Harden Office 365 Security: Configuring Microsoft Office 365 Attack Simulator

Run Microsoft Office 365 Attack Simulator

Question

As a step to harden your Office 365 security you wish to run Microsoft Office 365 Attack simulator.

You configure Microsoft Defender Advanced Threat Protection and assign your users Microsoft 365 Enterprise E5 licenses.

What must be configured to run the attack simulator?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

Correct Answer: D

Enabling MFA is a prerequisite for running Microsoft Attack Simulator.

Session x

Control user access based on session controls
to enable limited experiences within specific
cloud applications

Learn more

Use app enforced restrictions

O itremtatratsthegeate!
apps: Cunenty, Officaa65 Exchange
Onlin, and SharePoint Onine are the only
re learet sgeape=
(ears Hee

@ Use conditional access App Control

Monitor only (Preview)

© Tris control works instantly for featured
qupentierliaestietteee htc)
eye ta ermal
ethane

Since the answer is given in the documentation, the other options are incorrect.

Reference:

To know more about Microsoft Office 365 Attack Simulator, please refer to the link below:

To run the Microsoft Office 365 Attack simulator as a step to harden your Office 365 security, there are a few requirements that need to be met:

  1. Microsoft Defender Advanced Threat Protection: You need to configure Microsoft Defender Advanced Threat Protection (ATP) in your Office 365 environment. This is a security solution that helps protect endpoints from advanced threats, such as malware and other malicious attacks.

  2. Microsoft 365 Enterprise E5 licenses: You need to assign your users Microsoft 365 Enterprise E5 licenses. These licenses include advanced security features such as Office 365 ATP, which is required to run the attack simulator.

Given these requirements, let's take a look at the answer options:

A. Create Conditional Access session control scoped at Office 365. This option is not directly related to running the Microsoft Office 365 Attack simulator. Conditional Access is a policy-based evaluation tool that allows you to define access requirements for your organization's resources based on various conditions, such as location, device type, and user risk. While it is a good security measure to have in place, it is not necessary for running the attack simulator.

B. Assign your users Defender plan 2-licenses. This option is partially correct, but not complete. While it is true that you need to assign Defender licenses to your users, specifically Microsoft Defender for Office 365 Plan 2, this is not the only requirement. You also need to have Microsoft Defender ATP configured.

C. Configure an identity protection user risk-policy. Similar to option A, this is not directly related to running the Microsoft Office 365 Attack simulator. Identity protection user risk policies are designed to help protect your organization's identities and credentials from compromise. Again, while this is a good security measure to have in place, it is not necessary for running the attack simulator.

D. Enable multi-factor authentication. Multi-factor authentication (MFA) is an additional layer of security that requires users to provide two or more forms of authentication to access their accounts. While MFA is a good security measure to have in place, it is not necessary for running the attack simulator.

In summary, the correct answer to the question is B. You need to assign your users Microsoft Defender for Office 365 Plan 2 licenses, in addition to configuring Microsoft Defender ATP, to run the Microsoft Office 365 Attack simulator.