Attack Simulation Training | Virtual Ninja Training with Heike Ritter

แชร์
ฝัง
  • เผยแพร่เมื่อ 27 ต.ค. 2022
  • Attack simulation training is an intelligent phish risk reduction tool that empowers employees to prevent attacks, measures their awareness of phishing risks, and provides actionable insights and recommendations that can change their behavior. Learn how to use attack simulation training right in Microsoft Defender for Office 365.
    Guest: Brandon Koeller, Microsoft
    This training series is based on the Ninja blog and brings you up to speed quickly on Microsoft 365 Defender. In every episode, our experts guide you through the powerful features and functions of Microsoft 365 Defender that help you keep your environment secure. We start with the fundamentals and dive deeper as the show continues.
    Learn more and add the Virtual Ninja Training series to your calendar by going to aka.ms/NinjaShow
    SUBSCRIBE for new Microsoft Security videos every week.
    aka.ms/SecurityCommunity/Subs...
    #NinjaShow #Microsoft365Defender #M365Defender
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 7

  • @v-for-victory
    @v-for-victory หลายเดือนก่อน

    Data export to CSV is really a mess. You have to scroll down to get the additional data entries (Takes half an hour for 2000+ entries), then you export and the CSV is messed up. Unbelievable that this is rolled out to customers.

  • @gdr1174
    @gdr1174 ปีที่แล้ว +1

    this is well timed, i need to deploy this to a business

  • @sureshkrishnan-gc7sr
    @sureshkrishnan-gc7sr ปีที่แล้ว

    My requirement is to change the user reported settings option from Microsoft to my reporting mailbox only.
    In this case, if we trigger the simulation and user report the mail as phishing it will route to my reporting mail, so will that trigger the positive reinforcement to reported user?

  • @Ryzzyrru
    @Ryzzyrru ปีที่แล้ว

    Has anyone managed to get payload harvesting working? I never get any results.

    • @bkoeller
      @bkoeller ปีที่แล้ว +1

      Hey Paul! Payload harvesting operates on your threat protection feed, largely driven by submissions. If you aren't seeing results, make sure your org's submission pipeline is setup to also submit results to Microsoft for analysis.

    • @Ryzzyrru
      @Ryzzyrru ปีที่แล้ว +1

      @@bkoeller Hi Brandon, thanks. The submission pipeline is setup to submit to Microsoft. However I'm not getting any results. It's not very clearly documented on how the conditions within an automation workflow work and if exclusively based on user submissions.

    • @sureshkrishnan-gc7sr
      @sureshkrishnan-gc7sr ปีที่แล้ว

      ​@@bkoeller My requirement to change the user reported settings option from Microsoft to my reporting mailbox only.
      In this case, if we trigger the simulation and user report the mail as phishing it will route to my reporting mail, so will that trigger the positive reinforcement notification to reported user?