The Integrations section connects the platform with your organization's email infrastructure, messaging platforms, and external services. Access it from the left sidebar.
This section has four tabs:

The Integrations tab shows all available connectors as cards. Each card displays:
| Integration | Description | Status |
|---|---|---|
| DMI (Direct Message Injection), user sync, and application management via Google Workspace APIs | Available | |
| Microsoft | DMI, user sync, and application management via Microsoft 365 APIs | Available |
| Basic SMTP | Standard SMTP relay for sending phishing emails through any mail server | Available |
| Red Team SMTP | Advanced SMTP integration for red team engagements with enhanced delivery features | Available |
| Integration | Description | Status |
|---|---|---|
| Moodle | Learning management system integration for security awareness training modules | Available |
| Integration | Description | Status |
|---|---|---|
| Send SMS | SMS-based phishing simulations | Unavailable |
| Send Voice Call | Voice phishing (vishing) simulations | Unavailable |
| Send WhatsApp | WhatsApp-based phishing simulations | Unavailable |
Note: SMS, Voice Call, and WhatsApp integrations are planned features and not yet available.
The Google integration enables:
Setup requires:
Tip: DMI is the most reliable delivery method — emails appear directly in the inbox without passing through spam filters.
The Microsoft integration enables:
Setup requires:
Microsoft Whitelisting:
To ensure phishing simulation emails bypass Microsoft Defender, configure the Advanced Delivery policy:
185.163.125.9, 45.13.104.11, 145.239.146.162Important: The Advanced Delivery policy alone is often not sufficient — see the troubleshooting sections below for additional required steps.
Even with the Advanced Delivery phishing simulation policy configured, Microsoft Defender ATP may still inspect simulation emails and generate false-positive tracking events — for example, spurious "Message Opened" records caused by Safe Links rewriting or Safe Attachments scanning. To fully bypass ATP inspection, you must create four Exchange transport rules in the Exchange Admin Center.
Go to: admin.cloud.microsoft → Exchange → Mail flow → Rules
Create the following four rules. Each rule uses the same condition: "The sender IP address is in any of these ranges" — 185.163.125.9, 45.13.104.11, 145.239.146.162 (platform sending IPs).
| # | Rule name | Action |
|---|---|---|
| 1 | Set spam confidence level to -1 | Set the spam confidence level (SCL) to −1 (bypasses spam filtering entirely) |
| 2 | Bypass Focused Inbox | Set message header X-MS-Exchange-Organization-BypassFocusedInbox to true |
| 3 | Skip Safe Links Processing | Set message header X-MS-Exchange-Organization-SkipSafeLinksProcessing to true |
| 4 | Skip Safe Attachments Processing | Set message header X-MS-Exchange-Organization-SkipSafeAttachmentProcessing to true |
Step-by-step: Create Rule 1 (Set spam confidence level to -1)
The wizard has three pages: Set rule conditions → Set rule settings → Review and finish.
Set spam confidence level to -1185.163.125.9, click Add, then add 45.13.104.11, click Add, then add 145.239.146.162, click Add, then click Save01/01/2027Step-by-step: Create Rules 2, 3, and 4 (via Duplicate)
Rules 2–4 share the same IP condition as Rule 1. Use the Duplicate action to avoid re-entering it each time.
For Rule 2 (Bypass Focused Inbox):
Bypass Focused InboxX-MS-Exchange-Organization-BypassFocusedInbox, value: trueFor Rule 3 (Skip Safe Links Processing):
Skip Safe Links ProcessingX-MS-Exchange-Organization-SkipSafeLinksProcessing, value: trueFor Rule 4 (Skip Safe Attachments Processing):
Skip Safe Attachments ProcessingX-MS-Exchange-Organization-SkipSafeAttachmentProcessing, value: trueOnce all four rules are enabled, ATP will no longer inspect or modify simulation emails originating from the platform's sending IPs.
Note: Configuring Advanced Delivery alone is not sufficient. Without these transport rules, ATP will continue to rewrite Safe Links and scan attachments, producing false "Message Opened" events in campaign results.
Even when delivered via DMI (which bypasses server-side spam filters), Outlook desktop and web clients apply their own client-side junk email rules. This can cause simulation emails to be silently moved to the Junk folder despite successful delivery. Two solutions are available:
Solution A — Bulk PowerShell (recommended for administrators)
Add the sender domain to all user mailboxes' trusted senders list via Exchange Online PowerShell. This updates the per-mailbox Outlook junk email configuration for every user in the organization.
$domains = @("your-dkim-domain.com") # Use the DKIM domain shown in Basic SMTP → Config
$mailboxes = Get-Mailbox -RecipientTypeDetails UserMailbox -ResultSize Unlimited
foreach ($mb in $mailboxes) {
try {
Set-MailboxJunkEmailConfiguration $mb.Identity -TrustedSendersAndDomains @{Add=$domains}
Write-Host "OK:" $mb.PrimarySmtpAddress
} catch {
Write-Host "ERROR:" $mb.PrimarySmtpAddress
}
}
Run this in an Exchange Online PowerShell session authenticated with an account that has Exchange Admin permissions. The script iterates all user mailboxes and logs OK or ERROR for each one.
Solution B — CID image embedding (no admin rights required)
If you cannot modify mailbox junk settings organization-wide, use Content-ID (CID) attached images in your scenario templates instead of externally hosted images. Outlook's junk heuristics often flag emails that reference remote image URLs; embedding images as CID attachments avoids this trigger.
In your scenario HTML template, replace external image tags with CID references:
<!-- Instead of: <img src="https://example.com/banner.png"> -->
<img src="cid:banner.png" alt="banner">
The image is then attached to the email as a MIME part with a matching Content-ID header (banner.png). The platform supports CID image references natively in scenario templates.
Note: Microsoft Graph API-based programmatic trust configuration for this use case is currently under investigation and is not yet available as a supported solution.
Basic SMTP allows you to send phishing emails through any standard SMTP relay.
Configuration fields:
Note: SMTP delivery is subject to your mail server's spam filters and rate limits. For best results, use a dedicated sending server with proper SPF/DKIM/DMARC records.
Red Team SMTP is an enhanced SMTP integration designed for advanced red team engagements. It provides additional control over email headers, delivery timing, and evasion techniques.
Moodle integration connects the platform to a Moodle learning management system for security awareness training.
When enabled, the Formation tab in the sidebar becomes active, providing:
Note: Without Moodle integration, the Formation page displays: "To access this tab, please enable the Moodle integration." with a link to the Integrations page.
Webhooks send real-time HTTP notifications to your systems when campaign events occur. Click the Webhooks tab to manage them.
Click + New Webhook and configure:
| Field | Required | Description |
|---|---|---|
| Name | Yes | A descriptive name (e.g., "SIEM Integration") |
| URL | Yes | The endpoint URL that will receive POST requests |
| Events | Yes | Select which events trigger the webhook |
Webhooks can fire on events such as:
Webhook payloads are sent as signed JSON via HTTP POST. Each request includes a signature header for verification.
Example payload:
{
"event": "email_clicked",
"campaign_id": 42,
"campaign_name": "Q1 Security Assessment",
"target_email": "john.doe@company.com",
"timestamp": "2026-03-15T14:32:00Z",
"ip_address": "192.168.1.100",
"user_agent": "Mozilla/5.0 ..."
}
Tip: Use webhooks to feed phishing campaign data into your SIEM, Slack, or custom dashboards in real time.

