FIG. 19 illustrates an example system process for updating a reporter's reputation score where the reported message is not necessarily a simulated phishing attack.
FIG. 20 illustrates an example process for message quarantine and unquarrantine.
FIG. 21 illustrates an example system process for clustering messages.
FIG. 22 illustrates an example console module dashboard view.
FIG. 23 illustrates an example cluster summary.
FIG. 24 illustrates an example reported message summary.
FIG. 25 illustrates an example rule creation.
FIG. 26 illustrates an example rule creation from a reported message.
FIG. 27 illustrates an example console module text view.
FIG. 28 illustrates an example recipe creation from a reported message.
FIG. 29 illustrates various example integrations.
FIG. 30 illustrates an example method for selecting between authentication modes.
FIG. 31 illustrates an example data structure for a secure simulated phishing header.