You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-aiagentsinfo-table.md
+22-22Lines changed: 22 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -54,7 +54,7 @@ For information on other tables in the advanced hunting schema, [see the advance
54
54
|`AgentActionTriggers`|`string`|List of triggers that makes an autonomous agent take action |
55
55
|`RawAgentInfo`|`string`|Contents of the raw JSON that describes the agent and contains configuration details, as received from the provider |
56
56
|`AuthenticationTrigger`|`string`|Indicates when authentication is triggered for the agent; possible values: As Needed, Always|
57
-
|`AccessControlPolicy`|`string`|Ssers that can interact with the agent; possible values: Any, Copilot readers, Group membership, Any (multitenant) |
57
+
|`AccessControlPolicy`|`string`|Users that can interact with the agent; possible values: Any, Copilot readers, Group membership, Any (multitenant) |
58
58
|`AuthorizedSecurityGroupIds`|`dynamic`|List of Azure Active Directory Group IDs that are allowed to interact with the agent |
59
59
|`AgentTopicsDetails`|`dynamic`|Specifications of the topics that the agent can perform |
60
60
|`AgentToolsDetails`|`dynamic`|Specifications of the tools that the agent can access and perform actions on |
@@ -70,7 +70,7 @@ It is critical to identify agents that lack authentication mechanisms, as these
70
70
71
71
**Recommendations:**
72
72
- Confirm the agent's use case with the owner to determine if it is intended for public access.
73
-
- Review the Topics, Actions, and Knowledge sources to ensure there is no internal or sensitive information included.
73
+
- Review the Topics, Actions, and Knowledge sources to ensure there's no internal or sensitive information included.
74
74
75
75
```kusto
76
76
AIAgentsInfo
@@ -81,11 +81,11 @@ It is critical to identify agents that lack authentication mechanisms, as these
81
81
```
82
82
83
83
### No authentication is required
84
-
It is critical to identify agents that lack authentication requirements mechanisms, as these may pose significant risks to the organization due to their public availability. Organizations should know about these agents so they can acknowledge any issues.
84
+
It's critical to identify agents that lack authentication requirements mechanisms, as these may pose significant risks to the organization due to their public availability. Organizations should know about these agents so they can acknowledge any issues.
85
85
86
86
**Recommendations:**
87
87
- Confirm the agent's use case with the owner to determine if it is intended for public access.
88
-
- Review the Topics, Actions, and Knowledge sources to ensure there is no internal or sensitive information included.
88
+
- Review the Topics, Actions, and Knowledge sources to ensure there's no internal or sensitive information included.
89
89
90
90
```kusto
91
91
AIAgentsInfo
@@ -123,9 +123,9 @@ directActions
123
123
| sort by AIAgentId, Timestamp desc
124
124
```
125
125
126
-
### Agent shared with entire organization or multi-tenant
126
+
### Agent shared with entire organization or multitenant
127
127
128
-
Identify agents that are shared with the entire organization or configured for multi-tenant access. Broad sharing increases the risk of unauthorized access by unintended users.
128
+
Identify agents that are shared with the entire organization or configured for multitenant access. Broad sharing increases the risk of unauthorized access by unintended users.
129
129
130
130
**Recommendations:**
131
131
- Confirm with the owner whether wide sharing is intentional and justified.
@@ -169,12 +169,12 @@ AIAgentsInfo
169
169
| where not(OwnerAccountUpns in (EnabledAccountUpns))
170
170
```
171
171
172
-
### Suspicious HTTP request to non-standard port
172
+
### Suspicious HTTP request to nonstandard port
173
173
174
174
Identify agents that use HTTP actions on ports other than 443 or 80.
175
175
176
176
**Recommendations:**
177
-
- Confirm with the agent owner whether it is necessary and inquire about the specific business use case.
177
+
- Confirm with the agent owner whether it's necessary and inquire about the specific business use case.
178
178
179
179
```kusto
180
180
AIAgentsInfo
@@ -194,12 +194,12 @@ AIAgentsInfo
194
194
```
195
195
196
196
197
-
### Suspicious HTTP request to non-standard schema
197
+
### Suspicious HTTP request to nonstandard schema
198
198
199
199
Identify agents that use HTTP actions to non https endpoints.
