{"id":43950,"date":"2021-11-16T18:00:28","date_gmt":"2021-11-16T18:00:28","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=101325"},"modified":"2021-11-16T18:00:28","modified_gmt":"2021-11-16T18:00:28","slug":"protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365\/","title":{"rendered":"Protect against phishing with Attack Simulation Training in Microsoft Defender for Office 365"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Picture1.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Sophisticated cyberattacks are on the rise, with email phishing as the most common attack vector. We\u2019ve seen it all over the news with stories like Hafnium that targeted Exchange servers<sup>1<\/sup> or the Nobelium attack against SolarWinds,<sup>2<\/sup> which show just how easy it is for bad actors to distribute a malicious URL and gain sustained access to networks to install ransomware across a wide number of industries and verticals. Working from home poses a greater security risk as organizations are required to rely more heavily on email communication to run their businesses, and cybercriminals have an increased opportunity to phish users.<\/p>\n<h2>Attack Simulation Training helps mitigate phishing risk<\/h2>\n<p>Microsoft has been working hard to understand these types of attacks and create solutions that help prevent, detect, and remediate vulnerability at the most basic point of attack: the user. <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/office-365-security\/attack-simulation-training-get-started?view=o365-worldwide\" target=\"_blank\" rel=\"noopener\">Attack Simulation Training<\/a> is one of those solutions. Attack Simulation Training is included in <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/office-365-security\/overview?view=o365-worldwide\" target=\"_blank\" rel=\"noopener\">Microsoft Defender for Office 365<\/a> Plan 2 and E5 offerings and provides a behavior-based solution to mitigate phishing risk across your organization. It provides the necessary tools to run intelligent simulations and measure users for a baseline awareness of phishing risk, provide actionable insights and recommendations to remediate risk with hyper-targeted training designed to change behavior, and then measure behavioral progress against that benchmark through repeated simulation. This all happens straight from the Microsoft 365 Defender portal.<\/p>\n<p>Attack Simulation Training was released as part of Microsoft Defender for Office 365 to ensure customers had a complete prevent, detect, investigate, and respond solution. Other offerings may only provide a portion of these capabilities. Microsoft Defender for Office 365 offers essential <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/office-365-security\/office-365-ti?view=o365-worldwide\" target=\"_blank\" rel=\"noopener\">threat investigation and response capabilities<\/a> to keep malicious communication from reaching users\u2019 inboxes, and Attack Simulation Training provides the ability to test where vulnerabilities lie in your organization and reduce your phish risk score by educating users with a vast library of trainings. Together, both Microsoft Defender for Office 365 and Attack Simulation Training can prevent a future data compromise saving your organization time and unexpected costs.<\/p>\n<p>Through Attack Simulation Training\u2019s intelligent automation, you can target your simulations by setting custom criteria and creating tailored payloads to fit your business. Additionally, you can leverage hundreds of premade email payloads in the template library that were modeled on real phishing attempts. After you run simulations, you\u2019ll get several training options of content by <a href=\"https:\/\/terranovasecurity.com\/\" target=\"_blank\" rel=\"noopener\">Terranova Security<\/a> that includes a variety of tailored courses, micro learnings, and nano learnings available in over 20 different languages. If you haven\u2019t already, <a href=\"http:\/\/security.microsoft.com\" target=\"_blank\" rel=\"noopener\">try Attack Simulation Training<\/a>&nbsp;and learn how to set up a new phish simulation in this <a href=\"http:\/\/aka.ms\/AttackSimBlogs\" target=\"_blank\" rel=\"noopener\">two-part blog series<\/a>.<\/p>\n<h2>Learn more<\/h2>\n<p>At Microsoft, we keep our customers top of mind when making product investment decisions. Since we announced Attack Simulation Training at Ignite in 2020, we have made significant investments to ensure our customers have the best email simulation and training platform for their businesses. Two key investment areas that the product team recently made were:<\/p>\n<ol>\n<li>The ability for customers to access all the data that they have through Graph API reads. Learn more in our <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/security-compliance-and-identity\/announcing-attack-simulation-training-read-apis-now-in-beta\/ba-p\/2821787\" target=\"_blank\" rel=\"noopener\">Tech Community blog post<\/a>.<\/li>\n<li>The ability for organizations to customize anything on the landing page and make it their own, including adding their own branding. Read our <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/security-compliance-and-identity\/the-attack-simulation-training-landing-page-is-now-customizable\/ba-p\/2777460\" target=\"_blank\" rel=\"noopener\">blog post here<\/a>.<\/li>\n<\/ol>\n<p>You can also read more about Attack Simulation Training\u2019s <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/security-compliance-and-identity\/attack-simulation-training-service-availability-in-new-regions\/ba-p\/2800220\" target=\"_blank\" rel=\"noopener\">new regional availability<\/a> and access all the latest product updates in the <a href=\"https:\/\/aka.ms\/AttackSimBlogs\" target=\"_blank\" rel=\"noopener\">Attack Simulation Training blog series<\/a>.