You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-office-365/attack-simulation-training-training-modules.md
+18-5Lines changed: 18 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.collection:
12
12
- tier2
13
13
description: Admins can learn about the Training modules that are available to use in Training campaigns in Attack simulation training in Microsoft Defender for Office 365 Plan 2.
14
14
search.appverid: met150
15
-
ms.date: 08/14/2024
15
+
ms.date: 06/30/2025
16
16
appliesto:
17
17
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
18
18
---
@@ -25,11 +25,24 @@ In Attack simulation training in Microsoft 365 E5 or Microsoft Defender for Offi
25
25
26
26
To see the available Training modules, open the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration**\>**Attack simulation training**\>**Content library** tab \> and then select **Training modules**. Or, to go directly to the **Content library** tab where you can select **Training modules**, use <https://security.microsoft.com/attacksimulator?viewid=contentlibrary>.
27
27
28
-
> [!TIP]
29
-
> The following training modules for QR codes are available:
28
+
> [!NOTE]
29
+
>
30
+
> - The following training modules for QR codes are available:
31
+
> - Malicious digital QR codes
32
+
> - Malicious printed QR codes
30
33
>
31
-
> -**Malicious digital QR codes**
32
-
> -**Malicious printed QR codes**
34
+
> - The following modules will be retired from the training catalog. Avoid assigning the following trainings in new training campaigns:
35
+
> - Security Essentials for IT Administrators 01: Introduction and Overview
36
+
> - Security Essentials for IT Administrators 02: Core Principles of Cyber Security
37
+
> - Security Essentials for IT Administrators 03: Security Program Management
38
+
> - Security Essentials for IT Administrators 04: Security Maintenance and Hygiene
39
+
> - Security Essentials for IT Administrators 05: Authentication and Authorization
40
+
> - Security Essentials for IT Administrators 06: Data Protection
41
+
> - Security Essentials for IT Administrators 07: Sample Attacks
42
+
> - Security Essentials for IT Administrators 08: Attack Scenario
43
+
> - Security Essentials for IT Administrators 10: Securing Cloud Computing Environments
44
+
> - Security Essentials for IT Administrators 11: Securing Web Servers
45
+
> - Security Essentials for IT Administrators 12: Attack Case Study, Supply Chain Attacks
33
46
34
47
The **Training modules** page shows the following information for each module. You can sort the modules by clicking on an available column header. Select :::image type="icon" source="media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. By default, all available columns are selected.
Copy file name to clipboardExpand all lines: defender-office-365/safe-attachments-about.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,6 +29,9 @@ appliesto:
29
29
30
30
Safe Attachments in [Microsoft Defender for Office 365](mdo-about.md) provides an additional layer of protection for email attachments that have already been scanned by [anti-malware protection in Exchange Online Protection (EOP)](anti-malware-protection-about.md). Specifically, Safe Attachments uses a virtual environment to check attachments in email messages for harmful attachments (for example, malware, ransomware, and phishing) before they're delivered to recipients (a process known as _detonation_).
31
31
32
+
> [!TIP]
33
+
> Typically, email attachment scanning completes within 15 minutes. Sometimes, it takes longer due to retry delays and processing time to analyze the file in the virtual environment.
34
+
32
35
Safe Attachments protection for email messages is controlled by Safe Attachments policies. Although there's no default Safe Attachments policy, the **Built-in protection** preset security policy provides Safe Attachments protection to all recipients (users who aren't defined in the Standard or Strict preset security policies or in custom Safe Attachments policies). For more information, see [Preset security policies in EOP and Microsoft Defender for Office 365](preset-security-policies.md). You can also create Safe Attachments policies that apply to specific users, group, or domains. For instructions, see [Set up Safe Attachments policies in Microsoft Defender for Office 365](safe-attachments-policies-configure.md).
33
36
34
37
The following table describes scenarios for Safe Attachments in Microsoft 365 and Office 365 organizations that include Microsoft Defender for Office 365 (in other words, lack of licensing is never an issue in the examples).
Copy file name to clipboardExpand all lines: defender-office-365/safe-attachments-policies-configure.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,6 +41,8 @@ For greater granularity, you can also use the procedures in this article to crea
41
41
> Instead of creating and managing custom Safe Attachments policies, we typically recommend turning on and adding all users to the Standard and/or Strict preset security policies. For more information, see [Configure protection policies](mdo-deployment-guide.md#step-2-configure-protection-policies).
42
42
>
43
43
> To understand how threat protection works in Microsoft Defender for Office 365, see [Step-by-step threat protection in Microsoft Defender for Office 365](protection-stack-microsoft-defender-for-office365.md).
44
+
>
45
+
> Typically, email attachment scanning completes within 15 minutes. Sometimes, it takes longer due to retry delays and processing time to analyze the file in the virtual environment.
44
46
45
47
You configure Safe Attachments policies in the Microsoft Defender portal or in Exchange Online PowerShell.
0 commit comments