Skip to content

Commit 4b36247

Browse files
authored
Merge pull request #4689 from MicrosoftDocs/phishing-triage-agent-update-prereqs
Phishing triage agent required permissions
2 parents 86ec23e + cf37044 commit 4b36247

File tree

1 file changed

+20
-7
lines changed

1 file changed

+20
-7
lines changed

defender-xdr/phishing-triage-agent.md

Lines changed: 20 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ description: Learn about the Security Copilot Phishing Triage Agent, including r
44
ms.service: defender-xdr
55
f1.keywords:
66
- NOCSH
7-
ms.author: diannegali
8-
author: diannegali
7+
ms.author: guywild
8+
author: guywi-ms
99
ms.localizationpriority: medium
1010
manager: deniseb
1111
audience: ITPro
@@ -18,7 +18,7 @@ ms.topic: how-to
1818
search.appverid:
1919
- MOE150
2020
- MET150
21-
ms.date: 06/13/2025
21+
ms.date: 08/07/2025
2222
appliesto:
2323
- Microsoft Defender XDR
2424
- Microsoft Defender for Office 365 Plan 2
@@ -51,6 +51,16 @@ The Phishing Triage Agent is a [Security Copilot agent](/copilot/security/agents
5151
- **Transparent rationale:** The agent provides a transparent rationale for its classification verdicts in natural language, detailing the reasoning behind its conclusions and the evidence used to reach them. Additionally, it presents a visual representation of its reasoning process.
5252
- **Learning based on feedback:** The agent continuously improves based on feedback provided by analysts. Over time, this feedback loop fine-tunes the agent’s behavior, aligning it more closely with organizational nuances and reducing the need for manual verification.
5353

54+
## Permissions required
55+
56+
| Action | Permission required |
57+
|:------------------------------|:----------------------------------------------------------------------------------------------------------------------|
58+
| Set up, pause, remove or the agent | **Security Administrator** in Microsoft Entra ID |
59+
| View and manage agent settings and activity | **Security Copilot (read)** and **Security data basics (read)** under the **Security operations** permissions group in the Defender portal |
60+
| View and manage feedback | **Security Copilot (read)**, **Security data basics (read)**, and **Email & collaboration metadata (read)** under the **Security operations** permissions group in the Defender portal|
61+
62+
For more information about unified RBAC in the Defender portal, see [Microsoft Defender XDR Unified role-based access control (RBAC)](/defender-xdr/manage-rbac).
63+
5464
## Prerequisites
5565

5666
The following are organizational requirements to run Phishing Triage Agent in your environment:
@@ -86,7 +96,7 @@ The Phishing Triage Agent addresses phishing incidents that include alerts with
8696
## Set up the Phishing Triage Agent
8797

8898
> [!NOTE]
89-
> Setting up of the Phishing Triage Agent is only available to users with the **Security Administrator** role. Ensure that all [prerequisites](#prerequisites) are met before setting up the agent.
99+
> To set up the Phishing Triage Agent, you need the **Security Administrator** role in Microsoft Entra ID. Ensure that all [prerequisites](#prerequisites) are met before setting up the agent.
90100
91101
### Create the agent’s identity and assign permissions
92102

@@ -157,6 +167,9 @@ You can access the Phishing Triage Agent setup in two ways:
157167

158168
:::image type="content" source="/defender/media/agents-in-defender/phishing-triage/phishing-triage-setup.png" alt-text="Screenshot of the Overview page for the Phishing Triage set up" lightbox="/defender/media/agents-in-defender/phishing-triage/phishing-triage-setup.png":::
159169

170+
> [!NOTE]
171+
> To view and manage setting in the Defender portal, you need **Security Copilot (read)** and **Security data basics (read)** permissions. If you don't have these permissions, you can't intiate setup from the **Settings** page, but you can still set up the agent from the incident queue if you have the **Security Administrator** role.
172+
160173
Follow the steps in the setup wizard, which includes:
161174

162175
1. Select the [identity](#identity) type to assign to the agent.
@@ -273,7 +286,7 @@ Here are examples of how you can write your feedback to the agent.
273286
| Feedback about the sender and email body | Emails offering file sharing or document access should only come from our authorized provider Contoso.com. | Emails offering file sharing or document access should only come from our authorized providers. | Well-written feedback clearly states specific requirements (for example, sender domain), while vague references (for example “authorized providers”) do not contain actionable information. |
274287
| Feedback about email subject | Any email that its subject contains a request for billing transaction is not allowed in our organization and is considered as phishing. | If the subject has a positive natural sentiment, it’s legitimate. | Feedback that is descriptive and specific can be effectively validated, while subjective feedback may lead to unintended outcomes. |
275288
| Feedback about the email body | Emails requesting credential verification should include a reference to the specific account or service. Any generic 'verify your account' request without details should be treated as phishing. | This email should be treated as phishing. | Feedback that includes detailed information is more likely to be clearly understood, while feedback lacking detail may be interpreted in various ways and could lead to unpredictable outcomes. |
276-
| Feedback about a recipient and email body | This email was sent to multiple employees, and the body instructs recipients to download an 'important attachment' without describing its contents—legitimate emails always specify attachment details. | Mass internal emails with attachments are phishing. | Feedback that highlights specific missing details commonly found in legitimate emails is more effective. Feedback that contains broad generalizations (mass emails) or vague terms (such as “internal”) may lead to an excessive amount of true positives. |
289+
| Feedback about a recipient and email body | This email was sent to multiple employees, and the body instructs recipients to download an 'important attachment' without describing its contents—legitimate emails always specify attachment details. | Mass internal emails with attachments are phishing. | Feedback that highlights specific missing details commonly found in legitimate emails is more effective. Feedback that contains broad generalizations (mass emails) or vague terms (such as “internal”) may lead to an excessive number of true positives. |
277290
| Feedback about a recipient and a domain | New contractor onboarding emails should only be sent to email addresses starting with 'v-' to ensure they are directed to the correct recipients. | Contractor emails look different from usual, so they might be phishing. | Well-written feedback clearly defines the expected recipient format, while feedback that is indecisive (“might be”) and lacks clear identification criteria (“looks different from usual” without specifying what is different), makes detection unreliable. |
278291

279292

@@ -297,7 +310,7 @@ Once the agent is taught and equipped with organizational knowledge, it begins t
297310
## Manage the Phishing Triage Agent
298311

299312
> [!NOTE]
300-
> Viewing and managing the Phishing Triage Agent settings is only available to users with the **Security Copilot (read)** and **Security data basics (read)** permissions.
313+
> To view and manage Phishing Triage Agent settings, you need **Security Copilot (read)** and **Security data basics (read)** permissions.
301314
302315
You can manage the Phishing Triage Agent’s settings, review its activity, and review user interaction with the agent. To do so, select **Manage agent** in the card above the incident queue. Alternatively, you can navigate to **Settings > Microsoft Defender XDR > Agents**.
303316

@@ -311,7 +324,7 @@ To view all previous runs by the agent:
311324
### View and manage feedback to the agent
312325

313326
> [!NOTE]
314-
> Managing feedback is only available to users with the **Security Copilot (read)**, **Security data basics (read)**, and **Email & collaboration metadata (read)** permissions.
327+
> To manage feedback, you need **Security Copilot (read)**, **Security data basics (read)**, and **Email & collaboration metadata (read)** permissions.
315328
316329
The Phishing Triage Agent uses feedback to improve its performance over time. It stores applicable feedback in its memory as lessons. You can view and manage user-submitted feedback for the Phishing Triage Agent by navigating to the Feedback management page.
317330

0 commit comments

Comments
 (0)