Skip to content

Commit 851b0fc

Browse files
committed
AST QR
1 parent 9f6c68e commit 851b0fc

8 files changed

+116
-90
lines changed

defender-office-365/attack-simulation-training-insights.md

Lines changed: 19 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
ms.custom:
1414
description: Admins can learn how Attack simulation training in the Microsoft Defender portal affects users and can gain insights from simulation and training outcomes.
1515
search.appverid: met150
16-
ms.date: 06/14/2024
16+
ms.date: 08/13/2024
1717
appliesto:
1818
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
1919
---
@@ -273,6 +273,24 @@ For more information about the **Users** and **Details** tabs, see the following
273273
- [Users tab](attack-simulation-training-training-campaigns.md#users-tab)
274274
- [Details tab](attack-simulation-training-training-campaigns.md#details-tab)
275275

276+
### Reporting for QR code simulations
277+
278+
> [!TIP]
279+
> QR code payloads are currently in Preview, aren't available in all organizations, and are subject to change.
280+
281+
You can select payloads with QR codes to use in simulations. The QR code replaces the phishing URL as the payload that's used in the simulation email message. For more information, see [QR code payloads](attack-simulation-training-payloads.md#qr-code-payloads).
282+
283+
Because QR codes are another method of phishing URL, the user events around read, delete, compromises, and click events remain the same. For example, scanning the QR code opens the phishing URL, so the event is tracked as a click event. The existing mechanisms for tracking compromise, deletes, and report events remain the same.
284+
285+
If you export a [simulation report](#simulation-report-for-simulations) to a CSV file, the `EmailLinkClicked_ClickSource` column is available with the following values:
286+
287+
- `PhishingURL`: The click came from a phishing link in the simulation email message.
288+
- `QR code`: The click came from scanning the QR code in the simulation email message.
289+
290+
Other metrics like reads, compromises, deletes, and reported messages continue to be tracked without any additional updates.
291+
292+
:::image type="content" source="media/attack-simulation-training-reporting-QR-code.png" alt-text="Image showing the reporting experience for running QR code simulations." lightbox="media/attack-simulation-training-reporting-QR-code.png":::
293+
276294
### Simulation report for simulations
277295

278296
This section describes the information in the simulation report for regular simulations (not [Training campaigns](#simulation-report-for-training-campaigns)).

defender-office-365/attack-simulation-training-payloads.md

Lines changed: 67 additions & 54 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
ms.custom:
1414
description: Admins can learn how to create and manage payloads for Attack simulation training in Microsoft Defender for Office 365 Plan 2.
1515
search.appverid: met150
16-
ms.date: 06/14/2024
16+
ms.date: 08/13/2024
1717
appliesto:
1818
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
1919
---
@@ -22,7 +22,7 @@ appliesto:
2222

2323
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
2424

25-
In Attack simulation training in Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2, a _payload_ is the link or attachment in the simulated phishing email message that's presented to users. Attack simulation training offers a robust built-in payload catalog for the available social engineering techniques. However, you might want to create custom payloads that work better for your organization.
25+
In Attack simulation training in Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2, a _payload_ is the link, QR code (currently in Preview), or attachment in the simulated phishing email message that's presented to users. Attack simulation training offers a robust built-in payload catalog for the available social engineering techniques. However, you might want to create custom payloads that work better for your organization.
2626

2727
For getting started information about Attack simulation training, see [Get started using Attack simulation training](attack-simulation-training-get-started.md).
2828

@@ -79,13 +79,13 @@ The information that's available on the tabs is described in the following list:
7979
Select :::image type="icon" source="media/m365-cc-sc-filter-icon.png" border="false"::: to filter the payloads by one or of the following values:
8080

8181
- **Technique**: One of the available [social engineering techniques](attack-simulation-training-simulations.md#select-a-social-engineering-technique):
82-
- **Credential Harvest**
83-
- **Malware Attachment**
84-
- **Link in Attachment**
85-
- **Link to Malware**
86-
- **Drive-by URL**
87-
- **OAuth Consent Grant**
88-
- **How-to Guide**
82+
- **Credential Harvest**
83+
- **Malware Attachment**
84+
- **Link in Attachment**
85+
- **Link to Malware**
86+
- **Drive-by URL**
87+
- **OAuth Consent Grant**
88+
- **How-to Guide**
8989

9090
- **Complexity**: Calculated based on the number of indicators in the payload that indicate a possible attack (spelling errors, urgency, etc.). More indicators are easier to identify as an attack and indicate lower complexity. The available values are: **High**, **Medium**, and **Low**.
9191

@@ -131,6 +131,22 @@ When you select a payload by clicking anywhere in the row other than the check b
131131

132132
To see payloads that have been archived (the **Status** value is **Archive**), use the **Show archived payloads** toggle on the **Tenant payloads** tab.
133133

