%3CLINGO-SUB%20id%3D%22lingo-sub-1873169%22%20slang%3D%22en-US%22%3EAttack%20simulation%20training%20public%20preview%20now%20open%20to%20all%20E3%20customers%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1873169%22%20slang%3D%22en-US%22%3E%3CP%3EAt%20Ignite%202020%2C%20we%20announced%20the%20%3CA%20href%3D%22https%3A%2F%2Fmyignite.microsoft.com%2Fsessions%2F7db8a5e9-87d0-419b-b39f-ab0993a9addb%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Epublic%20preview%20of%20%3C%2FA%3E%3CSPAN%3EAttack%20simulation%20training%3C%2FSPAN%3E%20in%20Microsoft%20Defender%20for%20Office%20365.%20Delivered%20in%20partnership%20with%20%3CA%20href%3D%22https%3A%2F%2Fterranovasecurity.com%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ETerranova%20Security%3C%2FA%3E%2C%20Attack%20simulation%20training%20is%20a%20premium%20feature%20available%20to%20Microsoft%20Defender%20for%20Office%20365%20P2%2C%20Microsoft%20365%20E5%20and%20Microsoft%20Security%20E5%20license%20holders.%20It%20empowers%20customers%20to%20detect%2C%20analyze%20and%20remediate%20phishing%20risk%20across%20their%20users.%20Today%2C%20we%20are%20opening%20the%20full%20public%20preview%20of%3CA%20href%3D%22https%3A%2F%2Fsecurity.microsoft.com%2Fattacksimulator%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%26nbsp%3BAttack%20simulation%20training%3C%2FA%3E%20to%20all%20Microsoft%20365%20%3CSTRONG%3EE3%20and%20E5%3C%2FSTRONG%3E%20customers%26nbsp%3Bto%20discover%2C%20quantify%2C%20and%20remediate%20social%20engineering%20risk%20across%20users.%20After%20Attack%20simulation%20training%20becomes%20generally%20available%2C%20all%20E3%20customers%20will%20retain%20access%20to%20a%20trial%20version%20of%20the%20product%20which%20will%20include%20a%20smaller%20subset%20of%20capabilities.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22RukmaSen_0-1605028403719.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F232677i9D898AA202DFA6D6%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22RukmaSen_0-1605028403719.png%22%20alt%3D%22RukmaSen_0-1605028403719.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20the%20new%20world%20of%20work%2C%20remote%20employees%20are%20crucial%20cybersecurity%20decision-makers.%20Empowering%20them%20with%20information%20and%20training%20is%20even%20more%20important%20now.%20Additionally%2C%20attackers%20have%20used%20the%20anxiety%20generated%20by%20COVID-19%20and%20current%20events%20to%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F04%2F08%2Fmicrosoft-shares-new-threat-intelligence-security-guidance-during-global-crisis%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eincrease%20the%20%3C%2FA%3E%3CSPAN%3Efrequency%20and%20sophistication%3C%2FSPAN%3E%3CSPAN%3E.%3C%2FSPAN%3E%20Our%20customers%20need%20effective%20training%20that%20is%20fast%20and%20simple%20to%20deploy.%20Attack%20simulation%20training%20automates%20intelligent%20phishing%20simulations%2C%20targeted%20training%20and%20rich%20analytics%20to%20help%20our%20customers%20manage%20social%20engineering%20risk%20in%20the%20new%20world%20of%20work.%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EWhat%20is%20Attack%20Simulation%20Training%20(public%20preview)%3F%20%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EAttack%20simulation%20training%20empowers%20customers%20to%20accurately%20detect%20risk%20by%20phishing%20employees%20using%20constantly-updated%20real%20phish%20templates%2C%20with%20granular%2C%20context-specific%20targeting.%20Automated%20simulation%20creation%2C%20payload%20attachment%2C%20user%20targeting%2C%20schedule%20and%20cleanup%20simplify%20the%20process%20for%20Security%20Administrators.%20Rich%20reporting%20and%20analytics%20helps%20customers%20quantify%20social%20engineering%20risk%20and%20remediate%20it%20intelligently%20through%20strategic%20training%20programs.%20Metrics%20like%20coverage%20and%20completeness%2C%20training%20effectiveness%20and%20predicted%20compromise%20rate%20measure%20true%20behavior%20change%20and%20risk%20reduction.%20Terranova%20Security%E2%80%99s%20industry-leading%20phish%20training%20content%20reinforces%20the%20human%20firewall%20through%20hyper-targeted%20security%20training%2C%20designed%20to%20cater%20to%20diverse%20learning%20styles%2C%20available%20in%2012%2B%20languages%20and%20accessible%20to%20the%20highest%20standards.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22RukmaSen_1-1605028403772.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F232678i47E3936A914E124B%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22RukmaSen_1-1605028403772.png%22%20alt%3D%22RukmaSen_1-1605028403772.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EWhere%20can%20customers%20access%20Attack%20Simulation%20Training%20(public%20preview)%3F%20%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EAccess%20the%20%3CA%20href%3D%22https%3A%2F%2Fsecurity.microsoft.com%2Fattacksimulator%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Epublic%20preview%20of%20Attack%20simulation%20training%3C%2FA%3E%20in%20Microsoft%20Defender%20for%20Office%20365%20on%20your%20M365%20Security%20and%20Compliance%20Center%20dashboard.%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EWhat%20happens%20after%20Attack%20simulation%20training%20is%20Generally%20Available%3F%20%3C%2FSTRONG%3EAfter%20Attack%20simulation%20training%20is%20Generally%20Available%2C%20E3%20customers%20will%20retain%20access%20to%20a%20subset%20of%20core%20capabilities.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1873169%22%20slang%3D%22en-US%22%3E%3CP%3EToday%2C%20we%20are%20opening%20the%20full%20public%20preview%20of%3CA%20href%3D%22https%3A%2F%2Fsecurity.microsoft.com%2Fattacksimulator%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3E%26nbsp%3BAttack%20simulation%20training%3C%2FA%3E%20to%20all%20Microsoft%20365%20%3CSTRONG%3EE3%20and%20E5%3C%2FSTRONG%3E%20customers%26nbsp%3Bto%20discover%2C%20quantify%2C%20and%20remediate%20social%20engineering%20risk%20across%20users%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1873169%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ECloud%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EOffice%20365%20Advanced%20Threat%20Protection%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EThreat%20Protection%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1901087%22%20slang%3D%22en-US%22%3ERe%3A%20Attack%20simulation%20training%20public%20preview%20now%20open%20to%20all%20E3%20customers%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1901087%22%20slang%3D%22en-US%22%3E%3CP%3EAre%20you%20able%20to%20schedule%20regular%20campaigns%3F%20We%20are%20able%20to%20schedule%20one%20off%20attacks%2C%20but%20it%20would%20be%20nice%20to%20be%20able%20to%20have%20a%20regular%20campaign%20that%20used%20multiple%20variants.%20Right%20now%20we%20have%20to%20go%20in%20every%20two%20weeks%20and%20set%20up%20a%20new%20one.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ELove%20the%20training%20for%20phished%20users%2C%20had%20many%20tell%20me%20that%20it%20was%20very%20useful%20information.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1901457%22%20slang%3D%22en-US%22%3ERe%3A%20Attack%20simulation%20training%20public%20preview%20now%20open%20to%20all%20E3%20customers%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1901457%22%20slang%3D%22en-US%22%3E%3CP%3ENot%20working%20for%20me%2C%20an%20EDU%20customer%20with%20A3%20licensing%20(equivalent%20to%20E3).%26nbsp%3B%20Says%20I%20don't%20have%20access%20to%20the%20page.%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

