox. 2. Enter a name for your template. 3. Click the Save this as a template button. You will be able to see data about the following types of events in the Activity Feed: Processed Requests from your website, application, or mail client via SMTP Relay or the API that the er processed. Clicks Whenever a recipient clicks one of the Click Tracked links in your . Delivered An that was delivered to a recipient. Opens Whenever an is opened by a recipient. Deferred The recipient mail server asked the er to stop sending s so quickly. Drops The er drops an when one of the following occurs: The contact on that is in one of your suppression groups. The recipient previously bounced. The recipient has marked your as spam. Bounces When an attempt is made to deliver an , but the recipient mail server rejects it. Spam Reports Whenever a recipient marks your as spam and their mail server tells us about it. Page Webroot Inc. All rights reserved. Proprietary and Confidential Information March 22, 2018
12 Some spam filters may bounce mail coming from Webroot Security Awareness Training, which is both good and bad. It s good for proving that your spam filter is working, but it s bad for phishing awareness purposes. If mail does bounce, you may need to whitelist the send mail server by IP address or server name or you can also whitelist the sending domain. To whitelist the send server: 1. Log into your gateway/spam filter. 2. Add a white list for one of the following: Securecast IP Address: Securecast Mail Server: o1.relay.mx-secure.com (o1.relay.mx-secure.com [ ]) Securecast sending domain(s): use sending domain you set up/choose To whitelist in Office 365: 1. Log into your Office 365 and click on the Admin Portal. 2. Select Admin Centers > Exchange. Page Webroot Inc. All rights reserved. Proprietary and Confidential Information March 22, 2018
13 3. Select Connection Filter under the Protection section. 4. Click on Connection Filter, then click the Pencil icon to edit the connection filter policy. 5. Under the IP Allow List, click the + (plus) sign to add an IP address. Page Webroot Inc. All rights reserved. Proprietary and Confidential Information March 22, 2018
14 6. Add the following IP address: Click OK, then click Save. To whitelist in Google Apps: 1. Log in to the Google Apps admin portal. 2. Select Apps. 3. Select G Suite. Page Webroot Inc. All rights reserved. Proprietary and Confidential Information March 22, 2018
15 4. Select Gmail. 5. Select Advanced Settings. 6. In the Organizations section, highlight your domain. 7. In the Whitelist section, enter the following IP address: Scroll to the bottom and click Save. This change may take up to 60 minutes to propagate. To whitelist in AppRiver: 1. Log in to the AppRiver Admin Center. 2. Select Filters > IP Addresses. 3. Under Allowed IP Addresses, add the following IP address: Click Save. Page Webroot Inc. All rights reserved. Proprietary and Confidential Information March 22, 2018
16 When using Mimecast, you will need to create a new Permitted Sender policy. Note: Make sure that you do not edit the existing default policy. To whitelist in Mimecast: 1. Log in to the Administration Console. 2. From the menu, select Administration. 3. Select Gateway > Policies. 4. Click the New Policy button. 5. Under Options, name your policy. 6. From the drop-down menu, select Permit Sender. 7. Under s From, select the following: Addresses Based On Both Applies From Everyone Specifically Applies to all Senders 8. Under s To, select the following: Applies To Everyone Specifically Applies to all Recipients 9. Under Validity, select the following: Enable, Set policy as perpetual Always On The Policy Override checkbox. 10. For Source IP Ranges, enter the Securecast gateway IP: Save the policy. This new policy may take up to 30 minutes to take effect. Page Webroot Inc. All rights reserved. Proprietary and Confidential Information March 22, 2018
17 To whitelist in Exchange: 1. Open the Exchange Management shell. 2. Run the following command: Add-IPAllowListEntry -IPAddress Page Webroot Inc. All rights reserved. Proprietary and Confidential Information March 22, 2018
Integrating Trend Micro Hosted Security with Google Gmail
A Trend Micro Integration Guide I November 2017 Integrating Trend Micro Hosted Email Security with Google Gmail» This guide provides the steps necessary to configure Google Gmail to work with Trend Micro
More informationCommunication. Identity
Mailock User guide OUR MISSION STATEMENT To Secure your Communication Data Identity Contents Introducing Mailock... 5 Business Users... 5 What do you need to run Mailock?... 5 In a browser... 5 On a mobile
More informationAWEBDESK MARKETER
AWEBDESK EMAIL MARKETER Version 6.1.0 AwebDesk Softwares Feedback Loop Set-Up Guide Edition 1.0 March 2012 1 P a g e What is a feedback loop? Some ISPs offer a feedback loop service for senders. When a
More informationPRODUCT UPDATE BULLETIN
February 2018 PRODUCT UPDATE BULLETIN WEBROOT SECURITY AWARENESS TRAINING Overview The version 2.0 release of Webroot Security Awareness Training incorporates a variety of enhancements, some as part our
More informationDocVerify E-Signature Salesforce Application How to Create a New E-Signature Document. Versions 4.0 and above.
