All Collections
Reports
Phishing reports
Phishing logs and statuses
Phishing logs and statuses

Learn more about our phishing email logs, activity logs and statuses

Ben Robinson avatar
Written by Ben Robinson
Updated over a week ago

Phishing emails log

To get to our activity pages, first navigate to your CybSafe dashboard then click 'Reports' > 'Phishing' and select the Phishing emails log tab.

The 'Phishing email log shows all the events and is best used from troubleshooting setup issues

The 'Phishing emails log' page reveals information on simulated phishing activity. It shows when simulations were sent. It shows to whom simulations were sent. It shows simulation subject lines. And it shows if and the status of the email or how people responded.

For further insights on this page, you can filter emails by status. Here is a full list of all the different statuses an email can have and what they mean:

  • Processed - Phishing emails from CybSafe that have been processed ready to send.

  • Dropped - Dropped emails occur when the contact on a CybSafe email is in one of our suppression groups, an email has previously bounced, or the recipient has marked CybSafe emails as spam.

  • Delivered - The accepted response generated by the recipients' mail server.

  • Deferred - The recipient mail server asked to stop sending CybSafe emails so fast.

  • Bounced - The receiving server could not or would not accept the email. If a recipient has previously unsubscribed from CybSafe emails, our attempt to send to them is bounced.

  • Opened - The response generated by a recipient opening a CybSafe email.

  • Clicked - Whenever a recipient clicks one of the click tracked links in a CybSafe email.

  • Spam reports - Whenever a recipient marks CybSafe emails as spam and their mail server tells us about it.

  • Unsubscribe - Whenever a recipient unsubscribes from CybSafe emails.

  • Phishing email opened - The response generated by a recipient opening a CybSafe email.

  • Phishing link clicked - The link in the phishing email was clicked on by the recipient.

  • Potential exposure to malware - The attachment in the phishing simulation email was opened by the recipient.

  • Credential provided - Details requested in the phishing simulation landing page were provided by the recipient.


Activity log

To access the phishing activity log, head to Reports > Phishing, then select the 'Activity log' tab.

The 'Activity log' reveals information on all events performed during a campaign. This list may show more than one event of the same type per email, per person, rather than simulated attacks.

This log is best used to understand individual phishing events for analysing people's response to phishing simulations.

On this page you can filter emails by date range, campaign, group or event type.


Still have questions?

If you still have questions, you can contact the CybSafe team via support@cybsafe.com. We’re on hand to help resolve any further issues!

Did this answer your question?