Skip to content

Commit 581b2c4

Browse files
authored
Merge branch 'main' into WI473943-account-view-manual-account-correlation
2 parents 4e63442 + 7537535 commit 581b2c4

File tree

67 files changed

+312
-132
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

67 files changed

+312
-132
lines changed

.github/workflows/AutoLabelAssign.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ jobs:
2626
name: Run assign and label
2727
if: github.repository_owner == 'MicrosoftDocs'
2828
needs: [download-payload]
29-
uses: MicrosoftDocs/microsoft-365-docs/.github/workflows/Shared-AutoLabelAssign.yml@workflows-prod
29+
uses: MicrosoftDocs/microsoft-365-docs/.github/workflows/Shared-AutoLabelAssign.yml@workflows-test
3030
with:
3131
PayloadJson: ${{ needs.download-payload.outputs.WorkflowPayload }}
3232
AutoAssignUsers: 1

defender-endpoint/indicators-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -158,7 +158,7 @@ If indicators are synced to the Defender portal from Microsoft Defender for Clou
158158

159159
## Known issues and limitations
160160

161-
Microsoft Store apps can't be blocked by Microsoft Defender because they're signed by Microsoft.
161+
Microsoft apps can't be blocked by Microsoft Defender because they're signed by Microsoft.
162162

163163
Customers might experience issues with alerts for IoCs. The following scenarios are situations where alerts aren't created or are created with inaccurate information.
164164

defender-endpoint/linux-install-manually.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -95,6 +95,9 @@ In order to preview new features and provide early feedback, it's recommended th
9595
> [!NOTE]
9696
> For your distribution and version, identify the closest entry for it (by major, then minor) under `https://packages.microsoft.com/config/rhel/`.
9797
98+
> [!TIP]
99+
> Online Kernel patching tools, such as Ksplice or similar, can lead to unpredictable OS stability if Defender for Endpoint is running. It's recommended to temporarily stop the Defender for Endpoint daemon before performing online Kernel patching. After the Kernel is updated, Defender for Endpoint on Linux can be safely restarted. This action is especially important for systems running Oracle Linux.
100+
98101
3. In the following commands, replace *[version]* and *[channel]* with the information you've identified:
99102