200
200
201
201
**Recommendations:**
202
-
- Confirm with the agent owner whether it is necessary and inquire about the specific business use case.
202
+
- Confirm with the agent owner whether it's necessary and inquire about the specific business use case.
203
203
204
204
```kusto
205
205
AIAgentsInfo
@@ -246,7 +246,7 @@ AIAgentsInfo
246
246
Identify agents that are using generative orchestration that involves sending email tools via outlook, and the input values of the actions are populated by the generative orchestrator. This setup is risky, since with successful XPIA attack, the agent can be used to leak data to arbitrary recipients.
247
247
248
248
**Recommendations:**
249
-
- Confirm with the agent owner whether it is required and inquire about the business use case. If feasible, hard code the recipient of the email into the action.
249
+
- Confirm with the agent owner whether it's required and inquire about the business use case. If feasible, hard code the recipient of the email into the action.
250
250
251
251
```kusto
252
252
AIAgentsInfo
@@ -267,7 +267,7 @@ AIAgentsInfo
267
267
Identify agents where a topic or action is configured to send emails to external mailboxes (outside the organization’s domains). This can potentially lead to sensitive or internal data being exfiltrated or leaving the organization's boundaries.
268
268
269
269
**Recommendations:**
270
-
- Verify with the agent owner whether sending external emails is necessary for the business scenario, what data will be sent, and if the external domain is authorized to receive that data.
270
+
- Verify with the agent owner whether sending external emails is necessary for the business scenario, what data is sent, and if the external domain is authorized to receive that data.
271
271
272
272
```kusto
273
273
// Identify agents where a topic or action is configured to send emails to external mailboxes (outside the organization's domains)
### Unpublished Agents which have not been modified for 30 Days
346
+
### Unpublished Agents that haven't been modified for 30 Days
347
347
348
-
Identify agents that are not published and have not been modified in the last 30 days.
348
+
Identify agents that aren't published and haven't been modified in the last 30 days.
349
349
350
350
**Recommendations:**
351
351
- Confirm with the agent owner if the agent is still needed. Otherwise, consider removing the agent to mitigate any potential risks.
@@ -363,7 +363,7 @@ AIAgentsInfo
363
363
Agents with hard-coded credentials in Topics or Actions can expose clear-text credentials to unintended entities.
364
364
365
365
**Recommendations:**
366
-
- Consider keeping the credentials in Azure Key Vault and retrieve in in runtime using Environment Variables (Use environment variables for Azure Key Vault secrets - Power Apps | Microsoft Learn)
366
+
- Consider keeping the credentials in Azure Key Vault and retrieve in runtime using Environment Variables (Use environment variables for Azure Key Vault secrets - Power Apps | Microsoft Learn)
367
367
- If not possible, make sure secured input option are enabled (Manage sensitive input like passwords in Power Automate - Power Automate | Microsoft Learn).
368
368
369
369
```kusto
@@ -381,10 +381,10 @@ AIAgentsInfo
381
381
```
382
382
383
383
### Dormant Author Authentication connection in Agent (Runtime rule)
384
-
Identify published agents that contain an action that runs with Author Authentication and not been used/invoked in the last 30 days.
384
+
Identify published agents that contain an action that runs with author authentication, and has not been used/invoked in the last 30 days.
385
385
386
386
**Recommendations:**:
387
-
- Confirm with the agent owner if the action is needed and it is expected behavior. Otherwise, consider removi
387
+
- Confirm with the agent owner if the action is needed and the behavior is expected. Otherwise, consider removing the action to minimize potential risks.
388
388
389
389
```kusto
390
390
//Find published agents that contain an action that runs with Author Authentication and not been used/invoked in the last 30 days.
Identify published agents with classic orchestration, that includes an Action which are not used in any Topic.
423
+
### Agents with unused Action
424
+
Identify published agents with classic orchestration that include an action not used in any topic.
425
425
426
426
**Recommendations:**
427
-
- Confirm with the agent owner if the Action is needed and if it is expected behavior. Otherwise, consider removing the Action to minimize potential risks.
427
+
- Confirm with the agent owner if the action is needed, and the behavior is expected. Otherwise, consider removing the action to minimize potential risks.
428
428
429
429
```kusto
430
430
//Identify published agents with classic orchestration, that includes an Action which are not used in any Topic.
0 commit comments