You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-office-365/attack-simulation-training-end-user-notifications.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -147,6 +147,9 @@ On the details flyout from the **Tenant notifications** tab only, select **Edit
147
147
148
148
-**Use from default**: Select an available template to start with. You can modify the text and layout in the editing area. To reset the notification back to the default text and layout of the template, select **Reset to default**.
149
149
150
+
> [!TIP]
151
+
> To add images, copy (CTRL+C) and paste (CTRL+V) the image into the editor on the **Text** tab. The editor automatically converts the image to Base64 as part of the HTML code.
152
+
150
153
-**Code** tab: You can view and modify the HTML code directly.
151
154
152
155
You can preview the results by selecting **Preview email** at the top of the page.
Copy file name to clipboardExpand all lines: defender-office-365/attack-simulation-training-faq.md
+111-5Lines changed: 111 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ search.appverid:
12
12
- MET150
13
13
- MOE150
14
14
ms.assetid:
15
-
ms.collection:
15
+
ms.collection:
16
16
- m365-security
17
17
- tier2
18
18
ms.custom:
@@ -79,6 +79,71 @@ The training threshold in training campaigns prevents users from having the same
79
79
80
80
If you created a [simulation](attack-simulation-training-simulations.md#assign-training) or a [simulation automation](attack-simulation-training-simulation-automations.md#assign-training) with the training assignment value **Assign training for me (Recommended)**, we assign training based on a user's previous simulation and training results. To assign training based on specific criteria, select **Select training courses and modules myself**.
81
81
82
+
### What happens when a user replies to or forwards a simulation message?
83
+
84
+
If a user replies to or forwards a simulation message to another mailbox, the message is treated like a normal email message (including detonation by Safe Links or Safe Attachments). The [Simulation report](attack-simulation-training-insights.md#simulation-report-for-simulations) shows whether the simulation message was replied to or forwarded. Each URL in the simulation email is tied to an individual user, so Safe Links detonations are identified as clicks by the user.
85
+
86
+
If you use a dedicated security operations (SecOps) mailbox, be sure to identify it as a SecOps in the [advanced delivery policy](advanced-delivery-policy-configure.md#use-the-microsoft-defender-portal-to-configure-secops-mailboxes-in-the-advanced-delivery-policy) so messages are delivered unfiltered.
87
+
88
+
### How can I stagger the delivery of simulation messages?
- Simulation automations have a [simulation schedule page](attack-simulation-training-simulation-automations.md#simulation-schedule) where you can randomize delivery and configure other delivery details.
92
+
93
+
Either way, it's important to use different payloads to avoid discussion and identification among users.
94
+
95
+
### Why are images in simulation messages being blocked by Outlook?
96
+
97
+
By default, Outlook is configured to block automatic image downloads in messages from the internet. Although you can [configure Outlook to automatically download images](https://support.microsoft.com/office/15e08854-6808-49b1-9a0a-50b81f2d617a), we don't recommend it due to the security implications (potential automatic download of malicious code or web bugs, also known as web beacons or tracking pixels).
98
+
99
+
### I see clicks or compromise events from users who insist they didn't click the link in the simulation message
100
+
101
+
Third-party filtering services might be to blame. For any non-Microsoft filtering systems that you use, you need to allow or exempt the following items:
102
+
103
+
- All [Attack simulation training URLs](attack-simulation-training-get-started.md#simulations) and the corresponding domains. Currently, we don't send simulation messages from a static list of IP addresses.
104
+
- Any other domains that you use in custom payloads.
105
+
106
+
### Can I add the External tag or safety tips to simulation messages?
107
+
108
+
Custom payloads have the option to add the External tag to messages. For more information, see Step 5 in [Create payloads](attack-simulation-training-payloads.md#create-payloads).
109
+
110
+
There are no built-in options to add safety tips to payloads, but you can use the following methods on the **Configure payload** page of the payload setup wizard::
111
+
112
+
- Use an existing email message that contains the safety tip as a template. Safe the message as HTML and copy the information.
113
+
- Use the following sample code for the First contact safety tip:
### Can I assign training modules without putting users through a simulation?
144
+
145
+
Yes. For more information, see [Training campaigns in Attack simulation training](attack-simulation-training-training-campaigns.md).
