Skip to main content

Message Injection in Microsoft 365 - FAQs

Learn how Message Injection works in Microsoft 365, what permissions it requires, and the security considerations around using it.

Written by Bruno Pinto

What is Message Injection?

Message Injection is an API-based delivery method that places phishing simulation emails directly into user mailboxes using authorised Microsoft services, rather than routing them through external email infrastructure.

This approach is designed to:

  • Accurately measure user susceptibility to social engineering

  • Simulate internal, post-compromise attack scenarios

  • Generate cleaner, more reliable behavioural metrics

Importantly, message injection is intended to complement, rather than replace, traditional

email security controls, providing an additional layer of insight into human-layer risk.


How does Message Injection work?

Message Injection operates through an administrator-approved enterprise application registered in Microsoft Entra ID.

The integration uses Microsoft Graph Application Permissions, which operate at the tenant level and therefore require Global Administrator consent. The application is granted a specific set of Microsoft Graph permissions that allow it to programmatically place simulation emails directly into Microsoft 365 mailboxes.

All access:

  • Requires administrator consent

  • Is governed by Microsoft identity and access controls

  • Is fully logged and auditable

  • Can be revoked at any time

In simple terms, Message Injection uses secure, approved API access to place a simulated phishing email into a mailbox without relying on traditional external email delivery routes.


What Graph API permissions does it require?

The usecure Message Injection integration requests the Mail.ReadWrite Microsoft Graph permission.

This is a high-privilege Microsoft Graph Application Permission that enables an authorised application to manage mailbox content programmatically. For Message Injection, the permission is used solely to deliver simulated phishing emails.

When granted, this permission enables an application to:

  • Read existing messages within a mailbox

  • Create new draft messages

  • Insert messages into folders such as the Inbox

  • Modify message properties (for example, mark as read or unread)

  • Delete messages

  • Move messages between folders

For phishing simulation use cases, the primary capability required is the ability to programmatically create and place a message into a mailbox.


What are the Enterprise Application best practices?

Usecure operates phishing simulations through a dedicated, simulation-only app registration. Organisations should enable Unified Audit Logs within Microsoft 365, actively monitor application activity, and configure alerts to detect unusual message volume or anomalous behaviour.

From a governance perspective, the solution should operate through a dedicated,

simulation-only app registration, be supported by documented risk acceptance, and undergo periodic access reviews to ensure permissions remain appropriate and aligned with enterprise security standards.


Is Message Injection a security bypass?

Modern attackers frequently circumvent email filtering not by defeating the gateway directly, but by compromising accounts and operating from within the trusted environment.

Contemporary phishing campaigns increasingly rely on internal thread hijacking, Business Email Compromise (BEC), and OAuth token abuse to evade perimeter defences.

Injection-based simulations replicate these same tactics by modelling internal trust

exploitation, lateral phishing from compromised users, and executive impersonation

scenarios. Rather than weakening security, this approach tests resilience against a realistic and increasingly common threat model that perimeter filtering alone cannot prevent.


Why use Message Injection?

Traditional SMTP-based phishing simulations are designed to validate technical defences; they measure how effectively your email security stack (e.g., filtering, authentication enforcement, and anti-phishing policies) detects and blocks malicious messages. In other words, SMTP testing evaluates whether your preventive controls are functioning as intended.

Message injection, by contrast, is not meant to test filtering effectiveness; it deliberately isolates the human layer of risk by placing a message directly into the inbox and measuring how users interpret, trust, and act on it. This approach assesses decision-making, susceptibility, and reporting behaviour without interference from security tooling.

Mature security programs recognise that both layers must be evaluated independently to understand overall phishing risk.


Should I only use Message Injection?

Rather than message injection being a replacement for traditional phishing simulations, the most effective approach is a hybrid strategy that evaluates both technical and human risk layers.

Tier 1: SMTP-based phishing simulations

Tier 1 should consist of SMTP-based campaigns, which measure filtering effectiveness, validate SPF/DMARC enforcement, and test detection capabilities within tools such as Microsoft Defender for Office 365. This tier ensures that your preventative controls are functioning as designed.

Tier 2: Message Injection simulations

Tier 2 should leverage message injection within Microsoft 365 to measure human

susceptibility, simulate realistic post-compromise or internal phishing scenarios, and remove security artefact bias such as rewritten URLs or warning banners.

By separating technical control validation from behavioural risk measurement, organisations gain cleaner data across both domains. Most mature enterprises ultimately adopt this layered model because it provides a more comprehensive and defensible view of phishing risk.

Did this answer your question?