Commonly organizations ask their users to forward phishing emails as .eml attachments to a phishing inbox. This technique shows how to read an email, any attachments, and any attachments that are also .eml files.
How it works
Import this story to your tenant, from where you can adapt it to meet your unique needs.
Import