Skip to content

Commit 37bc27d

Browse files
authored
Merge pull request #50418 from MicrosoftDocs/NEW-CEPEREZB-security-copilot-describe-agents
New ceperezb security copilot describe agents
2 parents def7d91 + 708cfd8 commit 37bc27d

39 files changed

+504
-0
lines changed
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.security-copilot-describe-agents.introduction
3+
title: Introduction
4+
metadata:
5+
title: Introduction
6+
description: Describe Microsoft Security Copilot agents.
7+
author: wwlpublish
8+
ms.author: ceperezb
9+
ms.date: 05/08/2025
10+
ms.topic: unit
11+
ms.collection:
12+
- wwl-ai-copilot
13+
durationInMinutes: 1
14+
content: |
15+
[!include[](includes/1-introduction.md)]
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.security-copilot-describe-agents.describe-agents
3+
title: Describe Microsoft Security Copilot agents
4+
metadata:
5+
title: Describe Microsoft Security Copilot agents
6+
description: Describe Microsoft Security Copilot agents.
7+
author: wwlpublish
8+
ms.author: ceperezb
9+
ms.date: 05/08/2025
10+
ms.topic: unit
11+
ms.collection:
12+
- wwl-ai-copilot
13+
durationInMinutes: 1
14+
content: |
15+
[!include[](includes/2-describe-agents.md)]
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.security-copilot-describe-agents.describe-threat-intelligence-briefing-agent
3+
title: Describe the Threat Intelligence Briefing Agent
4+
metadata:
5+
title: Describe the Threat Intelligence Briefing Agent
6+
description: Describe the Threat Intelligence Briefing Agent.
7+
author: wwlpublish
8+
ms.author: ceperezb
9+
ms.date: 05/08/2025
10+
ms.topic: unit
11+
ms.collection:
12+
- wwl-ai-copilot
13+
durationInMinutes: 4
14+
content: |
15+
[!include[](includes/3-describe-threat-intelligence-briefing-agent.md)]
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.security-copilot-describe-agents.describe-conditional-access-optimization-agent
3+
title: Describe the Conditional Access Optimization Agent
4+
metadata:
5+
title: Describe the Conditional Access Optimization Agent
6+
description: Describe the Conditional Access Optimization Agent.
7+
author: wwlpublish
8+
ms.author: ceperezb
9+
ms.date: 05/08/2025
10+
ms.topic: unit
11+
ms.collection:
12+
- wwl-ai-copilot
13+
durationInMinutes: 6
14+
content: |
15+
[!include[](includes/4-describe-conditional-access-optimization-agent.md)]
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.security-copilot-describe-agents.describe-phishing-triage-agent
3+
title: Describe the Phishing Triage Agent
4+
metadata:
5+
title: Describe the Phishing Triage Agent
6+
description: Describe the Phishing Triage Agent.
7+
author: wwlpublish
8+
ms.author: ceperezb
9+
ms.date: 05/08/2025
10+
ms.topic: unit
11+
ms.collection:
12+
- wwl-ai-copilot
13+
durationInMinutes: 4
14+
content: |
15+
[!include[](includes/5-describe-phishing-triage-agent.md)]
16+
17+
18+
Lines changed: 82 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,82 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.security-copilot-describe-agents.module-assessment
3+
title: Module assessment
4+
metadata:
5+
title: Module assessment
6+
description: Describe Microsoft Security Copilot agents.
7+
author: wwlpublish
8+
ms.author: ceperezb
9+
ms.date: 05/08/2025
10+
ms.topic: unit
11+
ms.collection:
12+
- wwl-ai-copilot
13+
ai_generated_module_assessment: false
14+
durationInMinutes: 2
15+
16+
content: |
17+
[!include[](includes/6-module-assessment.md)]
18+
19+
quiz:
20+
title: Check your knowledge
21+
questions:
22+
23+
- content: What is the primary purpose of agents in Microsoft Security Copilot?
24+
choices:
25+
- content: To replace Microsoft Defender and Microsoft Entra.
26+
isCorrect: false
27+
explanation: "Incorrect. Agents integrate with Microsoft Defender and Microsoft Entra to enhance their functionality, not replace them."
28+
- content: To automate and optimize security operations.
29+
isCorrect: true
30+
explanation: "Correct. Agents are specialized tools designed to streamline security workflows by automating tasks and providing insights."
31+
- content: To manage organizational permissions for all users.
32+
isCorrect: false
33+
explanation: "Incorrect. While permissions are important for agent functionality, managing organizational permissions is not their primary purpose."
34+
35+
- content: Which of the following describes how plugins extend the capabilities of agents in Microsoft Security Copilot?
36+
choices:
37+
- content: Plugins replace agents to perform specialized tasks.
38+
isCorrect: false
39+
explanation: "Incorrect. Plugins do not replace agents; they complement them by extending their capabilities."
40+
- content: Plugins are used exclusively for managing permissions within the environment.
41+
isCorrect: false
42+
explanation: "Incorrect. While permissions are important, plugins are primarily used to expand agent functionality rather than manage permissions."
43+
- content: Plugins allow agents to connect with external systems and analyze additional data sources.
44+
isCorrect: true
45+
explanation: "Correct. Plugins enhance agent functionality by enabling integration with external services and expanding their analytical capabilities."
46+
47+
- content: Which component of a Security Copilot agent determines when an action should be initiated?
