Skip to content

Commit 1ade768

Browse files
authored
Merge pull request #51010 from ceperezb/CEPEREZB-security-copilot-agents
Ceperezb security copilot agents
2 parents d0a5c02 + 8740028 commit 1ade768

File tree

4 files changed

+111
-0
lines changed

4 files changed

+111
-0
lines changed
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.security-copilot-describe-agents.explore-threat-intelligence-briefing-agent
3+
title: Explore the Threat Intelligence Briefing Agent
4+
metadata:
5+
title: Explore the Threat Intelligence Briefing Agent
6+
description: Explore the Threat Intelligence Briefing Agent.
7+
author: wwlpublish
8+
ms.author: ceperezb
9+
ms.date: 06/12/2025
10+
ms.topic: unit
11+
ms.collection:
12+
- wwl-ai-copilot
13+
durationInMinutes: 15
14+
content: |
15+
[!include[](includes/3a-explore-threat-intelligence-briefing-agent.md)]
Lines changed: 95 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,95 @@
1+
In this exercise, you explore the Threat Intelligence Briefing Agent in Security Copilot.
2+
3+
> [!NOTE]
4+
>The environment for this exercise is a simulation generated from the product. As a limited simulation, links on a page may not be enabled and text-based inputs that fall outside of the specified script may not be supported. A pop-up message displays stating, "This feature is not available within the simulation." When this occurs, select OK and continue the exercise steps.
5+
>
6+
>
7+
>:::image type="content" source="../media/simulation-pop-up-error.png" alt-text="Screenshot of pop-up screen indicating that this feature isn't available within the simulation.":::
8+
9+
### Exercise
10+
11+
For this exercise, you're logged in as Avery Howard and you have an owner role in Security Copilot. You start by enabling and configuring the plugins necessary to use the Threat Intelligence Briefing agent and set up the agent parameters. Once configured, you run the agent. You also walk through editing the parameters used for a manual run of the agent.
12+
13+
This exercise should take approximately **15** minutes to complete.
14+
15+
> [!NOTE]
16+
> When a lab instruction calls for opening a link to the simulated environment, it's recommended that you open the link in a new browser window so that you can simultaneously view the instructions and the exercise environment. To do so, select the right mouse key and select the option.
17+
18+
### Task: Set up the agent plugins
19+
20+
Before you start setting up the agent, let’s go to the plugins page and make sure the plugins that are used by the Threat Intelligence Briefing Agent are enabled and configured.
21+
22+
1. Open the simulated environment by selecting **[Microsoft Security Copilot](https://app.highlights.guide/start/081bcf08-f466-4dce-aee0-dfe5cae60c07?token=16d48b6c-eace-4a1f-8050-098d29d23a89&azure-portal=true)**.
23+
1. From the main landing page, select the **sources icon** in the prompt bar.
24+
1. Expand the list of Microsoft plugins, select **Show 17 more**.
25+
1. Make sure the **Agents** plugin is enabled.
26+
1. Make sure the **Microsoft Threat Intelligence** plugin is enabled.
27+
1. Make sure the **Microsoft Threat Intelligence Agents** plugin is enabled
28+
1. Make sure the optional **Microsoft Defender External Attack Surface Management** plugin is enabled and configured.
29+
1. Exit out of the Manage sources page, but keep the browser tab with Security Copilot open. You need it for the next task.
30+
31+
### Task: Set up and run the agent
32+
33+
In this task, you set up the Threat Intelligence Briefing Agent.
34+
35+
1. Select the **Menu icon** which is sometimes referred to as the hamburger icon and select **Agents**. If a pop-up displays, select **Dismiss**.
36+
1. Look for the tile that says, **Threat Intelligence Briefing Agent**, then select **View details**.
37+
1. Review the information on the agent’s page that provides a brief description of the agent, the Trigger, Permissions, Identity, Plugins, and Role-based access, then select **Set up**.
38+
1. The Setup agent window provides information on the permissions needed to run the agent and the identity used with the agent. To Connect your user account (recall that you're logged in as Avery Howard) to the agent, select **Next** to open a new window where you can select the user account. Select **Avery Howard**.
39+
1. Once you've connected your account to the agent, you complete the agent set up by specifying the parameters used to customize the threat intelligence report. This information is used each time the agent runs, unless it's changed (you explore that in a subsequent task).
40+
1. Insights: **3**
41+
1. Look back days: **14**
42+
1. Email: **[email protected]**
43+
1. Region: **US**
44+
1. Industry: **Healthcare**
45+
1. Select **Finish**.
46+
1. After the agent is created, you’re redirected to the activity page where you can get the agent to work on your first results, as part of the first run experience. Here you can run it with the automatic trigger or run it without the trigger, select **Run it automatically on the trigger**. Once selected, the window displays the message, **The agent is working on your first results**. After a few seconds, the window updates again showing a line item for that initial run with status "In progress" and the method shows as Automated.
47+
