 Hi, this is Sean from Protect-to-Trust again, and I wanted to make a quick video about a new feature that's been added to attack simulation training in the Microsoft 365 Defender Portal. In a previous video, we talked about the attack simulation training, which ends the 365 Defender Portal at security.microsoft.com. If you went under the email and collaboration heading, then under attack simulation training, you would be provided with the ability to create phishing campaigns against your users that will basically send an email to the user, and it tries to convince them to do something like hand over their 365 credentials, and if you capture those credentials, or depending on what the user does, it will automatically assign that user a training, a very handy feature. There's been a new feature added to attack simulation training that allows you to create ad hoc trainings, so instead of performing a phishing campaign against your users in order for them to receive a training, you can instead just assign them the training, very big handy feature. And again, that's in attack simulation training under the new training tab that appears right here. So under training, if we went in here and said create new, we can give it a campaign. I'm going to just say, you know, an example, campaign USB stick, that's a hint about what we're going to make the campaign about, or named this phishing campaign, or this training campaign, I suppose it is. In this case, I'm going to only assign it to a single user, but you know, we could, for example, include all of the users in the organization, in this case, I'm just going to add one user. But bear in mind, you could use the filtering here to, you know, say, you know, everyone in a particular city or that are in a particular department, or have a particular title. You could just assign things automatically to certain types of users in your organization. In this case, I'm just going to assign it to a single user, we're going to say that Adele needs to receive this training, we're going to add that one user. And say next, we have the ability to exclude users. So if you wanted to include everyone in your organization, for example, but you wanted to leave out all of your IT people, then you could, you know, include everyone in the organization, but exclude, you know, a certain distribution list of the certain group of users. Once we select next, then we get to the really neat part, the training modules. So we're going to use the default training catalog, which has all of the Microsoft produced training features that are here, I'm going to select add trainings. And when we do that, you'll notice that we have a number of trainings that were available in the phishing campaign portion of attack simulation training. So for example, if you have a user that for some reason maybe ignored the multiple requests to perform training in a previous phishing campaign, you could reassign them training using this feature, for example. This will have all of those same training features in it. But it also has a lot of other training in here for things like cloud computing and data leakage, physical security. And the one that I wanted to look at here was risky USB. So like if I want to make sure that my users aren't just picking up random USB drives that they find in the parking lot and plug it into their computer to see what's on it, you know, that's a terrible idea. We definitely don't want to do that. And this this training would explain to them that it's a bad idea and why. If you select this, it's also going to give you this little flyout that kind of gives you some information about it. But it also gives you the ability to preview the training. So if you wanted to take a look at a training yourself before assigning it to a user, this would be a way to do that. And when you click on preview, it basically takes you to the same kind of training that they would receive. So it gets a little bit of information about it. You hit start and then it starts with the videos that, you know, it explains why picking up a USB drive in the hallway and plugging it in is a terrible idea. So. So that's the the training that we're going to assign to this user. I'm going to say add. So now that training will get assigned. I'm going to slay next and you'll notice end user notifications. This is going to be very similar to what you would to one of the options that you would get when assigning a phishing campaign against the users. In this case, they're going to receive it immediately. So this isn't going to be applicable, but we want to send them reminders. And I'm going to send them twice a week just to be persistent. So now that user is going to receive reminders twice a week that they need to that they need to do this training. Once I select next here, it's going to take me to the schedule campaign end date. I'm going to give this user a week to do this training. And I'll just say it'll be one o'clock p.m. Say next. This will be a review of what we're creating, and then we'll submit it. Once we submit that, because we sent it to happen immediately, almost immediately, definitely within the next 15 minutes or so, that user should receive an email that asks them to perform this training. And as an admin, we could just go look at that real quick. I can see if it's there. And so by login as myself, I should just now be able to, because I'm a global administrator, I can go in and sign in as another mailbox. Oops. Oh, another mailbox. So we're going to go just look in that mailbox and oh, oh, well. So when we could view it, apparently it doesn't want to allow us to do that today. In any case, so that user should have received an email almost immediately that asks them to perform the training when they go in there. It's going to give them the training. And that's pretty much it. It's a very, very handy feature, especially if you want to just perform security trainings of many different types for your users. I don't recall if I just mentioned this. There's also some very useful trainings that you might want to include just for your IT staff. So I don't recall if this organization has IT. Yeah. So we'll say we're going to apply it to the IT admin folks. So that's going to be Alan. So we're not going to exclude anybody. And again, in the training modules, if we scroll down to the very bottom, this is where that feature is located. Once those trainings come up, down here at the very bottom of that list, there are some features for IT administrators. So an introduction, core credentials of cybersecurity, security program management, data protection, sample attacks, et cetera. So all kinds of very useful trainings for you to perform against your own IT staff. Very, very handy feature. So that's pretty much it. So if we, I'm going to go ahead and just finish that up real quick. So we'll say again, twice a week, I'm not going to send this one with an end date. We're going to submit it. So then again, that user almost immediately should receive an email saying, take this training. This is an extremely helpful feature if you wanted to, you know, just perform some security trainings for your end users. Or if you wanted to send somebody a retraining, if they, you know, happen to ignore the requests from a phishing campaign. And that's it. So have a good day.