You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/external-attack-surface-management/easm-copilot.md
+41-80Lines changed: 41 additions & 80 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,11 +14,10 @@ ms.localizationpriority: high
14
14
15
15
# Microsoft Security Copilot (preview) and Defender EASM
16
16
17
-
> [!IMPORTANT]
18
-
> The information in this article applies to the Microsoft Security Copilot Early Access Program, which is an invite-only paid preview program. Some information in this article relates to prereleased product, which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided in this article.
17
+
Microsoft Defender External Attack Surface Management (Defender EASM) continuously discovers and maps your digital attack surface to provide an external view of your online infrastructure. This visibility enables security and IT teams to identify unknowns, prioritize risk, eliminate threats, and extend vulnerability and exposure control beyond the firewall. Attack Surface Insights are generated by analyzing vulnerability and infrastructure data to showcase the key areas of concern for your organization.
19
18
19
+
Defender EASM’s integration with Copilot for Security enables users to interact with Microsoft’s discovered attack surfaces. These attack surfaces allow users to quickly understand their externally facing infrastructure and relevant, critical risks to their organization. They provide insight into specific areas of risk, including vulnerabilities, compliance, and security hygiene. For more information about Copilot for Security, go to [What is Microsoft Security Copilot?](/security-copilot/microsoft-security-copilot).
20
20
21
-
Security Copilot is a cloud-based AI platform that provides a natural language copilot experience. It can help support security professionals in different scenarios, like incident response, threat hunting, and intelligence gathering. For more information about what it can do, go to [What is Microsoft Security Copilot?](/security-copilot/microsoft-security-copilot).
22
21
23
22
**Security Copilot integrates with Defender EASM**.
24
23
@@ -27,120 +26,82 @@ Security Copilot can surface insights from Defender EASM about an organization's
27
26
This article introduces you to Security Copilot and includes sample prompts that can help Defender EASM users.
28
27
29
28
29
+
## Connect Copilot to Defender EASM
30
30
31
-
## Know before you begin
32
-
33
-
- Ensure that you reference the company name in your first prompt. Unless otherwise specified, all future prompts will provide data about the initially specified company.
34
-
35
-
- Be clear and specific with your prompts. You might get better results if you include specific asset names or metadata values (e.g. CVE IDs) in your prompts.
36
-
37
-
It might also help to add **Defender EASM** to your prompt, like:
38
-
39
-
-**According to Defender EASM, what are my expired domains?**
40
-
-**Tell me about Defender EASM high priority attack surface insights.**
41
-
42
-
- Experiment with different prompts and variations to see what works best for your use case. Chat AI models vary, so iterate and refine your prompts based on the results you receive.
43
-
44
-
- Security Copilot saves your prompt sessions. To see the previous sessions, in Security Copilot, go to the menu > **My investigations**:
45
-
46
-

47
-
48
-
49
-
For a walkthrough on Security Copilot, including the pin and share feature, go to [Navigating Microsoft Security Copilot](/security-copilot/navigating-security-copilot).
50
-
51
-
For more information on writing Security Copilot prompts, go to [Microsoft Security Copilot prompting tips](/security-copilot/prompting-tips).
31
+
### Prerequisites
52
32
33
+
* Access to Copilot for Security, with permissions to activate new connections.
53
34
35
+
### Copilot for Security connection
54
36
55
-
## Open Security Copilot
37
+
1. Access [Copilot for Security](https://securitycopilot.microsoft.com/) and ensure you're authenticated.
38
+
2. Select the plugins icon on the upper-right side of the prompt input bar.
56
39
57
-
1. Go to [Microsoft Security Copilot](https://go.microsoft.com/fwlink/?linkid=2247989) and sign in with your credentials.
58
-
2. By default, Defender EASM should be enabled. To confirm, select **plugins** (bottom left corner):
40
+

59
41
60
-

42
+
3. Locate Defender External Attack Surface Management under the “Microsoft” section and toggle on to connect.
61
43
44
+

62
45
63
-
In **My plugins**, confirm Defender EASM is on. Close **Plugins**.