<\/p>\n<p>Watch our <a href=\"https:\/\/aka.ms\/AttackSimVideo\" target=\"_blank\" rel=\"noopener\">overview video<\/a> of Attack Simulation Training to get a better feel of the user interface and some of its key reporting and insights capabilities.<\/p>\n<p>Try <a href=\"https:\/\/aka.ms\/AttackSim\" target=\"_blank\" rel=\"noopener\">Attack Simulation Training<\/a> straight from the Microsoft 365 Defender portal and learn <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/office-365-security\/attack-simulation-training-get-started?view=o365-worldwide\" target=\"_blank\" rel=\"noopener\">how to get started<\/a> today!<\/p>\n<p>To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noopener\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<hr>\n<p><sup>1<\/sup><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/03\/02\/hafnium-targeting-exchange-servers\/\" target=\"_blank\" rel=\"noopener\">HAFNIUM targeting Exchange Servers with 0-day exploits<\/a>, Microsoft Threat Intelligence Center (MSTIC), Microsoft 365 Defender Threat Intelligence Team, Microsoft 365 Security, Microsoft. 2 March 2021.<\/p>\n<p><sup>2<\/sup><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/\" target=\"_blank\" rel=\"noopener\">New sophisticated email-based attack from NOBELIUM<\/a>, Microsoft Threat Intelligence Center (MSTIC), Microsoft 365 Defender Threat Intelligence Team, Microsoft. 27 May 2021.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/11\/16\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-officer-365\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sophisticated cyberattacks are on the rise, with email phishing as the most common attack vector. Microsoft has been working hard to understand these types of attacks and create solutions that help prevent, detect, and remediate vulnerability at the most basic point of attack, the user.<br \/>\nThe post Protect against phishing with Attack Simulation Training in Microsoft Defender for Office 365 appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":43951,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[9070],"class_list":["post-43950","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-microsoft-defender-for-office-365"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protect against phishing with Attack Simulation Training in Microsoft Defender for Office 365 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protect against phishing with Attack Simulation Training in Microsoft Defender for Office 365 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-16T18:00:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Picture1.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Protect against phishing with Attack Simulation Training in Microsoft Defender for Office 365\",\"datePublished\":\"2021-11-16T18:00:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365\/\"},\"wordCount\":707,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365.jpg\",\"keywords\":[\"Microsoft Defender for Office 365\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365\/\",\"name\":\"Protect against phishing with Attack Simulation Training in Microsoft Defender for Office 365 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365.jpg\",\"datePublished\":\"2021-11-16T18:00:28+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365.jpg\",\"width\":1428,\"height\":953},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft Defender for Office 365\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/microsoft-defender-for-office-365\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Protect against phishing with Attack Simulation Training in Microsoft Defender for Office 365\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protect against phishing with Attack Simulation Training in Microsoft Defender for Office 365 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365\/","og_locale":"en_US","og_type":"article","og_title":"Protect against phishing with Attack Simulation Training in Microsoft Defender for Office 365 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-11-16T18:00:28+00:00","og_image":[{"url":"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Picture1.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Protect against phishing with Attack Simulation Training in Microsoft Defender for Office 365","datePublished":"2021-11-16T18:00:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365\/"},"wordCount":707,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365.jpg","keywords":["Microsoft Defender for Office 365"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365\/","url":"https:\/\/www.threatshub.org\/blog\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365\/","name":"Protect against phishing with Attack Simulation Training in Microsoft Defender for Office 365 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365.jpg","datePublished":"2021-11-16T18:00:28+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365.jpg","width":1428,"height":953},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/protect-against-phishing-with-attack-simulation-training-in-microsoft-defender-for-office-365\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft Defender for Office 365","item":"https:\/\/www.threatshub.org\/blog\/tag\/microsoft-defender-for-office-365\/"},{"@type":"ListItem","position":3,"name":"Protect against phishing with Attack Simulation Training in Microsoft Defender for Office 365"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43950","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=43950"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43950\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/43951"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=43950"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=43950"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=43950"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}