Human Risk Management
| Q: | What are the key benefits of the Human Risk Management Platform? |
| A: |
Visibility: The comprehensive
Human Risk Command Center spans the
collaborative landscape, ensuring organizations can keep up with
and stay ahead of evolving threats. Insight: The Human Risk Management platform helps align cyber and human risk for more detailed and actionable insights. Chief Information Security Officers (CISOs) and security analysts can take these insights and make proper decisions and deploy the right tactics to keep the organization secure. Action: Our unified, AI-powered platform is engineered to ensure that threats can be detected and eliminated promptly, allowing for precise and proactive decision-making. |
| Q: | Why is the Human Risk Command Center only accessible from the Administration Console, and not the Engage platform? |
| A: | While the Human Risk Command Center is key to the Engage experience and will be accessible only to Engage customers to start with, it will eventually be accessible to all Mimecast Email Security customers. Human Risk will become a core component of the Mimecast platform, with cross-platform use cases and applications. For that reason, we've made the decision to make this dashboard view central to the Mimecast experience – living alongside the Analysis & Response center as a key part of the platform story. |
| Q: | Are there any actions that I can perform from the Human Risk Command Center? |
| A: | Currently, the administrator actions in the Human Risk Command Center are limited to search, basic filtering, and high-level Human Risk analysis. |
| Q: | How can we import user data for Human Risk? |
| A: |
The user information Human Risk relies on is only present with Directory Synchronization – profile groups do not work with Human Risk. |
Nudges
| Q: | What are Behavioral Nudges and how are they sent? |
| A: | Behavioral Nudges are Email-based micro-learning notifications that are sent to employees in responses to real behaviors (i.e. failing a phishing simulation, clicking a real phishing link). Later we will introduce the ability to send Nudges via Slack and Teams. |
| Q: | Are Behavioral Nudges automatically enabled? |
| A: | No, Behavioral Nudges must be enabled on the Nudge page, or via the first-time Rapid Deployment setup experience. |
| Q: | Is there any limit to the number of Behavioral Nudges an employee can receive? |
| A: | This maximum is one Nudge per Nudge "type" (such as "clicked on phishing link in past week") per hour. Users can receive more than two nudges in an hour if they are for different things. |
Modules
Once populated, you can switch around their order or delete the modules that are less relevant to your organization, supplementing them with the additional modules available to you on the platform.
| Q: | What topics do the modules cover? | |||||||||||||||||||||||||||||||||||||||||||||
| A: |
Engage offers dozens of modules to
address today's active threats in the following core content
categories:
|
|||||||||||||||||||||||||||||||||||||||||||||
| Q: | How often do we produce new modules? | |||||||||||||||||||||||||||||||||||||||||||||
| A: | We are consistently producing new content, aiming to cover new specialty topics and refresh older content. You'll never have to repeat content yearly, as new modules are always available. Our module topics are 100% informed by customer feedback and suggestions, so get in touch if you wish to request future modules. | |||||||||||||||||||||||||||||||||||||||||||||
| Q: | Are users notified / reminded to complete a module? | |||||||||||||||||||||||||||||||||||||||||||||
| A: |
By default, users receive reminders once a week for four weeks
until they've completed the training. After four weeks, they
are placed on a watch list that administrators can monitor and
take the necessary action. You can change the frequency of the
weekly reminders and the wording/branding of the email template
used. See
Managing Email Alerts.
We can synchronize with your Single Sign-On and Learning Management System to notify users as long as they have a unique identifier. |
|||||||||||||||||||||||||||||||||||||||||||||
| Q: | Can we set a due date for a module's completion? | |||||||||||||||||||||||||||||||||||||||||||||
| A: | Not when they are scheduled, but you can communicate a due date to the user by customizing the notification they receive to complete the module. You can monitor completions by exporting data from the Performance | Achievements tab. Modules that haven't been completed after four weeks are considered overdue, for the purposes of Human Risk. | |||||||||||||||||||||||||||||||||||||||||||||
| Q: | Can we customize a module's content? | |||||||||||||||||||||||||||||||||||||||||||||
| A: |
Yes, in part. You can
add your own files to a module (e.g.,
a policy/procedure document). We also provide a one-page brochure
per module in PDF and
PPT format that you can customize.