The Domains tab manages the phishing domains used in your campaign URLs. These are the domains that appear in the links your targets click.
The domains table shows:
| Column | Description |
|---|---|
| Name | Domain name (e.g., monespacesecurise.fr) |
| Price | Domain cost (if purchased through the platform) |
| Status | DNS verification status (Active, Pending, etc.) |
| Scope | Usage scope of the domain |
| Use case | Intended purpose |
| Auto-renew | Whether the domain renews automatically |
For reliable email delivery, each phishing domain should have:
| Record | Purpose |
|---|---|
| SPF | Authorizes the platform's servers to send email from your domain |
| DKIM | Cryptographically signs emails for authenticity |
| DMARC | Defines handling policy for failed SPF/DKIM checks |
| MX | Mail exchange records (if using IMAP reporting) |
Important: Properly configured DNS is critical for email delivery. Without SPF/DKIM, most email providers will reject or quarantine your phishing simulations.

The Reporting Settings tab configures IMAP monitoring for a dedicated mailbox where employees can report suspected phishing emails.
| Field | Description |
|---|---|
| Enable Email Account Monitoring | Master toggle to enable/disable IMAP monitoring |
| IMAP Host | Mail server hostname (e.g., imap.example.com) |
| IMAP Port | Server port (default: 993 for SSL) |
| IMAP Username | Mailbox username |
| IMAP Password | Mailbox password |
| Use TLS | Toggle TLS/SSL encryption |
Tip: Encourage employees to report suspicious emails. A high report rate is one of the strongest indicators of a security-aware workforce.