1. Control Panel
WatchDog Security Help Center
Admin Guide
  • Docs Home
  • Admin Guide
  • User Guide
  • MSP Guide
  • Getting Started
  • Create Your Free Organization
  • Domain Reservation
  • Company Management
    • Manage Branding
    • Delete Organization
  • Notification Center
    • Organization Events
    • User Events
    • Configure Notification Settings
    • User Notification Override
  • Posture Management
    • View Integrations
    • Configure Automated Integrations
    • Manage Automated Monitors
    • Configure Manual Integrations
    • Manage Manual Monitors
  • WatchDog University
    • Assigning Courses using WatchDog University
    • Auditing Course Completion
    • Downloading a Certificate of Completion
  • Policy Management
    • Create Policy
    • Publish Policy
    • Track Policy Acceptance
    • Send Policy Reminder
    • Update Policy
    • Download Policy Version
    • Delete Policy
    • Retire Policy
  • Risk Management
    • Perform A Risk Assessment
    • View and Manage Risks in Risk Register
    • Create Manual Risk
    • Edit and Manage Risk
    • Manage Risk Tasks
    • Manage Risk Lifecycle
  • Vendor Management
    • Add Vendor
    • Track Security Events
    • Manage Vendor Documents
    • Perform Vendor Assessments
    • Classify Vendor Risk
  • Inventory
    • Add Inventory Item
    • Update Inventory Item
    • Auto Populate Inventory
  • Compliance Center
    • Add Compliance Framework
    • Edit Compliance Framework
    • Assigning Control Owners
    • Pause Monitors and Documents
    • Manage Compliance Documents
    • Schedule Audit
    • Automated Monitoring
    • Cross-Framework Reuse
    • Progress Tracking
  • Trust Center
    • Customize Trust Center
    • Manage Trust Center Access
    • Monitor Access Activity (Events)
    • Custom Domain Setup
  • Vulnerabilities
    • Centralized Vulnerability Tracking
    • Import Vulnerabilities
    • Create Manual Vulnerabilities
    • Assign And Collaborate On Vulnerabilities
    • Configure Time To Remediate (TTR)
  • Control Panel
    • Manage Support Access
    • Phishing Campaigns
      • Creating an Allowlist for Phishing Simulations in Microsoft 365
      • Configure Google Workspace Allowlist for Phishing Simulations
  • User Management
    • Add Users
    • Configure Directory Sync
    • Manage User Access
    • Assign Licenses
    • Manage Invites And Users
    • Change Account Owner
    • Reset 2FA
  • Integrations
  1. Control Panel

Automated Phishing Campaigns

Automated Phishing Campaigns allow you to continuously test and improve your organization’s security awareness by simulating real-world phishing attacks. Campaigns run automatically based on a configured frequency, helping identify high-risk users and track improvement over time.
Who can use this feature?
All Account Owners and Security Admins
Available on the Core and Business plans

Configure Campaign Frequency#

1
Sign in to WatchDog Security
Sign in to the WatchDog Security Platform.
2
Open Control Panel
Navigate to Control Panel from the main navigation menu.
3
Open Phishing Settings
Click Configure on the Automated Phishing Campaign control.
4
Configure Allowlist for Campaigns
To ensure successful delivery, organizations must allow phishing simulation emails through their email security platform.
Microsoft 365
Google Workspace
5
Set Campaign Frequency
Select a frequency from the Campaign Frequency dropdown.
6
Save Settings
Click Update to apply the selected campaign frequency.

Send Test Campaign#

1
Sign in to WatchDog Security
Sign in to the WatchDog Security Platform.
2
Open Control Panel
Navigate to Control Panel from the main navigation menu.
3
Open Phishing Settings
Click Configure on the Automated Phishing Campaign control.
4
Send Test Campaign
Click Send Test Campaign to validate email delivery.

View Campaign Results#

1
Sign in to WatchDog Security
Sign in to the WatchDog Security Platform.
2
Open Control Panel
Navigate to Control Panel from the main navigation menu.
3
Open Phishing Settings
Click Configure on the Automated Phishing Campaign control.
4
View Recent Campaigns
Click View in the Recent Campaigns section.

What Happens Next#

Phishing campaigns are sent automatically based on the configured frequency.
Users receive simulated phishing emails in their inbox.
User interactions are tracked and recorded for each campaign.
Administrators can review results to identify high-risk users.

Troubleshooting#

Phishing Emails Not Delivered
If phishing emails are not reaching users:
Configure allowlisting in your email provider
Microsoft 365 requires Advanced Delivery Policies
Google Workspace requires spam bypass rules
Check spam or quarantine folders
Test Campaign Not Received
Cannot Change Campaign Frequency
No Campaign Results Visible
Modified at 2026-03-18 21:15:05
Previous
Manage Support Access
Next
Creating an Allowlist for Phishing Simulations in Microsoft 365
Built with