DocVerify E-Signature Salesforce Application How to Create a New E-Signature Document Versions 4.0 and above www.docverify.com Table of Contents Prerequisites... 3 Step 1 (E-Signature Tab):... 4 Step 2
More informationPostini Message Security Using Postini with Google Apps Education Edition
Postini Message Security Using Postini with Google Apps Education Edition Google Inc. 1600 Amphitheatre Parkway Mountain View, CA 94043 www.google.com July 9, 2010 Copyright 2010 Google Inc. All rights
More informationWhat's new in Europa?
What's new in Europa? Quarantine Search Capabilities ( Managing your quarantined items ) Setting Control level in user level in anti spam Auto White List Outbound Recipients Mode Analysis Sender Profile
More informationGetting Started With AMGAlerts
Getting Started With AMGAlerts Congratulations on your new account with us! Now the fun part starts, and we are not joking. You ll be happily surprised at the ease of getting the system up and ready to
More informationCLD206x Compliance in Office 365: Data Governance
CLD206x Compliance in Office 365: Data Governance Student Lab Manual WARNING Be prepared for Office 365 UI changes Given the dynamic nature of Microsoft cloud tools, you may experience Office 365 user
More informationUnit 7: Working with
Unit 7: Working with Email Questions Covered What kinds of inbound and outbound email are possible in Agiloft? How do we configure the system to send outbound email and receive inbound email? Why set up
More informationUsing the Control Panel
Using the Control Panel Technical Manual: User Guide Creating a New Email Account 3. If prompted, select a domain from the list. Or, to change domains, click the change domain link. 4. Click the Add Mailbox
More informationMassMailer Configuration Guide
MassMailer Configuration Guide Modified on: Fri, 22 Aug, 2014 at 3:41 AM MassMailer Configuration Guide Contents MassMailer Overview SendGrid Prerequisite Installing the MassMailer App Steps to Install
More informationHow to use Gmail to access your JBN
How to use Gmail to access your JBN email Step 1: Sign in or create a Google account. If you have an existing Gmail account, sign into it and skip to Step 2: Import your jbntelco email. Part A: Create
More informationAutomatic Delivery Setup Guide
for GuideSpark Communicate Cloud Table of Contents Summary: Working with Automatic Email Delivery... 1 What your IT department needs to know... 2 Prerequisite: Select a Targeted Audience... 3 Enable Automatic
More informationSMS for REST Professional
RockendSMS Enhanced Integration SMS for REST Professional RockendSMS has newly designed and developed an upgrade to the way you send SMS through REST Professional V14 and above (RockendSMS Enhanced Integration).
More informationOffice 365 Inbound and Outbound SMX configuration. 4 th January 2018
Office 365 Inbound and Outbound SMX configuration 4 th January 2018 Legal Notice Copyright 2005-2018 SMX Limited. All rights reserved. The contents of this document constitute valuable proprietary and
More informationStep 2 - Deploy Advanced Security for Exchange Server
Step 2 - Deploy Advanced Email Security for Exchange Server Step 1. Ensure Connectivity and Redundancy Open your firewall ports to allow the IP address ranges based on your Barracuda Email Security Service
More informationVersion 1.20 Release Note
Version 1.20 Release Note v1.20 Release Note Welcome to v1.20 of RM Unify The next exciting release of RM Unify is here and with it some leaps forward in functionality, a number of bug squashes, and some
More informationSolar Campaign Google Guide. PART 1 Google Drive
Solar Campaign Google Guide This guide assumes your team has already retrieved its template Solar Campaign folder from Vital Communities and shared it with the entire volunteer team on Google Drive. To
More informationWorking with Actions Stratum.Viewer 6
Working with Actions Stratum.Viewer 6 Getting Started Access to Actions Accessing Actions Functionality Introduction to Actions Quick Start Set up an Action Tasks Add an Email Action Add a File Share Action
More informationConfiguring Gmail (G Suite) with Cisco Cloud Security
Configuring Gmail (G Suite) with Cisco Cloud Email Security This document covers the steps required to integrate Cisco Cloud Email Security with Google G Suite for inbound and outbound email delivery.