48+
choices:
49+
- content: Plugins
50+
isCorrect: false
51+
explanation: "Incorrect. Plugins extend the agent's capabilities but do not determine when actions are initiated."
52+
- content: Triggers
53+
isCorrect: true
54+
explanation: "Correct. Triggers are events or conditions that initiate an agent's actions, such as a scheduled interval or manual activation."
55+
- content: Permissions
56+
isCorrect: false
57+
explanation: "Incorrect. Permissions define what the agent is authorized to access or perform, not when actions are initiated."
58+
59+
- content: A security engineer wants to classify and triage user-reported phishing emails. Which Microsoft Defender agent should they use?
60+
choices:
61+
- content: Microsoft Defender XDR
62+
isCorrect: false
63+
explanation: "Incorrect. Microsoft Defender XDR is a broader tool for extended detection and response, not specifically for phishing email triage."
64+
- content: Threat Intelligence Briefing Agent
65+
isCorrect: false
66+
explanation: "Incorrect. The Threat Intelligence Briefing Agent focuses on gathering and analyzing threat intelligence, not phishing email classification."
67+
- content: Phishing Triage Agent
68+
isCorrect: true
69+
explanation: "Correct. The Phishing Triage Agent is specifically designed to classify and triage user-reported phishing incidents, helping reduce false positives and prioritize threats."
70+
71+
- content: What is the primary function of the intelligence briefing agent in Microsoft Security Copilot?
72+
choices:
73+
- content: To monitor network traffic for suspicious activity.
74+
isCorrect: false
75+
explanation: "Incorrect. While monitoring network traffic is a security task, it is not the specific role of the intelligence briefing agent."
76+
- content: To automate threat intelligence gathering and reporting.
77+
isCorrect: true
78+
explanation: "Correct. The intelligence briefing agent automates the process of collecting, analyzing, and correlating threat data to streamline threat intelligence reporting."
79+
- content: To manage user permissions within Microsoft Defender.
80+
isCorrect: false
81+
explanation: "Incorrect. Managing user permissions is not the primary function of the intelligence briefing agent; its focus is on threat intelligence gathering and reporting."
82+
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.security-copilot-describe-agents.summary
3+
title: Summary and resources
4+
metadata:
5+
title: Summary and resources
6+
description: Summary and resources for the module titled, Describe Microsoft Security Copilot agents.
7+
author: wwlpublish
8+
ms.author: ceperezb
9+
ms.date: 05/08/2025
10+
ms.topic: unit
11+
ms.collection:
12+
- wwl-ai-copilot
13+
durationInMinutes: 1
14+
content: |
15+
[!include[](includes/7-summary.md)]
16+
17+
18+
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
Microsoft Security Copilot is a cutting-edge AI-driven platform designed to enhance security workflows by automating tasks and providing actionable insights, making it an essential tool for security engineers.
2+
3+
Imagine you're a security engineer at a mid-sized financial institution. Your team is overwhelmed with the sheer volume of security alerts, phishing attempts, and identity access requests that need to be analyzed daily. Recently, a phishing attack slipped through the cracks, leading to a data breach that could have been prevented with better tools and processes. You’re tasked with finding a solution that not only streamlines your team’s workload but also improves the accuracy and speed of threat detection and response. This is where Microsoft Security Copilot comes in. By using specialized agents like the Phishing Triage Agent and Conditional Access Optimization Agent, you can automate repetitive tasks, generate detailed threat intelligence reports, and optimize access policies—all while integrating seamlessly with tools like Microsoft Defender and Microsoft Entra. These capabilities allow your team to focus on high-priority issues, reduce false positives, and strengthen your organization’s overall security posture.
4+
5+
In this module, you get an introduction to some of the Microsoft Security Copilot agents, including the Threat Intelligence briefing agent, the Conditional Access Optimization agent, and the Phishing Triage agent.
6+
7+
> [!NOTE]
8+
>This module is intended to give you a flavor of just a few of the Microsoft agents available in Security Coplot, through both the standalone and embedded experience. Agents that are available through the embedded Copilot experience, are described in training that relates to the specific security solution in which it's embedded. For example, agents that are embedded in Microsoft Purview solutions are described in the training that relates to that Microsoft Purview solution.
9+
10+
After completing this module, you’ll be able to:
11+
12+
- Describe the role and functionality of Microsoft Security Copilot agents in automating security workflows.
13+
- Describe the Threat Intelligence Briefing Agent.
14+
- Describe the Conditional Access Optimization Agent.
15+
- Describe the Phishing Triage agent.
Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
