You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/phishing-triage-agent.md
+9-184Lines changed: 9 additions & 184 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,13 +36,15 @@ Phishing remains one of the most common ways attackers gain initial access. It a
36
36
37
37
To help security teams address phishing efficiently, Microsoft Security Copilot is introducing the Phishing Triage Agent in Microsoft Defender. This AI-powered virtual agent is designed to scale security teams' response in triaging and classifying user-submitted phishing incidents, allowing organizations to improve their efficiency by reducing manual effort and streamlining their phishing response.
38
38
39
-
The Phishing Triage Agent uses advanced large language model-based analysis to understand the content of reported emails and autonomously determine whether a submission is a genuine phishing attempt or a false alarm. Unlike rule-based systems, it does not rely on predefined input or code to operate. Instead, it applies dynamic reasoning to analyze and act on incoming reports at scale.
39
+
The Phishing Triage Agent uses advanced large language model (LLM)-based analysis to understand the content of reported emails and autonomously determine whether a submission is a genuine phishing attempt or a false alarm. Unlike rule-based systems, it does not rely on predefined input or code to operate. Instead, it applies dynamic reasoning to analyze and act on incoming reports at scale.
40
40
41
41
By removing false positives from the queue, the agent significantly reduces the team's manual workload and allows them to focus on higher-priority tasks. With this automation, security teams can more efficiently process hundreds or thousands of phishing submissions, accelerating detection and response for incidents that require immediate attention
42
42
43
43
## Overview
44
44
45
-
The Phishing Triage Agent is designed to scale your security operations teams' processes in classifying and triaging user-submitted phishing incidents. Some of the agent’s highlights include:
45
+
Security Copilot brings together the power of AI and human expertise to help security teams respond to attacks faster and more effectively. Security Copilot is embedded in the Microsoft Defender portal to help provide security teams with enhanced capabilities to investigate and respond to incidents, hunt for threats, and protect their organization with relevant threat intelligence.
46
+
47
+
The Phishing Triage Agent is a [Security Copilot agent](/copilot/security/agents-overview) in Microsoft Defender designed to scale your security operations teams' processes in classifying and triaging user-submitted phishing incidents. Some of the agent’s highlights include:
46
48
47
49
- It operates autonomously. The Phishing Triage Agent leverages advanced AI tools to perform sophisticated assessments and determine whether a phishing submission is a real threat or a false alarm, without requiring step-by-step human input or code.
48
50
- It provides a transparent rationale for its classification verdicts in natural language, including the reasoning behind its decisions and the evidence it used to arrive at those conclusions. It also shows a visual representation of its reasoning process for every decision.
@@ -54,188 +56,11 @@ The following are organizational requirements to run Phishing Triage Agent in yo
54
56
55
57
|Components|Details|
56
58
|:---|:---|
57
-
|Products|- An active subscription to Security Copilot and provision capacity in Security Compute Units (SCU) to power Security Copilot workload. See [Get started with Security Copilot](/copilot/security/get-started-security-copilot) for more information </br> - Microsoft Defender for Office Plan 2 deployed|
58
-
|Microsoft Defender required features|- Unified role-based access control (URBAC) must be enabled in your organization. See [Unified role-based access control (URBAC)](manage-rbac.md) for more information </br> - *Monitor reported messages in Outlook* must be turned on </br> - The alert policy **Email reported by user as malware or phish** must be turned on. See [Alert policies in the Microsoft Defender portal](alert-policies.md) for more information|
59
-
|Security Copilot plugins required|The following plugins must be enabled in Security Copilot: </br> - Microsoft Defender XDR </br> - Microsoft Threat Intelligence </br> - Phishing Triage Agent|
60
-
61
-
## Set up the Phishing Triage Agent
62
-
63
-
> [!NOTE]
64
-
> Setup and management of the Phishing Triage Agent is only available to users with the **Security Administrator** role.
