You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/copilot-in-defender-device-summary.md
+31-11Lines changed: 31 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ ms.topic: conceptual
18
18
search.appverid:
19
19
- MOE150
20
20
- MET150
21
-
ms.date: 04/01/2024
21
+
ms.date: 10/04/2024
22
22
appliesto:
23
23
- Microsoft Defender XDR
24
24
- Microsoft Sentinel in the Microsoft Defender portal
@@ -30,13 +30,27 @@ appliesto:
30
30
31
31
[Microsoft Copilot for Security](/security-copilot/microsoft-security-copilot) in the Microsoft Defender portal helps security teams in speeding up device inspection through AI-powered investigation capabilities.
32
32
33
+
## Know before you begin
34
+
35
+
If you're new to Copilot for Security, you should familiarize yourself with it by reading the following articles:
36
+
37
+
-[What is Copilot for Security?](/security-copilot/microsoft-security-copilot)
38
+
-[Copilot for Security experiences](/security-copilot/experiences-security-copilot)
39
+
-[Get started with Copilot for Security](/security-copilot/get-started-security-copilot)
40
+
-[Understand authentication in Copilot for Security](/security-copilot/authentication)
41
+
-[Prompting in Copilot for Security](/security-copilot/prompting-security-copilot)
42
+
33
43
Security operations teams are tasked to sift through device data to find suspicious activities or entities to prevent malicious attacks. These teams need to summarize large amounts of data and simplify complex information to quickly assess, triage, and connect a device's status and activities to potentially malicious attacks.
34
44
35
45
The device summary capability of Copilot in Defender enables security teams to get a device's security posture, vulnerable software information, and any unusual behaviors. Security analysts can use a device's summary to speed up their investigation of incidents and alerts.
36
46
37
-
The device summary capability is available in the Microsoft Defender portal through the [Copilot for Security license](/security-copilot/faq-security-copilot). This capability is also available in the Copilot for Security standalone portal through the Microsoft Defender XDR plugin.
47
+
## Copilot for Security integration in Microsoft Defender
48
+
49
+
The device summary capability is available in the Microsoft Defender portal for customers who have provisioned access to Copilot for Security.
50
+
51
+
This capability is also available in the Copilot for Security standalone portal through the Microsoft Defender XDR plugin. Know more about [preinstalled plugins in Copilot for Security](/security-copilot/manage-plugins#preinstalled-plugins).
38
52
39
-
## Summarize device information
53
+
## Key features
40
54
41
55
The device summary generated by Copilot contains noteworthy information about the device, including:
42
56
@@ -61,18 +75,24 @@ You can access the device summary capability through the following ways:
61
75
62
76
:::image type="content" source="/defender/media/copilot-in-defender/device-summary/copilot-defender-device-summary-assets-small.png" alt-text="Screenshot highlighting the device summary option in the assets tab of an incident page in Copilot in Defender." lightbox="/defender/media/copilot-in-defender/device-summary/copilot-defender-device-summary-assets.png":::
63
77
64
-
Review the results. You can copy the results to clipboard, regenerate the results, or open the Copilot for Security portal by selecting the More actions ellipsis (...) on top of the device summary card.
78
+
Review the results of the device summary. You can copy the results to clipboard, regenerate the results, or open the Copilot for Security portal by selecting the More actions ellipsis (...) on top of the device summary card.
65
79
66
-
You can provide feedback about the results by navigating to the bottom of the Copilot pane and selecting the feedback icon .
80
+
## Sample device summary prompt
81
+
82
+
In the Copilot for Security standalone portal, you can use the following prompt to generate a device summary:
83
+
84
+
-*Summarize device information in Defender incident {incident number.*
85
+
86
+
> [!TIP]
87
+
> When investigating devices in the Copilot for Security portal, Microsoft recommends including the word ***Defender*** in your prompts to ensure that the device summary capability delivers the results.
