<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Microsoft Security Copilot Blog articles</title>
    <link>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/bg-p/SecurityCopilotBlog</link>
    <description>Microsoft Security Copilot Blog articles</description>
    <pubDate>Wed, 22 Apr 2026 04:34:35 GMT</pubDate>
    <dc:creator>SecurityCopilotBlog</dc:creator>
    <dc:date>2026-04-22T04:34:35Z</dc:date>
    <item>
      <title>From alert overload to decisive action: How Security Copilot agents are transforming security and IT</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/from-alert-overload-to-decisive-action-how-security-copilot/ba-p/4504213</link>
      <description>&lt;P&gt;Security and IT teams operate in a constant stream of alerts, incidents, and investigations. As environments expand across identities, endpoints, cloud, and data, the challenge becomes clear: identifying real risk quickly enough to act.&lt;/P&gt;
&lt;P&gt;Security Copilot agents bring AI directly into the flow of work, helping teams understand risk with greater context, investigate threats more efficiently, and take action sooner. Security Copilot is &lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/security/security-copilot-in-microsoft-365-e5" target="_blank" rel="noopener"&gt;now included&lt;/A&gt; with Microsoft 365 E5 and E7 licenses at no additional cost, so teams can start using agents right away.&lt;/P&gt;
&lt;P&gt;Over the past year, organizations have used Security Copilot to triage alerts, surface real threats earlier, and move faster from investigation to action. At this RSA 2026 conference, we are announcing new capabilities that reflect a continuous wave of innovation, evolving from built-in AI assistance and automated summaries to new agents that can analyze signals, investigate incidents, and execute security workflows.&lt;/P&gt;
&lt;H3&gt;Real-world impact: measurable results&lt;/H3&gt;
&lt;P&gt;Security Copilot agents help security and IT teams identify and respond to risk more effectively. Customers are seeing that impact in their day-to-day operations.&lt;/P&gt;
&lt;P&gt;At &lt;A class="lia-external-url" href="https://www.microsoft.com/en/customers/story/25330-st-lukes-university-health-network-microsoft-security-copilot?msockid=2586e2ca99f2614b3ae0f44798366037" target="_blank" rel="noopener"&gt;St. Luke’s University Health Network&lt;/A&gt;, the Security Alert Triage Agent &lt;EM&gt;(previously named Phishing Triage Agent)&lt;/EM&gt; in Microsoft Defender saves security analysts more than 200 hours every month, automatically triaging phishing alerts and surfacing those that actually matter.&lt;/P&gt;
&lt;P&gt;Independent randomized controlled studies reinforce the results. Security professionals using the Security Alert Triage Agent triaged alerts up to &lt;A class="lia-external-url" href="https://aka.ms/phishing-triage-agent-study" target="_blank" rel="noopener"&gt;78% faster, delivered 77% more accurate verdicts, and identified 6.5 times more malicious emails&lt;/A&gt;.&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; The Phishing Triage Agent has since been expanded and is now called the Security Alert Triage Agent. Learn more at &lt;A class="lia-external-url" href="http://aka.ms/SATA" target="_blank"&gt;aka.ms/SATA&lt;/A&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;That same impact extends beyond the SOC into other critical areas of security and IT.&lt;/P&gt;
&lt;P&gt;A data security team at a large telecommunications organization used the Data Security Triage Agent in Microsoft Purview to triage more than 40,000 Data Loss Prevention (DLP) alerts in 90 days, surfacing the 10% most critical alerts that required investigation.&lt;/P&gt;
&lt;P&gt;Identity teams are also seeing huge improvements with the Conditional Access Optimization Agent in Microsoft Entra, which continuously analyzes access policies against Zero Trust baselines and recommends actions. In controlled productivity studies, identity admins completed policy-related tasks &lt;A class="lia-external-url" href="https://aka.ms/cao-agent-study" target="_blank" rel="noopener"&gt;43% faster and 48% more accurately&lt;/A&gt; when identifying configuration weaknesses.&lt;/P&gt;
&lt;P&gt;IT teams are also seeing impact using the Vulnerability Remediation Agent in Microsoft Intune, which continuously detects new vulnerabilities as threats emerge.&amp;nbsp; As one CTO at a renewable energy and technology company shared, the agent is “dramatically changing the way we approach working with vulnerabilities in our environment. A two‑week process is now a two‑minute process, really huge number for us.”&lt;/P&gt;
&lt;P&gt;Across these scenarios, teams begin investigations with clearer context and a better understanding of what actually matters. Instead of piecing together signals across dozens of tools, they can focus on the highest-risk issues and move from investigation to action with confidence.&lt;/P&gt;
&lt;P&gt;As environments continue expanding across identities, endpoints, applications, and data, quickly connecting signals and understanding risk becomes essential.&lt;/P&gt;
&lt;H3&gt;New Security Copilot agents and capabilities announced at RSA Conference&lt;/H3&gt;
&lt;P&gt;Our innovation continues. Microsoft is introducing new Security Copilot agents and expanded capabilities designed to help organizations analyze complex security data, triage alerts more effectively, and strengthen security posture across identity, endpoint, cloud, and data environments.&lt;/P&gt;
&lt;H5&gt;New and updated Security Copilot agents built by Microsoft&lt;/H5&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Security Analyst Agent in Microsoft Defender&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Security teams are often sitting on enormous volumes of security data, but turning that data into answers takes time. The Security Analyst Agent helps teams move from raw telemetry to real understanding much faster. By performing deep, multi-step investigations across Microsoft Defender and Sentinel telemetry, the agent can analyze up to ~100MB of security data to uncover anomalies, hidden risks, and high-impact threats that might otherwise stay buried. Analysts can chat directly with the agent to ask questions, explore hypotheses, and dig deeper into findings. The results include transparent reasoning and supporting evidence, helping teams quickly understand what matters and move forward with confidence.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Security Alert Triage Agent in Microsoft Defender&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;One of the biggest challenges for SOC teams is deciding which alerts actually deserve attention. The Security Alert Triage Agent helps cut through that noise so analysts can focus on the threats that truly matter. Building on its existing phishing triage capabilities, the agent now extends autonomous triage to identity and cloud alerts. Each verdict includes clear, transparent reasoning so analysts can quickly understand the outcome and prioritize the alerts that matter most.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;New capabilities for Conditional Access Optimization Agent in Microsoft Entra&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Identity environments are constantly evolving as organizations add new apps, users, and authentication methods. New capabilities in the Conditional Access Optimization Agent help identity teams identify and close critical policy gaps faster, with recommendations tailored to their organization’s needs. The agent now delivers business-context-aware recommendations, supports phased rollout of new policies, enables automated least-privilege enforcement for supported third-party agent identities, and helps drive passkey adoption. Together, these capabilities help organizations continuously strengthen identity security while maintaining productivity.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;New capabilities for Data Security Posture Agent in Microsoft Purview&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Sensitive data often moves through documents, emails, chats, and collaboration tools, which makes it easy for credentials or secrets to end up where they shouldn’t be. A new credential scanning capability in the Data Security Posture Agent helps data security teams proactively identify exposed credentials within their data environment. By analyzing data signals and access patterns, the agent surfaces potential credential exposure risks and helps teams quickly investigate and remediate them. This gives organizations better visibility into hidden data risks and strengthens overall protection of critical systems.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;New capabilities for &lt;/STRONG&gt;&lt;STRONG&gt;Data Security Triage Agent in Microsoft Purview Insider Risk Management&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Investigating insider risk alerts often requires piecing together signals from many different sources to understand what is really happening. The Data Security Triage Agent now introduces an advanced AI reasoning layer that helps security teams evaluate those signals more holistically. By performing deeper, multi-step analysis across behavioral signals from users, devices, and data activity, the agent can surface the incidents that truly require investigation while filtering out noise. The result is faster, more accurate investigations and better confidence when responding to potential insider risks.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;New capabilities for Data Security Triage Agent in Microsoft Purview Data Loss Prevention&lt;/STRONG&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Custom Sensitive Information Types (SITs) are often difficult for analysts to interpret quickly because the underlying definitions and patterns lack clear context at triage time. This latest enhancement makes custom Sensitive Information Types (SITs) easier for both the agent and analysts to understand in Data Loss Prevention alerts. Purview interprets custom SIT definitions, generates semantic descriptions of the data, and surfaces that context directly within the agent. This allows the agent to classify and prioritize alerts involving custom data more accurately, helping analysts quickly recognize real risk and respond appropriately.&lt;/P&gt;
&lt;H5&gt;New Security Copilot agents built by partners&lt;/H5&gt;
&lt;P&gt;To meet customers where they are across their existing security stack, the Security Copilot ecosystem continues to grow with &lt;STRONG&gt;more than 70 partner-built agents available today in the Security Store&lt;/STRONG&gt;, bringing additional signals and investigation capabilities into the platform. Some of these agents include the following: &amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://securitystore.microsoft.com/solutions/commvault.commvault-security-investigation-agent" target="_blank" rel="noopener"&gt;Security Investigation Agent by Commvault&lt;/A&gt; – Correlates backup anomalies with identity and security signals across platforms such as Entra, CrowdStrike, Netskope, and Darktrace.&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://securitystore.microsoft.com/solutions?tab=All&amp;amp;query=inspira" target="_blank" rel="noopener"&gt;MITRE Attack Coverage Insight Agent by Inspira&lt;/A&gt;&lt;STRONG&gt; &lt;/STRONG&gt;– Evaluates analytic rule coverage, calculates ATT&amp;amp;CK coverage, identifies detection gaps, generates detection recommendations, and provides SOC detection maturity scoring.&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://securitystore.microsoft.com/solutions/avanade_usa.endpointriskinsights_agent" target="_blank" rel="noopener"&gt;Endpoint Risk Insights Agent by Avanade&lt;/A&gt; – Provides endpoint risk insights by correlating signals across security telemetry.&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://securitystore.microsoft.com/solutions/invoke_llc.scp_agent_entra_role_mining_core" target="_blank" rel="noopener"&gt;Identity Role Mining Agent by Invoke&lt;/A&gt; – Allows user to discover and analyze administrator roles in Microsoft Entra ID with ease and precision.&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://securitystore.microsoft.com/solutions/silverfort.silverfort-scp-agent" target="_blank" rel="noopener"&gt;Identity Threat Triage Agent by Silverfort&lt;/A&gt;&lt;STRONG&gt; &lt;/STRONG&gt;- Correlates Silverfort's identity risk signals with Entra ID and Defender for Endpoint data in the Sentinel data lake to surface risky sign‑ins, MFA abuse, suspicious processes, and anomalies.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Together, these partner agents extend Security Copilot’s ability to connect signals across Microsoft and third-party security platforms, giving organizations broader visibility and stronger investigation capabilities across their security environment. To explore all new Security Copilot agents, visit the &lt;A class="lia-external-url" href="https://securitystore.microsoft.com/agents" target="_blank" rel="noopener"&gt;Microsoft Security Store&lt;/A&gt;.&lt;/P&gt;
&lt;H3&gt;New Security Copilot innovations that turn insight into action&lt;/H3&gt;
&lt;P&gt;Security Copilot continues to integrate more deeply into the tools security and IT teams already use every day. These capabilities bring AI directly into the environments where investigations happen, helping teams explore threats, understand context, and take action without switching between tools.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Security Copilot interactive chat experience in Microsoft Defender&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Analysts can ask questions, explore investigative hypotheses, and follow threat activity across incidents, alerts, identities, devices, and IPs without leaving their investigation. Copilot understands the context of the page analysts are working on and grounds responses in the relevant signals already available in Defender. As analysts ask questions, Copilot can run investigative steps, gather additional evidence, and surface new insights. This allows teams to iterate quickly, validate assumptions, and dig deeper into threats while staying in the same workflow.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Secret finder skill in Security Copilot is now generally available&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Available in the Security Copilot standalone portal, the Secret Finder skill can be invoked to analyze unstructured content such as emails, chats, documents, and investigation notes to identify exposed credentials hidden in real-world workflows. Using agentic capabilities such as multi-step reasoning rather than simple pattern matching, it detects real, usable secrets and the systems they unlock, helping security teams quickly understand potential exposure and respond with confidence. Additional integrations and use cases are planned to expand how this capability can be used across security workflows.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Security Copilot trigger in Logic Apps&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Building on how many organizations already use Logic Apps to automate security workflows, a new connector action for Security Copilot in Logic Apps flows allows teams to easily invoke partner-built agents and custom agents they create as part of repeatable workflows. This brings deeper AI-driven investigation, context, and decision support into tasks such as incident triage, threat intelligence analysis, and policy validation.&lt;/P&gt;
&lt;H3&gt;See Security Copilot in action at RSA Conference&lt;/H3&gt;
&lt;P&gt;Join us at RSA Conference to see the latest Security Copilot agents and capabilities in action. Stop by the Microsoft booth to connect with the team, explore new innovations, and experience how agents are helping security and IT teams investigate threats, understand risk, and strengthen security posture.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Hear from Microsoft Security product leaders in these booth sessions&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;March 23 | 5:15 PM&lt;/STRONG&gt;&lt;BR /&gt;Empowering the SOC with assistive and autonomous AI, Yuval Derman&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;March 24 | 3:00 PM&lt;/STRONG&gt;&lt;BR /&gt;Security Copilot agents: Insight. Action. Impact., Lizzie Heinze and Donna Lee&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;March 25 | 10:30 AM&lt;/STRONG&gt;&lt;BR /&gt;Turning Data Risk into Action with Security Copilot Agents, Paige Johnson and Tanay Baldua&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;March 26 | 12:00 PM&lt;/STRONG&gt;&lt;BR /&gt;Defend identity autonomously with agentic AI in Microsoft Entra, Mitch Muro, Rahul Prakash, Nikhil Reddy&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Join our deep dive session&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;March 24 | 8:30 AM | The Palace Hotel&lt;/STRONG&gt;&lt;BR /&gt;Security Copilot in action: An agentic approach to modern security&lt;BR /&gt;Register here: &lt;A class="lia-external-url" href="https://microsoftsecurityevents.eventbuilder.com/RSACMicrosoftEvents26?ref=social_speaker" target="_blank" rel="noopener"&gt;Microsoft Security RSAC Events | Microsoft Corporate&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Stop by the Microsoft booth for a hands-on experience&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Test out the latest Security Copilot agents at the demo station and connect with our experts.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Agentic AI Arena&lt;/STRONG&gt;: Try a fun, gamified experience that shows how Security Copilot agents investigate threats, surface risk, and help security teams respond faster.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;Start using Security Copilot in your daily workflows&lt;/H5&gt;
&lt;P&gt;If you have received access to Security Copilot as part of your Microsoft 365 E5 plan, we recommend following steps to get started quickly:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Sign up for the &lt;A class="lia-external-url" href="https://aka.ms/sc/workshops" target="_blank" rel="noopener"&gt;Security Copilot skilling series&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Review new agentic scenarios and developer capabilities in the &lt;A class="lia-external-url" href="https://adoption.microsoft.com/en-us/security-copilot/" target="_blank" rel="noopener"&gt;Security Copilot Adoption Hub&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Learn what’s included with your Microsoft 365 E5 plan in &lt;A class="lia-external-url" href="https://aka.ms/scpinclusioninfo" target="_blank" rel="noopener"&gt;documentation&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="http://aka.ms/Microsoft365RFA" target="_blank" rel="noopener"&gt;Request assistance&lt;/A&gt; from a Microsoft 365 FastTrack specialist to unlock the full value of Security Copilot&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 21 Apr 2026 22:55:44 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/from-alert-overload-to-decisive-action-how-security-copilot/ba-p/4504213</guid>
      <dc:creator>Lizzie_Heinze</dc:creator>
      <dc:date>2026-04-21T22:55:44Z</dc:date>
    </item>
    <item>
      <title>Introducing Secret Finder: Finding Real Credentials Where Traditional Tools Fail</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/introducing-secret-finder-finding-real-credentials-where/ba-p/4500983</link>
      <description>&lt;P&gt;Secret Finder is an AI-powered capability in Microsoft Security Copilot that detects leaked credentials in unstructured content, such as emails, chat logs, documents, and screenshots, where traditional pattern-matching tools struggle. It relies on a multi‑step, multi‑agent reasoning workflow rather than a single pass detector. Detection, verification, and contextual analysis are handled by distinct reasoning stages, allowing Secret Finder to find real credentials without flooding users with false positives. Unlike regex-based scanners, Secret Finder uses reasoning to identify not just credentials, but the systems they unlock, helping security teams understand exposure and respond faster. In benchmark testing on synthetic datasets, Secret Finder achieved 98.33% true credential detection with zero false alarms on realistic emails, chats, notes, and documents—while traditional regex scanners detected only about 40% of the same credentials. Secret Finder is now generally available in Security Copilot, supporting 20+ credential types with high precision and actionable context.&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;The Problem: Credentials Hide Where Traditional Tools Can't See&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;When security incidents happen, leaked credentials don't always appear in clean, predictable formats. They show up buried in email threads, pasted into Teams messages, embedded in Word documents, or captured in screenshots of logs and terminals. These are exactly the places where security teams spend the most time and where traditional secret scanning tools fail.&lt;/P&gt;
&lt;P&gt;Most existing tools rely on regular expressions or simple pattern matching. This works reasonably well for structured environments like source code repositories, where credentials follow predictable formats. But in real-world incidents, secrets look different. A storage key might be split across multiple messages in an email thread. A credential could be reformatted, partially redacted, or embedded alongside explanatory text.&lt;/P&gt;
&lt;P&gt;In these situations, pattern matching produces two painful outcomes: it misses real credentials because the format doesn’t match a known rule, or it floods analysts with false positives that waste time. Security teams are left manually reviewing content, guessing which findings are real, and piecing together what systems might actually be at risk. In practice, this failure mode has a real human cost that security analysts end up reviewing thousands of alerts, manually inspecting email threads and chat logs, and trying to determine whether a suspicious string actually unlocks a storage account, API, or production service. Teams can spend days reconstructing context across messages and documents just to understand what a credential grants access to, slowing containment and increasing risk during active incidents.&lt;/P&gt;
&lt;P&gt;This is the gap Secret Finder was built to close.&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;The Solution: Secret Finder Brings Reasoning to Secret Detection&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;Secret Finder approaches secret detection as a reasoning problem, not a string-matching exercise. Instead of asking "does this text match a pattern?" It asks human-like questions: Is this text describing a credential or access mechanism? Does the value look real and usable? What system or resource could this access?&lt;/P&gt;
&lt;P&gt;This shift is subtle but powerful. Secret Finder doesn't just detect credentials, it connects them to doors: the specific targets those credentials unlock, such as API endpoints, storage accounts, applications, or services. This is critical for triage. Instead of stopping at “this looks like a credential,” Secret Finder tells analysts what that credential actually opens. Without context, a credential triggers manual follow‑up. When it’s linked to a specific target, analysts can immediately assess impact and act.&lt;/P&gt;
&lt;P&gt;By understanding messy, real-world content the way a human investigator would, Secret Finder delivers findings that security teams can trust and act on immediately. It's designed specifically for the unstructured, noisy environments where incidents actually unfold.&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Why Secret Finder Outperforms Traditional Pattern Matching&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;Traditional secret scanners are built for clean data. Secret Finder is built for reality.&lt;/P&gt;
&lt;P&gt;Traditional tools struggle when:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Credentials appear in natural language descriptions rather than code&lt;/LI&gt;
&lt;LI&gt;Context determines whether a string is sensitive or benign&lt;/LI&gt;
&lt;LI&gt;Credentials are incomplete, malformed, or partially redacted&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Secret Finder excels because it:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Reasons through context, understanding surrounding text to identify what's truly sensitive&lt;/LI&gt;
&lt;LI&gt;Detects credentials and their associated resources together, providing the "what" and the "where" in a single pass&lt;/LI&gt;
&lt;LI&gt;Handles noisy, unstructured inputs like emails, chat logs, documents&lt;/LI&gt;
&lt;LI&gt;Assigns confidence scores to help teams prioritize findings and reduce alert fatigue&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;&lt;STRONG&gt;What Secret Finder Can Do Today&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;Secret Finder is now generally available in Microsoft Security Copilot, with capabilities shaped directly by real security workflows across incident response, red teaming, and SOC operations.&lt;/P&gt;
&lt;P&gt;It detects over 20 major credential categories, spanning cloud provider credentials like Azure Storage Keys and AWS Access Keys, authentication credentials including Microsoft Entra passwords and OAuth tokens, database connection strings, SSH private keys, API keys, and generic secrets that don't fit predefined patterns. This broad coverage means analysts can scan investigation artifacts without worrying whether the secret type is supported.&lt;/P&gt;
&lt;P&gt;What makes Secret Finder particularly effective is where it works. Email threads where credentials are discussed across multiple messages. Teams chats where credentials are pasted quickly during troubleshooting. Word documents and internal wikis where credentials are documented for operational handoffs. Incident reports and post-mortem notes written under pressure. These are the environments where traditional pattern-matching tools fail, and where Secret Finder delivers the most value.&lt;/P&gt;
&lt;P&gt;In benchmark evaluations, Secret Finder achieved 100% recall with 0% false positives on synthetic datasets containing embedded Azure Storage credentials, compared to 40% recall from traditional regex‑based tools such as CredScan. In more complex scenarios involving multiple credential types and noisy email content, Secret Finder maintained 98.33% recall with 0% false positives. These results were observed on synthetically generated evaluation datasets spanning emails, chats, notes, and documents, designed to reflect how engineers communicate and how credentials may be inadvertently shared in real‑world workflows.&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table&gt;&lt;thead&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Scenario&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Precision&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Recall&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Single credential type&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;100%&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;100%&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Complex, multiple credential types&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;100%&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;98.33%&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;Secret Finder is currently integrated into Security Copilot, actively supporting incident response workflows, and working toward deeper integrations with developer platforms such as GitHub to bring contextual secret detection to source code analysis at scale.&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Using Secret Finder in Security Copilot&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;Secret Finder is available as a skill in Microsoft Security Copilot, making credential detection a seamless part of analyst workflows.&lt;/P&gt;
&lt;P&gt;How to use Secret Finder:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Enable the Secret Finder skill in Security Copilot via "Manage Sources" → "Manage Plugins" (Figure 1)&lt;/LI&gt;
&lt;LI&gt;Select "FindSecretInText" from Promptbook (Figure 2)&lt;/LI&gt;
&lt;LI&gt;Submit unstructured content directly in the Copilot prompt: paste the text blob that might contain credentials&lt;/LI&gt;
&lt;LI&gt;Secret Finder analyzes the content using its multi-agent workflow, detecting credentials and associated doors&lt;/LI&gt;
&lt;LI&gt;Review actionable findings with contextual details&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;EM&gt;Figure 1. Enabling the Secret Finder skill in Microsoft Security Copilot (Due to recent naming changes, users might see "Agentic secret finder" in Security copilot. Naming changes will reflect in a few weeks)&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;EM&gt;Figure 2. Selecting the FindSecretInText prompt, which invokes Secret Finder’s multi‑step credential detection and verification workflow&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;EM&gt;Figure 3. Submitting a text blob containing embedded credentials for analysis (example is synthetic)&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;EM&gt;Figure 4. Secret Finder output with detected credentials and associated doors (example credentials and associated doors are synthetic)&lt;/EM&gt;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;What's Next for Secret Finder&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;Secret Finder is a living capability. Over the next six months, we are working towards coverage and deepening integrations:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Exploring integrations with GitHub to reduce false positives in secret scanning for code repositories&lt;/LI&gt;
&lt;LI&gt;Optimizing for large-scale analysis to handle enterprise-wide scans efficiently with reduced latency&lt;/LI&gt;
&lt;LI&gt;Exploring graph-based risk modeling to map relationships between credentials, services, and attack paths&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Our long-term vision goes beyond detection: we want to help security teams understand how credentials are used, what risks exist if they're exposed, and what the impact of rotation or revocation would be. By moving from "what's leaked" to "what does it mean," Secret Finder will enable smarter prioritization, faster response, and more confident decision-making.&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Acknowledgments&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;Secret Finder has been a cross-team effort over the past year, evolving from early research and prototyping through private preview, public preview, and now general availability.&lt;/P&gt;
&lt;P&gt;This milestone reflects contributions across many phases from initial system design and technical direction, to evaluation, product integration, and deployment at scale.&lt;/P&gt;
&lt;P&gt;Contributors include&amp;nbsp;Mariko Wakabayashi&amp;nbsp;leading the early research through production and to the team including Zixiao Chen and Avy Challa for GA improvements and bringing Secret Finder to production readiness.&lt;/P&gt;
&lt;P&gt;We also appreciate Tony Twum-Barimah, Malachi Jones, and the Security Copilot team, including Austin Trapp and Vinod Jagannathan for their technical and product support throughout the process, as well as Christian Rudnick and Helen Chang for guiding us through the responsible AI reviews before launch.&lt;/P&gt;
&lt;P&gt;Finally, a huge thanks to the incident responders and security researchers who shared valuable insights along the way. Secret Finder wouldn’t have been possible without their work and feedback.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Mar 2026 20:27:24 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/introducing-secret-finder-finding-real-credentials-where/ba-p/4500983</guid>
      <dc:creator>Zixiao_Chen</dc:creator>
      <dc:date>2026-03-18T20:27:24Z</dc:date>
    </item>
    <item>
      <title>Where Partners Build and Scale: Partner-Built Security Copilot Agents in Security Store</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/where-partners-build-and-scale-partner-built-security-copilot/ba-p/4488589</link>
      <description>&lt;P&gt;At Microsoft, we believe that security is a team sport. That’s why we are committed to meeting customers where they are, integrating with the solutions they already use to ensure that everyone can take advantage of the agentic capabilities of Security Copilot.&lt;/P&gt;
&lt;P&gt;And it’s not just an idea—it’s a reality. We’re excited to share why partners such as BlueVoyant, OneTrust, and Tanium chose to build agents with Security Copilot—and the value this brings to their customers.&lt;/P&gt;
&lt;P&gt;By watching the videos featuring BlueVoyant, OneTrust, and Tanium, you’ll see firsthand how collaboration drives innovation and empowers security teams to tackle today’s threats with agility and confidence. Together, these partner-built agents show how organizations and partners can transform Security Copilot into an integrated force multiplier—proving that security is a team sport.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Partner-built agents power smarter protection&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;STRONG&gt;BlueVoyant&lt;/STRONG&gt; – Specializing in comprehensive cyber risk management, BlueVoyant provides a suite of services to protect organizations from cyberattacks. In this video, we learn about BlueVoyant Watchtower and how their agents help customers get the most out of their Sentinel and Defender products by using an agent to always review the environment and recommend updated rules, configurations, and policies that catch bad actors Security Copilot gives us the advantage of moving more quickly.” – &lt;EM&gt;Micah Heaton, Executive Director, Microsoft Product &amp;amp; Innovation Strategy at BlueVoyant&lt;/EM&gt;&lt;/P&gt;
&lt;div data-video-id="https://youtu.be/9STL2lk4mSY?si=-0gHtyu2ir6EBDN_/1769114592577" data-video-remote-vid="https://youtu.be/9STL2lk4mSY?si=-0gHtyu2ir6EBDN_/1769114592577" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2F9STL2lk4mSY%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D9STL2lk4mSY&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2F9STL2lk4mSY%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;P&gt;&lt;STRONG&gt;OneTrust&lt;/STRONG&gt; – OneTrust, a privacy and consent management platform, specializes in helping customers responsibly use data and AI. By partnering with Microsoft—specifically Microsoft’s Sentinel platform—OneTrust is able to provide their customers with a full view of their data estate. The Privacy Breach Response Agent by OneTrust combines the deep privacy and regulatory expertise of OneTrust with the robust generative AI capabilities of Microsoft Security Copilot, automating privacy risk assessments improving their accuracy.&lt;/P&gt;
&lt;div data-video-id="https://youtu.be/MuzKotpgeoE?si=Eo91IOJFvxn84deQ]/1769114608767" data-video-remote-vid="https://youtu.be/MuzKotpgeoE?si=Eo91IOJFvxn84deQ]/1769114608767" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FMuzKotpgeoE%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DMuzKotpgeoE&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FMuzKotpgeoE%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;P&gt;&lt;STRONG&gt;Tanium&lt;/STRONG&gt; – Specializing in endpoint management and security, Tanium gives IT teams visibility and control over every device in their environment. Tanium’s partnership with Microsoft provides Tanium with seamless integration into Microsoft’s Security products via Copilot, which combined with Tanium’s real-time environment insights, power powerful end to end workflows across Defender, Entra, Tanium, and Intune. The Security Triage Agent by Tanium accelerates alert triage, providing security teams with the context they need to make informed decisions on Tanium Threat Response alerts swiftly.&lt;/P&gt;
