Bringing Automation in Attack Simulation Training and Security Preset together
While utilizing Preset Security Policies in Microsoft Defender for Office 365, that focuses on a "set-and-forget" security posture, organizations can leverage automation in Attack Simulation Training (AST) to further strengthen the security directly through the end users (aka human firewall) by carrying out recurring, randomized testing. In other words, Preset Security Policies help in handling technical blocks (Safe Links, Safe Attachments) while Simulation Automations target the human element.
I tested the Automation feature back in December 2025, but never got to blogging about it, and so decided to put a quick read together.
Automation in Attack Simulation Training is a closed-loop system which allows organizations to -
- Send simulated phishing emails
- Observe user behavior
- Automatically train users who fail
- Repeat at a defined frequency
- Track improvement over time
There are obviously some licensing & prerequisites, but nothing out of the ordinary if you are already setup for MDO and EXO -
- Defender for Office 365 Plan 2 (or M365 E5)
- Security Admin or Global Admin role
- Attack Simulation Training enabled
- Users have Exchange Online (EXO) mailboxes
Enabling Automation in Attack Simulation Training
1. Open https://security.microsoft.com and navigate to Email & collaboration → Attack simulation training.
2. Go to Automation and click on Create automation.
3. Configure Automation Basics by giving a name and description and then hit Next.
4. Select all the techniques you want to include in the automation policy. For all intend and purposes, I am just selecting Malware Attachment.
5. Select payloads to include in the automation. You can randomize it or select up to 20 available payloads manually. For testing in my own tenant, I just went with the Randomize option.
6. Choose how users are selected. I am testing on my own tenant so I am selecting all users, but it is highly recommended to test and validate against a cohort group. You can exclude Break-glass accounts,
Service mailboxes, Executives (optional, but not recommended long-term)
7. Assign Training as relevant to your organization. You can chose from Microsoft' catalog or let Microsoft decide for you in the automation.
8. Select the landing page. You can use the default landing page templates available or create your own.
9. Select how you want the end user notifications to be handled. I chose to use Microsoft's default end user notification and set my own simulation frequency interval.
10. Set the simulation schedule. I chose to use fixed schedule. Note - I already tested this a month back, but for all demonstration purposes, I have populated more recent dates.
12. Review the settings and confirm the policy.
What Happens After Automation is Enabled?
Defender sends phishing simulation and user clicks on the email and interacts with the attachment.
Training email sent automatically. Example -
User can also initiate the training from the attachment (if applicable).
User's actions are monitored on Defender as well.
That's it for now. Until next time..




















Comments
Post a Comment