65
-
66
-
### Create the agent's identity and assign permissions
67
-
68
-
The Phishing Triage Agent operates in the context of the identity you associate with it. Creating the agent's identity and assigning the appropriate permissions to the agent is the required before starting the setup.
69
-
70
-
#### Identity
71
-
72
-
The Phishing Triage Agent uses as identity to access the data it needs to perform its tasks. For the agent, Microsoft recommends creating a **Microsoft Entra user** in the Microsoft Entra admin center and assigning the user the **Security Reader** role.
73
-
74
-
> [!TIP]
75
-
> Microsoft recommends creating and using a dedicated user account for the agent with the minimum required permissions.
76
-
> When creating the user account, ensure to assign a distinct display name, for example *Phishing triage agent*, to help identify the account in the Microsoft Defender portal.
77
-
78
-
Once the user is created, you can connect it to an existing user account that has the required permissions. In the initial setup, you can select **Connect an existing user account** to connect the agent to a user account and sign in to the user account.
79
-
80
-
Connecting the agent to a user account requires authentication that expires after 90 days. You must reauthenticate the agent every 90 days to maintain its access.
81
-
82
-
#### Permissions
83
-
84
-
After creating the agent's identity, you must assign it the appropriate permissions to access the data it needs to perform its tasks. To assign a role, see [Create a custom role](create-custom-rbac-roles.md#create-a-custom-role).
85
-
86
-
The Phishing Triage Agent requires the following permissions to run:
87
-
88
-
- Security data basics (read)
89
-
- Email & collaboration content (read)
90
-
- Email & collaboration metadata (read)
91
-
- Security Copilot (read)
92
-
- Alerts (manage)
93
-
94
-
> [!TIP]
95
-
> Microsoft recommends setting the agent with the aforementioned minimum required permissions.
96
-
> Users who have the same permissions as the agent can monitor the agent and view its output. However, they cannot manage the agent or change its settings.
97
-
98
-
### Begin the setup
99
-
100
-
Once the agent's identity is created and the appropriate permissions are assigned, you can begin the setup process.
101
-
102
-
You can access the Phishing Triage Agent setup from the **Incidents** queue in the Microsoft Defender portal. Select **Set up** to start the setup process.
103
-
104
-
[SCREENSHOT]
105
-
106
-
You can also access the Phishing Triage Agent setup from the **Settings > Microsoft Defender XDR** page in the Microsoft Defender portal. Under **Agents**, select **Overview**, then select **Set up** to start the setup process.
107
-
108
-
[SCREENSHOT]
109
-
110
-
Follow the steps in the setup wizard to complete the setup. The setup process includes the following steps:
111
-
112
-
1. Select the identity to assign to the agent.
113
-
2. Follow the prompts to sign in to the user account you want to connect to the agent.
114
-
115
-
[SCREENSHOT]
116
-
117
-
3. Select **Deploy agent** to set up the agent.
118
-
119
-
> [!NOTE]
120
-
> You can change the agent's identity and role at any time. To do this, navigate to **Settings > Microsoft Defender XDR**. Under **Agents**, select **Identity and role**.
121
-
122
-
4. Select **View incidents** to navigate to the incidents queue. The Phishing Triage Agent is now set up and running in the background, ready to triage user-submitted phishing incidents.
123
-
124
-
[SCREENSHOT]
125
-
126
-
### Troubleshooting setup issues
127
-
128
-
If you encounter issues during the setup process, check the following:
129
-
130
-
- Ensure that the agent's identity has the required permissions to access the data it needs to perform its tasks.
131
-
- Ensure that you have the necessary permissions to set up the agent. You must have the **Security Administrator** role to manage the agent.
132
-
- Ensure that the tenant has the required products enabled to use the agent. The tenant must have Microsoft Defender for Office 365 Plan 2 and must be provisioned with access to Security Copilot.
133
-
- Ensure that the Microsoft Defender required features are enabled in your organization. Unified role-based access control (URBAC) must be enabled, and the alert policy **Email reported by user as malware or phish** must be turned on.
