Skip to content

Commit 802967b

Browse files
authored
Merge pull request #938 from MicrosoftDocs/AttackSim-chrisda
AttackSim-chrisda to Main
2 parents d6ca9d4 + ea9d5a6 commit 802967b

9 files changed

+307
-28
lines changed

defender-office-365/attack-simulation-training-end-user-notifications.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier2
1313
description: Admins can learn how to create end-user notification email messages for Attack simulation training in Microsoft Defender for Office 365 Plan 2.
1414
search.appverid: met150
15-
ms.date: 3/11/2024
15+
ms.date: 06/14/2024
1616
appliesto:
1717
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
1818
---
@@ -147,6 +147,9 @@ On the details flyout from the **Tenant notifications** tab only, select **Edit
147147

148148
- **Use from default**: Select an available template to start with. You can modify the text and layout in the editing area. To reset the notification back to the default text and layout of the template, select **Reset to default**.
149149

150+
> [!TIP]
151+
> To add images, copy (CTRL+C) and paste (CTRL+V) the image into the editor on the **Text** tab. The editor automatically converts the image to Base64 as part of the HTML code.
152+
150153
- **Code** tab: You can view and modify the HTML code directly.
151154

152155
You can preview the results by selecting **Preview email** at the top of the page.

defender-office-365/attack-simulation-training-faq.md

Lines changed: 167 additions & 10 deletions
Large diffs are not rendered by default.

defender-office-365/attack-simulation-training-insights.md

Lines changed: 67 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
ms.custom:
1414
description: Admins can learn how Attack simulation training in the Microsoft Defender portal affects users and can gain insights from simulation and training outcomes.
1515
search.appverid: met150
16-
ms.date: 3/14/2024
16+
ms.date: 06/14/2024
1717
appliesto:
1818
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
1919
---
@@ -313,7 +313,7 @@ The **Delivery status** section on **Report** tab** for a simulation shows the n
313313

314314
- **Successfully received message**
315315
- **Positive reinforcement message delivered**
316-
- **Just simulation message delivered
316+
- **Just simulation message delivered**
317317

318318
Select **View users to whom message delivery failed** to go to the [Users tab](attack-simulation-training-simulations.md#users-tab) tab in the report where the results are filtered by **Simulation message delivery: Failed to deliver**.
319319

@@ -380,6 +380,71 @@ You can hover over a section in the chart to see the actual numbers in each cate
380380

381381
:::image type="content" source="media/attack-sim-report-training-campaign-report-tab-all-user-activity.png" alt-text="The All user activity section on the Report tab in the Training campaign report in Attack simulation training." lightbox="media/attack-sim-report-training-campaign-report-tab-all-user-activity.png":::
382382