146
+
82
147
## Issues with Attack simulation training reporting
83
148
84
149
### Differences in user activity data from Attack simulation training reports and other reports
@@ -98,8 +163,12 @@ Audit logging is required by Attack simulation training so events can be capture
98
163
99
164
To verify that audit logging is on or to turn it on, see [Turn auditing on or off](/purview/audit-log-enable-disable).
100
165
101
-
> [!NOTE]
102
-
> Empty activity details can also be caused by no E5 licenses being assigned to users. Verify at least one E5 license is assigned to an active user to ensure that reporting events are captured and recorded.
166
+
> [!TIP]
167
+
> Empty activity details are also caused by no E5 licenses being assigned to users. Verify at least one E5 license is assigned to an active user to ensure that reporting events are captured and recorded.
168
+
>
169
+
> User actions and admin actions are audited. In the Management Activity API, look for the [AuditLogRecordType](/office/office-365-management-api/office-365-management-activity-api-schema) values 85, 88, and 218.
170
+
>
171
+
> Some auditing information might also be available in the [CloudAppEvents table](/defender-xdr/advanced-hunting-cloudappevents-table) in Microsoft Defender XDR Advanced hunting via the Defender portal or the [Streaming API](/defender-xdr/streaming-api).
103
172
104
173
### Reporting issues with on-premises mailboxes
105
174
@@ -166,16 +235,23 @@ A: Several options are available to target users:
166
235
- Select users from a CSV file (one email address per line).
167
236
- Microsoft Entra group-based targeting.
168
237
169
-
We've found that campaigns where the targeted users are identified by Microsoft Entra groups are easier to manage.
238
+
We find that campaigns where the targeted users are identified by Microsoft Entra groups are easier to manage.
239
+
240
+
### Q: How many training modules are there?
241
+
242
+
Currently, there are 94 built-in trainings on the [Training modules](attack-simulation-training-training-modules.md) page.
170
243
171
244
### Q: Are there any limits in targeting users while importing from a CSV or adding users?
172
245
173
246
A: The limit for importing recipients from a CSV file or adding individual recipients to a simulation is 40,000.
174
247
175
-
A recipient can be an individual user or a group. A group might contain hundreds or thousands of recipients, so an actual limit isn't placed on the number of individual users.
248
+
A recipient can be an individual user or a group. A group might contain hundreds or thousands of recipients. The upper limit on the number of users is 400,000, but we recommend a limit of 200,000 users for each simulation for best performance.
176
249
177
250
Managing a large CSV file or adding many individual recipients can be cumbersome. Using Microsoft Entra groups simplify the overall management of the simulation.
178
251
252
+
> [!TIP]
253
+
> Currently, shared mailboxes aren't supported in Attack simulation training. Simulations should target user mailboxes or groups containing user mailboxes.
254
+
179
255
### Q: Does Microsoft provide payloads in other languages?
180
256
181
257
A: Currently, there are 40+ localized payloads available in 29+ languages: English, Spanish, German, Japanese, French, Portuguese, Dutch, Italian, Swedish, Chinese (Simplified), Norwegian Bokmål, Polish, Russian, Finnish, Korean, Turkish, Hungarian, Hebrew, Thai, Arabic, Vietnamese, Slovak, Greek, Indonesian, Romanian, Slovenian, Croatian, Catalan, and Other. We've determined that direct or machine translation of existing payloads to other languages leads to inaccuracies and decreased relevance.
@@ -198,6 +274,9 @@ A: Yes you can! On the last **Review Simulation** page in the new simulation wiz
198
274
199
275
:::image type="content" source="media/attack-sim-training-simulations-review-simulation.png" alt-text="The Send a test button on the Review simulation page" lightbox="media/attack-sim-training-simulations-review-simulation.png":::
200
276
277
+
> [!TIP]
278
+
> You can also use [Send a test](attack-simulation-training-payloads.md#send-a-test) from the **Payloads** page. But, if you ever use the selected payload in a simulation, the test message appears in the aggregate reports. You can export the results or use the [Microsoft Graph API](/graph/api/resources/report-m365defender-reports-overview) to filter the results.
279
+
201
280
### Q: Can I target users that belong to a different tenant as part of the same simulation campaign?
202
281
203
282
A: No. Currently, cross-tenant simulations aren't supported. Verify that all of your targeted users are in the same tenant. Any cross-tenant users or guest users are excluded from the simulation campaign.