Microsoft Security Copilot provides a range of agents designed to enhance security workflows and streamline operations. These agents assist security engineers by automating tasks, providing insights, and integrating with other Microsoft security tools.
2+
3+
### Define agents in Microsoft Security Copilot
4+
5+
Agents in Microsoft Security Copilot help automate repetitive tasks, reduce manual workloads, and optimize security operations. Agents consist of predefined workflows and capabilities tailored to address particular security challenges. They're designed to perform specific tasks, such as analyzing threats, triaging phishing incidents, or optimizing conditional access policies.
6+
7+
Agents utilize security compute units (SCUs) to operate just like other features in Security Copilot. They integrate seamlessly with Microsoft Security solutions and the broader supported partner ecosystem and fit naturally into existing workflows. Agents learn based on feedback and keep you in control on the actions it takes.
8+
9+
### Agent terminology in Microsoft Security Copilot
10+
11+
To effectively use Security Copilot agents, it's essential to understand the terminology used when working with agents.
12+
13+
| Term | Description |
14+
|--------------|-------------|
15+
| **Trigger** | An event or condition that tells an agentic system to initiate an action or series of actions. |
16+
| **Permissions** | The level of authorization an AI agent is given by an admin during configuration that enables it to access specific information or carry out its tasks. |
17+
| **Identity** | The credentials that the agent uses when it runs. |
18+
| **Plugins** | A component that extends what an agent can do by giving it access to capabilities in Microsoft and non-Microsoft services and public websites through APIs. While some plugins may be required to run an agent, some agents may employ optional plugins that can enhance its functionality by providing access to more data sources or tools.|
19+
| **Role-based access control (RBAC)** | Determines who can view and manage the outputs generated by agents in Microsoft Security Copilot, and ensures that sensitive information is accessible only to authorized users. |
20+
21+
### Agents in Microsoft Security Copilot
22+
23+
You can discover Microsoft Security Copilot agents through the standalone and embedded experiences. Copilot agents are also available from partners.
24+
25+
To access the full list of available agents, select Agents from the home menu. Copilot displays the list of available Microsoft and partner agents.
26+
27+
:::image type="content" source="../media/agents-copilot-v2.png" lightbox="../media/agents-copilot-v2.png" alt-text="Screen capture of the Agents page in Microsoft Security Copilot. The page displays tiles for all available agents from Microsoft and partners.":::
28+
29+
### Microsoft Agents
30+
31+
Security Copilot includes agents that are seamlessly integrated with Microsoft security solutions. Microsoft agents include:
32+
33+
- **Threat Intelligence Briefing Agent**: Curates relevant threat intelligence based on an organization's attributes and exposure.
34+
- **Conditional Access Optimization Agent**: Embedded in Microsoft Entra, the Conditional Access optimization agent ensures all users are protected by policy. It recommends policies and changes based on best practices aligned with Zero Trust and Microsoft's learnings. In preview, the agent evaluates policies requiring multifactor authentication (MFA), enforces device based controls (device compliance, app protection policies, and Domain Joined Devices), and blocks legacy authentication and device code flow.
35+
- **Phishing Triage Agent**: Embedded in Microsoft Defender, the Phishing Triage Agent helps security operations analysts to triage and classify user-submitted phishing incidents. The agent operates autonomously, provides a transparent rationale for its classification verdicts in natural language, and continuously learns and improves its accuracy based on feedback provided by analysts.
36+
37+
This list is not all-inclusive.
38+
39+
### Partner agents
40+
41+
Security Copilot offers integration with Partner agents. Integrating partner agents provides you with the flexibility to use tools you're already familiar with. These agents offer unique capabilities, from privacy breach response to network supervision and alert triage, ensuring you can address diverse security challenges effectively.
42+
43+
Partner agents available in Security Copilot include:
44+
45+
- Network Supervisor Agent by Aviatrix
46+
Performs root cause analysis and summarizes issues related to VPN, gateway, or Site2Cloud connection outages and failures.
47+
- SecOps Tooling Agent by BlueVoyant
48+
Assesses a security operations center (SOC) and state of controls to make recommendations that help optimize security operations and improve controls, efficacy, and compliance.
49+
- Task Optimizer Agent by Fletch
50+
Helps organizations forecast and prioritize the most critical threat alerts to reduce alert fatigue and improve security.
51+
- Privacy Breach Response Agent by OneTrust
52+
Analyzes data breaches to generate guidance for the privacy team on how to meet regulatory requirements.
53+
54+
This list is not all-inclusive.

0 commit comments

Comments
 (0)