&lt;div data-video-id="https://youtu.be/qctxOAqKbF4?si=br3t38aqDmurMn0T/1769114626266" data-video-remote-vid="https://youtu.be/qctxOAqKbF4?si=br3t38aqDmurMn0T/1769114626266" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FqctxOAqKbF4%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DqctxOAqKbF4&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FqctxOAqKbF4%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;P&gt;The work of partners like BlueVoyant, OneTrust, and Tanium is shaping a new security ecosystem—one where the &lt;A href="https://securitymarketplace.microsoft.com" target="_blank" rel="noopener"&gt;Microsoft Security Store&lt;/A&gt; is a launchpad for partner innovation to drive real-world customer impact. The Store turns partner-built agents into enterprise-ready solutions by providing Microsoft-validated certification, high‑quality metadata, consistent deployment flows, secure authentication and transactions, and in‑product visibility inside Defender, Entra, and Security Copilot. These deployed agents run securely in your Security Copilot zero-trust environment.&lt;/P&gt;
&lt;P&gt;The power of the Security Store is that it doesn’t just distribute agents—it amplifies&lt;STRONG&gt; &lt;/STRONG&gt;them. It gives partners a unified, trusted surface where their solutions are discoverable directly within Microsoft Security products; where customers can compare capabilities through standardized metadata; where installation is guided and repeatable; and where Microsoft’s AI foundation elevates the value of every partner-built capability. For customers, this means direct access to the best of partner-driven security innovation. Partner-built agents deliver value at every stage of the security journey: proactively monitoring sensor health, surfacing actionable insights, accelerating investigations, and automating incident response. These capabilities help organizations strengthen their security posture, respond faster to threats, and stay ahead of attackers.&lt;/P&gt;
&lt;P&gt;For partners, success begins with identifying the unique value their agent brings to customers and designing real security outcomes—such as improved detection, automated investigations, and measurable risk reduction. As more partners publish agents, the ecosystem expands- unlocking advanced scenarios like phishing and identity alert triage, incident enrichment, policy optimization, and automated remediation. By combining Microsoft’s AI foundation with specialized partner expertise, Security Copilot agents deliver differentiated solutions that address a wide range of security challenges—from privacy and compliance workflows to vulnerability management and forensics—helping customers strengthen their security posture and respond faster to threats.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Explore resources and documentation&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Explore all the partner-built agents in Security Copilot and partner SaaS offerings at the &lt;A href="https://securitystore.microsoft.com/" target="_blank" rel="noopener"&gt;Microsoft Security Store&lt;/A&gt; and at the Security Store Learn page &lt;A href="https://learn.microsoft.com/en-us/security/store/" target="_blank" rel="noopener"&gt;Security Store documentation - Security Store | Microsoft Learn&lt;/A&gt;. Or &lt;A href="https://learn.microsoft.com/copilot/security/agents-overview" target="_blank" rel="noopener"&gt;read more documentation on Security Copilot agents&lt;/A&gt; to learn:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;What agents are and how they work in Security Copilot&lt;/LI&gt;
&lt;LI&gt;How partners build and integrate agents&lt;/LI&gt;
&lt;LI&gt;Links to related resources for development and deployment&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Mon, 26 Jan 2026 16:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/where-partners-build-and-scale-partner-built-security-copilot/ba-p/4488589</guid>
      <dc:creator>Vikram_2026</dc:creator>
      <dc:date>2026-01-26T16:00:00Z</dc:date>
    </item>
    <item>
      <title>What's new in Microsoft Security Copilot</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/what-s-new-in-microsoft-security-copilot/ba-p/4460703</link>
      <description>&lt;P&gt;A major wave of updates has landed: integration with the new Sentinel data lake and graph, new ready-made and custom agents, and the debut of the Microsoft Security Store.&lt;/P&gt;
&lt;P&gt;Let’s take a look at what’s new.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Sentinel and Security Copilot integration delivers deeper context and smarter AI&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Sentinel data lake is now generally available, and new capabilities like Sentinel graph and the Model Context Protocol (MCP) server are in public preview, bringing in a new level of integration with Security Copilot. Agents can now access richer, more connected data from across Sentinel, combining graph, structured, and semantic context to reason and act with greater precision. This enhanced foundation transforms AI-driven detection and response, helping teams resolve incidents faster and uncover deeper insights across their environments.&lt;/P&gt;
&lt;P&gt;Read more in the Sentinel announcement blog: &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoft-security-blog/introducing-microsoft-sentinel-graph-public-preview/4456368" data-lia-auto-title="Introducing Microsoft Sentinel graph " data-lia-auto-title-active="0" target="_blank"&gt;Introducing Microsoft Sentinel graph &lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Build your own Security Copilot agents, no coding required&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Now anyone on your team can create custom Security Copilot agents. Use a no-code portal or developer tools to design, test, and deploy agents that automate the workflows you need most. Your team controls how they work and what they do.&lt;/P&gt;
&lt;P&gt;Learn more: &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/securitycopilotblog/from-idea-to-security-copilot-agent-create-customize-and-deploy/4458516" data-lia-auto-title="Build your own Security Copilot agent" data-lia-auto-title-active="0" target="_blank"&gt;Build your own Security Copilot agent&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;New Microsoft and partner ready-made agents for real challenges&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;These new agents help teams address common security and IT challenges faster and smarter:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Access Review Agent in Microsoft Entra: Streamline access reviews, flag unusual patterns, and reduce fatigue for security and compliance teams. It helps maintain governance and compliance by automatically analyzing ongoing access reviews and highlighting potential risks.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; Learn more: &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/the-microsoft-entra-agent-for-smarter-access-governance-access-review-agent/4279689" data-lia-auto-title="The Microsoft Entra agent for smarter access governance: Access Review Agent" data-lia-auto-title-active="0" target="_blank"&gt;The Microsoft Entra agent for smarter access governance: Access Review Agent&lt;/A&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Phishing Triage Agent in Microsoft Defender saves nearly 200 hours a month&lt;/STRONG&gt;: In this new customer spotlight, &lt;A class="lia-external-url" href="https://www.microsoft.com/en/customers/story/25330-st-lukes-university-health-network-microsoft-security-copilot" target="_blank"&gt;St. Luke’s is seeing the impact&lt;/A&gt; of integrating Security Copilot agents into their daily workflows. ACISO Krista Arndt says, “The Phishing Triage Agent is a game changer. It’s saving us nearly 200 hours monthly by autonomously handling and closing thousands of false positive alerts.” With routine triage automated, security teams can shift from reactive response to proactive threat hunting, freeing up time for higher-value work and faster threat mitigation.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The launch of &lt;STRONG&gt;30 new partner-built agents&lt;/STRONG&gt; that can be found on the &lt;A class="lia-external-url" href="https://securitystore.microsoft.com/" target="_blank"&gt;Microsoft Security Store&lt;/A&gt; with solutions like:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Forensic Agent by glueckkanja AG&lt;/STRONG&gt;: Delivers deep-dive analysis of Defender XDR incidents to accelerate investigations and uncover root causes faster.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Privileged Admin Watchdog Agent by glueckkanja AG&lt;/STRONG&gt;: Helps enforce zero standing privilege principles by removing persistent admin identities, reducing risk, and strengthening administrative security.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Ransomware Kill Chain Investigator Agent by adaQuest&lt;/STRONG&gt;: Automates ransomware triage to quickly detect and respond to threats, enabling security teams to focus on high-priority incidents.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Entity Guard Investigator Agent by adaQuest&lt;/STRONG&gt;: Investigates Defender incidents and provides actionable insights to accelerate incident resolution and strengthen security posture.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Admin Guard Insight Agent by adaQuest&lt;/STRONG&gt;: Analyzes administrative activity, detects anomalies, evaluates risk exposure and compliance, and delivers actionable guidance to improve administrative security.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Identity Workload ID Agent by Invoke&lt;/STRONG&gt;: Empowers identity administrators and security teams to manage and secure Workload Identities in Microsoft Entra, reducing risk, strengthening compliance, and controlling identity sprawl.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;Find these agents and more in the &lt;/STRONG&gt;&lt;A class="lia-external-url" href="https://securitystore.microsoft.com/" target="_blank"&gt;Microsoft Security Store&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Security Store – one, centralized place to find agents and SaaS solutions&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The &lt;A class="lia-external-url" href="https://securitystore.microsoft.com/" target="_blank"&gt;Microsoft Security Store&lt;/A&gt; makes it simple to discover, deploy, and buy Security Copilot agents and partner solutions. Start using any of the 30 new agents or 50 SaaS solutions to power your SOC, IT, privacy, and compliance workflows.&lt;/P&gt;
&lt;P&gt;Read more in the announcement blog: &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoft-security-blog/introducing-microsoft-security-store/4456417" data-lia-auto-title="Introducing Microsoft Security Store" data-lia-auto-title-active="0" target="_blank"&gt;Introducing Microsoft Security Store&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Stay tuned and explore more!&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Security Copilot is transforming how security and IT teams operate – bringing AI-powered insights, automation, and decision support into everyday workflows. With new capabilities landing every month, the pace of innovation is accelerating.&lt;/P&gt;
&lt;P&gt;We’ll be back in November with more updates. Until then, explore these resources to get hands-on, deepen your understanding, and see what’s possible:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://adoption.microsoft.com/en-us/security-copilot/video-hub/" target="_blank"&gt;Security Copilot Video Hub&lt;/A&gt; – Watch demos and walkthroughs to see Security Copilot in action&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/security/business/ai-machine-learning/microsoft-security-copilot?msockid=3078bb0cbe6e63980b2caeb9bf2262a5" target="_blank"&gt;Microsoft Security Copilot Website&lt;/A&gt; – Learn about capabilities, use cases, and product details&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://adoption.microsoft.com/en-us/security-copilot/" target="_blank"&gt;Security Copilot Adoption Hub&lt;/A&gt; – Access rollout guides, templates, and best practices&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Don’t miss&amp;nbsp;&lt;A class="lia-external-url" href="https://ignite.microsoft.com/en-US/home?wt.mc_ID=Ignite2025_marx_corp_bl_oo_bl_Security_2_1" target="_blank"&gt;Microsoft Ignite&lt;/A&gt; - we’ll be announcing exciting new capabilities for Security Copilot and sharing what’s next in AI-powered security.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Oct 2025 16:24:10 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/what-s-new-in-microsoft-security-copilot/ba-p/4460703</guid>
      <dc:creator>Lizzie_Heinze</dc:creator>
      <dc:date>2025-10-10T16:24:10Z</dc:date>
    </item>
    <item>
      <title>Redefining Cyber Defence with Microsoft Security Exposure Management (MSEM) and Security Copilot</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/redefining-cyber-defence-with-microsoft-security-exposure/ba-p/4459280</link>
      <description>&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt;Introduction&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559685&amp;quot;:0,&amp;quot;335559738&amp;quot;:360,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft Security Exposure Management&amp;nbsp;(MSEM)&amp;nbsp;provides the Cyber Defense team with a unified, continuously updated&amp;nbsp;awareness of assets exposure, relevant attack paths&amp;nbsp;and&amp;nbsp;provides classifications to these findings. While MSEM continuously creates and updates these&amp;nbsp;finding,&amp;nbsp;the&amp;nbsp;Security Operations Center (SOC) Engineering team needs to reach to this data&amp;nbsp;and interact with it as a part&amp;nbsp;of their proactive discovery exercises.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft Security Copilot&amp;nbsp;(SCP)&amp;nbsp;on the other hand,&amp;nbsp;acts as an always-ready AI-powered&amp;nbsp;copilot&amp;nbsp;to the SOC Engineering team.&amp;nbsp;When&amp;nbsp;combined, the&amp;nbsp;situational awareness&amp;nbsp;from&amp;nbsp;MSEM and the quick and consistent retrieval capabilities of SCP,&amp;nbsp;MSEM and SCP&amp;nbsp;empower the SOC Engineers with a&amp;nbsp;natural-language front door into exposure insights and&amp;nbsp;attack paths,&amp;nbsp;this&amp;nbsp;combination&amp;nbsp;also opens the door to include MSEM content, and&amp;nbsp;the reasoning over this content&amp;nbsp;in&amp;nbsp;Security Copilot&amp;nbsp;prompts,&amp;nbsp;in&amp;nbsp;prompt books and&amp;nbsp;allows&amp;nbsp;the use of this&amp;nbsp;content in automation scenarios that leverage security copilot.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Traditionally,&amp;nbsp;a SOC person needs to navigate to Microsoft Security Advanced Hunting, retrieve data related to assets with a certain level of exposure, and then start&amp;nbsp;building&amp;nbsp;plans&amp;nbsp;for each asset&amp;nbsp;to reduce its exposure, a plan that needs to take into consideration the nature of the exposure, the location the asset is hosted and the characteristics of the asset&amp;nbsp;and requires working knowledge of each impacted system.&amp;nbsp;This approach:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="23" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Is&amp;nbsp;a time-consuming process, especially when taking into consideration the learning curve associated with learning about each exposure before deciding on the best course of exposure reduction; and&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:false,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="23" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Can&amp;nbsp;result in&amp;nbsp;some undesired habits like adapting a&amp;nbsp;reactive&amp;nbsp;approach, rather than a proactive approach;&amp;nbsp;Prioritizing assets with a certain exposure risk level;&amp;nbsp;or&amp;nbsp;attending to exposures that are already familiar to the person&amp;nbsp;reviewing the list of exposures and attack paths.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt;Overview of Exposure Management&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559685&amp;quot;:0,&amp;quot;335559738&amp;quot;:360,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft Security Exposure Management is a security solution that&amp;nbsp;provides&amp;nbsp;a unified view of security posture across company assets and workloads. Security Exposure Management enriches asset information with security context that helps you to proactively manage attack surfaces, protect critical assets, and explore and mitigate exposure risk.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Who uses Security Exposure Management?&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Security Exposure Management is aimed at:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Security and compliance admins responsible for&amp;nbsp;maintaining&amp;nbsp;and improving organizational security posture.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Security operations (SecOps) and partner teams who need visibility into data and workloads across organizational silos to effectively detect, investigate, and mitigate security threats.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Security architects responsible for solving systematic issues in overall security posture.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Chief Information Security Officers (CISOs) and security decision&amp;nbsp;makers who&amp;nbsp;need insights into organizational attack surfaces and exposure&amp;nbsp;in order to&amp;nbsp;understand security risk within organizational risk frameworks.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;What can I do with Security Exposure Management?&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;With Security Exposure Management, you can:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Get a unified view across the organization&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Manage and investigate attack surfaces&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Discover and safeguard critical assets&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Manage exposure&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="5" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Connect your data&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Reference links:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="width: 95.9259%; border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Overview&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="12" data-list-defn-props="{&amp;quot;335551500&amp;quot;:0,&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/microsoft-security-exposure-management" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;What is Microsoft Security Exposure Management&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&amp;nbsp;(MSEM)&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="12" data-list-defn-props="{&amp;quot;335551500&amp;quot;:0,&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/whats-new" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;What's ne&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;w in M&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;SEM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Get started&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="12" data-list-defn-props="{&amp;quot;335551500&amp;quot;:0,&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/get-started-exposure-management" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Start using M&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;SEM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="12" data-list-defn-props="{&amp;quot;335551500&amp;quot;:0,&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/prerequisites" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;MSEM&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&amp;nbsp;prerequisites&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="12" data-list-defn-props="{&amp;quot;335551500&amp;quot;:0,&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="5" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/overview-data-connectors" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;How to i&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;mport data from external data connector&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;s in&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;M&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;SEM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Concept&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="12" data-list-defn-props="{&amp;quot;335551500&amp;quot;:0,&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="6" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/critical-asset-management" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Learn about critical asset management&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&amp;nbsp;in MSEM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="12" data-list-defn-props="{&amp;quot;335551500&amp;quot;:0,&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="7" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/cross-workload-attack-surfaces" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Learn about attack surface managemen&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;t in MSEM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="12" data-list-defn-props="{&amp;quot;335551500&amp;quot;:0,&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="8" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/exposure-insights-overview" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Learn about exposure insight&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;s in MSEM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="12" data-list-defn-props="{&amp;quot;335551500&amp;quot;:0,&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="9" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/work-attack-paths-overview" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Learn about attack path&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;s in MSEM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;How-To Guide&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="12" data-list-defn-props="{&amp;quot;335551500&amp;quot;:0,&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="10" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/classify-critical-assets" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Review and classify critical asset&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;s in MSEM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="12" data-list-defn-props="{&amp;quot;335551500&amp;quot;:0,&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="11" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/initiatives" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Review security initiative&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;s in MSEM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="12" data-list-defn-props="{&amp;quot;335551500&amp;quot;:0,&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="12" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/security-metrics" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Investigate security metric&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;s in MSEM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="12" data-list-defn-props="{&amp;quot;335551500&amp;quot;:0,&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="13" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/security-recommendations" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Review security recommendation&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;s in MSEM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="12" data-list-defn-props="{&amp;quot;335551500&amp;quot;:0,&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="14" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/query-enterprise-exposure-graph" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Query the enterprise exposure grap&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;h MSEM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="12" data-list-defn-props="{&amp;quot;335551500&amp;quot;:0,&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="15" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/enterprise-exposure-map" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Explore with the attack surface ma&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;p in MSEM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="12" data-list-defn-props="{&amp;quot;335551500&amp;quot;:0,&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="16" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/review-attack-paths" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Review potential attack path&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;s in MSEM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="12" data-list-defn-props="{&amp;quot;335551500&amp;quot;:0,&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="17" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/integration-licensing" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Integration and licensing for M&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;SEM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="12" data-list-defn-props="{&amp;quot;335551500&amp;quot;:0,&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="18" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/compare-secure-score-security-exposure-management" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Compare M&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;SEM&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&amp;nbsp;with&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;S&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;ecure&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;S&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;core&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt;Overview of Security Copilot plugins and skills&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559685&amp;quot;:0,&amp;quot;335559738&amp;quot;:360,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft Security Copilot is a generative AI-powered assistant designed to augment security operations by accelerating detection, investigation, and response. Its extensibility through plugins and skills enables organizations to tailor the platform to their unique environments, integrate diverse data sources, and automate complex workflows.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Plugin Architecture and Categories:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Security Copilot supports a growing ecosystem of plugins categorized into:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="24" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;First-party&amp;nbsp;plugins&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;:&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;Native integrations with Microsoft services such as Microsoft Sentinel, Defender XDR, Intune, Entra, Purview, and Defender for Cloud.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559685&amp;quot;:2880,&amp;quot;335559739&amp;quot;:80,&amp;quot;335559991&amp;quot;:2520,&amp;quot;469777462&amp;quot;:[2880],&amp;quot;469777927&amp;quot;:[0],&amp;quot;469777928&amp;quot;:[1]}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="24" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Third-party&amp;nbsp;plugins&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;:&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;Integrations with external security platforms and ISVs, enabling broader telemetry and contextual enrichment.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559685&amp;quot;:2880,&amp;quot;335559739&amp;quot;:80,&amp;quot;335559991&amp;quot;:2520,&amp;quot;469777462&amp;quot;:[2880],&amp;quot;469777927&amp;quot;:[0],&amp;quot;469777928&amp;quot;:[1]}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="24" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Custom&amp;nbsp;plugins&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;:&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;User-developed extensions using KQL, GPT, or API-based logic to address specific use cases or data&amp;nbsp;sources.&lt;/SPAN&gt;&lt;img /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Plugins act as grounding sources—providing context, verifying responses, and enabling Copilot to&amp;nbsp;operate&amp;nbsp;across embedded experiences or standalone sessions. Users can toggle plugins on/off, prioritize sources, and personalize settings (e.g., default Sentinel workspace) to streamline investigations.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Skills and Promptbooks&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Skills in Security Copilot are modular capabilities that guide the AI in executing tasks such as incident triage, threat hunting, or policy analysis. These are often bundled into promptbooks, which are reusable, scenario-driven workflows that combine plugins, prompts, and logic to automate investigations or compliance checks.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Security analysts can create, manage, and share promptbooks across tenants, enabling consistent execution of best practices. Promptbooks can be customized to include plugin-specific logic, such as querying Microsoft Graph API or running KQL-based detections.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Role-Based Access and Governance&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Security Copilot enforces role-based access through Entra ID security groups:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="25" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Copilot&amp;nbsp;Owners:&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;Full access to manage plugins, promptbooks, and tenant-wide settings.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:80,&amp;quot;469777462&amp;quot;:[2880],&amp;quot;469777927&amp;quot;:[0],&amp;quot;469777928&amp;quot;:[1]}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="25" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Copilot&amp;nbsp;Contributors:&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;Can create sessions and use promptbooks but have limited plugin publishing rights.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;469777462&amp;quot;:[2880],&amp;quot;469777927&amp;quot;:[0],&amp;quot;469777928&amp;quot;:[1]}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Each embedded experience may require&amp;nbsp;additional&amp;nbsp;service-specific roles (e.g., Sentinel Reader, Endpoint Security Manager) to access relevant data. Governance files and onboarding templates help teams align plugin usage with organizational policies.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt;Connecting Exposure Management with Security Copilot&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559685&amp;quot;:0,&amp;quot;335559738&amp;quot;:360,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;There are multiple benefits of connecting MSEM with Security Copilot (as explained in section 1&amp;nbsp;[Introduction]&amp;nbsp;of this paper). We wrote a plugin with&amp;nbsp;two skills to harness the Exposure Management insights within Security Copilot and to eventually understand the&amp;nbsp;exposure of assets&amp;nbsp;hosted in&amp;nbsp;a particular&amp;nbsp;cloud platform&amp;nbsp;by&amp;nbsp;your organization and of assets belonging to&amp;nbsp;a&amp;nbsp;specific&amp;nbsp;user.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-contrast="auto"&gt;A high-level architecture of the connectivity looks like this:&lt;/SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The two skills of the plugins correspond to the following two use cases:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Obtain exposure of&amp;nbsp;an asset&amp;nbsp;hosted on&amp;nbsp;a particular cloud platform&amp;nbsp;by&amp;nbsp;your organization&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:false,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Obtain exposure of an asset belonging to&amp;nbsp;a&amp;nbsp;specific user&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:720}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;As a user you could also specify the exposure level for which you want to extract the data, in each of the above use cases.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt;Plugin&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt;Code (YAML)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559685&amp;quot;:0,&amp;quot;335559738&amp;quot;:360,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://github.com/Azure/Security-Copilot/tree/main/Plugins/Community%20Based%20Plugins/Microsoft%20Security%20Exposure%20Management" target="_blank"&gt;GitHub - Microsoft Security Exposure Management plugin for Security Copilot - YAML&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt;Proof of Concept (screen video)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559685&amp;quot;:0,&amp;quot;335559738&amp;quot;:360,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;img /&gt;
&lt;H4&gt;&lt;STRONG&gt;Conclusion&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Here, we proposed an alternative approach that drives up the SOC’s efficiency and helps the organization reduce the time from exposure discovery to exposure reduction. The alternative approach proposed allows the SOC person to retrieve assets that fit a certain profile, i.e. prompt Security Copilot to &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;“List all&amp;nbsp;assets hosted on Azure with Low Exposure Level”&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;and after all affected assets are retrieved, the user can then prompt Security Copilot to&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;“For each asset, help me&amp;nbsp;create a 7-days plan to reduce these exposures”&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;and can then finally conclude with the prompt&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;“Create an Executive Report, start by explaining to none-technical audience the risks associated with the identified exposures, then&amp;nbsp;list all affected assets, along with a summary of the steps needed&amp;nbsp;to reduce&amp;nbsp;the exposures identified”&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;. These prompts can also be&amp;nbsp;organized&amp;nbsp;in&amp;nbsp;a promptbook, further reducing the burden on the SOC&amp;nbsp;person, and can also&amp;nbsp;be made using Automation on regular intervals, where the automation can later email the report to&amp;nbsp;intended audience or can be further extended to create relevant tickets in the IT Service Management System.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;An&amp;nbsp;additional&amp;nbsp;approach to risk management is&amp;nbsp;to&amp;nbsp;keep an eye on highly targeted personas within the organization,&amp;nbsp;with the proposed integration a SOC&amp;nbsp;person&amp;nbsp;can prompt Security Copilot to find&amp;nbsp;“&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;What are the exposure risks associated with the devices&amp;nbsp;owned&amp;nbsp;by the&amp;nbsp;Contoso person&amp;nbsp;&lt;/SPAN&gt;&lt;A href="mailto:john.doe@contoso.com" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;john.doe@contoso.com&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;”. This helps the&amp;nbsp;SOC person&amp;nbsp;identify&amp;nbsp;and remediate attack paths targeting devices used by highly targeted persons, where the&amp;nbsp;SOC person&amp;nbsp;can,&amp;nbsp;within the same session,&amp;nbsp;start digging deeper into&amp;nbsp;finding any potential exploitation of these exposures,&amp;nbsp;get recommendations on how to reduce these exposures, and draft an action plan.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Oct 2025 18:19:39 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/redefining-cyber-defence-with-microsoft-security-exposure/ba-p/4459280</guid>
