Skip to main content

Your Guide to the User Portal

Updated over a week ago

Introduction

Welcome to the Guardz User Portal—your personal security dashboard!

Here, you can:

  • View & manage quarantined emails

  • ​Complete security awareness training

  • ​Take proactive steps to protect company data

By actively using the portal, you help prevent phishing, malware attacks, and unauthorized access to your organization. Let’s get started!


Getting Started: Accessing Your User Portal

How to Log In

  1. Click the portal link above


2. Choose Google Workspace or Microsoft 365, depending on your organization's email provider


3. Sign in with your company email credentials.



4. You will be redirected to your Guardz User Portal Dashboard.

Tip: Bookmark the portal link for quick access!


Navigating the User Portal

Upon logging in, your dashboard will look like this:

Left Menu Options-

  • Security Awareness Training – Complete assigned security lessons

  • Quarantined Emails – Review emails flagged as potentially suspicious



Email Security: Impersonation & Caution Banners

Why emails are flagged?

Email is one of the most common attack vectors used by hackers. Guardz automatically scans all incoming emails and applies banners to warn you of potential threats.

Caution Banners

Example:

Purpose:

  • Alerts you if an email attempts to impersonate someone in your organization

  • Warns you about potentially risky emails that are not outright impersonations

  • Warns you about cases that require extra attention (e.g., a first-time sender)

Triggers:

  • The sender’s email address resembles an internal company address but isn’t matched.

  • The sender’s alias matches an internal user, but the email address differs

  • The email contains suspicious links

  • Unusual sender behavior (e.g., first-time email from an unknown domain)

And many other parameters.

What to Do?

  • Verify the sender before responding

  • Report the email if it looks suspicious

  • If you recognize the sender, click "Mark as Safe"

  • If unsure, click "Report & Delete"


Attachments Passwords:

This feature may be enabled by your administrator to help keep your organization

secure.

If it is enabled and you receive an email with a password-protected attachment, you’ll need to enter the password before the file can be scanned.

The scan ensures that the attachment is safe to open.


Quarantined Emails: Managing Suspicious Emails

Why are emails quarantined?
Emails that are moderately or highly suspicious are automatically moved to Quarantine for your review.

How to Review Quarantined Emails

1. You will receive an alert email notifying you about a quarantined message


2. Click "Review" in the email, or go to User Portal > Quarantined Emails anytime

3. The quarantined email will display key details:

  • From, To, Subject, Date/Time

  • Attachments (if any)

  • Reason for quarantine

Actions you can take:

  • Restore – If the email is safe, it will be moved to your inbox

  • Trash – The email will be permanently deleted

Did you know?

You don’t need to take action on every quarantined email - Guardz will automatically delete them after a set period (the time will be noted in your alert email).


Security Awareness Training

Why is this important?
Security awareness training helps protect you and your company against phishing, malware, and social engineering attacks.

How to access your training:

Step 1: Receive an email Notification

You will receive an email when a new training is assigned.

  • The email will come from your IT/security admin or "sec-portal.io".

Step 2: Open the User Portal

1. Click "Start Your Training" in the email.
2. You will be redirected to your Awareness Training Dashboard.

Step 3: Complete Your Training

  • Uncompleted assignments have a white background

  • Completed assignments appear with a green background

  • Overdue assignments have a red deadline warning

Click on an assignment to start the training video. Pay close attention! There may be a quiz at the end.

Step 4: Submit Your Training

After watching all videos and answering the questions correctly, your assignment will be marked as completed.


Need Help? Contact Your IT Administrator!

Did this answer your question?