Below are some commonly-asked questions about KnowBe4's PhishER platform. If you don't see the answer you need, submit a ticket to our support team.
- How is my information protected on the PhishER platform?
- Do I need to use the PAB to forward emails to my PhishER inbox?
- How do I provide PhishER access to my users?
- Where do I find my Saved Rooms?
- Can I filter my PhishER inbox by a specific tag?
- How do I delete a message from my PhishER inbox?
- Is there a limit to how many Reporting Emails I can generate?
- I created a new rule. Will this affect the messages that were in my PhishER inbox before the rule was created?
- Can I use regular expressions (regex commands) in my YARA rule?
- What does the VT_Scanned tag mean?
- How can I purchase my own PhishER platform?
- What URL rewriters and shorteners is PhishER compatible with?
- How quickly can we get our PhishER platform set up?
- Can I use PhishER to process and block viruses?
- Can I open up attachments in PhishER safely?
- Is the data sent to and from my PhishER platform encrypted?
- How is PhishER access managed?
1) Q: How is my information protected on the PhishER platform?
A: PhishER uses all of KnowBe4's security and privacy best practices, as detailed on our Security page. For an added layer of protection, you can enable multi-factor authentication on your admin account in the KnowBe4 console.
2) Q: Do I need to use the PAB to forward emails to my PhishER inbox?
A: As an alternative to using the PAB, you can manually forward all user-reported emails to a PhishER-generated email address tied to your organization's PhishER platform. Visit here for more information on how to set this up.
Keep in mind, this method of email forwarding requires that forwarded emails are transmitted in a .eml format (RFC 822), which includes the complete headers and email body from the original email.
3) Q: How do I provide PhishER access to users?
A: To provide access to a user to manage PhishER, you must Enable PhishER access in their KnowBe4 Security Awareness Training platform User Profile. Security Awareness Training platform admins will automatically have access to PhishER.
4) Q: Where do I find my Saved Rooms?
A: After creating a room in PhishER, the room will be stored under the Saved Queries emergency room. This can be viewed by navigating to PhishER > Rooms > Saved Queries (select from the drop-down at the top of the Rooms screen).
5) Q: Can I filter my PhishER inbox by a specific tag?
A: Yes. Using Lucene query syntax, you can filter your PhishER inbox by a specific tag.
Enter the query below into the search bar of your PhishER inbox. As an example, this query will filter all messages with a Threat tag attached to it.
6) Q: How do I delete a message from my PhishER inbox?
A: You can delete a message from the Message Details screen. To do this, follow the steps below:
- Navigate to PhishER > Inbox
- Click on the message you would like to delete. This will open the Message Details screen.
- To the right of the Message Details is the Actions and Discussion sidebar. Under the Actions tab, click on the Delete Message button.
7) Q: Is there a limit to how many Reporting Emails I can generate?
A: No. You can generate as many reporting email addresses as you would like. This option may be beneficial to organizations who want to provide a different reporting email address across user groups, PAB instances, or office locations. Keep in mind, all emails forwarded to your reporting email addresses will empty into a single PhishER inbox.
8) Q: I created a new rule. Will this affect the messages that were in my PhishER inbox before the rule was created?
A: No, messages received prior to your rule change(s) will not be affected. If you would like to run your new rule against emails received prior to the rule's creation, you can do so by following the steps below:
- Navigate to PhishER > Inbox
- Click on the checkbox to the left of the message to select it.
- The Run Action drop-down will appear in the top-left. From this drop-down, you may select an action to run against your selected message(s).
9) Q: Can I use regular expressions (regex commands) in my YARA rule?
A: Yes, you can use regex commands when writing YARA rules. However, not all regex commands are recognized by the YARA compiler. Visit here to learn more about the regex commands that are recognized by YARA.
10) Q: What does the VT_Scanned tag mean?
A: The VT_Scanned tag will be added to your message when a VirusTotal scan is completed and not determined to be malicious.
11) Q: How can I purchase my own PhishER platform?
A: If you would like to purchase the PhishER platform, please reach out to your Account Manager for assistance. If you're unsure who your Account Manager is, you can contact support.
12) Q: What URL rewriters and shorteners are compatible with PhishER?
A: See the table below:
|Supported URL Shorteners|
|Supported URL Rewriters|
13) Q: How quickly can we get our PhishER platform set up?
A: Setup time will vary based on your environment. If you're using KnowBe4's free Phish Alert Button in your organization, you can get started with PhishER in just a few clicks. PhishER offers System Rules to get you started with dispositioning emails fast. However, you'll want to spend some time customizing rules, tags, and actions to help you process and respond to reported emails faster.
14) Q: Can I use PhishER to process and block viruses?
A: No, PhishER was not designed to be a mail filter. The purpose of PhishER is to provide your organization with a platform to evaluate all suspicious emails reported by your users. However, you can use PhishER to detect commonalities in the reported emails to automate your incident response actions.
15) Q: Can I open up attachments in PhishER safely?
A: KnowBe4 does not advise that you open up attachments in PhishER, even if VirusTotal marks them as safe. Any attachments that you want to analyze can be opened in a safe, secure sandbox.
16) Q: Is the data sent to and from my PhishER platform encrypted?
A: Yes, PhishER utilizes TLS protocol for communication in and out of the platform.
17) Q: How is PhishER access managed?
A: An account admin can enable or disable PhishER access for any admin or user from the individual's User Profile settings in the KnowBe4 console.