Creating a Phishing Simulation Rule in the O365 Admin Center

Creating a Phishing Simulation Rule in the O365 Admin Center



In order to whitelist Threatcop into your O365 environment you need to follow the below mentioned steps:

  1. Go to https://www.microsoft365.com/


  2. Locate the square with dots positioned at the upper-left corner. Proceed to access the Security section available in the sidebar menu.

     
  3. You would be successfully redirected to https://security.microsoft.com/




  4. Within the sidebar, navigate to the section labeled "Policies and Rules."


  5. Proceed to locate the section labeled "Threat Policies" and then proceed by clicking on it.




  1. While in the "Rules & Policies" tab, locate the subsection titled "Rules." Within this subsection, proceed to find and select "Advanced Delivery."





  1. Within the "Advanced Delivery" section, you will encounter two distinct sections, namely "SecOps Mailbox" and "Phishing Simulations." Please navigate to the "Phishing Simulations" section.
  2. Creating a Phishing Simulation Rule in the O365 Admin Center.

  3. Upon clicking the "Add" button, you will be presented with three distinct sections, which are Domain, Sender IP, and Simulation URLs, as outlined below.

  4. Kindly enter the below details into the three sections accordingly
  5. Domain:  Domain/URL/Sender ID (depending on the simulation template). (Contact your SPOC incase you are not able to find it)
  6. Sending IP: 168.245.74.19.
  7. URL IP: 13.234.117.252
  8. Simulation URLs: Domain/URL (depending on the simulation template).
  9. Once you have filled in the aforementioned details, proceed to click the "Add" button, thereby finalizing the process of whitelisting within the Office 365 environment.








    • Related Articles

    • Things to keep in mind before creating a Campaign Template

      Before going to the Dashboard to create a Campaign Template you first need to keep a few things in mind: 1) The Category of your Campaign Template We provide various categories to create campaigns under. If you want to create a campaign related to ...
    • How to create Phishing Template in TSAT?

      Please follow the below steps to create a Phishing Template Step 1 : Click on Campaign Templates" on left side menu and then click on "Create New" as shown in the below screenshot. Step 2 : Input the below details in the opened form after clicking on ...
    • How many types of cyber attacks do you simulate?

      We simulate 6 types of cyber attacks i.e. Phishing (Malicious link in the email), Ransomware (malicious attachment in email), Smishing (Malicious link via sms), Vishing (Extracting personal data through a phone call), WhatsApp (Through a message on ...
    • What is Phishing?

      Phishing is a type of social engineering where an attacker sends fraudulent emails designed to trick a human victim into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure.
    • What is Spear Phishing?

      Spear Phishing is a type of social engineering tactic, where an attacker sends a fraudulent email on behalf of a trusted sender to trick a human/employee victim into revealing sensitive information.