Having configured Integrations with your mailboxes and mail controls, every delivr.to campaign you send will provide rich detail into the emails that made it to your inbox, the state in which they arrived, and the assessment of them as they travel through each stage of your mail stack.

To highlight the most notable findings, your campaign results include Insights. These cover everything from:

  • Key payload delivery results: For example, the successful delivery of a prevalent malware family we’ve recreated.
  • Indication of mail control performance: Which tools blocked or flagged most emails? Which rules or signatures were most effective?
  • Attack surface reduction opportunities: Which uncommon file types known to be weaponised by threat actors could potentially be blocked?

An exhaustive list of the insights available to Enterprise users can be seen below. Users with Premium & Free subscriptions are limited to Informational insights only.

If there’s an insight you’d like to see added to the platform, contact us!

Legend

High Severity
Medium Severity
Low Severity
Informational Informational
Improvement Opportunity Negative Outcome
Effective Security Positive Outcome

Insights

  Name Severity Outcome
Attachments: Extensions successfully delivered Informational Improvement Opportunity
Attachments: High-risk attachment types permitted Effective Security
Attachments: QR code payload delivered Effective Security
Containers: All password-protected zip attachments blocked Improvement Opportunity
Containers: Password-protected zip attachments permitted Effective Security
Executables: All EXEs blocked Improvement Opportunity
Executables: EXEs permitted Effective Security
Executables: PowerShell scripts permitted Effective Security
HTML Smuggling: HTML Smuggling payload delivered Effective Security
HTML Smuggling: Potentially unwanted attachment types permitted Effective Security
HTML Smuggling: SVG Smuggling payload delivered Effective Security
Integration: Breakdown of Defender signatures flagged Informational Improvement Opportunity
Integration: Breakdown of Sublime rules flagged Informational Improvement Opportunity
Integration: Emails blocked by Defender 365 Informational Improvement Opportunity
Integration: Emails blocked by Sublime Informational Improvement Opportunity
Integration: Emails flagged by Sublime Informational Improvement Opportunity
Links: Active content fetch origins Informational Improvement Opportunity
Links: All actively fetched Improvement Opportunity
Links: All rewritten Improvement Opportunity
Links: Inconsistent rewrites Effective Security
Links: No active content fetching Effective Security
Links: Not rewritten Effective Security
Links: SMB link delivered Effective Security
Links: search-ms link delivered Effective Security
Office: All password-protected Office attachments blocked Improvement Opportunity
Office: Password-protected Office attachments permitted Effective Security
Office: Potentially unwanted attachment types permitted Effective Security
Office: Word remote template injection attachment delivered Effective Security
Threat Intel: Agent Tesla attachment delivered Effective Security
Threat Intel: AsyncRat attachment delivered Effective Security
Threat Intel: BumbleBee attachment delivered Effective Security
Threat Intel: CVE-2024-21413 delivered Effective Security
Threat Intel: Callback phishing attachment delivered Effective Security
Threat Intel: DarkGate attachment delivered Effective Security
Threat Intel: IcedId attachment delivered Effective Security
Threat Intel: Nobelium attachment delivered Effective Security
Threat Intel: Pikabot attachment delivered Effective Security
Threat Intel: QakBot attachment delivered Effective Security
Threat Intel: SocGholish attachment delivered Effective Security