Jump to:navigation, search
Wiki





























De.png
En.png
Fr.png
  • Note
    This description is based on the status of the Microsoft 365 Portal in June 2023. Changes to the user interface on the part of Microsoft are possible at any time and must be taken into account accordingly in the implementation.
    All information without warranty.





  • Configure Microsoft 365 Defender for Phishing Simulation
    New article: 06.2023
    notempty
    This article refers to a Resellerpreview
    Access: https://www.office.com/apps?auth=2&home=1 Microsoft 365, Sicherheit


    Whitelisting
    To ensure that the simulated phishing emails of the Awareness PLUS training are not blocked by the Microsoft mail server or Microsoft Defender, whitelisting must be configured at various points.

    Microsoft 365 Defender warning

    The domains used in the phishing simulation can be stored in Microsoft 365 Defender (formerly Advanced Threat Protection - ATP) so that no warning message is displayed.

    Set up secure links in Microsoft 365 Defender

    AWP MS365 Menu Sicherheit-en.png
    Fig.1
    AWP MS365 Menu Richtlinien-en.png
    Fig.2
    Policies and Rules tab
    AWP MS365 Menu Bedrohungsrichtlinien-en.png
    Fig.3
    Click the Threat Policy button
    AWP MS365 Menu Bedrohungsrichtlinien Sichere-Links-en.png
    Fig.4
    Click on Safe Links
    AWP Defender Ihre Richtlinie bennen-en.png
    Fig.5
    Assign a Name and a Description if necessary
    AWP Defender Benutzer und Domänen-en.png
    Fig.6
    Specify the domain of your own organization as the recipient domain
    AWP Defender URL und Klick-Schutzeinstellungen-en.png
    Fig.7
    1. Selects that URLs can be rewritten
    2. User clicks should be trackable
    3. Users should be able to click through to the original URL
    4. Click on Manage 0 URLs
    AWP Defender URLS verwalten oder hinzufügen-en.png
    Fig.8
    Select Add URLs button
    AWP Defender Benutzerdefinierte URL eingeben-en.png
    Fig.9
    Enter URLs that are located under "Simulation" → "Whitelisting" → "List of used domains in phishing links". Keep to the format https://domain/*.