You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Microsoft Copilot for Security in Microsoft Defender Threat Intelligence
3
-
description: Learn about Microsoft Defender Threat Intelligence capabilities embedded in Copilot for Security.
2
+
title: Microsoft Security Copilot in Microsoft Defender Threat Intelligence
3
+
description: Learn about Microsoft Defender Threat Intelligence capabilities embedded in Security Copilot.
4
4
keywords: security copilot, threat intelligence, defender threat intelligence, defender ti, copilot for security, embedded experience, vulnerability impact assessment, threat actor profile, plugins, Microsoft plugins
5
5
ms.service: defender-xdr
6
6
ms.author: pauloliveria
@@ -16,52 +16,52 @@ ms.custom:
16
16
- cx-ti
17
17
- cx-mdti
18
18
ms.topic: conceptual
19
-
ms.date: 10/18/2024
19
+
ms.date: 11/18/2024
20
20
---
21
21
22
-
# Microsoft Copilot for Security in Microsoft Defender Threat Intelligence
22
+
# Microsoft Security Copilot in Microsoft Defender Threat Intelligence
23
23
24
24
>[!IMPORTANT]
25
-
> On June 30, 2024, The Microsoft Defender Threat Intelligence (Defender TI) standalone portal (https://ti.defender.microsoft.com) was retired and is no longer accessible. Customers can continue using Defender TI in the [Microsoft Defender portal](https://aka.ms/mdti-intel-explorer) or with [Microsoft Copilot for Security](security-copilot-and-defender-threat-intelligence.md). [Learn more](https://aka.ms/mdti-standaloneportal)
25
+
> On June 30, 2024, The Microsoft Defender Threat Intelligence (Defender TI) standalone portal (`https://ti.defender.microsoft.com`) was retired and is no longer accessible. Customers can continue using Defender TI in the [Microsoft Defender portal](https://aka.ms/mdti-intel-explorer) or with [Microsoft Security Copilot](security-copilot-and-defender-threat-intelligence.md). [Learn more](https://aka.ms/mdti-standaloneportal)
26
26
27
-
Microsoft Copilot for Security is a cloud-based AI platform that provides natural language copilot experience. It can help support security professionals in different scenarios, like incident response, threat hunting, and intelligence gathering. For more information about what it can do, read [What is Microsoft Copilot for Security?](/security-copilot/microsoft-security-copilot).
27
+
Microsoft Security Copilot is a cloud-based AI platform that provides natural language copilot experience. It can help support security professionals in different scenarios, like incident response, threat hunting, and intelligence gathering. For more information about what it can do, read [What is Microsoft Security Copilot?](/copilot/security/microsoft-security-copilot).
28
28
29
-
Copilot for Security customers gain for each of their authenticated Copilot users access to Microsoft Defender Threat Intelligence (Defender TI). To ensure that you have access to Copilot, see the [Copilot for Security purchase and licensing information](/security-copilot/faq-security-copilot).
29
+
Security Copilot customers gain for each of their authenticated Copilot users access to Microsoft Defender Threat Intelligence (Defender TI). To ensure that you have access to Copilot, see the [Security Copilot purchase and licensing information](/copilot/security/faq-security-copilot).
30
30
31
-
Once you have access to Copilot for Security, the key features discussed in this article become accessible in either the Copilot for Security portal or the [Microsoft Defender portal](using-copilot-threat-intelligence-defender-xdr.md).
31
+
Once you have access to Security Copilot, the key features discussed in this article become accessible in either the Security Copilot portal or the [Microsoft Defender portal](using-copilot-threat-intelligence-defender-xdr.md).
32
32
33
33
34
34
## Know before you begin
35
35
36
-
If you're new to Copilot for Security, you should familiarize yourself with it by reading these articles:
36
+
If you're new to Security Copilot, you should familiarize yourself with it by reading these articles:
37
37
38
-
-[What is Microsoft Copilot for Security?](/security-copilot/microsoft-security-copilot)
39
-
-[Microsoft Copilot for Security experiences](/security-copilot/experiences-security-copilot)
40
-
-[Get started with Microsoft Copilot for Security](/security-copilot/get-started-security-copilot)
41
-
-[Understand authentication in Microsoft Copilot for Security](/security-copilot/authentication)
42
-
-[Prompting in Microsoft Copilot for Security](/security-copilot/prompting-security-copilot)
38
+
-[What is Microsoft Security Copilot?](/copilot/security/microsoft-security-copilot)
-[Get started with Microsoft Security Copilot](/copilot/security/get-started-security-copilot)
41
+
-[Understand authentication in Microsoft Security Copilot](/copilot/security/authentication)
42
+
-[Prompting in Microsoft Security Copilot](/copilot/security/prompting-security-copilot)
43
43
44
-
## Copilot for Security integration in Defender TI
44
+
## Security Copilot integration in Defender TI
45
45
46
-
Copilot for Security delivers information about threat actors, indicators of compromise (IOCs), tools, and vulnerabilities, as well as contextual threat intelligence from Defender TI. You can use the prompts and promptbooks to investigate incidents, enrich your hunting flows with threat intelligence information, or gain more knowledge about your organization's or the global threat landscape.
46
+
Security Copilot delivers information about threat actors, indicators of compromise (IOCs), tools, and vulnerabilities, as well as contextual threat intelligence from Defender TI. You can use the prompts and promptbooks to investigate incidents, enrich your hunting flows with threat intelligence information, or gain more knowledge about your organization's or the global threat landscape.
47
47
48
48
- Be clear and specific with your prompts. You might get better results if you include specific threat actor names or IOCs in your prompts. It might also help if you add **threat intelligence** to your prompt, like:
49
49
- Show me threat intelligence data for Aqua Blizzard.
50
50
- Summarize threat intelligence data for "malicious.com."
51
51
- Be specific when referencing an incident (for example, "incident ID 15324").
52
52
- Experiment with different prompts and variations to see what works best for your use case. Chat AI models vary, so iterate and refine your prompts based on the results you receive.
53
-
- Copilot saves your prompt sessions. To see the previous sessions, from the Copilot for Security [Home menu](/security-copilot/navigating-security-copilot#home-menu), go to **My sessions**.
53
+
- Copilot saves your prompt sessions. To see the previous sessions, from the Security Copilot [Home menu](/copilot/security/navigating-security-copilot#home-menu), go to **My sessions**.
54
54
55
-