1. After a few seconds, the run will show as Completed. Select the line item listed as **Completed** from the activity dashboard window. ***For the purpose of the simulation, the amount of time it takes to complete the run is accelerated.***
48+
1. The first section of the report is the Input. Expand the down arrow next to confirm the inputs you entered are shown.
49+
1. The next section of the report shows the Result.
50+
1. Scroll down to view the report.
51+
1. Next to where it says results are several icons. Hover over each one to see its function. Let's explore the feedback options:
52+
1. Select the **thumbs-up** icon to view the available options, then select **Cancel**.
53+
1. Select the **thumbs-down** icon.
54+
1. Select **Needs improvement** to view the options then select **Inappropriate**.
55+
1. Select **Cancel** to exit the feedback window.
56+
1. Now select View activity from the top right corner of the window to view the Activity map.
57+
1. Using your mouse (hand icon displays) you can move the map around the page. You can zoom in/out by selecting the slider or **+** or the **-** on the bottom right corner of the window.
58+
1. Exit out of the activity map and return to the Threat Intelligence Briefing Agent, by selecting the trigger ID (the alpha-numeric string) in the breadcrumb at the top of the page.
59+
1. You should now be back on the Threat Intelligence Briefing Agent page. Keep the browser tab open, you'll need it for the next task.
60+
61+
1. Keep this browser tab open for the next task.
62+
63+
### Task: Run the agent on a manual trigger with different parameters
64+
65+
There will be times where you may want to manually run the agent, with different parameters but not change the setting configured during setup that are used for automatically triggered runs.
66+
67+
In this task, you'll run the threat intelligence briefing agent on a manual trigger configured with different parameters than those configured as part of the agent setup.
68+
69+
1. You should still be on the activity page that shows a line item for the report you ran after you completed the agent setup. Select **Run** on the top right corner of the page, then from the dropdown menu, select **One time**. In this case, you'll run the agent manually, but with different parameters. Any update to the parameters impacts only this manual run.
70+
1. A window opens to review inputs before running. Select the down-arrow to view the **Optional fields**. For this run, you'll change the parameters as follows:
71+
1. Insights: **2**
72+
1. Look back days: **7**
73+
1. Email: **[email protected]**
74+
1. Region: **Europe**
75+
1. Industry: **Finance**
76+
1. Select **Submit**. The changes you enter here impact only this specific, manual run of the agent. Any future runs are done with the parameters defined during the setup.
77+
1. At this point, this new run shows **In progress** with the method as **Manual**. After a few seconds, the run should show as completed. Select the line item that shows **Completed** and review the results.
78+
1. Keep the browser tab open, you'll need it for the next task.
79+
80+
### Task: Edit the Threat Intelligence Briefing Agent
81+
82+
When you ran the agent in previous task, you modified the parameters, but those parameters affect only that specific run. All subsequent runs are done using the parameters entered during the setup of the agent. In this task, you modify the parameters entered at setup that controls all automatically triggered runs and any manual runs where you don't explicitly change the parameters for that run.
83+
84+
1. You should still be on the activity page for the Threat Intelligence Briefing Agent, which shows two lines items for the runs executed in the previous tasks. Select the ellipses on the top-right corner of the page and select **Edit**
85+
1. On the Edit agent page, you have the option to another identity, but for this task you won't change the identity. Select **Next**.
86+
1. Here you select the parameters to use when the agent runs on the automatic trigger or for manual runs where you don't explicitly change the parameters for that run.
87+
1. Set the parameters as listed below and select Finish (or Select Cancel).
88+
1. Insights: 3
89+
1. Look back days: 30
90+
1. Email: user’s email
91+
1. Region: US
92+
1. Industry: Finance.
93+
1. You should be back at the Threat Intelligence Briefing Agent page.
94+
95+
Review: In this exercise you went through the setup of the Threat Intelligence agent, including verifying the plugin settings. You ran the agent using the automatic trigger with the parameters configured at startup and then again on a manual trigger, changing the parameters for that specific run. Lastly, walked through the process of editing the agent.

learn-pr/wwl-sci/security-copilot-describe-agents/index.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,7 @@ units:
4242
- learn.security-copilot-describe-agents.introduction
4343
- learn.security-copilot-describe-agents.describe-agents
4444
- learn.security-copilot-describe-agents.describe-threat-intelligence-briefing-agent
45+
- learn.security-copilot-describe-agents.explore-threat-intelligence-briefing-agent
4546
- learn.security-copilot-describe-agents.describe-conditional-access-optimization-agent
4647
- learn.security-copilot-describe-agents.describe-phishing-triage-agent
4748
- learn.security-copilot-describe-agents.module-assessment
4.88 KB
Loading

0 commit comments

Comments
 (0)