      <dc:creator>shrutiailani</dc:creator>
      <dc:date>2025-10-07T18:19:39Z</dc:date>
    </item>
    <item>
      <title>From idea to Security Copilot agent: Create, customize, and deploy</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/from-idea-to-security-copilot-agent-create-customize-and-deploy/ba-p/4458516</link>
      <description>&lt;P&gt;This week at &lt;A class="lia-external-url" href="https://secure.event.microsoft.com/" target="_blank" rel="noopener"&gt;Microsoft Secure&lt;/A&gt;, we &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/securitycopilotblog/agentic-security-your-way-build-your-own-security-copilot-agents/4454555" target="_blank" rel="noopener" data-lia-auto-title="announced the next big step forward in agentic security" data-lia-auto-title-active="0"&gt;announced the next big step forward in agentic security&lt;/A&gt;. In addition to Microsoft and partner-built agents, you can now &lt;A class="lia-external-url" href="https://www.youtube.com/watch?v=f-IosS4FYws" target="_blank" rel="noopener"&gt;create your own Security Copilot agents&lt;/A&gt;, extending the growing ecosystem of agents that help teams automate workflows, close gaps, and drive stronger security and IT outcomes.&lt;/P&gt;
&lt;P&gt;Why it matters: no two environments are the same. Out-of-the-box agents give you powerful starting points, but your workflows are unique. With custom agents, you get the flexibility to design and deploy solutions that fit your organization.&lt;/P&gt;
&lt;H5&gt;Two ways to build: Your choice, your workflow&lt;/H5&gt;
&lt;P&gt;Security Copilot gives you options. Analysts can easily build with a no-code interface. Developers can stay in their preferred coding environment. Either way, you end up with a fully functional, testable, and deployable agent.&lt;/P&gt;
&lt;P&gt;For full documentation and detailed guidance on building agents, check out the &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/copilot/security/developer/" target="_blank" rel="noopener"&gt;Microsoft Security Copilot documentation&lt;/A&gt;. But now, let’s walk through the key steps so you can get started building your own agent today.&lt;/P&gt;
&lt;H5&gt;Option 1: Build in Security Copilot, no coding required&lt;/H5&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;Step 1: &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN class="lia-text-color-21"&gt;Create in natural language&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Click ‘Build’ in the left nav, describe what you want your agent to do in plain language, and submit. Security Copilot will engage in a back-and-forth conversation to clarify and capture your intent so you start with precision.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;Step 2: &lt;STRONG&gt;Auto-generate the configuration&lt;/STRONG&gt;&lt;BR /&gt;Security Copilot instantly creates a starter setup, giving you:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;An agent name and description&lt;/LI&gt;
&lt;LI&gt;Clear instructions and input parameters&lt;/LI&gt;
&lt;LI&gt;Recommended tools pulled from the catalog, including Microsoft, partner, and Sentinel MCP tools&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This saves time and generates a strong foundation you can build on&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Step 3: &lt;STRONG&gt;Customize to fit your needs&lt;/STRONG&gt;&lt;BR /&gt;Tailor the configuration to your needs, you can edit any part. Update instructions, swap tools, or add new ones from the tool catalog. If the right tool isn’t available, you can create one in natural language or a form-based experience. You’re in full control of how your agent works.&lt;/P&gt;
&lt;img /&gt;&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Step 4:&lt;STRONG&gt; Keep YAML and no-code views aligned&lt;/STRONG&gt;&lt;BR /&gt;Every change you make is automatically reflected in the underlying YAML code. This ensures consistency between the no-code visual and code views, so both analysts and developers can work with confidence. Toggle on ‘view code’ to see it live.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Step 5:&lt;STRONG&gt; Test and elevate with autotune instruction optimization&lt;/STRONG&gt;&lt;BR /&gt;Run full end-to-end tests or test individual components to see how your agent performs. Security Copilot shows detailed outputs and a step-by-step activity map of the agent’s dynamic plan, including the tools, inputs, and outputs.&lt;/P&gt;
&lt;P&gt;While you can test without it, turning on autotune instruction optimization delivers major advantages:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Refined instruction recommendations you can copy directly into your config&lt;/LI&gt;
&lt;LI&gt;AI quality scoring on clarity, grounding, and detail to ensure your agent is effective before publishing&lt;/LI&gt;
&lt;LI&gt;Faster iteration with confidence your agent is tuned for real-world use&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Explore the activity graph tab to view a visual node map of the run, and click any node to see details of what happened at each step.&lt;/P&gt;
&lt;img /&gt;&lt;img /&gt;&lt;img /&gt;&lt;img /&gt;&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Step 6: &lt;STRONG&gt;Publish and share&lt;/STRONG&gt;&lt;BR /&gt;When you’re ready, publish the agent into your Security Copilot instance at either a user or workspace scope (depending on admin permissions). If you’re a partner, you can also download the agent code, publish to the Microsoft Partner Center and contribute it to the Microsoft Security Store for broader visibility and adoption by customers.&lt;/P&gt;
&lt;img /&gt;&lt;img /&gt;&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;Benefit:&lt;/STRONG&gt;&lt;STRONG&gt; &lt;/STRONG&gt;Build production-ready agents in minutes without writing a single line of code.&lt;/P&gt;
&lt;P&gt;It’s that easy to build an agent tailored to your unique workflows, and you are not limited to the Security Copilot portal. If you prefer a developer-friendly environment, you can build entirely in VS Code using GitHub Copilot and Microsoft Sentinel MCP tools. You still get AI-powered guidance, YAML scaffolding, and testing support, along with rich context from Sentinel data and the full platform toolset, all while staying in the environment that works best for you.&lt;/P&gt;
&lt;H5&gt;Option 2: Build in VS Code using GitHub Copilot + Microsoft Sentinel MCP Tools&lt;/H5&gt;
&lt;P&gt;Step 1: &lt;STRONG&gt;Set up your development environment&lt;/STRONG&gt;&lt;BR /&gt;Enable the Microsoft Sentinel MCP server in VS Code. This gives you direct access to the collection of Security Copilot agent creation MCP tools and integrates with GitHub Copilot for code generation – all while staying in your preferred workspace.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Step 2: &lt;STRONG&gt;Define agent behavior from natural language with platform context&lt;/STRONG&gt;&lt;BR /&gt;Describe the agent you want to build in natural language. GitHub Copilot interprets your intent, selects the relevant MCP tools, find relevant skills and tools in Security Copilot for your agent, and crafts the agent instructions. The agent YAML gets generated and outputted back to you. Because your agent is built on Microsoft Security Copilot and Sentinel, it automatically leverages rich data and tooling across the platform for context-aware, more effective results.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Step 3:&lt;STRONG&gt; Iterate, customize and extend your agent&lt;/STRONG&gt;&lt;BR /&gt;Modify instructions, add tools, or create new tools as needed. Use prompts to vibe code your edits or copy the YAML into the code editor and directly modify the agent YAML there. GitHub Copilot keeps the chat and code in sync.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Step 4: &lt;STRONG&gt;Deploy to Security Copilot for testing&lt;/STRONG&gt;&lt;BR /&gt;Once you’re ready to test your agent YAML, prompt GitHub Copilot to deploy the agent to your user scope. Then head to the Security Copilot portal to test and optimize your agent with autotune instruction optimization. Take advantage of detailed outputs, activity maps, and AI scoring to refine instructions and ensure your agent performs effectively in real-world scenarios.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;&lt;img /&gt;
&lt;P&gt;Step 5:&lt;STRONG&gt; Publish and share your agent&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Once validated, publish the agent into your Security Copilot instance at either user or workspace scope (depending on admin permissions). Partners can also download the agent code, &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/security/store/publish-a-security-copilot-agent-or-analytics-solution-in-security-store" target="_blank" rel="noopener"&gt;publish to the Microsoft Partner Center&lt;/A&gt;, and contribute it to the Microsoft Security Store for broader discoverability and adoption.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;What you get:&lt;/STRONG&gt; Full code-level control and the same AI-powered agent development experience while staying in your preferred workspace.&lt;/P&gt;
&lt;P&gt;Whichever approach you choose, you can build, test, and deploy agents that fit your workflows and environment. Microsoft Security Copilot and Microsoft Sentinel give you the tools and advanced AI guidance to create agents that work for your organization.&lt;/P&gt;
&lt;H5&gt;Explore the Microsoft Security Store&lt;/H5&gt;
&lt;P&gt;Automate your workflows with pre-built solutions. The &lt;A class="lia-external-url" href="https://securitystore.microsoft.com/" target="_blank" rel="noopener"&gt;Microsoft Security Store&lt;/A&gt; gives you a central place to discover and deploy agents and SaaS solutions created by Microsoft and partners. Browse ready-to-use solutions, learn from proven approaches, and adapt them with your own customizations. It’s the quickest way to expand your ecosystem of agents and accelerate impact. More resources about the Security Store: &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/security/store/what-is-security-store" target="_blank" rel="noopener"&gt;What is Security Store? Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;img /&gt;&lt;img /&gt;
&lt;H5&gt;Build, deploy, defend&lt;/H5&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/security/business/ai-machine-learning/microsoft-security-copilot?msockid=3078bb0cbe6e63980b2caeb9bf2262a5" target="_blank" rel="noopener"&gt;Security Copilot &lt;/A&gt;puts the power of agentic AI directly in your hands. Start with ready-to-use agents from Microsoft and partners, or create custom agents designed specifically for your environment and workflows. These agents streamline decision-making, surface critical insights, and free your team to focus on strategic security initiatives - making operations faster, smarter, and more responsive.&lt;/P&gt;
&lt;P&gt;Join us at &lt;A class="lia-external-url" href="https://ignite.microsoft.com/en-US/home" target="_blank" rel="noopener"&gt;Microsoft Ignite&lt;/A&gt;, online or in-person, for hands-on demos and insights on how Security Copilot agents empower teams to act faster and protect better.&lt;/P&gt;
&lt;H5&gt;More resources on building Security Copilot agents:&lt;/H5&gt;
&lt;UL&gt;
&lt;LI&gt;Watch the Mechanics video to see agents in action:&amp;nbsp;&lt;A class="lia-external-url" href="https://www.bing.com/videos/riverview/relatedvideo?pglt=171&amp;amp;q=building+security+copilot+agents+mechanics+video&amp;amp;cvid=9de8188d7af5419687fcf36b508066be&amp;amp;gs_lcrp=EgRlZGdlKgYIABBFGDkyBggAEEUYOTIICAEQ6QcY_FXSAQg2NzkxajBqMagCALACAA&amp;amp;PC=LCTS&amp;amp;ru=%2fsearch%3fpglt%3d171%26q%3dbuilding%2bsecurity%2bcopilot%2bagents%2bmechanics%2bvideo%26cvid%3d9de8188d7af5419687fcf36b508066be%26gs_lcrp%3dEgRlZGdlKgYIABBFGDkyBggAEEUYOTIICAEQ6QcY_FXSAQg2NzkxajBqMagCALACAA%26FORM%3dANNAB1%26PC%3dLCTS&amp;amp;mmscn=vwrc&amp;amp;mid=528B1F8794976C2CCE8E528B1F8794976C2CCE8E&amp;amp;FORM=WRVORC&amp;amp;ntb=1&amp;amp;msockid=3bd69f619fd211f0941d62e87f440f9b" target="_blank" rel="noopener"&gt;Security Copilot agents Mechanics video&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;For more detailed guidance on building agents, check out the&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/copilot/security/developer/" target="_blank" rel="noopener"&gt;Microsoft Security Copilot documentation&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Special thanks to my co-authors, Namrata Puri (Principal PM, Security Copilot) and Sherie Pan (PM, Security Copilot), for their insights and contributions&lt;/P&gt;</description>
      <pubDate>Fri, 03 Oct 2025 01:05:23 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/from-idea-to-security-copilot-agent-create-customize-and-deploy/ba-p/4458516</guid>
      <dc:creator>Lizzie_Heinze</dc:creator>
      <dc:date>2025-10-03T01:05:23Z</dc:date>
    </item>
    <item>
      <title>Agentic security your way: Build your own Security Copilot agents</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/agentic-security-your-way-build-your-own-security-copilot-agents/ba-p/4454555</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft Security Copilot is redefining how security and IT teams operate. Today at Microsoft Secure, we’re unveiling powerful updates that put genAI and agent-driven automation at the center of modern defense. In a world where threats move faster than ever, alerts pile up, and resources stay tight, Security Copilot delivers the competitive edge: contextual intelligence, a growing network of agents, and the flexibility to build your own.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The announcements focus on three key areas:&amp;nbsp;building&amp;nbsp;your own Security Copilot agents&amp;nbsp;for&amp;nbsp;tailored&amp;nbsp;workflows,&amp;nbsp;expanding the agent ecosystem with new Microsoft and partner solutions, and&amp;nbsp;improving agent quality and performance.&amp;nbsp;These updates build on the agents first introduced in March while giving&amp;nbsp;security and IT&amp;nbsp;teams more flexibility and control.&amp;nbsp;This is the blueprint for the next era of agentic defense, and it starts now.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H1&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Build your own Security Copilot a&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;gents&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;, your way&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H1&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;While we already offer a growing catalog of ready-to-use agents built by Microsoft and partners, we&amp;nbsp;know that no two environments are alike.&amp;nbsp;That’s&amp;nbsp;why Security Copilot empowers you to &lt;STRONG&gt;create&amp;nbsp;custom&amp;nbsp;agents&lt;/STRONG&gt; your way&amp;nbsp;for&amp;nbsp;tailored workflows&amp;nbsp;– whether&amp;nbsp;you're&amp;nbsp;an analyst with limited coding experience or a developer using your favorite&amp;nbsp;platform&amp;nbsp;–&amp;nbsp;you can build agents that fit your needs.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Heading 3 Char"&gt;Build agents&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Heading 3 Char"&gt;&amp;nbsp;in&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Heading 3 Char"&gt;&amp;nbsp;the Security Copilot&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Heading 3 Char"&gt;portal&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Users can now build agents with a simplified, no-code interface in the standalone Security Copilot experience. Simply describe the task or workflow in natural language, and Copilot automatically generates the agent code. You can edit components, add any additional tools, including Sentinel&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://aka.ms/sentinel/tools" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;MCP tools&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;from our rich tool catalog,&amp;nbsp;test the agent,&amp;nbsp;optimize&amp;nbsp;its instructions, and publish directly to your tenant. Create&amp;nbsp;dynamic, ready-to-use agents in minutes&amp;nbsp;–&amp;nbsp;without&amp;nbsp;writing any code.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Heading 3 Char"&gt;Build agents&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Heading 3 Char"&gt;&amp;nbsp;in&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Heading 3 Char"&gt;a preferred MCP server-enabled development environment&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;For teams with experienced developers, you can also use natural language and vibe-coding to build agents in a preferred MCP server-enabled coding platform, such as VS Code using GitHub Copilot. By enabling the Sentinel MCP server, developers can access MCP tools to build, refine, and deploy custom agents directly within their workspace. This approach gives full control over code, tools, and deployment while keeping the process within familiar development platforms.&amp;nbsp;&lt;/P&gt;
&lt;div data-video-id="https://www.youtube.com/watch?v=f-IosS4FYws&amp;amp;feature=youtu.be/1759237383508" data-video-remote-vid="https://www.youtube.com/watch?v=f-IosS4FYws&amp;amp;feature=youtu.be/1759237383508" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2Ff-IosS4FYws&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Df-IosS4FYws&amp;amp;image=http%3A%2F%2Fi.ytimg.com%2Fvi%2Ff-IosS4FYws%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;These options empower both technical and non-technical teams to rapidly create, test, and deploy custom Security Copilot agents. Organizations can automate workflows faster,&amp;nbsp;design&amp;nbsp;agents to their unique needs, and improve security and IT operations across the board.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H1 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Discover&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;new Security Copilot agents&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H1&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Since&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/blog/securitycopilotblog/automate-cybersecurity-at-scale-with-microsoft-security-copilot-agents/4394675" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Security Copilot agents were first introduced in March&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;, we have delivered more than a dozen Microsoft and partner-developed agents that help organizations tackle&amp;nbsp;real challenges&amp;nbsp;in security and IT operations. Analysts using the Conditional Access Optimization Agent in&amp;nbsp;Microsoft Entra have been able to quickly uncover policy gaps, closing an average of 26 gaps per customer in just one month, with 73% of early adopters acting on at least one recommendation. The Phishing Triage Agent in Microsoft Defender has allowed analysts to shift from reactive&amp;nbsp;sifting&amp;nbsp;to proactive resolution, reducing triage time by up to 78%.&amp;nbsp;Read how&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/en/customers/story/25330-st-lukes-university-health-network-microsoft-security-copilot" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;St Lukes University saves nearly&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;200 hours&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&amp;nbsp;monthly&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;in phishing alert triage and creating incident reports in minutes instead of hours.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;EM class="lia-align-center"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Quote Char"&gt;The Phishing Triage Agent is a game changer. &lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Quote Char"&gt;It’s&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Quote Char"&gt;&amp;nbsp;saving us&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Quote Char"&gt;nearly&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Quote Char"&gt;200&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Quote Char"&gt;&amp;nbsp;hours&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Quote Char"&gt;&amp;nbsp;monthly by autonomously handling and closing thousands of false positive alerts.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:2,&amp;quot;335551620&amp;quot;:2}"&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/EM&gt;&lt;EM class="lia-align-center"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="Quote"&gt;- Krista Arndt, ACISO, St. Luke’s University Health Network&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:2,&amp;quot;335551620&amp;quot;:2,&amp;quot;335559738&amp;quot;:160}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We’re continuing to build on this momentum with new agents designed to address additional security and IT scenarios. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The new&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Access Review Agent&amp;nbsp;in Microsoft Entra&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;tackles&amp;nbsp;a common challenge: reduce&amp;nbsp;access&amp;nbsp;review fatigue and approving access without review.&amp;nbsp;It&amp;nbsp;analyzes ongoing reviews, flags anomalies or unusual access patterns, and delivers actionable guidance in a conversational interface. Reviewers can approve, revoke, or request more details&amp;nbsp;right in&amp;nbsp;Microsoft&amp;nbsp;Teams,&amp;nbsp;helping them focus on the riskiest access, make faster&amp;nbsp;decisions, and&amp;nbsp;strengthen&amp;nbsp;compliance.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Wit&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;h innovations like this, we’re not just reducing fatigue—we’re redefining how access governance is done, setting the standard for security agents that adapt to the way people work. Learn more about the Access Review Agent &lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/the-microsoft-entra-agent-for-smarter-access-governance-access-review-agent/4279689" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-contrast="auto"&gt;And, with the growing range of agentic use cases, the new &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Microsoft&amp;nbsp;Security Store&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;is your one-stop shop to&amp;nbsp;discover,&amp;nbsp;purchase, and deploy Security Copilot agents built by Microsoft and trusted partners.&amp;nbsp;Find solutions&amp;nbsp;aligned&amp;nbsp;for SOC, IT, privacy, compliance, and governance teams, all in one place. By uniting discovery,&amp;nbsp;deployment, and publishing in a single experience, Security Store powers a thriving ecosystem&amp;nbsp;that gives your team&amp;nbsp;a unique advantage: access to an ever-expanding range of agent capabilities that evolve as fast as the challenges they face.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In addition to helping customers find the right solutions, Security Store also enables partners to bring their innovations to market. Partners can build and publish Security Copilot agents and SaaS solutions to grow their business and reach new customers.&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;Today, we are announcing&amp;nbsp;30&amp;nbsp;new partner-built agents&amp;nbsp;as well as 50 partner SaaS solutions in the Security Store.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;The launch of&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;STRONG&gt;30 new partner-built agents&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;brings forward solutions like:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;A&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Forensic Agent&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;by&amp;nbsp;glueckkanja&amp;nbsp;AG&amp;nbsp;delivers&amp;nbsp;deep-dive analysis of Defender XDR incidents&amp;nbsp;to accelerate investigations,&amp;nbsp;while their&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Privileged&amp;nbsp;Admin Watchdog&amp;nbsp;Agent&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;helps enforce zero standing privilege principles by getting rid of persistent admin&amp;nbsp;identities.&amp;nbsp;These innovations, along with their other 6 agents in the Security Store today,&amp;nbsp;demonstrate&amp;nbsp;how&amp;nbsp;glueckkanja&amp;nbsp;AG is empowering organizations to tackle a wide range of security and IT challenges.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;3 agents from&amp;nbsp;adaQuest&amp;nbsp;focused on automating investigation&amp;nbsp;and response to focus security teams on what matters.&amp;nbsp;A&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;STRONG&gt;Ransomware Kill Chain Investigator Agent&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;by&amp;nbsp;adaQuest&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;automates ransomware triage, an&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Entity Guard Investigator Agent&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;by&amp;nbsp;adaQuest&amp;nbsp;investigates Defender incidents, and an&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;&lt;STRONG&gt;Admin Guard Insight Agent&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;analyzes administrative activity, detects&amp;nbsp;anomalies, evaluates risk exposure&amp;nbsp;and compliance, offering actionable insights to improve administrative security posture.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;An&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;STRONG&gt;&amp;nbsp;Identity Workload ID Agent&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;by Invoke&amp;nbsp;empowers identity administrators and security&amp;nbsp;teams to manage and secure Workload Identities in Microsoft Entra,&amp;nbsp;helping to&amp;nbsp;reduce&amp;nbsp;risk,&amp;nbsp;strengthen&amp;nbsp;compliance,&amp;nbsp;provide more&amp;nbsp;control over identity sprawl.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;To learn more about all&amp;nbsp;new&amp;nbsp;partner-built agents&amp;nbsp;as well as partner SaaS offerings,&amp;nbsp;read the&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://aka.ms/securitystore/techblog" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;blog&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt; or head to the &lt;A href="https://securitystore.microsoft.com/" target="_blank" rel="noopener"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Security Store.&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H1 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Smarter, faster Security Copilot agents&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H1&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;High-quality LLM instructions are critical to agent performance, yet manually fine-tuning them is time-consuming and error-prone. We’re excited to introduce tools that help improve custom-built agent quality and performance, starting with &lt;STRONG&gt;autotune instruction optimization.&lt;/STRONG&gt; Autotune eliminates the need for manual tuning by automatically analyzing and refining agent instructions for optimal performance. Simply enable autotune during testing and submit, then receive a detailed results report with suggested prompt changes boost your agent’s AI quality score quickly and effortlessly. This optimization not only delivers better outcomes faster, but it also ensures that every agent in our ecosystem is always evolving - making them smarter, sharper, and more effective over time.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;But instructions are only part of the picture.&amp;nbsp;To&amp;nbsp;truly empower&amp;nbsp;agents,&amp;nbsp;context&amp;nbsp;and data is key.&amp;nbsp;By combining rich security signals from Microsoft Sentinel with advanced AI reasoning, Microsoft is setting a new standard for what agents can achieve—resolving incidents faster,&amp;nbsp;optimizing&amp;nbsp;workflows, and delivering deeper, more actionable insight. Security Copilot&amp;nbsp;leverages&amp;nbsp;a &lt;STRONG&gt;unified foundation of structured, graph, and semantic data from Sentinel &lt;/STRONG&gt;to give agents the context they need to connect the dots across your environment. This deep integration transforms what AI can do, enabling agents to reason, adapt, and act with precision at machine speed.&amp;nbsp;Read the Sentinel&amp;nbsp;graph&amp;nbsp;announcement&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://aka.ms/sentinel/graph/techblog" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;here&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H1&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Heading 2 Char"&gt;Get Started Today&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H1&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;With Security Copilot, the power of AI is now in your hands. Deploy ready-to-use agents from Microsoft and partners, or design custom agents built for your environment and workflows. These agents accelerate decision-making, surface critical insights, and let teams focus on strategic security work - turning complexity into clarity and speed. Explore Security Store today to experience how agentic automation is reshaping security operations and unlocking the full potential of your team.&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/copilot/security/developer/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Learn&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;more&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;about&amp;nbsp;how to create your own agents.&lt;/SPAN&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Deep dive into these innovations at &lt;/SPAN&gt;&lt;A href="https://register.secure.microsoft.com/?ocid=cmme8nzzcuz" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Secure&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;on Sept. 30, Oct. 1 or on demand. Then, join us at&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://ignite.microsoft.com/en-US/home?wt.mc_ID=Ignite2025_marx_corp_bl_oo_bl_Security_2_1" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Ignite&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;,&amp;nbsp;Nov,&amp;nbsp;17–21 in San Francisco, CA or online—for more innovations, hands-on labs, and expert connections.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Sep 2025 13:31:50 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/agentic-security-your-way-build-your-own-security-copilot-agents/ba-p/4454555</guid>
      <dc:creator>Dorothy_Li</dc:creator>
      <dc:date>2025-09-30T13:31:50Z</dc:date>
    </item>
    <item>
      <title>Supercharging Security Copilot with Logic Apps: Best practices and pro tips</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/supercharging-security-copilot-with-logic-apps-best-practices/ba-p/4456379</link>
      <description>&lt;P&gt;Integrating Microsoft Security Copilot with Azure Logic Apps enables security teams to automate investigations, orchestrate fast incident response, and unify workflows across the modern enterprise. By leveraging the unique strengths of both platforms, organizations can achieve scalable, efficient, and actionable security automation.&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Why Integrate Security Copilot with Logic Apps?&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Security Copilot brings AI-powered reasoning, automation, and natural language-to-action workflow capabilities. When paired with Logic Apps, it enables:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Seamless orchestration:&lt;/STRONG&gt; Launch incident investigations or automated email analysis with a single trigger.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Advanced automation:&lt;/STRONG&gt; Integrate across Microsoft and third-party security tools without heavy coding.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Consistent, repeatable outcomes:&lt;/STRONG&gt; Use Security Copilot's prompts and promptbooks for security-centric routines and reduce potential for error .&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Common scenarios include incident response initiation, scheduled security reports, and automated threat intelligence gathering.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Best Practices for designing robust workflows: &lt;/STRONG&gt;&lt;/H4&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;STRONG&gt;Identify your use case&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Not all scenarios require automation. Likewise, not all use cases benefit equally from combining automation with AI enrichment. The first step in unlocking value from Azure Logic Apps and Security Copilot is selecting the right use cases—those that align with both operational needs and the capabilities of these tools.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;To identify a suitable use case, we suggest the following guidelines:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI&gt;Start with repetitive tasks: Look for tasks that are performed frequently and follow a predictable pattern, such as alert enrichment, ticket creation, or user access reviews. These are ideal candidates for automation via Logic Apps.&lt;/LI&gt;
&lt;LI&gt;Assess the complexity of decision-making: If a task involves nuanced decision-making or contextual analysis—like investigating suspicious sign-ins or correlating threat indicators—Security Copilot’s AI capabilities can add significant value.&lt;/LI&gt;
&lt;LI&gt;Evaluate data availability and integration points: Ensure the use case involves systems and data sources that Logic Apps can connect to easily (e.g., Microsoft Sentinel, Entra ID, Office 365 E-mail). While it is possible to build your own custom, connectors, the availability of built-in connectors is a key consideration for the success of the integration.&lt;/LI&gt;
&lt;LI&gt;Consider the impact on security operations: Prioritize use cases that reduce manual effort, accelerate response times, or improve accuracy in threat detection and remediation.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Check for existing playbooks or templates: Use cases that align with existing Logic Apps templates or Security Copilot skills are easier to implement and test. Microsoft’s GitHub repository for Copilot for Security or the Sentinel GitHub repos are great places to start.&lt;/LI&gt;
&lt;LI&gt;Validate with stakeholders: Collaborate with SOC managers, incident responders, and IT admins to confirm that the selected use case addresses a real pain point and fits within current workflows.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL start="2"&gt;
&lt;LI&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;STRONG&gt;Optimize for performance, cost, and scale &lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Leverage direct skill invocation&lt;/STRONG&gt;: This has the effect of cost reduction and faster execution as the planning process that natural language prompts must go through is bypassed.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Optimize Security Copilot calls:&lt;/STRONG&gt; Limit Copilot calls within workflows to actions that benefit from AI-value addition such as reducing cognitive load on the Security Analyst or providing reasoning over disparate sets of facts while taking advantage of the investigation context powered by the wide range of Security Copilot skills that are native to the product&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Logic App tuning:&lt;/STRONG&gt;&amp;nbsp;Fine-tune trigger frequency and need for AI-value addition i.e. you may only need to attach a Logic App that submits security copilot prompts as part of its flow based on the complexity of the expected incidents vs all detection rules and resulting incidents&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;&lt;STRONG&gt;Pro Tips &lt;/STRONG&gt;&lt;/H4&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;i. Prototype cost-effective, complex workflows&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-90px"&gt;Prototype complex workflows with test data before deploying to production environments. You can do this by simulating Security Copilot prompts by using variable instead of actual calls to Security Copilot during the testing phase. Follow the following steps to do this:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-210px"&gt;a. Run the prompt or promptbook within Security Copilot to obtain the desired payload&lt;/P&gt;
