Skip to content

Commit 2de0fbb

Browse files
Merge pull request #5308 from Itaicitaic1/patch-3
Revise onboarding instructions for agent protection
2 parents cf963b1 + 2110161 commit 2de0fbb

File tree

1 file changed

+8
-10
lines changed

1 file changed

+8
-10
lines changed

defender-for-cloud-apps/real-time-agent-protection-during-runtime.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -63,17 +63,15 @@ The following steps describe the Security Administrator’s required actions to
6363
> [!IMPORTANT]
6464
> If the Microsoft 365 connector isn’t properly connected, real-time agent protection during runtime continues to block suspicious activity on the AI agent. Alerts and incidents related to these actions won't show in the Microsoft Defender portal.
6565
66-
1. Make sure to collaborate with the following administrators:
66+
1. Enter the App ID provided by your Power Platform administrator and select **Save**.
67+
:::image type="content" source="media/protect-agents-real-time/turn-on-real-time-agent-protection.png" alt-text="Screenshot that shows how to turn on Real time agent protection during runtime in the Defender portal." lightbox="media/protect-agents-real-time/turn-on-real-time-agent-protection.png":::
6768

68-
- The **Microsoft Entra Administrator** needs to create [a Microsoft Entra ID application](/microsoft-copilot-studio/external-security-provider#step-1-configure-microsoft-entra-application) and configure a Federated Identity Credential (FIC) using the URL provided in the Microsoft Defender portal. For more information, see: [Authorize the Microsoft Entra application with your provider of choice](/microsoft-copilot-studio/external-security-provider#authorize-the-microsoft-entra-application-with-your-provider-of-choice).
69-
70-
- The **Power Platform Administrator** needs to enter the Application ID and URL in the Power Platform settings page. For more information, see: [Enable external threat detection and protection for Copilot Studio custom agents](/microsoft-copilot-studio/external-security-provider#step-2-configure-the-threat-detection-system).
71-
1. Enter the App ID provided by your Power Platform administrator. The Application (client) ID, uniquely identifies your application and is used in your application's code as part of validating the security tokens it receives from the Microsoft identity platform.
72-
1. Select **Save**.
73-
1. Copy the URL provided.
74-
1. Share the URL with the Power Platform administrator.
75-
76-
:::image type="content" source="media/protect-agents-real-time/turn-on-real-time-agent-protection.png" alt-text="Screenshot that shows how to turn on Real time agent protection during runtime in the Defender portal." lightbox="media/protect-agents-real-time/turn-on-real-time-agent-protection.png":::
69+
> [!IMPORTANT]
70+
> - Completing the onboarding process requires collaboration with a Power Platform administrator. The onboarding instructions on the Power Platform side are specified here: [Enable external threat detection and protection for Copilot Studio custom agents](/microsoft-copilot-studio/external-security-provider#step-2-configure-the-threat-detection-system).
71+
> - The application ID that the Power Platform administrator needs to provide is this [Microsoft Entra ID application](/microsoft-copilot-studio/external-security-provider#step-1-configure-microsoft-entra-application).
72+
> - To allow the Power Platform administrator to complete the onboarding steps, share the URL provided in the Defender portal with them.
73+
74+
1. No further action is needed on your part. Once the Power Platform administrator completes the onboarding steps on their side, you’ll see a green **Connected** status.
7775

7876

7977
## Related articles

0 commit comments

Comments
 (0)