Skip to content

Commit 6f31e06

Browse files
authored
Merge branch 'main' into WI353984-update-file-policies-article
2 parents e61adc8 + 88a857d commit 6f31e06

File tree

7 files changed

+142
-11
lines changed

7 files changed

+142
-11
lines changed

CloudAppSecurityDocs/cas-compliance-trust.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,9 @@ Microsoft Defender for Cloud Apps collects information from your configured clou
2121
- System settings and policies
2222
- User and group configurations
2323

24+
> [!NOTE]
25+
> The data collected from the various applications is dependent on the customer-provided data from the various applications and may include personal information.
26+
2427
## Data storage location
2528

2629
Defender for Cloud Apps operates in the Microsoft Azure data centers in the following geographical regions:

CloudAppSecurityDocs/mde-govern.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,8 @@ To block an app, do the following steps:
120120
> - Any organizational scoping that was set manually on indicators that were created by Defender for Cloud Apps before the release of this feature will be overridden by Defender for Cloud Apps. The required scoping should be set from the Defender for Cloud Apps experience using the scoped profiles experience.
121121
> - To remove a selected scoping profile from an unsanctioned app, remove the unsanctioned tag and then tag the app again with the required scoped profile.
122122
> - It can take up to two hours for app domains to propagate and be updated in the endpoint devices once they're marked with the relevant tag or/and scoping.
123-
> - When an app is tagged as *Monitored*, the option to apply a scoped profile shows only if the built-in *Win10 Endpoint Users* data source has consistently recieved data during the past 30 days.
123+
> - When an app is tagged as *Monitored*, the option to apply a scoped profile shows only if the built-in *Win10 Endpoint Users* data source has consistently received data during the past 30 days.
124+
> - Device groups in Microsoft Defender for Business(MDB) are managed differently. Due to this- No device groups will appear in MDA device groups for customers with MDB license.
124125
125126
## Educate users when accessing risky apps
126127

CloudAppSecurityDocs/protect-github.md

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Protect your GitHub Enterprise environment | Microsoft Defender for Cloud Apps
33
description: Learn how about connecting your GitHub Enterprise app to Defender for Cloud Apps using the API connector.
4-
ms.date: 12/05/2023
4+
ms.date: 04/27/2025
55
ms.topic: how-to
66
---
77
# How Defender for Cloud Apps helps protect your GitHub Enterprise environment
@@ -85,10 +85,6 @@ These steps can be completed independently of the [Configure GitHub Enterprise C
8585

8686
1. **Create an OAuth App for Defender for Cloud Apps to connect your GitHub organization.** Repeat this step for each additional connected organization.
8787

88-
> [!NOTE]
89-
> If you have [preview features](/microsoft-365/security/defender/preview) and [app governance turned on](app-governance-get-started.md), use the **App governance** page instead of the **OAuth apps** page to perform this procedure.
90-
>
91-
9288
1. Browse to **Settings** > **Developer settings**, select **OAuth Apps**, and then select **Register an application**. Alternatively, if you have existing OAuth apps, select **New OAuth App**.
9389

9490
![Screenshot showing creating an oauth app.](media/connect-github-create-oauth-app.png)
@@ -129,8 +125,8 @@ These steps can be completed independently of the [Configure GitHub Enterprise C
129125

130126
1. Select the **GitHub Profile picture** -> **your enterprises**.
131127
1. Select **your enterprise account** and choose the account you want to connect to Microsoft Defender for Cloud Apps.
132-
1. Confirm that the URL is the enterprise slug. For instance, in this example `https://github.com/enterprises/testEnterprise` *testEnterprise* is the enterprise slug. Enter only the enterprise slug, not the entire URL.
133-
128+
1. Confirm that the URL contains the enterprise slug. For instance, `https://github.com/enterprises/testEnterprise`
129+
2. Enter only the enterprise slug, not the entire URL. In this example, *testEnterprise* is the enterprise slug.
134130
1. Select **Next**.
135131

136132
1. Select **Connect GitHub**.

