Here are the detailed instructions to use when dealing with a client whose email server uses Microsoft technology.
To ensure that phishing and ransomware simulations reach users' inboxes, we need to use Direct Message Injection (DMI).
But since we may encounter false positives caused by the ATP (Advanced Threat Protection) tool when it scans the links or attachments in the simulation scenarios, a whitelist should be implemented in this tool.
In case the simulations do not display the images, which prevents the open rate from being recorded, this is because the emails sent from the SMARTFENSE platform to the users contain a transparent tracking pixel with a unique reference to the recipient. This type of pixel is a de facto standard for tracking email opens. The pixel is fetched by the recipient's email client when the message is displayed on the screen, allowing the platform to conclude that the email has been opened. To resolve this, you can follow the instructions below.