Overview
Indicates the types of devices (desktop vs. mobile), operating systems, browsers, and browser versions that were used by employees who fell for a mock phishing email. Also reports on out‐of‐date and potentially vulnerable third‐party plug‐ins (via the optional Weak Network Egress Detection feature).