You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/devtest-labs/devtest-lab-create-lab.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ This quickstart walks you through creating a lab in Azure DevTest Labs by using
28
28
-**Artifacts storage account access**: You can configure whether the lab uses a User-assigned Managed Identity or a Shared Key to access the lab storage account. To use a User-assigned Managed Identity, select the appropriate managed identity from the list, otherwise select the Storage Account Shared Key option from the list.
29
29
-**Public environments**: Leave **On** for access to the [DevTest Labs public environment repository](https://github.com/Azure/azure-devtestlab/tree/master/Environments). Set to **Off** to disable access. For more information, see [Enable public environments when you create a lab](devtest-lab-create-environment-from-arm.md#set-public-environment-access-for-new-lab).
30
30
31
-
:::image type="content" source="./media/devtest-lab-create-lab/portal-create-basic-settings.png" alt-text="Screenshot of the Basic Settings tab in the Create DevTest Labs form.":::
31
+
:::image type="content" source="./media/devtest-lab-create-lab/portal-create-basic-settings-managed-identity.png" alt-text="Screenshot of the Basic Settings tab in the Create DevTest Labs form.":::
32
32
33
33
1. Optionally, select each tab at the top of the page, and customize those settings
Copy file name to clipboardExpand all lines: articles/devtest-labs/tutorial-create-custom-lab.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,7 +47,7 @@ To create a lab in Azure DevTest Labs, follow these steps.
47
47
|**Artifacts storage account access**|You can configure whether the lab uses a User-assigned Managed Identity or a Shared Key to access the lab storage account. To use a User-assigned Managed Identity, select the appropriate managed identity from the list, otherwise select the Storage Account Shared Key option from the list.|
48
48
|**Public environments**|Leave **On** for access to the [DevTest Labs public environment repository](https://github.com/Azure/azure-devtestlab/tree/master/Environments). Set to **Off** to disable access. For more information, see [Enable public environments when you create a lab](devtest-lab-create-environment-from-arm.md#set-public-environment-access-for-new-lab).|
49
49
50
-
:::image type="content" source="./media/tutorial-create-custom-lab/create-custom-lab-blade.png" alt-text="Screenshot of the Basic Settings tab of the Create DevTest Labs form.":::
50
+
:::image type="content" source="./media/tutorial-create-custom-lab/portal-create-basic-settings-managed-identity.png" alt-text="Screenshot of the Basic Settings tab of the Create DevTest Labs form.":::
51
51
52
52
1. Optionally, select the [Auto-shutdown](devtest-lab-create-lab.md#auto-shutdown-tab), [Networking](devtest-lab-create-lab.md#networking-tab), or [Tags](devtest-lab-create-lab.md#tags-tab) tabs at the top of the page, and customize those settings. You can also apply or change most of these settings after lab creation.
description: You can use Copilot for Security to get information about your EASM data.
4
+
title: Microsoft Security Copilot in Defender EASM
5
+
description: You can use Microsoft Security Copilot to get information about your EASM data.
6
6
author: dandennis
7
7
ms.author: dandennis
8
-
ms.date: 10/25/2023
8
+
ms.date: 11/20/2024
9
9
ms.topic: conceptual
10
10
ms.service: defender-easm
11
11
ms.localizationpriority: high
12
12
13
13
---
14
14
15
-
# Microsoft Copilot for Security and Defender EASM
15
+
# Microsoft Security Copilot in Defender EASM
16
16
17
17
Microsoft Defender External Attack Surface Management (Defender EASM) continuously discovers and maps your digital attack surface to provide an external view of your online infrastructure. This visibility enables security and IT teams to identify unknowns, prioritize risk, eliminate threats, and extend vulnerability and exposure control beyond the firewall. Attack Surface Insights are generated by analyzing vulnerability and infrastructure data to showcase the key areas of concern for your organization.
