You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/security-copilot-embedded-experiences/includes/1-introduction.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,6 +8,9 @@ The embedded experience is also a great place to start a security investigation.
8
8
9
9
In this module, you learn about the scenarios supported by the embedded experiences of Microsoft Security Copilot.
10
10
11
+
> [!NOTE]
12
+
>This module is intended to give you a flavor of just a few of the Security Copilot embedded experiences. The list of Microsoft Security solutions in which Copilot is embedded is continually growing. For information about Copilot embedded in a given security solutions, refer to training for that specific solution.
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/security-copilot-embedded-experiences/includes/2-copilot-for-defender.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
2
-
Microsoft Security Copilot is embedded in Microsoft Defender XDR to enable security teams to quickly and efficiently investigate and respond to incidents. Microsoft Copilot for Microsoft Defender XDR supports the following features.
2
+
Microsoft Security Copilot is embedded in Microsoft Defender XDR to enable security teams to quickly and efficiently investigate and respond to incidents. Security Copilot capabilities embedded in Microsoft Defender XDR include:
3
3
4
4
- Summarize incidents
5
5
- Guided responses
@@ -9,6 +9,9 @@ Microsoft Security Copilot is embedded in Microsoft Defender XDR to enable secur
9
9
- Analyze files
10
10
- Device summary
11
11
12
+
> [!NOTE]
13
+
>The list of Copilot capabilities embedded in Microsoft Defender XDR is continually growing. This unit provides just a sampling of some of those Copilot capabilities. For more information, see documentation on Microsoft Defender XDR.
14
+
12
15
There are also some options that are common across all these features, including the ability to provide feedback on prompt responses and seamlessly moving to the standalone experience.
13
16
14
17
As described in the introduction unit, in the embedded experience Copilot is able to invoke the product specific capabilities directly, providing processing efficiency. That said, to ensure access to these Microsoft Security Copilot features, the Microsoft Defender XDR plugin needs to be enabled and this is done through the standalone experience. To learn more, refer to [Describe the features available in the standalone experience of Microsoft Security Copilot](/training/modules/security-copilot-describe-core-features/2-describe-standalone-experience).
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/security-copilot-embedded-experiences/includes/3-copilot-for-purview.md
+5-13Lines changed: 5 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,9 @@
1
1
Microsoft Security Copilot is now accessible from within Microsoft Purview data security solutions, as part of the embedded experience. With Copilot in Microsoft Purview, data security and compliance admins can use the power of AI to assess risk exposure more quickly than is otherwise possible, directly from within Microsoft Purview solutions.
2
2
3
-
The scenarios supported as part of the embedded experience are:
3
+
> [!NOTE]
4
+
>The list of Copilot capabilities embedded in Microsoft Purview is continually growing. This unit provides just a sampling of those capabilities. For more information, see documentation on Microsoft Purview.
5
+
6
+
Some of the scenarios supported as part of the embedded experience include:
4
7
5
8
- Gain comprehensive summary of Data Loss Prevention alerts.
6
9
- Gain comprehensive summary of Insider Risk Management alerts.
@@ -11,7 +14,7 @@ For all use cases supported through the embedded experience, as is the case with
11
14
12
15
:::image type="content" source="../media/purview-plugin-requirement-new.png" lightbox="../media/purview-plugin-requirement-new.png" alt-text="Screen capture of the setting to allow Security Copilot to access data from your Microsoft 365 services, which is required to enable the Microsoft Purview plugin.":::
13
16
14
-
Additionally, users must have the appropriate role permissions for both Copilot and the Purview solutions. For Copilot, users need, at a minimum, the Copilot workspace contributor role or the Entra Security operator role. For Microsoft Purview, as is true for a Microsoft solution enabled via a plugin, Copilot assumes the permissions of the user when it tries to access the data to answer the queries, so you need to have the required permissions to access the data.
17
+
Additionally, users must have the appropriate role permissions for both Copilot and the Purview solutions. For Copilot, users need, at a minimum, the Copilot workspace contributor role or the Microsoft Entra Security operator role. For Microsoft Purview, as is true for a Microsoft solution enabled via a plugin, Copilot assumes the permissions of the user when it tries to access the data to answer the queries, so you need to have the required permissions to access the data.