383+
## Appendix
384+
385+
When you export information from the reports, the CSV file contains more information than what's shown in the report, even if you have all column shown. The fields are described in the following table.
386+
387+
> [!TIP]
388+
> For maximum information, verify that all available columns in the report are visible before you export.
389+
390+
|Field Name|Description|
391+
|---|---|
392+
|UserName|Username of the user who did the activity.|
393+
|UserMail|Email address of the user who did the activity.|
394+
|Compromised|Indicates if the user was compromised. Values are Yes or No.|
395+
|AttachmentOpened_TimeStamp|When the attachment was opened.|
396+
|AttachmentOpened_Browser|When the attachment was opened in a web browser. This information comes from UserAgent.|
397+
|AttachmentOpened_IP|The IP address where the attachment was opened. This information comes from UserAgent.|
398+
|AttachmentOpened_Device|The device where the attachment was opened. This information comes from UserAgent.|
399+
|AttachmentLinkClicked_TimeStamp|When the attachment link was clicked.|
400+
|AttachmentLinkClicked_Browser|The web browser that was used to click the attachment link. This information comes from UserAgent.|
401+
|AttachmentLinkClicked_IP|The IP address where the attachment link was clicked. This information comes from UserAgent.|
402+
|AttachmentLinkClicked_Device|The device where the attachment link was clicked. This information comes from UserAgent.|
403+
|CredSupplied_TimeStamp(Compromised)|When the user entered their credentials.|
404+
|CredSupplied_Browser|The web browser that was used when the user entered their credentials. This information comes from UserAgent.|
405+
|CredSupplied_IP|The IP address where the user entered their credentials. This information comes from UserAgent.|
406+
|CredSupplied_Device|The device where the user entered their credentials. This information comes from UserAgent.|
407+
|SuccessfullyDeliveredEmail_TimeStamp|When the simulation email message was delivered to the user.|
408+
|MessageRead_TimeStamp|When the simulation message was read.|
409+
|MessageDeleted_TimeStamp|When the simulation message was deleted.|
410+
|MessageReplied_TimeStamp|When the user replied to the simulation message.|
411+
|MessageForwarded_TimeStamp|When the user forwarded the simulation message.|
412+
|OutOfOfficeDays|Determines whether the user is out of office. This information comes from the Automatic replies setting in Outlook.|
413+
|PositiveReinforcementMessageDelivered_TimeStamp|When the positive reinforcement message was delivered to the user.|
414+
|PositiveReinforcementMessageFailed_TimeStamp|When the positive reinforcement message failed to be delivered to the user.|
415+
|JustSimulationMessageDelivered_TimeStamp|When the simulation message was delivered to the user as part of a simulation with no trainings assigned (**No training** was selected on the **Assign training** page of the new simulation wizard).|
416+
|JustSimulationMessageFailed_TimeStamp|When the simulation email message failed to be delivered to the user, and the simulation had no trainings assigned.|
417+
|TrainingAssignmentMessageDelivered_TimeStamp|When the training assignment message was delivered to the user. This value is empty if no trainings were assigned in the simulation.|
418+
|TrainingAssignmentMessageFailed_TimeStamp|When the training assignment message failed to be delivered to the user. This value is empty if no trainings were assigned in the simulation.|
419+
|FailedToDeliverEmail_TimeStamp|When the simulation email message failed to be delivered to the user.|
420+
|Last Simulation Activity|The last simulation activity of the user (whether they passed or were compromised).|
421+
|Assigned Trainings|The list of trainings assigned to the user as part of the simulation.|
422+
|Completed Trainings|The list of trainings completed by the user as part of the simulation..|
423+
|Training Status|The current status of trainings for the user as part of the simulation.|
424+
|Phishing Reported On|When the user reported the simulation message as phishing.|
425+
|Department|The user's Department property value in Microsoft Entra ID at the time of simulation.|
426+
|Company|The user's Company property value in Microsoft Entra ID at the time of simulation.|
427+
|Title|The user's Title property value in Microsoft Entra ID at the time of simulation.|
428+
|Office|The user's Office property value in Microsoft Entra ID at the time of simulation.|
429+
|City|The user's City property value in Microsoft Entra ID at the time of simulation.|
430+
|Country|The user's Country property value in Microsoft Entra ID at the time of simulation.|
431+
|Manager|The user's Manager property value in Microsoft Entra ID at the time of simulation.|
432+
433+
How user activity signals are captured is described in the following table.
434+
435+
|Field|Description|Calculation logic|
436+
|---|---|---|
437+
|DownloadAttachment|A user downloaded the attachment.|The signal comes from the client (for example, Outlook or Word).|
438+
|Opened Attachment|A user opened the attachment.|The signal comes from the client (for example, Outlook or Word).|
439+
|Read Message|The user read the simulation message.|Message read signals might experience issues in the following scenarios: <ul><li>The user reported the message as phishing in Outlook without leaving the reading pane, and **Mark items as read when viewed in the Reading Pane** wasn't configured (default).</li><li>The user reported the unread message as phishing in Outlook, the message was deleted, and **Mark messages as read when deleted** wasn't configured (default).</li></ul>|
440+
|Out of Office|Determines whether the user is out of office.|Currently calculated by the Automatic replies setting from Outlook.|
441+
|Compromised User|Indicates if a user been compromised. The compromise signals can vary based on the attack type.|<ul><li>**Credential Harvest**: The user enters their credentials in the login page (credentials aren't stored by Microsoft).</li><li>**Malware Attachment**: The user opens the file and enables editing in protected view.</li><li>**Link in attachment**: The user opens the attachment, and clicks on the link.</li><li>**Link to Malware**: The user clicks on the link and enters their credentials.</li><li>**Drive by URL**: The user clicks on the link (entering credentials isn't required).</li><li>**OAuth**: The user clicks on the link and accepts to share permissions.</li></ul>|
442+
|Clicked Message Link|Indicates if a user clicked on the message .|The URL in the simulation is unique for each user, which allows individual user activity tracking. Third-party filtering services or email forwarding can lead to false positives. For more information, see [I see clicks or compromise events from users who insist they didn't click the link in the simulation message](attack-simulation-training-faq.md#i-see-clicks-or-compromise-events-from-users-who-insist-they-didnt-click-the-link-in-the-simulation-message).|
443+
|Forwarded Message|Indicates if a user forwarded on the message .||
444+
|Replied to Message|Indicates if an end users has replied on the message.||
445+
|Deleted message|Indicates if an end users has deleted the message.|The signal comes from the Outlook activity of the user. If the user reports the message as phishing, the message might be moved to the Deleted Items folder, which is identified as a deletion.|
446+
|Permissions granted|Indicates if a user shared permissions in an Oauth-based attack.||
447+
383448
## Related Links
384449

