%3CLINGO-SUB%20id%3D%22lingo-sub-2037291%22%20slang%3D%22en-US%22%3EAttack%20simulation%20training%20in%20Microsoft%20Defender%20for%20Office%20365%20now%20Generally%20Available%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2037291%22%20slang%3D%22en-US%22%3E%3CH1%20id%3D%22toc-hId-1242342484%22%20id%3D%22toc-hId-1242342454%22%20id%3D%22toc-hId-1242342454%22%20id%3D%22toc-hId-1242342454%22%20id%3D%22toc-hId-1242342454%22%20id%3D%22toc-hId-1242342454%22%20id%3D%22toc-hId-1242342454%22%3E%3CFONT%20color%3D%22%23333333%22%3EAttack%20simulation%20training%20Generally%20Available%26nbsp%3B%3C%2FFONT%3E%3C%2FH1%3E%0A%3CP%3E%3CFONT%20color%3D%22%23333333%22%3EWe%20are%20pleased%20to%20announce%20the%20General%20Availability%20(GA)%20of%20Attack%20simulation%20training%20in%20Microsoft%20Defender%20for%20Office%20365.%20Delivered%20in%20partnership%20with%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fmicrosoft-partners-with-terranova-security-for-security%2Fba-p%2F1170747%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3ETerranova%20Security%2C%3C%2FA%3E%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fannouncing-attack-simulation-training-in-microsoft-defender-for%2Fba-p%2F1704482%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EAttack%20simulation%20training%3C%2FA%3E%20is%20an%20intelligent%20social%20engineering%20risk%20management%20tool%20that%20automates%20the%20creation%20and%20management%20of%20phishing%20simulations%20to%20help%20customers%20detect%2C%20prioritize%20and%20remediate%20phishing%20risks%20by%20using%20real%20phish%20and%20hyper-targeted%20training%20to%20change%20employee%20behaviors.%20To%20see%20a%20demo%20of%20the%20product%20%3CA%20href%3D%22https%3A%2F%2Fmyignite.microsoft.com%2Fsessions%2F7db8a5e9-87d0-419b-b39f-ab0993a9addb%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Etune%20into%20our%20announcement%20video%3C%2FA%3E%20at%20Microsoft%20Ignite%202020.%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1932903958%22%20id%3D%22toc-hId-1932903928%22%20id%3D%22toc-hId-1932903928%22%20id%3D%22toc-hId-1932903928%22%20id%3D%22toc-hId-1932903928%22%20id%3D%22toc-hId-1932903928%22%20id%3D%22toc-hId-1932903928%22%3E%3CFONT%20color%3D%22%23333333%22%3EEmulate%20real%20threats%20with%20intelligent%26nbsp%3Bsimulations%26nbsp%3B%26nbsp%3B%3C%2FFONT%3E%3C%2FH2%3E%0A%3CP%3E%3CFONT%20color%3D%22%23333333%22%3EIntelligent%20simulations%20automate%20simulation%20and%20payload%20management%2C%20user%20targeting%2C%26nbsp%3Bschedule%26nbsp%3Band%20cleanup.%20In%20the%20Microsoft%20365%20Security%20Center%2C%20administrators%20can%20launch%20a%20simulation%20and%20choose%20a%20technique%20commonly%20used%20by%20attackers%20and%20target%20users.%20%26nbsp%3B%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22lia-align-center%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-left%22%20image-alt%3D%22RukmaSen_0-1609955154661.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F244579i2F462984AC771253%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22RukmaSen_0-1609955154661.png%22%20alt%3D%22RukmaSen_0-1609955154661.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-align-left%22%3E%3CFONT%20color%3D%22%23333333%22%3E%3CEM%3EAttack%20simulation%20training%20dashboard%3C%2FEM%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20color%3D%22%23333333%22%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20color%3D%22%23333333%22%3E%3CSTRONG%3EWide%20variety%20of%20Phishing%20Techniques%20%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20color%3D%22%23333333%22%3EFollowing%20the%20simple%20steps%20outlined%20in%20the%20workflow%2C%20administrators%20can%20choose%20from%26nbsp%3Bthe%20top%20five%20social%20engineering%20techniques%26nbsp%3Band%20select%20the%20phish%20template%20from%20a%20list%20of%20real%20attacks%20seen%20in%20their%20tenant.%26nbsp%3BOptionally%20customers%20can%20upload%20their%20own%20template%20and%20then%20select%20the%20users%20to%20whom%20the%20simulation%20will%20be%20sent.%26nbsp%3B%26nbsp%3B%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22lia-align-center%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-left%22%20image-alt%3D%22RukmaSen_1-1609955216251.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F244580i8452075ABC0B6A4A%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22RukmaSen_1-1609955216251.png%22%20alt%3D%22RukmaSen_1-1609955216251.