Skip to content

Commit a437f3e

Browse files
authored
Merge pull request #49952 from riswinto/main
update audit ai unit
2 parents fd8da3a + f238323 commit a437f3e

File tree

6 files changed

+85
-62
lines changed

6 files changed

+85
-62
lines changed

learn-pr/paths/purview-protect-ai/index.yml

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
### YamlMime:LearningPath
22
uid: learn.wwl.purview-protect-ai
33
metadata:
4-
title: 'Protect data in AI environments (SC-401)'
4+
title: 'Protect data in AI environments with Microsoft Purview (SC-401)'
55
description: 'AI tools like Microsoft Copilot are changing the way people work, but they also increase the risk of oversharing and accidental data exposure. Microsoft Purview helps organizations apply the right controls to keep sensitive data protected across AI-enabled environments. This learning path aligns with exam SC-401: Microsoft Information Security Administrator.'
6-
ms.date: 03/25/2025
6+
ms.date: 04/10/2025
77
author: wwlpublish
88
ms.author: riswinto
99
ms.topic: learning-path
10-
title: 'Protect data in AI environments'
10+
title: 'Protect data in AI environments with Microsoft Purview'
1111
prerequisites: |
1212
- Foundational knowledge of Microsoft security and compliance technologies
1313
- Basic knowledge of information protection concepts
@@ -25,9 +25,11 @@ products:
2525
subjects:
2626
- security
2727
modules:
28-
- learn-m365.wwl.purview-ai-data-security
29-
- learn-m365.wwl.purview-ai-data-compliance
30-
- learn.wwl.purview-identify-mitigate-ai-risks
28+
- learn.wwl.purview-ai-discover-data
29+
- learn.wwl.purview-ai-protect-sensitive-data
30+
- learn.wwl.purview-ai-govern-usage
31+
- learn.wwl.purview-ai-assess-mitigate-risks
32+
3133

3234
trophy:
3335
uid: learn.wwl.purview-protect-ai.trophy
Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.purview-ai-discover-data.audit-copilot
3-
title: Audit Microsoft 365 Copilot interactions with Microsoft Purview
3+
title: Audit Microsoft 365 Copilot activities and AI interactions with Microsoft Purview
44
metadata:
5-
title: Audit Microsoft 365 Copilot interactions with Microsoft Purview
6-
description: "Audit Microsoft 365 Copilot interactions with Microsoft Purview"
5+
title: Audit Microsoft 365 Copilot activities and AI interactions with Microsoft Purview
6+
description: "Audit Microsoft 365 Copilot activities and AI interactions with Microsoft Purview"
77
ms.date: 04/10/2025
88
author: wwlpublish
99
ms.author: riswinto
1010
ms.topic: unit
1111
azureSandbox: false
1212
labModal: false
13-
durationInMinutes: 6
13+
durationInMinutes: 9
1414
content: |
1515
[!include[](includes/audit-copilot.md)]
Lines changed: 73 additions & 52 deletions
Original file line numberDiff line numberDiff line change
@@ -1,77 +1,98 @@
1-
Microsoft 365 Copilot integrates with apps like Word, Excel, Outlook, and Teams to help users generate content, summarize information, and automate everyday tasks. These capabilities rely on large language models, including GPT-4, and use data from emails, chats, documents, and calendars to provide context-based assistance.
1+
Microsoft 365 Copilot integrates with apps like Word, Excel, Outlook, and Teams to help users generate content, summarize information, and automate tasks. These tools use large language models, including GPT-4, and access data from emails, chats, documents, and calendars to generate helpful, context-aware responses.
22

3-
Because of how Copilot works, with access to sensitive content across Microsoft 365, it's important to have visibility into how it's being used. Microsoft Purview Audit helps organizations track Copilot usage to support security, compliance, and organizational policy enforcement.
3+
Because Copilot can access sensitive data, organizations need a way to understand how it's used. Microsoft Purview Audit supports this by capturing logs of user interactions and administrator activity related to Copilot and AI applications. These audit logs help support internal policies, security controls, and compliance requirements.
44

5-
## How Microsoft Purview Audit helps review Copilot usage
5+
## How Microsoft Purview Audit captures Copilot and AI activity
66

7-
As users interact with Microsoft 365 Copilot across apps like Word, Excel, and Teams, it's important to verify that those interactions meet organizational and regulatory expectations. Microsoft Purview Audit supports this by recording user and admin activity across Microsoft 365, including Copilot usage.
7+
Audit logging for Copilot and AI applications is included with Microsoft Purview Audit (Standard). If auditing is enabled in your Microsoft 365 tenant, no extra configuration is required to begin capturing these activities.
88

9-
These actions are stored in a unified audit log, which you can search in the Microsoft Purview portal or by using PowerShell. Audit logs help answer key questions such as:
9+
Audit logs include both user interactions with Copilot and administrator actions that affect how Copilot is deployed or configured. These logs are available through the Microsoft Purview portal or PowerShell and can be searched using filters based on activity type, app, or user.
1010

