Use Case: Phishing
Phishing is one of the most common and critical threats our customers face. This quickstart guide walks you through the setting up the phishing use case in Radiant Security, ensuring that we're fully set up to begin triaging phishing and business email compromise (BEC) reports.
Prerequisites
Enable your Domains
Log in to Radiant Security.
In the navigation menu, click Settings > Domains.

Locate the list of domains synchronized from your email provider.
For Status, toggle on each domain you want Radiant to monitor and triage for phishing.

Tip: Only enable domains that send or receive email relevant to your organization’s security posture.
Configure email forwarding
Choose one of the following methods to forward phishing emails and BEC reports into Radiant. Only one configuration is required, select the option that best fits your environment and solutions:
Direct Office 365 Forwarding: Set up O365 to forward phishing emails to Radiant Security
KnowBe4 on Office 365: Set up KnowBe4 on O365 to forward phishing emails to Radiant Security
KnowBe4 on Chrome: Set up KnowBe4 on Chrome to forward phishing emails to Radiant Security
Proofpoint PhishAlarm: Set up Proofpoint PhishAlarm to forward phishing emails to Radiant Security
Next steps
Verify ingestion: Send a test phishing email to confirm Radiant ingests and triages it correctly.
Review playbook: Customize or build playbooks under Workflows to automate containment and remediation actions for phishing alerts. More information can be found here.
Monitor dashboards: Check the Incidents dashboard to see real-time phishing and BEC alerts triaged by Radiant.
Last updated