&lt;P class="lia-indent-padding-left-210px"&gt;b. In this example we need to execute the following promptbook as part of a workflow that involves extraction of firewall device names and their owners so that we can send them an e-mail, alerting them to block public IPs exhibiting suspicious behaviors:&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Fig. 1 : Sample Promptbook for demo&lt;/EM&gt;&lt;/img&gt;
&lt;P class="lia-indent-padding-left-210px"&gt;c. Execute the promptbook&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Fig 2. Sample promptbook run&lt;/EM&gt;&lt;/img&gt;
&lt;P class="lia-indent-padding-left-210px"&gt;d. Next, we prompt Security Copilot to generate an output that can be used to generate a JSON formatted payload which we will eventually use to create a schema for our Logic App ParseJSON step.&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Fig 3. Output from promptbook run&lt;/EM&gt;&lt;/img&gt;
&lt;P class="lia-indent-padding-left-210px"&gt;e. Next, use a LLM, preferably an enterprise grade one such as Microsoft 365 or Security Copilot to generate the JSON payload&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Fig. 4: Generated sample payload&lt;/EM&gt;&lt;/img&gt;
&lt;P class="lia-indent-padding-left-210px"&gt;f. Next, use the sample payload to create the input schema for the ParseJSON step in the Logic App&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Fig. 5: Generate the schema using the sample payload&lt;/EM&gt;&lt;/img&gt;
&lt;P class="lia-indent-padding-left-210px"&gt;g. Initialize a variable and save the sample JSON-this will act as simulated output Parsed from the &lt;STRONG&gt;EvaluationResult&lt;/STRONG&gt; of the Promptbook from Security Copilot-effectively avoiding any costs involved with submitting the promptbook multiple times while you test and refine your Logic App&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Fig. 6 Image showing initialization and saving of variable&lt;/EM&gt;&lt;/img&gt;
&lt;P class="lia-indent-padding-left-210px"&gt;h. You can now run the Logic App several times without submitting any prompts to Security Copilot . If you must test with payloads that vary considerably you can still do that by not saving it in the variable, and selecting the “Run with payload” option then pasting your payload in the resulting box&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;&lt;BR /&gt;Fig. 7 Logic App snippet showing manual execution of Logic App&lt;/EM&gt;&lt;/img&gt;
&lt;P class="lia-indent-padding-left-30px lia-clear-both"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-210px"&gt;i. Once happy with Logic App flow and output you can replace the variable with the actual Security Copilot connection for your prompt or promptbook&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Fig. 8 Partial snapshot of sample Logic App&lt;/EM&gt;&lt;/img&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;ii. Session management:&lt;/STRONG&gt; Use the Session Id field to maintain investigative context—enabling multiple prompts within a workflow to share data without re-authentication. However, you can also spawn new sessions which allows for parallel execution of tasks without dependency on current session content&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;iii. Provide descriptive connector names:&lt;/STRONG&gt; Rename default connector names as you build out your logic app. This helps to troubleshoot the Logic App or maintain it, especially if it is being done by someone other than the one that built the original one. Example below describes exactly what the step does vs the default connector names:&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Fig. 9. Partial snapshot of Logic App showing descriptive names for Logic App connectors&lt;/EM&gt;&lt;/img&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;iv. Use custom code:&lt;/STRONG&gt; Enhance workflows with inline Python or Function App steps for specialized operations, such complex text transformations or data extractions. In the example below, a function app is used to apply a regex operation to extract the e-mail GUID. This comes in handy when you do not have a built-in connector for specific requirements or existing ones are not as efficient tor flexible as a function app would be.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Fig. 9 Logic App snippet showing use of the Function connector&lt;/EM&gt;&lt;/img&gt;
&lt;P class="lia-indent-padding-left-30px lia-clear-both"&gt;&amp;nbsp;&lt;STRONG&gt;v. Secure your Logic App workflows&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL class="lia-indent-padding-left-30px"&gt;
&lt;LI class="lia-indent-padding-left-30px" style="list-style-type: none;"&gt;
&lt;UL class="lia-indent-padding-left-30px"&gt;
&lt;LI class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;Managed identities:&lt;/STRONG&gt; Leverage managed identities across all connectors that support this authentication method whenever you use them in your flows.&lt;/LI&gt;
&lt;LI class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;Obfuscate secrets in run histories:&lt;/STRONG&gt; Actions that handle passwords, secrets, keys, or other sensitive information are visible by default from the run history of the Logic App. For example, if your logic app gets a secret from&amp;nbsp;Azure Key Vault&amp;nbsp;to use when authenticating an HTTP action, you may want to hide that secret from view by enabling the toggle button for supported actions. See below:&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Fig. 10 showing toggle set to "on" to enable securing of outputs&lt;/EM&gt;&lt;/img&gt;
&lt;P class="lia-indent-padding-left-30px lia-clear-both"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-150px"&gt;You may also use source IP addresses to perform access restrictions to this data. See details in this &lt;A href="https://learn.microsoft.com/en-us/azure/logic-apps/logic-apps-securing-a-logic-app?tabs=azure-portal" target="_blank" rel="noopener"&gt;document&lt;/A&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-150px"&gt;&lt;STRONG&gt;Log and monitor activities&lt;/STRONG&gt;: Enable logging for action taken by Logic Apps in your environment for greater visibility and control. If using Microsoft Sentinel, you can send Logic App activities to your Log Analytics workspace and benefit from queries such as the one below:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-150px"&gt;&lt;EM&gt;SentinelHealth&lt;/EM&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-150px"&gt;&lt;EM&gt;| where TimeGenerated &amp;gt; ago(30d)&lt;/EM&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-150px"&gt;&lt;EM&gt;| where SentinelResourceType == "Playbook"&lt;/EM&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-150px"&gt;&lt;EM&gt;| extend triggeredBy = ExtendedProperties.TriggeredByName.UserDisplayName&lt;/EM&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;vi. Use parameters&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-90px"&gt;Parameters allow workflows to be dynamic and reusable by enabling the injection of context-specific data—such as usernames, incident IDs, or IP addresses—at runtime. This flexibility means a single Logic App can serve multiple scenarios without hardcoding values, improving maintainability and scalability. Additionally, parameters help enforce security best practices by supporting secure input/output handling, which protects sensitive information during execution.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Conclusion&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P class=""&gt;Security Copilot and Logic Apps together unlock a flexible, AI-powered automation platform for any security operations team. By following these best practices—efficient prompt design, session context management, robust security controls, and scheduled automation—organizations can level up their security response and proactivity. To go even further, explore Microsoft’s official documentation, the Security Copilot Adoption Hub, &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/category/security-copilot/blog/securitycopilotblog" target="_blank" rel="noopener" data-lia-auto-title="Techcommunity blog portal" data-lia-auto-title-active="0"&gt;Techcommunity blog portal&lt;/A&gt; and our GitHub repo. I f you have any feedback or ideas on how you think we can further improve the value delivered by these solutions working together, please reach out. Always happy to hear back from you.&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class=""&gt;&lt;STRONG&gt;Additional resources&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;A class="lia-external-url" href="https://github.com/Azure/Security-Copilot/tree/main/Logic%20Apps" target="_blank" rel="noopener"&gt;Security-Copilot/Logic Apps &lt;/A&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;A class="lia-external-url" href="https://adoption.microsoft.com/en-us/security-copilot/" target="_blank" rel="noopener"&gt;Microsoft Security Copilot – Microsoft Adoption&lt;/A&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-category" href="https://techcommunity.microsoft.com/category/security-copilot" target="_blank" rel="noopener" data-lia-auto-title="Category: Security Copilot | Microsoft Community Hub" data-lia-auto-title-active="0"&gt;Category: Security Copilot | Microsoft Community Hub&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Sep 2025 15:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/supercharging-security-copilot-with-logic-apps-best-practices/ba-p/4456379</guid>
      <dc:creator>Inwafula</dc:creator>
      <dc:date>2025-09-24T15:00:00Z</dc:date>
    </item>
    <item>
      <title>What’s new in Microsoft Security Copilot</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/what-s-new-in-microsoft-security-copilot/ba-p/4442220</link>
      <description>&lt;P&gt;Security and IT teams move fast - and so does Security Copilot. This month, we’re delivering powerful new capabilities that help security and IT professionals investigate threats, manage identities, and automate protection with greater speed and precision. From AI-powered triage and policy optimization to smarter data exploration and expanded language support, these updates are designed to help you stay ahead of threats, reduce manual effort, and unlock new levels of efficiency.&lt;/P&gt;
&lt;P&gt;Let’s dive into what’s new.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Improve IT efficiency with Copilot in Microsoft Intune – now generally available&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;IT admins can now use Security Copilot in Intune which includes a dedicated data exploration experience, allowing them to ask questions, extract insights, and take action - all from within the Intune admin center. Whether it’s identifying non-compliant devices, managing updates, or automating remediation, Copilot simplifies complex workflows and brings data and actions together in one place.&lt;BR /&gt;Learn more: &lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/security/blog/2025/07/14/improving-it-efficiency-with-microsoft-security-copilot-in-microsoft-intune-and-microsoft-entra/?msockid=3078bb0cbe6e63980b2caeb9bf2262a5" target="_blank"&gt;Copilot in Microsoft Intune announcement&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Streamline identity security with Copilot in Microsoft Entra – now generally available&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Security Copilot in Microsoft Entra now brings AI-assisted investigation and identity management directly into the Entra admin center. Admins can ask natural language questions to troubleshoot sign-ins, review access, monitor tenant health, and analyze role assignments - without writing queries or switching tools. With expanded coverage and improved performance, Copilot helps teams move faster, close gaps, and stay ahead of threats.&lt;BR /&gt;Learn more: &lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/security/blog/2025/07/14/improving-it-efficiency-with-microsoft-security-copilot-in-microsoft-intune-and-microsoft-entra/?msockid=3078bb0cbe6e63980b2caeb9bf2262a5" target="_blank"&gt;Copilot in Microsoft Entra announcement&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Close gaps quickly with the Conditional Access Optimization Agent – now generally available&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The Conditional Access Optimization Agent in Microsoft Entra brings AI-powered automation to identity workflows. The agent runs autonomously to detect gaps, overlaps, and outdated policy assignments - then recommends precise, one-click remediations to close them fast.&lt;/P&gt;
&lt;P&gt;Key benefits include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Autonomous protection: Automatically identifies users and apps not covered by policies&lt;/LI&gt;
&lt;LI&gt;Explainable decisions: Plain-language summaries and visual activity maps&lt;/LI&gt;
&lt;LI&gt;Custom adaptability: Learns from natural-language feedback and supports business rules&lt;/LI&gt;
&lt;LI&gt;Full auditability: All actions logged for compliance and transparency&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;As one security leader put it:&lt;/P&gt;
&lt;P&gt;“The Conditional Access Optimization Agent is like having a security analyst on call 24/7. It proactively identifies gaps in our Conditional Access policies and ensures every user is protected from day one... It’s a secure path to innovation that every chief information security officer can trust.”&lt;BR /&gt;—&lt;EM&gt;Julian Rasmussen, Senior Consultant and Partner, Point Taken, Microsoft MVP&lt;/EM&gt;&lt;BR /&gt;Learn more: &lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/security/blog/2025/07/14/improving-it-efficiency-with-microsoft-security-copilot-in-microsoft-intune-and-microsoft-entra/?msockid=3078bb0cbe6e63980b2caeb9bf2262a5" target="_blank"&gt;Conditional Access Optimization Agent in Microsoft Entra GA announcement&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Investigate phishing alerts faster with the new Phishing Triage Agent in Microsoft Defender&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The Phishing Triage Agent in Microsoft Defender is now in public preview, bringing autonomous, AI-powered threat detection to your SOC workflows. Powered by large language models, the agent performs deep semantic analysis of emails, URLs, and files to determine whether a submission is a phishing threat or a false alarm - without relying on static rules.&lt;/P&gt;
&lt;P&gt;It learns from analyst feedback, adapts to your organization’s patterns, and provides clear, natural language explanations for every verdict. A visual decision map shows exactly how the agent reached its conclusion, making the process fully transparent and reviewable.&lt;/P&gt;
&lt;P&gt;Learn more: &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftthreatprotectionblog/announcing-public-preview-phishing-triage-agent-in-microsoft-defender/4438301" data-lia-auto-title="Announcing public preview Phishing Triage Agent in Microsoft Defender" data-lia-auto-title-active="0" target="_blank"&gt;Announcing public preview Phishing Triage Agent in Microsoft Defender&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The Threat Intelligence Briefing Agent is now in Public Preview: Build organization-specific briefings in just minutes&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The Threat Intelligence Briefing Agent has entered public preview in the Security Copilot standalone experience, transforming how security teams stay ahead of emerging threats. With this powerful agent, creating highly relevant, organization-specific threat intelligence briefings now takes minutes rather than hours or days, empowering teams to act with speed and confidence. Through real-time dynamic reasoning, the agent surfaces the most relevant threat intelligence based on attributes such as the organization's industry, geographic location, and unique attack surface to deliver critical context and invaluable situational awareness.&lt;/P&gt;
&lt;P&gt;Learn more: &lt;A class="lia-external-url" href="https://aka.ms/ti-briefing-agent" target="_blank"&gt;aka.ms/ti-briefing-agent&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Streamline operations with workspace-level management &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Security Copilot now supports workspaces, giving organizations a flexible way to segment environments by team, region, or business unit. With workspaces now in public preview, admins can align access, data boundaries, and SCU capacity with operational and compliance needs. Each workspace supports role-based access control, localized prompt history, and independent capacity planning – making it easier to manage complex, distributed security and IT operations.&lt;/P&gt;
&lt;P&gt;As part of this model, workspace-level plugin management is now generally available, allowing admins to configure plugin settings at the workspace or organization level. This eliminates the need for per-user setup and improves efficiency across large environments.&lt;/P&gt;
&lt;P&gt;Learn more: &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/securitycopilotblog/new-tools-for-security-copilot-management-and-capacity-planning/4432723" data-lia-auto-title="New tools for Security Copilot management and capacity planning " data-lia-auto-title-active="0" target="_blank"&gt;New tools for Security Copilot management and capacity planning &lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Plan smarter with the new Security Copilot Capacity Calculator&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The Security Copilot Capacity Calculator is now available in the standalone experience (Azure account required), helping teams estimate how many SCUs they may need.&lt;BR /&gt;Security Copilot supports:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Provisioned SCUs for predictable workloads&lt;/LI&gt;
&lt;LI&gt;Overage SCUs to scale with variable workloads&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Teams can estimate initial capacity using the capacity calculator, monitor usage in the in-product usage dashboard, and adjust their SCU allocation as needed. Learn more about &lt;A class="lia-external-url" href="https://azure.microsoft.com/en-us/pricing/details/microsoft-security-copilot/" target="_blank"&gt;Security Copilot pricing here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Learn more: &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/securitycopilotblog/new-tools-for-security-copilot-management-and-capacity-planning/4432723" data-lia-auto-title="New tools for Security Copilot management and capacity planning" data-lia-auto-title-active="0" target="_blank"&gt;New tools for Security Copilot management and capacity planning&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Automate Entra workflows with embedded NL2API skill&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Security Copilot can now reason over Microsoft Graph APIs to answer complex, multi-stage questions across Entra resources. This embedded experience in Entra, powered by the NL2API skill, is now generally available - bringing advanced automation and intelligence directly into your Entra workflows.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Get faster suggestions with dynamic suggested prompts for Entra skills&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Dynamic suggested prompts are now generally available for Entra skills, offering faster and more deterministic follow-up suggestions using direct skill invocation - bypassing the orchestrator for improved performance.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Meet compliance needs with FedRAMP High authorization for Security Copilot&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Security Copilot is now included within the &lt;A class="lia-external-url" href="https://www.fedramp.gov/" target="_blank"&gt;Federal Risk and Authorization Management Program (FedRAMP)&lt;/A&gt; High Authorization for &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/security/fundamentals/feature-availability#microsoft-365-integration" target="_blank"&gt;Azure Commercial&lt;/A&gt;. This Provisional Authorization to Operate (P-ATO) within the existing FedRAMP High Azure Commercial environment was approved by the FedRAMP Joint Authorization Board (JAB). This milestone marks a significant step forward in our mission to bring Microsoft Security Copilot’s cutting-edge AI-powered security capabilities to our &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/office365/servicedescriptions/office-365-platform-service-description/office-365-us-government/gcc" target="_blank"&gt;Government Community Cloud (GCC)&lt;/A&gt; customers. Stay tuned for updates on when Security Copilot will be fully available for GCC customers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Expand global reach with Korean language and Swiss data residency&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Security Copilot now supports Korean in both standalone and embedded experiences. For a full list of supported languages, visit &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/copilot/security/supported-languages" target="_blank"&gt;Supported languages in Microsoft Security Copilot&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Additionally, customers in Switzerland can now benefit from Swiss region data residency, ensuring Security Copilot data is stored within Swiss boundaries to meet local compliance requirements.&lt;/P&gt;
&lt;P&gt;Learn more: &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/copilot/security/copilot-security-availability-recovery" target="_blank"&gt;Availability and recovery of Security Copilot&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Improve accuracy and scale with GPT-4.1 and large output support&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;We’ve upgraded Security Copilot to support GPT-4.1 across all experiences at the evaluation level, offering larger context windows, improved interactions, and up to 50% accuracy improvements in some scenarios.&lt;/P&gt;
&lt;P&gt;Also now generally available is large output support, which removes the previous 2MB limit for data used in LLMs – giving teams more flexibility when working with large datasets.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Audit agent changes with Purview UAL integration&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Agent administration auditing is now generally available in Microsoft Purview Unified Audit Log, allowing teams to trace agent creation, updates, and deletions with detailed metadata for improved visibility and compliance.&lt;/P&gt;
&lt;P&gt;Learn more: &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/copilot/security/audit-log" target="_blank"&gt;Access the Security Copilot audit log &lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Stay tuned and explore more!&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Security Copilot is transforming how security and IT teams operate – bringing AI-powered insights, automation, and decision support into everyday workflows. With new capabilities landing every month, the pace of innovation is accelerating.&lt;/P&gt;
&lt;P&gt;We’ll be back in September with more updates. Until then, explore these resources to get hands-on, deepen your understanding, and see what’s possible:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://adoption.microsoft.com/en-us/security-copilot/video-hub/" target="_blank"&gt;Security Copilot Video Hub&lt;/A&gt; – Watch demos and walkthroughs to see Security Copilot in action&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/security/business/ai-machine-learning/microsoft-security-copilot?msockid=3078bb0cbe6e63980b2caeb9bf2262a5" target="_blank"&gt;Microsoft Security Copilot Website&lt;/A&gt; – Learn about capabilities, use cases, and product details&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://adoption.microsoft.com/en-us/security-copilot/" target="_blank"&gt;Security Copilot Adoption Hub&lt;/A&gt; – Access rollout guides, templates, and best practices&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Don’t miss&amp;nbsp;&lt;STRONG&gt;Microsoft Secure digital event on September 30&lt;SUP&gt;th&lt;/SUP&gt;&lt;/STRONG&gt; - we’ll be announcing exciting new capabilities for Security Copilot and sharing what’s next in AI-powered security. &lt;A class="lia-external-url" href="https://info.microsoft.com/FY26-Microsoft-Security-Sentinel-Innovation_Interest-Form.html" target="_blank"&gt;Register now&lt;/A&gt; to be the first to hear the announcements and see what’s coming.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Aug 2025 17:47:10 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/what-s-new-in-microsoft-security-copilot/ba-p/4442220</guid>
      <dc:creator>Lizzie_Heinze</dc:creator>
      <dc:date>2025-08-11T17:47:10Z</dc:date>
    </item>
    <item>
      <title>Smarter Prompts for Smarter Investigations: Dynamic Prompt Suggestions in Security Copilot</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/smarter-prompts-for-smarter-investigations-dynamic-prompt/ba-p/4432135</link>
      <description>&lt;P&gt;When a security analyst turns to an AI system for help—whether to hunt threats, investigate alerts, or triage incidents—the first step is usually a natural language prompt. But if that prompt is too vague, too general, or not aligned with the system’s capabilities, the response won’t be helpful. In high-stakes environments like cybersecurity, that’s not just a missed opportunity, it’s a risk.&lt;/P&gt;
&lt;P&gt;That’s exactly the problem we tackled in our recent paper, &lt;EM&gt;Dynamic Context-Aware Prompt Recommendations for Domain-Specific Applications&lt;/EM&gt;, now published and deployed as a new skill in Security Copilot.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Why Prompting Is a Bigger Problem in Security Than It Seems&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;LLMs have made impressive progress in general-purpose settings—helping users write emails, summarize documents, or answer trivia. These systems often include smart prompt recommendations based on the flow of conversation. But when you shift into domain-specific systems like &lt;EM&gt;Microsoft Security Copilot&lt;/EM&gt;, the game changes.&lt;/P&gt;
&lt;P&gt;Security analysts don’t ask open-ended questions. They ask task-specific ones:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;“List devices that ran a malicious file in the last 24 hours.”&lt;/LI&gt;
&lt;LI&gt;“Correlate failed login attempts across services.”&lt;/LI&gt;
&lt;LI&gt;“Visualize outbound traffic from compromised machines.”&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These questions map directly to skills—domain-specific functions that query data, connect APIs, or launch workflows. And that means prompt recommendations need to be tightly aligned with the available skills, underlying datasets, and current investigation context. General-purpose prompt systems don’t know how to do that.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;What Makes Domain-Specific Prompting Hard&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Designing prompt recommendations for systems like Security Copilot comes with unique constraints:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Constrained Skill Set:&lt;/STRONG&gt; The AI can only take actions it’s configured to support. Prompts must align with those skills—no hallucinations allowed.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Evolving Context:&lt;/STRONG&gt; A single investigation might involve multiple rounds of prompts, results, follow-ups, and pivots. Prompt suggestions must adapt dynamically.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Deep Domain Knowledge:&lt;/STRONG&gt; It’s not enough to suggest “Check network logs.” A useful prompt needs to reflect how real analysts work—across Defender, Sentinel, and more.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Scalability:&lt;/STRONG&gt; As new skills are added, prompt systems must scale without requiring constant manual curation or rewriting.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H5&gt;&lt;STRONG&gt;Our Approach: Dynamic, Context-Aware, and Skill-Constrained&lt;/STRONG&gt;&lt;/H5&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We introduce a dynamic prompt recommendation system for Security Copilot. The key innovations include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Contextual understanding of the session:&lt;/STRONG&gt; We track the user’s investigation path and surface prompts that are relevant to what they’re doing &lt;EM&gt;now&lt;/EM&gt;, not just generic starters.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Skill-awareness:&lt;/STRONG&gt; The system knows what internal capabilities exist (e.g., “list devices,” “query login events”) and only recommends prompts that can be executed via those skills.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Domain knowledge injection:&lt;/STRONG&gt; By encoding metadata about products, datasets, and typical workflows (e.g., MITRE attack stages), the system produces prompts that make sense in security analyst workflows.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Scalable prompt generation:&lt;/STRONG&gt; Rather than relying on hardcoded lists, our system dynamically generates and ranks prompt suggestions.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;&lt;STRONG&gt;What It Looks Like in Action&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;The dynamic prompt suggestion system is now live in Microsoft Entra, available in both Embedded and Immersive experiences. When a user enters a natural language prompt, the system automatically suggests several context-aware follow-up prompts, based on the user's prior interactions and the system’s understanding of the current task.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;These suggestions are generated in real time—users can simply click on a suggestion, and it’s executed immediately, allowing for quick and seamless follow-up queries without needing to rephrase or retype.&lt;/P&gt;
&lt;P&gt;Let’s walk through two examples:&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Embedded Experience&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;We begin with the prompt: &lt;STRONG&gt;"How does Microsoft determine Risky Users?"&lt;/STRONG&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The system returns the response and generates 3 follow-up suggestions, such as: &lt;STRONG&gt;"List dismissed risky detections."&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;We click on that suggestion, which executes the query and shows the results.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;New suggestions continue to appear after each prompt execution, making it easy to explore related insights.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Immersive Experience&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;We start with a prompt: &lt;STRONG&gt;"Who am I?"&lt;/STRONG&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Among the 5 suggested prompts, we select: &lt;STRONG&gt;"List the groups user nase74@woodgrove.ms is a member of."&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The user clicks, the query runs, and more follow-up suggestions appear, enabling a natural, guided flow throughout the session.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;H5&gt;&lt;STRONG&gt;Why This Matters for the Future of Security AI&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Prompting isn’t just an interface detail—it’s the entry point to intelligence. And in cybersecurity, where time, accuracy, and reliability matter, we need AI systems that are not just capable, but &lt;EM&gt;cooperative&lt;/EM&gt;. Our research contributes to a future where security analysts don’t have to be prompt engineers to get the most out of AI.&lt;/P&gt;
&lt;P&gt;By making prompt recommendations dynamic, contextual, and grounded in real domain knowledge, we help close the gap between LLM potential and security reality.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Interested in learning more?&lt;/STRONG&gt;&lt;BR /&gt;Check out the full paper: &lt;A href="https://arxiv.org/abs/2506.20815" target="_blank" rel="noopener"&gt;&lt;EM&gt;Dynamic Context-Aware Prompt Recommendations for Domain-Specific Applications&lt;/EM&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;If you're using or building upon this work in your own research, we’d appreciate you citing our paper:&lt;/P&gt;
&lt;LI-CODE lang=""&gt;@article {tang2025dynamic,
  title={Dynamic Context-Aware Prompt Recommendation for Domain-Specific AI Applications},
  author={Tang, Xinye and Zhai, Haijun and Belwal, Chaitanya and Thayanithi, Vineeth and Baumann, Philip and Roy, Yogesh K},
  journal={arXiv preprint arXiv:2506.20815},
  year={2025}
}
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Jul 2025 16:18:28 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/smarter-prompts-for-smarter-investigations-dynamic-prompt/ba-p/4432135</guid>
      <dc:creator>xinye-tang</dc:creator>
      <dc:date>2025-07-14T16:18:28Z</dc:date>
    </item>
    <item>
