Learn how to delivery Cyber Security training to users and conduct attack simulation using Microsoft Defender. Plan the attack, choose payload, target users, educate them and analyse the results. All from within Defender. Make this periodic to keep users vigilant.
Step by step process:
- We start off by going to Microsoft Defender homepage on your browser (Edge browser recommended for anything Microsoft)
- Scroll the left Burger Menu (The 3 lines stacked one below the other) till you see Email & collaboration
- Click on Attack simulation training
- To start a simulation go to the Overview pages and click on Launch a simulation
- It will ask you which technique you would like to use. Let is select Credential Harvest (In this type of technique, a malicious actor creates a message, with a URL in the message) as it is the most common type. Once you choose the technique click on Next
- Choose a Name and Description of the Simulation and click Next
- Select the Payload and the Login Page then click Next
- Select the Target Users/Groups and click Next
- If now you want to Exclude some people you can do that and click
- Now it will ask you to Assign training which is to select training preferences, assignment, and customize a landing page for this simulation. Ideally select Assign training for me which will allow Microsoft to assign the best training courses as per your simulation. You can also select the Due Date for the training. The click Next
- You can choose your Landing Page from the options also upload your organisation logo to make it more authentic and click Next.
- Select the end user notification setting then you can choose the language as well and also select the Delivery Preferences then click Next.
- Now you can configure the Launch Details of the simulation. Then click
- The Last step you can Review your simulation and send a Test email to yourself to check. Modify whatever required. then click Submit. This will start the simulation.
Once you have done this you can come back to the Microsoft Defender> Email & collaboration> Attack simulation training> Overview Pages to see the reports on how the users are faring. How many fell prey to it and how many did not etc.
Related videos
How to protect your passwords – #password #cybersecurity
5 Best Practices to enhance Efficiency and Security using Microsoft 365
How Microsoft 365 transforms productivity, security, and automation