Get started with Trend Micro Vision One Phishing Simulation to simulate realistic phishing attacks and identify security risks.
Simulate a phishing attack in your organization to identify employees who are most likely to click on links or enter credentials in a real phishing attack. Lower your security risk by educating these employees about how to avoid phishing attacks.
The phishing email template and landing page are paired. The landing page changes depending on the email template you select.
Manual entry
CSV file
Third-party data source
The Start time is automatically set to the date and time the simulation is created. The End time can be set manually, within a range of three to seven days after the start time.
To view general information on setting up allow lists, see Setting Up Allow List Phishing Simulation
To set up your Google Workspace allow list, see Setting Up Google Workspace Allow List.
To set up your Trend Micro Email Security allow list, see Setting Up Email Security Allow List.
To set up your Microsoft Exchange and 365 Defender allow list, see Setting Up Microsoft Allow List general allow list