46
+
4. If you would like Copilot for Security to pull data from your Microsoft Defender External Attack Surface Resource, click on the gear to open the plugin settings, and fill out the fields from your resource’s “Essentials” section on the Overview blade.
64
47
65
-
> [!NOTE]
66
-
> Some roles can enable or disable plugins, like Defender EASM. For more information, go to [Manage plugins in Microsoft Security Copilot](/security-copilot/manage-plugins).
48
+
[](media/copilot-6.png#lightbox)
67
49
68
-
3. Enter your prompt.
69
50
51
+
> [!NOTE]
52
+
> Customers can still use Defender EASM skills if they have not purchased Defender EASM. See the Plugin capabilities reference section for more information.
70
53
71
54
72
-
## Built-in system features
73
55
74
-
In Security Copilot, there are built in system features. These features can get data from the different plugins that are enabled.
75
56
76
-
To view the list of built-in system capabilities for Defender EASM, use the following steps:
57
+
## Getting started
77
58
78
-
1. In the prompt, enter **/**.
79
-
2. Select **See all system capabilities**.
80
-
3. In the Defender EASM section, you can:
59
+
Copilot for Security operates primarily with natural language prompts. When querying information from Defender EASM, you submit a prompt that guides Copilot for Security to select the Defender EASM plugin and invoke the relevant capability.
60
+
For success with Copilot prompts, we recommend the following:
81
61
82
-
- Get attack surface summary.
83
-
- Get attack surface insights.
84
-
- Get assets affected by CVEs by priority or CVE ID.
85
-
- Get assets by CVSS score.
86
-
- Get expired domains.
87
-
- Get expired SSL certificates.
88
-
- Get SHA1 certificates.
89
-
90
-
91
-
92
-
## Sample prompts for Defender EASM?
93
-
94
-
There are many prompts you can use to get information about your Defender EASM data. This section lists some ideas and examples.
95
-
96
-
### General information about your attack surface
97
-
98
-
Get **general information** about your Defender EASM data, like an attack surface summary or insights about your inventory.
62
+
- Ensure that you reference the company name in your first prompt. Unless otherwise specified, all future prompts will provide data about the initially specified company.
99
63
100
-
**Sample prompts**:
64
+
- Be clear and specific with your prompts. You might get better results if you include specific asset names or metadata values (for example, CVE IDs) in your prompts.
101
65
102
-
- Get the external attack surface for my organization.
103
-
- What are the high priority attack surface insights for my organization?
66
+
It might also help to add **Defender EASM** to your prompt, like:
104
67
68
+
-**According to Defender EASM, what are my expired domains?**
69
+
-**Tell me about Defender EASM high priority attack surface insights.**
105
70
71
+
- Experiment with different prompts and variations to see what works best for your use case. Chat AI models vary, so iterate and refine your prompts based on the results you receive.
106
72
107
-
### CVE vulnerability data
73
+
- Security Copilot saves your prompt sessions. To see the previous sessions, in Security Copilot, go to the menu > **My sessions**.
108
74
109
-
Get details on **CVEs that are applicable to your inventory**.
110
75
111
-
**Sample prompts**:
76
+
For a walkthrough on Security Copilot, including the pin and share feature, go to [Navigating Microsoft Security Copilot](/security-copilot/navigating-security-copilot).
112
77
113
-
- Is my external attack surface impacted by CVE-2023-21709?
114
-
- Get assets affected by high priority CVSS's in my attack surface.
115
-
- How many assets have critical CVSS's for my organization?
78
+
For more information on writing Security Copilot prompts, go to [Microsoft Security Copilot prompting tips](/security-copilot/prompting-tips).