defender-xdr/TOC.yml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -416,6 +416,12 @@
416416
href: advanced-hunting-security-copilot.md
417417
- name: Create incident reports
418418
href: security-copilot-m365d-create-incident-report.md
419+
- name: Security Copilot agents in Microsoft Defender
420+
items:
421+
- name: Overview
422+
href: security-copilot-agents-defender.md
423+
- name: Phishing Triage Agent
424+
href: phishing-triage-agent.md
419425
- name: Enhance security operations
420426
items:
421427
- name: Security operations guide
Lines changed: 66 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,66 @@
1+
---
2+
title: Security Copilot Phishing Triage Agent in Microsoft Defender
3+
description: Learn about the Security Copilot Phishing Triage Agent, including requirements for setup and providing feedback to the agent.
4+
ms.service: defender-xdr
5+
f1.keywords:
6+
- NOCSH
7+
ms.author: diannegali
8+
author: diannegali
9+
ms.localizationpriority: medium
10+
manager: deniseb
11+
audience: ITPro
12+
ms.collection:
13+
- m365-security
14+
- tier1
15+
- security-copilot
16+
- magic-ai-copilot
17+
ms.topic: concept-article
18+
search.appverid:
19+
- MOE150
20+
- MET150
21+
ms.date: 04/28/2025
22+
appliesto:
23+
- Microsoft Defender XDR
24+
- Microsoft Defender for Office 365 Plan 2
25+
#customer intent: As a security analyst, I want to learn about the Phishing Triage Agent in Microsoft Defender so that I can triage and classify user-submitted phishing incidents efficiently.
26+
---
27+
28+
# Microsoft Security Copilot Phishing Triage Agent in Microsoft Defender
29+
30+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
31+
32+
> [!IMPORTANT]
33+
> Some information in this article relates to a prereleased product, which may be substantially modified before it's commercially released. Microsoft makes no warranties expressed or implied, with respect to the information provided here.
34+
35+
Phishing remains one of the most common ways attackers gain initial access. It also represents one of the highest-volume challenges security operations center (SOC) teams face, due to the large number of user-reported suspicious emails that must be investigated daily.
36+
37+
To help security teams address phishing efficiently, Microsoft Security Copilot is introducing the Phishing Triage Agent in Microsoft Defender. This AI-powered virtual agent is designed to scale security teams' response in triaging and classifying user-submitted phishing incidents, allowing organizations to improve their efficiency by reducing manual effort and streamlining their phishing response.
38+
39+
The Phishing Triage Agent uses advanced large language model (LLM)-based analysis to understand the content of reported emails and autonomously determine whether a submission is a genuine phishing attempt or a false alarm. Unlike rule-based systems, it doesn't rely on predefined input or code to operate. Instead, it applies dynamic reasoning to analyze and act on incoming reports at scale.
40+
41+
By removing false alarms from the queue, the agent significantly reduces the team's manual workload and allows them to focus on higher-priority tasks. With this automation, security teams can more efficiently process hundreds or thousands of phishing submissions, accelerating detection and response for incidents that require immediate attention.
42+
43+
## Overview
44+
45+
Security Copilot brings together the power of AI and human expertise to help security teams respond to attacks faster and more effectively. Security Copilot is embedded in the Microsoft Defender portal to help provide security teams with enhanced capabilities to investigate and respond to incidents, hunt for threats, and protect their organization with relevant threat intelligence.
46+
47+
The Phishing Triage Agent is a [Security Copilot agent](/copilot/security/agents-overview) in Microsoft Defender designed to scale your security operations teams' processes in classifying and triaging user-submitted phishing incidents. Some of the agent’s highlights include:
48+
49+
- It operates autonomously. The Phishing Triage Agent leverages advanced AI tools to perform sophisticated assessments and determine whether a phishing submission is a real threat or a false alarm, without requiring step-by-step human input or code.
50+
- It provides a transparent rationale for its classification verdicts in natural language, including the reasoning behind its decisions and the evidence it used to arrive at those conclusions. It also shows a visual representation of its reasoning process for every decision.
51+
- It continuously learns and improves its accuracy based on feedback provided by analysts. Over time, this feedback loop fine-tunes the agent’s behavior, aligning it more closely with organizational nuances and reducing the need for manual verification.
52+
53+
## Prerequisites
54+
55+
The following are organizational requirements to run Phishing Triage Agent in your environment:
56+
57+
|Components|Details|
58+
|:---|:---|
59+
|Products|- An active subscription to Security Copilot and provisioned capacity in Security Compute Units (SCU) to power Security Copilot workload. See [Get started with Security Copilot](/copilot/security/get-started-security-copilot) for more information </br> - Microsoft Defender for Office 365 Plan 2 deployed|
60+
|Microsoft Defender required features|- Unified role-based access control (URBAC) must be enabled in your organization. See [Unified role-based access control (URBAC)](manage-rbac.md) for more information </br> - *Monitor reported messages in Outlook* is configured. See [User reported settings](/defender-office-365/submissions-user-reported-messages-custom-mailbox) for more information </br> - The alert policy **Email reported by user as malware or phish** must be turned on. See [Alert policies in the Microsoft Defender portal](alert-policies.md) for more information|
61+
|Security Copilot plugins required|The following [Microsoft plugins](/copilot/security/plugin-overview#microsoft-plugins) must be enabled in Security Copilot: </br> - Microsoft Defender XDR </br> - Microsoft Threat Intelligence </br> - Phishing Triage Agent|
62+
63+
## Related content
64+
65+
- [Microsoft Security Copilot agents](/copilot/security/agents-overview)
66+
- [Responsible AI FAQs for Security Copilot](/copilot/security/rai-faqs-security-copilot)
Lines changed: 57 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,57 @@
1+
---
2+
title: Microsoft Security Copilot Agents in Microsoft Defender
3+
description: Learn about Security Copilot agents in Microsoft Defender that can help you perform your security tasks easily.
4+
ms.service: defender-xdr
5+
f1.keywords:
6+
- NOCSH
7+
ms.author: diannegali
8+
author: diannegali
9+
ms.localizationpriority: medium
10+
manager: deniseb
11+
audience: ITPro
12+
ms.collection:
13+
- m365-security
14+
- tier1
15+
- security-copilot
16+
- magic-ai-copilot
17+
ms.topic: concept-article
18+
search.appverid:
19+
- MOE150
20+
- MET150
21+
ms.date: 04/28/2025
22+
appliesto:
23+
- Microsoft Defender XDR
24+
- Microsoft Sentinel in the Microsoft Defender portal
25+
#customer intent: As a security analyst, I want to know about the Security Copilot agents available in Microsoft Defender so that I can use them to perform my security tasks efficiently.
26+
---
27+
28+
# Microsoft Security Copilot Agents in Microsoft Defender
29+
30+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
31+
32+
Microsoft Security Copilot agents are available in Microsoft Defender to help you perform your security tasks efficiently. Security Copilot agents are AI-powered assistants that can help you with various tasks by working seamlessly with Microsoft security products.
33+
34+
## Agents in Microsoft Defender
35+
36+
### Phishing Triage Agent
37+
38+
The [Phishing Triage Agent](phishing-triage-agent.md) helps security operations analysts to triage and classify user-submitted phishing incidents. The agent operates autonomously, provides a transparent rationale for its classification verdicts in natural language, and continuously learns and improves its accuracy based on feedback provided by analysts.
39+
40+
#### Trigger
41+
42+
The agent is triggered when a user in your organization submits a phishing incident. The agent autonomously analyzes the submitted email to classify them as either phishing or not phishing based on its training and the context of the organization.
43+
44+
#### Products
45+
46+
Tenants must have the following products enabled to use the agent:
47+
48+
- An active subscription to Security Copilot and provisioned capacity in Security Compute Units (SCU) to power Security Copilot workload. See [Get started with Security Copilot](/copilot/security/get-started-security-copilot) for more information.
49+
- Microsoft Defender for Office 365 Plan 2 deployed
50+
51+
#### Plugins
52+
53+
The following plugins must be enabled in Security Copilot:
54+
55+
- Microsoft Defender XDR
56+
- Microsoft Threat Intelligence
57+
- Phishing Triage Agent

