An error occurred while saving the commentHolly Min commented
This seems to be a bug but the partner ID can be removed by going to https://portal.office.com/commerce/manage.aspx?empty=1.
The core cred harvesting URLs in attack simulator are allow-listed in SmartScreen (the technology used in Explorer and Edge), so they shouldn’t be blocked with those browsers. Chrome is usually the biggest problem, and Microsoft has been unsuccessful in convincing Google that they should include our phish training URLs in their default allow-lists. Instructions on how to deploy a client policy that allow-lists the cred harvesting URLs for Chrome can be found here:
At the moment, the following URLs are included in the M365 Attack Simulator: