Tour Microsoft 365 Defender’s Attack simulation training—launch phish simulations, build custom payloads, automate campaigns, and track behavior change with crisp, human-friendly guidance.
Attack simulation training in the Microsoft 365 Defender portal is a phish risk-reduction tool that helps you run realistic simulations, measure phishing awareness, deliver targeted training, and track behavior change over time. The video walks through the Attack simulation training dashboard (recent simulations, completion rates, compromised rate trends, repeat offenders by attack type), then demos how to launch a simulation using the Credential Harvest technique with the built-in “2 Failed Messages” payload—selecting target users, assigning training, customizing the training experience, and scheduling launch details. It also shows how to create custom payloads by copying an existing one, editing sender info, links, tags, language, and the email body, adding landing-page indicators, and setting up simulation automations (up to 10 payloads) plus payload automations that harvest real-world-style payloads from your mail flow.
We produced this as a streamlined product demo—from preproduction (nailing the goals, writing the script, and mapping every click) to production (clean screen captures, pro voiceover, and music that keeps the pace lively) to post (tight editing, clear callouts, and zero “demo tenant grime”). The result is a demo that’s easy to follow, suspiciously pleasant to watch, and optimized for retention—more key details, less onscreen flailing, and a story that makes your product feel confident, capable, and downright shiny.