You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-office-365/attack-simulation-training-end-user-notifications.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.collection:
12
12
- tier2
13
13
description: Admins can learn how to create end-user notification email messages for Attack simulation training in Microsoft Defender for Office 365 Plan 2.
14
14
search.appverid: met150
15
-
ms.date: 3/11/2024
15
+
ms.date: 06/14/2024
16
16
appliesto:
17
17
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
18
18
---
@@ -147,6 +147,9 @@ On the details flyout from the **Tenant notifications** tab only, select **Edit
147
147
148
148
-**Use from default**: Select an available template to start with. You can modify the text and layout in the editing area. To reset the notification back to the default text and layout of the template, select **Reset to default**.
149
149
150
+
> [!TIP]
151
+
> To add images, copy (CTRL+C) and paste (CTRL+V) the image into the editor on the **Text** tab. The editor automatically converts the image to Base64 as part of the HTML code.
152
+
150
153
-**Code** tab: You can view and modify the HTML code directly.
151
154
152
155
You can preview the results by selecting **Preview email** at the top of the page.
Copy file name to clipboardExpand all lines: defender-office-365/attack-simulation-training-insights.md
+67-2Lines changed: 67 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.collection:
13
13
ms.custom:
14
14
description: Admins can learn how Attack simulation training in the Microsoft Defender portal affects users and can gain insights from simulation and training outcomes.
15
15
search.appverid: met150
16
-
ms.date: 3/14/2024
16
+
ms.date: 06/14/2024
17
17
appliesto:
18
18
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
19
19
---
@@ -313,7 +313,7 @@ The **Delivery status** section on **Report** tab** for a simulation shows the n
313
313
314
314
-**Successfully received message**
315
315
-**Positive reinforcement message delivered**
316
-
-**Just simulation message delivered
316
+
-**Just simulation message delivered**
317
317
318
318
Select **View users to whom message delivery failed** to go to the [Users tab](attack-simulation-training-simulations.md#users-tab) tab in the report where the results are filtered by **Simulation message delivery: Failed to deliver**.
319
319
@@ -380,6 +380,71 @@ You can hover over a section in the chart to see the actual numbers in each cate
380
380
381
381
:::image type="content" source="media/attack-sim-report-training-campaign-report-tab-all-user-activity.png" alt-text="The All user activity section on the Report tab in the Training campaign report in Attack simulation training." lightbox="media/attack-sim-report-training-campaign-report-tab-all-user-activity.png":::
382
382
383
+
## Appendix
384
+
385
+
When you export information from the reports, the CSV file contains more information than what's shown in the report, even if you have all column shown. The fields are described in the following table.
386
+
387
+
> [!TIP]
388
+
> For maximum information, verify that all available columns in the report are visible before you export.
389
+
390
+
|Field Name|Description|
391
+
|---|---|
392
+
|UserName|Username of the user who did the activity.|
393
+
|UserMail|Email address of the user who did the activity.|
394
+
|Compromised|Indicates if the user was compromised. Values are Yes or No.|
395
+
|AttachmentOpened_TimeStamp|When the attachment was opened.|
396
+
|AttachmentOpened_Browser|When the attachment was opened in a web browser. This information comes from UserAgent.|
397
+
|AttachmentOpened_IP|The IP address where the attachment was opened. This information comes from UserAgent.|
398
+
|AttachmentOpened_Device|The device where the attachment was opened. This information comes from UserAgent.|
399
+
|AttachmentLinkClicked_TimeStamp|When the attachment link was clicked.|
400
+
|AttachmentLinkClicked_Browser|The web browser that was used to click the attachment link. This information comes from UserAgent.|
401
+
|AttachmentLinkClicked_IP|The IP address where the attachment link was clicked. This information comes from UserAgent.|
402
+
|AttachmentLinkClicked_Device|The device where the attachment link was clicked. This information comes from UserAgent.|
403
+
|CredSupplied_TimeStamp(Compromised)|When the user entered their credentials.|
404
+
|CredSupplied_Browser|The web browser that was used when the user entered their credentials. This information comes from UserAgent.|
405
+
|CredSupplied_IP|The IP address where the user entered their credentials. This information comes from UserAgent.|
406
+
|CredSupplied_Device|The device where the user entered their credentials. This information comes from UserAgent.|
407
+
|SuccessfullyDeliveredEmail_TimeStamp|When the simulation email message was delivered to the user.|
408
+
|MessageRead_TimeStamp|When the simulation message was read.|
409
+
|MessageDeleted_TimeStamp|When the simulation message was deleted.|
410
+
|MessageReplied_TimeStamp|When the user replied to the simulation message.|
411
+
|MessageForwarded_TimeStamp|When the user forwarded the simulation message.|
412
+
|OutOfOfficeDays|Determines whether the user is out of office. This information comes from the Automatic replies setting in Outlook.|
413
+
|PositiveReinforcementMessageDelivered_TimeStamp|When the positive reinforcement message was delivered to the user.|
414
+