385450
[Get started using Attack simulation training](attack-simulation-training-get-started.md)

defender-office-365/attack-simulation-training-landing-pages.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier2
1313
description: Admins can learn how to create and manage landing pages for simulated phishing attacks in Microsoft Defender for Office 365 Plan 2.
1414
search.appverid: met150
15-
ms.date: 6/22/2023
15+
ms.date: 06/14/2024
1616
appliesto:
1717
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
1818
---
@@ -122,6 +122,9 @@ In custom landing pages only, an **Edit landing page** link is available at the
122122

123123
- **Import from library**: Select an available template to start with. You can modify the text and layout in the editing area. To reset the landing page back to the default text and layout of the template, select **Reset to default**.
124124

125+
> [!TIP]
126+
> To add images, copy (CTRL+C) and paste (CTRL+V) the image into the editor on the **Text** tab. The editor automatically converts the image to Base64 as part of the HTML code.
127+
125128
- **Code** tab: You can view and modify the HTML code directly.
126129

127130
You can preview the results by selecting **Preview phish landing page** at the top of the page.

defender-office-365/attack-simulation-training-login-pages.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier2
1313
description: Admins can learn how to create and manage login pages for simulated phishing attacks in Microsoft Defender for Office 365 Plan 2.
1414
search.appverid: met150
15-
ms.date: 3/11/2024
15+
ms.date: 06/14/2024
1616
appliesto:
1717
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
1818
---
@@ -116,8 +116,18 @@ When you select a login page from the list by clicking anywhere in the row other
116116

117117
- **Add Next button**: Available only on **Page 1** of two-page logins. Select this link to add the 'Next' button to the login page. The default text on the button is **Next**, but you can change it.
118118

119+
> [!TIP]
120+
> To add images, copy (CTRL+C) and paste (CTRL+V) the image into the editor on the **Text** tab. The editor automatically converts the image to Base64 as part of the HTML code.
121+
119122
- **Code** tab: You can view and modify the HTML code directly.
120123

124+
> [!TIP]
125+
> To avoid sending passwords in plain text from custom login pages, avoid using the variable **name** in HTML code. Instead, use **type**, **id**, or **class**. For example:
126+
>
127+
> ```html
128+
> <input id="input-field-loginPage" type="password" placeholder="Password">
129+
> ```
130+
121131
You can preview the results by clicking the **Preview email** button at the top of the page.
122132
123133
When you're finished on the **Review login page** page, select **Next**.

defender-office-365/attack-simulation-training-payload-automations.md

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier2
1313
description: Admins can learn how to use payload automations (payload harvesting) to collect and launch automated simulations for Attack simulation training in Microsoft Defender for Office 365 Plan 2.
1414
search.appverid: met150
15-
ms.date: 5/7/2024
15+
ms.date: 06/24/2024
1616
appliesto:
1717
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
1818
---
@@ -25,6 +25,8 @@ In Attack simulation training in Microsoft 365 E5 or Microsoft Defender for Offi
2525

2626
Payload automation mimics the messages and payloads from the attack and stores them as custom payloads with identifiers in the payload name. You can then use the harvested payloads in simulations or automations to automatically launch harmless simulations to targeted users.
2727

28+
For details about how payload automations are collected, see the [Appendix](#appendix) section at the end of this article.
29+
2830
For getting started information about Attack simulation training, see [Get started using Attack simulation training](attack-simulation-training-get-started.md).
2931

3032
To see any existing payload automations that you created, open the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Attack simulation training** \> **Automations** tab \> and then select **Payload automations**. To go directly to the **Automations** tab where you can select **Payload automations**, use <https://security.microsoft.com/attacksimulator?viewid=automations>.
@@ -146,6 +148,19 @@ For payload automations with the **Status** value **Ready**, select the payload
146148
> [!TIP]
147149
> To see details about other payload automations without leaving the details flyout, use :::image type="icon" source="media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
148150
151+
## Appendix
152+
153+
Payload automation relies on email messages that are identified as campaigns by Defender for Office 365:
154+
155+
- Admins [marking messages as phishing](submissions-admin.md#notify-users-about-admin-submitted-messages-to-microsoft) doesn't result in payload harvesting.
156+
157+
- Payload automation requires access to the raw payload, which can include user reported messages that meet the following criteria:
158+
- The message was delivered to the Inbox (false negative).
159+
- The user reported the message as phishing.
160+
- The reported message was submitted to Microsoft (directly by the user or [by an admin from the Submissions portal](submissions-admin.md#submit-user-reported-messages-to-microsoft-for-analysis)), and Microsoft determined that the message was phishing.
161+
162+
- Eligible payloads are harvested if the messages meet the criteria of the payload automation as described earlier in this article (Step 4 in [Create payload automations](#create-payload-automations)).
163+
149164
## Related links
150165

151166
[Get started using Attack simulation training](attack-simulation-training-get-started.md)

0 commit comments

Comments
 (0)