55
+

56
56
57
57
> [!NOTE]
58
-
> For a walkthrough on Copilot, including the pin and share feature, read [Navigate Microsoft Copilot for Security](/security-copilot/navigating-security-copilot).
58
+
> For a walkthrough on Copilot, including the pin and share feature, read [Navigate Microsoft Security Copilot](/copilot/security/navigating-security-copilot).
59
59
60
-
[Learn more about creating effective prompts](/security-copilot/prompting-tips)
60
+
[Learn more about creating effective prompts](/copilot/security/prompting-tips)
61
61
62
62
## Key features
63
63
64
-
Copilot for Security lets security teams understand, prioritize, and take action on threat intelligence information immediately.
64
+
Security Copilot lets security teams understand, prioritize, and take action on threat intelligence information immediately.
65
65
66
66
You can ask about a threat actor, attack campaign, or any other threat intelligence that you want to know more about, and Copilot generates responses based on threat analytics reports, intel profiles and articles, and other Defender TI content.
67
67
@@ -74,46 +74,48 @@ You can also select any of the built-in prompts that are available in the Defend
74
74
[Learn more about using Copilot in Defender for threat intelligence](using-copilot-threat-intelligence-defender-xdr.md)
75
75
76
76
77
-
## Enable the Copilot for Security integration in Defender TI
77
+
## Turn on the Security Copilot integration in Defender TI
78
78
79
-
1. Go to [Microsoft Copilot for Security](https://go.microsoft.com/fwlink/?linkid=2247989) and sign in with your credentials.
79
+
1. Go to [Microsoft Security Copilot](https://securitycopilot.microsoft.com/) and sign in with your credentials.
80
80
2. Make sure that the Defender TI plugin is turned on. In the prompt bar, select the **Sources** icon .
81
81
82
-

82
+

83
83
84
84
In the **Manage sources** pop-up window that appears, under **Plugins**, confirm that the **Microsoft Threat Intelligence** toggle is turned on, then close the window.
85
85
86
86