134
-
135
-
## Manage the Phishing Triage Agent
136
-
137
-
The Phishing Triage Agent's settings can be managed from the **Settings > Microsoft Defender XDR** page in the Microsoft Defender portal.
138
-
139
-
### Manage the agent settings
140
-
141
-
You can manage the agent settings from the **Overview** page under **Agents**. The following options are available:
142
-
143
-
-**Pause**: Temporarily pause the agent. The agent will not triage new incidents while paused.
144
-
-**Remove agent**: Permanently remove the agent. The agent will no longer triage new incidents, but it retains the history of all incidents it triaged.
145
-
146
-
[SCREENSHOT]
147
-
148
-
### Manage the agent identity and role
149
-
150
-
You can manage the agent's identity and role from the **Identity and role** page under **Agents**. In this page, you can view the agent's identity, last update information, and the option to select a different identity for the agent.
151
-
152
-
[SCREENSHOT]
153
-
154
-
### Manage feedback to the agent
155
-
156
-
You can manage feedback provided to the agent from the **Agent Feedback** page under **Agents**. In this page, you can view all the feedback provided to the agent, including the agent's lesson, agent classification, classification change, users who provided feedback, the date of the feedback, and the incident ID.
157
-
158
-
[SCREENSHOT]
159
-
160
-
To review each feedback, select the feedback item from the list. In the **Review feedback** pane, review the details and decide to keep or reject the feedback. If you keep the feedback, the agent continues to use the feedback to improve its classification. If you reject the feedback, select **Reject feedback**.
161
-
162
-
[SCREENSHOT]
163
-
164
-
## Working effectively with the Phishing Triage Agent
165
-
166
-
Once the Phishing Triage Agent is fully setup and running, it's triggered when a user in your organization submits a phishing incident. The agent automatically analyzes email content, classifying the incident as either phishing or not phishing based on its training and the context of the organization.
167
-
168
-
Users can review the Phishing Triage Agent's triaged incidents and continuously enhance the agent's learning capabilities by providing feedback on the actions taken by the agent.
169
-
170
-
### Reviewing the agent's triaged incidents
171
-
172
-
After setting up the Phishing Triage Agent, it automatically runs in the background and begins to triage user-submitted phishing incidents. You can review your incident queue to see all the phishing incident submissions that the agent has swiftly resolved. Filter the queue for incidents with the **Agent** tag to view the incidents triaged by the agent.
173
-
174
-
[SCREENSHOT]
175
-
176
-
To see how the agent triaged and classified a phishing incident, select an incident from the queue to review. In the incident page, look for the Phishing Triage Agent card in the Copilot side panel.
177
-
178
-
[SCREENSHOT]
179
-
180
-
The Phishing Triage Agent card provides a classification verdict and the reasoning behind it using natural language, simplifying the process of understanding the agent's decision-making.
181
-
182
-
### Refining the agent through contextual feedback
183
-
184
-
You can provide feedback to the Phishing Triage Agent to help it learn and improve its classification accuracy. This feedback is essential for the agent to adapt to your organization's specific context and enhance its performance over time.
185
-
186
-
If the agent's classification does not align with your criteria, select **Change classification** in the Phishing Triage Agent card.
187
-
188
-
[SCREENSHOT]
189
-
190
-
Selecting this option opens the Manage alert pane where you can change the classification and add additional context through comments using natural language. Select **Use this feedback to teach the agent option** to improve the agent's subsequent responses so they’re better aligned with your organization’s context.
191
-
192
-
[SCREENSHOT]
193
-
194
-
To learn more about the agent’s actions before arriving at a classification, select **View agent activity** in the Phishing Triage Agent card.
195
-
196
-
[SCREENSHOT]
197
-
198
-
You can view all the actions taken by the agent and follow how the agent validates its action step by step in the Activity pane.
199
-
200
-
[SCREENSHOT]
201
-
202
-
You can also provide feedback to Copilot in the Copilot side panel by selecting the feedback icon  located at the bottom of the Phishing Triage Agent card. Based on your assessment of Copilot's response, you can select **Looks right**, **Needs improvement**, or **Inappropriate**. Add comments to provide more context for your feedback.