88
+
89
+
## Provide feedback
90
+
91
+
Your feedback helps improve the quality of the results generated by Copilot. You can provide feedback about the results by navigating to the bottom of the Copilot pane and selecting the feedback icon .
Copy file name to clipboardExpand all lines: defender-xdr/copilot-in-defender-file-analysis.md
+30-10Lines changed: 30 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ ms.topic: conceptual
18
18
search.appverid:
19
19
- MOE150
20
20
- MET150
21
-
ms.date: 04/01/2024
21
+
ms.date: 10/04/2024
22
22
appliesto:
23
23
- Microsoft Defender XDR
24
24
- Microsoft Sentinel in the Microsoft Defender portal
@@ -30,13 +30,27 @@ appliesto:
30
30
31
31
[Microsoft Copilot for Security](/security-copilot/microsoft-security-copilot) in the Microsoft Defender portal enables security teams to quickly identify malicious and suspicious files through AI-powered file analysis capabilities.
32
32
33
+
## Know before you begin
34
+
35
+
If you're new to Copilot for Security, you should familiarize yourself with it by reading the following articles:
36
+
37
+
-[What is Copilot for Security?](/security-copilot/microsoft-security-copilot)
38
+
-[Copilot for Security experiences](/security-copilot/experiences-security-copilot)
39
+
-[Get started with Copilot for Security](/security-copilot/get-started-security-copilot)
40
+
-[Understand authentication in Copilot for Security](/security-copilot/authentication)
41
+
-[Prompting in Copilot for Security](/security-copilot/prompting-security-copilot)
42
+
33
43
Security operations teams tracking and resolving attacks need tools and techniques to quickly analyze potentially malicious files. Sophisticated attacks often use files that mimic legitimate or system files to avoid detection. In addition, new-to-the-field security analysts might require time and gain significant experience to use available analysis tools and techniques.
34
44
35
45
The file analysis capability of Copilot in Defender reduces the barrier to learning file analysis by immediately delivering reliable and complete file investigation results. This capability empowers security analysts from all levels to complete their investigation with a shorter turnaround time. The report includes an overview of the file, details of the file's contents, and a summary of the file's assessment.
36
46
37
-
The file analysis capability is available in Microsoft Defender through the [Copilot for Security license](/security-copilot/faq-security-copilot). Copilot for Security standalone portal users also have the file analysis capability and other Defender XDR capabilities through the Microsoft Defender XDR plugin.
47
+
## Copilot for Security integration in Microsoft Defender
48
+
49
+
The file analysis capability is available in Microsoft Defender for customers who have provisioned access to Copilot for Security.
50
+
51
+
Copilot for Security standalone portal users also have the file analysis capability and other Defender XDR capabilities through the Microsoft Defender XDR plugin. Know more about [preinstalled plugins in Copilot for Security](/security-copilot/manage-plugins#preinstalled-plugins).
38
52
39
-
## Analyze a file
53
+
## Key features
40
54
41
55
The file analysis results generated by Copilot usually contains the following information:
42
56
@@ -59,16 +73,22 @@ You can access the file analysis capability through the following ways:
59
73
60
74
You can copy the results to clipboard, regenerate the results, or open the Copilot for Security portal by selecting the More actions ellipsis (...) on top of the file analysis card.
61
75
62
-
Always review the results generated by Copilot in Defender. Select the feedback icon  at the bottom of the Copilot pane to provide feedback.
76
+
## Sample file analysis prompt
77
+
78
+
In the Copilot for Security standalone portal, you can use the following prompt to generate a device summary:
79
+
80
+
-*Tell me about the files in Defender incident {incident number). Which files are malicious?*
81
+
82
+
> [!TIP]
83
+
> When investigating files in the Copilot for Security portal, Microsoft recommends including the word ***Defender*** in your prompts to ensure that the file analysis capability delivers the results.
