Lucy Awareness
Visit our WebsiteContact Support
  • Wiki Overview
  • Guides
    • Quick Guides
      • Create Your First Campaign
        • Adding a New Client
        • Register an Attack Domain
        • Campaign Setup
          • Selecting an Attack
          • Attack Settings
          • Awareness Settings
          • Recipients
          • Review
        • Whitelisting
    • Installing Lucy
      • On-Premise vs Cloud Installation
      • Architecture
      • Hardware Requirements
      • Network Communication
      • Installing Lucy
      • Post Installation
    • Manage Blacklisted Domains
      • Managing Google SafeBrowsing Alerts
    • Whitelisting a Lucy Server
      • Google Workspace Whitelisting
      • Microsoft O365 Whitelisting
      • File Attack Whitelisting
    • Attack Simulations
      • Attack Types
        • Data Entry Attack
        • Hyperlink Attack
        • File Attack
        • Portable Media
        • Smishing
        • Lures
        • QR Codes
        • Ransomware Emulation
        • Technical Malware Test
          • Malware Toolkit Test Suite
        • Mail & Web Filter Test
        • Email Spoofing Test
      • Attack Template Customization
      • Firewall Protection Interval
      • Email Tracking Technologies
      • Advanced Information Gathering
      • Regular Expressions in Login Fields
      • Copy a Website
      • Redirecting Users
    • Awareness Training
      • Awareness Template Customization
      • Awareness Only Campaigns
        • Using Multiple Awareness Trainings
      • Use extended method of tracking the end of the quiz
    • Reporting Plugin
      • Deploying Office 365
      • Deploying Outlook Native
      • Deploying Gmail
  • Application Screens Reference
    • Statistics Dashboard
    • Campaigns Dashboards
    • Campaigns
      • New Campaign
        • Wizard Mode
          • Selecting an Attack
          • Attack Settings
          • Awareness Settings
          • Recipients
          • Review
        • Expert Mode
      • Campaign Settings
        • Configuration
          • Base Settings
          • Awareness Settings
          • Attack Settings
          • Schedule
            • Schedule Plan
          • Recipients
        • Advanced Settings
          • User Settings
          • Filters
          • Custom Fields
          • Reminders
        • Campaign Checks
        • Logs
        • Results
          • Summary
          • Statistics
          • Reports
          • Exports
    • Templates
      • Attack Templates
      • Awareness Templates
      • File Templates
      • Report Templates
      • Campaign Templates
      • Training Diploma
      • Download templates
      • Variables in Lucy
    • Users
      • Recipient Groups
      • End Users
      • End User Portal Settings
      • Administrative Users
      • Reputation Levels
    • Settings
      • Common System Settings
        • Domains
          • Supported TLDs
        • Firewall
        • Web Proxy
        • Mail Settings
        • SMTP Servers
        • SSL Settings
          • SSL for Campaigns
        • SMS Settings
        • Filter Settings
        • API Whitelist
          • API Routes
        • LDAP Servers
          • LDAP Sync Tool
        • LDAP Settings
        • Azure Applications
        • Azure AD Settings
        • SSO Configuration
      • Advanced System Settings
        • Advanced Settings
        • SSH Password
      • Submitted Email Settings
        • Custom Rules & Score Factors
        • Abuse Reports
        • Incident Autoresponder
        • Plugin Settings
      • Clients
        • Client Invoices
        • Client Invoice Settings
      • Backup and Restore
        • Backup Settings
      • Benchmark Sectors
      • Whitelabeling
      • File Browser
    • Incidents
    • Support
      • Status
        • Status
        • System Monitoring
        • System Health Check
        • Notifications
      • System Tests
        • Test Email
        • Performance Test
        • Spam Test
        • Mail Spoofing Test
        • Mail and Web Filter Test
      • System Logs
      • Manual
      • Update
      • Reboot
      • Mail Manager
      • Terms & Conditions
    • Account Settings
      • Two Factor Authentication
      • License
      • Invoices
    • Notifications
  • Release Notes
    • 5.4
    • 5.3.5
    • 5.3.4
    • 5.3.3
    • 5.3.2
    • 5.3.1
    • 5.3
    • 5.2.1
    • 5.2
    • 5.1
    • 5.0
    • Version 4
      • 4.14
      • 4.13
      • 4.12.1
      • 4.11
      • 4.10.1
      • 4.9.5
      • 4.9.2
      • 4.9.1
  • Legal
    • EULA
    • Privacy Policy
    • DPA, Customer and Partner Info
    • Service Level Agreement
    • Confidentiality of Campaign Data
  • When to Contact Us
    • Contact Technical Support
Powered by GitBook
On this page
  • Introduction
  • Configuration
  • User Permissions

Was this helpful?