The uploaded file must be less than 5 MB
in size. The video content and training questions cannot be changed
as this ensures consistency across the platform to generate accurate
data for our scoring system.
You can also create your own custom modules. See the Managing Custom Modules page for further information. |
|||||||||||||||||||||||||||||||||||||||||||||
| Q: | If I watch a video but do not complete the quiz (i.e., if I accidentally close the window after watching), will I continue to receive notifications to complete my module? Will I be placed on the Watchlist if I do not fully comply? | |||||||||||||||||||||||||||||||||||||||||||||
| A: | Yes. | |||||||||||||||||||||||||||||||||||||||||||||
| Q: | I'm receiving errors (e.g., 101104) when accessing videos. What can I do? | |||||||||||||||||||||||||||||||||||||||||||||
| A: | We recommend using Chrome as your browser. Additionally, most errors can be solved by creating exceptions in web filtering or proxy applications for relevant Awareness Training domains: For further information, see the SMTP and URL Guide and JW Player Error Code Guide. | |||||||||||||||||||||||||||||||||||||||||||||
| Q: | Is there a best practice or recommended module roll out? | |||||||||||||||||||||||||||||||||||||||||||||
| A: |
You can review the most recommended content by clicking on the
GET PRECONFIGURED QUEUE button in the
Dashboard | Modules tab of the
Engage console. This is only available
when the queue is empty, but when selected, it will preconfigure
your queue with our most popular modules at your chosen date.
At present, the modules are:
|
|||||||||||||||||||||||||||||||||||||||||||||
| Q: | What happens to the personal information that is entered by a user in a multi-page Phishing Campaign? | |||||||||||||||||||||||||||||||||||||||||||||
| A: | The data that is entered by the user, such as login credentials, is completely discarded when moving to the landing page. None of the data within those textboxes is stored |
Administration
| Q: | Phishing Campaign emails are not appearing in the user's 'Focused Inbox'; instead, they are displaying in the 'Other' items mailbox |
| A: | See Focused Mailbox for how to create a Mail Flow Rule in Exchange Admin Center or disable the Focused Inbox feature. |
| Q: | Can you select where new users begin the training? |
| A: |
Yes. You can choose whether new users start from where the rest
are or have them start from the beginning of the training cycle.
To do this, select the appropriate
New User Policy by clicking on the
|
| Q: | What languages are supported? |
| A: | The platform supports many different languages, including some right-to-left languages. See Changing Your Local Language for the complete list of languages available and how to configure the selections. |
| Q: | Can we schedule modules for users to take on-demand? |
| A: | Yes. You can schedule targeted training for groups of users that need to learn about specific topics. While you can allow your users to access all the content at once, we recommend against it. Persistent training over time is the best path to real learning. See Scheduling Training Modules. |
| Q: | Can we export the dashboard data? |
| A: | Yes. Click on the Report button from the dashboard to generate a time-stamped PDF that summarizes all the critical data points. Additionally, the data behind the dashboard summary can be exported to a CSV file from inside the Performance tab detail. |
| Q: | Can we add our own branding to Engage? |
| A: | Yes, in part. Using the Mimecast Administration Console, you can add your organization logo to user notifications, training experience, and administration dashboards. Further details can be found in the Branding article. You can also add custom branding to the module notifications sent to your users within the Awareness Training platform (HTML is supported). |
| Q: | Can I prevent users who have left the organization from receiving training notifications, and can I exclude their data from reports? |
| A: | Yes. Administrators can select either an Active Directory group or a Mimecast Profile Group to no longer receive training modules using the Inactive User Group. Administrators also can exclude the users' data from all reporting. |
| Q: | Can I choose that my users are not asked to log in to the platform but instead go straight to their training? |
| A: |
Yes. Engage can be delivered to your
users without them having to authenticate. To enable this, log
a support case via the Support Hub, and our Service Delivery
team will notify you of its completion. Mimecast does not support External users on External domains for Login Free Engage. |
| Q: | When I create custom branding in Awareness Training, my images won't automatically download in Outlook. Is there a way to force this? |