84
+
85
+
## Provide feedback
86
+
87
+
Always review the results generated by Copilot in Defender. Your feedback helps improve the quality of the results generated by Copilot. Select the feedback icon  at the bottom of the Copilot pane to provide feedback.
Copy file name to clipboardExpand all lines: defender-xdr/investigate-users.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -141,13 +141,14 @@ The lateral movement path report, which can be viewed by date, is always availab
141
141
142
142
## Timeline
143
143
144
-
The timeline displays user activities and alerts observed from a user's identity in the last 30 days. It unifies the user's identity entries across Microsoft Defender for Identity, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint workloads. By using the timeline, you can focus on activities a user performed or were performed on them in specific timeframes.
144
+
The timeline displays user activities and alerts observed from a user's identity in the last 180 days. It unifies the user's identity entries across Microsoft Defender for Identity, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint workloads. By using the timeline, you can focus on activities a user performed or were performed on them in specific timeframes.
145
145
146
146
For users of the unified SOC platform to see alerts from Microsoft Sentinel based on data sources other than the ones in the previous paragraph, they can find these alerts and other information in the **Sentinel events** tab, [described below](#sentinel-events).
147
147
148
-
-**Custom time range picker:** You can choose a timeframe to focus your investigation on the last 24 hours, the last 3 days and so on. Or you can choose a specific timeframe by clicking on **Custom range**. For example:
148
+
-**Custom time range picker:** You can choose a timeframe to focus your investigation on the last 24 hours, the last 3 days and so on. Or you can choose a specific timeframe by clicking on **Custom range**. Filtered data older than 30 days is displayed in seven-day intervals.
149
+
For example:
149
150
150
-
:::image type="content" source="/defender/media/image.png" alt-text="Screenshot that shows how to choose time frame." lightbox="/defender/media/image.png":::
151
+
:::image type="content" source="/defender/media/image.png" alt-text="Screenshot that shows how to choose time frame." lightbox="/defender/media/image.png":::
151
152
152
153
-**Timeline filters:** In order to improve your investigation experience, you can use the timeline filters: Type (Alerts and/or user's related activities), Alert severity, Activity type, App, Location, Protocol. Each filter depends on the others, and the options in each filter (drop-down) only contains the data that is relevant for the specific user.
Copy file name to clipboardExpand all lines: defender-xdr/security-copilot-defender-identity-summary.md
+31-9Lines changed: 31 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ ms.topic: conceptual
18
18
search.appverid:
19
19
- MOE150
20
20
- MET150
21
-
ms.date: 09/23/2024
21
+
ms.date: 10/14/2024
22
22
appliesto:
23
23
- Microsoft Defender XDR
24
24
- Microsoft Sentinel in the Microsoft Defender portal
@@ -30,8 +30,28 @@ appliesto:
30
30
31
31
Security operations teams investigating users can easily understand identity information with the identity summary capability in [Microsoft Copilot for Security](/security-copilot/microsoft-security-copilot) in Microsoft Defender. Through generative AI and harnessing the power of Microsoft Defender for Identity, Copilot creates contextual insights about an identity in an organization, helping analysts quickly understand important data to speed up their investigation.
32
32
33
+
This guide describes what the identity summary capability is and how it works, including how you can provide feedback on the results generated.
34
+
35
+
## Know before you begin
36
+
37
+
If you're new to Copilot for Security, you should familiarize yourself with it by reading the following articles:
38
+
39
+
-[What is Copilot for Security?](/security-copilot/microsoft-security-copilot)
40
+
-[Copilot for Security experiences](/security-copilot/experiences-security-copilot)
41
+
-[Get started with Copilot for Security](/security-copilot/get-started-security-copilot)
42
+
-[Understand authentication in Copilot for Security](/security-copilot/authentication)
43
+
-[Prompting in Copilot for Security](/security-copilot/prompting-security-copilot)
44
+
33
45
With the identity summary capability, analysts can immediately identify suspicious or risky identity-related changes and actions that can negatively impact an organization. The summary also includes potential misconfigurations that affects an identity. Using natural language, Copilot delivers clear and actionable user information that analysts can use in their incident investigation activities. The capability currently focuses on users and will include service accounts in its next iteration.