  1. Application Screens Reference
  2. Campaigns
  3. Campaign Settings
  4. Advanced Settings

User Settings

PreviousAdvanced SettingsNextFilters

Last updated 11 months ago

Was this helpful?

Introduction

The "User Settings" tab allows you to add an with the role of "User" to a campaign and set the desired permissions. This is ideal for including stakeholders in the campaign, ensuring they are bound by their respective for data isolation and are given only the necessary permissions to view or make minor changes to the campaign configuration.

Configuration

Navigate to Campaign -> Advanced Settings -> User Settings

Please note, Administrative users with permission assigned "Access All Campaigns" will automatically be added to campaigns for their respective client.

Select "Add User" to add an Administrative User with role = User to your campaign.

User Permissions

Defines the specific capabilities granted to the user within the application.

  • Select All

    • Description: Grants all available permissions to the user.

    • Example: Check this box to give "Billy Joel" full access to all features and settings.

  • Start/Stop Campaign

    • Description: Allows the user to start and stop email campaigns.

    • Example: Useful for campaign managers who need to control the timing of campaigns.

  • Configure Campaign Settings

    • Description: Enables the user to configure campaign settings.

    • Example: Suitable for users responsible for setting up campaign-specific parameters like a mail Administrator to obtain DKIM records.

  • Delete Campaign

    • Description: Allows the user to delete campaigns.

    • Example: Important for administrators who need to manage and clean up outdated or incorrect campaigns.

  • Edit Recipients

    • Description: Permits the user to edit the list of recipients for campaigns.

    • Example: Useful for HR or IT personnel who manage recipient lists.

  • Edit Awareness Website

    • Description: Enables the user to edit the awareness website content.

    • Example: Suitable for content managers who update training materials.

  • Edit Schedule

    • Description: Allows the user to edit the campaign schedule.

    • Example: Ideal for scheduling managers who need to adjust campaign timings.

  • Edit Base Scenario Settings

    • Description: Permits the user to edit the base settings of scenarios.

    • Example: Useful for technical staff who configure scenario parameters.

  • Edit Scenario Settings

    • Description: Enables the user to edit specific scenario settings.

    • Example: Appropriate for red team members who tailor attack scenarios to different user groups.

  • Edit Scenario Landing Page

    • Description: Allows the user to edit the landing pages used in scenarios.

    • Example: Important for web designers who customize landing pages for better user engagement.

  • Edit Scenario Message

    • Description: Permits the user to edit the messages used in scenarios.

    • Example: Suitable for red team members who craft phishing and awareness messages.

  • Create/View Reports

    • Description: Enables the user to create and view reports.

    • Example: Essential for analysts who need to review campaign effectiveness.

  • Export to File

    • Description: Allows the user to export data to a file.

    • Example: Useful for users who need to share data with external systems or stakeholders.

  • Export to Group

    • Description: Permits the user to export data to a group.

    • Example: Ideal for administrators who manage security awareness programs.

  • Campaign Full Statistics

    • Description: Grants access to full campaign statistics.

    • Example: Important for users who require detailed insights into campaign performance.

  • Campaign Basic Statistics

    • Description: Grants access to basic campaign statistics.

    • Example: Suitable for stakeholders who need an overview of campaign performance without detailed data.

  • Reset Stats

    • Description: Allows the user to reset campaign statistics.

    • Example: Useful for administrators who need to clear and restart campaign data.

  • Access Message Log

    • Description: Permits the user to access the message log.

    • Example: Important for technical staff who troubleshoot email delivery issues.

  • Supervision Log

    • Description: Enables the user to access the supervision log.

    • Example: Useful for supervisors who need to monitor and approve campaign activities.

  • Reminders

    • Description: Allows the user to manage reminders.

    • Example: Suitable for users who send follow-up reminders to recipients.

  • Responses

    • Description: Permits the user to manage responses.

    • Example: Important for users who handle recipient feedback and responses to campaigns.

Example Use

For "Billy Joel," if he is a campaign manager responsible for running and monitoring security awareness campaigns, you might assign permissions such as "Start/Stop Campaign," "Configure Campaign Settings," "Create/View Reports," and "Campaign Full Statistics." This ensures he has the necessary access to manage and analyze the campaigns effectively without granting excessive permissions.

Administrative User
client