| A: | This is an Exchange/Outlook limitation but can be remediated using a group policy. For more information, see Microsoft's article. |
| Q: | What supported variables am I able to use in phishing simulation emails? |
| A: | Several fields can be dynamically used when creating custom phishing templates. ** These are listed in the additional table below. |
| Q: | I use Microsoft 365, and my results for phishing simulations are coming up as 'clicked' when users are sure they've not clicked the URL. How can I bypass this in O365? |
| A: | To ensure the simulation emails are not interrogated, you'll need to create a bypass policy in Microsoft O365's Advanced Delivery section. Then, you can create the rule using Simulations Via Microsoft Advanced Delivery as guidance. |
| Q: | How do I manage the reassignment of user data when my company changes domains, or a specific user has changed their name? |
| A: |
To reassign users to a new email address, whether for a single
username change or an entire company domain, the following steps
apply:
See Managing Employees. |
| Q: | How does Mimecast manage users who are disabled in my directory? |
| A: | Mimecast automatically avoids sending any notifications, reminders or simulations from the platform to users observed to be disabled via the Directory Sync. |
** Fields that can be dynamically used when creating custom phishing templates
| Attribute | Description |
| [name] | Adds the recipient's name based on the attribute selected in the Email Recipient Name section in General Settings. |
| [companyname] | Populate your company's Company Name as per the Account Settings in the Mimecast Administration Console. |
| [currentdate] | Adds the date when the email is sent out. E.g., July 18, 2024. |
| [currentyear] | Adds the year. E.g., 2024. |
| [futuredate] | Adds a random date between +5 and +10 days. E.g., September 24, 2024. |
| [recentdate] | Adds a random date between -5 and -10 days. E.g., September 13, 2024. |
| [qrcode] | Adds a QR Code. |
| [cname] | Removes spaces from company names with more than a single word and makes it lowercase. E.g., "Company Name" becomes "companyname." |
| [obfuscatedEmail] | Masks the email address of the intended recipient. E.g., "name.surname@domain.com" becomes "na***e@domain.com." |
Risk Scoring and Performance
| Q: | Where does our industry comparison data come from? |
| A: | We've surveyed thousands of people across all major industries who have not taken our awareness training. We test them with our standard knowledge questions and record the percentage of correct answers and their industry. See Human Risk Scoring. |
| Q: | Can I see how user attitudes change over time? |
| A: | Yes. The changing attitude in your organization is exposed in real-time on your dashboard and incorporated into your risk score. You can also print daily, weekly, and monthly reports to gain a real-time pulse of the attitude in your organization. |
False Positives
When reviewing your Phishing Campaigns, you may see some unexpected results. This may show as a high percentage of click rates, or the IP addresses that the clicks are coming from look unusual. This could suggest false positives, which may affect your Campaign Statistics.
| Q: | What is a click? |
| A: | A click is what is tracked when the link within the Phishing Training Email has been clicked on, and is reflected in the Campaign Statistics. |
| Q: | What is a false positive? |
| A: | A false positive is when a click has been registered, without the interaction of your End Users clicking on a link within a Phishing Training Email, i.e. Bot Click. |
| Q: | What is a Bot Click? |
| A: | These are automated clicks from third party systems or platforms that scan or Sandbox the link to check whether they are malicious or not, or have been reported via Phishing software. |
| Q: | What are the potential reasons for false positives (or Bot Clicks)? |
| A: |
|
| Q: | How can I identify Bot clicks? |
| A: |
|
| Q: | Why am I seeing unknown or unexpected IP addresses associated with clicks? |
| A: |
You might see this due to:
|
| Q: | How can I prevent false positives? |
| A: |
You can limit false positives by:
|
| Q: | Why is it showing that one or all users clicked when they didn't, for a Phishing Campaign? |
| A: |
You can verify the IP address that the clicks are coming from,
by:
|
Integrations
| Q: | Can risk data be fed to an external tool? |
| A: | Yes. You can call our rest APIs to pull data into tools like Splunk, Tableau, or Power BI. See the Awareness Training API End Points on Mimecast Tech Connect article for more information. |
| Q: | Can we implement Single Sign-On (SSO)? |