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-align-left%22%3E%3CFONT%20color%3D%22%23333333%22%3E%3CEM%3EPhishing%20Techniques%20available%3C%2FEM%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20color%3D%22%23333333%22%3E%3CEM%3E%26nbsp%3B%3C%2FEM%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20color%3D%22%23333333%22%3E%3CSTRONG%3EPhish%20Template%20Library%20from%20Real%20Phish%20Emails%20%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20color%3D%22%23333333%22%3ETo%20maximize%20accuracy%2C%20Attack%20simulation%20training%20pulls%20its%20phishing%20templates%20from%20real%20world%20phish%20attackers%20seen%20in%20the%20customers%20environment.%20The%20security%20administrator%20can%20automate%20a%20%E2%80%9Cpayload%20harvester%E2%80%9D%20that%20collects%20and%20neutralizes%20phish%20emails%20received%20by%20the%20organization.%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20color%3D%22%23333333%22%3E%C2%AD%C2%AD%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22RukmaSen_2-1609955277359.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F244581iFAC69B79770E5198%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22RukmaSen_2-1609955277359.png%22%20alt%3D%22RukmaSen_2-1609955277359.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CDIV%20id%3D%22tinyMceEditorRukmaSen_2%22%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CP%20class%3D%22lia-align-left%22%3E%3CFONT%20color%3D%22%23333333%22%3E%3CEM%3EPayloads%20Available%3C%2FEM%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20color%3D%22%23333333%22%3EThrough%20the%20real%20payload%20harvester%2C%20Attack%20simulation%20training%20trains%20employees%20to%20identify%20and%20report%20the%20kinds%20of%20emails%20real%20attackers%20will%20send%20them.%20The%20security%20administrator%20can%20set%20up%20targeted%20payload%20harvesting%20as%20well%2C%20using%20conditions%20like%20technique%20used%2C%20department%20targeted%20and%20frequency.%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22RukmaSen_3-1609955383082.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F244582i46A0E287108DF51A%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22RukmaSen_3-1609955383082.png%22%20alt%3D%22RukmaSen_3-1609955383082.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-align-left%22%3E%3CFONT%20color%3D%22%23333333%22%3E%3CEM%3EPayload%20Harvesting%20Conditions%3C%2FEM%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-align-center%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20color%3D%22%23333333%22%3E%C2%AD%C2%AD%C2%AD%C2%AD%C2%AD%C2%AD%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20color%3D%22%23333333%22%3EFinally%2C%20security%20administrators%20can%20add%20%E2%80%98phishing%20indicators%E2%80%99%20like%20an%20incorrect%20domain%20name%2C%20an%20urgency%20tip%20or%20a%20misspelled%20company%20name%20to%20train%20end%20users%20on%20commonly-seen%20phishing%20indicators.%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22lia-align-center%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22RukmaSen_4-1609955484161.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F244583i753C1F70E6185AA9%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22RukmaSen_4-1609955484161.png%22%20alt%3D%22RukmaSen_4-1609955484161.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-align-left%22%3E%3CFONT%20color%3D%22%23333333%22%3E%3CEM%3EAdd%20indicators%20to%20phishing%20templates%3C%2FEM%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20color%3D%22%23333333%22%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FFONT%3E%3CFONT%20color%3D%22%23333333%22%3E%3CSTRONG%3EUser%20targeting%20and%20training%20assignment%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20color%3D%22%23333333%22%3EUser%20targeting%20is%20automated%2C%20and%20the%20administrator%20can%20use%20any%20address%20book%20properties%20to%20filter%20for%20a%20user%20list%20and%20target%20them.%20The%20administrator%20can%20also%20quickly%20import%20a%20list%20of%20%E2%80%9Crepeat%20offenders%E2%80%9D%20or%20employees%20who%20have%20failed%20a%20simulation%20in%20the%20past%20and%20target%20the%20simulation%20to%20this%20group.%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22lia-align-center%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22RukmaSen_5-1609955516489.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F244584i26A1FF401B440A89%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22RukmaSen_5-1609955516489.png%22%20alt%3D%22RukmaSen_5-1609955516489.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-align-left%22%3E%3CFONT%20color%3D%22%23333333%22%3E%3CEM%3ETarget%20users%20based%20on%20address%20book%20filters%3C%2FEM%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20color%3D%22%23333333%22%3EThe%20administrator%20can%20then%20assign%20training%26nbsp%3Btailored%20to%20a%20user%E2%80%99s%20behavior%20in%20the%20simulation.