Attack Simulator: Phishing Login server URL detected by common browsers (Chrome, Internet Explorer, Edge) as "Deceptive" or "Unsafe"
When clicking on the link produced by the Spear Phishing attack simulator in https://protection.office.com/attacksimulator (Phishing Login server URL), common browsers like Chrome, Edge, or Internet Explorer detects the site as "Deceptive" or "Unsafe". This results to a failed simulation as no user will attempt to click on "visit this unsafe site". Even if the users click on the link, that of which is recorded, the test will always have a 0% Success Rate.
Is there anyway that Microsoft can coordinate with the common browsers to "whitelist" all their Phishing Login server URLs?
This issue is occuring in my organization as well which makes very diffilult to conduct campaigns.
We have encountered the same issue, this makes it impossible to work out which users need further training around identifying phishing emails.