116
79
117
80
118
81
119
-
### Domain and SSL certificate posture
82
+
##Plugin capabilities reference
120
83
121
-
Get information about **domain and SSL certificate posture**, like expired domains and usage of SHA1 certificates.
| Get Attack Surface summary | Returns the attack surface summary for either the customer’s Defender EASM resource or a given company name. |**Example inputs:** <br> • Get attack surface for LinkedIn. <br> • Get my attack surface. <br> • What is the attack surface for Microsoft? <br> • What is my attack surface? <br> • What are the externally facing assets for Azure? <br> • What are my externally facing assets? <br> <br> **Optional Inputs:** <br> • CompanyName | If your plugin is configured to an active Defender EASM resource and no other company is specified: <br> • Return attack surface summary for the customer’s Defender EASM resource. <br><br> If another company name is provided: <br> • If no exact for match for company name, returns a list of possible matches. <br> • If there's an exact match, return the attack surface summary for the given company name. |
87
+
| Get Attack Surface insights | Returns the attack surface insights for either the customer’s Defender EASM resource or a given company name. | **Example inputs:** <br> • Get high priority attack surface insights for LinkedIn. <br> • Get my high priority attack surface insights. <br> • Get low priority attack surface insights for Microsoft. <br> • Get low priority attack surface insights. <br> • Do I have high priority vulnerabilities in my external attack surface for Azure? <br><br> **Required inputs:** <br> • PriorityLevel - the priority level must be 'high', 'medium' or 'low' (if not provided, it defaults to ‘high’) <br><br>**Optional Inputs:** <br> • CompanyName - the company name | If your plugin is configured to an active Defender EASM resource and no other company is specified: <br> • Return attack surface insights for the customer’s Defender EASM resource. <br><br> If another company name is provided: <br> • If no exact for match for company name, returns a list of possible matches. <br> • If there's an exact match, return the attack surface insights for the given company name. |
88
+
| Get assets affected by CVE | Returns the assets affected by a CVE for either the customer’s Defender EASM resource or a given company name. | **Example inputs:** <br><br> • Get assets affected by CVE-2023-0012 for LinkedIn. <br> • Which assets are affected by CVE-2023-0012 for Microsoft? <br> • Is Azure’s external attack surface impacted by CVE-2023-0012? <br> • Get assets affected by CVE-2023-0012 for my attack surface. <br> • Which of my assets are affected by CVE-2023-0012? <br> • Is my external attack surface impacted by CVE-2023-0012? <br><br>**Required inputs:** <br> • CveId <br><br> **Optional inputs:** <br> • CompanyName | If your plugin is configured to an active Defender EASM resource and no other company is specified: <br> • If plugin settings aren't filled out, fail graciously and remind customers. <br> • If plugin settings are filled out, return the assets affected by a CVE for the customer’s Defender EASM resource. <br><br> If another company name is provided: <br> • If no exact for match for company name, returns a list of possible matches. <br> • If there's an exact match, return the assets affected by a CVE for the given company name. |
89
+
| Get assets affected by CVSS | Returns the assets affected by a CVSS score for either the customer’s Defender EASM resource or a given company name. | **Example inputs:** <br> • Get assets affected by high priority CVSS's in LinkedIn’s attack surface. <br> • How many assets have critical CVSS's for Microsoft? <br> • Which assets have critical CVSS's for Azure? <br> • Get assets affected by high priority CVSS's in my attack surface. <br> • How many of my assets have critical CVSS's? <br> • Which of my assets have critical CVSS's for? <br><br> **Required inputs:** <br> • CvssPriority (the CVSS priority must be critical, high, medium or low. <br><br> **Optional inputs:** <br> • CompanyName | If your plugin is configured to an active Defender EASM resource and no other company is specified: <br> • If plugin settings aren't filled out, fail graciously and remind customers. <br> • If plugin settings are filled out, return the assets affected by a CVSS score for the customer’s Defender EASM resource. <br><br> If another company name is provided: <br> • If no exact for match for company name, returns a list of possible matches. <br> • If there's an exact match, return the assets affected by a CVSS score for the given company name. |
90
+
