Step-by-Step Guide to Implementing Microsoft Defender for Office 365 and Phishing Simulations

Nov 18, 2024
Benjamin Gbolaru
9 min read
Step-by-Step Guide to Implementing Microsoft Defender for Office 365 and Phishing Simulations

In today’s digital world, organizations face increasingly sophisticated email-based attacks, including phishing, malware, and ransomware. Email is one of the most targeted attack vectors, making it critical to have robust security solutions to protect sensitive information and maintain organizational integrity. At Medha Cloud, we assist organizations by leveraging Microsoft Defender for Office 365, a cloud-based security platform that mitigates these risks by providing advanced protection for email and collaboration tools.

In this report, I will demonstrate how we configured Microsoft Defender for Office 365 to protect an organization against email-based threats, phishing, malware, and other malicious attacks.

Project Overview

A medium-sized company with 500 employees, including remote workers has experienced an increase in phishing attempts and email-based threats, prompting the IT team to implement a robust security solution. The goal is to protect email accounts, raise employee awareness through phishing simulations, and implement a reporting mechanism for suspicious emails.

Project Objectives:

  1. Implement Microsoft Defender for Office 365 to protect against email threats such as phishing, malware, and malicious links.
  2. Run phishing simulations to assess employee awareness and provide training.
  3. Create a reporting mechanism so employees can report suspicious emails directly from Outlook.

Implementation Based on the Project Objectives

Microsoft Defender for Office 365 Deployment

We begin by configuring Microsoft Defender for Office 365 to shield the organization from email-based threats, and below are the step-by-step configurations.

Step 1: Configure Anti-Phishing Policies

The company had experienced impersonation attacks targeting high-level staff and users associated with the company domain name. The Medha Cloud Security and Compliance team implemented an anti-phishing policy to protect executives (e.g., CEO, CFO) and the company domain name from impersonation.

To accomplish this, we followed these steps:

  1. Logged in to the Microsoft Defender portal in the company's M365 tenant.
  2. Navigated to Email & Collaboration, selected Policy & Rules, clicked on Threat Policies, and then accessed Anti-phishing to create a targeted anti-phishing policy for executives and high-level employees.

The attached screenshot illustrates the configuration process.

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 1

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 2

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 3

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 4

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 5

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 6

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 7

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 8

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 9

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 10

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 11

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 12

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 13

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 14

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 15

The screenshots above demonstrate how the anti-phishing policy is configured to block emails that mimic and impersonate the company, its staff, and its domain name, thereby protecting all users in the tenant from potential attacks.

Step 2: Set Up Safe Attachments and Safe Links

Given that many phishing attempts at the company involve malicious attachments and URLs, setting up Safe Attachments and Safe Links is critical to securing email content.
Inside the Microsoft Defender portal, we navigated to Safe Attachments under Threat Policies.

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 16

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 17

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 18

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 19

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 20

Selecting the domain name for the Safe Attachments policy in Microsoft Defender, as shown in the screenshot above, means that the protection is applied to all email addresses within that domain.

Any email address using that domain will benefit from the Safe Attachments policy which provides an additional layer of security by scanning email attachments in a virtual environment to detect and block malicious content.

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 21

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 22

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 23

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 24

In Safe Links, the policy was configured to scan links within emails in real-time, provide protection against malicious URLs, and redirect or block users who click on dangerous links. The following screenshots show the configuration steps.

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 25

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 26

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 27


Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 28

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 29

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 30

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 31

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 32

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 33

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 34

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 35

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 36

Phishing Simulations to Raise Awareness

Phishing simulations were conducted to assess employee vulnerability and provide training to prevent actual attacks. However, to utilize reporting capabilities in Attack Simulation Training, auditing must be enabled.
To verify the status, a PowerShell command was run to check if auditing was enabled, which initially returned 'False'. Another command was executed to enable auditing. After waiting a few minutes, a final command was run to confirm the status, and the configuration change successfully showed as 'True,' indicating that auditing was enabled. The following two screenshots show how it was done.

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 37

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 38

Setting Up the Phishing Simulation

Running phishing simulations in Microsoft 365 using Attack Simulation Training helps you evaluate how aware and resilient your employees are against phishing attacks. Here’s a simple guide to set up and run these simulations effectively.

1. Access Attack Simulation Training

To start, go to the Microsoft 365 Defender portal. In the left navigation pane, select Attack Simulation Training under Email & Collaboration.
Note: If you're doing this for the first time, ensure you have the necessary permissions (Global Administrator or Security Administrator roles).

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 39

2. Plan the Simulation Campaign

The objective of this simulation is to evaluate employee awareness and understanding of safe email practices across the entire organization. Pre-configured simulation templates will be utilized to facilitate this assessment.

3. Configure the Phishing Simulation

To create a new simulation on the Attack Simulation Training page:

1. Click on Simulations, then select Launch a Simulation.

2. Select a simulation technique.

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 40

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 41



3. Set simulation details by choosing a name and description for the campaign.

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 42

4. Define a realistic scenario where every user in the organization receives an email with a link to change their password by selecting 'Change Password [DriveByUrl].