      <title>New tools for Security Copilot management and capacity planning</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/new-tools-for-security-copilot-management-and-capacity-planning/ba-p/4432723</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Last year, we launched &lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/en-us/security/business/ai-machine-learning/microsoft-security-copilot" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Security Copilot&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; with a bold goal: to help organizations protect at the speed of AI. Since then, Security Copilot has been transforming how IT and security operations teams respond to threats and manage their environments. In fact, research from live operations indicates that Security Copilot users have seen impact like a &lt;/SPAN&gt;&lt;A href="https://aka.ms/SecurityCopilotMTTRResearch" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;30% reduction in mean time to resolution&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; for SOC teams, and a &lt;/SPAN&gt;&lt;A href="https://aka.ms/SecurityCopilot-productivitygains" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;54% decrease in time to resolve a device policy conflict&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; for IT teams.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;As adoption has grown, so has the complexity of customer needs. In many organizations, different teams, business units, and regions require distinct approaches to data access, capacity planning, and tooling. At the same time, customers want the flexibility to start small, test scenarios, and scale usage over time, without committing to long-term contracts.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To meet these needs, Security Copilot is offered as a consumptive solution, allowing organizations to provision Security Compute Units (SCUs) as needed. This flexible model lowers the barrier to entry and encourages experimentation. And now, with&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; workspaces &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;and the &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Security Copilot capacity calculator &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;to help manage capacity, customers can adopt Security Copilot with even more confidence and control.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H1 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Workspaces&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H1&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Security operations don’t happen in a vacuum – different teams, business units, and regions have unique operational needs. This is why we’re excited to launch workspaces in public preview – a major enhancement to how teams can manage access, resources, and collaboration within Security Copilot. Workspaces provide a flexible way to segment environments, making it easier to align access and capacity with organizational needs, legal structures, or compliance requirements.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Let’s take the example of a multinational organization with separate security and IT teams in North America, Europe, and Asia. With workspaces, this company can realize benefits in:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Data boundaries:&lt;/STRONG&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Each regional team operates within its own dedicated workspace, keeping data like prompt history local and accessible only to that team. This isolation ensures information stays relevant to the team and supports compliance with regional data residency requirements and internal policies.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Role-based access control:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;Only authorized users specified by the admin have access to each workspace, and workspace management is restricted to users with administrator roles.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Capacity planning:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; SCUs can be provisioned per workspace, giving admins the ability to right-size capacity based on each team’s workload. APAC can scale up during a surge while the US conserves usage during a quiet period.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Note: multi-workspace support is now available in Security Copilot, enabling users to manage prompt sessions across multiple workspaces. However, available agents that run autonomously are currently limited to a single workspace, and embedded experiences continue to route traffic exclusively through the tenant-level default workspace. Please refer to the &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/copilot/security/workspaces-overview" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;documentation&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; for full details.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;H1 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Security Copilot &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;c&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;apacity&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt; calculator&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H1&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;One of the most common questions we hear from customers is: “How many SCUs do I need to get started with Security Copilot?” Given the dynamic nature of AI-powered security workflows, forecasting compute needs can be a challenge, especially for teams just starting their journey. To make planning easier, we’re excited to announce the launch of the &lt;/SPAN&gt;&lt;A href="https://securitycopilot.microsoft.com/calculator" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Security Copilot &lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;c&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;apacity&lt;/SPAN&gt; &lt;SPAN data-ccp-charstyle="Hyperlink"&gt;c&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;alculator&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;, now available in the Security Copilot standalone experience (Azure account required).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This tool offers a practical starting point to help estimate how many SCUs your organization may require. With a few clicks, customers can get an idea of estimated SCU usage based on inputs like number of users in an embedded Security Copilot experience. While actual consumption may vary as it depends on real-time prompt activity, the calculator serves as a helpful guide for initial provisioning and budget planning.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Once you’ve estimated your baseline needs, you can &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/copilot/security/get-started-security-copilot" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;get started&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; in Security Copilot or in the Azure portal. Security Copilot offers two flexible models to support both predictable workloads and unplanned spikes in usage:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Provisioned SCUs:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;Ideal for predictable, ongoing operations. A minimum of one provisioned SCU is required.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Overage SCUs:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; Designed for variable demand. Overage SCUs allow usage to scale seamlessly, and customers only pay for what they use, up to their chosen optional overage limit.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;With the capacity calculator, organizations can confidently begin their Security Copilot journey and better manage usage to align with their business needs. After getting started, teams can monitor consumption through the in-product usage dashboard and adjust capacity as demand fluctuates. Learn more about &lt;/SPAN&gt;&lt;A href="https://azure.microsoft.com/en-us/pricing/details/microsoft-security-copilot/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Security Copilot pricing here&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H1 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Get Started with Security Copilot today&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H1&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Together, workspaces and the capacity calculator provide organizations with deeper insight, flexibility, and control over their Security Copilot usage. These features address the real-world challenges of managing diverse teams, complex environments, and evolving workloads. Whether you’re just starting your Security Copilot journey or looking to optimize your existing usage, these tools help you right-size capacity, maintain compliance, and deliver actionable AI assistance for your security and IT teams.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Discover Security Copilot use cases, best practices, and customer success stories in the &lt;/SPAN&gt;&lt;A href="https://adoption.microsoft.com/en-us/security-copilot/video-hub/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Security Copilot adoption hub&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&amp;nbsp;Learn more about our most recent Security Copilot innovations for IT teams &lt;/SPAN&gt;&lt;A href="https://aka.ms/CopilotIntuneandEntraGA" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;her&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;e&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;. If you have questions or need support, don’t hesitate to &lt;/SPAN&gt;&lt;A href="https://info.microsoft.com/ww-landing-security-generic-contact-me.html?culture=en-us&amp;amp;country=us" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;contact us&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; or reach out to your account manager.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jul 2025 18:21:36 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/new-tools-for-security-copilot-management-and-capacity-planning/ba-p/4432723</guid>
      <dc:creator>donnalee</dc:creator>
      <dc:date>2025-07-16T18:21:36Z</dc:date>
    </item>
    <item>
      <title>Using parameterized functions with KQL-based custom plugins in Microsoft Security Copilot</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/using-parameterized-functions-with-kql-based-custom-plugins-in/ba-p/4419286</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In this blog, I will walk through how you can build functions based on a Microsoft Sentinel Log Analytics workspace for use in custom KQL-based plugins for Security Copilot. The same approach can be used for Azure Data Explorer and Defender XDR, so long as you follow the specific guidance for either platform. A link to those steps is provided in the &lt;STRONG&gt;Additional Resources&lt;/STRONG&gt; section at the end of this blog.&lt;/P&gt;
&lt;P&gt;But first, it’s helpful to clarify what parameterized functions are and why they are important in the context of Security Copilot KQL-based plugins. Parameterized functions accept input details (variables) such as lookback periods or entities, allowing you to dynamically alter parts of a query without rewriting the entire logic&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Parameterized functions are important in the context of Security Copilot plugins because of:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Dynamic prompt completion:&lt;/STRONG&gt;&lt;BR /&gt;Security Copilot plugins often accept user input (e.g., usernames, time ranges, IPs). Parameterized functions allow these inputs to be consistently injected into KQL queries without rebuilding query logic.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Plugin reusability:&lt;/STRONG&gt;&lt;BR /&gt;By using parameters, a single function can serve multiple investigation scenarios (e.g., checking sign-ins, data access, or alerts for any user or timeframe) instead of hardcoding different versions.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Maintainability and modularity:&lt;/STRONG&gt;&lt;BR /&gt;Parameterized functions centralize query logic, making it easier to update or enhance without modifying every instance across the plugin spec. To modify the logic, just edit the function in Log Analytics, test it then save it- without needing to change the plugin at all or re-upload it into Security Copilot. It also significantly reduces the need to ensure that the query part of the YAML is perfectly indented and tabbed as is required by the Open API specification, you only need to worry about formatting a single line vs several-potentially hundreds.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Validation:&lt;/STRONG&gt;&lt;BR /&gt;Separating query logic from input parameters improves query reliability by avoiding the possibility of malformed queries. No matter what the input is, it's treated &lt;STRONG&gt;as a value&lt;/STRONG&gt;, not as part of the query logic.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Plugin Spec mapping:&lt;/STRONG&gt;&lt;BR /&gt;OpenAPI-based Security Copilot plugins can map user-provided inputs directly to function parameters, making the interaction between user intent and query execution seamless.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H5&gt;&lt;STRONG&gt;Practical example&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;In this case, we have a 139-line KQL query that we will reduce to exactly one line that goes into the KQL plugin. In other cases, this number could be even higher. &amp;nbsp;Without using functions, this entire query would have to form part of the plugin&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Note&lt;/STRONG&gt;: &lt;EM&gt;The rest of this blog assumes you are familiar with KQL custom plugins-how they work and how to upload them into Security Copilot.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="kusto"&gt;CloudAppEvents | where RawEventData.TargetDomain has_any ( 'grok.com', 'x.ai', 'mistral.ai', 'cohere.ai', 'perplexity.ai', 'huggingface.co', 'adventureai.gg', 'ai.google/discover/palm2', 'ai.meta.com/llama', 'ai2006.io', 'aibuddy.chat', 'aidungeon.io', 'aigcdeep.com', 'ai-ghostwriter.com', 'aiisajoke.com', 'ailessonplan.com', 'aipoemgenerator.org', 'aissistify.com', 'ai-writer.com', 'aiwritingpal.com', 'akeeva.co', 'aleph-alpha.com/luminous', 'alphacode.deepmind.com', 'analogenie.com', 'anthropic.com/index/claude-2', 'anthropic.com/index/introducing-claude', 'anyword.com', 'app.getmerlin.in', 'app.inferkit.com', 'app.longshot.ai', 'app.neuro-flash.com', 'applaime.com', 'articlefiesta.com', 'articleforge.com', 'askbrian.ai', 'aws.amazon.com/bedrock/titan', 'azure.microsoft.com/en-us/products/ai-services/openai-service', 'bard.google.com', 'beacons.ai/linea_builds', 'bearly.ai', 'beatoven.ai', 'beautiful.ai', 'beewriter.com', 'bettersynonyms.com', 'blenderbot.ai', 'bomml.ai', 'bots.miku.gg', 'browsegpt.ai', 'bulkgpt.ai', 'buster.ai', 'censusgpt.com', 'chai-research.com', 'character.ai', 'charley.ai', 'charshift.com', 'chat.lmsys.org', 'chat.mymap.ai', 'chatbase.co', 'chatbotgen.com', 'chatgpt.com', 'chatgptdemo.net', 'chatgptduo.com', 'chatgptspanish.org', 'chatpdf.com', 'chattab.app', 'claid.ai', 'claralabs.com', 'claude.ai/login', 'clipdrop.co/stable-diffusion', 'cmdj.app', 'codesnippets.ai', 'cohere.com', 'cohesive.so', 'compose.ai', 'contentbot.ai', 'contentvillain.com', 'copy.ai', 'copymatic.ai', 'copymonkey.ai', 'copysmith.ai', 'copyter.com', 'coursebox.ai', 'coverler.com', 'craftly.ai', 'crammer.app', 'creaitor.ai', 'dante-ai.com', 'databricks.com', 'deepai.org', 'deep-image.ai', 'deepreview.eu', 'descrii.tech', 'designs.ai', 'docgpt.ai', 'dreamily.ai', 'editgpt.app', 'edwardbot.com', 'eilla.ai', 'elai.io', 'elephas.app', 'eleuther.ai', 'essayailab.com', 'essay-builder.ai', 'essaygrader.ai', 'essaypal.ai', 'falconllm.tii.ae', 'finechat.ai', 'finito.ai', 'fireflies.ai', 'firefly.adobe.com', 'firetexts.co', 'flowgpt.com', 'flowrite.com', 'forethought.ai', 'formwise.ai', 'frase.io', 'freedomgpt.com', 'gajix.com', 'gemini.google.com', 'genei.io', 'generatorxyz.com', 'getchunky.io', 'getgptapi.com', 'getliner.com', 'getsmartgpt.com', 'getvoila.ai', 'gista.co', 'github.com/features/copilot', 'giti.ai', 'gizzmo.ai', 'glasp.co', 'gliglish.com', 'godinabox.co', 'gozen.io', 'gpt.h2o.ai', 'gpt3demo.com', 'gpt4all.io', 'gpt-4chan+)', 'gpt6.ai', 'gptassistant.app', 'gptfy.co', 'gptgame.app', 'gptgo.ai', 'gptkit.ai', 'gpt-persona.com', 'gpt-ppt.neftup.app', 'gptzero.me', 'grammarly.com', 'hal9.com', 'headlime.com', 'heimdallapp.org', 'helperai.info', 'heygen.com', 'heygpt.chat', 'hippocraticai.com', 'huggingface.co/spaces/tiiuae/falcon-180b-demo', 'humanpal.io', 'hypotenuse.ai', 'ichatwithgpt.com', 'ideasai.com', 'ingestai.io', 'inkforall.com', 'inputai.com/chat/gpt-4', 'instantanswers.xyz', 'instatext.io', 'iris.ai', 'jasper.ai', 'jigso.io', 'kafkai.com', 'kibo.vercel.app', 'kloud.chat', 'koala.sh', 'krater.ai', 'lamini.ai', 'langchain.com', 'laragpt.com', 'learn.xyz', 'learnitive.com', 'learnt.ai', 'letsenhance.io', 'letsrevive.app', 'lexalytics.com', 'lgresearch.ai', 'linke.ai', 'localbot.ai', 'luis.ai', 'lumen5.com', 'machinetranslation.com', 'magicstudio.com', 'magisto.com', 'mailshake.com/ai-email-writer', 'markcopy.ai', 'meetmaya.world', 'merlin.foyer.work', 'mieux.ai', 'mightygpt.com', 'mosaicml.com', 'murf.ai', 'myaiteam.com', 'mygptwizard.com', 'narakeet.com', 'nat.dev', 'nbox.ai', 'netus.ai', 'neural.love', 'neuraltext.com', 'newswriter.ai', 'nextbrain.ai', 'noluai.com', 'notion.so', 'novelai.net', 'numind.ai', 'ocoya.com', 'ollama.ai', 'openai.com', 'ora.ai', 'otterwriter.com', 'outwrite.com', 'pagelines.com', 'parallelgpt.ai', 'peppercontent.io', 'perplexity.ai', 'personal.ai', 'phind.com', 'phrasee.co', 'play.ht', 'poe.com', 'predis.ai', 'premai.io', 'preppally.com', 'presentationgpt.com', 'privatellm.app', 'projectdecember.net', 'promptclub.ai', 'promptfolder.com', 'promptitude.io', 'qopywriter.ai', 'quickchat.ai/emerson', 'quillbot.com', 'rawshorts.com', 'read.ai', 'rebecc.ai', 'refraction.dev', 'regem.in/ai-writer', 'regie.ai', 'regisai.com', 'relevanceai.com', 'replika.com', 'replit.com', 'resemble.ai', 'resumerevival.xyz', 'riku.ai', 'rizzai.com', 'roamaround.app', 'rovioai.com', 'rytr.me', 'saga.so', 'sapling.ai', 'scribbyo.com', 'seowriting.ai', 'shakespearetoolbar.com', 'shortlyai.com', 'simpleshow.com', 'sitegpt.ai', 'smartwriter.ai', 'sonantic.io', 'soofy.io', 'soundful.com', 'speechify.com', 'splice.com', 'stability.ai', 'stableaudio.com', 'starryai.com', 'stealthgpt.ai', 'steve.ai', 'stork.ai', 'storyd.ai', 'storyscapeai.app', 'storytailor.ai', 'streamlit.io/generative-ai', 'summari.com', 'synesthesia.io', 'tabnine.com', 'talkai.info', 'talkpal.ai', 'talktowalle.com', 'team-gpt.com', 'tethered.dev', 'texta.ai', 'textcortex.com', 'textsynth.com', 'thirdai.com/pocketllm', 'threadcreator.com', 'thundercontent.com', 'tldrthis.com', 'tome.app', 'toolsaday.com/writing/text-genie', 'to-teach.ai', 'tutorai.me', 'tweetyai.com', 'twoslash.ai', 'typeright.com', 'typli.ai', 'uminal.com', 'unbounce.com/product/smart-copy', 'uniglobalcareers.com/cv-generator', 'usechat.ai', 'usemano.com', 'videomuse.app', 'vidext.app', 'virtualghostwriter.com', 'voicemod.net', 'warmer.ai', 'webllm.mlc.ai', 'wellsaidlabs.com', 'wepik.com', 'we-spots.com', 'wordplay.ai', 'wordtune.com', 'workflos.ai', 'woxo.tech', 'wpaibot.com', 'writecream.com', 'writefull.com', 'writegpt.ai', 'writeholo.com', 'writeme.ai', 'writer.com', 'writersbrew.app', 'writerx.co', 'writesonic.com', 'writesparkle.ai', 'writier.io', 'yarnit.app', 'zevbot.com', 'zomani.ai' ) | extend sit = parse_json(tostring(RawEventData.SensitiveInfoTypeData)) | mv-expand sit | summarize Event_Count = count() by tostring(sit.SensitiveInfoTypeName), CountryCode, City, UserId = tostring(RawEventData.UserId), TargetDomain = tostring(RawEventData.TargetDomain), ActionType = tostring(RawEventData.ActionType), IPAddress = tostring(RawEventData.IPAddress), DeviceType = tostring(RawEventData.DeviceType), FileName = tostring(RawEventData.FileName), TimeBin = bin(TimeGenerated, 1h) | extend SensitivityScore = case(tostring(sit_SensitiveInfoTypeName) in~ ("U.S. Social Security Number (SSN)", "Credit Card Number", "EU Tax Identification Number (TIN)","Amazon S3 Client Secret Access Key","All Credential Types"), 90, tostring(sit_SensitiveInfoTypeName) in~ ("All Full names"), 40, tostring(sit_SensitiveInfoTypeName) in~ ("Project Obsidian", "Phone Number"), 70, tostring(sit_SensitiveInfoTypeName) in~ ("IP"), 50,10 ) | join kind=leftouter ( IdentityInfo | where TimeGenerated &amp;gt; ago(lookback) | extend AccountUpn = tolower(AccountUPN) ) on $left.UserId == $right.AccountUpn | join kind=leftouter ( BehaviorAnalytics | where TimeGenerated &amp;gt; ago(lookback) | extend AccountUpn = tolower(UserPrincipalName) ) on $left.UserId == $right.AccountUpn //| where BlastRadius == "High" //| where RiskLevel == "High" | where Department == User_Dept | summarize arg_max(TimeGenerated, *) by sit_SensitiveInfoTypeName, CountryCode, City, UserId, TargetDomain, ActionType, IPAddress, DeviceType, FileName, TimeBin, Department, SensitivityScore | summarize sum(Event_Count) by sit_SensitiveInfoTypeName, CountryCode, City, UserId, Department, TargetDomain, ActionType, IPAddress, DeviceType, FileName, TimeBin, BlastRadius, RiskLevel, SourceDevice, SourceIPAddress, SensitivityScore&lt;/LI-CODE&gt;
&lt;P&gt;With parameterized functions, follow these steps to simplify the plugin that will be built based on the query above&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Define the variable/parameters upfront in the query (BEFORE creating the parameters in the UI). This will put the query in a “temporary” unusable state because the parameters will cause syntax problems in this state. However, since the plan is to run the query as a function this is ok&lt;/LI&gt;
&lt;/OL&gt;
&lt;img&gt;Fig. 1: Image showing partial query with the parameters to defined highlighted in red i.e. lookback and User_Dept&lt;/img&gt;
&lt;OL start="2"&gt;
&lt;LI&gt;Create the parameters in the Log Analytics UI&lt;/LI&gt;
&lt;/OL&gt;
&lt;img&gt;Fig 2. Screenshot showing how the function menu in the Log Analytics UI&lt;/img&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Give the function a name and define the parameters exactly as they show up in the query in step 1 above. In this example, we are defining two parameters: &lt;STRONG&gt;lookback&lt;/STRONG&gt; – to store the lookback period to be passed to the time filter and &lt;STRONG&gt;User_Dept &lt;/STRONG&gt;to the user’s department.&lt;/P&gt;
&lt;img&gt;Fig. 3. Function menu showing the two parameters defined in the function creation menu of Log Analytics&lt;/img&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;3. Test the query. Note the order of parameter definition in the UI. i.e. first the &lt;STRONG&gt;User_Dept&lt;/STRONG&gt; THEN the &lt;STRONG&gt;lookback&lt;/STRONG&gt; period. You can interchange them if you like but this will determine how you submit the query using the function. If the &lt;STRONG&gt;User_Dept&lt;/STRONG&gt; parameter was defined first then it needs to come first when executing the function. See the below screenshot. Switching them will result in the wrong parameter being passed to the query and consequently 0 results will be returned.&lt;/P&gt;
&lt;img&gt;Fig. 4: Sample run of the function with the parameters specified in the correct order&lt;/img&gt;
&lt;P class=""&gt;Effect of switched parameters:&lt;/P&gt;
&lt;img&gt;Fig. 5: Sample function run with the functions switched to show effect of this situation&lt;/img&gt;
&lt;P&gt;To edit the function, follow the steps below:&lt;/P&gt;
&lt;P&gt;Navigate to the Logs menu for your Log Analytics workspace then select the function icon&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Fig. 6: Partial view of the function being edited within the Log Analytics UI&lt;BR /&gt;&lt;BR /&gt;&lt;/img&gt;&lt;img&gt;Fig. 7: Image showing how to select the code button in the function menu to edit the function code&lt;/img&gt;
&lt;P&gt;Once satisfied with the query and function, build your spec file for the Security Copilot plugin. Note the parameter definition and usage in the sections highlighted in red below&lt;/P&gt;
&lt;img&gt;Fig. 8: Partial view of the YAML plugin showing the encapsulation of the 139 lines of KWL into a single one&lt;/img&gt;
&lt;P&gt;And that’s it, from 139 unwieldy KQL lines to one very manageable one! You are welcome 😊&lt;/P&gt;
&lt;P&gt;Let’s now put it through its paces once uploaded into Security Copilot.&amp;nbsp;We start by executing the plugin using its default settings via the direct skill invocation method. We see indeed that the prompt returns results based on the default values passed as parameters to the function:&lt;/P&gt;
&lt;img&gt;Fig. 9: View of Secuity Copilot landing page showing an example of direct skill execution of the created plugin&lt;/img&gt;&lt;img&gt;Fig. 10: Sample output showing records of users from the Sales department&lt;/img&gt;
&lt;P&gt;Next, we still use direct skill invocation, but this time specify our own parameters:&lt;/P&gt;
&lt;img&gt;Fig. 11: Direct skill invocation example but with specified parameters-Department, and lookback period&lt;/img&gt;&lt;img&gt;Fig 12: Prompt run showing the output corresponding to the selections of the previous direct skill invocation prompt&lt;/img&gt;
&lt;P&gt;Lastly, we test it out with a natural language prompt:&lt;/P&gt;
&lt;img&gt;Fig 13: Security Copilot prompt bar showing example of natural language prompt seeking events related to users in the Human Resources department&lt;/img&gt;&lt;img&gt;Fig 14: Output from previous natural language prompt focused on users from the HR department&lt;/img&gt;
&lt;P&gt;&lt;STRONG&gt;Tip: &lt;/STRONG&gt;&lt;EM&gt;The function does not execute successfully if the default summarize function is used without creating a variable i.e. If the &lt;STRONG&gt;summarize count()&lt;/STRONG&gt; command is used in your query, it results in a system-defined output variable named &lt;STRONG&gt;count_. &lt;/STRONG&gt;To bypass this issue, ensure to use a user-defined variable such as &lt;STRONG&gt;Event_Count&lt;/STRONG&gt; as shown in line 77 below:&lt;/EM&gt;&lt;/P&gt;
&lt;img&gt;Fig. 15: Highlighting the creation of a variable to store results from the summarize count() command&lt;/img&gt;
&lt;H5&gt;&lt;STRONG&gt;Conclusion&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;In conclusion, leveraging parameterized functions within KQL-based custom plugins in Microsoft Security Copilot can significantly streamline your data querying and analysis capabilities. By encapsulating reusable logic, improving query efficiency, and ensuring maintainability, these functions provide an efficient approach for tapping into data stored across Microsoft Sentinel, Defender XDR and Azure Data Explorer clusters. Start integrating parameterized functions into your KQL-based Security Copilot plugins today and let us have your feedback.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Additional Resources&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-custom-functions" target="_blank" rel="noopener"&gt;Using parameterized functions in Microsoft Defender XDR&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/kusto/management/create-function?view=microsoft-fabric" target="_blank" rel="noopener"&gt;Using parameterized functions with Azure Data Explorer&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/azure-monitor/logs/functions?tabs=portal" target="_blank" rel="noopener"&gt;Functions in Azure Monitor log queries - Azure Monitor | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/copilot/security/plugin-kql" target="_blank" rel="noopener"&gt;Kusto Query Language (KQL) plugins in Microsoft Security Copilot | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://techcommunity.microsoft.com/blog/securitycopilotblog/harnessing-the-power-of-kql-plugins-for-enhanced-security-insights-with-copilot-/4221891" target="_blank" rel="noopener"&gt;Harnessing the power of KQL Plugins for enhanced security insights with Copilot for Security | Microsoft Community Hub&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jun 2025 17:17:26 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/using-parameterized-functions-with-kql-based-custom-plugins-in/ba-p/4419286</guid>
      <dc:creator>Inwafula</dc:creator>
      <dc:date>2025-06-02T17:17:26Z</dc:date>
    </item>
    <item>
      <title>Automating Phishing Email Triage with Microsoft Security Copilot</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/automating-phishing-email-triage-with-microsoft-security-copilot/ba-p/4416559</link>
      <description>&lt;P&gt;This blog details automating phishing email triage using Azure Logic Apps, Azure Function Apps, and Microsoft Security Copilot. Deployable in under 10 minutes, this solution primarily analyzes email intent without relying on traditional indicators of compromise, accurately classifying benign/junk, suspicious, and phishing emails. Benefits include reducing manual workload, improved threat detection, and (optional) integration seamlessly with Microsoft Sentinel – enabling analysts to see Security Copilot analysis within the incident itself.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Designed for flexibility and control, this Logic App is a customizable solution that can be self-deployed from GitHub. It helps automate phishing response at scale without requiring deep coding expertise, making it ideal for teams that prefer a more configurable approach and want to tailor workflows to their environment. The solution streamlines response and significantly reduces manual effort.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Access the full solution on the Security Copilot Github:&lt;/STRONG&gt;&lt;BR /&gt;&lt;A href="https://github.com/Azure/Security-Copilot/tree/main/Logic%20Apps/SecCopilot-UserReportedPhishing-FuncApp_parsingV2" target="_blank" rel="noopener"&gt;GitHub - UserReportedPhishing Solution&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;For teams looking for a more sophisticated, fully integrated experience, the Security Copilot &lt;A href="https://learn.microsoft.com/en-us/defender-xdr/phishing-triage-agent" target="_blank" rel="noopener"&gt;Phishing Triage Agent&lt;/A&gt; represents the next generation of phishing response. Natively embedded in Microsoft Defender, the agent autonomously triages phishing incidents with minimal setup. It uses advanced LLM-based reasoning to resolve false alarms, enabling analysts to stay focused on real threats. The agent offers step-by-step decision transparency and continuously learns from user feedback. Read the official announcement &lt;A href="https://techcommunity.microsoft.com/blog/microsoftthreatprotectionblog/what%E2%80%99s-new-in-microsoft-defender-xdr-at-secure-2025/4390817" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Introduction: Phishing Challenges Continue to Evolve&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Phishing continues to evolve in both scale and sophistication, but a growing challenge for defenders isn't just stopping phishing, it’s scaling response. Thanks to tools like Outlook’s "Report Phishing" button and increased user awareness, organizations are now flooded with user-reported emails, many of which are ambiguous or benign. This has created a paradox: better detection by users has overwhelmed SOC teams, turning email triage into a manual, rotational task dreaded for its repetitiveness and time cost, often taking over 25 minutes per email to review.&lt;/P&gt;
&lt;P&gt;Our solution addresses that problem, by automating the triage of user-reported phishing through AI-driven intent analysis. It's not built to replace your secure email gateways or Microsoft Defender for Office 365; those tools have already done their job. This system assumes the email:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Slipped past existing filters,&lt;/LI&gt;
&lt;LI&gt;Was suspicious enough for a user to escalate,&lt;/LI&gt;
&lt;LI&gt;Lacks typical IOCs like malicious domains or attachments.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;As a former attacker, I spent years crafting high-quality phishing emails to penetrate the defenses of major banks. Effective phishing doesn't rely on obvious IOCs like malicious domains, URLs, or attachments… the infrastructure often appears clean. The danger lies in the intent. This is where Security Copilot’s LLM-based reasoning is critical, analyzing structure, context, tone, and seasonal pretexts to determine whether an email is phishing, suspicious, spam, or legitimate.&lt;/P&gt;
&lt;P&gt;What makes this novel is that it's the first solution built specifically for the “last mile” of phishing defense, where human suspicion meets automation, and intent is the only signal left to analyze. It transforms noisy inboxes into structured intelligence and empowers analysts to focus only on what truly matters.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Solution Overview: How the Logic App Solution Works (and Why It's Different)&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;STRONG&gt;Core Components:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Azure Logic Apps:&lt;/STRONG&gt; Orchestrates the entire workflow, from ingestion to analysis, and 100% customizable.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Azure Function Apps:&lt;/STRONG&gt; Parses and normalizes email data for efficient AI consumption.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Microsoft Security Copilot:&lt;/STRONG&gt; Performs sophisticated AI-based phishing analysis by understanding email intent and tactics, rather than relying exclusively on predefined malicious indicators.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Key Benefits:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Rapid Analysis:&lt;/STRONG&gt; Processes phishing alerts and, in minutes, delivers comprehensive reports that empower analysts to make faster, more informed triage decisions – compared to manual reviews that can take up to 30 minutes. And, unlike analysts, Security Copilot requires zero sleep!&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;AI-driven Insights:&lt;/STRONG&gt; LLM-based analysis is leveraged to generate clear explanations of classifications by assessing behavioral and contextual signals like urgency, seasonal threats, Business Email Compromise (BEC), subtle language clues, and otherwise sophisticated techniques. Most importantly, it identifies benign emails, which are often the bulk of reported emails.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Detailed, Actionable Reports:&lt;/STRONG&gt; Generates clear, human-readable HTML reports summarizing threats and recommendations for analyst review.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Robust Attachment Parsing:&lt;/STRONG&gt; Automatically examines attachments like PDFs and Excel documents for malicious content or contextual inconsistencies.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Integrated with Microsoft Sentinel:&lt;/STRONG&gt; Optional integration with Sentinel ensures central incident tracking and comprehensive threat management. Analysis is attached directly to the incident, saving analysts more time.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Customization:&lt;/STRONG&gt; Add, move, or replace any element of the Logic App or prompt to fit your specific workflows.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;&lt;STRONG&gt;Deployment Guide: Quick, Secure, and Reliable Setup&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;The solution provides Azure Resource Manager (ARM) templates for rapid deployment:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Prerequisites:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Azure Subscription with Contributor access to a resource group.&lt;/LI&gt;
&lt;LI&gt;Microsoft Security Copilot enabled.&lt;/LI&gt;
&lt;LI&gt;Dedicated Office 365 shared mailbox (e.g., phishing@yourdomain.com) with Mailbox.Read.Shared permissions.&lt;/LI&gt;
&lt;LI&gt;(Optional) Microsoft Sentinel workspace.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Refer to the up to date deployment instructions on the Security Copilot GitHub &lt;A href="https://github.com/Azure/Security-Copilot/blob/main/Logic%20Apps/SecCopilot-UserReportedPhishing-FuncApp_parsingV2/README.md" target="_blank" rel="noopener"&gt;page&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Technical Architecture &amp;amp; Workflow:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The automated workflow operates as follows:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Email Ingestion:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Monitors the shared mailbox via Office 365 connector.&lt;/LI&gt;
&lt;LI&gt;Triggers on new email arrivals every 3 minutes.&lt;/LI&gt;
&lt;LI&gt;Assumes that the reported email has arrived as an attachment to a "carrier" email.&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;Determine if the Email Came from Defender/Sentinel:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If the email came from Defender, it would have a prepended subject of “Phishing”, if not, it takes the “False” branch. Change as necessary.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;Initial Email Processing:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Exports raw email content from the shared mailbox.&lt;/LI&gt;
&lt;LI&gt;Determines if .msg or .eml attachments are in binary format and converts if necessary.&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;Email Parsing via Azure Function App:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Extracts data from email content and attachments (URLs, sender info, email body, etc.) and returns a JSON structure.&lt;/LI&gt;
&lt;LI&gt;Prepares clean JSON data for AI analysis.&lt;/LI&gt;
&lt;LI&gt;This step is required to "prep" the data for LLM analysis due to token limits.&lt;/LI&gt;
&lt;LI&gt;Click on the “Parse Email” block to see the output of the Function App for any troubleshooting. You'll also notice a number of JSON keys that are not used but provided for flexibility.&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;Security Copilot Advanced AI Reasoning:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Analyzes email content using a comprehensive prompt that evaluates behavioral and seasonal patterns, BEC indicators, attachment context, and social engineering signals.&lt;/LI&gt;
&lt;LI&gt;Scores cumulative risk based on structured heuristics without relying solely on known malicious indicators.&lt;/LI&gt;
&lt;LI&gt;Returns validated JSON output (some customers are parsing this JSON and performing other action).&lt;/LI&gt;
&lt;LI&gt;This is where you would customize the prompt, should you need to add some of your own organizational situations if the Logic App needs to be tuned:&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;JSON Normalization &amp;amp; Error Handling:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;A “normalization” Azure Function ensures output matches the expected JSON schema.&lt;/LI&gt;