134+
## QR code payloads
135+
136+
> [!TIP]
137+
> QR code payloads are currently in Preview, aren't available in all organizations, and are subject to change.
138+
139+
On the **Global payloads** tab of **Content library** \> **Payloads** at <https://security.microsoft.com/attacksimulator?viewid=contentlibrary&source=global>, you can see the built-in, unmodifiable QR code payloads by typing **QR** in the :::image type="icon" source="media/m365-cc-sc-search-icon.png" border="false"::: **Search** box, and then pressing the ENTER key.
140+
141+
QR code payloads are available in five languages to address real-world scenarios that involve QR code attacks.
142+
143+
:::image type="content" source="media/attack-sim-training-payloads-global-QR-codes.png" alt-text="Screenshot of the Global payloads tab showing the QR code payloads returned after searching for the value QR." lightbox="media/attack-sim-training-payloads-global-QR-codes.png":::
144+
145+
You can also create custom payloads that use QR codes as described in the next section.
146+
147+
> [!TIP]
148+
> Before you use a QR code payload in simulations, be sure to examine the available fields and content in the payload.
149+
134150
## Create payloads
135151

136152
> [!NOTE]
@@ -154,13 +170,15 @@ To see payloads that have been archived (the **Status** value is **Archive**), u
154170
When you're finished on the **Select type** page, select **Next**.
155171

156172
3. On the **Select technique** page, the available options are the same as on the **Select technique** page in the new simulation wizard:
157-
- **Credential Harvest**
173+
- **Credential Harvest**<sup>\*</sup>
158174
- **Malware Attachment**
159175
- **Link in Attachment**
160-
- **Link to Malware**
176+
- **Link to Malware**<sup>\*</sup>
161177
- **Drive-by URL**
162-
- **OAuth Consent Grant**
163-
- **How-to Guide**
178+
- **OAuth Consent Grant**<sup>\*</sup>
179+
- **How-to Guide**<sup>\*</sup>
180+
181+
<sup>\*</sup> This social engineering technique allows you to use QR codes (currently in Preview).
164182

165183
For more information about the different social engineering techniques, see [Simulations](attack-simulation-training-get-started.md#simulations).
166184

@@ -203,6 +221,13 @@ To see payloads that have been archived (the **Status** value is **Archive**), u
203221

204222
A rich text editor is available to create the attachment content. To see the typical font and formatting settings, toggle **Formatting controls** to :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**.
205223

224+
> [!TIP]
225+
> When **Formatting controls** is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**, you can use the **Insert QR code** action on the formatting controls bar for applicable social engineering techniques instead of selecting **Insert QR code** from the **Dynamic tag** dropdown list (currently in Preview):
226+
>
227+
> :::image type="content" source="media/attack-sim-training-payloads-formatting-controls-insert-qr-code.png" alt-text="The Insert QR code action in the formatting controls on the Configure payload page of the new payload creation wizard." lightbox="media/attack-sim-training-payloads-formatting-controls-insert-qr-code.png":::
228+
>
229+
> See the **Dynamic tag** description for details about adding QR codes to a payload.
230+
206231
Select the **Phishing link** box. In the **Name phishing URL** dialog that opens, enter a **Name** value for the URL that you selected in the **Phishing link** section, and then select **Confirm**.
207232

208233
The name value that you entered is added to the attachment content as a link to the phishing URL.
@@ -237,6 +262,35 @@ To see payloads that have been archived (the **Status** value is **Archive**), u
237262
|**Insert City**|`${city}`|
238263
|**Insert Date**|`${date|MM/dd/yyyy|offset}`|
239264

265+
- The **Insert QR code** control (currently in Preview) is available only in the **Credential Harvest**, **Drive-by URL**, **OAuth Consent Grant**, or **How-to Guide** techniques.
266+
267+
Instead of using a link as the phishing payload in the message, you can use a QR code. Selecting the **Insert QR code** control opens the **Insert QR code** flyout where you configure the following information:
268+
269+
- **Size**: Select one of the following values:
270+
- **Small (50 x 50 pixels)**
271+
- **Medium (100 x 100 pixels)**
272+
- **Large (150 x 150 pixels)**
273+
- **Horizontal position**: Enter the horizontal location in centimeters. Use the next **From** box to specify the horizontal starting point to measure from:
274+
- **Top left corner**
275+
- **Center**
276+
- **Vertical position**: Enter the vertical location in centimeters. Use the next **From** box to specify the horizontal starting point to measure from:
277+
- **Top left corner**
278+
- **Center**
279+
280+
:::image type="content" source="media/attack-sim-training-payloads-insert-qr-code-flyout.png" alt-text="The Insert QR code flyout from the Configure payload page of the new payload creation wizard." lightbox="media/attack-sim-training-payloads-insert-qr-code-flyout.png":::
281+
282+
When you're finished on the **Insert QR code** flyout, select **Save**.
283+
284+
:::image type="content" source="media/attack-sim-training-payloads-qr-code-inserted.png" alt-text="QR code inserted in the email message of the payload during payload creation." lightbox="media/attack-sim-training-payloads-qr-code-inserted.png":::
285+
286+
> [!TIP]
287+
>
288+
> - The QR code maps to the phishing URL that you selected in the **Phishing link** section \> **Select URL**. When the payload is used in a simulation, the service replaces the QR code with a dynamically generated QR code to track click and compromise metrics. The size, position, and shape of the QR code matches the configuration options you configured in the payload.
289+
> - If you use the **Send a test** button on the **Review payload** page (Step 7), you see the QR code, but it points the phishing URL that you selected. The dynamic QR code is generated when the payload is used in a real simulation.
290+
> - The QR code is inserted in the email message as an image. If you switch from the **Text** tab to the **Code** tab, you see the inserted image in Base64 format. The beginning of the image starts with `<div id="QRcode"...>`. Verify the finished payload contains `<div id="QRcode"...>` before you use it in a simulation.
291+
> - Verify the login page while using the payload in a simulation. You can also create login pages during the creation of simulations. For more information, see [Create a simulation: Select a payload and login page](attack-simulation-training-simulations.md#select-a-payload-and-login-page).
292+
> - We recommend conducting a test simulation to validate the end to end flow before using the payload with a larger audience.
293+
240294
- The **Phishing link** or **Malware attachment** control is available:
241295
- **Phishing link** is available only in the **Credential Harvest**, **Drive-by URL**, or **OAuth Consent Grant** techniques.
242296
- **Malware attachment link** is available only in the **Link to Malware**.
@@ -407,47 +461,6 @@ On the **Tenant payloads** or **Global payloads** tabs, you can send a copy of t
407461