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 43

5. To select the payload and login page, pick from available templates provided in the portal by Microsoft.

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 44

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 45

6. Under Target Users, all users in the organization were included, and no users were excluded from the simulation.

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 46

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 47

7. Under Assign Training, Microsoft-recommended training courses were chosen, and a training due date was selected.

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 48

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 49

8. Under the Phish Landing Page, we selected a landing page from the Global Landing Page library that provides a learning moment to users after they get phished.

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 50

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 51

9. Under Select End-User Notification, we selected Microsoft-curated end-user notifications.

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 52

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 53

4. Schedule the Campaign

Under Launch Details, the desired launch time for the simulation was configured, choosing to launch it as soon as we were done with the configuration. Then, we set the simulation duration to 5 days.

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 54

We reviewed the simulation configurations, ensuring all settings were correct. Then, the Submit button was clicked, and the simulation was scheduled for launch.

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 55

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 56

5. Setting Up a Reporting Mechanism for Suspicious Emails

To enable employees to report phishing attacks, we set up a reporting mechanism directly in Outlook. Here are the steps taken:

Step 1: Deploy the Report Message Add-in
In the Microsoft 365 admin center, go to Settings > Integrated Apps. Then, search for the Report Message add-in and deploy it to all employees. This allows them to report phishing or suspicious emails directly from their inbox, as shown in the following screenshot.

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 57

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 58

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 59

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 60

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 61

Step 2: Educate Employees on Reporting
The Medha Cloud Security and Compliance team developed email tutorials and guides, including screenshots, that explain how to use the Report Message add-in in Outlook. Additionally, we launched a company-wide email campaign instructing employees to report suspicious emails rather than delete them.
The screenshot below illustrates how a user reported a suspicious email using the Report Message add-in.

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 62

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 63

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 64

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 65

After the user made the report, an email was sent to him by the Security and Compliance team congratulating him for spotting and reporting a phishing email as seen in the screenshot below.

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 66

5. Monitor the Campaign Progress
During the campaign, we tracked how many employees clicked the link, submitted credentials, or reported the email using campaign metrics in the Microsoft 365 Defender portal. We redirected those who clicked the link to training resources on phishing awareness.
The screenshot below illustrates a user who clicked the link in the suspicious email and was subsequently directed to phishing awareness training resources.

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 67

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 68

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 69

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 70

6. Analyze Results and Provide Feedback
After the simulation ends, we reviewed detailed results with the Security and Compliance team to understand:

  1. Click Rates: The number of employees who engaged with the phishing link.
  • 20.00% of users (50/500) clicked the phishing link.
    (See screenshot below)

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 71

2. Report Rates: The number of employees who reported the simulation as phishing.

  • 80.00% of users (450/500) reported the email.
    (See screenshot below with 450 items in Red Circle)

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 72

  • 450 Users Reported (See screenshot below{450 items in Red Circle})

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 73

7. Run Follow-Up Training
For employees who fell for the simulation, the Security and Compliance team assigned targeted training to reinforce awareness, providing modules and guidance from Microsoft to improve cybersecurity behavior.

Training Completion:
Employees who engaged with the phishing link.

Training Status:

  • Completed: 43 users
  • In Progress: 7 users
  • Incomplete: 0 users

Step By Step Guide To Implementing Microsoft Defender For Office 365 And Phishing Simulations 74

Final Outcome:

The project objectives were successfully achieved by the Medha Cloud Security and Compliance Team, as evidenced by the following key accomplishments:

  1. Implementation of Microsoft Defender for Office 365 to safeguard against email-borne threats, including phishing, malware, and malicious links.
  2. Conducted phishing simulations to evaluate employee awareness and provide targeted training.
  3. Established a reporting mechanism, enabling employees to report suspicious emails directly from Outlook.

Final Thought

In today’s rapidly evolving threat landscape, your organization’s security is more important than ever. At Medha Cloud, we have a team of certified and qualified professionals ready to assist you in tackling cybersecurity and attack challenges. Whether it's protecting against phishing, malware, ransomware, or other threats, we specialize in configuring and optimizing your cloud security with the latest Microsoft solutions, including Microsoft Defender for Office 365.

Just like we successfully implemented Defender for Office 365 for a mid-sized company with 500 users, our experts will work with you to assess your needs, implement tailored security policies, and provide ongoing support to ensure your organization stays protected from emerging threats. By leveraging advanced features such as anti-phishing policies, Safe Attachments, and Safe Links, we can help reduce the risks from harmful emails and ensure that malicious messages, impersonation attempts, and suspicious attachments are stopped before they reach your employees.

The work we’ve done for other organizations, including phishing simulations and employee training, has been key in raising awareness and fostering a proactive security culture. We will help you implement these strategies, equipping your employees with the knowledge and tools they need to recognize phishing attempts and report suspicious emails.

Don’t wait until it’s too late. Contact Medha Cloud today to secure your cloud environment and fortify your defense against cyberattacks. Let us help you build a proactive, resilient security posture that safeguards your sensitive data and organizational integrity. With our expert assistance, your organization will be better equipped to handle the changing landscape of cyber threats.

Contact Us Today

  • Email: sales@medhahosting.com
  • Phone: +1 646 775 2855 / +91 93536 44646
Tags
Microsoft Defender for Office 365Office 365

Need Expert Help?

Our team of cloud and IT experts is ready to help you solve your toughest challenges.