@@ -217,3 +296,30 @@ So, on the initial run of a campaign with region aware delivery enabled, it migh
217
296
### Q: Does Microsoft collect or store any information that users enter at the Credential Harvest sign-in page, used in the Credential Harvest simulation technique?
218
297
219
298
A: No. Any information entered at the credential harvest sign-in page is discarded silently. Only the 'click' is recorded to capture the compromise event. Microsoft doesn't collect, log or store any details that users enter at this step.
299
+
300
+
### Q: How long is simulation information retained? Can I delete simulation data?
301
+
302
+
A: Simulation data is retained for 18 months from the date of generation. Data includes:
303
+
304
+
- Simulation metadata
305
+
- User activity
306
+
- Aggregate reports
307
+
308
+
The following data is retained until you [delete the simulation](attack-simulation-training-simulations.md#remove-simulations):
309
+
310
+
- Tenant payloads
311
+
- Notifications
312
+
- Login pages
313
+
314
+
### Q: Can I create, view, and manage simulations using an API?
315
+
316
+
A: Read and write scenarios are supported using the Microsoft Graph API:
317
+
318
+
-`AttackSimulation.Read.All`:
319
+
- Read simulation metadata
320
+
- Read user activity
321
+
- Read training data
322
+
- Read repeat offenders
323
+
-`AttackSimulation.ReadWrite.All`: Run simulations using the specified payloads, notifications, and login pages.
324
+
325
+
For more information, see [List simulations](/graph/api/attacksimulationroot-list-simulations) and [Reports API overview for attack simulation training as part of Microsoft Defender for Office 365](/graph/api/resources/report-m365defender-reports-overview).
Copy file name to clipboardExpand all lines: defender-office-365/attack-simulation-training-landing-pages.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -122,6 +122,9 @@ In custom landing pages only, an **Edit landing page** link is available at the
122
122
123
123
-**Import from library**: Select an available template to start with. You can modify the text and layout in the editing area. To reset the landing page back to the default text and layout of the template, select **Reset to default**.
124
124
125
+
> [!TIP]
126
+
> To add images, copy (CTRL+C) and paste (CTRL+V) the image into the editor on the **Text** tab. The editor automatically converts the image to Base64 as part of the HTML code.
127
+
125
128
-**Code** tab: You can view and modify the HTML code directly.
126
129
127
130
You can preview the results by selecting **Preview phish landing page** at the top of the page.
Copy file name to clipboardExpand all lines: defender-office-365/attack-simulation-training-login-pages.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -116,6 +116,9 @@ When you select a login page from the list by clicking anywhere in the row other
116
116
117
117
-**Add Next button**: Available only on **Page 1** of two-page logins. Select this link to add the 'Next' button to the login page. The default text on the button is **Next**, but you can change it.
118
118
119
+
> [!TIP]
120
+
> To add images, copy (CTRL+C) and paste (CTRL+V) the image into the editor on the **Text** tab. The editor automatically converts the image to Base64 as part of the HTML code.
121
+
119
122
-**Code** tab: You can view and modify the HTML code directly.
120
123
121
124
You can preview the results by clicking the **Preview email** button at the top of the page.
Copy file name to clipboardExpand all lines: defender-office-365/attack-simulation-training-payloads.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -245,6 +245,9 @@ To see payloads that have been archived (the **Status** value is **Archive**), u
245
245
246
246
The name value that you entered is added to the message body as a link to the phishing URL. On the **Code** tab, the link value is `<a href="${phishingUrl}" target="_blank">Name value you specified</a>`.
247
247
248
+
> [!TIP]
249
+
> To add images, copy (CTRL+C) and paste (CTRL+V) the image into the editor on the **Text** tab. The editor automatically converts the image to Base64 as part of the HTML code. The maximum payload size for a simulation is 4MB.
250
+
248
251
-**Code** tab: You can view and modify the HTML code directly.
249
252
250
253
-**Replace all links in the email message with the phishing link** (**Credential Harvest**, **Link to Malware**, **Drive-by URL**, or **OAuth Consent Grant** techniques only): This toggle can save time by replacing all links in the message with the previously selected **Phishing link** or **Link for attachment** URL. To take this action, toggle the setting to on :::image type="icon" source="media/scc-toggle-on.png" border="false":::.
@@ -389,7 +392,7 @@ To restore an archive payload on the **Tenant payloads** tab, do the following s
389
392
1. Set the **Show archived payloads** toggle to on :::image type="icon" source="media/scc-toggle-on.png" border="false":::.
