When a sketchy message hits an inbox, users can act immediately. With the Reporter add-in installed, they tap the button, pick a reason, and the full message (headers included) is sent to the security team. The email can be moved out of the user’s mailbox or copied to a quarantine folder to prevent clicks. An automatic acknowledgment confirms it was received and, if desired, offers short, role-based guidance so people learn as they report. This simple habit builds a reliable human sensor network without changing how employees work.
On the security side, new submissions land in a unified triage queue. Duplicate reports are grouped, campaigns are clustered, and analysts see who reported first, how many people received the same lure, and which business units are affected. One click classifies the item (malicious, suspicious, or safe) and triggers the right follow-up: thank-you notes for valid finds, coaching for false alarms, and immediate escalation for high-risk content. Links and attachments can be sandboxed through integrations; indicators flow to email gateways, EDR, and blocklists. Escalations notify on-call staff and route high-severity items based on rules, reducing dwell time from minutes to seconds.
Leaders get live visibility: report volume by team, median time to triage, false-positive rates, top reporters, and trending campaigns. These metrics help prioritize training, refine mail filtering, and track service levels. Scheduled exports feed SIEM/SOAR, while APIs and webhooks let you push outcomes to ticketing or chat. Standardized formatting keeps incident data consistent, making searches and playbooks repeatable. Status tracking shows where each item sits—new, in review, resolved—with clear ownership and timestamps, so audits are painless and handoffs are clean.
Rollout is straightforward: deploy the add-in to mail clients, connect the reporting mailbox, define severity labels, and customize auto-responses. If you use Cofense PhishMe, plug in simulations so users get credit for catching practice emails and analysts can compare training results against real threats. Publish a short how-to guide, run a weekly drill, and tune automations as you learn which patterns matter most to your environment. Over time, you’ll convert casual reporters into sharp spotters, cut manual work with policy-driven actions, and turn every inbox into an early warning system.
Cofense Reporter
Custom
Detect and report phishing threats
Automated responses
Crowd-sourced intelligence
Comments