408462
Select the payload by clicking the check box next to the name, and then select the :::image type="icon" source="media/m365-cc-sc-send-icon.png" border="false"::: **Send a test** button that appears.
409463

410-
### QR code payloads
411-
412-
#### Global payloads
413-
Within the payload library, you can see multiple payloads across 5 languages, addressing various real-world scenarios involving QR code attacks. These payloads can be found in the Content Library- Global Payloads, name of each beginning with QR code payloads (for example, QR code payloads: Prize Winner Notification). You can locate these by typing "QR" in the search bar.
414-
415-
:::image type="content" source="media/attack-simulation-training-global-payloads-QR-code.png" alt-text="Image showing the QR code how to guide within the content library" lightbox="media/attack-simulation-training-global-payloads-QR-code.png":::
416-
417-
> [!TIP]
418-
> Before utilizing these payloads in your simulations, make sure to examine different fields and contents of the payload for your requirements.
419-
#### Tenant payloads
420-
You can create a custom payload by duplicating the existing global payloads, or creating a payload from scratch. Within the payload editing experience, you can insert QR code using Dynamic Tags(Insert QR code) or formatting controls (QR code icon). You have the options to select the size and position of the QR code.
421-
422-
:::image type="content" source="media/attack-simulation-training-insert-QR-code-1.png" alt-text="Image showing the experience for inserting a QR code in tenant payload" lightbox="media/attack-simulation-training-insert-QR-code-1.png":::
423-
424-
:::image type="content" source="media/attack-simulation-training-insert-QR-code-2.png" alt-text="Image showing the experience for inserting a QR code in tenant payload" lightbox="media/attack-simulation-training-insert-QR-code-2.png":::
425-
426-
:::image type="content" source="media/attack-simulation-training-insert-QR-code-3.png" alt-text="Image showing the experience for inserting a QR code in tenant payload" lightbox="media/attack-simulation-training-insert-QR-code-3.png":::
427-
428-
:::image type="content" source="media/attack-simulation-training-insert-QR-code-4.png" alt-text="Image showing the experience for inserting a QR code in tenant payload" lightbox="media/attack-simulation-training-insert-QR-code-4.png":::
429-
430-
:::image type="content" source="media/attack-simulation-training-insert-QR-code-5.png" alt-text="Image showing the experience for inserting a QR code in tenant payload" lightbox="media/attack-simulation-training-insert-QR-code-5.png":::
431-
432-
The QR code that is generated will map to the phishing URL that is selected by you while configuring the payload in the payload wizard. When this payload is used in simulation, the service will replace the QR code with a dynamically generated QR code, to track click and compromise metrics. The size, position, and shape of the QR code would match the configuration of the QR set by you in the payload.
433-
434-
Note that if you are using Send a Test, you will still see the QR code, but it will point to the
435-
{phishingURL} that you have selected. The dynamic QR is generated when the payload is used in an
436-
actual simulation
437-
438-
The QR code is inserted as an image. If you look at the code section, you will see that the image has
439-
been inserted into a base64 format. The QR code inserted using the wizard (and which will be
440-
used for dynamic URL update) is marked with div id= QRcode as seen in the first line of below
441-
image.
442-
443-
:::image type="content" source="media/attack-simulation-training-insert-QR-code-6-html-div.png" alt-text="Image showing the base 64 format of the QR image and the variable" lightbox="media/attack-simulation-training-insert-QR-code-6-html-div.png":::
444-
445-
> [!TIP]
446-
> Make sure to verify the login page while using the payload in a simulation. You can also
447-
change the login page while selecting the payload in a simulation.
448-
> It is advisable to conduct a test simulation to validate the end-to-end flow before
449-
circulating the final payload to broader audiences. Make sure that the payload contains the div id= QR code within the payload code, before using it in a simulation.
450-
451464
## Related links
452465

453466
[Get started using Attack simulation training](attack-simulation-training-get-started.md)

0 commit comments

Comments
 (0)