You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-office-365/attack-simulation-training-simulations.md
+44Lines changed: 44 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -853,3 +853,47 @@ To include a completed session in reporting after it has been excluded, do the f
853
853
2. Select the simulation by clicking **⋮** (**Actions**) at the end of the row, and then select :::image type="icon" source="media/m365-cc-sc-include-icon.png" border="false"::: **Exclude**.
854
854
855
855
After you included the excluded simulation, the **Status** value changes to **Completed**. Toggle **Show excluded simulations** to off :::image type="icon" source="media/scc-toggle-off.png" border="false"::: to see the simulation.
856
+
857
+
## QR code simulations and training
858
+
> [!IMPORTANT]
859
+
> Currently, QR code simulations in Attack simulation training is in Preview.
860
+
The current flow of running simulations, which involves selection of users, selection of payload, scheduling training, and notifications is also applicable for QR code-based simulations. Within simulations, you can select payloads with QR codes and use them for simulation.
861
+
862
+
Currently configuring payloads with QR codes and use of these payloads in a simulation is applicable to the Email platform and for the below attack techniques.
863
+
864
+
- Credential harvest
865
+
- Link to malware
866
+
- drive by URL
867
+
- oAuth consent grant
868
+
869
+
Given that QR codes are another vector for the phishing URL, the user events around read/delete/compromises/clicks remain the same. E.g. If a user is navigating to the URL after scanning the QR code, then it is tracked as a click event. The existing mechanisms for tracking compromise, deletes, report events remain the same.
870
+
871
+
For more details about QR code payloads, configuring a QR payload, see [QR payloads](attack-simulation-training-payloads.md#QR-Code-Payloads).
872
+
873
+
### Reporting for QR code simulations
874
+
Given that QR codes is just another vector for the phishing URL, the user events around
875
+
read/delete/compromises/clicks remain the same. E.g. If a user is navigating to the URL after
876
+
scanning the QR code, then it is tracked as a click event. The existing mechanisms for tracking
877
+
compromise, deletes, report events remain the same.
878
+
Within the simulation report CSV (exported from individual simulations), you will be able to view the
879
+
field Click Source (EmailLinkClicked_ClickSource) as a column, with values as ‘PhishingURL’ (click
880
+
came from a phishing link in email content) or ‘QR code’ (click came after scanning a QR code). Other
881
+
metrics like Reads, Compromises, Deletes, Reported Message continue to be tracked without any
882
+
additional updates.
883
+
884
+
:::image type="content" source="media/attack-simulation-training-reporting-QR-code.png" alt-text="Image showing the reporting experience for running QR code simulations" lightbox="media/attack-simulation-training-reporting-QR-code.png":::
885
+
886
+
### QR code trainings
887
+
888
+
We have provided two mechanisms for learning about QR based attacks: How to guides, and new training modules from our content partner.
889
+
How to Guides is designed to provide a lightweight guidance to end users on how to report a phishing message directly through email. By delivering these guides directly to the end user's inbox, we can ensure that the end user has the information they need to confidently report any suspicious emails.
890
+
891
+
You can filter for the How to Guide through either:
892
+
1. Filtering by Technique = How to Guide
893
+
2. Search by name = " Teaching Guide: How to recognize and report QR phishing messages
894
+
895
+
:::image type="content" source="media/attack-simulation-training-how-to-guide-QR-code.png" alt-text="Image showing the QR code how to guide within the content library" lightbox="media/attack-simulation-training-how-to-guide-QR-code.png":::
896
+
897
+
Within the trainings list (Content Library- Training Modules), we have added a new training called Malicious Digital QR Codes which is a short learning to educate on what to do when a user receives a QR code in the email. You can assign the training as part of a simulation or use training campaigns to assign the training to your users.
898
+
899
+
:::image type="content" source="media/attack-simulation-training-out-of-the-box-training-QR-code.png" alt-text="Image showing the QR code trainings available within Content library" lightbox="media/attack-simulation-training-out-of-the-box-training-QR-code":::
0 commit comments