Configuration of additional tools

Microsoft Defender: Configuration of Safe Links
This document describes how to add the phishing domains used by the SoSafe Phishing Simulation to a policy for the Microsoft Defender for Microsoft 365 that...
Tue, 3 May, 2022 at 5:01 PM
Exchange Online Protection
The configuration of Exchange Online Protection depends on the whitelisting measures set up on the Exchange Server. If you implement our whitelisting recomm...
Fri, 24 Jul, 2020 at 2:18 PM
M365 Defender: Configuration of the Spoof Intelligence
When simulated phishing mails using spoofing come with the following warnings:    This sender example@exampleinc.com is from outside your organization....
Tue, 15 Feb, 2022 at 11:58 AM
SPF Record: Setting up SPF to prevent spoofing
The Sender Policy Framework (SPF) is a validation method for detecting e-mail spoofing. Email spoofing is the creation of email messages with a spoofed send...
Tue, 15 Feb, 2022 at 1:08 PM
Whitelisting in Proofpoint
To perform whitelisting in Proofpoint, please follow the official Safelisting Addresses guide. For the necessary whitelisting information, please refer to ...
Thu, 14 Apr, 2022 at 8:08 AM
Proofpoint TAP (Targeted Attack Protection)
The Proofpoint TAP (Targeted Attack Protection) module is capable of intercepting, blocking or executing mail as SPAM or Phishing-Mail in a test environment...
Mon, 14 Mar, 2022 at 5:56 PM
M365 Defender: Deactivate "Phish delivered due to an ETR override" Alert
If the alert "Phish delivered due to an ETR override" is triggered due to our phishing simulation, you will not be able to change the alert manual...
Thu, 6 Jan, 2022 at 11:58 AM