34
46
47
+
## Copilot for Security integration in Microsoft Defender
48
+
49
+
The identity summary capability is available in the Microsoft Defender portal for customers who have provisioned access to Copilot for Security.
50
+
51
+
Users who access the Copilot for Security standalone portal can use this capability through the Microsoft Defender XDR plugin. Know more about [preinstalled plugins in Copilot for Security](/security-copilot/manage-plugins#preinstalled-plugins).
52
+
53
+
## Key features
54
+
35
55
The identity summary contains essential information about an identity, including:
36
56
37
57
- The date when a user account is created, and whether the user account is of high, medium, or low criticality
@@ -42,12 +62,6 @@ The identity summary contains essential information about an identity, including
42
62
- Risks associated with a user based on Microsoft Entra ID
43
63
- General information like a user’s professional title and contact information, department, and their manager’s contact information
44
64
45
-
The identity summary capability is available in the Microsoft Defender portal for customers who have provisioned access to Copilot for Security. Users who access the Copilot for Security standalone portal can use this capability through the Microsoft Defender XDR plugin. Know more about [preinstalled plugins in Copilot for Security](/security-copilot/manage-plugins#preinstalled-plugins).
46
-
47
-
This guide describes what the script analysis capability is and how it works, including how you can provide feedback on the results generated.
48
-
49
-
## Summarize identity information
50
-
51
65
You can access the identity summary capability in the following ways:
52
66
53
67
- From an incident page, choose an identity on the incident graph and then (1) select **User details**. In the user details pane, (2) select **Summarize**. The results are displayed in the Copilot side panel.
@@ -72,8 +86,16 @@ You can access the identity summary capability in the following ways:
72
86
73
87
Review the identity summary results. You can copy the results to clipboard, regenerate the results, or open Security Copilot by selecting the More actions ellipsis (...) on top of the identity summary card. You can extend your investigation of identity using prompts and other plugins in the Copilot for Security portal.
74
88
89
+
## Sample identity summary prompt
90
+
91
+
In the Copilot for Security standalone portal, you can use the following prompt to generate an identity summary:
92
+
93
+
-*Show the Defender summary of this user in the last {time frame}.*
94
+
75
95
> [!TIP]
76
-
> When investigating users in the Copilot for Security portal, Microsoft recommends including the word ***Defender*** in your prompts to ensure that the identity summary capability delivers the results. For example, you can use the prompt *Show the Defender summary of this user in the last {time frame}* to generate the identity summary of a user account within the time frame indicated. You can specify up to 120 days on the time frame, with the default being 30 days when you don’t indicate one.
96
+
> When investigating users in the Copilot for Security portal, Microsoft recommends including the word ***Defender*** in your prompts to ensure that the identity summary capability delivers the results. You can specify up to 120 days on the investigation time frame, with the default being 30 days when you don’t indicate one.
97
+
98
+
## Provide feedback
77
99
78
100
Microsoft highly encourages you to provide feedback to Copilot, as it’s crucial for a capability’s continuous improvement. To provide feedback, navigate to the bottom of the Copilot side panel and select the feedback icon .
79
101
@@ -83,7 +105,7 @@ Fill in the dedicated text box to share your thoughts, experiences, and requests
83
105
84
106
## See also
85
107
86
-
-[Get started with Microsoft Copilot for Security](/security-copilot/get-started-security-copilot)
87
108
-[Learn about other Copilot for Security embedded experiences](/security-copilot/experiences-security-copilot)
109
+
-[Privacy and data security in Copilot for Security](/copilot/security/privacy-data-security)
0 commit comments