๐Ÿ›ก๏ธ Recipe ยท Security & Compliance

Review Consent Phishing Protection and Attack Simulation Policies in Microsoft 365

Audit user consent settings and phishing simulation campaigns across Entra ID and Microsoft Defender

Complexity

Intermediate

Impact

security + compliance + identity + phishing-defense + audit

Context

Why This Matters

Consent phishing (also called illicit consent grant attacks) is a rapidly growing threat where attackers trick users into granting OAuth permissions to malicious applications โ€” bypassing MFA entirely. Microsoft 365 provides two complementary defenses:

  • User consent settings in Entra ID, which restrict when and how end users can grant permissions to third-party apps.
  • Attack Simulation Training in Microsoft Defender for Office 365, which runs benign phishing campaigns against your users to measure and improve resilience.

This recipe walks you through auditing both configurations so you know exactly where they live, what state they are in, and whether your tenant is adequately protected.

Run this recipe during any of the following:

  • Quarterly security posture reviews
  • Incident response after a suspected consent phishing event
  • Onboarding a new tenant or Defender P2 license
  • Compliance audits (ISO 27001, SOC 2, NIST CSF)

Expected Outcomes

After completing this recipe you will have:

  • Documented the current authorizationPolicy and permission grant policy assignments for your tenant.
  • Confirmed whether the admin consent workflow is enabled.
  • A list of active, scheduled, and historical attack simulations (or confirmation that none exist).
  • A clear understanding of where each setting is managed in the Entra admin center and the Microsoft Defender portal.
  • Actionable recommendations for tightening consent controls and scheduling baseline phishing simulations.

Risks & Considerations

Things to watch out for

  • Do not tighten consent settings without communication. Moving from Allow user consent for verified publishers to Do not allow user consent can break legitimate apps that users have self-service onboarded (e.g., Zoom, Slack, Grammarly). Always enable the admin consent workflow first so users have a path to request access.
  • Attack Simulation Training requires Microsoft Defender for Office 365 Plan 2 (included in M365 E5). If the Defender portal does not show the feature, verify licensing before assuming nothing is configured.
  • Running a simulation without coordinating with HR and the help desk can trigger a flood of phishing reports and user anxiety. Always communicate the program (not the timing) in advance.
  • The AttackSim.Read.All permission is required to enumerate simulations via Graph. A 204 response may mean either "no simulations exist" or insufficient permissions โ€” verify both.
  • Changes to the authorization policy apply tenant-wide and take effect within minutes. Test in a pilot group where possible using custom permission grant policies.

Required Permissions

PermissionWhy It's Needed
Policy.Read.AllRead the tenant authorizationPolicy and permission grant policy assignments.
Policy.ReadWrite.AuthorizationRequired if you plan to modify user consent settings after the review.
AttackSimulation.Read.AllEnumerate attack simulation campaigns and their status via the Security API.
Directory.Read.AllResolve tenant-level identity context when inspecting consent policies.

The fastest way to get this done โ€” just ask Dex. Copy the prompt below and paste it into your Dex conversation.

For IT Admins

Paste into Dex CoAdmin

Audit our Microsoft 365 tenant for consent phishing protection and attack simulation coverage. Report the current user consent setting in Entra ID, which permission grant policies are assigned, whether the admin consent workflow is enabled, and list any active or scheduled Attack Simulation Training campaigns. Flag any gaps and recommend remediation.
Try in Dex CoAdmin