&lt;LI&gt;Sometimes LLMs will stray from a strict output structure, this aims to solve that problem.&lt;/LI&gt;
&lt;LI&gt;If you add or remove anything from the Parse Email code that alters the structure of the JSON, this and the next block will need to be updated to match your new structure.&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;Detailed HTML Reporting:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Generates a detailed HTML report summarizing AI findings, indicators, and recommended actions.&lt;/LI&gt;
&lt;LI&gt;Reports are emailed directly to SOC team distribution lists or ticketing systems.&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;Optional Sentinel Integration:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Adds the reasoning &amp;amp; output from Security Copilot directly to the incident comments. This is the ideal location for output since the analyst is already in the security.microsoft.com portal. It waits up to 15 minutes for logs to appear, in situations where the user reports before an incident is created.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;The solution works pretty well out of the box but may require some tuning, give it a test. Here are some examples of the type of Security Copilot reasoning.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Benign email detection:&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Example of phishing email detection:&lt;/STRONG&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;More sophisticated phishing with subtle clues:&lt;/STRONG&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Enhanced Technical Details &amp;amp; Clarifications&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;STRONG&gt;Attachment Processing:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;When multiple email attachments are detected, the Logic App processes each binary-format email sequentially.&lt;/LI&gt;
&lt;LI&gt;If PDF or Excel attachments are detected, they are parsed for content and are evaluated appropriately for content and intent.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Security Copilot Reliability:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;The Security Copilot Logic App API call uses an extensive retry policy (10 retries at 10-minute intervals) to ensure reliable AI analysis despite intermittent service latency.&lt;/LI&gt;
&lt;LI&gt;If you run out of SCUs in an hour, it will pause until they are refreshed and continue.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Sentinel Integration Reliability:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Acknowledges inherent Sentinel logging delays (up to 15 minutes).&lt;/LI&gt;
&lt;LI&gt;Implements retry logic and explicit manual alerting for unmatched incidents, if the analysis runs before the incident is created.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Security Best Practices:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Compare the Function &amp;amp; Logic App to your company security policies to ensure compliance.&lt;/LI&gt;
&lt;LI&gt;Credentials, API keys, and sensitive details utilize Azure Managed Identities or secure API connections. No secrets are stored in plaintext.&lt;/LI&gt;
&lt;LI&gt;Azure Function Apps perform only safe parsing operations; attachments and content are never executed or opened insecurely.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Be sure to check out how the Microsoft Defender for Office team is improving detection capabilities as well &lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/microsoft-defender-for-office-365s-language-ai-for-phish-enhancing-email-securit/4410446" target="_blank" rel="noopener"&gt;Microsoft Defender for Office 365's Language AI for Phish: Enhancing Email Security | Microsoft Community Hub&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jun 2025 16:44:41 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/automating-phishing-email-triage-with-microsoft-security-copilot/ba-p/4416559</guid>
      <dc:creator>craigfreyman-msft</dc:creator>
      <dc:date>2025-06-05T16:44:41Z</dc:date>
    </item>
    <item>
      <title>Busting myths on Microsoft Security Copilot</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/busting-myths-on-microsoft-security-copilot/ba-p/4414844</link>
      <description>&lt;P&gt;Microsoft’s Security Copilot is a new AI-powered security assistant (launched in April 2024) that integrates with Microsoft Defender, Sentinel, Intune, Entra and Purview to help analysts protect and defend at the speed and scale of AI. As a cutting-edge generative AI tool, Security Copilot has naturally sparked interest and close attention from users and experts. This has resulted in various articles and blogs sharing experiences, perspectives, and feedback about the product. As a Microsoft Certified Trainer and a Microsoft ‘Consultant’, I happen to both teach and implement Security Copilot for professionals and organizations respectively. Lucky me! But one thing that I encounter frequently in both my roles, is a list of common myths (or concerns) that people have about Security Copilot especially given that it is a relatively newer product.&lt;/P&gt;
&lt;P&gt;Today we are going to talk about such myths (or concerns) and try to see how they are either completely hokum or does have another aspect which you may/may not know about. In other words, we will try to dot all the i’s and cross all the t’s. I’ll do it in respective sections which may have one or more myths included, so let’s get started.&lt;/P&gt;
&lt;LI-SPOILER label="⚠️ Disclaimer"&gt;
&lt;P&gt;I sincerely appreciate the efforts of all authors and publishers who have shared their insights on Security Copilot. This article is intended to address common concerns and encourage professionals to explore the product with confidence, rather than to challenge or dismiss any shared opinions.&lt;/P&gt;
&lt;/LI-SPOILER&gt;
&lt;H3 class="lia-linked-item"&gt;&lt;STRONG&gt;Cost and Licensing&lt;/STRONG&gt;&lt;/H3&gt;
&lt;H4&gt;&lt;EM&gt;Myth #1: High Consumption Cost:&lt;/EM&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Validity&lt;/STRONG&gt;: The perception of high cost is relative and often lacks full context. While the consumption-based pricing of Security Copilot may appear higher when compared to certain other tools, it delivers significantly greater value through its advanced capabilities, seamless integration with the Microsoft Security ecosystem, and ability to accelerate threat detection and response. When evaluated alongside comparable AI-driven security solutions—both Microsoft and non-Microsoft—Security Copilot stands out for its category-defining use cases and operational efficiency, helping security teams do more with less.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Reasoning:&lt;/STRONG&gt; While cost considerations are valid, they should be viewed through the lens of operational impact rather than raw consumption. Security Copilot functions as an intelligent assistant operating around the clock—enhancing threat detection, accelerating incident response, and enabling deeper, more proactive threat hunting. Many organizations have reported significant improvements in reducing mean time to respond (MTTR), increasing automation in routine investigations such as phishing, and expanding their overall security coverage without scaling headcount. By augmenting human expertise with AI, Security Copilot empowers teams to focus on high value tasks and strengthens organizational resilience against evolving threats.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;&lt;EM&gt;Myth #2: Unpredictable billing:&lt;/EM&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Validity&lt;/STRONG&gt;: This is a complete myth not only with Security Copilot but with any other Microsoft solution.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Reasoning&lt;/STRONG&gt;: You get a dedicated usage dashboard in the Security Copilot portal and a link to the billing view that takes you to Microsoft Azure where you can not only see the incurred costs but can also have a reliable forecast of future costs. Whether you are a large organization with multiple instances of Security Copilot or an SMB with a limited usage, these dashboards and views will help you equally to ensure you are not under or overspending on Security Copilot.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;&lt;EM&gt;Myth #3: It's free or covered by an existing license:&lt;/EM&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Validity&lt;/STRONG&gt;: This misconception likely arises from confusion with other Copilot offerings and becomes a myth!&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Reasoning&lt;/STRONG&gt;: The overall pricing model of Security Copilot is completely different from other Microsoft Security solutions. While other solutions operate on a licensing model, Security Copilot works on a consumption-based model meaning there is no per user or per device charges here! Hence, no existing license whether Entra or Office 365 based, can give you access to ‘Security Copilot’. Also, please note that Microsoft 365 Copilot (available in Teams, Word, PowerPoint or Azure portal) is not the same as Security Copilot.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;STRONG&gt;Performance and Reliability&lt;/STRONG&gt;&lt;/H3&gt;
&lt;H4&gt;&lt;EM&gt;Myth #4: Slow responses and high latency:&lt;/EM&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Validity&lt;/STRONG&gt;: This is a completely anecdotal and definitely a myth. There are a variety of factors that affects the response latency of Security Copilot.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Reasoning&lt;/STRONG&gt;: You need to consider some important factors like number of SCUs provisioned, concurrent number of Security Copilot users, number of plugins and/or skills being invoked, length and complexity of the prompt etc. in order to understand why you may have gotten a response slower than usual. Moreover, Security Copilot has the feature of showing its response in streaming mode. This approach significantly enhances perceived latency for users, enabling them to begin reading responses as they are generated, like the below image. Reference: &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/copilot/security/whats-new-copilot-security#july-2024" target="_blank" rel="noopener" data-lia-auto-title-active="0" data-lia-auto-title="What's new in Microsoft Security Copilot?"&gt;What's new in Microsoft Security Copilot?&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;img&gt;Source: Security Copilot Portal&lt;/img&gt;
&lt;H4&gt;&lt;EM&gt;Myth #5: Poor Quality or Unreliable responses:&lt;/EM&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Validity&lt;/STRONG&gt;: All I am going to say here is ‘Your Copilot is as good as the quality of your prompts’!&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Reasoning&lt;/STRONG&gt;: AI is here to augment our intelligence, but it can only do that when it gets sufficient, clear and well thought prompts. There is a reason to call it a ‘Co’-‘Pilot’ because you are driving/flying/learning along with it. BTW, I prefer flying almost any time! Point is, we need to understand that the quality of AI output is heavily influenced by the tone, context and specificity of prompts. There have been numerous users who agree that refined prompts can yield better results if not the best! I am not suggesting going for in-depth prompt engineering classes here but just including the following elements when writing a prompt, should give you a considerable improvement in the quality of responses. More information on effective prompting practices here: &lt;A href="https://learn.microsoft.com/en-us/copilot/security/prompting-security-copilot" target="_blank" rel="noopener" data-lia-auto-title-active="0" data-lia-auto-title="Prompting in Microsoft Security Copilot"&gt;Prompting in Microsoft Security Copilot&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;OL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;OL&gt;
&lt;LI class="lia-align-justify"&gt;&lt;STRONG class="lia-align-justify"&gt;Goal&lt;/STRONG&gt;&amp;nbsp;- specific, security-related information that you need&lt;/LI&gt;
&lt;LI class="lia-align-justify"&gt;&lt;STRONG&gt;Context&lt;/STRONG&gt;&amp;nbsp;- why you need this information or how you plan to use it&lt;/LI&gt;
&lt;LI class="lia-align-justify"&gt;&lt;STRONG&gt;Expectations&lt;/STRONG&gt;&amp;nbsp;- format or target audience you want the response tailored to&lt;/LI&gt;
&lt;LI class="lia-align-justify"&gt;&lt;STRONG&gt;Source&lt;/STRONG&gt;&amp;nbsp;- known information, data sources, or plugins Security Copilot should use&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI&gt;Moreover, I also suggest leveraging the OOTB (Out-Of-The-Box) prompts and promptbooks in order to understand the way on how you should structure your prompts. Security Copilot has a dedicated ‘Promptbook Library’ where you can see all the custom and OOTB prompts. You have the option of duplicating and creating a custom promptbook of your own from an OOTB promptbook. This way you can ensure you are leveraging the available resources to make your own use case work more efficiently.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;&lt;EM&gt;Myth #6: Service Interruptions:&lt;/EM&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Validity&lt;/STRONG&gt;: This is a fact portrayed as a myth. If provisioned Security Copilot Units (SCUs) are fully consumed without additional configuration, service may pause until capacity is restored. This behaviour aligns with standard consumption-based service models.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Reasoning&lt;/STRONG&gt;&lt;STRONG&gt;:&amp;nbsp;&lt;/STRONG&gt;To maintain continuous service, Security Copilot now supports &lt;STRONG&gt;Overage Units&lt;/STRONG&gt;, which automatically activate when the initially provisioned SCUs are exhausted. This helps ensure uninterrupted functionality without requiring manual intervention. Additionally, the platform provides clear usage notifications and warnings in advance, allowing teams to proactively monitor and manage consumption. Combined with its role as a 24/7 AI-powered assistant, Security Copilot continues to deliver high availability and operational efficiency—even under dynamic workloads. For details on how to configure and manage overage units, refer to this blog: &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/securitycopilotblog/introducing-more-consumption-flexibility-with-security-copilot-enhancements/4399222" target="_blank" rel="noopener" data-lia-auto-title="Overage Units in Security Copilot" data-lia-auto-title-active="0"&gt;Overage Units in Security Copilot&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;img&gt;Near Limit notification in Security Copilot standalone portal&lt;/img&gt;&lt;img&gt;Above Limit notification in Security Copilot standalone portal&lt;/img&gt;
&lt;H3&gt;&lt;STRONG&gt;Privacy and Data Security&lt;/STRONG&gt;&lt;/H3&gt;
&lt;H4&gt;&lt;EM&gt;Myth #7: Data sharing with Microsoft:&lt;/EM&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Validity&lt;/STRONG&gt;: This is one of the most common myths that still exists amongst users and make them hesitant to adopt the product.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Reasoning&lt;/STRONG&gt;: Microsoft has been very transparent and vocal on claiming that ‘customer data’ is never used to train the underlying LLM model nor is it accessible by any human including any non-relevant Microsoft employees. All Security Copilot data is handled according to Microsoft's commitments to privacy, security, compliance, and responsible AI practices. Access to the systems that house your data is governed by Microsoft's certified processes. Even when enabled by default, the option to share your data does:&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI&gt;Not shared with OpenAI&lt;/LI&gt;
&lt;LI&gt;Not used for sales&lt;/LI&gt;
&lt;LI&gt;Not shared with third parties&lt;/LI&gt;
&lt;LI&gt;Not used to train Azure OpenAI foundational model&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;img&gt;Security Copilot provides options to enable/disable user data collection&lt;/img&gt;
&lt;H4&gt;&lt;EM&gt;Myth #8: Data Privacy Compromises:&lt;/EM&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Validity&lt;/STRONG&gt;: Concerns about data privacy are common with AI tools but this is another completely ironical myth for a security product.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Reasoning&lt;/STRONG&gt;: One important thing to know when using Microsoft products and solutions is that Microsoft provides you with contractual commitments on giving you control over your own data! Microsoft takes data security so seriously that even if a law enforcement agency or the government requests your data, you will be notified and provided with a copy of the request! And hence Microsoft defends your data through clearly defined and well-established response policies and processes like:
&lt;UL&gt;
&lt;LI&gt;Microsoft uses and enables the use of industry-standard encrypted transport protocols, such as Transport Layer Security (TLS) and Internet Protocol Security (IPsec) for any customer data in transit.&lt;/LI&gt;
&lt;LI&gt;The Microsoft Cloud employs a wide range of encryption capabilities up to AES-256 for data at rest.&lt;/LI&gt;
&lt;LI&gt;Your control over your data is reinforced by Microsoft compliance with broadly applicable privacy laws, such as GDPR and privacy standards. These include the world’s first international code of practice for cloud privacy, ISO/IEC 27018.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;STRONG&gt;Uncategorized Myths&lt;/STRONG&gt;&lt;/H3&gt;
&lt;H4&gt;&lt;EM&gt;“Security Copilot will replace our SOC team”:&lt;/EM&gt;&lt;/H4&gt;
&lt;P&gt;No! It’s a fact that Security Copilot is an assistant, not an infallible sensor. It is created to “assist security professionals” and acknowledges it may make mistakes (false positives/negatives). The very conception of Security Copilot is essentially taking over the manual and tiresome analysis of raw logs and events while giving time to security professionals to do what they do best, discovering vulnerabilities and securing organizations! Do you ever think why there is not a single capability in Security Copilot to take an action on its own or without your approval? What? You didn’t know that?! This is by design to ensure that you and I are always in the driving seat while our “Co”-pilot augments our capabilities, automates repetitive tasks and provides actionable insights. But users must always validate its advice.&lt;/P&gt;
&lt;H4&gt;&lt;EM&gt;“Copilot only works well with Microsoft products”:&lt;/EM&gt;&lt;/H4&gt;
&lt;P&gt;Another anecdotal myth. While Security Copilot is deeply integrated with Microsoft's own security tools, it is also designed to work effectively with a variety of third-party solutions. In fact, Microsoft provides you with more than 35+ non-Microsoft plugins out-of-the-box including some popular tools like Splunk, ServiceNow, Cyware, Shodan etc. And that’s not it, you can create your own custom plugin using one the three methods amongst API, GPT and KQL.&lt;/P&gt;
&lt;H4&gt;&lt;EM&gt;“You cannot track Copilot’s activities”:&lt;/EM&gt;&lt;/H4&gt;
&lt;P&gt;The notion that “you cannot track Copilot’s activities” is definitively a myth. Security Copilot’s integration with Microsoft Purview and the Office 365 Management API provides full visibility into every interaction—prompt inputs, AI responses, plugin calls, and admin configurations. Administrators can enable, search, export, and retain these logs for compliance, forensics, or integration into broader SIEM and SOAR workflows, ensuring that Copilot becomes a transparent, auditable extension of your security operations rather than an untraceable “black box.”&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Conclusion&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;As with any transformative technology, Microsoft Security Copilot has naturally invited speculations. However, many of the concerns—ranging from cost and licensing, to performance, reliability, and data privacy—are either based on misconceptions or lack full context. Through this article, we’ve examined these myths objectively and highlighted how Security Copilot’s design, operational model, and deep integration with Microsoft’s security ecosystem work together to empower, not replace, human defenders. It is built to scale security operations with intelligence and agility, not disrupt them with unpredictability. For organizations navigating increasingly complex threat landscapes, Security Copilot offers a way to enhance response, reduce fatigue, and operationalize AI securely and responsibly. The key is not to view it as just another product, but as a strategic co-pilot—working alongside your team to defend at the speed and scale that modern security demands.&lt;/P&gt;
&lt;P&gt;Want to have a much deeper understanding of Security Copilot? Check out these awesome resources:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="http://aka.ms/SecurityCopilotAdoptionHub" target="_blank" rel="noopener" data-lia-auto-title-active="0" data-lia-auto-title="Microsoft Security Copilot - Microsoft Adoption"&gt;Microsoft Security Copilot - Microsoft Adoption&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="http://aka.ms/SecurityCopilotVideoHub" target="_blank" rel="noopener" data-lia-auto-title-active="0" data-lia-auto-title="Microsoft Security Copilot video hub - Microsoft Adoption"&gt;Microsoft Security Copilot video hub - Microsoft Adoption&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/category/security-copilot/blog/securitycopilotblog" target="_blank" rel="noopener" data-lia-auto-title="Security Copilot – Tech Community Blog Hub" data-lia-auto-title-active="0"&gt;Security Copilot – Tech Community Blog Hub&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/training/paths/sc-200-mitigate-threats-using-microsoft-copilot-for-security/" target="_blank" rel="noopener" data-lia-auto-title-active="0" data-lia-auto-title="SC-200: Mitigate threats using Microsoft Security Copilot - Training"&gt;SC-200: Mitigate threats using Microsoft Security Copilot - Training&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" style="font-style: normal; font-weight: 400; background-color: rgb(255, 255, 255);" href="https://techcommunity.microsoft.com/blog/securitycopilotblog/how-to-become-a-microsoft-security-copilot-ninja-the-complete-level-400-training/4106928" target="_blank" rel="noopener" data-lia-auto-title="Become a Microsoft Security Copilot Ninja" data-lia-auto-title-active="0"&gt;Become a Microsoft Security Copilot Ninja&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 20 May 2025 16:19:56 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/busting-myths-on-microsoft-security-copilot/ba-p/4414844</guid>
      <dc:creator>YashMudaliar</dc:creator>
      <dc:date>2025-05-20T16:19:56Z</dc:date>
    </item>
    <item>
      <title>RSA Conference 2025: Security Copilot Agents now in preview</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/rsa-conference-2025-security-copilot-agents-now-in-preview/ba-p/4406797</link>
      <description>&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In a time of escalating cyber threats, security teams face relentless pressure to do more with less – more threats, more data, more tools, fewer resources. Microsoft Security Copilot was built to bridge that gap, delivering an AI-driven assistant that enhances detection, investigation, and response across the entire Microsoft Security stack. Since it was launched in April 2024, Copilot has been integrated into customer environments to assist security professionals at every level – amplifying human expertise, streamlining complex workflows, and helping teams stay ahead of evolving threats.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://aka.ms/SecurityCopilot-productivitygains" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;New research from Microsoft live operation&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;s&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; highlights Security Copilot’s tangible impact, showing productivity gains across security and IT. Organizations using Security Copilot have seen:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;At this year’s RSA Conference, we are excited to share updates that make Security Copilot even more powerful, flexible, and accessible to customers and partners.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H1 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Security Copilot a&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;gents are now in preview&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H1&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Last month at Microsoft Secure, we &lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/blog/SecurityCopilotBlog/automate-cybersecurity-at-scale-with-microsoft-security-copilot-agents/4394675/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;introduced Security Copilot agents&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; - autonomous AI designed to tackle high-volume security tasks. Built on Security Copilot and seamlessly integrated with Microsoft Security solutions and partner ecosystem, these agents are tailored to security-specific use cases, adapt to your workflows, and learn from feedback, all while keeping your team fully in control. Every agent launched is built on the Security Copilot platform, ensuring a consistent, secure, and unified experience across capabilities.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;div data-video-id="https://www.youtube.com/watch?v=7pI7DyiG-u4/1745830866793" data-video-remote-vid="https://www.youtube.com/watch?v=7pI7DyiG-u4/1745830866793" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2F7pI7DyiG-u4%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D7pI7DyiG-u4&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2F7pI7DyiG-u4%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Starting today, we’re beginning a phased public preview rollout which will gradually expand to more customers to ensure a smooth and scalable experience.&amp;nbsp; The following agents are now available in preview to select customers:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;A href="http://aka.ms/Secure2025/MicrosoftEntraNews" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;STRONG&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Conditio&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;nal Access Optimization Agent in Microsoft &lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&lt;STRONG&gt;Entra&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; monitors for new users or apps not covered by existing policies, identifies necessary updates to close security gaps, and recommends quick fixes for identity teams to apply with a single click.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;A href="https://aka.ms/Secure25/IntuneAgents" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&lt;STRONG&gt;Vulnerability Remediation Agent in Microsoft Intune&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt; &lt;SPAN data-contrast="auto"&gt;monitors and prioritizes vulnerabilities and remediation tasks to address app and policy configuration issues and expedites Windows OS patches with admin approval.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"&gt;&lt;A href="https://techcommunity.microsoft.com/blog/defenderthreatintelligence/introducing-the-threat-intelligence-briefing-agent/4390821" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&lt;STRONG&gt;Threat Intelligence Briefing Agent in Security Copilot&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; automatically curates relevant and timely threat intelligence based on an organization’s unique attributes and cyberthreat exposure.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;And there’s more to come. Over the next few weeks, additional agents will become available to customers:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;A href="http://aka.ms/XDR-Secure25" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&lt;STRONG&gt;Phishing Triage Agent in Microsoft Defender&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt; &lt;SPAN data-contrast="none"&gt;triages phishing alerts with accuracy to identify real cyberthreats and false alarms. It provides easy-to-understand explanations for its decisions and improve&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;s detection based on admin feedback.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="http://aka.ms/CopilotinPurviewBlog" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&lt;STRONG&gt;Alert Triage Agents in Microsoft Purview&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; triage data loss prevention and insider risk alerts, prioritize critical incidents, and continuously improve accuracy based on admin feedback.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Partner agents&lt;/STRONG&gt; from &lt;/SPAN&gt;&lt;A href="https://www.onetrust.com/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;OneTrust&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;, &lt;/SPAN&gt;&lt;A href="https://www.tanium.com/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Tanium&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;, &lt;/SPAN&gt;&lt;A href="https://www.bluevoyant.com/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;BlueVoyant&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;, &lt;/SPAN&gt;&lt;A href="https://fletch.ai/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Fletch&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;, and &lt;/SPAN&gt;&lt;A href="https://aviatrix.com/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Aviatrix&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; that automate tasks like privacy breach response, SOC assessment, alert triage, task optimization, and root cause analysis.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We’re also thrilled to announce two new partner agents that have joined our growing ecosystem since our Secure event last month, now in private preview:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Email Threat Analyst Agent&lt;/STRONG&gt; by &lt;/SPAN&gt;&lt;A href="https://www.performanta.com/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Performanta&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; conducts investigations into email-based threats and compromised user activity and provides an impact and recommended mitigation assessment.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;IAM Supervisor Agent &lt;/STRONG&gt;by &lt;/SPAN&gt;&lt;A href="https://www.performanta.com/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Performanta&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt; &lt;SPAN data-contrast="auto"&gt;uncovers and triages identity and access threats and provides an impact and recommended mitigation assessment.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;With these additions, our growing ecosystem of Security Copilot agents – now in preview – offers broader insights and powerful automation to help security teams respond faster and more effectively. We are excited to continue advancing agentic capabilities both at Microsoft and through collaboration with our third-party partners.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt; &lt;SPAN data-contrast="auto"&gt;Please visit the new &lt;/SPAN&gt;&lt;A href="https://adoption.microsoft.com/en-us/security-copilot/video-hub/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Security Copilot video hub&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; for demos or deep dives of Security Copilot agents.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H1&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Heading 2 Char"&gt;Partner&lt;/SPAN&gt; e&lt;SPAN data-ccp-charstyle="Heading 2 Char"&gt;cosystem updates&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H1&gt;
&lt;H2 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Azure Lighthouse support for Sentinel use ca&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;ses&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;&lt;STRONG&gt;Security Copilot support for Azure Lighthouse Sentinel use cases &lt;/STRONG&gt;for managed security service provider (MSSP) tenants is now generally available. With this support, MSSPs can purchase SCUs and attach them to the managing tenant in Azure Lighthouse and use those SCUs to run Security Copilot skills related to Microsoft Sentinel on their customer tenants via Azure Lighthouse. All the Sentinel skills available in Security Copilot will be invokable from the Azure Lighthouse tenant without the customer needing to have Security Copilot, thereby making Security Copilot available to MSSPs who manage multiple customers.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Supported scenarios include querying the customer Sentinel incident, incident entities/ details, querying Sentinel workspaces, and fetching Sentinel incident query. These skills can be invoked on per customer Sentinel workspace. Managing tenants using Azure Lighthouse now can do the following, without their customers needing to provision SCUs:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:150}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Use the same natural language-based prompts using Sentinel skills on customer data&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Create custom promptbooks using Sentinel skills to automate their investigations&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Use Logic Apps to trigger these promptbooks&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Learn more about how to get started with &lt;/SPAN&gt;&lt;A href="https://aka.ms/AZLHSentinelSupport" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;A&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;zure Lighthouse Support for Sentinel use cases &lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;here&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;New Security Copilot plugins&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;As part of our effort to provide customers with truly end-to-end security protection, we continue to prioritize expanding our Security Copilot partner ecosystem. We have worked with partners to develop plugins to enhance and extend the information and data brought into Security Copilot.&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The following plugins are now in preview: &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;&lt;STRONG&gt;Censys plugin&lt;/STRONG&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;enables users to enrich investigations using threat intelligence from the Censys platform to scan a URL or domain and scan an IP address.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;HP Workforce Experience Platform (WXP)&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;plugin&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; for Security Copilot &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;allows users to gain insight into warranty of devices, application crashes, data about their fleet, and more.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/copilot/security/plugin-splunk" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&lt;STRONG&gt;Splunk plugin&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; allows Security Copilot users to make calls to Splunk to perform queries to create, retrieve, and dispatch saved Splunk searches, and retrieve and view information about fired alerts.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/copilot/security/plugin-quest-security-guardian" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&lt;STRONG&gt;Quest Security Guardian plugin&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt; &lt;SPAN data-contrast="none"&gt;reduces alert fatigue by prioritizing your most exploitable vulnerabilities and Active Directory configurations that demand attention.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="6" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;The following plugins are now in GA:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="7" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/copilot/security/plugin-checkphish" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;STRONG&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;CheckPhish plugi&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&lt;STRONG&gt;n&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt; a&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;llows users to utilize the CheckPhish AI to analyze URLs for potential phishing threats, tech support scams, cryptojacking, and other security risks.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Integration spotlight: ServiceNow SIR plugin&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The&lt;STRONG&gt; integration of &lt;/STRONG&gt;&lt;A href="https://www.servicenow.com/ai.html" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;STRONG&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;ServiceNow &lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&lt;STRONG&gt;AI&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt; &lt;STRONG&gt;and&lt;/STRONG&gt; &lt;STRONG&gt;Microsoft Security Copilot capabilities&lt;/STRONG&gt; brings joint capabilities to empower our customers and enhance their security posture. The integration optimizes incident insights within SIR and enhances Microsoft Security product’s security incident resolution status and threat prioritization capabilities, driving continuous security posture and awareness. As a result, security teams benefit from faster, more accurate incident resolution - reinforcing our commitment to delivering cutting&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;-&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; edge, AI-driven solutions that elevate the entire security ecosystem.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H1 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;F&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;lexibility, scalability, and security&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt; for AI&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H1&gt;