|PositiveReinforcementMessageFailed_TimeStamp|When the positive reinforcement message failed to be delivered to the user.|
415
+
|JustSimulationMessageDelivered_TimeStamp|When the simulation message was delivered to the user as part of a simulation with no trainings assigned (**No training** was selected on the **Assign training** page of the new simulation wizard).|
416
+
|JustSimulationMessageFailed_TimeStamp|When the simulation email message failed to be delivered to the user, and the simulation had no trainings assigned.|
417
+
|TrainingAssignmentMessageDelivered_TimeStamp|When the training assignment message was delivered to the user. This value is empty if no trainings were assigned in the simulation.|
418
+
|TrainingAssignmentMessageFailed_TimeStamp|When the training assignment message failed to be delivered to the user. This value is empty if no trainings were assigned in the simulation.|
419
+
|FailedToDeliverEmail_TimeStamp|When the simulation email message failed to be delivered to the user.|
420
+
|Last Simulation Activity|The last simulation activity of the user (whether they passed or were compromised).|
421
+
|Assigned Trainings|The list of trainings assigned to the user as part of the simulation.|
422
+
|Completed Trainings|The list of trainings completed by the user as part of the simulation..|
423
+
|Training Status|The current status of trainings for the user as part of the simulation.|
424
+
|Phishing Reported On|When the user reported the simulation message as phishing.|
425
+
|Department|The user's Department property value in Microsoft Entra ID at the time of simulation.|
426
+
|Company|The user's Company property value in Microsoft Entra ID at the time of simulation.|
427
+
|Title|The user's Title property value in Microsoft Entra ID at the time of simulation.|
428
+
|Office|The user's Office property value in Microsoft Entra ID at the time of simulation.|
429
+
|City|The user's City property value in Microsoft Entra ID at the time of simulation.|
430
+
|Country|The user's Country property value in Microsoft Entra ID at the time of simulation.|
431
+
|Manager|The user's Manager property value in Microsoft Entra ID at the time of simulation.|
432
+
433
+
How user activity signals are captured is described in the following table.
434
+
435
+
|Field|Description|Calculation logic|
436
+
|---|---|---|
437
+
|DownloadAttachment|A user downloaded the attachment.|The signal comes from the client (for example, Outlook or Word).|
438
+
|Opened Attachment|A user opened the attachment.|The signal comes from the client (for example, Outlook or Word).|
439
+
|Read Message|The user read the simulation message.|Message read signals might experience issues in the following scenarios: <ul><li>The user reported the message as phishing in Outlook without leaving the reading pane, and **Mark items as read when viewed in the Reading Pane** wasn't configured (default).</li><li>The user reported the unread message as phishing in Outlook, the message was deleted, and **Mark messages as read when deleted** wasn't configured (default).</li></ul>|
440
+
|Out of Office|Determines whether the user is out of office.|Currently calculated by the Automatic replies setting from Outlook.|
441
+
|Compromised User|Indicates if a user been compromised. The compromise signals can vary based on the attack type.|<ul><li>**Credential Harvest**: The user enters their credentials in the login page (credentials aren't stored by Microsoft).</li><li>**Malware Attachment**: The user opens the file and enables editing in protected view.</li><li>**Link in attachment**: The user opens the attachment, and clicks on the link.</li><li>**Link to Malware**: The user clicks on the link and enters their credentials.</li><li>**Drive by URL**: The user clicks on the link (entering credentials isn't required).</li><li>**OAuth**: The user clicks on the link and accepts to share permissions.</li></ul>|
442
+
|Clicked Message Link|Indicates if a user clicked on the message .|The URL in the simulation is unique for each user, which allows individual user activity tracking. Third-party filtering services or email forwarding can lead to false positives. For more information, see [I see clicks or compromise events from users who insist they didn't click the link in the simulation message](attack-simulation-training-faq.md#i-see-clicks-or-compromise-events-from-users-who-insist-they-didnt-click-the-link-in-the-simulation-message).|
443
+
|Forwarded Message|Indicates if a user forwarded on the message .||
444
+
|Replied to Message|Indicates if an end users has replied on the message.||
445
+
|Deleted message|Indicates if an end users has deleted the message.|The signal comes from the Outlook activity of the user. If the user reports the message as phishing, the message might be moved to the Deleted Items folder, which is identified as a deletion.|
446
+
|Permissions granted|Indicates if a user shared permissions in an Oauth-based attack.||
447
+
383
448
## Related Links
384
449
385
450
[Get started using Attack simulation training](attack-simulation-training-get-started.md)
Copy file name to clipboardExpand all lines: defender-office-365/attack-simulation-training-landing-pages.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.collection:
12
12
- tier2
13
13
description: Admins can learn how to create and manage landing pages for simulated phishing attacks in Microsoft Defender for Office 365 Plan 2.