| A: | Yes. You can configure Engage with most SSO providers as part of your implementation. For further details, see the "Configuring SSO" section of the Configuring Account General Settings page. |
| Q: | Can we integrate Engage with our Learning Management System (LMS)? |
| A: | No. Mimecast does not support LMS integrations. |
| Q: | Can training be provided in a SCORM package? |
| A: |
Yes, we do offer an Engage SCORM-only
annual subscription for customers. The best use cases for Engage SCORM are:
|
| Q: | Do SCORM videos come with a built-in quiz? |
| A: | No, but the relevant assessment questions are provided by default in English so that you can build & customize the quiz and translate them into various languages if necessary. |
SAFE Phish
| Q: | Can I turn off SAFE Phish? |
| A: | No. You cannot enable or disable SAFE Phish. All Engage customers with Targeted Threat Protect - URL Protect configured automatically get SAFE Phish. |
| Q: | Does SAFE Phish work for customers who have Google Workplace/ Yahoo / AOL etc.? |
| A: | Yes. Targeted Threat Protect - URL Protect is mail server agnostic. So regardless of your email hosting provider, if you have Targeted Threat Protect - URL Protect and Engage, SAFE Phish functionality is automatically available. |
| Q: | We've enabled Targeted Threat Protect User Awareness. Does this mean SAFE Phish won't work? |
| A: | No, although we do recommend it's disabled. This provides a more realistic phishing attack experience by not providing the "learning moment" provided by the user awareness functionality. |
| Q: | Does Targeted Threat Protect - URL Protect false positives impact user-level SAFE Phish scores? |
| A: | No. Only Targeted Threat Protect - URL Protect clicks categorized by the scanning engine as phishing result in the click being applied to SAFE Score (Human Error) and the email getting converted into a SAFE Phish template. |
| Q: | Can you create a campaign with randomized templates using Real Phishing Attacks templates? |
| A: | Yes. Once an actual phishing attack email is converted into a custom template, it is added to custom templates on the Email Templates tab. When you create a new campaign and select the "Random Templates" option, the real phishing attacks custom template is available for selection. |
| Q: | I don't have English as the selected language. Is SAFE Phish still available? |
| A: | Yes. The Logs tab on the phishing page is visible for all languages. Regardless of what language appeared on the phishing email, if a Targeted Threat Protect - URL Protect rewritten link is clicked, that email template is brought across to Engage Real Phishing Attacks, and the language remains as it was in the original email. If you convert the real attack into a phishing template, you can keep the text in the non-English language. Once saved, it is stored on the Email Templates tab in the Custom Templates section as if it were an English template. On Email Templates, English must be selected to view Custom Templates. When creating a new campaign, you must have English selected in the new campaign to view and select the custom template to use in the campaign, even if the contents of this template are non-English. |
| Q: | Can I search for real phishing attacks that have been de-weaponized into templates and look at user activity on them? |
| A: |
Yes. SAFE Phish displays de-weaponized
messages received within the last 30
days, and is searchable. See the Creating Templates From URL Protection Clicks page for more information. |
| Q: | We have Targeted Threat protection - URL Protect and Awareness Training enabled on our account, but I'm not seeing the SAFE Phish functionality. Why is this? |
| A: | It is not sufficient just to have the Targeted Threat Protection - URL Protect and Engage enabled on your account to see the SAFE Phish functionality. You must also have at least one Targeted Threat protection - URL Protect policy enabled. |
Other
| Q: | How long does it take to implement your system? |
| A: | Mimecast's Awareness Training package is implemented via a rapid deployment onboarding experience. We enable you to launch a 12-month program in minutes and automate the administration process as much as possible. Contact your Sales representative for more information. |
| Q: | Can we add more languages if asked? |
| A: | At present, we support the following languages found in Changing Your Local Language. However, if you require a language outside these already offered, please get in touch with us so we can log the request for future consideration. |
| Q: | Can we adjust the video playback quality to assist with low-bandwidth connections? |
| A: | Yes, the video quality can be adjusted on the player in the browser by using the 'Switch to Low / High Bandwidth' option at the bottom of the web player. |
Comments
Please sign in to leave a comment.