# Phish Prone Reports Guide

## Phish Prone Reports Guide

In this article, we go over the available reports included in **Phish Prone Reports.** The phish prone score is generally calculated through a formula that takes as input all **actions/mistakes** made by recipients during a phishing campaign such as clicking on links, entering credentials, or opening attachments. Ultimately, the article covers the overall phish prone status of a company and later elaborates on a group and campaign level of reporting.

&#x20;

**1.** Navigate to **Reports:**

![](/files/u6tzYsLncpkwamlO2x8I)

**2.** Select the **PHISH PRONE REPORTS:**

![](/files/EPBFeTQKNagR9koy8B84)

You should get the following output:

![](/files/x5kBS61c3bOHXggjsJQN)

**3.** Let’s view the first option called **Phish Prone Overview.** To do this, press on the **View Report** button next to it:

![](/files/cJun7Eb7O1hiq3LigXCF)

![](/files/QN8nECtmzycoUQ94OdGm)

As indicated, this report calculates the phish prone level of the organisation based on **past** and **current** campaigns to provide us with an **overview** throughout time. Of course, this risk factor fluctuates as employees come and go, but also improves or worsens based on their performance during [Email Campaigns](https://docs.cyberawaresecurity.com/admin-portal/email-campaigns).

&#x20;

**4.** You may **download** the report for your own use. Just click on **Export PDF:**

![](/files/wxRqldkzfh0j21BAVwMU)

It will essentially export a **snapshot** of the report into a **PDF** file format:

![](/files/6NJXqnyg5QX8SayHTASy)

**5.** You can always click on the **Go Back** button to return to the previous directory:

![](/files/Yc3VRhiRBFySoZmcGCUQ)

**6.** Let’s move on to the next option of the **Phish Prone Reports** called **Phish Prone by Group:**

![](/files/wv3pTc29Gjbf9tUGf3bI)

![](/files/tDXfay7MuKMfucsPDQWk)

As we can see, this section provides a **graph** along with a **table,** and they display campaign statistics such as the **number of recipients** targeted by the campaigns, the **campaigns’ phish prone percentages** and more.

&#x20;

**7.** Additionally, we can **filter the graph** to draw specific results. To do that, just **click** on any of the available filtering values:

![](/files/d0DngDiAeQx1Rrg2rGyk)

In this example, we are filtering out the **Any Group** value:

![](/files/cdEsRJWPpkI91hZXHvtH)

**8.** You can always visit a **group** by clicking on their name:

![](/files/GvzGzv1wjs30HDSIe0YP)

![](/files/8nuQapDdiVHegprXdjHq)

**9.** Finally, let’s visit the **last** report called **Phish Prone by Campaigns:**

![](/files/WPJUUXZvD1a5pNHMm4fv)

![](/files/yaAoyTw23dJlHC4YT4GQ)

**10.** Just like with groups, we can click on a **Campaign** to view its stats.

![](/files/hou3IA0z5j1WqYxTgfzO)

![](/files/zlbM0MNxqwCyFvI2xrGe)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.cyberawaresecurity.com/admin-portal/reports/phish-prone-reports-guide.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