| Get expired domains | Returns the number of expired domains for either the customer’s Defender EASM resource or a given company name. |**Example inputs:** <br> • How many domains are expired in LinkedIn’s attack surface? <br> • How many assets are using expired domains for Microsoft? <br> • How many domains are expired in my attack surface? <br> • How many of my assets are using expired domains for Microsoft? <br><br> **Optional inputs:** <br> • CompanyName | If your plugin is configured to an active Defender EASM resource and no other company is specified: <br> • return the number of expired domains for the customer’s Defender EASM resource <br><br> If another company name is provided: <br> • If no exact for match for company name, returns a list of possible matches. <br> • If there's an exact match, return the number of expired domains for the given company name. |
91
+
| Get expired certificates | Returns the number of expired SSL certificates for either the customer’s Defender EASM resource or a given company name. |**Example inputs:** <br> • How many SSL certificates are expired for LinkedIn? <br> • How many assets are using expired SSL certificates for Microsoft? <br> • How many SSL certificates are expired for my attack surface? <br> • What are my expired SSL certificates? <br><br> **Optional inputs:** <br> • CompanyName | If your plugin is configured to an active Defender EASM resource and no other company is specified: <br> • return the number of SSL certificates for the customer’s Defender EASM resource. <br><br> If another company name is provided: <br> • If no exact for match for company name, returns a list of possible matches. <br> • If there's an exact match, return the number of SSL certificates for the given company name. |
92
+
| Get SHA1 certificates | Returns the number of SHA1 SSL certificates for either the customer’s Defender EASM resource or a given company name. |**Example inputs:** <br> • How many SSL SHA1 certificates are present for LinkedIn? <br> • How many assets are using SSL SHA1 for Microsoft? <br> • How many SSL SHA1 certificates are present for my attack surface? <br> • How many of my assets are using SSL SHA1? <br><br> **Optional inputs:** <br> • CompanyName | If your plugin is configured to an active Defender EASM resource and no other company is specified: <br> • return the number of SHA1 SSL certificates for the customer’s Defender EASM resource <br><br> If another company name is provided: <br> • If no exact for match for company name, returns a list of possible matches. <br> • If there's an exact match, return the number of SHA1 SSL certificates for the given company name. |
122
93
123
-
**Sample prompts**:
124
94
125
-
- How many domains are expired in my organization's attack surface?
126
-
- How many SSL certificates are expired for my organization?
127
-
- How many assets are using SSL SHA1 for my organization?
128
-
- Get list of expired SSL certificates.
95
+
## Switching between Resource Data and Company Data
129
96
97
+
Even though we have added resource integration for our skills, we still support pulling data from prebuilt attack surfaces for specific companies. To improve Copilot for Security’s accuracy in determining when a customer wants to pull from their attack surface or a prebuilt, company attack surface, we recommend using “my”, “my attack surface”, etc. to convey they want to use their resource and “their”, “{specific company name}”, etc. to convey they want a prebuilt attack surface. While this does improve the experience in a single session, we strongly recommend having two separate sessions to avoid any confusion.
130
98
131
99
132
100
## Provide feedback
133
101
134
-
Your feedback on the Defender EASM integration with Security Copilot helps with development. To provide feedback, in Security Copilot, use the feedback buttons at the bottom of each completed prompt. Your options are "Looks Right," "Needs Improvement" and "Inappropriate."
135
-
136
-
137
-
Your options:
138
-
139
-
-**Confirm**: The results match expectations.
140
-
-**Off-target**: The results don't match expectations.
141
-
-**Report**: The results are harmful in some way.
102
+
Your feedback on Copilot for Security generally, and the Defender EASM plugin specifically, is vital to guide current and planned development on the product. The optimal way to provide this feedback is directly in the product, using the feedback buttons at the bottom of each completed prompt. Select "Looks right," "Needs improvement" or "Inappropriate". We recommend “Looks right” when the result matches expectations, “Needs improvement” when it doesn't, and “Inappropriate” when the result is harmful in some way.
142
103
143
-
Whenever possible, and when the result is **Off-target**, write a few words explaining what can be done to improve the outcome. If you entered Defender EASM-specific prompts and the results aren't EASM related, then include that information.
104
+
Whenever possible, and especially when the result is “Needs improvement,” please write a few words explaining what we can do to improve the outcome. This also applies when you expected Copilot for Security to invoke the Defender EASM plugin, but another plugin was selected instead.
0 commit comments