Engage - Direct Message Injection - FAQ

This article contains information on Direct Message Injection (DMI) in Engage, a feature that securely delivers phishing simulation emails directly to users' inboxes, bypassing email filters, ensuring realistic training, and maintaining tenant security.

 

Q What is Direct Message Injection (DMI) in Engage?
A Direct Message Injection (DMI) in Engage is a feature that allows administrators to deliver simulated phishing emails directly into users' mailboxes. This bypasses traditional email routing, ensuring phishing simulations are not affected by spam filters or security getaways.
Q How does DMI benefit phishing simulations in multi-tenant environments?​
A
  • Bypasses Security Filters: Ensures simulation emails are delivered as intended, without being blocked or quarantined.​
  • Consistent User Experience: Users receive simulation emails just like real threats, improving training effectiveness.​
Q Is DMI secure when used for phishing simulations across multiple tenants?​
A Yes. Engage enforces strict separation between tenants, so only authorized administrators can inject messages for their own users. Proper authentication and consent are required as part of the initial DMI integration configuration within the integration hub.
Q Will users know the email is a simulation if DMI is used?​
A No. DMI delivers simulations directly to inboxes, so they look indistinguishable from real phishing attempts. This realistic delivery is crucial for effective training.​
Q Is DMI activity for phishing simulations auditable?​
A

Yes. Engage provides audit log entries when:

  • DMI integration is added, updated, or deleted.
  • When a phishing campaign is created.

Engage will also show if the simulation was successfully delivered to a user or if an error occurred on the phishing campaign table.

Q What happens if a user reports a DMI-injected phishing simulation as a real threat?​
A The end user will have the same experience they do currently when reporting a phishing simulation within a Microsoft365 environment.
Q Are there any risks or recommendations for DMI phishing simulations in multi-tenant accounts?​
A
  • Limit simulation access to trusted admins.
  • Notify users that simulations will occur (without revealing timing/details)​.
  • Review and update tenant mappings regularly​.
  • Monitor audits logs for unusual activity​.

 

See Also...

Was this article helpful?
0 out of 0 found this helpful

Comments

0 comments

Please sign in to leave a comment.