At Ignite 2020, we announced the public preview of Attack simulation training in Microsoft Defender for Office 365. Delivered in partnership with Terranova Security, Attack simulation training is a premium feature available to Microsoft Defender for Office 365 P2, Microsoft 365 E5 and Microsoft Security E5 license holders. It empowers customers to detect, analyze and remediate phishing risk across their users. Today, we are opening the full public preview of Attack simulation training to all Microsoft 365 E3 and E5 customers to discover, quantify, and remediate social engineering risk across users. After Attack simulation training becomes generally available, all E3 customers will retain access to a trial version of the product which will include a smaller subset of capabilities.

 

RukmaSen_0-1605028403719.png

 

In the new world of work, remote employees are crucial cybersecurity decision-makers. Empowering them with information and training is even more important now. Additionally, attackers have used the anxiety generated by COVID-19 and current events to increase the frequency and sophistication. Our customers need effective training that is fast and simple to deploy. Attack simulation training automates intelligent phishing simulations, targeted training and rich analytics to help our customers manage social engineering risk in the new world of work.

 

What is Attack Simulation Training (public preview)?

Attack simulation training empowers customers to accurately detect risk by phishing employees using constantly-updated real phish templates, with granular, context-specific targeting. Automated simulation creation, payload attachment, user targeting, schedule and cleanup simplify the process for Security Administrators. Rich reporting and analytics helps customers quantify social engineering risk and remediate it intelligently through strategic training programs. Metrics like coverage and completeness, training effectiveness and predicted compromise rate measure true behavior change and risk reduction. Terranova Security’s industry-leading phish training content reinforces the human firewall through hyper-targeted security training, designed to cater to diverse learning styles, available in 12+ languages and accessible to the highest standards.

RukmaSen_1-1605028403772.png

 

Where can customers access Attack Simulation Training (public preview)?

Access the public preview of Attack simulation training in Microsoft Defender for Office 365 on your M365 Security and Compliance Center dashboard.

What happens after Attack simulation training is Generally Available? After Attack simulation training is Generally Available, E3 customers will retain access to a subset of core capabilities.

 

 

 

 

 

 

 

 

2 Comments
New Contributor

Are you able to schedule regular campaigns? We are able to schedule one off attacks, but it would be nice to be able to have a regular campaign that used multiple variants. Right now we have to go in every two weeks and set up a new one.

 

Love the training for phished users, had many tell me that it was very useful information.

Senior Member

Not working for me, an EDU customer with A3 licensing (equivalent to E3).  Says I don't have access to the page.