%26nbsp%3BMicrosoft%20recommends%20training%20to%20assign%20based%20on%20learning%20pathways%20and%26nbsp%3Bour%20intelligence%20into%20which%20training%20is%20effective%20for%20which%20kinds%20of%20behavior.%20The%20administrator%20can%20also%20choose%20to%20assign%20training%20themselves.%26nbsp%3BFor%20example%2C%20an%20administrator%20may%20choose%20to%20assign%203%20trainings%20to%20users%20who%20were%20compromised%20in%20the%20simulation%20but%20only%202%20to%20those%20who%20clicked%20and%201%20to%20all%20users.%26nbsp%3BThe%20landing%20page%20on%20which%20the%20end%20user%20will%20land%20to%20access%20this%20training%20are%20wholly%20customizable%20for%20the%20look%20and%20voice%20of%20your%20brand.%26nbsp%3BFinally%2C%20the%20administrator%20has%20the%20option%20to%20schedule%20the%20simulation%20to%20launch%20right%20away%20or%26nbsp%3Bat%20a%20later%20time%2C%20which%20can%20be%20customized%20by%20recipient%20time-zone.%26nbsp%3B%26nbsp%3B%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22RukmaSen_6-1609955668509.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F244587i3D9E2E04C0C7C4E1%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22RukmaSen_6-1609955668509.png%22%20alt%3D%22RukmaSen_6-1609955668509.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-align-left%22%3E%3CFONT%20color%3D%22%23333333%22%3E%3CEM%3EAssign%20Training%3C%2FEM%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20color%3D%22%23333333%22%3ECustomized%20Role%20Based%20Access%20ensures%20that%20administrating%20the%20simulation%20and%20training%20is%20a%20secure%20and%20diversified%20workflow.%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-125449495%22%20id%3D%22toc-hId-125449465%22%20id%3D%22toc-hId-125449465%22%20id%3D%22toc-hId-125449465%22%20id%3D%22toc-hId-125449465%22%20id%3D%22toc-hId-125449465%22%20id%3D%22toc-hId-125449465%22%3E%3CFONT%20color%3D%22%23333333%22%3EQuantify%20social%20engineering%20risk%20and%20prioritize%20remediation%20through%20training%3C%2FFONT%3E%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId--1682004968%22%20id%3D%22toc-hId--1682004998%22%20id%3D%22toc-hId--1682004998%22%20id%3D%22toc-hId--1682004998%22%20id%3D%22toc-hId--1682004998%22%20id%3D%22toc-hId--1682004998%22%20id%3D%22toc-hId--1682004998%22%3E%3CFONT%20size%3D%223%22%20color%3D%22%23333333%22%3EThe%20training%20effectiveness%20metric%2C%20which%20plots%20your%20organization%E2%80%99s%20actual%20compromise%20rate%20in%20a%20simulation%20against%20Microsoft%E2%80%99s%20predicted%20compromise%20rate%2C%20measures%20the%20effectiveness%20of%20the%20training%20program.%20Overlay%20the%20dates%20of%20training%20completion%20and%20simulations%20to%20correlate%20which%20trainings%20caused%20a%26nbsp%3Bdrop%20in%26nbsp%3Bcompromise%20rate%20and%20evaluate%20their%20effectiveness.%26nbsp%3B%3C%2FFONT%3E%3C%2FH2%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22RukmaSen_7-1609955787952.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F244588iAE23345C8A60FE22%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22RukmaSen_7-1609955787952.png%22%20alt%3D%22RukmaSen_7-1609955787952.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CDIV%20id%3D%22tinyMceEditorRukmaSen_7%22%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CP%20class%3D%22lia-align-left%22%3E%3CFONT%20color%3D%22%23333333%22%3E%3CEM%3ETraining%20Effectiveness%20Report%3C%2FEM%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-align-left%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22lia-align-left%22%3E%3CFONT%20color%3D%22%23333333%22%3E%3CFONT%20size%3D%223%22%3EGain%20visibility%20over%20your%20organization%E2%80%99s%26nbsp%3Btraining%20completion%20and%20simulation%20status%20through%26nbsp%3Bcompleteness%20and%20coverage%20metrics%26nbsp%3Band%20track%20your%20organization%E2%80%99s%20progress%20against%26nbsp%3Bthe%26nbsp%3Bbaseline%26nbsp%3Bpredicted%20compromise%20rate.%26nbsp%3BEvery%20reporting%20dashboard%20can%20be%20filtered%20in%20different%20ways%20and%20exported%20for%26nbsp%3Breporting%3C%2FFONT%3E%3CFONT%20size%3D%223%22%3E.%3C%2FFONT%3E%26nbsp%3B%26nbsp%3B%3C%2FFONT%3E%3CFONT%20color%3D%22%23333333%22%3EMultiple%20reporting%20views%20allowing%20you%20to%20drill%20down%20on%20training%20efficacy%2C%20training%20completion%2C%20repeat%20offenders%20and%20coverage.