You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/external-attack-surface-management/easm-copilot.md
+22-3Lines changed: 22 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,6 +17,7 @@ ms.localizationpriority: high
17
17
> [!IMPORTANT]
18
18
> The information in this article applies to the Microsoft Security Copilot Early Access Program, which is an invite-only paid preview program. Some information in this article relates to prereleased product, which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided in this article.
19
19
20
+
20
21
Security Copilot is a cloud-based AI platform that provides a natural language copilot experience. It can help support security professionals in different scenarios, like incident response, threat hunting, and intelligence gathering. For more information about what it can do, go to [What is Microsoft Security Copilot?](/security-copilot/microsoft-security-copilot).
21
22
22
23
**Security Copilot integrates with Defender EASM**.
@@ -25,8 +26,12 @@ Security Copilot can surface insights from Defender EASM about an organization's
25
26
26
27
This article introduces you to Security Copilot and includes sample prompts that can help Defender EASM users.
27
28
29
+
30
+
28
31
## Know before you begin
29
32
33
+
- Ensure that you reference the company name in your first prompt. Unless otherwise specified, all future prompts will provide data about the initially specified company.
34
+
30
35
- Be clear and specific with your prompts. You might get better results if you include specific asset names or metadata values (e.g. CVE IDs) in your prompts.
31
36
32
37
It might also help to add **Defender EASM** to your prompt, like:
@@ -38,13 +43,15 @@ This article introduces you to Security Copilot and includes sample prompts that
38
43
39
44
- Security Copilot saves your prompt sessions. To see the previous sessions, in Security Copilot, go to the menu > **My investigations**:
40
45
41
-

46
+

42
47
43
48
44
49
For a walkthrough on Security Copilot, including the pin and share feature, go to [Navigating Microsoft Security Copilot](/security-copilot/navigating-security-copilot).
45
50
46
51
For more information on writing Security Copilot prompts, go to [Microsoft Security Copilot prompting tips](/security-copilot/prompting-tips).
47
52
53
+
54
+
48
55
## Open Security Copilot
49
56
50
57
1. Go to [Microsoft Security Copilot](https://go.microsoft.com/fwlink/?linkid=2247989) and sign in with your credentials.
@@ -60,6 +67,8 @@ For more information on writing Security Copilot prompts, go to [Microsoft Secur
60
67
61
68
3. Enter your prompt.
62
69
70
+
71
+
63
72
## Built-in system features
64
73
65
74
In Security Copilot, there are built in system features. These features can get data from the different plugins that are enabled.
@@ -78,6 +87,8 @@ To view the list of built-in system capabilities for Defender EASM, use the foll
78
87
- Get expired SSL certificates.
79
88
- Get SHA1 certificates.
80
89
90
+
91
+
81
92
## Sample prompts for Defender EASM?
82
93
83
94
There are many prompts you can use to get information about your Defender EASM data. This section lists some ideas and examples.
@@ -92,6 +103,7 @@ Get **general information** about your Defender EASM data, like an attack surfac
92
103
- What are the high priority attack surface insights for my organization?
93
104
94
105
106
+
95
107
### CVE vulnerability data
96
108
97
109
Get details on **CVEs that are applicable to your inventory**.
@@ -102,6 +114,8 @@ Get details on **CVEs that are applicable to your inventory**.
102
114
- Get assets affected by high priority CVSS's in my attack surface.
103
115
- How many assets have critical CVSS's for my organization?
104
116
117
+
118
+
105
119
### Domain and SSL certificate posture
106
120
107
121
Get information about **domain and SSL certificate posture**, like expired domains and usage of SHA1 certificates.
@@ -113,11 +127,12 @@ Get information about **domain and SSL certificate posture**, like expired domai
113
127
- How many assets are using SSL SHA1 for my organization?
114
128
- Get list of expired SSL certificates.
115
129
130
+
131
+
116
132
## Provide feedback
117
133
118
-
Your feedback on the Defender EASM integration with Security Copilot helps with development. To provide feedback, in Security Copilot, use the feedback buttons at the bottom of each completed prompt:
134
+
Your feedback on the Defender EASM integration with Security Copilot helps with development. To provide feedback, in Security Copilot, use the feedback buttons at the bottom of each completed prompt. Your options are "Looks Right," "Needs Improvement" and "Inappropriate."
119
135
120
-

121
136
122
137
Your options:
123
138
@@ -127,12 +142,16 @@ Your options:
127
142
128
143
Whenever possible, and when the result is **Off-target**, write a few words explaining what can be done to improve the outcome. If you entered Defender EASM-specific prompts and the results aren't EASM related, then include that information.
129
144
145
+
146
+
130
147
## Data processing and privacy
131
148
132
149
When you interact with the Security Copilot to get Defender EASM data, Security Copilot pulls that data from Defender EASM. The prompts, the data that's retrieved, and the output shown in the prompt results is processed and stored within the Security Copilot service.
133
150
134
151
For more information about data privacy in Security Copilot, go to [Privacy and data security in Microsoft Security Copilot](/security-copilot/privacy-data-security).
135
152
153
+
154
+
136
155
## Related articles
137
156
138
157
-[What is Microsoft Security Copilot?](/security-copilot/microsoft-security-copilot)
0 commit comments