203
-
204
-
## Frequently asked questions (FAQs)
205
-
206
-
Following are responses to commonly asked questions about the Phishing Triage Agent. For information about the agent's capabilities and requirements, navigate to the [overview](#overview) and [prerequisites](#prerequisites) sections of this article.
207
-
208
-
### Why is the Phishing Triage Agent important?
209
-
210
-
Phishing remains one of the most common methods by which attackers gain initial access to systems. While security tools effectively block most threats, some still manage to slip through, overwhelming inboxes and leaving email users uncertain whether a suspicious email is a legitimate phishing attempt or harmless spam. This uncertainty often leads to an influx of user-submitted reports.
211
-
212
-
Consequently, managing these incidents becomes a tedious and repetitive task for SOC analysts. Each alert may require up to 30 minutes of manual triage, demanding significant effort to sift through a large volume of incidents in search of the genuine threat amidst all the noise. This effort overwhelms analysts, which have a limited amount of time to dedicate to competing and critical demands.
213
-
214
-
By alleviating the burden of reactive work, the Phishing Triage Agent empowers analysts to focus on proactive security measures, ultimately strengthening organizations’ overall security postures.
215
-
216
-
### When is the agent triggered?
217
-
218
-
The agent runs automatically when a user submits a potential phishing email.
219
-
220
-
### How do I grant the agent access to plugins and services?
221
-
222
-
You can create an agent identity using a service principal and assign it to an appropriate Tier 1 equivalent RBAC role in your environment to manage agent access. Alternatively, you can connect it to an existing user account by logging in to manage access. Note that service principals are supported for public preview.
223
-
224
-
### Can the Phishing Triage Agent be trusted?
225
-
226
-
Microsoft AI agents follow strict Responsible AI guidelines and undergo thorough reviews to ensure compliance with all AI standards and safeguards. The Phishing Triage Agent is fully incorporated into these controls.
227
-
228
-
During setup, the agent is assigned an identity and configured with the minimum required permissions for its operation, ensuring it is not over-permissioned. Furthermore, all agent activities are logged in detail, with the complete flow available for review by analysts and admins at any time.
229
-
230
-
Feedback provided to the agent to help it adapt to the organization’s environment is logged, reflected in the system, and accessible for review and modification by admins as needed.
231
-
232
-
### Can I remove the Phishing Triage Agent?
233
-
234
-
Yes. You can pause the agent or remove it at any time in the Overview page in Agent settings. To do this, navigate to **Settings > Microsoft Defender XDR**. In the **Overview** page under **Agents**, select **Pause** or **Remove agent**.
235
-
236
-
Removing the agent does not revert any changes made to the incidents it triaged. The agent is no longer able to triage new incidents after its removal, but it retains the history of all incidents it triaged.
59
+
|Products|- An active subscription to Security Copilot and provisioned capacity in Security Compute Units (SCU) to power Security Copilot workload. See [Get started with Security Copilot](/copilot/security/get-started-security-copilot) for more information </br> - Microsoft Defender for Office 365 Plan 2 deployed|
60
+
|Microsoft Defender required features|- Unified role-based access control (URBAC) must be enabled in your organization. See [Unified role-based access control (URBAC)](manage-rbac.md) for more information </br> - *Monitor reported messages in Outlook* is configured. See [User reported settings](/defender-office-365/submissions-user-reported-messages-custom-mailbox) for more information </br> - The alert policy **Email reported by user as malware or phish** must be turned on. See [Alert policies in the Microsoft Defender portal](alert-policies.md) for more information|
61
+
|Security Copilot plugins required|The following [Microsoft plugins](/copilot/security/plugin-overview#microsoft-plugins) must be enabled in Security Copilot: </br> - Microsoft Defender XDR </br> - Microsoft Threat Intelligence </br> - Phishing Triage Agent|
0 commit comments