You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The agent is triggered when a user in your organization submits a phishing incident. The agent automatically analyzes the submitted email to classify them as either phishing or not phishing based on its training and the context of the organization.
46
46
47
-
#### Permissions
48
-
49
-
The agent requires the following permissions to run:
50
-
51
-
- Security data basics (read)
52
-
- Email & collaboration content (read)
53
-
- Email & collaboration metadata (read)
54
-
- Security Copilot (read)
55
-
- Alerts (manage)
56
-
57
47
#### Role-based access
58
48
59
49
A Security Administrator role is required to setup and manage the agent. Users with the same permissions as the agent can view the agent's output.
@@ -66,16 +56,12 @@ The agent runs in the context of the identity you associate with it. The agent u
66
56
67
57
Tenants must have the following products enabled to use the agent:
68
58
69
-
- Microsoft Defender for Office 365
70
-
- Microsoft Defender XDR
59
+
- Microsoft Defender for Office 365 Plan 2
71
60
72
61
#### Plugins
73
62
74
63
The following plugins must be enabled in Security Copilot:
75
64
76
65
- Microsoft Defender XDR
77
66
- Microsoft Threat Intelligence
78
-
79
-
## Related content
80
-
81
-
-[Security Copilot in Defender](security-copilot-in-microsoft-365-defender.md)
Copy file name to clipboardExpand all lines: defender-xdr/security-copilot-in-microsoft-365-defender.md
-21Lines changed: 0 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,8 +51,6 @@ If you're new to Security Copilot, you should familiarize yourself with it by re
51
51
52
52
[Microsoft Security Copilot](/security-copilot/microsoft-security-copilot) brings together the power of AI and human expertise to help security teams respond to attacks faster and more effectively. Security Copilot is embedded in the Microsoft Defender portal to help provide security teams with enhanced capabilities to investigate and respond to incidents, hunt for threats, and protect their organization with relevant threat intelligence. Copilot in Defender is available to users who have provisioned access to Security Copilot.
53
53
54
-
[Security Copilot agents](#security-copilot-agents-in-microsoft-defender) are also available in Microsoft Defender to help security teams automate and scale their security operations. The [Phishing Triage Agent](#phishing-triage-agent) is a Security Copilot agent designed to scale security teams' response in triaging and classifying user-submitted phishing incidents in Microsoft Defender.
55
-
56
54
Security Copilot operates using [Microsoft's AI principles](https://www.microsoft.com/ai/responsible-ai). To know more, see the [Security Copilot Responsible AI FAQs](/copilot/security/rai-faqs-security-copilot).
57
55
58
56
## Key features
@@ -125,23 +123,6 @@ Ask Copilot to summarize the relevant threats impacting your environment, to pri
> Some information in this article relates to a prereleased product, which may be substantially modified before it's commercially released. Microsoft makes no warranties expressed or implied, with respect to the information provided here.
132
-
133
-
#### Phishing Triage Agent
134
-
135
-
The [Phishing Triage Agent](phishing-triage-agent.md) is a Security Copilot agent designed to scale security teams' response in triaging and classifying user-submitted phishing incidents in Microsoft Defender, can help organizations address phishing efficiently. It assists security operations center (SOC) teams by autonomously triaging phishing submissions, determining whether they are genuine phishing attempts or false alarms. By alleviating the burden of reactive work, it reduces the team's manual workload and allows them to focus on critical tasks.
136
-
137
-
[SCREENSHOT]
138
-
139
-
Some of the agent’s highlights include:
140
-
141
-
- It operates autonomously. The Phishing Triage Agent leverages advanced AI tools to perform sophisticated assessments and determine whether a phishing submission is a real threat or a false alarm, without requiring step-by-step human input or code.
142
-
- It provides a transparent rationale for its classification verdicts in natural language, including the reasoning behind its decisions and the evidence it used to arrive at those conclusions. It also shows a visual representation of its reasoning process for every decision.
143
-
- It continuously learns and improves its accuracy based on feedback provided by analysts. Over time, this feedback loop fine-tunes the agent’s behavior, aligning it more closely with organizational nuances and reducing the need for manual verification.
144
-
145
126
## Access Copilot in Defender
146
127
147
128
To ensure that you have access to Copilot in Defender, see the [Security Copilot purchase and licensing information](/security-copilot/faq-security-copilot). Once you have access to Security Copilot, the key features become available in the Microsoft Defender portal.
@@ -197,14 +178,12 @@ Copilot uses [preinstalled Microsoft plugins](/security-copilot/manage-plugins#p
0 commit comments