100103
```bash

defender-endpoint/linux-whatsnew.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ This article is updated frequently to let you know what's new in the latest rele
5555

5656
What's new
5757

58-
- Added support for CentOS Stream 9, CentOS Stream 10 and RHEL 10.
58+
- Added support for RHEL 10.
5959

6060
- Enhanced engine resiliency through automatic error recovery, preventing excessive logging and minimizing downtime to improve overall reliability.
6161

Lines changed: 78 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,78 @@
1+
---
2+
title: Discover and detect threats using the AI agents inventory (Preview)
3+
ms.author: abbyweisberg
4+
author: AbbyMSFT
5+
description: Learn how to view all of the AI Agents in your organization using Microsoft Defender.
6+
ms.date: 11/02/2025
7+
ms.topic: how-to
8+
ms.service: defender-for-cloud-apps
9+
ms.reviewer: gayasalomon
10+
#customer-intent: As a security administrator, I want view all of the AI Agents in my organization, and detect threats on my AI agents using advanced hunting.
11+
---
12+
13+
# Discover and protect your AI Agents (Preview)
14+
15+
Microsoft Defender detects all Copilot Studio custom AI agents in your tenant and provides tools to identify misconfigured or potentially risky agents, and collects data from Copilot Studio for use in [advanced hunting](/defender-xdr/advanced-hunting-overview).
16+
17+
## Prerequisites
18+
To enable AI agent inventory and detection you must opt in to the [Microsoft Defender preview features](https://security.microsoft.com/securitysettings/defender/preview_features) of:
19+
- Microsoft Defender for Cloud Apps
20+
- Microsoft Defender for Cloud
21+
- Microsoft Defender XDR
22+
23+
## Enable the Copilot Studio AI agent inventory
24+
25+
> [!NOTE]
26+
> The onboarding process for the AI agent inventory requires collaboration with Power Platform administrators.
27+
28+
To enable the Copilot Studio AI agent inventory, follow these steps:
29+
30+
1. **Sign in to the [Microsoft Defender portal](https://security.microsoft.com)** as the System Administrator.
31+
1. Go to **System > Settings > Cloud Apps > Copilot Studio AI Agents**.
32+
1. Turn on **Copilot Studio AI Agents**. Enabling Copilot Studio AI Agents confirms that you read the disclaimer and agree to use the Microsoft Defender AI agent protection features.
33+
34+
:::image type="content" source="media/protect-ai-agents/copilot-studio-ai-agents-button.png" alt-text="Screenshot of the Copilot Studio AI Agent configuration toggle.":::
35+
36+
1. Work together with the Power Platform administrator to complete these steps in the [Power Platform Portal](https://admin.preview.powerplatform.microsoft.com/security/threatdetection):
37+
1. Go to **Security** -> **Threat Protection**.
38+
1. Select **Microsoft Defender - Copilot Studio AI Agents**.
39+
1. Turn on **Enable Microsoft Defender - Copilot Studio AI Agents**.
40+
41+
When Copilot Studio AI Agents are connected, a green indicator appears in the **AI Agents Inventory** section in the Microsoft Defender system settings. It can take up to 30 minutes for the initial connection status to update. Depending on the size and complexity of your environment, it might take longer to see the full deployment of the AI agent inventory.
42+
43+
44+
## Identify misconfigured or risky AI agents using advanced hunting
45+
46+
After you give Microsoft Defender access to your custom agents, you can use advanced hunting to help identify misconfigured or risky agents and minimize organizational exposure to potential threats.
47+
We recommend that you reach out to the owners of the risky agents for more information, and that you consider quarantining or deleting risky agents.
48+
49+
1. Sign in to the Defender portal, and go **Investigation & response** -> **Hunting** -> **Advanced hunting**.
50+
1. In the **Apps & identities** section, the [AIAgentsInfo table](/defender-xdr/advanced-hunting-aiagentsinfo-table) contains data for all your custom AI agents created using Copilot Studio. You can use this data to create custom queries.
51+
52+
### Sample queries
53+
54+
Run this query to get a list of all the agents in your tenant:
55+
56+
```kusto
57+
AIAgentsInfo
58+
| summarize arg_max(Timestamp, *) by AIAgentId
59+
```
60+
61+
Run this query to identify all published agents that are configured with an incorrect authentication mechanism:
62+
63+
```kusto
64+
AIAgentsInfo
65+
| summarize arg_max(Timestamp, *) by AIAgentId
66+
| where AgentStatus != "Deleted"
67+
| where AgentStatus == "Published"
68+
| where UserAuthenticationType == "None" or AuthenticationTrigger == "As Needed"
69+
| project-reorder AgentCreationTime ,AIAgentId, AIAgentName, AgentStatus, CreatorAccountUpn, OwnerAccountUpns
70+
```
71+
72+
73+
See [Proactively hunt for threats with advanced hunting in Microsoft Defender](/defender-xdr/advanced-hunting-overview) to learn how to use queries to proactively hunt for threats.
74+
75+
## Related articles
76+
77+
- [Protect your Copilot Studio custom AI Agents (Preview)](ai-agent-protection.md)
78+
- [Enable real-time protection for Microsoft Copilot Studio Agents](real-time-agent-protection-during-runtime.md)
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
---
2+
title: Protect your Microsoft Copilot Studio AI agents (Preview)
3+
description: Learn how to enable and manage AI Agent protection for Microsoft Copilot Studio AI agents using Microsoft Defender.
4+
ms.date: 11/02/2025
5+
ms.topic: how-to
6+
ms.service: defender-for-cloud-apps
7+
ms.reviewer: gayasalomon
8+
#customer-intent: As a security administrator, I want my Copilot Studio AI agents to be protected against suspicious or harmful actions so that I can reduce security risks to my organization.
9+
---
10+
11+
# Protect your Microsoft Copilot Studio AI agents (Preview)
12+
13+
As No code/Low code platforms become increasingly accessible, organizations face new types of security risks. These platforms empower non-technical users to build and deploy custom agents without centralized security review or controls in place. Attackers can attempt to manipulate these agents by:
14+
- Injecting malicious prompts
15+
- Triggering unintended tool executions
16+
- Exploiting data sources to escalate privileges or exfiltrate data.
17+
18+
## AI agent protection features
19+
20+
Microsoft Defender addresses critical security gaps with comprehensive AI agent protection that includes proactive exposure, threat hunting, real time protection, and alerts. With AI agent protection, Microsoft Defender:
21+
22+
- Detects all of your custom AI agents created with Microsoft Copilot Studio, and integrates their data into advanced hunting for proactive threat detection. You can use this data to create custom queries and hunt for potential threats. See [Copilot Studio AI agent inventory (Preview)](ai-agent-inventory.md) to learn how to set up and make use of the AI agent inventory.
23+
- Collects audit logs for your custom AI agents created with Copilot Studio, continuously monitors the agents for suspicious activity, and enables detections and alerts. To enable this monitoring, make sure that you:
24+
- [Enable the AI agent inventory](ai-agent-inventory.md#enable-the-copilot-studio-ai-agent-inventory).
25+
- [Enable the Microsoft 365 app connector](protect-office-365.md#connect-microsoft-365-to-microsoft-defender-for-cloud-apps).
26+
- Provides real-time protection to block suspicious or harmful actions initiated by your AI agents, and triggers an informative alert integrated into the XDR incidents and alerts environment. See [Enable real-time protection for Microsoft Copilot Studio Agents](real-time-agent-protection-during-runtime.md) to learn how to set up real-time protection.
27+
28+
## Related articles
29+
30+
- [Discover and protect your Copilot Studio custom AI Agents (Preview)](ai-agent-inventory.md)
31+
- [Enable real-time protection for Microsoft Copilot Studio Agents](real-time-agent-protection-during-runtime.md)

defender-for-cloud-apps/app-governance-get-started.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,8 @@ You must have at least one of these roles to turn on app governance:
6464
- Compliance Admin  
6565
- Compliance Data Admin
6666
- Cloud App Security Admin
67+
> [!NOTE]
68+
> The Cloud App Security Admin role grants permissions turn on app governance for Microsoft Defender for Cloud Apps. However, this role doesn't grant access to view or manage app governance capabilities. To view or manage app governance capabilities, you must also have one of the other roles listed in the table below.
6769
6870
The following table lists the app governance capabilities for each role.
6971

Binary file not shown.
510 KB
Loading
279 KB
Loading

0 commit comments

Comments
 (0)