18
18
19
-
Defender EASM’s integration with Copilot for Security enables users to interact with Microsoft’s discovered attack surfaces. These attack surfaces allow users to quickly understand their externally facing infrastructure and relevant, critical risks to their organization. They provide insight into specific areas of risk, including vulnerabilities, compliance, and security hygiene. For more information about Copilot for Security, go to [What is Microsoft Copilot for Security](/security-copilot/microsoft-security-copilot). For more information on the embedded Copilot for Security experience, refer to [Query your attack surface with Defender EASM using Microsoft Copilot in Azure](/azure/copilot/query-attack-surface).
19
+
Defender EASM’s integration with Microsoft Security Copilot enables users to interact with Microsoft’s discovered attack surfaces. These attack surfaces allow users to quickly understand their externally facing infrastructure and relevant, critical risks to their organization. They provide insight into specific areas of risk, including vulnerabilities, compliance, and security hygiene. For more information about Microsoft Security Copilot, go to [What is Microsoft Security Copilot](/security-copilot/microsoft-security-copilot). For more information on the embedded Microsoft Security Copilot experience, refer to [Query your attack surface with Defender EASM using Microsoft Copilot in Azure](/azure/copilot/query-attack-surface).
20
20
21
21
22
-
**Copilot for Security integrates with Defender EASM**.
22
+
## Know before you begin
23
23
24
-
Copilot for Security can surface insights from Defender EASM about an organization's attack surface. You can use the system features built into Copilot for Security, and use prompts to get more information. This information can help you understand your security posture and mitigate vulnerabilities.
24
+
If you're new to Microsoft Security Copilot, you should familiarize yourself with it by reading these articles:
25
+
-[What is Microsoft Security Copilot?](/security-copilot/microsoft-security-copilot)
-[Get started with Microsoft Security Copilot](/security-copilot/get-started-security-copilot)
28
+
-[Understand authentication in Microsoft Security Copilot](/security-copilot/authentication)
29
+
-[Prompting in Microsoft Security Copilot](/security-copilot/prompting-security-copilot)
25
30
26
-
This article introduces you to Copilot for Security and includes sample prompts that can help Defender EASM users.
27
31
32
+
## Microsoft Security Copilot integration in Defender EASM
28
33
29
-
## Connect Copilot to Defender EASM
34
+
Microsoft Security Copilot can surface insights from Defender EASM about an organization's attack surface. You can use the system features built into Microsoft Security Copilot, and use prompts to get more information. This information can help you understand your security posture and mitigate vulnerabilities.
35
+
36
+
This article introduces you to Microsoft Security Copilot and includes sample prompts that can help Defender EASM users.
37
+
38
+
## Key features
39
+
40
+
The EASM Security Copilot integration can help you with:
41
+
42
+
- Providing a snapshot of your external attack surface and generating insights into potential risks
43
+
44
+
This allows users to get a quick view of their external attack surface by analyzing internet-available information combined with Microsoft's proprietary discovery algorithm. It provides an easy-to-understand natural language explanation of the organization's externally facing assets, such as hosts, domains, webpages, and IP addresses, and highlights the critical risks associated with them.
45
+
46
+
- Prioritizing remediation efforts based on asset risk and CVEs
47
+
48
+
EASM allows security teams to prioritize their remediation efforts by understanding which assets and Common Vulnerabilities and Exposures (CVEs) pose the greatest risk in their environment. It does this by analyzing vulnerability and infrastructure data to showcase key areas of concern, providing a natural language explanation of the risks and recommended actions.
49
+
50
+
- Leveraging Security Copilot to surface insights
51
+
52
+
Users can leverage Security Copilot to ask about insights in natural language to extract insights from Defender EASM about their organization's attack surface. This includes querying details such as the number of insecure SSL certificates, ports detected, and specific vulnerabilities impacting the attack surface.
53
+
54
+
- Expediting Attack Surface Curation
55
+
56
+
Utilize Security Copilot to curate your attack surface with labels, external IDs, and state modifications for a set of assets. This process speeds up curation, allowing you to organize your inventory faster and more efficiently.
57
+
58
+
59
+
## Enable the Microsoft Security Copilot integration in Defender EASM
30
60
31
61
### Prerequisites
32
62
33
-
* Access to Copilot for Security, with permissions to activate new connections.
