diff --git a/defender-office-365/attack-simulation-training-insights.md b/defender-office-365/attack-simulation-training-insights.md index 88f45b6736..e04fcffd46 100644 --- a/defender-office-365/attack-simulation-training-insights.md +++ b/defender-office-365/attack-simulation-training-insights.md @@ -459,7 +459,7 @@ How user activity signals are captured is described in the following table. |Opened Attachment|A user opened the attachment.|The signal comes from the client (for example, Outlook or Word).| |Read Message|The user read the simulation message.|Message read signals might experience issues in the following scenarios: | |Out of Office|Determines whether the user is out of office.|Currently calculated by the Automatic replies setting from Outlook.| -|Compromised User|The user was compromised. The compromise signal varies based on the social engineering technique.|| +|Compromised User|The user was compromised. The compromise signal varies based on the social engineering technique.|| |Clicked Message Link|The user clicked on the payload link in the simulation message.|The URL in the simulation is unique for each user, which allows individual user activity tracking. Third-party filtering services or email forwarding can lead to false positives. For more information, see [I see clicks or compromise events from users who insist they didn't click the link in the simulation message](attack-simulation-training-faq.md#i-see-clicks-or-compromise-events-from-users-who-insist-they-didnt-click-the-link-in-the-simulation-message).| |Forwarded Message|The user forwarded the message.|| |Replied to Message|The user replied to the message.||