Creating a Phishing Simulation Rule in the Microsoft Defender
In order to whitelist Threatcop into your O365 environment you need to follow the below mentioned steps:
- Go to https://www.microsoft365.com/

- Locate the square with dots positioned at the upper-left corner. Proceed to access the Security section available in the sidebar menu.

Within the sidebar, navigate to the section labeled "Policies and Rules."

Proceed to locate the section labeled "Threat Policies" and then proceed by clicking on it.

- While in the "Rules & Policies" tab, locate the subsection titled "Rules." Within this subsection, proceed to find and select "Advanced Delivery."

- Within the "Advanced Delivery" section, you will encounter two distinct sections, namely "SecOps Mailbox" and "Phishing Simulations." Please navigate to the "Phishing Simulations" section.

- Creating a Phishing Simulation Rule in the O365 Admin Center.

- Upon clicking the "Add" button, you will be presented with three distinct sections, which are Domain, Sender IP, and Simulation URLs, as outlined below.
- Kindly enter the below details into the three sections accordingly
- Domain: Domain/URL/Sender ID (depending on the simulation template). (Contact your SPOC incase you are not able to find it)
- Sending IP: 168.245.74.19
- Simulation URLs: Domain/URL (depending on the simulation template).
- Once you have filled in the aforementioned details, proceed to click the "Add" button, thereby finalizing the process of whitelisting within the Office 365 environment.
Related Articles
Telegram Phishing Simulation Tool Workflow
Steps to Run a Telegram Campaign When planning a Telegram phishing simulation, follow these structured steps to ensure smooth execution and compliance: Configure the Template in TSAT 1. Log in to TSAT Access your account on the TSAT platform. 2. ...
Things to keep in mind before creating a Campaign Template
Before going to the Dashboard to create a Campaign Template you first need to keep a few things in mind: 1) The Category of your Campaign Template We provide various categories to create campaigns under. If you want to create a campaign related to ...
Thing to consider while creating a new template
A common question that arises during campaign creation is, "What key factors should we consider while creating the campaign?” Below are the points to keep in mind when creating and running a campaign: Type of Simulation: TSAT provides you the option ...
Microsoft 365 ATP (Advanced Threat Protection) Whitelisting
In case you are using Microsoft O365 Advanced Threat within your mail environment, there is a possibility that you might experience false clicks and email attachment opens. In order for ThreatCop’s email to function properly, additional rules to ...
How many types of cyber attacks do you simulate?
We simulate 6 types of cyber attacks i.e. Phishing (Malicious link in the email), Ransomware (malicious attachment in email), Smishing (Malicious link via sms), Vishing (Extracting personal data through a phone call), WhatsApp (Through a message on ...