63
+
* Access to Microsoft Security Copilot, with permissions to activate new connections.
34
64
35
65
### Copilot for Security connection
36
66
37
-
1. Access [Copilot for Security](https://securitycopilot.microsoft.com/) and ensure you're authenticated.
67
+
1. Access [Microsoft Security Copilot](https://securitycopilot.microsoft.com/) and ensure you're authenticated.
38
68
1. Select the plugins icon on the upper-right side of the prompt input bar.
39
69
40
70

@@ -43,7 +73,7 @@ This article introduces you to Copilot for Security and includes sample prompts
43
73
44
74

45
75
46
-
4. If you would like Copilot for Security to pull data from your Microsoft Defender External Attack Surface Resource, click on the gear to open the plugin settings, and fill out the fields from your resource’s “Essentials” section on the Overview blade.
76
+
4. If you would like Microsoft Security Copilot to pull data from your Microsoft Defender External Attack Surface Resource, click on the gear to open the plugin settings, and fill out the fields from your resource’s “Essentials” section on the Overview blade.
47
77
48
78
[](media/copilot-6.png#lightbox)
49
79
@@ -54,9 +84,9 @@ This article introduces you to Copilot for Security and includes sample prompts
54
84
55
85
56
86
57
-
## Getting started
87
+
## Sample Defender EASM prompts
58
88
59
-
Copilot for Security operates primarily with natural language prompts. When querying information from Defender EASM, you submit a prompt that guides Copilot for Security to select the Defender EASM plugin and invoke the relevant capability.
89
+
Microsoft Security Copilot operates primarily with natural language prompts. When querying information from Defender EASM, you submit a prompt that guides Microsoft Security Copilot to select the Defender EASM plugin and invoke the relevant capability.
60
90
For success with Copilot prompts, we recommend the following:
61
91
62
92
- Ensure that you reference the company name in your first prompt. Unless otherwise specified, all future prompts will provide data about the initially specified company.
@@ -70,16 +100,16 @@ For success with Copilot prompts, we recommend the following:
70
100
71
101
- Experiment with different prompts and variations to see what works best for your use case. Chat AI models vary, so iterate and refine your prompts based on the results you receive.
72
102
73
-
-Copilot for Security saves your prompt sessions. To see the previous sessions, in Copilot for Security, go to the menu > **My sessions**.
103
+
-Microsoft Security Copilot saves your prompt sessions. To see the previous sessions, in Microsoft Security Copilot, go to the menu > **My sessions**.
74
104
75
105
76
-
For a walkthrough on Copilot for Security, including the pin and share feature, go to [Navigating Microsoft Copilot for Security](/security-copilot/navigating-security-copilot).
106
+
For a walkthrough on Microsoft Security Copilot, including the pin and share feature, go to [Navigating Microsoft Security Copilot](/security-copilot/navigating-security-copilot).
77
107
78
-
For more information on writing Copilot for Security prompts, go to [Microsoft Copilot for Security prompting tips](/security-copilot/prompting-tips).
108
+
For more information on writing Microsoft Security Copilot prompts, go to [Microsoft Security Copilot prompting tips](/security-copilot/prompting-tips).
@@ -94,29 +124,29 @@ For more information on writing Copilot for Security prompts, go to [Microsoft C
94
124
95
125
96
126
97
-
## Switching between resource and company data
127
+
###Switching between resource and company data
98
128
99
-
Even though we have added resource integration for our skills, we still support pulling data from prebuilt attack surfaces for specific companies. To improve Copilot for Security’s accuracy in determining when a customer wants to pull from their attack surface or a prebuilt, company attack surface, we recommend using “my”, “my attack surface”, etc. to convey they want to use their resource and “their”, “{specific company name}”, etc. to convey they want a prebuilt attack surface. While this does improve the experience in a single session, we strongly recommend having two separate sessions to avoid any confusion.
129
+
Even though we have added resource integration for our skills, we still support pulling data from prebuilt attack surfaces for specific companies. To improve Security Copilot’s accuracy in determining when a customer wants to pull from their attack surface or a prebuilt, company attack surface, we recommend using “my”, “my attack surface”, etc. to convey they want to use their resource and “their”, “{specific company name}”, etc. to convey they want a prebuilt attack surface. While this does improve the experience in a single session, we strongly recommend having two separate sessions to avoid any confusion.
