Skip to content

Commit 42fcfa1

Browse files
authored
Merge pull request #1670 from VipulMSFT/patch-9
Update attack-simulation-training-faq.md
2 parents 7c7850d + a3f0074 commit 42fcfa1

File tree

2 files changed

+23
-5
lines changed

2 files changed

+23
-5
lines changed

defender-office-365/attack-simulation-training-faq.md

Lines changed: 22 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.custom:
1919
- seo-marvel-apr2020
2020
description: Admins can learn about deployment considerations and frequently asked questions regarding Attack simulation and training in Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2 organizations.
2121
ms.service: defender-office-365
22-
ms.date: 09/23/2024
22+
ms.date: 10/22/2024
2323
appliesto:
2424
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
2525
---
@@ -96,13 +96,24 @@ Either way, it's important to use different payloads to avoid discussion and ide
9696

9797
By default, Outlook is configured to block automatic image downloads in messages from the internet. Although you can [configure Outlook to automatically download images](https://support.microsoft.com/office/15e08854-6808-49b1-9a0a-50b81f2d617a), we don't recommend it due to the security implications (potential automatic download of malicious code or web bugs, also known as web beacons or tracking pixels).
9898

99-
### I see clicks or compromise events from users who insist they didn't click the link in the simulation message
99+
### I see clicks or compromise events from users who insist they didn't click the link in the simulation message OR I see clicks within a few seconds of delivery for many users (false positives). What's going on?
100100

101-
Third-party filtering services might be to blame. For any non-Microsoft filtering systems that you use, you need to allow or exempt the following items:
101+
These events can occur when additional security devices or applications inspect simulation messages. For example (but not limited to):
102+
103+
- Applications or plugins within Outlook that inspect or intercept the message.
104+
- Email security applications.
105+
- Endpoint security or anti-virus software.
106+
- Security orchestration, automation and response (SOAR) playbooks that automatically triage or automatically respond to reported messages.
107+
108+
These types of applications can look at web content to detecting phishing, so you need to define exclusions for simulation messages in these applications.
109+
110+
EmailLinkClicked_IP and EmailLinkClicked_TimeStamp data might give more details about the event. For example, if a click occured a few seconds after delivery, and the IP address doesn't belong to Microsoft, your company, or the user, then it's likely that a third-party filtering system or another service intercepted the message.
111+
112+
For any non-Microsoft filtering systems or services, you need to allow or exempt the following items:
102113

103114
- All [Attack simulation training URLs](attack-simulation-training-get-started.md#simulations) and the corresponding domains. Currently, we don't send simulation messages from a static list of IP addresses.
104115
- Any other domains that you use in custom payloads.
105-
116+
106117
### Can I add the External tag or safety tips to simulation messages?
107118

108119
Custom payloads have the option to add the External tag to messages. For more information, see Step 5 in [Create payloads](attack-simulation-training-payloads.md#create-payloads).
@@ -253,6 +264,13 @@ We find that campaigns where the targeted users are identified by Microsoft Entr
253264

254265
Currently, there are 94 built-in trainings on the [Training modules](attack-simulation-training-training-modules.md) page.
255266

267+
### Q: How are languages used for experiences like training modules and notifications?
268+
269+
- **Training modules**: The browser locale settings are used. But once the training has been assigned to a user, the language selection persists, and future trainings are assigned in that language.
270+
- **End user notifications**: The mailbox locale/language settings are used.
271+
- **Simulation playloads**: The language selected by the admin during creation is used.
272+
- **Landing pages**: The Microsoft 365 account language settings are used. User can also change languages from the drop down present in the landing page.
273+
256274
### Q: Are there any limits in targeting users while importing from a CSV or adding users?
257275

258276
A: The limit for importing recipients from a CSV file or adding individual recipients to a simulation is 40,000.

defender-office-365/attack-simulation-training-insights.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -466,7 +466,7 @@ How user activity signals are captured is described in the following table.
466466
|Read Message|The user read the simulation message.|Message read signals might experience issues in the following scenarios: <ul><li>The user reported the message as phishing in Outlook without leaving the reading pane, and **Mark items as read when viewed in the Reading Pane** wasn't configured (default).</li><li>The user reported the unread message as phishing in Outlook, the message was deleted, and **Mark messages as read when deleted** wasn't configured (default).</li></ul>|
467467
|Out of Office|Determines whether the user is out of office.|Currently calculated by the Automatic replies setting from Outlook.|
468468
|Compromised User|The user was compromised. The compromise signal varies based on the social engineering technique.|<ul><li>**Credential Harvest**: The user entered their credentials on the login page (credentials aren't stored by Microsoft).¹</li><li>**Malware Attachment**: The user opened the payload attachment and selected **Enable Editing** in [Protected View](https://support.microsoft.com/office/d6f09ac7-e6b9-4495-8e43-2bbcdbcb6653).</li><li>**Link in Attachment**: The user opened the attachment and entered their credentials after clicking on the payload link.</li><li>**Link to Malware**: The user clicked on the payload link and entered their credentials.</li><li>**Drive by URL**: The user clicked on the payload link (entering credentials isn't required).¹</li><li>**OAuth Consent Grant**: The user clicked on the payload link and accepted the prompt to share permissions.¹</li></ul>|
469-
|Clicked Message Link|The user clicked on the payload link in the simulation message.|The URL in the simulation is unique for each user, which allows individual user activity tracking. Third-party filtering services or email forwarding can lead to false positives. For more information, see [I see clicks or compromise events from users who insist they didn't click the link in the simulation message](attack-simulation-training-faq.md#i-see-clicks-or-compromise-events-from-users-who-insist-they-didnt-click-the-link-in-the-simulation-message).|
469+
|Clicked Message Link|The user clicked on the payload link in the simulation message.|The URL in the simulation is unique for each user, which allows individual user activity tracking. Third-party filtering services or email forwarding can lead to false positives. For more information, see [I see clicks or compromise events from users who insist they didn't click the link in the simulation message OR I see clicks within a few seconds of delivery for many users (false positives). What's going on?](attack-simulation-training-faq.md#i-see-clicks-or-compromise-events-from-users-who-insist-they-didnt-click-the-link-in-the-simulation-message-or-i-see-clicks-within-a-few-seconds-of-delivery-for-many-users-false-positives-whats-going-on)|
470470
|Forwarded Message|The user forwarded the message.||
471471
|Replied to Message|The user replied to the message.||
472472
|Deleted message|The user deleted the message.|The signal comes from the Outlook activity of the user. If the user reports the message as phishing, the message might be moved to the Deleted Items folder, which is identified as a deletion.|

0 commit comments

Comments
 (0)