Jump to:
Microsoft 365 (formerly Office 365) / Azure Active Integration
Introduction
This integration enables recipients to sync straight from Microsoft 365 (formerly Office 365) into the Phishing Tackle platform. Once configured, recipients will automatically synchronise every 15 minutes (by default) as they are added and removed from Microsoft 365 (formerly Office 365), keeping information up to date.
Please note, only one Active Integration should be added to an account. If you require multiple Active Integrations, please contact your Customer Success Manager or support@phishingtackle.com about enabling the Partner Portal.
Configure Application
-
Log in to the Microsoft Azure portal.
- Click "Azure Active Directory"
- Then "App registrations"
- And "New registration"
- Name: Enter an application name (this will be displayed to users of the app)
-
Supported account types: Select "Accounts in any organizational directory and personal Microsoft accounts", then hit "Register"
- Note: Nothing is required in the "Redirect URI"
Get Application ID and Tenant ID
- From the App Registrations page, within Azure Active Directory, click "All Applications" then select your newly configured application.
- Copy the "Application (client) ID" & "Directory (Tenant) ID"
Then, from the Phishing Tackle Platform:
- Go to "Organisation" > "Settings" > "Active Integrations" and hit "ADD INTEGRATION"
- Paste the Application ID and Tenant ID into the corresponding boxes (Note: You will need to enter more data in the next section, so leave this window open for now)
- Go to "Organisation" > "Settings" > "Active Integrations" and hit "ADD INTEGRATION"
Generate Secret Key
- Go back to your newly configured application within the Azure Active Directory and click "Certificates & secrets"
- Click "New client secret"
- Add a suitable Description.
- Select 24 Months then hit Add
- NOTES: This is the longest-dated expiration Microsoft will allow, make a note of the date so you can create a new one in 2 years!
- If you are not happy to set it to 24 months, please ensure to set it for the length of your contract with Phishing Tackle, otherwise the synchronisation/delivery will stop working during your service.
- Under the Value heading, copy the newly created secret key (Note, if you navigate away from this page it will hide the key forever, so make sure to copy it now to avoid having to repeat the process)
- Then paste the secret key into the Add New Integration window still open from the previous step (NOTE; if you saved the new integration before entering the key, just click the dropdown box next to it and click "Edit", then add the secret key)
-
PRO TIP:
If you have any shared mailboxes in Microsoft 365 (formerly Office 365) they will be imported as recipients.
To avoid importing shared mailboxes, check the "Include only Licensed Mailboxes" box.
As shared mailboxes do not require an Office 365 license, this is an effective method to filter out any non-user mailboxes.
- Hit SAVE
Add Permissions
- Go back to your newly configured application within the Azure Active Directory and click "API permissions", (NOTE: You will notice there is already a "User.Read" permission created under Microsoft Graph, ignore this and do not delete it)
- Click "Add a permission"
- Hit "Microsoft Graph"
- Select "Application permissions"
- Expand "Directory" and click the checkbox next to "Directory.Read.All"
Then do the same for the following permissions:
Group > "Group.Read.All"
User > "User.Read.All"
To enable Microsoft Azure Active Delivery, add the following permission:
Mail > ReadWrite
Then press "Add permissions"
- Check all permissions match as per the image below
- Then hit "Grant admin consent for [your organisation]"
- NOTE: The image shows "Phishing Tackle" but this will be the name of Your Organisation.
With the above steps completed, the recipients will synchronise between Microsoft 365 (formerly Office 365) and the Phishing Tackle platform.
For tips and best practices when using Active integration, see here
What is Microsoft Azure Active Delivery?
The Microsoft Azure Active Delivery method allows you to bypass all external mail routing and inject emails directly to the mailboxes of your recipients. This negates the need for any additional allowlisting.
To enable the use of this delivery method, simply add the Application Permission: Mail > "ReadWrite" to the API permissions in Step 5 of the guide above.
Once the above steps are in place, you will be able to deliver mail by selecting Microsoft Azure Active Delivery during STEP 2 - RECIPIENT INFORMATION of the phishing campaign creation wizard.
PRO TIP:
You can set the default sending method to always use Azure Active Delivery within the Organisation Settings (Organisation > Settings > Email Campaigns)
NOTE:
Azure Active Delivery will never read emails, delete emails or alter your users' mailbox settings in any way.
Please note, once your Active Integration is configured, you can click the drop-down arrow to start a manual synchronisation. However, it's important to understand that starting a manual synchronisation should only be used if a problem has been identified with your existing synchronisation.
This is because a manual synchronisation will remove and re-add all recipients in your campaigns or training courses, which can be disruptive to ongoing phishing campaigns or training courses.
Should you require any further assistance, please contact our support team by clicking here.