More information2 User Guide. Contents
E-mail User Guide 2 E-mail User Guide Contents Logging in to your web mail... 3 Changing your password... 5 Editing your signature... 6 Adding an e-mail account to Outlook 2010/2013/2016... 7 Adding an
More informationUsing Trustwave SEG Cloud with Cloud-Based Solutions
.trust Using Trustwave SEG Cloud with Cloud-Based Email Solutions Table of Contents About This Document 1 1 Trustwave SEG Cloud for Anti-Malware with Cloud-Based Email Solutions 2 2 Networking and DNS
More informationUSER GUIDE. PowerMailChimp CRM 2013
USER GUIDE PowerMailChimp CRM 2013 Contents About PowerMailChimp Navigating PowerMailChimp in CRM 2013 Dynamics CRM Marketing Lists and MailChimp Groups Existing CRM Marketing Lists Creating a new CRM
More informationStep 4 - Choose Your Deployment
https://campus.barracuda.com/doc/51190798/ CONFIGURE G SUITE JOURNALING You must configure G Suite to send archived mail directly to the Barracuda Cloud Archiving Service. Google IP address ranges and user
More informationIntegrate Barracuda Spam Firewall
Integrate Barracuda Spam Firewall Publication Date: November 10, 2015 Abstract This guide provides instructions to configure Barracuda Spam Firewall to send the events to EventTracker. Scope The configurations
More informationCalifornia Naturalist Volunteer Portal. A Quick Administrators Guide to the New Volunteer Management System 3.1
California Naturalist Volunteer Portal A Quick Administrators Guide to the New Volunteer Management System 3.1 VMS: The New Look Search, Notifications, Help and link to your Profile Your program News feed
More informationApproving the Outside Interests Disclosure Form Without Conflicts. Supervisor Level. IRIS Mobile through the Web
Approving the Outside Interests Disclosure Form Without Conflicts Supervisor Level IRIS Mobile through the Web The Outside Interests Disclosure Form is for the University of Tennessee faculty and staff
More informationBeetleEye Application User Documentation
BeetleEye Application User Documentation BeetleEye User Documentation 1 Table of Contents Welcome to the BeetleEye Application... 6 Overview... 6 Navigation... 6 Access BeetleEye... 6 Update account information...
More informationAtlas LCC Legal Hold Notice Tips
LCC Legal Hold Notice Tips LCC Hold Notices Content Revision History...3 Introduction...4 Request and Scoping...4 How to scope a new request...4 Adding People manually to scope...5 Adding Data Sources
More informationContents. Limitations. Prerequisites. Configuration
Welcome to your Netmail Secure trial The trial version of Netmail Secure allows you to evaluate Netmail Secure from within your own corporate domain. Included is a sample mail feed that is automatically
More informationTrack-able Bulk Management System
Track-able Bulk Management System Agenda: Why TBMS? Track-able Bulk Management System (TBMS) TBMS Flow Benefits Why TBMS? Effective Communication E-Marketing Behavior & getting Attention Track-able Bulk
More informationDistrict And Club Database
Summary DACdb s Personalized email system () is a powerful way to communicate with your membership. It sends individual, personalized emails to each recipient. There are many features including scheduling,
More informationCAS Quick Deployment Guide January 2018
CAS January 2018 Page 2 of 18 Trend Micro CAS January 2018 This document is to guide TrendMicro SE and Solution Architect team run a successful Cloud App Security POC with prospective customers. It is
More informationRelay. Calendar Setup. Google Calendar
Relay Calendar Setup Google Calendar 1 Create a new calendar resource for your room. If your room already has a calendar, you can skip this step. If you don t have access to Google Admin, you may instead
More informationOn the Surface. Security Datasheet. Security Datasheet
Email Security Datasheet Email Security Datasheet On the Surface No additional hardware or software required to achieve 99.9%+ spam and malware filtering effectiveness Initiate service by changing MX Record
More information23 Shadowing ThinManager Shadow
23 Shadowing Shadowing is a popular management tool that allows an authorized user to view what is running on a remote client. There are two methods: ThinManager Shadow Terminal-to-Terminal Shadow 23.1
More informationAdobe Sign for Microsoft Dynamics
Adobe Sign for Microsoft Dynamics Installation & Configuration Guide (v5) Last Updated: March 16, 2017 2017 Adobe Systems Incorporated. All rights reserved Table of Contents Overview... 3 Prerequisites...
