The Enabling Technologies Blog

Our team of Cloud Strategy Advisors, Solution Architects, Engineers and former C-Suite Executives work diligently to provide our vistors with the most pressing information.

Dave Bergquist /

Spear Phishing Attack Simulator


What is Spear Phishing?

Spear phishing is similar to “traditional” phishing, with the primary difference being the attack is tailored to you or your organization using information the attacker has gathered previously. The attacker first gains access to the environment, and over a period of time gathers information about you or your organization, then formulates a spear phishing email campaign targeted at individuals or smaller groups within the organization. These legitimate-looking email campaigns are designed to appear as inconspicuous as possible, temping users to provide corporate credentials, account information, payments, etc.

How can we protect against spear phishing attacks?

  1. Training and knowledge can be a great first line of defense. Train the origination on what to look for in emails before clicking on links and providing private information. Common items to look for are:
    1. Spelling and grammar errors in emails
    2. Greetings that are broad or generic
    3. Emails that ask for personal information such as credentials, payment or account information, etc.
    4. Mismatched or external URLs
  2. Conduct “test” spear phishing campaigns within the organization to assess user behavior. Conducting test campaigns can provide insight into how well the organization handles these type of attacks as well as who may have dropped their guard (or not).

One way to accomplish “test” spear phishing campaigns is with the Office 365 Spear Phishing Attack Simulator. This article will cover several aspects of Office 365 Spear Phishing Attack Simulator. Attack Simulator is part of Office 365 Threat Intelligence, which is included with Office 365 E5 Licensing. Office 365 Threat Intelligence / Attack Simulators can provide additional awareness and information, allowing the organization to understand its potential phishing vulnerabilities and address them proactively.

Enabling Technologies can assist you in this arena with its various offerings, from technical implementation assistance for configuring and conducting campaigns to end-user communications or training for your organization. Contact Enabling Technologies for more information.


Using the Office 365 Spear Phishing Attack Simulator

In order to utilize Office 365 Spear Phishing Attack Simulator, ensure the following:

  • Office 365 Threat Intelligence is enabled for your organization.
  • Your organization’s email is hosted in Exchange Online (on-premises email servers are not supported with Attack Simulator).
  • The person administering Attack Simulator is an Office 365 Global Administrator.
  • Multi-factor authentication (MFA) is enabled for the administrator (more info here).

Spear Phishing Attack Simulator can be access via or “” > Threat Management-> Attack Simulator.


You can create an Attack by using a template or configure one-time use parameters.


Spear Phishing Attack Template

  1. Create a Spear Phishing attack template:
    1. Under Spear Phishing, Click on “Attack Details”: image003
    2. Scroll down to “Phishing Templates”, and click on “New Template”: image005
    3. Give the Template a “Name”: image007
    4. Configure Email Details” such as: From Name and Email Address, Phishing Login Server URL, and Email Subject: image008
    5. Compose Email the email and Confirm: image010image012


  1. Create a Spear Phishing Attack using Template:
    1. From the Attack Simulator main page, under Spear Phishing, click on “Attack Details”:  image003
    2. Select Launch Attack:image015
    3. Complete all required sections and start the campaign.


Spear Phishing One-time Attack

  1. You can create a “One-time” campaign filling in all required parameters, or you can utilize a template created previously. The example below will show you how to create a one-time campaign.
    1. Start: Name the campaign 
    2. Template: If desired, you can select a template from list of previously created templates. image017
    3. Target Recipients: Add email addresses/lists of employees to send phishing email to: NOTE: If you choose a large group, only the first 500 members will receive a phishing email. image019
    4. Provide email details: From Name and Email Address, Phishing Login Server URL, and Subject. image021
    5. Configure the email body. If using a template, the preconfigured email will be displayed. You can update if necessary using the email or source tabs. image023
    6. Or, create your own email… image025
    7. Confirm – Finish the attack. image027


View Results of Attack Simulator

  1. Once the attack is complete, you can view the results of the attack simulation from the Attack Simulator main page:
    1. Click on “View Report” under Spear Phishing: image029
    2. Or, under via “Attack Details” -> “Attack History”, you can specify a date range if you do not see your report listed. Click on the desired report to see attack sim details:. These reports can be exported by selecting “Export”. image031image033image035





Work with our team of Cloud Computing Consultants who have done this so many times they know all of the “minefields” to prevent missteps.