14
14
search.appverid: met150
15
-
ms.date: 6/22/2023
15
+
ms.date: 06/14/2024
16
16
appliesto:
17
17
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
18
18
---
@@ -122,6 +122,9 @@ In custom landing pages only, an **Edit landing page** link is available at the
122
122
123
123
-**Import from library**: Select an available template to start with. You can modify the text and layout in the editing area. To reset the landing page back to the default text and layout of the template, select **Reset to default**.
124
124
125
+
> [!TIP]
126
+
> To add images, copy (CTRL+C) and paste (CTRL+V) the image into the editor on the **Text** tab. The editor automatically converts the image to Base64 as part of the HTML code.
127
+
125
128
-**Code** tab: You can view and modify the HTML code directly.
126
129
127
130
You can preview the results by selecting **Preview phish landing page** at the top of the page.
Copy file name to clipboardExpand all lines: defender-office-365/attack-simulation-training-login-pages.md
+11-1Lines changed: 11 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.collection:
12
12
- tier2
13
13
description: Admins can learn how to create and manage login pages for simulated phishing attacks in Microsoft Defender for Office 365 Plan 2.
14
14
search.appverid: met150
15
-
ms.date: 3/11/2024
15
+
ms.date: 06/14/2024
16
16
appliesto:
17
17
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
18
18
---
@@ -116,8 +116,18 @@ When you select a login page from the list by clicking anywhere in the row other
116
116
117
117
-**Add Next button**: Available only on **Page 1** of two-page logins. Select this link to add the 'Next' button to the login page. The default text on the button is **Next**, but you can change it.
118
118
119
+
> [!TIP]
120
+
> To add images, copy (CTRL+C) and paste (CTRL+V) the image into the editor on the **Text** tab. The editor automatically converts the image to Base64 as part of the HTML code.
121
+
119
122
-**Code** tab: You can view and modify the HTML code directly.
120
123
124
+
> [!TIP]
125
+
> To avoid sending passwords in plain text from custom login pages, avoid using the variable **name** in HTML code. Instead, use **type**, **id**, or **class**. For example:
Copy file name to clipboardExpand all lines: defender-office-365/attack-simulation-training-payload-automations.md
+16-1Lines changed: 16 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.collection:
12
12
- tier2
13
13
description: Admins can learn how to use payload automations (payload harvesting) to collect and launch automated simulations for Attack simulation training in Microsoft Defender for Office 365 Plan 2.
14
14
search.appverid: met150
15
-
ms.date: 5/7/2024
15
+
ms.date: 06/24/2024
16
16
appliesto:
17
17
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
18
18
---
@@ -25,6 +25,8 @@ In Attack simulation training in Microsoft 365 E5 or Microsoft Defender for Offi
25
25
26
26
Payload automation mimics the messages and payloads from the attack and stores them as custom payloads with identifiers in the payload name. You can then use the harvested payloads in simulations or automations to automatically launch harmless simulations to targeted users.
27
27
28
+
For details about how payload automations are collected, see the [Appendix](#appendix) section at the end of this article.
29
+
28
30
For getting started information about Attack simulation training, see [Get started using Attack simulation training](attack-simulation-training-get-started.md).
29
31
30
32
To see any existing payload automations that you created, open the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration**\>**Attack simulation training**\>**Automations** tab \> and then select **Payload automations**. To go directly to the **Automations** tab where you can select **Payload automations**, use <https://security.microsoft.com/attacksimulator?viewid=automations>.
@@ -146,6 +148,19 @@ For payload automations with the **Status** value **Ready**, select the payload
146
148
> [!TIP]
147
149
> To see details about other payload automations without leaving the details flyout, use :::image type="icon" source="media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
148
150
151
+
## Appendix
152
+
153
+
Payload automation relies on email messages that are identified as campaigns by Defender for Office 365:
154
+
155
+
- Admins [marking messages as phishing](submissions-admin.md#notify-users-about-admin-submitted-messages-to-microsoft) doesn't result in payload harvesting.
156
+
157
+
- Payload automation requires access to the raw payload, which can include user reported messages that meet the following criteria:
158
+
- The message was delivered to the Inbox (false negative).
159
+
- The user reported the message as phishing.
160
+
- The reported message was submitted to Microsoft (directly by the user or [by an admin from the Submissions portal](submissions-admin.md#submit-user-reported-messages-to-microsoft-for-analysis)), and Microsoft determined that the message was phishing.
161
+
162
+
- Eligible payloads are harvested if the messages meet the criteria of the payload automation as described earlier in this article (Step 4 in [Create payload automations](#create-payload-automations)).
163
+
149
164
## Related links
150
165
151
166
[Get started using Attack simulation training](attack-simulation-training-get-started.md)
0 commit comments