%3C%2FFONT%3E%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-805507865%22%20id%3D%22toc-hId-805507835%22%20id%3D%22toc-hId-805507835%22%20id%3D%22toc-hId-805507835%22%20id%3D%22toc-hId-805507835%22%20id%3D%22toc-hId-805507835%22%20id%3D%22toc-hId-805507835%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId--1001946598%22%20id%3D%22toc-hId--1001946628%22%20id%3D%22toc-hId--1001946628%22%20id%3D%22toc-hId--1001946628%22%20id%3D%22toc-hId--1001946628%22%20id%3D%22toc-hId--1001946628%22%20id%3D%22toc-hId--1001946628%22%3E%3CFONT%20color%3D%22%23333333%22%3EReinforce%20the%20human%20firewall%20with%20industry-leading%20Security%20Awareness%20Training%3C%2FFONT%3E%3C%2FH2%3E%0A%3CP%3E%3CFONT%20color%3D%22%23333333%22%3ETerranova%20Security%E2%80%99s%20huge%20library%20of%20phish%20training%20content%26nbsp%3B%3CSPAN%20data-contrast%3D%22auto%22%3Eenables%20personalized%20and%20highly%20specific%20training%20targeting%20based%20on%20the%20user%E2%80%99s%20behavior%20during%20a%20simulation.%3C%2FSPAN%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22RukmaSen_9-1609956064226.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F244592i05BD2C29FE759F69%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22RukmaSen_9-1609956064226.png%22%20alt%3D%22RukmaSen_9-1609956064226.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22lia-align-left%22%3E%3CFONT%20color%3D%22%23333333%22%3E%3CEM%3ETraining%20Library%3C%2FEM%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20color%3D%22%23333333%22%3E%3CSTRONG%3ENanolearnings%3CSPAN%20data-contrast%3D%22auto%22%3E%2C%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Emicrolearnings%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%2C%20and%20interactivity%3C%2FSPAN%3E%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20color%3D%22%23333333%22%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3Bcater%20to%20diverse%20learning%20styles%20and%20reinforce%20awareness.%20Additionally%2C%20all%20trainings%20are%20available%20in%2040%2B%20languages%20and%20accessible%20to%20the%20highest%20standards%20to%20meet%20the%20needs%20of%20Microsoft%E2%80%99s%20global%20customers.%26nbsp%3B%26nbsp%3B%3C%2FSPAN%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20color%3D%22%23333333%22%3EAttack%20simulation%20training%20enables%20organizations%20to%20improve%20their%20security%20posture%20by%20training%20their%20employees%20effectively%20and%20changing%20risky%20behavior.%20Organizations%20can%20choose%20from%20multiple%20training%20options%20to%20best%20fit%20their%20needs%20%E2%80%93%20using%20Microsoft%E2%80%99s%20recommended%20learning%20pathways%2C%20choosing%20to%20assign%20training%20manually%2C%20or%20choosing%20not%20to%20add%20training%20to%20a%20simulation.%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22RukmaSen_10-1609956087793.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F244593iD3F572511D841801%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22RukmaSen_10-1609956087793.png%22%20alt%3D%22RukmaSen_10-1609956087793.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CDIV%20id%3D%22tinyMceEditorRukmaSen_9%22%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CDIV%20id%3D%22tinyMceEditorRukmaSen_10%22%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CP%20class%3D%22lia-align-left%22%3E%3CFONT%20color%3D%22%23333333%22%3E%3CEM%3EAssigning%20Training%3C%2FEM%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20color%3D%22%23333333%22%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20color%3D%22%23333333%22%3E%3CSTRONG%3E%3CU%3EE3%20Trial%20%3C%2FU%3E%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20color%3D%22%23333333%22%3EAs%20we%20mentioned%20in%20our%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fattack-simulation-training-public-preview-now-open-to-all-e3%2Fba-p%2F1873169%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3Eblog%20announcing%20the%20expansion%20of%20public%20preview%20to%20E3%20license%3C%2FA%3E%20holders%2C%20we%20will%20continue%20to%20offer%20a%20subset%20of%20Attack%20simulation%20training%20capabilities%20to%20E3%20customers%20as%20a%20trial.%20The%20trial%20offering%20contains%20the%20ability%20to%20use%20a%20Credential%20Harvest%20payload%20and%20the%20ability%20to%20select%20from%202%20training%20experiences%20ISA%20Phishing%20and%20Mass%20Market%20Phishing.%26nbsp%3B%3C%2FFONT%3E%3CFONT%20color%3D%22%23333333%22%3EThe%20trial%20offering%20will%20not%20include%20any%20other%20phishing%20techniques%2C%20automated%20simulation%20creation%20and%20management%2C%20conditional%20payload%20harvesting%2C%20and%20the%20complete%20catalog%20of%20Terranova%20Security%20trainings.%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20color%3D%22%23333333%22%3ETo%20get%20started%20today%2C%20go%20to%20Attack%20simulation%20training%20in%20your%20M365%20Security%20and%20Compliance%20Center%20or%20use%20this%20link%3A%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FAttackSim%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eaka.ms%2FAttackSim.