More informationConfiguring /Text Alerts in ThorPCX SUPPORT DOCUMENT
1 CONFIGURING EMAIL/TEXT ALERTS IN THORPCX Section I Page 2 Email Tab, Mail Server & Server Authentication. Section II Page 3 Configuring Email Addresses, Groups & Messages. Also Edit Email Addresses.
More informationHow to Ensure You Can Access National CASA Member News
OUR REGULAR NETWORK NEWS PRODUCTS National CASA sends its member programs regular communications in the form of newsletters, special announcements and legislative action alerts. An important note: National
More informationAgent Console. The Agent Console. The topics in this section provide information about the Agent Console.
Agent Console The topics in this section provide information about the Agent Console. The Agent Console The agent logs into the workstation The agent is automatically logged in to Intradiem; the Agent
More informationYou can find more information about the service at
Introduction The purpose of this guide is to familiarize you with ExchangeDefender and walk you through the configuration, management and deployment of the service. ExchangeDefender is a transparent, cloud-based
More informationMigrating from the Standard to the Enhanced PPW Driver
New Driver Announcement! The Property Pres Wizard (PPW) Enhanced Integration is now live in Pruvan. We recommend that you use the new driver over the original one. If you are already using the current
More informationHow to Mail Merge PDF Documents
How to Mail Merge PDF Documents A step-by-step guide to creating personalized documents using AutoMailMerge plug-in for Adobe Acrobat Table of Contents What is a mail merge?...2 What do I need to start?...2
More informationWelcome to the New DocuSign Experience!
Welcome to the! Sending an Envelope If you are reading this then you have begun your transition from the DocuSign application to the New DocuSign Experience. We believe you will find the to be a refreshing
More informationPardot Setup Implementation Guide
Pardot Setup Implementation Guide Salesforce, Summer 18 @salesforcedocs Last updated: May 31, 2018 Copyright 2000 2018 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
More informationG-Lock EasyMail7. Startup Guide. Client-Server Marketing Solution for Windows. To learn more about G-Lock EasyMail7, visit
G-Lock EasyMail7 Client-Server Email Marketing Solution for Windows Startup Guide 1 Table of Contents This document is your startup guide for G-Lock EasyMail7 product. It is designed to provide you with
More informationSalesforce Lead Management Implementation Guide
Salesforce Lead Management Implementation Guide Salesforce, Winter 18 @salesforcedocs Last updated: November 7, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved. Salesforce is a registered
More informationWeb Push Notification
Web Push Notification webkul.com/blog/web-push-notification-for-magento2/ On - January 13, 2017 This impressive module allows you to send push notification messages directly to the web browser. The biggest
More informationINSTALLATION AND SETUP VMware Workspace ONE
GUIDE NOVEMBER 2018 PRINTED 9 JANUARY 2019 VMware Workspace ONE Table of Contents Installation and Setup Introduction Prerequisites Signing Up for a Free Trial Launching the Workspace ONE UEM Console Navigating
More informationEnterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3
Enterprise Vault.cloud CloudLink Google Account Synchronization Guide CloudLink 4.0.1 to 4.0.3 Enterprise Vault.cloud: CloudLink Google Account Synchronization Guide Last updated: 2018-06-08. Legal Notice
More informationSMTP Sending s While on PureVPN
SMTP Sending E-Mails While on PureVPN If you are facing difficulties sending e-mails while being connected to PureVPN, this may be because we are blocking outgoing e-mail services (SMTP). We block outgoing