&lt;H2&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Heading 3 Char"&gt;Microsoft Purview for Security Copilot&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;As organizations adopt AI, implementing data controls and a  &lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/en-us/security/business/zero-trust" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Zero Trust&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt; approach is crucial to mitigate risks like data oversharing and leakage, and potential non-compliant usage in AI. We are excited to announce&lt;STRONG&gt; Microsoft Purview capabilities in preview for Security Copilot.&lt;/STRONG&gt; By combining Microsoft Purview and Security Copilot, users can:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Discover data risks&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt; such as sensitive data in user prompts and responses and receive recommended actions in their Microsoft Purview Data Security Posture Management (DSPM) for AI dashboard to reduce these risks.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Identify risky AI usage&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt; with &lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/security/business/risk-management/microsoft-purview-insider-risk-management" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Purview Insider Risk Management&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt; to investigate risky AI usage, such as an inadvertent user who has neglected security best practices and shared sensitive data in AI or a departing employee using AI to find sensitive data and exfiltrating the data through a USB device.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Govern AI usage&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt; with Microsoft Purview Audit, Microsoft Purview eDiscovery, retention policies, and non-compliant usage detection.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Learn more about &lt;/SPAN&gt;&lt;A href="https://aka.ms/SecurityforAISecurenews" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;P&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;urview for Security Copilot here&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Heading 3 Char"&gt;Copilot in &lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Heading 3 Char"&gt;Microsoft &lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Heading 3 Char"&gt;Defender for Cloud&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Copilot in Defender for Cloud &lt;/STRONG&gt;helps security teams accelerate risk remediation, making it faster and easier for security admins to remediate cloud risks by providing AI-generated summaries, remediation actions, and delegation emails, guiding users in each step of the risk reduction process. Security admins can use AI to quickly summarize a specific recommendation, generate remediation scripts, and delegate tasks via email to resource owners. The capabilities help reduce investigation time, enabling security teams to understand the risk in context and identify resources to quickly remediate. The capabilities are now generally available. Learn more about &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/defender-for-cloud/copilot-security-in-defender-for-cloud" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Copilot in Defender for Cloud here&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Enriched Incident Summaries in the Microsoft Sentinel Azure portal&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We’re excited to announce&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Security Copilot Incident Summaries&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt; in the Microsoft Sentinel Azure portal &lt;/STRONG&gt;are now in public preview. This capability provides enriched, easy-to-digest insights into security incidents - streamlining triage and helping analysts quickly understand scope, impact, and next steps. &lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/blog/MicrosoftSentinelBlog/new-capabilities-coming-to-microsoft-sentinel-this-spring/4390357" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Read the blog post her&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;e&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Enhanced Consumption Flexibility for Security Copilot&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This month we introduced enhancements to Security Copilot to enhance customer flexibility and scalability, by supplementing the existing provisioned pricing structure for Security Copilot with the addition of an &lt;STRONG&gt;overage Security Compute Unit (SCU)&lt;/STRONG&gt;. This capability ensures that users can scale their Copilot workloads beyond their provisioned capacity, for uninterrupted protection. &lt;/SPAN&gt;&lt;A href="https://aka.ms/OverageSCU-blog" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Read the blog &lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;post &lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;here&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H1 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Learn more about Security Copilot at RSA&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt; Conference 2025&lt;/SPAN&gt;&lt;/H1&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To learn more about Security Copilot and explore how it can elevate your organization’s security strategy, we invite you to connect with us at&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;booth #5744&lt;/STRONG&gt;. &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;This is a great opportunity to engage with Microsoft security experts, dive deeper into the latest innovations, and experience how Security Copilot can simplify and strengthen your security operations. Join us for our Security Copilot sessions below, stop by our booth for a live demo, or schedule a one-on-one meeting with our team.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;</description>
      <pubDate>Mon, 28 Apr 2025 15:56:45 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/rsa-conference-2025-security-copilot-agents-now-in-preview/ba-p/4406797</guid>
      <dc:creator>Dilip_Radhakrishnan</dc:creator>
      <dc:date>2025-04-28T15:56:45Z</dc:date>
    </item>
    <item>
      <title>Using Security Copilot to Proactively Identify and Prioritize Vulnerabilities</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/using-security-copilot-to-proactively-identify-and-prioritize/ba-p/4404560</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 aria-level="2"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Introduction&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;There are many different approaches when it comes to prioritizing the vulnerabilities which need addressing with urgency. Any information or guidance to help you make better informed decisions can be critical but how can you stay informed? Leveraging all the information sources available to you can be the difference and allow you to be proactive when trying to protect your organization.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;One useful feed is offered by CISA (Cybersecurity &amp;amp; Infrastructure Security Agency) who works with partners to defend against today’s threats and collaborate to build a more secure and resilient infrastructure for the future. &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;The Known Exploited Vulnerabilities (KEV) Catalog is a curated list maintained by CISA. It identifies vulnerabilities that have been actively exploited in the wild, posing significant risks to organizations and individuals. The catalog aims to enhance cybersecurity by providing timely information on these vulnerabilities, enabling proactive mitigation efforts.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;335557856&amp;quot;:16448250,&amp;quot;335559738&amp;quot;:90,&amp;quot;335559739&amp;quot;:150}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Key features of the KEV Catalog include:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;335557856&amp;quot;:16448250,&amp;quot;335559738&amp;quot;:90,&amp;quot;335559739&amp;quot;:150}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Identification: Lists vulnerabilities that are confirmed to be exploited.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;335557856&amp;quot;:16448250,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Details: Provides technical details, including affected products and versions.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;335557856&amp;quot;:16448250,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Mitigation: Offers guidance on how to address and remediate the vulnerabilities.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;335557856&amp;quot;:16448250,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Updates: Regularly updated to reflect new threats and exploited vulnerabilities.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;335557856&amp;quot;:16448250,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The KEV Catalog serves as a critical resource for cybersecurity professionals, helping them prioritize patching and defense strategies to protect against known threats.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The feed is designed to help organizations stay informed about vulnerabilities that have been exploited in the wild. It is part of CISA's efforts to defend against current threats and build a more secure and resilient infrastructure for the future&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3 aria-level="2"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Workflow overview&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The automated CISA feed solution addresses prioritization challenges by streamlining the process of vulnerability management. This solution checks the latest CISA feed every 24 hours and queries the CVE findings against devices within Microsoft Defender for Endpoint. Security Copilot then checks for remediation actions and enriches the description, providing a comprehensive overview of the vulnerability.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Figure 1: Example of the email output from the Logic App&lt;/img&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Key benefits of the Logic App include:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Automated Updates: &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;The Logic App automatically retrieves the latest CISA feed, ensuring that analysts have up-to-date information without manual intervention. This eliminates the need for manual checks and reduces the risk of missing critical updates.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Device Vulnerability Assessment:&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; It queries the CVE findings against devices within the organization, identifying which devices are vulnerable to the reported CVEs. This targeted approach allows analysts to focus on the most critical vulnerabilities affecting their specific environment, enhancing the efficiency of the remediation process.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Remediation Insights:&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; Security Copilot provides detailed remediation actions, helping analysts understand the steps needed to mitigate the vulnerabilities. By enriching the description with actionable insights, it simplifies the decision-making process and accelerates the implementation of security measures.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Email Notifications:&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; An email with the findings is sent to a designated mailbox, allowing for easy review and follow-up. This ensures that all relevant stakeholders are informed promptly, facilitating coordinated responses and continuous monitoring of the organization's security posture.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;img&gt;Figure 2: Screenshot of the CISA Logic App&lt;/img&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Click &lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://github.com/Azure/Security-Copilot/blob/main/Logic%20Apps/LatestCISAVulnerabilities/Readme.md" target="_blank" rel="noopener"&gt;here&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; to get started and install the Logic App today.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335559685&amp;quot;:0,&amp;quot;335559737&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4 aria-level="2"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Conclusion&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To prioritize effectively, gather all necessary information for informed decisions. While the Logic App CISA workflow is one approach, other methods may better suit your organization. &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/securitycopilotblog/extending-microsoft-copilot-for-security-capabilities-with-azure-function-apps/4220267" target="_blank" rel="noopener" data-lia-auto-title="Function Apps" data-lia-auto-title-active="0"&gt;Function Apps&lt;/A&gt; can enhance decision making by automating and streamlining security operations with integrated tools and processes. The &lt;A class="lia-external-url" href="https://github.com/Azure/Security-Copilot/tree/main" target="_blank" rel="noopener"&gt;Security Copilot GitHub repository&lt;/A&gt; offers AI-powered solutions using machine learning and natural language processing to improve security. These tools help identify vulnerabilities, predict risks, and implement protective measures. Check it out!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Apr 2025 17:04:19 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/using-security-copilot-to-proactively-identify-and-prioritize/ba-p/4404560</guid>
      <dc:creator>jamilmirza</dc:creator>
      <dc:date>2025-04-16T17:04:19Z</dc:date>
    </item>
    <item>
      <title>Securely integrate On-Prem and Self-Hosted VM instances of Splunk with Microsoft Security Copilot</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/securely-integrate-on-prem-and-self-hosted-vm-instances-of/ba-p/4402551</link>
      <description>&lt;P&gt;Microsoft Security Copilot is a SaaS-based, AI-powered cybersecurity solution that uses generative AI to empower defenders to protect at speed and scale of AI. Integrating Security Copilot with other SaaS platforms is generally straightforward thanks to native cloud-to-cloud connectivity. This includes native cloud-to-cloud integration with Splunk Cloud, now part of Cisco.&lt;/P&gt;
&lt;P&gt;The &lt;STRONG&gt;Security Copilot plugin for Splunk&lt;/STRONG&gt; also supports &lt;STRONG&gt;on-premises&lt;/STRONG&gt; and &lt;STRONG&gt;self-hosted VM deployments&lt;/STRONG&gt; of Splunk; however, additional steps are required to enable secure and reliable communication in these scenarios.&lt;/P&gt;
&lt;P&gt;This blog walks you through how to integrate Security Copilot with non-SaaS editions of Splunk using &lt;STRONG&gt;Microsoft Entra ID Application Proxy&lt;/STRONG&gt; and &lt;STRONG&gt;Azure Application Gateway with Web Application Firewall (WAF)&lt;/STRONG&gt;. This setup ensures that your Splunk instance remains protected behind enterprise-grade security controls while still being accessible to Security Copilot for log analysis and threat investigation.&lt;/P&gt;
&lt;P&gt;While this guidance is specifically for Splunk the same general principles can be applied to integrate other on-prem solutions with Security Copilot.&lt;/P&gt;
&lt;H3&gt;Solution overview&lt;/H3&gt;
&lt;P&gt;In this blog post, we illustrate how to securely integrate Microsoft Security Copilot with Splunk in two common scenarios:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;When your Splunk instance is already running within an Azure Virtual Network (VNet).&lt;/LI&gt;
&lt;LI&gt;When your Splunk instance is deployed on-premises but you already have network connectivity to an Azure VNet through VPN or ExpressRoute.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;If these conditions are not met—for example, if your Splunk deployment is fully isolated on-premises without connectivity to Azure—it is still possible to securely expose your instance to Security Copilot by using a reverse proxy hosted on-premises instead of Azure Application Gateway. However, that approach is outside the scope of this blog.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The solution presented here relies on a combination of Microsoft Entra ID Application Proxy and Azure Application Gateway with Web Application Firewall (WAF) to create a secure, controlled communication channel between Security Copilot and your Splunk instance.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Entra ID Application Proxy&lt;/STRONG&gt; is used to publish the Splunk REST endpoint in a secure manner. This ensures that the Splunk instance is not directly exposed to the Internet and that no inbound ports need to be opened on your firewall.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Azure Application Gateway&lt;/STRONG&gt;, equipped with &lt;STRONG&gt;WAF&lt;/STRONG&gt;, acts as a reverse proxy that enforces access controls based on source IP addresses. It ensures that only traffic originating from the known &lt;A href="https://learn.microsoft.com/en-us/copilot/security/plugin-ip-address" target="_blank" rel="noopener"&gt;Security Copilot egress IPs&lt;/A&gt; is allowed to reach the published Splunk endpoint. Additionally, WAF allows you to enforce protections such as the OWASP Top 10, Bot Protection and custom rules adding another layer of defense.&lt;/P&gt;
&lt;P&gt;This approach is applicable not only for Splunk instances hosted in Azure, but also for self-hosted VM deployments running on other public clouds such as AWS or GCP, as long as they are reachable via a secure VNet-integrated path.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Below is a high-level view of the architecture:&lt;/STRONG&gt;&lt;/P&gt;
&lt;img&gt;Splunk hosted on Azure&lt;/img&gt;&lt;img&gt;Splunk instance deployed on-premises with network connectivity to an Azure VNet through VPN or ExpressRoute&lt;/img&gt;
&lt;H3&gt;Step by step deployment guide&lt;/H3&gt;
&lt;P&gt;The following sections describe the procedures for configuring Microsoft Entra ID Application Proxy and Azure Application Gateway to enable secure integration between Security Copilot and your Splunk instance.&lt;/P&gt;
&lt;P&gt;⚠️&lt;EM&gt; &lt;STRONG&gt;Important&lt;/STRONG&gt;: While the guidance provided outlines a reference architecture, please make sure to adapt all configuration steps to reflect your actual network topology and IP address space. Specific settings such as subnet ranges, routing paths, and firewall rules should align with your organization’s infrastructure design and security policies.&lt;/EM&gt;&lt;/P&gt;
&lt;H3&gt;Entra ID Application Proxy setup and configuration&lt;/H3&gt;
&lt;H4&gt;Download and Configure the Connector Service&lt;/H4&gt;
&lt;P&gt;To enable secure connectivity between Security Copilot and your on-premises or self-hosted Splunk instance, begin by setting up the Entra ID Application Proxy connector:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Download the connector from the Azure Portal: go to https://portal.azure.com → Entra ID → Application Proxy.&lt;/LI&gt;
&lt;/OL&gt;
&lt;img&gt;App Proxy Connector download&lt;/img&gt;
&lt;OL start="2"&gt;
&lt;LI&gt;Ensure your network environment is properly configured for outbound connectivity. Refer to &lt;A href="https://learn.microsoft.com/en-us/azure/active-directory/app-proxy/application-proxy-prerequisites" target="_blank" rel="noopener"&gt;Microsoft's documentation&lt;/A&gt; for detailed prerequisites and firewall rules.&lt;/LI&gt;
&lt;LI&gt;The connector must be installed on a Windows Server 2012 R2 or later.&lt;/LI&gt;
&lt;LI&gt;Once installed successfully, the connector establishes a secure outbound communication channel with Azure. You can verify its status under the Health Status section in the portal.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Connector health status&lt;/img&gt;
&lt;H4&gt;Configure an Entra ID Application for Splunk&lt;/H4&gt;
&lt;P&gt;The next step is to publish your Splunk instance as an app via Application Proxy. This allows Security Copilot to securely invoke Splunk’s APIs, which are exposed on the default management port &lt;STRONG&gt;8089&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; Ensure that the splunkd service is configured with a valid SSL certificate. The connector requires HTTPS for communication.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;In the Application Proxy section, click on &lt;STRONG&gt;“Configure an app”&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Configure an app&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="2"&gt;
&lt;LI&gt;Fill in the relevant fields. Under the Pre-authentication section, select "&lt;STRONG&gt;Passthrough&lt;/STRONG&gt;".&lt;BR /&gt;Since the Security Copilot plugin supports either API Key Authentication or Basic Authentication, it cannot perform Microsoft Entra ID authentication. Therefore, authentication must be handled directly by Splunk.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Configure an app&lt;/img&gt;
&lt;P&gt;&lt;STRONG&gt;Important:&lt;/STRONG&gt; To add an additional security layer and restrict access only to Security Copilot’s egress IP addresses, a custom WAF Policy will be configured on the Application Gateway, as described in the following section.&lt;/P&gt;
&lt;OL start="3"&gt;
&lt;LI&gt;Once configured, the app will be visible under &lt;STRONG&gt;Entra ID → App registrations&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/OL&gt;
&lt;img&gt;Splunk App registration&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="4"&gt;
&lt;LI&gt;You can test the application by navigating to the external URL defined during setup.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; Although Splunk listens on port 8089, Application Proxy exposes the service externally over port 443 (HTTPS).&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Licensing Requirement:&lt;/STRONG&gt; Entra ID P1 licenses or higher are required to use Application Proxy.&lt;/P&gt;
&lt;H3&gt;Application Gateway and WAF Configuration&lt;/H3&gt;
&lt;P&gt;You can use the Azure Portal wizard to create and configure the Application Gateway with the following steps:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Tip&lt;/STRONG&gt;: &lt;EM&gt;If you already have Azure DDoS deployed and can use the same Virtual Network there will be no&lt;/EM&gt;&lt;EM&gt; additional charges to the WAF as detailed here: &lt;/EM&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/ddos-protection/ddos-faq" target="_blank" rel="noopener"&gt;&lt;EM&gt;Azure DDoS Protection frequently asked questions | Microsoft Learn&lt;/EM&gt;&lt;/A&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Create the Application Gateway&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI&gt;Navigate to&amp;nbsp;Create a resource &amp;gt; Networking &amp;gt; Application Gateway.&lt;/LI&gt;
&lt;LI&gt;Select the appropriate&amp;nbsp;Resource Group and Azure region.&lt;/LI&gt;
&lt;LI&gt;For&amp;nbsp;Tier, choose WAF V2.&lt;/LI&gt;
&lt;LI&gt;If you already have a&amp;nbsp;WAF Policy, select it. Otherwise, you can create one later using the configuration guidance provided in the next section.&lt;/LI&gt;
&lt;LI&gt;Choose the&amp;nbsp;dedicated subnet (e.g., subnet-appgw) for the Application Gateway instance.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Create Application Gateway&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="2"&gt;
&lt;LI&gt;&lt;STRONG&gt;Configure the Frontend IP&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI&gt;Select&amp;nbsp;Private as the frontend IP type.&lt;/LI&gt;
&lt;LI&gt;Assign a static private IP address from the selected subnet. This IP will serve as the entry point for requests coming from Entra ID Application Proxy.&lt;/LI&gt;
&lt;/UL&gt;
&lt;img&gt;Fronted configuration&lt;/img&gt;
&lt;OL start="3"&gt;
&lt;LI&gt;&lt;STRONG&gt;Add the Backend Pool&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI&gt;Add your&amp;nbsp;Splunk Search Head as a backend target.&lt;/LI&gt;
&lt;LI&gt;This can be either:
&lt;UL&gt;
&lt;LI&gt;A VM running in the same VNet as AppGW, or&lt;/LI&gt;
&lt;LI&gt;A Splunk instance hosted on-premises, reachable via VPN or ExpressRoute.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;img&gt;Add backend pool&lt;/img&gt;
&lt;OL start="4"&gt;
&lt;LI&gt;&lt;STRONG&gt;Configure Routing Rules&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI&gt;Under the&amp;nbsp;Configuration tab, add a Routing Rule:
&lt;UL&gt;
&lt;LI&gt;Create a Listener and bind it to the private frontend IP you configured in step 2.&lt;/LI&gt;
&lt;LI&gt;Upload your Splunk instance’s TLS certificate in PFX format to enable HTTPS.&lt;/LI&gt;
&lt;LI&gt;Set the backend protocol to HTTPS and the port to 8089, which is the default for Splunk’s management and search APIs.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;img&gt;Add routing rule - listener&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Add routing rule - backend&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="5"&gt;
&lt;LI&gt;&lt;STRONG&gt;Tags (optional)&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI&gt;Add tags as needed for resource classification, billing, or automation purposes.&lt;/LI&gt;
&lt;/UL&gt;
&lt;OL start="6"&gt;
&lt;LI&gt;&lt;STRONG&gt;Review and Create&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI&gt;Review your configuration and create the Application Gateway.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;review and create&lt;/img&gt;
&lt;P&gt;Once deployed, the Application Gateway will serve as a secure intermediary, ensuring that only requests from the known Security Copilot egress IPs reach your Splunk instance, and that all communication is encrypted and inspected by WAF.&lt;/P&gt;
&lt;H3&gt;WAF Policy configuration&lt;/H3&gt;
&lt;P&gt;Create a WAF Policy, associate it with the Application Gateway, and configure a &lt;STRONG&gt;custom rule&lt;/STRONG&gt; as follows to allow traffic &lt;STRONG&gt;only from the Security Copilot egress IPs&lt;/STRONG&gt;.&lt;BR /&gt;&lt;STRONG&gt;Note&lt;/STRONG&gt;: Since the traffic is proxied through &lt;STRONG&gt;Entra ID Application Proxy&lt;/STRONG&gt;, the source IP check must be performed on the &lt;STRONG&gt;X-Forwarded-For header&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;WAF policy&lt;/img&gt;
&lt;P&gt;Configuring your Splunk plugin in Security Copilot&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Navigate to the Splunk plugin and select Setup&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Plugin set up&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Choose your preferred authentication method (API Key) recommended&lt;/LI&gt;
&lt;/OL&gt;
&lt;img&gt;Plugin authentication&lt;/img&gt;
&lt;OL&gt;
&lt;LI&gt;Enter the external url generated by Entra ID App proxy and click save&lt;/LI&gt;
&lt;/OL&gt;
&lt;img&gt;Plugin settings&lt;/img&gt;
&lt;H3&gt;Conclusion&lt;/H3&gt;
&lt;P&gt;By leveraging Microsoft Entra ID Application Proxy and Azure Application Gateway with Web Application Firewall (WAF), you can securely connect on-premises or self-hosted Splunk instances to Microsoft Security Copilot - enabling seamless log analysis and threat investigation without exposing Splunk to the internet. This approach extends Security Copilot’s reach beyond SaaS applications, broadening the context needed for effective investigations across hybrid environments.&lt;/P&gt;
&lt;H3&gt;Additional resources&lt;/H3&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/copilot/security/plugin-splunk" target="_blank" rel="noopener"&gt;Splunk and Microsoft Security Copilot | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/domain-services/deploy-azure-app-proxy" target="_blank" rel="noopener"&gt;Deploy Microsoft Entra application proxy for Microsoft Entra Domain Services - Microsoft Entra ID | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/app-proxy/conceptual-deployment-plan" target="_blank" rel="noopener"&gt;Plan a Microsoft Entra application proxy Deployment - Microsoft Entra ID | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/app-proxy/application-proxy-application-gateway-waf" target="_blank" rel="noopener"&gt;Using Application Gateway WAF to protect your application - Microsoft Entra ID | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/web-application-firewall/ag/application-gateway-waf-configuration?tabs=portal" target="_blank" rel="noopener"&gt;Web application firewall exclusion lists in Azure Application Gateway - Azure portal | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/app-proxy/application-proxy-network-topology" target="_blank" rel="noopener"&gt;Network topology considerations for Microsoft Entra application proxy - Microsoft Entra ID | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/vpn-gateway/tutorial-site-to-site-portal" target="_blank" rel="noopener"&gt;Tutorial - Create S2S VPN connection between on-premises network and Azure virtual network: Azure portal - Azure VPN Gateway | Microsoft Learn&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Apr 2025 15:30:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/securely-integrate-on-prem-and-self-hosted-vm-instances-of/ba-p/4402551</guid>
      <dc:creator>AntonioFormato</dc:creator>
      <dc:date>2025-04-10T15:30:00Z</dc:date>
    </item>
    <item>
      <title>Introducing more consumption flexibility with Security Copilot enhancements</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/introducing-more-consumption-flexibility-with-security-copilot/ba-p/4399222</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="none"&gt;In today’s rapidly evolving cybersecurity landscape, efficiently managing security and IT operations is more critical than ever. Organizations need scalable and flexible solutions that offer robust protection. Last year, we launched Microsoft Security Copilot, a generative AI-powered assistant designed to help security and IT teams operate at the speed and scale of AI. Since then, organizations have used Copilot to enhance their security and IT workflows, with companies like &lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/en/customers/story/1797704796946869974-qnet-microsoft-copilot-for-security-retailers-en-hong-kong-sar" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;QNET&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt; reporting a 60% increase in efficiency&lt;/SPAN&gt; &lt;SPAN data-contrast="none"&gt;post-adoption&lt;/SPAN&gt; &lt;SPAN data-contrast="none"&gt;—enabling teams to detect and respond to threats faster than ever before.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;To further enhance customer flexibility and scalability, we are now supplementing the existing provisioned pricing structure for Security Copilot with the addition of an overage Security Compute Unit (SCU). This update ensures that organizations can confidently scale their Security Copilot workloads dynamically beyond their provisioned capacity, while maintaining cost predictability and control.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H1 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;E&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;nsur&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;e&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt; uninterrupted &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Security Copilot&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt; assistance&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H1&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Security is a mission-critical necessity, and unexpected threats or workload spikes can arise at any time, demanding a pricing model that is both flexible and scalable to ensure uninterrupted protection. Previously, precise usage estimation was required to av&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;oid throttled workloads. Now, enabling overage SCUs ensures organizations can handle unforeseen security demands without disruption.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335559685&amp;quot;:0,&amp;quot;335559737&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Security Copilot us&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;ers can continue using their provisioned SCUs for regular workloads, while overage SCUs provide &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;additional&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt; capacity&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt; when &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;needed. This&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt; hybrid approach allows customers to &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;establish&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt; a base fixed SCU provisioned &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;capacity&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt; and set a &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;maximum&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt; overage limit.&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt; Customers only pay for overage SCUs used when they consume beyond their provisioned SCU allocation, ensuring scalability and support during unexpected demand spikes without incurring unnecessary costs. Additionally, they have the option to set an upper limit on overage SCUs, which provides better budget predictability. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H1&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;G&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;et granular insights&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt; with the usage dashboard&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H1&gt;
