Skip to content

Commit 6979d8e

Browse files
Merge pull request #4418 from MicrosoftDocs/main
[AutoPublish] main to live - 07/03 19:57 PDT | 07/04 08:27 IST
2 parents ab3838f + c765534 commit 6979d8e

File tree

3 files changed

+23
-5
lines changed

3 files changed

+23
-5
lines changed

defender-office-365/attack-simulation-training-training-modules.md

Lines changed: 18 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier2
1313
description: Admins can learn about the Training modules that are available to use in Training campaigns in Attack simulation training in Microsoft Defender for Office 365 Plan 2.
1414
search.appverid: met150
15-
ms.date: 08/14/2024
15+
ms.date: 06/30/2025
1616
appliesto:
1717
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
1818
---
@@ -25,11 +25,24 @@ In Attack simulation training in Microsoft 365 E5 or Microsoft Defender for Offi
2525

2626
To see the available Training modules, open the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Attack simulation training** \> **Content library** tab \> and then select **Training modules**. Or, to go directly to the **Content library** tab where you can select **Training modules**, use <https://security.microsoft.com/attacksimulator?viewid=contentlibrary>.
2727

28-
> [!TIP]
29-
> The following training modules for QR codes are available:
28+
> [!NOTE]
29+
>
30+
> - The following training modules for QR codes are available:
31+
> - Malicious digital QR codes
32+
> - Malicious printed QR codes
3033
>
31-
> - **Malicious digital QR codes**
32-
> - **Malicious printed QR codes**
34+
> - The following modules will be retired from the training catalog. Avoid assigning the following trainings in new training campaigns:
35+
> - Security Essentials for IT Administrators 01: Introduction and Overview
36+
> - Security Essentials for IT Administrators 02: Core Principles of Cyber Security
37+
> - Security Essentials for IT Administrators 03: Security Program Management
38+
> - Security Essentials for IT Administrators 04: Security Maintenance and Hygiene
39+
> - Security Essentials for IT Administrators 05: Authentication and Authorization
40+
> - Security Essentials for IT Administrators 06: Data Protection
41+
> - Security Essentials for IT Administrators 07: Sample Attacks
42+
> - Security Essentials for IT Administrators 08: Attack Scenario
43+
> - Security Essentials for IT Administrators 10: Securing Cloud Computing Environments
44+
> - Security Essentials for IT Administrators 11: Securing Web Servers
45+
> - Security Essentials for IT Administrators 12: Attack Case Study, Supply Chain Attacks
3346
3447
The **Training modules** page shows the following information for each module. You can sort the modules by clicking on an available column header. Select :::image type="icon" source="media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. By default, all available columns are selected.
3548

defender-office-365/safe-attachments-about.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,9 @@ appliesto:
2929

3030
Safe Attachments in [Microsoft Defender for Office 365](mdo-about.md) provides an additional layer of protection for email attachments that have already been scanned by [anti-malware protection in Exchange Online Protection (EOP)](anti-malware-protection-about.md). Specifically, Safe Attachments uses a virtual environment to check attachments in email messages for harmful attachments (for example, malware, ransomware, and phishing) before they're delivered to recipients (a process known as _detonation_).
3131

32+
> [!TIP]
33+
> Typically, email attachment scanning completes within 15 minutes. Sometimes, it takes longer due to retry delays and processing time to analyze the file in the virtual environment.
34+
3235
Safe Attachments protection for email messages is controlled by Safe Attachments policies. Although there's no default Safe Attachments policy, the **Built-in protection** preset security policy provides Safe Attachments protection to all recipients (users who aren't defined in the Standard or Strict preset security policies or in custom Safe Attachments policies). For more information, see [Preset security policies in EOP and Microsoft Defender for Office 365](preset-security-policies.md). You can also create Safe Attachments policies that apply to specific users, group, or domains. For instructions, see [Set up Safe Attachments policies in Microsoft Defender for Office 365](safe-attachments-policies-configure.md).
3336

3437
The following table describes scenarios for Safe Attachments in Microsoft 365 and Office 365 organizations that include Microsoft Defender for Office 365 (in other words, lack of licensing is never an issue in the examples).

defender-office-365/safe-attachments-policies-configure.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,8 @@ For greater granularity, you can also use the procedures in this article to crea
4141
> Instead of creating and managing custom Safe Attachments policies, we typically recommend turning on and adding all users to the Standard and/or Strict preset security policies. For more information, see [Configure protection policies](mdo-deployment-guide.md#step-2-configure-protection-policies).
4242
>
4343
> To understand how threat protection works in Microsoft Defender for Office 365, see [Step-by-step threat protection in Microsoft Defender for Office 365](protection-stack-microsoft-defender-for-office365.md).
44+
>
45+
> Typically, email attachment scanning completes within 15 minutes. Sometimes, it takes longer due to retry delays and processing time to analyze the file in the virtual environment.
4446
4547
You configure Safe Attachments policies in the Microsoft Defender portal or in Exchange Online PowerShell.
4648

0 commit comments

Comments
 (0)