87
87
88
88
> [!NOTE]
89
-
> Some roles can turn the toggle on or off for plugins like Defender TI. For more information, read [Manage plugins in Microsoft Copilot for Security](/security-copilot/manage-plugins).
89
+
> Some roles can turn the toggle on or off for plugins like Defender TI. For more information, read [Manage plugins in Microsoft Security Copilot](/copilot/security/manage-plugins).
90
90
91
91
92
92
3. Enter your prompt in the prompt bar.
93
93
94
94
### Built-in system features
95
95
96
-
Copilot for Security has built-in system features that can get data from the different plugins that are turned on.
96
+
Security Copilot has built-in system features that can get data from the different plugins that are turned on.
97
97
98
98
To view the list of built-in system capabilities for Defender TI:
99
99
100
100
1. In the prompt bar, select the **Prompts** icon .
101
101
102
-

102
+

103
103
104
-
2. Select **See all system capabilities**. The *Microsoft Defender Threat Intelligence* section lists all the available capabilities for Defender TI that you can use.
104
+
2. Select **See all system capabilities**. The *Microsoft Threat Intelligence* section lists all the available capabilities for Defender TI that you can use.
105
105
106
106
Copilot also has the following promptbooks that also deliver information from Defender TI:
107
-
-**Threat actor profile** – Generates a report profiling a known threat actor, including suggestions to defend against their common tools and tactics.
108
-
-**Vulnerability impact assessment** – Generates a report summarizing the intelligence for a known vulnerability, including steps on how to address it.
107
+
-[**Check impact of an external threat article**](/copilot/security/using-promptbooks#check-impact-of-an-external-threat-article) – Analyzes an external or third-party (that is, not published in Defender TI) article to extract related IOCs, summarize the intelligence, and generate hunting queries so you can assess the potential impact of the threat reported in the article to your organization.
108
+
-[**Threat actor profile**](/copilot/security/using-promptbooks#threat-actor-profile) – Generates a report profiling a known threat actor, including suggestions to defend against their common tools and tactics.
109
+
-[**Threat Intelligence 360 report based on MDTI article**](/copilot/security/using-promptbooks#threat-intelligence-360-report-based-on-mdti-article) – Analyzes a [Defender TI article](what-is-microsoft-defender-threat-intelligence-defender-ti.md#articles) to extract related IOCs, summarize the intelligence, and generate hunting queries so you can assess the potential impact of the threat reported in the article to your organization.
110
+
-[**Vulnerability impact assessment**](/copilot/security/using-promptbooks#vulnerability-impact-assessment) – Generates a report summarizing the intelligence for a known vulnerability, including steps on how to address it.
109
111
110
112
To view these promptbooks, in the prompt bar, select the **Prompts** icon then select **See all promptbooks**.
111
113
112
114
## Sample Defender TI prompts
113
115
114
116
You can use many prompts to get information from Defender TI. This section lists some ideas and examples.
115
117
116
-
####General information about threat intelligence trends
118
+
### General information about threat intelligence trends
117
119
118
120
Get threat intelligence from threat articles and threat actors.
119
121
@@ -123,16 +125,7 @@ Get threat intelligence from threat articles and threat actors.
123
125
- Show me the latest threat articles.
124
126
- Get threat articles related to ransomware in the last six months.
125
127
126
-
#### IP address and host contextual information in relation to threat intelligence
127
-
128
-
Get information on datasets associated with IP addresses and hosts, such as ports, reputation scores, components, certificates, cookies, services, and host pairs.
129
-
130
-
**Sample prompts**:
131
-
132
-
- Show me the reputation of the host _\<host name\>_.
133
-
- Get resolutions for IP address _\<IP address\>_.
134
-
135
-
#### Threat actor mapping and infrastructure
128
+
### Threat actor mapping and infrastructure
136
129
Get information on threat actors and the tactics, techniques, and procedures (TTPs), sponsored states, industries, and IOCs associated with them.
137
130
138
131
**Sample prompts**:
@@ -142,9 +135,9 @@ Get information on threat actors and the tactics, techniques, and procedures (TT
142
135
- Share the TTPs associated with Silk Typhoon.
143
136