&lt;img /&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;The in-product usage dashboard has also been updated to help organizations track and manage SCU consumption effectively. The dashboard offers detailed insights into SCU usage, allowing admins to monitor consumption against provisioned SCUs, track overage SCU usage, and review granular details such as session initiators, IDs, categories, and experience. The dashboard ensures organizations have the visibility needed to optimize usage while maintaining budget control.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;The combination of provisioned and overage SCU provides organizations with peace of mind, knowing that critical security operations always have the necessary resources when they’re needed most.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H1 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Get Started with Overage SCUs &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;t&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;oday&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H1&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;As cyber risks continue to grow, having the right tools to manage security efficiently, cost-effectively, and at-scale is crucial. With this latest enhancement, Microsoft Security Copilot is equipping organizations with the scalability and flexibility needed to secure their environment with confidence.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Overage SCUs are generally available today. Existing customers can immediately enable overage SCUs or set a limit on maximum usage in Security Copilot. Learn more about Security Copilot pricing &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/copilot/security/get-started-security-copilot" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;here&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;, and calculate your estimated maximum spend per month using the &lt;/SPAN&gt;&lt;A href="https://azure.microsoft.com/en-us/pricing/calculator/?service=microsoft-security-copilot" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;pricing calculator&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;. &amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://azure.microsoft.com/en-us/pricing/purchase-options/azure-account?icid=azurefreeaccount" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Sign up&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt; for a free Azure subscription to get started with Security Copilot today.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Apr 2025 18:48:11 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/introducing-more-consumption-flexibility-with-security-copilot/ba-p/4399222</guid>
      <dc:creator>Dilip_Radhakrishnan</dc:creator>
      <dc:date>2025-04-02T18:48:11Z</dc:date>
    </item>
    <item>
      <title>Automate cybersecurity at scale with Microsoft Security Copilot agents</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/automate-cybersecurity-at-scale-with-microsoft-security-copilot/ba-p/4394675</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;When we introduced &lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/security/business/ai-machine-learning/microsoft-security-copilot" target="_blank" rel="noopener"&gt;Microsoft Security Copilot&lt;/A&gt; last year, we set out to transform the way defenders approach cybersecurity. As one of the industry's first generative AI solutions for security and IT teams, Security Copilot is empowering teams to catch what others miss, respond faster, and strengthen team expertise in an evolving threat landscape.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Customers like &lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://www.microsoft.com/en/customers/story/1802842951607118817-eastman-microsoft-defender-other-en-united-states" target="_blank" rel="noopener"&gt;Eastman&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; are already seeing the impact. “I’m finding that I can ask [Security Copilot] about attack factors that I’ve never seen before and get answers much faster”, said David Yates, Senior Cybersecurity Analyst at Eastman. “That helps me to make a better decision and respond faster to an attacker.” A &lt;/SPAN&gt;&lt;A href="https://aka.ms/SecurityCopilotMTTRResearch" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;recent study&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; of Copilot users showed that using Security Copilot reduced mean time to resolution by 30%, helping accelerate response times and minimizing the impact of security incidents.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;But as defenders evolve, so have attackers.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Adversaries are now leveraging AI to launch more sophisticated attacks with unprecedented speed and scale. Security and IT teams – already overwhelmed by a huge volume of alerts, data, and threats – are struggling to keep up. Traditional automation, while useful, lacks the flexibility and adaptability to keep up.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Today, we’re taking the next leap forward in generative AI-powered cybersecurity. I am thrilled to introduce&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; &lt;STRONG&gt;agents in Microsoft Security Copilot.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;div data-video-id="https://youtu.be/7pI7DyiG-u4/1742831924757" data-video-remote-vid="https://youtu.be/7pI7DyiG-u4/1742831924757" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2F7pI7DyiG-u4%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D7pI7DyiG-u4&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2F7pI7DyiG-u4%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;AI-powered agents represent the natural evolution of Security Copilot, going beyond AI assistant capabilities. They autonomously manage high-volume security and IT tasks, seamlessly integrated with Microsoft Security solutions and partner solutions. Purpose-built for security, these agents learn from feedback, adapt to organizational workflows with your team fully in-control, and operate securely within Microsoft’s Zero-Trust framework.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Delivering powerful automation across threat protection, identity management, data security, and IT operations, these agents empower teams to accelerate responses, prioritize risks, and drive efficiency at scale. By reducing manual workloads, they enhance operational effectiveness and strengthen overall security posture – allowing defenders to stay ahead. To bring this automation to life, we’re introducing six security agents from Microsoft and five security agents from partners which will be available for preview&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;in April.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H1 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Empowering security and IT &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;teams with &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Security Copilot &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;agents&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H1&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Our goal is to provide generative AI-powered security for everyone. Integrating Copilot with Microsoft Security products helps IT and security teams benefit from increased speed and accuracy. Now, you can use embedded Security Copilot agents with capabilities specific to use cases for your role in the products you know and love:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN data-ccp-props="{}"&gt;Security Alert Triage Agent&lt;EM&gt; (previously named Phishing Triage Agent)&lt;/EM&gt;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;SOC analysts often face the challenge of managing hundreds of user-submitted phishing alerts each week, with each alert taking up to 30 minutes for manual triage. This process requires meticulous sifting through submissions to find the needle in the haystack – the genuine threat amidst all the noise.&amp;nbsp; Security Copilot solves this challenge with an AI-powered agent embedded in Microsoft Defender, that works in the background to autonomously triage user-submitted phishing incidents. Powered by advanced multi-modal AI tools, it determines whether an alert is a genuine phishing attempt or a false alarm with exceptional precision. The agent not only delivers natural language explanations for its decisions but also dynamically refines its detection capabilities based on analyst feedback. By alleviating the burden of reactive work, it empowers SOC analysts to focus on proactive security measures, ultimately strengthening the organization's overall security posture.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Note: &lt;/STRONG&gt;The Phishing Triage Agent has since been expanded and is now called the Security Alert Triage Agent. Learn more at &lt;A class="lia-external-url" href="http://aka.ms/SATA" target="_blank"&gt;aka.ms/SATA&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H2&gt;&lt;SPAN data-contrast="auto"&gt;Alert Triage Agents for Data Loss Prevention and Insider Risk Management&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Data security admins regularly struggle to manage the volume of alerts they receive daily, addressing only about 60% of them due to time and resource constraints&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-fontsize="10"&gt;1&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;. The Alert Triage Agents in Microsoft Purview Data Loss Prevention (DLP) and Insider Risk Management (IRM) identify the alerts that pose the greatest risk to your organization and should be prioritized first. These agents analyze the content and potential intent involved in an alert, based on the organization’s chosen parameters and selected policies, to categorize alerts based on the impact they have on sensitive data. Additionally, they provide a comprehensive explanation on the logic behind that categorization, allowing admins to analyze a risk in just a few minutes. These agents empower data security teams to focus on the most important alerts and concentrate on the critical threats, with a dynamic process that takes inputs from data security admins in natural language and fine-tunes the triage results to better match the organizations’ priorities. The agent learns from this feedback, using that rationale to calibrate the prioritization of future alerts in DLP and IRM. Learn more about the &lt;A class="lia-external-url" href="http://aka.ms/CopilotinPurviewBlog" target="_blank" rel="noopener"&gt;Alert Triage Agents for DLP and IRM here.&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN data-contrast="auto"&gt;Conditional Access Optimization Agent&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;As organizations grow, identity and IT admins must continuously ensure that access policies adapt to new employees, contractors, SaaS apps, and more – keeping security intact without adding complexity. But as their environments evolve, keeping Conditional Access (CA) policies up to date becomes increasingly difficult. New users and apps can slip through, and exclusions can go unaddressed, creating security risks. Even with routine reviews, manually auditing policies and adjusting coverage can take days or weeks –yet gaps can still go unnoticed.&amp;nbsp; The CA Optimization Agent in Microsoft Entra changes that for admins, automating the detection and resolution of policy drift. This agent continuously monitors for newly created users and applications, analyzing their alignment with existing CA policies, and proactively detects security gaps in real time. Unlike static automation, it recommends optimizations and provides one-click fixes, helping admins refine policy coverage effortlessly while ensuring a strong, adaptive security posture.&amp;nbsp; Learn more about the &lt;A class="lia-external-url" href="http://aka.ms/Secure2025/MicrosoftEntraNews" target="_blank" rel="noopener"&gt;CA Optimization Agent here.&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN data-contrast="auto"&gt;Vulnerability Remediation Agent&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Managing security vulnerabilities is a growing challenge for organizations, as the volume of CVEs and limited resources make it difficult to prioritize and implement critical fixes effectively.&amp;nbsp; Microsoft Intune is designed for organizations that need a modern, cloud-powered approach to endpoint management, one that not only simplifies IT operations but strengthens security in an evolving threat landscape. IT admins require more than just visibility into vulnerabilities; they need a proactive, risk-based security strategy that continuously assesses risk and automates remediation to minimize exposure. That’s why Intune is introducing the Vulnerability Remediation Agent—a solution built to help organizations stay ahead of emerging threats.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;By leveraging Microsoft Defender Vulnerability Management, the agent automatically identifies, evaluates, and prioritizes vulnerabilities. It continuously monitors newly published threats, assesses their risk levels, and offers clear, actionable recommendations for remediation. With continuous vulnerability detection, risk-based prioritization and guided remediation, the agent reduces exposure time while freeing up IT teams to focus on strategic initiatives. This is the first step toward designing vulnerability remediation at scale. A future, comprehensive approach will work across device platforms, address vulnerabilities in third-party applications, and remediate using configuration changes. Learn more about the&amp;nbsp;&lt;A class="lia-external-url" href="https://aka.ms/Secure25/IntuneAgents" target="_blank" rel="noopener"&gt;Vulnerability Remediation Agent here.&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN data-contrast="auto"&gt;Threat Intelligence Briefing Agent&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Cyber Threat Intelligence analysts often face data overload and resource constraints when sourcing the threat intelligence needed to help their organizations understand, prioritize, and respond to critical threats. Crafting a threat intelligence briefing for security teams and executives can take hours—or even days—due to the constant evolution of both the threat landscape and an organization’s attack surface.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;The Threat Intelligence Briefing Agent in Security Copilot dramatically expedites this process. It automatically curates up-to-date, context-specific intelligence tailored to your organization’s unique profile and attack surface. Operating autonomously in the background, it taps into Microsoft’s extensive threat intelligence resources (including Microsoft Defender Threat Intelligence and Microsoft Defender External Surface Management) to deliver prioritized reports in just 4-5 minutes. This tool not only cuts down on manual effort but also highlights the most pressing threats and provides actionable recommendations, ensuring your team stays well-informed and ready to respond. Learn more about the&lt;A class="lia-external-url" href="https://aka.ms/Secure-2025" target="_blank" rel="noopener"&gt; Threat Intelligence Briefing Agent here.&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H1 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;E&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;xtending agent&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;ic &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;capabilities &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;with partner solutions&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H1&gt;
&lt;P aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;We are grateful to our partners who continue to play a vital role in empowering everyone to confidently adopt&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt; safe and responsible AI&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;.&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Our growing partner ecosystem seamlessly integrates Security Copilot with established to&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;ols across various applications. Today, I am pleased to &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;share&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt; five new&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt; upcoming&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt; agents in partner solutions, with&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt; many&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt; more to come.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Privacy Breach Response Agent by &lt;A class="lia-external-url" href="https://www.onetrust.com/" target="_blank" rel="noopener"&gt;OneTrust&lt;/A&gt;&lt;/STRONG&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;analyzes a data breach based on type of data, geographic jurisdiction, and regulatory requirements to generate guidance for the privacy team on how to meet those requirements.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Network Supervisor Agent by&amp;nbsp;&lt;A class="lia-external-url" href="https://aviatrix.com/" target="_blank" rel="noopener"&gt;Aviatrix&lt;/A&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;determines why a VPN, Gateway, or Site2Cloud connection is down and provides information about the failure.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;SecOps Tooling Agent by &lt;A class="lia-external-url" href="https://www.bluevoyant.com/" target="_blank" rel="noopener"&gt;BlueVoyant&lt;/A&gt;&lt;/STRONG&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;assesses your security operations center (SOC) and state of controls to make recommendations to optimize security operations to improve controls, efficacy, and compliance.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Alert Triage Agent by &lt;A class="lia-external-url" href="https://www.tanium.com/" target="_blank" rel="noopener"&gt;Tanium&lt;/A&gt;&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;provides analysts with necessary context to quickly and confidently make a decision on each alert.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Task Optimizer Agent by &lt;A class="lia-external-url" href="https://fletch.ai/" target="_blank" rel="noopener"&gt;Fletch&lt;/A&gt;&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;helps organizations forecast and prioritize the most critical threat alerts to reduce alert fatigue and improve security.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Learn more about our partner integrations at &lt;A class="lia-external-url" href="http://aka.ms/partnerintegrations" target="_blank" rel="noopener"&gt;aka.ms/partnerintegrations.&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H1 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Get Started with Security Copilot Agents&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H1&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft Security Copilot agents will be available in preview starting April 2025. To get started&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; with Security Copilot&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;, check out the &lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/security/business/ai-machine-learning/microsoft-security-copilot" target="_blank" rel="noopener"&gt;website&lt;/A&gt; for more information. Already using Security Copilot? Make sure you’re signed up for the Security Copilot Customer Connection Program (CCP) to receive the latest updates and features—join today at&amp;nbsp;&lt;A class="lia-external-url" href="http://aka.ms/JoinCCP" target="_blank" rel="noopener"&gt;aka.ms/JoinCCP&lt;/A&gt;.&amp;nbsp; Learn more about the latest innovations at the Microsoft Secure digital event on April 9, 2025. &lt;/SPAN&gt;&lt;A href="https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fregister.secure.microsoft.com%2F%3Focid%3Dcmm54b6jcm9&amp;amp;data=05%7C02%7Crbeaty%40bridge.partners%7C01f8044f433b4a30669908dd55acf3bf%7C93872b6253c2442f81f442f369142f76%7C0%7C0%7C638760923526767666%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=74j%2BamxZhKAyt7EsPNITe%2BC5cH1bF7U7BBtNkNN0lrQ%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Register now&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;With agents, Security Copilot continues to lead the way in AI-powered cybersecurity, helping organizations defend against threats faster, smarter, and with greater confidence.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2026 22:29:17 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/automate-cybersecurity-at-scale-with-microsoft-security-copilot/ba-p/4394675</guid>
      <dc:creator>Dorothy_Li</dc:creator>
      <dc:date>2026-04-21T22:29:17Z</dc:date>
    </item>
    <item>
      <title>Take Flight with Microsoft Security Copilot Flight School</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/take-flight-with-microsoft-security-copilot-flight-school/ba-p/4391712</link>
      <description>&lt;P&gt;Greetings pilots, and welcome to another pioneering year of AI innovation with Security Copilot. Find out how your organization can reach new heights with &lt;A href="https://adoption.microsoft.com/en-us/security-copilot/" target="_blank" rel="noopener"&gt;Security Copilot&lt;/A&gt; through the many exciting announcements on the way at both &lt;A href="https://www.microsoft.com/en-us/security/blog/2025/02/03/hear-from-microsoft-security-experts-at-these-top-cybersecurity-events-in-2025/?msockid=2a719d258556689d07c98f0584c56974" target="_blank" rel="noopener"&gt;Microsoft Secure&lt;/A&gt; and &lt;A href="https://www.microsoft.com/en-us/security/blog/2025/02/18/join-us-for-the-end-to-end-microsoft-rsac-2025-conference-experience/" target="_blank" rel="noopener"&gt;RSA 2025&lt;/A&gt;. This is why now is the time to familiarize yourself and get airborne with Security Copilot.&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Go to School&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;Microsoft Security Copilot Flight School is a comprehensive series charted to take students through fundamental concepts of AI definitions and architectures, take flight with prompting and automation, and hit &lt;A href="https://www.youtube.com/watch?v=Ti1bFMBd6V4" target="_blank" rel="noopener"&gt;supersonic speeds&lt;/A&gt; with Logic Apps and custom plugins. By the end of the course, students should be equipped with the requisite knowledge for how to successfully operate Security Copilot to best meet their organizational needs. The series contains 11 episodes with each having a flight time of around 10 minutes. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;Security Copilot is something I really, really enjoy, whether I’m actively contributing to its improvement or advocating for the platform’s use across security and IT workflows. Ever since I was granted access two years ago – which feels like a millennium in the age of AI – it’s been a passion of mine, and it’s why just recently I officially joined the Security Copilot product team. This series in many ways reflects not only my passion but similar passion found in my marketing colleagues Kathleen Lavallee (Senior Product Marketing Manager, Security Copilot) Shirleyse Haley (Senior Security Skilling Manager), and Shateva Long (Product Manager, Security Copilot). I hope that you enjoy it just as much as we did making it.&lt;/P&gt;
&lt;P&gt;Go ahead, and put on your favorite noise-cancelling headphones, it’s time, pilots, to take flight.&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Log Flight Hours&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;There are two options for watching Security Copilot Flight School: either on &lt;A href="https://learn.microsoft.com/en-us/shows/microsoft-security-copilot-flight-school/" target="_blank" rel="noopener"&gt;Microsoft Learn&lt;/A&gt; or via the &lt;A href="https://youtube.com/playlist?list=PL3ZTgFEc7LyvZxL0VTp7Yl3uULz20VPER&amp;amp;si=kZVLfjfJZlIyPQl0" target="_blank" rel="noopener"&gt;Youtube Playlist&lt;/A&gt; found on the &lt;A href="https://www.youtube.com/@MicrosoftSecurity" target="_blank" rel="noopener"&gt;Microsoft Security Youtube Channel&lt;/A&gt;. The first two episodes focus on establishing core fundamentals of Security Copilot platform design and architecture – or perhaps attaining your instrument rating. The episodes thereafter are plotted differently, around a standard operating procedure. To follow the ideal flight path Security Copilot should be configured and ready to go – head over to MS Learn and the Adoption Hub to get airborne. It’s also recommended that pilots watch the series sequentially, and be prepared to follow along with resources found on &lt;A href="https://github.com/Azure/Security-Copilot" target="_blank" rel="noopener"&gt;Github&lt;/A&gt;, to maximize learning and best align with the material. This will mean that you’ll need to coordinate with a pilot with owner permissions for your instance to create and manipulate the necessary resources.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Episode 1 - What is Microsoft Security Copilot?&lt;/STRONG&gt;&lt;/H3&gt;
&lt;img&gt;Not all AI is the same. Different data sciences have different uses in security, which is why we built Copilot.&lt;/img&gt;
&lt;P&gt;Security is complex and requires highly specialized skills to face the challenges of today. Because of this, many of the people working to protect an organization work in silos that can be isolated from other business functions. Further, enterprises are highly fragmented environments with esoteric systems, data, and processes. All of which takes a tremendous amount of time, energy, and effort just to do the day-to-day.&lt;/P&gt;
&lt;P&gt;Security Copilot is a cloud-based, AI-powered security platform that is designed to address the challenges presented by complex and fragmented enterprise environments by redefining what security is and how security gets done.&lt;/P&gt;
&lt;P&gt;What is AI, and why exactly should it be used in a cybersecurity context?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Episode 2 - AI Orchestration with Microsoft Security Copilot&lt;/STRONG&gt;&lt;/H3&gt;
&lt;img&gt;The perfect butter burger cooked to perfection and free of any peanut contamination.&lt;/img&gt;
&lt;P&gt;Why is The Paper Clip Pantry a 5-star restaurant renowned the world over for its Wisconsin Butter Burgers?&amp;nbsp; Perhaps it’s how a chef uses a staff with unique skills and orchestrates the sourcing of resources in real time, against specific contexts to complete an order. After watching this episode you’ll understand how AI Orchestration works, why nobody eats a burger with only ketchup, and how the Paper Clip Pantry operates just like the Security Copilot Orchestrator.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Episode 3 – Standalone and Embedded Experiences&lt;/STRONG&gt;&lt;/H3&gt;
&lt;img&gt;Security Copilot has many operators of its platform such as Soc Analysts, IT Admins, and CISOs.&lt;/img&gt;
&lt;P&gt;Do you have a friend who eats pizza in an inconceivable way? Maybe they eat a slice crust-first, or dip it into a sauce you never thought compatible with pizza? They work with pizza differently, just like any one security workflow could be different from one task, team, or individual to the next. This philosophy is why Security Copilot has two experiences – solutions embedded within products, and a standalone portal – to augment workflows no matter their current state. This episode will begin covering those experiences.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Episode 4 – Other Embedded Experiences&lt;/STRONG&gt;&lt;/H3&gt;
&lt;img&gt;The different Entra embedded experiences for Security Copilot.&lt;/img&gt;
&lt;P&gt;Turns out you can also insist upon putting cheese inside of pizza crust, or bake it thick enough as to require a fork and knife. I imagine, it’s probably something &lt;A href="https://youtu.be/Tf1NS1vEhSg?si=dsJ-BoCHlYHBn8pX" target="_blank"&gt;Windows 95 Man&lt;/A&gt; would do.&lt;/P&gt;
&lt;P&gt;In this episode, the Microsoft Entra, Purview, Intune, and Microsoft Threat Intelligence products showcase how Security Copilot advances their workflows within their portals.&amp;nbsp; Beyond baking in the concepts of many workflows, many operators, the takeaway from this episode is that Security Copilot works with security adjacent workflows – IT, Identity, and DLP.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Episode 5 – Manage Your Plugins&lt;/STRONG&gt;&lt;/H3&gt;
&lt;img&gt;Plugins allow you to extend functionality and source different insights across your environment.&lt;/img&gt;
&lt;P&gt;Like our chef in The Paper Clip Pantry, we should probably define what we want to cook, what chefs to use, and set permissions for those that can interact within any input or output from the kitchen.&amp;nbsp; Find out what plugins add to Security Copilot and how you can set plugin controls for your team and organization.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Episode 6 – Prompting&lt;/STRONG&gt;&lt;/H3&gt;
&lt;img&gt;The orchestrator in Security Copilot leverages context to properly select available plugins to provide the most relevant response.&lt;/img&gt;
&lt;P&gt;Is this an improv lesson, or a baking show? Or maybe if you watch this episode, you’ll learn how Security Copilot handles natural language inputs to provide you meaningful answers know as responses.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Episode 7 – Prompt Engineering&lt;/STRONG&gt;&lt;/H3&gt;
&lt;img&gt;Effective prompt design improves the quality of a response, consider your goal, the context needed, sources available, and the final presentation of the information to achieve the best result.&lt;/img&gt;
&lt;P&gt;With the fundamentals of prompting in your flight log, it’s time to soar a bit higher with prompt engineering.&amp;nbsp; In this episode you will learn how to structure prompts in a way to maximize the benefits of Security Copilot and begin building workflows.&amp;nbsp; Congrats, pilot, your burgers will no longer come with just ketchup.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Episode 8 – Using Promptbooks&lt;/STRONG&gt;&lt;/H3&gt;
&lt;img&gt;Promptbooks are at the core of automation in Security Copilot.&lt;/img&gt;
&lt;P&gt;What would it look like to find a series of prompts and run them, in the same sequence with the same output every time? You guessed it, a promptbook, a repeatable workflow in the age of AI.&amp;nbsp; See where to access promptbooks within the platform, and claw back some of your day to perfect your next butter burger.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Episode 9 – Custom Promptbooks&lt;/STRONG&gt;&lt;/H3&gt;
&lt;img&gt;The design scope of a promptbook defines its utility, which is what custom promptbooks help optimize.&lt;/img&gt;
&lt;P&gt;You’ve been tweaking your butter burger recipe for months now.&amp;nbsp; You’ve finally landed at the perfect version by incorporating a secret nacho cheese recipe. The steps are defined, the recipe perfect. How do you repeat it?&lt;/P&gt;
&lt;P&gt;Just like your butter burger creation, you might discover or design workflows with Security Copilot. With custom promptbooks you can repeat and share them across your organization.&amp;nbsp; In this episode you’ll learn about the different ways Security Copilot helps you develop your own custom AI workflows.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Episode 10 – Logic Apps&lt;/STRONG&gt;&lt;/H3&gt;
&lt;img&gt;Clippy mustache you some questions about your use of Logic Apps and Security Copilot.&lt;/img&gt;
&lt;P&gt;System automation, robot chefs? Actions?&amp;nbsp; What if customers could order butter burgers with the click of a button, and the kitchen staff would automatically make one? Or perhaps every Friday at 2pm a butter burger was just delivered to you?&amp;nbsp; &lt;BR /&gt;&lt;BR /&gt;Chances are there are different conditions across your organization that when present requires a workflow to begin. With Logic Apps, Security Copilot can be used to automatically aid workflows across any system a Logic App can connect to.&amp;nbsp; More automation, less mouse clicking, that’s a flight plan everyone can agree on.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Episode 11 – Extending to Your Ecosystem&lt;/STRONG&gt;&lt;/H3&gt;
&lt;img&gt;Custom Plugins, Logic Apps, and Custom Plugins represent different ways to extend Security Copilot to best support your organization's workflows.&lt;/img&gt;
&lt;P&gt;A famed restaurant critic stopped into the The Paper Clip Pantry ordered a butter burger, and it’s now the burger everyone is talking about. Business is booming and it's time to expand the menu – maybe a butter burger pizza, perhaps a doughnut butter burger? But you’ll need some new recipes and sources of knowledge to achieve this. &amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Like a food menu the possibilities of expanding Security Copilot’s capabilities are endless.&amp;nbsp; In this episode learn how this can be achieved with custom plugins and knowledgebases. Once you have that in your log, you will be a certified Ace, and ready to take flight with Security Copilot.&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Take Flight&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;I really hope that you not only learn something new but have fun taking flight with the Security Copilot Flight School. As with any new and innovative technology, the learning never stops, and there will be opportunities to log more flight hours from our expert flight crews.&amp;nbsp; Stay tuned at the &lt;A href="https://adoption.microsoft.com/en-us/security-copilot/video-hub/" target="_blank" rel="noopener"&gt;Microsoft Security Copilot video hub&lt;/A&gt;, &lt;A href="https://www.microsoft.com/en-us/security/blog/2025/02/03/hear-from-microsoft-security-experts-at-these-top-cybersecurity-events-in-2025/?msockid=2a719d258556689d07c98f0584c56974" target="_blank" rel="noopener"&gt;Microsoft Secure&lt;/A&gt;, and &lt;A href="https://www.microsoft.com/en-us/security/blog/2025/02/18/join-us-for-the-end-to-end-microsoft-rsac-2025-conference-experience/" target="_blank" rel="noopener"&gt;RSA 2025&lt;/A&gt; for more content in the next few months.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you think it’s time to get the rest of your team and/or organization airborne there’s check out the Security Copilot adoption hub to get started:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://aka.ms/SecurityCopilotAdoptionHub" target="_blank" rel="noopener"&gt;aka.ms/&lt;/A&gt;&lt;A href="https://aka.ms/SecurityCopilotAdoptionHub" target="_blank" rel="noopener"&gt;SecurityCopilotAdoptionHub&lt;/A&gt;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Carry-on Resources&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Our teams have been hard at work building solutions to extend Security Copilot, you can find them on our community Github page found at:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://aka.ms/SecurityCopilotGitHubRepo" target="_blank" rel="noopener"&gt;aka.ms/&lt;/A&gt;&lt;A href="https://aka.ms/SecurityCopilotGitHubRepo" target="_blank" rel="noopener"&gt;SecurityCopilotGitHubRepo&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To stay close to the latest in product news, development, and to interact with our engineering teams, please join the Security Copilot CCP to get the latest information:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://aka.ms/JoinCCP" target="_blank" rel="noopener"&gt;aka.ms/&lt;/A&gt;&lt;A href="https://aka.ms/JoinCCP" target="_blank" rel="noopener"&gt;JoinCCP&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Mar 2025 01:20:14 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/take-flight-with-microsoft-security-copilot-flight-school/ba-p/4391712</guid>
      <dc:creator>ryanmunsch</dc:creator>
      <dc:date>2025-03-14T01:20:14Z</dc:date>
    </item>
  </channel>
</rss>