More informationEvaluating Encryption Products
Evaluating Email Encryption Products A Comparison of Virtru and Zix Importance of Email Encryption Most modern email providers, such as Google and Microsoft, offer excellent default security options, but
More informationGolfNow Central. Marketing User Guide. February 2018
Marketing User Guide 2018 1 Table of Contents Course management Player Rules Booking Engine settings Connecting to your Social Media accounts How to send and schedule a one-time campaign How to send and
More informationCase Management Implementation Guide
Case Management Implementation Guide Salesforce, Winter 18 @salesforcedocs Last updated: November 30, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
More informationGrant Application Portal User Manual. Community Foundation of Western Massachusetts
Grant Application Portal User Manual Community Foundation of Western Massachusetts V.1.00 10/19/2016 Contents Welcome!... 2 Create A New Account:... 2 Change your email address or password... 4 Change
More informationMANAGEMENT AND CONFIGURATION MANUAL
MANAGEMENT AND CONFIGURATION MANUAL Table of Contents Overview... 3 SYSTEM REQUIREMENTS... 3 The Administration Console... 3 CHAT DASHBOARD... 4 COMPANY CONFIGS... 4 MANAGE LEARNING... 7 MANAGE TABS...
More informationThreatConnect Learning Exercises
ThreatConnect Learning Exercises The following exercises will teach you some of the important features within the ThreatConnect platform. You will learn various ways of adding intelligence data into ThreatConnect,
More informationWorkshare Protect Server 3.8. Solutions Guide
Workshare Protect Server 3.8 Solutions Guide July 2017 Workshare Protect Server 3.8 Solutions Guide Table of Contents Chapter 1: Introducing Workshare Protect Server...5 What is Workshare Protect Server?...
More informationCOMPREHENSIVE GUIDE TO HUBSPOT WORKFLOWS
COMPREHENSIVE GUIDE TO HUBSPOT WORKFLOWS THE IMPORTANCE OF MAPPING THE BUYER S JOURNEY Understanding where a lead is at within the Buyer s Journey allows you to create specific, targeted content to appeal
More informationA User Guide. Besides, this Getting Started guide, you ll find the Zoho Campaigns User Guide and many other additional resources at zoho.com.
A User Guide Welcome to Zoho Campaigns! This guide will help you create and send your first email campaign. In addition to sending an email campaign, you ll learn how to create your first mailing list,
More informationContents Welcome to Halo... 3 Secure Sign-In... 4 Forgot Password... 4 Messages... 5 Create and Send a Message... 5 Message Enhancements...
Halo Web App GUIDE Contents Welcome to Halo... 3 Secure Sign-In... 4 Forgot Password... 4 Messages... 5 Create and Send a Message... 5 Message Enhancements... 6 Quick Note... 6 Mark as Urgent... 6 Add
More informationTechnical Documentation. Configuring Google SSO with Amazon AppStream 2.0 and Amazon AppStream 2.0 Chrome Packaging and Deployment
Technical Configuring Google SSO with Amazon AppStream 2.0 and Amazon AppStream 2.0 Chrome Packaging and Deployment Version 2 - February 2018 Configuring Google SSO with Amazon AppStream 2.0 Requirements
More informationGAME Self-Service Portal
GAME Self-Service Portal Google Employee Training Guide 1 Table of Contents Introduction... 3 GAME SSP Login ID is Optional for Google Sales Managers... 3 GAME SSP Login ID is Available for Google Administrative
More informationMarketer's Guide. User guide for marketing analysts and business users
Marketer's Guide Rev: 18 November 2014 Email Campaign Manager 2.2 for Sitecore CMS 7.5 Marketer's Guide User guide for marketing analysts and business users Table of Contents Chapter 1 Introduction...
