Blog Post

Microsoft Security Copilot Blog
3 MIN READ

Using Security Copilot to Proactively Identify and Prioritize Vulnerabilities

jamilmirza's avatar
jamilmirza
Icon for Microsoft rankMicrosoft
Apr 16, 2025

There are many ways to leverage the power of Security Copilot. In this blog we look at how we can use AI to help with alerting to vulnerabilities which need to be treated as a high priority.

 

Introduction 

There are many different approaches when it comes to prioritizing the vulnerabilities which need addressing with urgency. Any information or guidance to help you make better informed decisions can be critical but how can you stay informed? Leveraging all the information sources available to you can be the difference and allow you to be proactive when trying to protect your organization. 

 One useful feed is offered by CISA (Cybersecurity & Infrastructure Security Agency) who works with partners to defend against today’s threats and collaborate to build a more secure and resilient infrastructure for the future. The Known Exploited Vulnerabilities (KEV) Catalog is a curated list maintained by CISA. It identifies vulnerabilities that have been actively exploited in the wild, posing significant risks to organizations and individuals. The catalog aims to enhance cybersecurity by providing timely information on these vulnerabilities, enabling proactive mitigation efforts. 

Key features of the KEV Catalog include: 

  • Identification: Lists vulnerabilities that are confirmed to be exploited. 
  • Details: Provides technical details, including affected products and versions. 
  • Mitigation: Offers guidance on how to address and remediate the vulnerabilities. 
  • Updates: Regularly updated to reflect new threats and exploited vulnerabilities. 

The KEV Catalog serves as a critical resource for cybersecurity professionals, helping them prioritize patching and defense strategies to protect against known threats.

The feed is designed to help organizations stay informed about vulnerabilities that have been exploited in the wild. It is part of CISA's efforts to defend against current threats and build a more secure and resilient infrastructure for the future 

Workflow overview 

The automated CISA feed solution addresses prioritization challenges by streamlining the process of vulnerability management. This solution checks the latest CISA feed every 24 hours and queries the CVE findings against devices within Microsoft Defender for Endpoint. Security Copilot then checks for remediation actions and enriches the description, providing a comprehensive overview of the vulnerability. 

 

Figure 1: Example of the email output from the Logic App

Key benefits of the Logic App include: 

  • Automated Updates: The Logic App automatically retrieves the latest CISA feed, ensuring that analysts have up-to-date information without manual intervention. This eliminates the need for manual checks and reduces the risk of missing critical updates. 
  • Device Vulnerability Assessment: It queries the CVE findings against devices within the organization, identifying which devices are vulnerable to the reported CVEs. This targeted approach allows analysts to focus on the most critical vulnerabilities affecting their specific environment, enhancing the efficiency of the remediation process. 
  • Remediation Insights: Security Copilot provides detailed remediation actions, helping analysts understand the steps needed to mitigate the vulnerabilities. By enriching the description with actionable insights, it simplifies the decision-making process and accelerates the implementation of security measures. 
  • Email Notifications: An email with the findings is sent to a designated mailbox, allowing for easy review and follow-up. This ensures that all relevant stakeholders are informed promptly, facilitating coordinated responses and continuous monitoring of the organization's security posture. 
Figure 2: Screenshot of the CISA Logic App

Click here to get started and install the Logic App today. 

Conclusion 

To prioritize effectively, gather all necessary information for informed decisions. While the Logic App CISA workflow is one approach, other methods may better suit your organization. Function Apps can enhance decision making by automating and streamlining security operations with integrated tools and processes. The Security Copilot GitHub repository offers AI-powered solutions using machine learning and natural language processing to improve security. These tools help identify vulnerabilities, predict risks, and implement protective measures. Check it out!

Updated Apr 16, 2025
Version 1.0

2 Comments

  • SunnyGP's avatar
    SunnyGP
    Copper Contributor

    Hi jamilmirza​  - Does this only with Defender for Endpoint? What if we use other 3rd party endpoint management solutions?

    • jamilmirza's avatar
      jamilmirza
      Icon for Microsoft rankMicrosoft

      Hi SunnyGP, This is not limited to 3rd party endpoint. The current Logic App in this article leverages Defender for Endpoint, however you could leverage a plugin through security copilot or directly invoke the API endpoint of the 3rd party.