You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-office-365/attack-simulation-training-payloads.md
+41Lines changed: 41 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -407,6 +407,47 @@ On the **Tenant payloads** or **Global payloads** tabs, you can send a copy of t
407
407
408
408
Select the payload by clicking the check box next to the name, and then select the :::image type="icon" source="media/m365-cc-sc-send-icon.png" border="false"::: **Send a test** button that appears.
409
409
410
+
### QR code payloads
411
+
412
+
#### Global payloads
413
+
Within the payload library, you can see multiple payloads across 5 languages, addressing various real-world scenarios involving QR code attacks. These payloads can be found in the Content Library- Global Payloads, name of each beginning with QR code payloads (for example, QR code payloads: Prize Winner Notification). You can locate these by typing "QR" in the search bar.
414
+
415
+
:::image type="content" source="media/attack-simulation-training-global-payloads-QR-code.png" alt-text="Image showing the QR code how to guide within the content library" lightbox="media/attack-simulation-training-global-payloads-QR-code.png":::
416
+
417
+
> [!TIP]
418
+
> Before utilizing these payloads in your simulations, make sure to examine different fields and contents of the payload for your requirements.
419
+
#### Tenant payloads
420
+
You can create a custom payload by duplicating the existing global payloads, or creating a payload from scratch. Within the payload editing experience, you can insert QR code using Dynamic Tags(Insert QR code) or formatting controls (QR code icon). You have the options to select the size and position of the QR code.
421
+
422
+
:::image type="content" source="media/attack-simulation-training-insert-QR-code-1.png" alt-text="Image showing the experience for inserting a QR code in tenant payload" lightbox="media/attack-simulation-training-insert-QR-code-1.png":::
423
+
424
+
:::image type="content" source="media/attack-simulation-training-insert-QR-code-2.png" alt-text="Image showing the experience for inserting a QR code in tenant payload" lightbox="media/attack-simulation-training-insert-QR-code-2.png":::
425
+
426
+
:::image type="content" source="media/attack-simulation-training-insert-QR-code-3.png" alt-text="Image showing the experience for inserting a QR code in tenant payload" lightbox="media/attack-simulation-training-insert-QR-code-3.png":::
427
+
428
+
:::image type="content" source="media/attack-simulation-training-insert-QR-code-4.png" alt-text="Image showing the experience for inserting a QR code in tenant payload" lightbox="media/attack-simulation-training-insert-QR-code-4.png":::
429
+
430
+
:::image type="content" source="media/attack-simulation-training-insert-QR-code-5.png" alt-text="Image showing the experience for inserting a QR code in tenant payload" lightbox="media/attack-simulation-training-insert-QR-code-5.png":::
431
+
432
+
The QR code that is generated will map to the phishing URL that is selected by you while configuring the payload in the payload wizard. When this payload is used in simulation, the service will replace the QR code with a dynamically generated QR code, to track click and compromise metrics. The size, position, and shape of the QR code would match the configuration of the QR set by you in the payload.
433
+
434
+
Note that if you are using Send a Test, you will still see the QR code, but it will point to the
435
+
{phishingURL} that you have selected. The dynamic QR is generated when the payload is used in an
436
+
actual simulation
437
+
438
+
The QR code is inserted as an image. If you look at the code section, you will see that the image has
439
+
been inserted into a base64 format. The QR code inserted using the wizard (and which will be
440
+
used for dynamic URL update) is marked with div id= QRcode as seen in the first line of below
441
+
image.
442
+
443
+
:::image type="content" source="media/attack-simulation-training-insert-QR-code-6-html-div.png" alt-text="Image showing the base 64 format of the QR image and the variable" lightbox="media/attack-simulation-training-insert-QR-code-6-html-div.png":::
444
+
445
+
> [!TIP]
446
+
> Make sure to verify the login page while using the payload in a simulation. You can also
447
+
change the login page while selecting the payload in a simulation.
448
+
> It is advisable to conduct a test simulation to validate the end-to-end flow before
449
+
circulating the final payload to broader audiences. Make sure that the payload contains the div id= QR code within the payload code, before using it in a simulation.
