Yeah, I’m very confused by this. Why do the users notifying IT have to do the training?
I’ve worked a help desk before, while after dozens of people sending it in we don’t really need it forwarded anymore, people don’t know that until we get the I’d still rather people forward it than click it. Ignore and delete is best since I guarantee someone will forward it to IT, but forwarding (even forwarding and asking) is never bad and demonstrates good awareness.
Random but what I always wonder is: what’s the point of forwarding?
Are we assuming they’re attaching the original email’s source so that the headers can be used to determine the source? Without that, the only thing useful I can think of would be any links in the email body.
Asking because I’ve owned an email address or two that got leaked in data dumps so I go crazy tracking down the sending server’s owner, any companies they’re pretending to be, any domain registrars, etc. and a lot of that requires analyzing the headers.
sounds like the internal phishing service should be the one needing to do training
Yeah, I’m very confused by this. Why do the users notifying IT have to do the training?
I’ve worked a help desk before, while after dozens of people sending it in we don’t really need it forwarded anymore, people don’t know that until we get the I’d still rather people forward it than click it. Ignore and delete is best since I guarantee someone will forward it to IT, but forwarding (even forwarding and asking) is never bad and demonstrates good awareness.
The URL likely is unique per user. They forward it, IT clicks the link, it registers that that user clicked the link even though IT did it.
stop that part then
If only I had the power
Random but what I always wonder is: what’s the point of forwarding?
Are we assuming they’re attaching the original email’s source so that the headers can be used to determine the source? Without that, the only thing useful I can think of would be any links in the email body.
Asking because I’ve owned an email address or two that got leaked in data dumps so I go crazy tracking down the sending server’s owner, any companies they’re pretending to be, any domain registrars, etc. and a lot of that requires analyzing the headers.
IT can look up the original (including all headers) based on the forwarded content. It’s on the same mail server.
Oh that’s right! Wow!! Really feeling dumb for that one now.
Ah, yeah, forward as attachement of course.