Adaptive's Scenario Library, accessible via the Scenario Library tab in the left-hand navigation bar, allows customers to manage and create phishing scenarios that can be included in phishing campaigns.
Global Scenarios
Under the Global tab, you’ll find a variety of pre-built phishing scenarios. These scenarios are ready to be added directly to phishing campaigns.
Note: Global scenarios cannot be edited directly. However, you can duplicate them and edit the duplicates.
You can also use filters in the left-hand navigation bar to find scenarios that meet criteria such as:
Attack type (e.g., vendor impersonation, voice phishing)
Sender persona (e.g., finance, IT)
Vendor (e.g., Google, Slack)
Difficulty level
Viewing Scenario Details
Click on a scenario to preview what employees will see when they receive the phishing simulation. Depending on the scenario, this may include:
The phishing email an employee receives
A simulated phone call if they are prompted to call a number
Other social engineering formats
Spoof pages: Some scenarios include spoof pages—web pages that employees are directed to from an initial phishing message. These are designed to mimic real login or data entry pages that attackers commonly use to steal credentials.
Fail page: Almost every scenario includes a fail page, which employees see after taking a “failure” action (e.g., clicking a phishing link). This page explains that they just experienced a phishing simulation and provides guidance on how to recognize phishing attempts in the future.
Custom Scenarios
There are two ways to create custom phishing scenarios:
Duplicate an existing scenario
Open a scenario from the Global tab.
Click Duplicate and Edit in the top right corner.
Make any desired edits.
Create a new scenario from scratch
Click New Scenario in the top right corner.
New scenarios will appear under a tab named after your company.
Note: Custom scenarios you create are only visible within your organization.
When creating a new scenario, you can define key details, including:
Default Fail Condition – how employee performance will be measured.
Vendor – select from a list of vendors the phishing attack will spoof.
Message details – subject line, message body, and other content.
Phishing link – add a clickable phishing link by highlighting text and selecting Phishing Link.
Once your message is ready:
Save your scenario.
Click View Scenario Flow (top right) to see the complete flow employees will experience.
To publish your scenario and include it in a real phishing campaign, navigate to the Phishing Campaigns page from the left-hand navigation bar. From there, you can add your scenario to a campaign for your employees.