390
393
2. Select the payload by clicking **⋮** (**Actions**) at the end of the row, and then select :::image type="icon" source="media/m365-cc-sc-archive-icon.png" border="false"::: **Restore**.
391
394
392
-
After you've restored the archived payload, the **Status** value changes to **Draft**. Toggle **Show archived payloads** to off :::image type="icon" source="media/scc-toggle-off.png" border="false"::: to see the restored payload. To return the payload to the **Status** value **Ready**, [edit the payload](#modify-payloads), review or change the settings, and then select **Submit**.
395
+
After you restore the archived payload, the **Status** value changes to **Draft**. Toggle **Show archived payloads** to off :::image type="icon" source="media/scc-toggle-off.png" border="false"::: to see the restored payload. To return the payload to the **Status** value **Ready**, [edit the payload](#modify-payloads), review or change the settings, and then select **Submit**.
Copy file name to clipboardExpand all lines: defender-office-365/attack-simulation-training-simulations.md
+19-3Lines changed: 19 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,6 +26,9 @@ In Attack simulation training in Microsoft 365 E5 or Microsoft Defender for Offi
26
26
27
27
For getting started information about Attack simulation training, see [Get started using Attack simulation training](attack-simulation-training-get-started.md).
28
28
29
+
> [!TIP]
30
+
> To assign training to users without putting them through a simulation, see [Training campaigns in Attack simulation training](attack-simulation-training-training-campaigns.md).
31
+
29
32
To launch a simulated phishing attack, do the following steps:
30
33
31
34
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration**\>**Attack simulation training**\>**Simulations** tab. Or, to go directly to the **Simulations** tab, use <https://security.microsoft.com/attacksimulator?viewid=simulations>.
@@ -34,10 +37,10 @@ To launch a simulated phishing attack, do the following steps:
34
37
35
38
:::image type="content" source="media/attack-sim-training-simulations-launch.png" alt-text="The Launch a simulation button on the Simulations tab in Attack simulation training in the Microsoft Defender portal" lightbox="media/attack-sim-training-simulations-launch.png":::
36
39
37
-
The following sections describe the steps and configuration options to create a simulation.
40
+
The following sections describe the steps and configuration options to create a simulation.
38
41
39
-
> [!NOTE]
40
-
> At any point after you name the simulation during the new simulation wizard, you can select **Save and close** to save your progress and continue later. The incomplete simulation has the **Status** value **Draft**. You can pick up where you left off by selecting the simulation and then selecting the :::image type="icon" source="media/m365-cc-sc-edit-icon.png" border="false"::: **Edit simulation** action that appears.
42
+
> [!NOTE]
43
+
> At any point after you name the simulation during the new simulation wizard, you can select **Save and close** to save your progress and continue later. The incomplete simulation has the **Status** value **Draft**. You can pick up where you left off by selecting the simulation and then selecting the :::image type="icon" source="media/m365-cc-sc-edit-icon.png" border="false"::: **Edit simulation** action that appears.
41
44
42
45
## Select a social engineering technique
43
46
@@ -800,6 +803,19 @@ To cancel a simulation, do the following steps:
800
803
801
804
After you cancel the simulation, the **Status** value changes to **Canceled**.
802
805
806
+
- Cancelling a simulation with the **Status** value **Scheduled** results in 100% cancellation. No training assignment messages or notifications are sent, and the campaign is fully ended.
807
+
- Cancelling a simulation with the **Status** value **In progress** has the following results:
808
+
- Simulation delivery continues to the target users.
809
+
- If you cancel the simulation after a training assignment, the training assignments are still shown as due, but subsequent training reminders are cancelled.
810
+
- If you cancel the simulation before a training assignment, the trainings aren't assigned and no training assignment notifications are sent.
811
+
- Users who already received the simulated phishing message experience the following results:
812
+
- For social engineering techniques that use phishing links (all except **Malware Attachment**), the links are deactivated. Selecting the link displays the following message:
813
+
814
+
> This URL was part of a simulated phishing exercise provided by Microsoft and is no longer active.
815
+
816
+
- For the **Malware Attachment** social engineering technique, the landing page remains visible.
817
+
- Positive reinforcement messages are delivered if the user reports the simulated phishing message.
818
+
803
819
### Remove simulations
804
820
805
821
You can't remove simulations with the **Status** value **In progress**.
0 commit comments