More informationMX Control Console. and Spam Summary Reports. End User Manual
MX Control Console and Spam Summary Reports End User Manual This Software and Related Documentation are proprietary to MX Logic, Inc. Copyright 2003 MX Logic, Inc. The information contained in this document
More informationFiltering User Guide. Guide to User Functions of Spam and Virus Filtering Service
Email Filtering User Guide Guide to User Functions of Spam and Virus Filtering Service Table of Contents Welcome Page 3 Logon Page 3 Home Page 4 Spam Page 5 Message Searching Releasing Held Mail Virus
More informationUser Manual. For JH CONNECT. Jesus House Intranet Application. Version
User Manual For JH CONNECT Jesus House Intranet Application Version 1.1 24-05-2010 Table of Contents 1 Overview... 5 1.1 What Is JH Connect... 5 2 Starting Up... 6 2.1 Editing your existing Jesus House
More informationMarketing Automation:
Email Marketing Automation: Integration with Google Analytics 1 To integrate FreshMail with Google Analytics, you will need: 1. An active FreshMail account. If you don t have one yet, you can open it here.
More informationPersonal Dashboard User Guide
Version 8.1 800-782-3762 www.edgewave.com 2001 2011 EdgeWave. All rights reserved. The Red Condor and EdgeWave logos and brands are trademarks of EdgeWave. All other trademarks and registered trademarks
More informationCiphermail Webmail Messenger Administration Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail Webmail Messenger Administration Guide October 27, 2017, Rev: 8630 Copyright 2013-2017, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Admin login
More informationError Sending Mail Message To Smtp Server. Return Code 552
Error Sending Mail Message To Smtp Server. Return Code 552 The best mail server response code you can get. A 400-style message is usually returned when some sort of transient error is easing off the throttle
More informationREPORT Job History. 1) Click the Menu button to enter the left side menu. 2) Click on Reports tab to access to enter the Report menu
REPORT Job History 1) Click the Menu button to enter the left side menu 2) Click on Reports tab to access to enter the Report menu REPORT Main page The user can manage the FTP/SMTP accounts that can be
More informationUser Guide for Bulk Mail Management System (BMMS)
User Guide for Bulk Mail Management System (BMMS) Table of Content In this user guide, we first guide you through the process of creating, approving and releasing bulk mails. 1: How to Access the System
More informationOffice 365 Standalone Security
The standalone Email Security option is available for purchase only through the Barracuda Self-Service Gateway or Barracuda MSP. Once you complete the Essentials for Office 365 Wizard, the Essentials page
More informationAdvanced User's Workshop
Advanced User's Workshop Creating Local Distribution Lists Using Global and Local Distribution Lists Sharing a Local Distribution List Email Ribbon Bar Options Outlook 2007 & Office 2007 Application Integration
More informationNotification Setup Guide for Operations Manager 2007
Notification Setup Guide for Operations Manager 2007 Step-by-step setup guide for instant messaging and SMTP notification in System Center Operations Manager 2007 Anders Bengtsson, MCSE http://www.contoso.se
More informationOrganising your inbox
Outlook 2010 Tips Table of Contents Organising your inbox... 1 Categories... 1 Applying a Category to an E-mail... 1 Customising Categories... 1 Quick Steps... 2 Default Quick Steps... 2 To configure or
More informationMARKETING AUTOMATION
MARKETING AUTOMATION Table of Contents... 3 Cookbook... 4 Remarketing Campaigns... 5 Bake Your Own: Remarketing Campaign... 6 VIDEO: Remarketing Campaign...14 Event Remarketing...15 Bake Your Own - Event
More informationMESSAGING SECURITY GATEWAY. Solution overview
MESSAGING SECURITY GATEWAY Solution overview April 2017 CONTENTS Executive Summary...3 The case for email protection and privacy... 3 Privacy in email communication... 3 LinkedIn Phishing Sample...4 Messaging
More informationArchiving Service. Exchange server setup (2013) AT&T Secure Gateway Service
AT&T Secure E-Mail Gateway Service Archiving Service Exchange server setup (2013) 2014 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are
More informationCisco TelePresence Management Suite Extension for Microsoft Exchange
Cisco TelePresence Management Suite Extension for Microsoft Exchange Administrator Guide Software version 2.2 D14197.06 February 2011 Contents Contents... 2 Introduction... 4 Pre-Installation Information...