%26nbsp%3B%3C%2FA%3E%3C%2FFONT%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2037291%22%20slang%3D%22en-US%22%3E%3CP%3E%3CFONT%20color%3D%22%23333333%22%3EWe%20are%20pleased%20to%20announce%20the%20General%20Availability%20(GA)%20of%20Attack%20simulation%20training%20in%20Microsoft%20Defender%20for%20Office%20365.%20Delivered%20in%20partnership%20with%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fmicrosoft-partners-with-terranova-security-for-security%2Fba-p%2F1170747%22%20target%3D%22_blank%22%3ETerranova%20Security%2C%3C%2FA%3E%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fannouncing-attack-simulation-training-in-microsoft-defender-for%2Fba-p%2F1704482%22%20target%3D%22_blank%22%3EAttack%20simulation%20training%3C%2FA%3E%20is%20an%20intelligent%20social%20engineering%20risk%20management%20tool%20that%20automates%20the%20creation%20and%20management%20of%20phishing%20simulations%20to%20help%20customers%20detect%2C%20prioritize%20and%20remediate%20phishing%20risks%20by%20using%20real%20phish%20and%20hyper-targeted%20training%20to%20change%20employee%20behaviors.%20To%20see%20a%20demo%20of%20the%20product%20%3CA%20href%3D%22https%3A%2F%2Fmyignite.microsoft.com%2Fsessions%2F7db8a5e9-87d0-419b-b39f-ab0993a9addb%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Etune%20into%20our%20announcement%20video%3C%2FA%3E%20at%20Microsoft%20Ignite%202020.%3C%2FFONT%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2037291%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EThreat%20Protection%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2039423%22%20slang%3D%22en-US%22%3ERe%3A%20Attack%20simulation%20training%20in%20Microsoft%20Defender%20for%20Office%20365%20now%20Generally%20Available%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2039423%22%20slang%3D%22en-US%22%3E%3CP%3EWill%20other%20languages%20be%20available%20for%20the%20training%20module%3F%20If%20yes%20-%20what%20is%20the%20timeline%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2055513%22%20slang%3D%22en-US%22%3ERe%3A%20Attack%20simulation%20training%20in%20Microsoft%20Defender%20for%20Office%20365%20now%20Generally%20Available%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2055513%22%20slang%3D%22en-US%22%3E%3CP%3EActually%20same%20issue%20as%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F551652%22%20target%3D%22_blank%22%3E%40gabormicskei%3C%2FA%3E.%20Exactly%20month%20ago%20for%20example%20templatern.com%20was%20working%20but%20now%20it%20does%20not.%20Templateau.com%20is%20working%20now%26nbsp%3B%20but%20I'm%20afraid%20that%20will%20also%20be%20reported%20as%20deceptive%20by%20Chrome%20%26amp%3B%20Firefox%20in%20near%20future.%3CBR%20%2F%3EThe%20URLs%20work%20if%20disabling%20Safe%20browsing%20feature%20but%20that%20can%20generate%20additional%20security%20risk%20%2B%20management%20overhead%20to%20disable%20it%20temporarily%20from%20user%20computers%20and%20enabling%20it%20back%20after%20simulation.%3CBR%20%2F%3EWhitelisting%20the%20URLs%20in%20SafeBrowsing%20feature%20have%20not%20been%20working%20yet%20as%20wanted.%3CBR%20%2F%3E%3CBR%20%2F%3EAnd%20also%20same%20as%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F197342%22%20target%3D%22_blank%22%3E%40Ray%20Borkowski%3C%2FA%3E%2C%20now%20we%20are%20kind%20of%20forced%20to%20use%20english%20with%20customers%20and%20if%20end%20users%20do%20not%20work%20natively%20in%20english%2C%20that%20can%20be%20a%20barrier%20for%20not%20using%20this.%20For%20example%20the%20landing%20page%20where%20you%20can%20only%20edit%20header%20and%20body%20for%20a%20small%20amount%20of%20text.%20Indicator%20titles%20and%20other%20not%20customizable%20texts%20are%20in%20english%20and%20can%20cause%20confusion%20and%20suspicion%20in%20users%20if%20there%20are%20two%20languages%20mixed%20in%20it.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2039991%22%20slang%3D%22en-US%22%3ERe%3A%20Attack%20simulation%20training%20in%20Microsoft%20Defender%20for%20Office%20365%20now%20Generally%20Available%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2039991%22%20slang%3D%22en-US%22%3E%3CP%3EHi%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ECool%20feature%2C%20we%20love%20that.%20However%2C%20Google%20Chrome%20and%20Mozilla%20Firefox%20keep%20blocking%26nbsp%3Bphishing%20links...%20If%20I%20choose%20one%20from%20the%20links%20and%20insert%20it's%20fine%20but%20if%20simulate%20phishing%20and%20send%20it%20out%20to%20users%20the%20link%20is%20being%20blocked%20by%20those%20two%20browsers.%20The%20error%20says%3A%20it's%20blocked%20by%20google%20safe%20browsing.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ECould%20you%20please%20have%20a%20look%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThanks.%3C%2FP%3E%3CP%3EGabor%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