450
+
410
451
## Related links
411
452
412
453
[Get started using Attack simulation training](attack-simulation-training-get-started.md)
Copy file name to clipboardExpand all lines: defender-office-365/attack-simulation-training-simulations.md
+44Lines changed: 44 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -853,3 +853,47 @@ To include a completed session in reporting after it has been excluded, do the f
853
853
2. Select the simulation by clicking **⋮** (**Actions**) at the end of the row, and then select :::image type="icon" source="media/m365-cc-sc-include-icon.png" border="false"::: **Exclude**.
854
854
855
855
After you included the excluded simulation, the **Status** value changes to **Completed**. Toggle **Show excluded simulations** to off :::image type="icon" source="media/scc-toggle-off.png" border="false"::: to see the simulation.
856
+
857
+
## QR code simulations and training
858
+
> [!IMPORTANT]
859
+
> Currently, QR code simulations in Attack simulation training is in Preview.
860
+
The current flow of running simulations, which involves selection of users, selection of payload, scheduling training, and notifications is also applicable for QR code-based simulations. Within simulations, you can select payloads with QR codes and use them for simulation.
861
+
862
+
Currently configuring payloads with QR codes and use of these payloads in a simulation is applicable to the Email platform and for the below attack techniques.
863
+
864
+
- Credential harvest
865
+
- Link to malware
866
+
- drive by URL
867
+
- oAuth consent grant
868
+
869
+
Given that QR codes are another vector for the phishing URL, the user events around read/delete/compromises/clicks remain the same. E.g. If a user is navigating to the URL after scanning the QR code, then it is tracked as a click event. The existing mechanisms for tracking compromise, deletes, report events remain the same.
870
+
871
+
For more details about QR code payloads, configuring a QR payload, see [QR payloads](attack-simulation-training-payloads.md#QR-Code-Payloads).
872
+
873
+
### Reporting for QR code simulations
874
+
Given that QR codes is just another vector for the phishing URL, the user events around
875
+
read/delete/compromises/clicks remain the same. E.g. If a user is navigating to the URL after
876
+
scanning the QR code, then it is tracked as a click event. The existing mechanisms for tracking
877
+
compromise, deletes, report events remain the same.
878
+
Within the simulation report CSV (exported from individual simulations), you will be able to view the
879
+
field Click Source (EmailLinkClicked_ClickSource) as a column, with values as ‘PhishingURL’ (click
880
+
came from a phishing link in email content) or ‘QR code’ (click came after scanning a QR code). Other
881
+
metrics like Reads, Compromises, Deletes, Reported Message continue to be tracked without any
882
+
additional updates.
883
+
884
+
:::image type="content" source="media/attack-simulation-training-reporting-QR-code.png" alt-text="Image showing the reporting experience for running QR code simulations" lightbox="media/attack-simulation-training-reporting-QR-code.png":::
885
+
886
+
### QR code trainings
887
+
888
+
We have provided two mechanisms for learning about QR based attacks: How to guides, and new training modules from our content partner.
889
+
How to Guides is designed to provide a lightweight guidance to end users on how to report a phishing message directly through email. By delivering these guides directly to the end user's inbox, we can ensure that the end user has the information they need to confidently report any suspicious emails.
890
+
891
+
You can filter for the How to Guide through either:
892
+
1. Filtering by Technique = How to Guide
893
+
2. Search by name = " Teaching Guide: How to recognize and report QR phishing messages
894
+
895
+
:::image type="content" source="media/attack-simulation-training-how-to-guide-QR-code.png" alt-text="Image showing the QR code how to guide within the content library" lightbox="media/attack-simulation-training-how-to-guide-QR-code.png":::
896
+
897
+
Within the trainings list (Content Library- Training Modules), we have added a new training called Malicious Digital QR Codes which is a short learning to educate on what to do when a user receives a QR code in the email. You can assign the training as part of a simulation or use training campaigns to assign the training to your users.
898
+
899
+
:::image type="content" source="media/attack-simulation-training-out-of-the-box-training-QR-code.png" alt-text="Image showing the QR code trainings available within Content library" lightbox="media/attack-simulation-training-out-of-the-box-training-QR-code":::
0 commit comments