Skip to content
English
  • There are no suggestions because the search field is empty.

Dune Security Implementation Starter Kit

Your comprehensive guide to seamlessly implementing Dune Security’s AI-powered Security Awareness Training platform. Follow these essential steps to launch and optimize your organization's cybersecurity defenses.

1. User Management

Get started by configuring Dune Security to work within your existing environment. This step ensures seamless integration with your identity provider and email systems.

Key Actions

  • Request to join the Dune Security Support channel on Slack or Teams for real-time assistance .

  • Set up Single Sign-On (SSO) with your organization’s identity provider, such as Microsoft Entra ID or Okta .

  • Enable SCIM integration to automate user provisioning, updates, and deprovisioning .

Resources

2. Email Deliverability

Prepare your environment and employees for receiving automated phishing simulations.

Key Actions

  • Configure Direct Mail Injection (DMI) for emails to be delivered via API to all users across the organization.
  • Conduct sample tests by sending emails to administrators to ensure they land in preferred inboxes.

Resources

3. Phish Report Button

Enable employees to report suspicious emails with ease.

Key Actions

  • Deploy Dune Watchtower Phish Report Button across Microsoft Outlook and Google Workspace .

  • Train employees on how and when to use the button effectively.

  • Monitor phishing reports and take action on identified threats.

Resources

4. Training Preferences & Customizations

Deliver impactful, user-specific training to empower your workforce with the knowledge to counter cyber threats.

Key Actions

  • Assign training modules to users based on the vector and motive of phishing failures.

  • Enable just-in-time training for high-risk behaviors detected during simulations.

  • Customize training content to align with your organization’s unique needs and compliance requirements.

Resources

5. Security Stack Integration

Seamlessly integrate Dune Security with your existing security tools for enhanced protection.

Key Actions

  • Securely provide security solution API keys (IAM, EDR, DLP, etc.) for real-time risk insights and user risk monitoring.

  • Provide organization security policies to align with event detection data and risk score updates.

Resources