Attack simulation training Generally Available 

We are pleased to announce the General Availability (GA) of Attack simulation training in Microsoft Defender for Office 365. Delivered in partnership with Terranova Security, Attack simulation training is an intelligent social engineering risk management tool that automates the creation and management of phishing simulations to help customers detect, prioritize and remediate phishing risks by using real phish and hyper-targeted training to change employee behaviors. To see a demo of the product tune into our announcement video at Microsoft Ignite 2020.

 

Emulate real threats with intelligent simulations  

Intelligent simulations automate simulation and payload management, user targeting, schedule and cleanup. In the Microsoft 365 Security Center, administrators can launch a simulation and choose a technique commonly used by attackers and target users.  

 

RukmaSen_0-1609955154661.png

Attack simulation training dashboard

 

Wide variety of Phishing Techniques

Following the simple steps outlined in the workflow, administrators can choose from the top five social engineering techniques and select the phish template from a list of real attacks seen in their tenant. Optionally customers can upload their own template and then select the users to whom the simulation will be sent.  

 

RukmaSen_1-1609955216251.png

Phishing Techniques available

 

Phish Template Library from Real Phish Emails

To maximize accuracy, Attack simulation training pulls its phishing templates from real world phish attackers seen in the customers environment. The security administrator can automate a “payload harvester” that collects and neutralizes phish emails received by the organization.

­­

RukmaSen_2-1609955277359.png

 

Payloads Available

 

Through the real payload harvester, Attack simulation training trains employees to identify and report the kinds of emails real attackers will send them. The security administrator can set up targeted payload harvesting as well, using conditions like technique used, department targeted and frequency.

 

RukmaSen_3-1609955383082.png

Payload Harvesting Conditions

 

­­­­­­

Finally, security administrators can add ‘phishing indicators’ like an incorrect domain name, an urgency tip or a misspelled company name to train end users on commonly-seen phishing indicators.

