Skip to content

Commit a2bc27d

Browse files
authored
Update attack-simulation-training-payloads.md
Updating the text around tips around payload creation based on Microsoft CELA team's feedback and input.
1 parent 1182726 commit a2bc27d

File tree

1 file changed

+4
-1
lines changed

1 file changed

+4
-1
lines changed

defender-office-365/attack-simulation-training-payloads.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -147,7 +147,10 @@ You can also create custom payloads that use QR codes as phishing links as descr
147147
## Create payloads
148148

149149
> [!NOTE]
150-
> Certain trademarks, logos, symbols, insignias and other source identifiers receive heightened protection under local, state and federal statutes and laws. Unauthorized use of such indicators can subject the users to penalties, including criminal fines. Though not an extensive list, this includes the Presidential, Vice Presidential, and Congressional seals, the CIA, the FBI, Social Security, Medicare and Medicaid, the United States Internal Revenue Service, and the Olympics. Beyond these categories of trademarks, use and modification of any third-party trademark carries an inherent amount of risk. Using your own trademarks and logos in a payload would be less risky, particularly where your organization permits the use. If you have any further questions about what is or is not appropriate to use when creating or configuring a payload, you should consult with your legal advisors.
150+
> Certain trademarks, logos, symbols, insignias and other source identifiers receive heightened protection under local, state and federal statutes and laws. Unauthorized use of such indicators can subject the users to penalties, including criminal fines. Though not an extensive list, this includes the Presidential, Vice Presidential, and Congressional seals, the CIA, the FBI, Social Security, Medicare and Medicaid, the United States Internal Revenue Service, and the Olympics. Beyond these categories of trademarks, use and modification of any third-party trademark carries an inherent amount of risk. Using your own trademarks and logos in a payload would be less risky, particularly where your organization permits the use. If you have legal questions around logo and brand usage, please consult with your legal advisors.
151+
152+
> Microsoft permits customers to use its logos and branding in their custom payloads within Attack Simulation and Training, as long as it is made clear that the logo and branding is only used as part of a simulation content. The user landing page should use a highly visible, unavoidable disclaimer after the participant completes the simulation, clearly stating that Microsoft is not associated with and does not endorse the simulation exercise, nor is it an actual email from or associated with Microsoft. You may use Microsoft’s global landing page text as a reference: _The message you just clicked on is a phishing message simulation. It is not a real message from the owner of the trademark or logo featured in the simulation. The trademarks and logos featured in the simulation may be the property of their respective owners and are in no way associated or affiliated with the simulation, nor have the owners of such trademarks and logos authorized, sponsored, or endorsed the use of such trademarks and logos in the simulation.
153+
_
151154

152155
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Attack simulation training** \> **Content library** tab \> **Payloads** \> **Tenant payloads** tab. To go directly to the **Content library** tab where you can select **Payloads** and the **Tenant payloads** tab, use <https://security.microsoft.com/attacksimulator?viewid=contentlibrary>.
153156

0 commit comments

Comments
 (0)