15
18
16
19
### Gain comprehensive summary of alerts
17
20
@@ -97,14 +100,3 @@ For any AI generated content, you can provide feedback and accuracy of the conte
97
100
98
101
:::image type="content" source="../media/ai-accuracy-feedback-data-loss-prevention-summary.png" lightbox="../media/ai-accuracy-feedback-data-loss-prevention-summary.png" alt-text="Screen capture of the feedback options. The options are: confirmed, it looks great, off target, inaccurate, or potentially harmful, inappropriate.":::
99
102
100
-
### Limitations of Copilot in Microsoft Purview
101
-
102
-
The Microsoft Purview use cases supported by Copilot have the following limitations:
103
-
104
-
- The Copilot capabilities supported by Microsoft Purview eDiscovery are supported only with Microsoft Purview eDiscovery (Premium).
105
-
106
-
- Copilot activities aren't discoverable in Purview eDiscovery. You can’t search and preserve Copilot activities.
107
-
108
-
- No audit activities are available for Copilot activities.
109
-
110
-
- Content summarization length is currently limited 20,000 tokens, which is approximately 15,000 words.
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/security-copilot-embedded-experiences/includes/4-copilot-for-entra.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,10 @@
1
1
2
2
Identity risk investigation is a crucial step to defend an organization. Microsoft Entra ID Protection applies the capabilities of Microsoft Security Copilot to summarize a user's risk level, provide insights relevant to the incident at hand, and provide recommendations for rapid mitigation.
3
3
4
-
Before you get started with Copilot in Microsoft Entra, your organization must be onboarded to Security Copilot, the Entra plugin must be enabled in Copilot, and users must have the appropriate role permissions. Copilot assumes the permissions of the user when it tries to access the data to answer the queries, so you need to have the required permissions to access the Entra data.
4
+
> [!NOTE]
5
+
>The list of Copilot capabilities embedded in Microsoft Entra is continually growing. This unit provides just a sampling of those capabilities. For more information, see documentation on Microsoft Entra.
6
+
7
+
Before you get started with Copilot in Microsoft Entra, your organization must be onboarded to Security Copilot, the Microsoft Entra plugin must be enabled in Copilot, and users must have the appropriate role permissions. Copilot assumes the permissions of the user when it tries to access the data to answer the queries, so you need to have the required permissions to access the Microsoft Entra data.
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/security-copilot-embedded-experiences/includes/5-copilot-for-intune.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,6 +2,9 @@ Microsoft Intune has capabilities that are powered by Microsoft Security Copilot
2
2
3
3
Access to your Intune data is supported through Microsoft Security Copilot, referred to as the standalone experience, or embedded within the Intune admin center, referred to as Copilot in Intune. This unit focuses on the embedded experience.
4
4
5
+
> [!NOTE]
6
+
>The list of Copilot capabilities embedded in Microsoft Intune is continually growing. This unit provides just a sampling of those capabilities. For more information, see documentation on Microsoft Intune.
7
+
5
8
### Before you begin
6
9
7
10
To enable Copilot to access your Intune data, for either the embedded or standalone experience, Microsoft Security Copilot must be configured, the Microsoft Intune plugin must be enabled, and you need to have appropriate role permissions. You need a role permission that grants access to Copilot and you also need a separate Intune service-specific role like the Intune Endpoint Security Manager role. There isn't a built-in Intune role that includes access to Copilot.
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/security-copilot-embedded-experiences/includes/5a-copilot-for-defender-cloud.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,6 +8,9 @@ Copilot in Defender for Cloud is available for all users when you:
8
8
9
9
Copilot in Defender for Cloud isn't reliant on any of the available plans in Defender. However, in order to enjoy the full range of Copilot's capabilities in Defender for Cloud, we recommend enabling the Defender for Cloud Security Posture Management (DCSPM) plan on your environments. The DCSPM plan includes many extra security features such as Attack path analysis, Risk prioritization and more, all of which can be navigated and managed using Security Copilot. Without the DCSPM plan, you're still able to use Copilot in Defender for Cloud, but in a limited capacity.
10
10
11
+
> [!NOTE]
12
+
>The list of Copilot capabilities embedded in Microsoft Defender for Cloud is continually growing. This unit provides just a sampling of those capabilities. For more information, see documentation on Microsoft Defender for Cloud.
13
+
11
14
### Analyze recommendations with Security Copilot
12
15
13
16
Microsoft Defender for Cloud's integration with Security Copilot allows you to analyze all of the recommendations presented on the recommendations page. By narrowing the scope of the recommendations page, you can focus on specific recommendations and get a better understanding of your security posture.
0 commit comments