 

RukmaSen_4-1609955484161.png

Add indicators to phishing templates

 

 User targeting and training assignment

User targeting is automated, and the administrator can use any address book properties to filter for a user list and target them. The administrator can also quickly import a list of “repeat offenders” or employees who have failed a simulation in the past and target the simulation to this group.

 

RukmaSen_5-1609955516489.png

Target users based on address book filters

 

The administrator can then assign training tailored to a user’s behavior in the simulation. Microsoft recommends training to assign based on learning pathways and our intelligence into which training is effective for which kinds of behavior. The administrator can also choose to assign training themselves. For example, an administrator may choose to assign 3 trainings to users who were compromised in the simulation but only 2 to those who clicked and 1 to all users. The landing page on which the end user will land to access this training are wholly customizable for the look and voice of your brand. Finally, the administrator has the option to schedule the simulation to launch right away or at a later time, which can be customized by recipient time-zone.  

 

RukmaSen_6-1609955668509.png

Assign Training

Customized Role Based Access ensures that administrating the simulation and training is a secure and diversified workflow.

 

Quantify social engineering risk and prioritize remediation through training

The training effectiveness metric, which plots your organization’s actual compromise rate in a simulation against Microsoft’s predicted compromise rate, measures the effectiveness of the training program. Overlay the dates of training completion and simulations to correlate which trainings caused a drop in compromise rate and evaluate their effectiveness. 

RukmaSen_7-1609955787952.png

 

Training Effectiveness Report

 

Gain visibility over your organization’s training completion and simulation status through completeness and coverage metrics and track your organization’s progress against the baseline predicted compromise rate. Every reporting dashboard can be filtered in different ways and exported for reporting.  Multiple reporting views allowing you to drill down on training efficacy, training completion, repeat offenders and coverage.

 

Reinforce the human firewall with industry-leading Security Awareness Training

Terranova Security’s huge library of phish training content enables personalized and highly specific training targeting based on the user’s behavior during a simulation.

RukmaSen_9-1609956064226.png

 

Training Library

Nanolearningsmicrolearnings, and interactivity

 cater to diverse learning styles and reinforce awareness. Additionally, all trainings are available in 40+ languages and accessible to the highest standards to meet the needs of Microsoft’s global customers.  

Attack simulation training enables organizations to improve their security posture by training their employees effectively and changing risky behavior. Organizations can choose from multiple training options to best fit their needs – using Microsoft’s recommended learning pathways, choosing to assign training manually, or choosing not to add training to a simulation.

RukmaSen_10-1609956087793.png

 
 

Assigning Training

 

E3 Trial

As we mentioned in our blog announcing the expansion of public preview to E3 license holders, we will continue to offer a subset of Attack simulation training capabilities to E3 customers as a trial. The trial offering contains the ability to use a Credential Harvest payload and the ability to select from 2 training experiences ISA Phishing and Mass Market Phishing. The trial offering will not include any other phishing techniques, automated simulation creation and management, conditional payload harvesting, and the complete catalog of Terranova Security trainings.

 

To get started today, go to Attack simulation training in your M365 Security and Compliance Center or use this link: aka.ms/AttackSim. 

3 Comments
Senior Member

Will other languages be available for the training module? If yes - what is the timeline?

Contributor

Hi,

 

Cool feature, we love that. However, Google Chrome and Mozilla Firefox keep blocking phishing links... If I choose one from the links and insert it's fine but if simulate phishing and send it out to users the link is being blocked by those two browsers. The error says: it's blocked by google safe browsing.

 

Could you please have a look?

 

Thanks.

Gabor

Occasional Visitor

Actually same issue as @gabormicskei. Exactly month ago for example templatern.com was working but now it does not. Templateau.com is working now  but I'm afraid that will also be reported as deceptive by Chrome & Firefox in near future.
The URLs work if disabling Safe browsing feature but that can generate additional security risk + management overhead to disable it temporarily from user computers and enabling it back after simulation.
Whitelisting the URLs in SafeBrowsing feature have not been working yet as wanted.

And also same as @Ray Borkowski, now we are kind of forced to use english with customers and if end users do not work natively in english, that can be a barrier for not using this. For example the landing page where you can only edit header and body for a small amount of text. Indicator titles and other not customizable texts are in english and can cause confusion and suspicion in users if there are two languages mixed in it.