This new tool allows a true to life attack to your Office 365 environment, exposing user vulnerabilities.
Techniques covered include brute force attacks and phishing.
The results from this simulation should result in a stronger user protection policies, and in user information and education.