We are requesting improved integration between BullPhish ID (phishing simulations) and INKY (email security) to better handle user-reported simulated phishing emails.
Current Issue:
When a user correctly identifies and reports a BullPhish simulation using the “Report Phish” button, the message is treated as a real phishing incident by INKY. This results in:
Unnecessary ticket creation (Autotask PSA)
SOC/technician time spent reviewing false incidents
User confusion due to lack of feedback
Increased noise in phishing reporting workflows
Requested Behavior:
When a user reports a BullPhish simulation:
The system should automatically recognize the message as a simulation (via headers, tagging, or integration).
The user should receive immediate feedback such as:
“Good catch — this was a simulated phishing test.”
The event should be logged in BullPhish as a successful user action.
The report should NOT:
Generate a phishing incident in INKY
Trigger SOC workflows or alerts
Create tickets in Autotask
Additional Suggestions:
Introduce a header/tag (e.g., X-Phish-Simulation: BullPhish) for easy identification
Allow MSPs to define handling rules for simulated phishing reports
Provide reporting on user detection success without impacting security incident metrics
Business Impact:
Reduces false positives and alert fatigue
Improves technician efficiency
Enhances user training experience with immediate reinforcement
Aligns phishing simulation outcomes with real-world SOC workflows
This integration would significantly improve operational efficiency and the overall effectiveness of the Kaseya security stack.
Please authenticate to join the conversation.
In Review
Email Security
Integrations
3 days ago

Geoff Levy
Get notified by email when there are changes.
In Review
Email Security
Integrations
3 days ago

Geoff Levy
Get notified by email when there are changes.