We'd love to hear about it! Click here to go to the product suggestion community
You need to have the option that most other phishing simulators have which is "Whitelist by Email Headers" Most other vendors have some kind of customer headers so that they can be whitelisted by rule in Office 365 mail. Without this feature Office 365 will mark all your simulation emilas as spam.
How knowbe4 does it: https://knowbe4.zendesk.com/hc/en-us/articles/212723707
I will pass this feedback on to our development team for further comment. Many thanks for bringing it to our attention!
For others out there, to ensure successful delivery of Phish Threat emails, please whitelist the IP address(es)/ domains listed within the 'Settings' --> 'Domain List' page. Further information can be seen here.
I know this is an old thread, but I second this recommendation. We are two months into our PhishThreat purchase and have to this point been unable to actually effectively use the reporting due specifically to O365 'reading and clicking' on the emails.
I have a support ticket open, and they have been unable to assist. Additionally. I have added the Mailflow rules for the mark Sophos' email server IP's and the two rules to try and bypass SafeAttachement and SafeLinks based on the sending domain. All of these have been ineffective.