# Phishing Reports

## Phishing Reports Guide

In this article, we cover the different reports we can view regarding **Email Campaigns. Phishing Reports** are available for users of the admin portal and will provide statistics that are very much a necessity to all organisations and their reporting responsible departments, such as Human Resources, etc. This report focuses on **Phishing Campaigns** related analysis and can assist companies identify the most common mistakes made by their personnel as well as point out all employees that have not been “phished” yet.

&#x20;

**1.** Navigate to **Reports:**

![](/files/UnyPhahvh2jd9o3IoLnc)

**2.** Select the **PHISHING REPORTS:**

![](/files/VVgO98u0tN0mxwLeyBCS)

You should get the following output:

![](/files/6CuWcIeoY7dSZoeDoDOc)

**3.** You can always click on the **Go Back** button to return to the previous directory:

![](/files/wbcJf8iRYLTqk5P86CJa)

![](/files/MkEGnShgBU9TI9GDiAnw)

**4.** Let’s view the first option called **Email Campaign Report Card.** To do this, press on the **View Report** button next to it:

![](/files/HOdvESTXoDRJ4qYy50ea)

A report card will look like the below. Before exporting a report, you may apply different filters such as the Recipient Position, the Department, Division, Location and for which campaign to export a report.

<figure><img src="/files/0sOYsiZPvxsz4LZHCRM5" alt=""><figcaption></figcaption></figure>

**5.** You may **download** the report for your own use. Just click on **Export PDF** or **Export Excel:**

<figure><img src="/files/IZ1SgVy2QX8fbBbuAZat" alt=""><figcaption></figcaption></figure>

It will essentially export a **snapshot** of the report into a **PDF** file format:

![](/files/kVu9H7u6ZbCD3fiuErQR)

**6.** In general, at the **top** of the report, we can see various **Campaign Details** such as **dates, addresses** and **phishing methods** (**attachments** and/or **landing pages**) used.

<figure><img src="/files/t3mRMRggTkCqUnVsLfTw" alt=""><figcaption></figcaption></figure>

**7.** On the other hand, middle section of the report provides statistics about **Campaign Failures** such as estimated **Failure** (phish prone) **Percentage** and **Phishing Failures** which displays the target recipients along with their various actions.

![](/files/R24nopyxAwTGecYrikWM)

**8.** The **Recipient Status,** which is found at the bottom of the report, shows different recipient related information as well as the **final actions** (**Opened Attachment**) taken by that recipient during the phishing campaign:

![](/files/YBh6KhxZl0HLwINAM7oU)

**9.** You can always visit a **recipient’s profile** by clicking on their name:

![](/files/50sXAl0LbwcxjefjI8sF)

![](/files/U9DJVzvtC3n13L1wR8ry)

**10.** Same thing applies for **groups:**

![](/files/tCawapA40uu46OPjKadP)

![](/files/WX4fwztsb1ZODb4nqj1b)

**11.** Let’s move on to the next option of the **Phishing Reports** called **Phishing Failures by Campaigns:**

![](/files/WylTvqs2ruZrLHVRgV47)

![](/files/5N6awyGoxCoKUOL8y39s)

As we can see, this section provides a **graph** along with a **table,** and they display campaign statistics such as the **number of recipients** targeted by the campaigns, the **campaigns’ phish prone percentages** and more.

&#x20;

**12.** Additionally, we can **filter the graph** to draw specific results. To do that, just **click** on any of the available filtering values:

![](/files/mcsQpwRoQZqWR4YJ0B55)

In this example, we are filtering all campaigns out of all the available options except the **Attachments Opened** value:

![](/files/283b07LEbtpDFImmSAOi)

**13.** As with recipient profiles and groups, we can click on a **Campaign** to view its stats.

![](/files/o25dsXq7B1gNBg4cqeiY)

![](/files/pGQliXxLgxQeMzBRawNb)

**14.** Finally, let’s visit the **last** phishing report called **Unphished Recipients:**

![](/files/CZi4QhcUdt8kDY9b7HqC)

![](/files/SUvqbSea4s9Z8SHUYCNJ)

This report displays a list of recipients that have not been “phished” yet. It will essentially help you develop a **pending recipients** list for your next [Email Campaign](https://docs.cyberawaresecurity.com/admin-portal/email-campaigns).


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.cyberawaresecurity.com/admin-portal/reports/phishing-reports.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