More informationLearning Studio Tool & Microsoft Outlook
1 Learning Studio Email Tool & Microsoft Outlook The LearningStudio Email Tool and IWU s Microsoft Outlook, have a unique partnership on how the two systems work together. Please see below on what you
More informationComodo Antispam Gateway Software Version 2.12
Comodo Antispam Gateway Software Version 2.12 User Guide Guide Version 2.12.112017 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam Gateway...3
More information2012 Learning Guide Employee. StaffReady.
2012 Learning Guide Employee StaffReady http://www.staffready.com Table of Contents 1 MODULE ONE (1): INTRODUCTION, LOGIN, AND WELCOME TAB... 3 1.1 SCHEDULEREADY OVERVIEW... 3 1.2 TECHNOLOGY UPGRADES...
More informationMANAGING YOUR MAILBOX SIZE - OUTLOOK 2010
MANAGING YOUR MAILBOX SIZE - OUTLOOK 2010 Each staff member within the University is allocated 1GB of storage space within their email accounts. When your mailbox gets to around 800MB you will be sent
More informationSalesforce Lead Management Implementation Guide
Salesforce Lead Management Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: October 1, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered
More informationBlackBerry Workspaces Server Administration Guide
BlackBerry Workspaces Server Administration Guide 6.0 2018-10-06Z 2 Contents Introducing BlackBerry Workspaces administration console... 7 Configuring and managing BlackBerry Workspaces... 7 BlackBerry
More informationHalo Administrator GUIDE
Halo Administrator GUIDE Contents Welcome to Halo... 3 Secure Sign-In... 4 Forgot Password... 4 Messages... 5 Create and Send a Message... 5 Message Enhancements... 6 Quick Note... 6 Mark as Urgent...
More informationWorkshare Protect Server 3.8. Admin Guide
Workshare Protect Server 3.8 Admin Guide July 2017 Workshare Protect Server 3.8 Admin Guide Table of Contents Chapter 1: Introducing Workshare Protect Server...7 What is Workshare Protect Server?... 8
More informationBUILD YOUR OWN SAP FIORI APP IN THE CLOUD Exercise Week 5
BUILD YOUR OWN SAP FIORI APP IN THE CLOUD Exercise Week 5 Create an App from a Smart Template and Annotation File 1 INTRODUCTION 1.1 Goal Smart Templates in the SAP Web IDE of the SAP HANA Cloud Platform
More informationSyncing Between Pardot and Salesforce
Syncing Between Pardot and Salesforce Salesforce, Summer 16 @salesforcedocs Last updated: July 13, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
More informationThis document contains information that will help you to create and send graphically-rich and compelling HTML s through the Create Wizard.
This document contains information that will help you to create and send graphically-rich and compelling HTML emails through the Create Email Wizard. or warranty by AT&T and is subject to change. 1 Contents
More informationUsing Trustwave SEG Cloud with Exchange Online
.trust Using Trustwave SEG Cloud with Exchange Online Table of Contents About This Document 1 1 Trustwave SEG Cloud for Anti-Malware with Exchange Online 2 2 Networking and DNS Setup 2 3 Provisioning Trustwave
More informationTrustwave SEG Cloud Customer Guide
Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2017 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation
More informationSet Up and Maintain Collaboration Tools
Set Up and Maintain Collaboration Tools Salesforce, Winter 18 @salesforcedocs Last updated: December 6, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
More informationQuick Start Guide AUTODOC HSE
AUTODOC HSE Quick Start Guide Table of Contents Step 1: What do you want to do?... 4 AutoDoc HSE s core functions... 5 Choose your outcome... 5 What next?... 6 Step 2: Installing AutoDoc HSE... 7 Before
More informationerecruitment Recruiter User Manual
erecruitment How to access the erecruitment system... 2 How to accept applications into the Back office - submit an application... 4 How to Un-submit an application... 7 How to delete an application...
More informationUser Guide. Copyright 2015 Cybercom Software
User Guide 2 MessageSender 5 Table of Contents Foreword 0 Part I Introduction 4 Part II Installation 4 1 Upgrading... Previous Versions of MessageSender 5 2 Installing... MessageSender 5 3 Installing...
More informationWhitelist Instructions
Email Whitelist Instructions To ensure our emails continue to reach your inbox, please add our email address to your address book. In order to receive your electronic magazine notifications you may need
More information