defender-xdr/security-copilot-in-microsoft-365-defender.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,14 +14,16 @@ ms.collection:
1414
- tier1
1515
- security-copilot
1616
- magic-ai-copilot
17-
ms.topic: conceptual
17+
ms.topic: concept-article
1818
search.appverid:
1919
- MOE150
2020
- MET150
21-
ms.date: 03/10/2025
21+
ms.date: 04/28/2025
2222
appliesto:
2323
- Microsoft Defender XDR
2424
- Microsoft Sentinel in the Microsoft Defender portal
25+
#customer intent: As an IT admin, I want to learn about Microsoft Security Copilot capabilities embedded in Microsoft Defender so that I can use them to perform my security tasks efficiently.
26+
#customer intent: As a security analyst, I want to learn about Microsoft Security Copilot capabilities embedded in Microsoft Defender so that I can use them to perform my security tasks efficiently.
2527
---
2628

2729
# Microsoft Copilot in Microsoft Defender
@@ -49,7 +51,7 @@ If you're new to Security Copilot, you should familiarize yourself with it by re
4951

5052
[Microsoft Security Copilot](/security-copilot/microsoft-security-copilot) brings together the power of AI and human expertise to help security teams respond to attacks faster and more effectively. Security Copilot is embedded in the Microsoft Defender portal to help provide security teams with enhanced capabilities to investigate and respond to incidents, hunt for threats, and protect their organization with relevant threat intelligence. Copilot in Defender is available to users who have provisioned access to Security Copilot.
5153

52-
Furthermore, Security Copilot operates using [Microsoft's AI principles](https://www.microsoft.com/ai/responsible-ai). To know more, see the [Security Copilot Responsible AI FAQs](/copilot/security/rai-faqs-security-copilot).
54+
Security Copilot operates using [Microsoft's AI principles](https://www.microsoft.com/ai/responsible-ai). To know more, see the [Security Copilot Responsible AI FAQs](/copilot/security/rai-faqs-security-copilot).
5355

5456
## Key features
5557

0 commit comments

Comments
 (0)