100
130
101
131
102
132
## Provide feedback
103
133
104
-
Your feedback on Copilot for Security generally, and the Defender EASM plugin specifically, is vital to guide current and planned development on the product. The optimal way to provide this feedback is directly in the product, using the feedback buttons at the bottom of each completed prompt. Select "Looks right," "Needs improvement" or "Inappropriate". We recommend “Looks right” when the result matches expectations, “Needs improvement” when it doesn't, and “Inappropriate” when the result is harmful in some way.
134
+
Your feedback on Microsoft Security Copilot generally, and the Defender EASM plugin specifically, is vital to guide current and planned development on the product. The optimal way to provide this feedback is directly in the product, using the feedback buttons at the bottom of each completed prompt. Select "Looks right," "Needs improvement" or "Inappropriate". We recommend “Looks right” when the result matches expectations, “Needs improvement” when it doesn't, and “Inappropriate” when the result is harmful in some way.
105
135
106
-
Whenever possible, and especially when the result is “Needs improvement,” please write a few words explaining what we can do to improve the outcome. This also applies when you expected Copilot for Security to invoke the Defender EASM plugin, but another plugin was selected instead.
136
+
Whenever possible, and especially when the result is “Needs improvement,” please write a few words explaining what we can do to improve the outcome. This also applies when you expected Microsoft Security Copilot to invoke the Defender EASM plugin, but another plugin was selected instead.
107
137
108
138
109
139
110
-
## Data processing and privacy
140
+
## Privacy and data security in Microsoft Security Copilot
111
141
112
-
When you interact with Copilot for Security to get Defender EASM data, Copilot pulls that data from Defender EASM. The prompts, the data that's retrieved, and the output shown in the prompt results is processed and stored within the Copilot for Security service.
142
+
When you interact with Microsoft Security Copilot to get Defender EASM data, Copilot pulls that data from Defender EASM. The prompts, the data that's retrieved, and the output shown in the prompt results is processed and stored within the Microsoft Security Copilot service.
113
143
114
-
For more information about data privacy in Copilot for Security, go to [Privacy and data security in Microsoft Copilot for Security](/security-copilot/privacy-data-security).
144
+
For more information about data privacy in Microsoft Security Copilot, go to [Privacy and data security in Microsoft Security Copilot](/security-copilot/privacy-data-security).
115
145
116
146
117
147
118
148
## Related articles
119
149
120
-
-[What is Microsoft Copilot for Security?](/security-copilot/microsoft-security-copilot)
121
-
-[Privacy and data security in Microsoft Copilot for Security](/security-copilot/privacy-data-security)
150
+
-[What is Microsoft Security Copilot?](/security-copilot/microsoft-security-copilot)
151
+
-[Privacy and data security in Microsoft Security Copilot](/security-copilot/privacy-data-security)
122
152
-[Query your attack surface with Defender EASM using Microsoft Copilot in Azure](/azure/copilot/query-attack-surface)
Copy file name to clipboardExpand all lines: articles/storage/blobs/blob-storage-monitoring-scenarios.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -109,7 +109,7 @@ You can find the friendly name of that security principal by taking the value of
109
109
110
110
### Auditing data plane operations
111
111
112
-
Data plane operations are captured in [Azure resource logs for Storage](monitor-blob-storage.md#analyzing-logs). You can [configure Diagnostic setting](/azure/azure-monitor/platform/diagnostic-settings) to export logs to Log Analytics workspace for a native query experience.
112
+
Data plane operations are captured in [Azure resource logs for Storage](monitor-blob-storage.md#azure-monitor-resource-logs). You can [configure Diagnostic settings](/azure/azure-monitor/platform/diagnostic-settings) to export logs to Log Analytics workspace for a native query experience.
113
113
114
114
Here's a Log Analytics query that retrieves the "when", "who", "what", and "how" information in a list of log entries.
0 commit comments