Dune Security Implementation Starter Kit
Your comprehensive guide to seamlessly implementing Dune Security’s AI-powered Security Awareness Training platform. Follow these essential steps to launch and optimize your organization's cybersecurity defenses.
1. User Management
Get started by configuring Dune Security to work within your existing environment. This step ensures seamless integration with your identity provider and email systems.
Key Actions
-
Request to join the Dune Security Support channel on Slack or Teams for real-time assistance .
-
Set up Single Sign-On (SSO) with your organization’s identity provider, such as Microsoft Entra ID or Okta .
-
Enable SCIM integration to automate user provisioning, updates, and deprovisioning .
Resources
2. Email Deliverability
Prepare your environment and employees for receiving automated phishing simulations.
Key Actions
- Configure Direct Mail Injection (DMI) for emails to be delivered via API to all users across the organization.
-
Conduct sample tests by sending emails to administrators to ensure they land in preferred inboxes.
Resources
3. Phish Report Button
Enable employees to report suspicious emails with ease.
Key Actions
-
Deploy Dune Watchtower Phish Report Button across Microsoft Outlook and Google Workspace .
-
Train employees on how and when to use the button effectively.
-
Monitor phishing reports and take action on identified threats.
Resources
4. Training Preferences & Customizations
Deliver impactful, user-specific training to empower your workforce with the knowledge to counter cyber threats.
Key Actions
-
Assign training modules to users based on the vector and motive of phishing failures.
-
Enable just-in-time training for high-risk behaviors detected during simulations.
-
Customize training content to align with your organization’s unique needs and compliance requirements.
Resources
5. Security Stack Integration
Seamlessly integrate Dune Security with your existing security tools for enhanced protection.
Key Actions
-
Securely provide security solution API keys (IAM, EDR, DLP, etc.) for real-time risk insights and user risk monitoring.
- Provide organization security policies to align with event detection data and risk score updates.