If you’re brand new to KnowBe4, this article will help you get started with setting up your KSAT console, a platform that provides security awareness training and simulated phishing. Steps one and two are required, and steps three to five are optional but recommended.
Step One: Whitelist Our Mail Servers
Before you start phishing and training your users, you’ll need to whitelist our mail servers. Whitelisting will ensure our Phishing Security Tests (PSTs) and training notifications reach your users’ inboxes. To learn more about whitelisting KnowBe4, see our Whitelisting Data and Anti-Spam Filtering Information article.
If you have any questions or need further assistance, contact our support team.
Step Two: Add Your Users
You’ll need to add your users' email addresses into your KSAT console to set up phishing and training campaigns. There are a few different options for importing your users' information into your console. You can use one of these three available methods to make user management an easy and automated process:
- Active Directory Integration (ADI): If you’re using Active Directory, we recommend setting up ADI to maintain your user list automatically. Once ADI is set up, your KSAT console will automatically update user and group information based on data received from your Active Directory (AD). To learn more about setting up ADI, see our Active Directory Integration (ADI) Configuration Guide.
-
System for Cross-domain Identity Management (SCIM): KnowBe4's SCIM integration enables seamless user management in your KSAT console by using data from your SCIM identity provider (IdP). To learn more about configuring SCIM for your KnowBe4 console, see our SCIM Configuration Guide.
-
Google User Provisioning (GUP): This integration enables automatic synchronization of user data between Google Workspace and your KnowBe4 console. If you’d like to import users directly from your Google account into your KnowBe4 console, we recommend looking at our Google User Provisioning (GUP) Guide.
Alternatively, you can add users manually or import them with a CSV file. For further information, see our Import Users with a CSV File Guide.
You can choose how to group your users, such as grouping them by department or location. You can also target groups with phishing and training campaigns and allow groups to compete against each other on leaderboards.
To learn more about adding your users, see the Adding Users section of our Users and Groups guide.
Step Three: Customize Your Account
You can customize your account and LX from your Account Settings. Here, you can add your organization’s logo, set a theme color for your LX, and set your business days and hours. To learn more about customizing your account, view our How to Add Your Company Logo, Logo URL, and Brand Color to Your Console article.
To learn more about setting up your business days and hours, see our How to Set Up Your Account’s Time Zone, Business Days, and Hours article.
Step Four: Set Up Multi-Factor Authentication
You can enable MFA to provide an extra layer of security and protect your organization's account information. This step is optional but recommended.
To learn more about setting up MFA, see our How Do I Enable Two-Factor or Multi-Factor Authentication on My Account? article.
Step Five: Customize a Landing Page
Your users will see a default landing page if they fail your PSTs. You can customize this experience by adding your logo to one of our pre-made landing pages, or you can create your own landing page.
After customizing or creating a landing page, you can set a default landing page in the Phishing section of your Account Settings. You’ll also have the option to select a landing page when setting up a phishing campaign or editing email templates.
For more information about landing pages, see our How to Create and Edit Email Templates and Landing Pages or What Landing Page Should I Choose? article.