- Share threat actors associated with Russia.
144
137
145
-
####Vulnerability data by CVE
138
+
### Vulnerability data by CVE
146
139
147
-
Get contextual information and threat intelligence on Common Vulnerabilities and Exposures (CVEs).
140
+
Get contextual information and threat intelligence on Common Vulnerabilities and Exposures (CVEs), which are derived from Defender TI articles, [threat analytics reports](/defender-xdr/threat-analytics), and data from [Microsoft Defender Vulnerability Management](/defender-vulnerability-management/defender-vulnerability-management) and [Microsoft Defender Endpoint Attack Surface Management](/azure/external-attack-surface-management/overview).
148
141
149
142
**Sample prompts**:
150
143
@@ -154,22 +147,35 @@ Get contextual information and threat intelligence on Common Vulnerabilities and
154
147
- Show me threat actors associated with CVE-2021-44228.
155
148
- Show me the threat articles associated with CVE-2021-44228.
156
149
150
+
### Indicator data in relation to threat intelligence
151
+
152
+
Get detailed information about an indicator (for example, IP addresses, domains, and file hashes) based on the numerous [data sets](data-sets.md) available in Defender TI, including reputation scores, WHOIS information, domain name system (DNS), host pairs, and certificates.
153
+
154
+
**Sample prompts**:
155
+
156
+
- What can you tell me about the domain _\<domain name\>_?
157
+
- Show me indicators related to _\<domain name\>_.
158
+
- Show me all resolutions for _\<domain name\>_.
159
+
- Show me host pairs related to _\<domain name\>_.
160
+
- Show me the reputation of the host _\<host name\>_.
161
+
- Show me all resolutions for IP address _\<IP address\>_.
162
+
- Show me the open services in _\<IP address\>_.
163
+
157
164
## Provide feedback
158
165
159
-
Your feedback on the Defender TI integration in Copilot for Security helps with development. To provide feedback, in Copilot, select **How's this response?** At the bottom of each completed prompt and choose any of the following options:
166
+
Your feedback on the Defender TI integration in Security Copilot helps with development. To provide feedback, in Copilot, select **How's this response?** At the bottom of each completed prompt and choose any of the following options:
160
167
-**Looks right** - Select this button if the results are accurate, based on your assessment.
161
168
-**Needs improvement** - Select this button if any detail in the results is incorrect or incomplete, based on your assessment.
162
169
-**Inappropriate** - Select this button if the results contain questionable, ambiguous, or potentially harmful information.
163
170
164
171
For each feedback button, you can provide more information in the next dialog box that appears. Whenever possible, and when the result is **Needs improvement**, write a few words explaining what can be done to improve the outcome. If you entered prompts specific to Defender TI and the results aren't related, then include that information.
165
172
173
+
## Privacy and data security in Security Copilot
166
174
167
-
## Privacy and data security in Copilot for Security
168
-
169
-
When you interact with Copilot for Security to get Defender TI data, Copilot pulls that data from Defender TI. The prompts, the data retrieved, and the output shown in the prompt results are processed and stored within the Copilot service. [Learn more about privacy and data security in Microsoft Copilot for Security](/security-copilot/privacy-data-security)
175
+
When you interact with Security Copilot to get Defender TI data, Copilot pulls that data from Defender TI. The prompts, the data retrieved, and the output shown in the prompt results are processed and stored within the Copilot service. [Learn more about privacy and data security in Microsoft Security Copilot](/copilot/security/privacy-data-security)
170
176
171
177
### See also
172
178
173
-
-[What is Microsoft Copilot for Security?](/security-copilot/microsoft-security-copilot)
174
-
-[Privacy and data security in Microsoft Copilot for Security](/security-copilot/privacy-data-security)
175
-
-[Using Microsoft Copilot for Security for threat intelligence](using-copilot-threat-intelligence-defender-xdr.md)
179
+
-[What is Microsoft Security Copilot?](/copilot/security/microsoft-security-copilot)
180
+
-[Privacy and data security in Microsoft Security Copilot](/copilot/security/privacy-data-security)
181
+
-[Using Microsoft Security Copilot for threat intelligence](using-copilot-threat-intelligence-defender-xdr.md)
0 commit comments