Skip to content

Commit 8e058a7

Browse files
Merge pull request #5356 from MicrosoftDocs/main
[AutoPublish] main to live - 10/23 10:30 PDT | 10/23 23:00 IST
2 parents f85f358 + 333a30f commit 8e058a7

File tree

5 files changed

+16
-5
lines changed

5 files changed

+16
-5
lines changed

defender-office-365/attack-simulation-training-faq.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.custom:
1919
- seo-marvel-apr2020
2020
description: Admins can learn about deployment considerations and frequently asked questions regarding Attack simulation and training in Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2 organizations.
2121
ms.service: defender-office-365
22-
ms.date: 03/18/2025
22+
ms.date: 10/22/2025
2323
appliesto:
2424
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
2525
---
@@ -166,6 +166,8 @@ If you own the sender domain, the undelivered simulation report is returned in a
166166

167167
> [!TIP]
168168
> Simulation data recording starts a few minutes after the simulation is launched and after users begin interacting with the simulation messages. There's no fixed start time. Events are still captured after the simulation ends.
169+
>
170+
> After December 2025 as described in Message Center post [MC1166864](https://admin.microsoft.com/AdminPortal/Home?#/MessageCenter/:/messages/MC1166864), user interaction signals (for example, Compromise, Report, Read, Delete, Reply, Forward, Out-of-office, and Attachment opened) are captured consistently until the simulation ends. Training-related events (for example, Training completed or In progress) are reflected in simulation reporting up to the training due date, even after the simulation ends.
169171
170172
### Differences in user activity data from Attack simulation training reports and other reports
171173

defender-office-365/attack-simulation-training-simulation-automations.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier2
1313
description: Admins can learn how to create automated simulations that contain specific techniques and payloads that launch when the specified conditions are met in Microsoft Defender for Office 365 Plan 2.
1414
search.appverid: met150
15-
ms.date: 10/23/2024
15+
ms.date: 10/23/2025
1616
appliesto:
1717
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
1818
---
@@ -196,6 +196,9 @@ On the **Target users** page, select who receives the simulation. Use the follow
196196
- Distribution groups (static only)
197197
- Mail-enabled Security groups (static only)
198198

199+
> [!TIP]
200+
> Currently, hidden membership groups aren't supported.
201+
199202
The following search tools are available:
200203

201204
- **Search for users or groups**: If you click in the :::image type="icon" source="media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and do one of the following actions, the **Filter users by categories** options on the **Add users** flyout are replaced by a **User list** section:

defender-office-365/attack-simulation-training-simulations.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
ms.custom:
1414
description: Admins can learn how to simulate phishing attacks and train their users on phishing prevention using Attack simulation training in Microsoft Defender for Office 365 Plan 2.
1515
search.appverid: met150
16-
ms.date: 10/22/2024
16+
ms.date: 10/23/2025
1717
appliesto:
1818
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
1919
---
@@ -211,6 +211,9 @@ On the **Target users** page, select who receives the simulation. Use the follow
211211
- Distribution groups (static only)
212212
- Mail-enabled Security group (static only)
213213

214+
> [!TIP]
215+
> Currently, hidden membership groups aren't supported.
216+
214217
The following search tools are available:
215218

216219
- **Search for users or groups**: If you click in the :::image type="icon" source="media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and do one of the following actions, the **Filter users by categories** options on the **Add users** flyout are replaced by a **User list** section:

defender-office-365/attack-simulation-training-training-campaigns.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier2
1313
description: Admins can learn how to create training campaigns in Attack simulation training in Microsoft Defender for Office 365 Plan 2.
1414
search.appverid: met150
15-
ms.date: 10/23/2024
15+
ms.date: 10/23/2025
1616
appliesto:
1717
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
1818
---
@@ -110,6 +110,9 @@ On the **Target users** page, select who receives the Training campaign. Use the
110110
- Distribution groups (static only)
111111
- Mail-enabled security groups (static only)
112112

113+
> [!TIP]
114+
> Currently, hidden membership groups aren't supported.
115+
113116
The following search tools are available:
114117

115118
- **Search for users or groups**: If you click in the :::image type="icon" source="media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and do one of the following actions, the **Filter users by categories** options on the **Add users** flyout are replaced by a **User list** section:

defender-xdr/alerts-incidents-correlation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ The contents of the incidents are handled in the following ways:
7777
- A **`Redirected`** tag is added to the source incident.
7878
- Entities (assets etc.) follow the alerts they're linked to.
7979
- Analytics rules recorded as involved in the creation of the source incident are added to the rules recorded in the target incident.
80-
- Currently, comments and activity log entries in the source incident are *not* moved to the target incident.<br>To see the source incident's comments and activity history, open the incident in Microsoft Sentinel in the Azure portal. The activity history includes the closing of the incident and the adding and removal of alerts, tags, and other items related to the incident merge. These activities are attributed to the identity *Microsoft Defender XDR - alert correlation*.
80+
- Currently, migration of comments and audits of activity log entries is in *preview*.<br>To see the source incident's comments and activity history if you don't have access to the preview, open the incident in Microsoft Sentinel in the Azure portal. The activity history includes the closing of the incident and the adding and removal of alerts, tags, and other items related to the incident merge. These activities are attributed to the identity *Microsoft Defender XDR - alert correlation*.
8181

8282
### When incidents aren't merged
8383

0 commit comments

Comments
 (0)