Skip to content

Commit d481d44

Browse files
authored
Merge pull request #3063 from VipulMSFT/patch-17
Update attack-simulation-training-payloads.md
2 parents 1dcb5bd + 322b9d1 commit d481d44

File tree

1 file changed

+7
-2
lines changed

1 file changed

+7
-2
lines changed

defender-office-365/attack-simulation-training-payloads.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
ms.custom:
1414
description: Admins can learn how to create and manage payloads for Attack simulation training in Microsoft Defender for Office 365 Plan 2.
1515
search.appverid: met150
16-
ms.date: 08/13/2024
16+
ms.date: 03/10/2025
1717
appliesto:
1818
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
1919
---
@@ -147,7 +147,12 @@ You can also create custom payloads that use QR codes as phishing links as descr
147147
## Create payloads
148148

149149
> [!NOTE]
150-
> Certain trademarks, logos, symbols, insignias and other source identifiers receive heightened protection under local, state and federal statutes and laws. Unauthorized use of such indicators can subject the users to penalties, including criminal fines. Though not an extensive list, this includes the Presidential, Vice Presidential, and Congressional seals, the CIA, the FBI, Social Security, Medicare and Medicaid, the United States Internal Revenue Service, and the Olympics. Beyond these categories of trademarks, use and modification of any third-party trademark carries an inherent amount of risk. Using your own trademarks and logos in a payload would be less risky, particularly where your organization permits the use. If you have any further questions about what is or is not appropriate to use when creating or configuring a payload, you should consult with your legal advisors.
150+
>
151+
> - Certain trademarks, logos, symbols, insignias and other source identifiers receive heightened protection under local, state and federal statutes and laws. Unauthorized use of such indicators can subject the users to penalties, including criminal fines. Though not an extensive list, this includes the Presidential, Vice Presidential, and Congressional seals, the CIA, the FBI, Social Security, Medicare and Medicaid, the United States Internal Revenue Service, and the Olympics. Beyond these categories of trademarks, use and modification of any third-party trademark carries an inherent amount of risk. Using your own trademarks and logos in a payload would be less risky, particularly where your organization permits the use. If you have legal questions around logo and brand usage, consult with your legal advisors.
152+
>
153+
> - Microsoft permits customers to use our logos and branding in their custom payloads within Attack simulation training, as long as the logo and branding are used only as part of simulation content. The user landing page should contain a highly visible, unavoidable disclaimer that clearly states Microsoft isn't associated with and doesn't endorse the simulation exercise, nor was it an actual email from or associated with Microsoft. You can use the text from Microsoft's global landing page as a reference:
154+
>
155+
> _The message you just clicked on is a phishing message simulation. It is not a real message from the owner of the trademark or logo featured in the simulation. The trademarks and logos featured in the simulation may be the property of their respective owners and are in no way associated or affiliated with the simulation, nor have the owners of such trademarks and logos authorized, sponsored, or endorsed the use of such trademarks and logos in the simulation._
151156
152157
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Attack simulation training** \> **Content library** tab \> **Payloads** \> **Tenant payloads** tab. To go directly to the **Content library** tab where you can select **Payloads** and the **Tenant payloads** tab, use <https://security.microsoft.com/attacksimulator?viewid=contentlibrary>.
153158

0 commit comments

Comments
 (0)