Creating a Phishing Simulation Rule in the O365 Admin Center
In order to whitelist Threatcop into your O365 environment you need to follow the below mentioned steps:
- Go to https://www.microsoft365.com/
- Locate the square with dots positioned at the upper-left corner. Proceed to access the Security section available in the sidebar menu.
Within the sidebar, navigate to the section labeled "Policies and Rules."
Proceed to locate the section labeled "Threat Policies" and then proceed by clicking on it.
- While in the "Rules & Policies" tab, locate the subsection titled "Rules." Within this subsection, proceed to find and select "Advanced Delivery."
- Within the "Advanced Delivery" section, you will encounter two distinct sections, namely "SecOps Mailbox" and "Phishing Simulations." Please navigate to the "Phishing Simulations" section.
- Creating a Phishing Simulation Rule in the O365 Admin Center.
- Upon clicking the "Add" button, you will be presented with three distinct sections, which are Domain, Sender IP, and Simulation URLs, as outlined below.
- Kindly enter the below details into the three sections accordingly
- Domain: Domain/URL/Sender ID (depending on the simulation template). (Contact your SPOC incase you are not able to find it)
- Sending IP: 168.245.74.19.
- URL IP: 13.234.117.252
- Simulation URLs: Domain/URL (depending on the simulation template).
- Once you have filled in the aforementioned details, proceed to click the "Add" button, thereby finalizing the process of whitelisting within the Office 365 environment.
Related Articles
Thing to consider while creating a new template
A common question that arises during campaign creation is, "What key factors should we consider while creating the campaign?” Below are the points to keep in mind when creating and running a campaign: Type of Simulation: TSAT provides you the option ...
Things to keep in mind before creating a Campaign Template
Before going to the Dashboard to create a Campaign Template you first need to keep a few things in mind: 1) The Category of your Campaign Template We provide various categories to create campaigns under. If you want to create a campaign related to ...
How many types of cyber attacks do you simulate?
We simulate 6 types of cyber attacks i.e. Phishing (Malicious link in the email), Ransomware (malicious attachment in email), Smishing (Malicious link via sms), Vishing (Extracting personal data through a phone call), WhatsApp (Through a message on ...
What is Phishing?
Phishing is a type of social engineering where an attacker sends fraudulent emails designed to trick a human victim into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure.
What is Spear Phishing?
Spear Phishing is a type of social engineering tactic, where an attacker sends a fraudulent email on behalf of a trusted sender to trick a human/employee victim into revealing sensitive information.