11-
- Who used Copilot and when?
12-
- In which application was it used?
13-
- Did the interaction involve labeled or sensitive content?
11+
Examples of the types of questions audit logs can help answer:
1412

15-
These insights give security and compliance teams the visibility they need to ensure Copilot usage aligns with policy.
13+
- Which users interacted with Copilot?
14+
- When and where did these interactions occur?
15+
- Which apps or services were involved?
16+
- Was labeled or sensitive content referenced?
17+
- Did Copilot use external sources like the public web
1618

17-
## Search the audit log for Copilot interactions
19+
## Key fields in Copilot and AI audit records
1820

19-
Microsoft Purview Audit supports compliance management by capturing Copilot interactions across applications like Word, Excel, PowerPoint, Teams, Loop, Whiteboard, OneNote, and Microsoft 365 Chat. The audit records identify Copilot interactions by the app in which they occur, providing detailed insights into Copilot usage across different contexts.
21+
Audit records contain structured fields to help you interpret each interaction or activity. Some of the most important fields include:
2022

21-
### Prerequisites for using Microsoft Purview Audit to search Microsoft 365 Copilot interactions
23+
- **Operation**: Describes the type of action, such as CopilotInteraction or AINotesUpdate.
24+
- **RecordType**: Identifies the category of application:
25+
- `CopilotInteraction`: User interacted with a Microsoft Copilot app
26+
- `ConnectedAIAppInteraction`: User interacted with a deployed non-Microsoft or custom Copilot app
27+
- `AIAppInteraction`: User interacted with a non-Microsoft AI app not deployed in the tenant
28+
- **Workload**: Describes the app category (such as `Copilot`, `ConnectedAIApp`, or `AIApp`)
29+
- **AppIdentity**: Identifies the specific app in the format `workloadName.appGroup.appName`
30+
- **AppHost**: Indicates which host application was used during the interaction, such as:
31+
- `Word`, `Excel`, `PowerPoint`, `Outlook`
32+
- `BizChat` (for Microsoft 365 Chat)
33+
- `Teams`, `Loop`, `Whiteboard`, `OneNote`
34+
- `Defender` (for Security Copilot)
2235

23-
Before you search and analyze Copilot interactions using Microsoft Purview Audit, there are a few steps to ensure your environment is ready. Follow these prerequisites to set up your Microsoft 365 and Purview Audit configurations:
36+
To determine if the public web was used in a Copilot interaction, check if `AISystemPlugin.Id` equals `BingWebSearch`.
2437

25-
| **Step** | **Description** | **Learn more** |
26-
|------|-------------|------------|
27-
| Verify prerequisites for Copilot | Ensure your IT infrastructure is ready for Copilot and Audit, including necessary network configurations and software updates. | - [Microsoft 365 Copilot requirements](/microsoft-365-copilot/microsoft-365-copilot-requirements?azure-portal=true) |
28-
| Understand searching with Audit | Understand the search functionalities in Microsoft Purview Audit to effectively analyze activities within Microsoft 365. | - [Audit New Search](/purview/audit-new-search?azure-portal=true) |
29-
| Check licensing requirements | Confirm that you have the appropriate Microsoft 365 E3/E5 licenses for Copilot and Microsoft Purview Audit. | - [Microsoft 365 Copilot service description](/office365/servicedescriptions/office-365-platform-service-description/microsoft-365-copilot?azure-portal=true#available-plan) <br> - [Microsoft Purview Audit service description](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-purview-audit?azure-portal=true) |
38+
> [!NOTE]
39+
> `AppIdentity` and `AppHost` aren't shown in the Microsoft Purview portal interface. To view these fields, export the audit logs or use **PowerShell** or the **Office 365 Management Activity API**.
3040
31-
Note: Microsoft Purview Audit logging is turned on by default, but when setting up a new Microsoft 365 organization, you should verify the auditing status for your organization. If auditing isn't turned on for your organization, you can turn it on in the Microsoft Purview portal or by using Exchange Online PowerShell. For more information on verifying that auditing is enabled and enabling the audit sign in Microsoft Purview, see [Turn auditing on or off](/purview/audit-log-enable-disable?azure-portal=true).
41+
## Administrator activity logging
3242

33-
### Search the audit log for Copilot interactions in Microsoft Purview
43+
Microsoft Purview Audit also captures administrator actions related to Copilot settings, plugins, promptbooks, and workspaces. These logs provide a record of configuration changes and help trace how Copilot capabilities are managed within the organization.
3444

35-
Microsoft Purview Audit captures user activity across Microsoft 365, including when users interact with Microsoft 365 Copilot. These interactions are recorded based on the application where they occurred, such as Word, Excel, or Teams, and can include details about referenced files, including whether sensitivity labels were applied.
45+
You can search for these actions in the audit log using operation names listed in the [Copilot activities reference](/purview/audit-log-activities#copilot-activities?azure-portal=true).
3646

37-
You can search for these events in the Microsoft Purview portal using filters that help narrow your results to Copilot-specific activity.
47+
## Search the audit log for Copilot activity
3848

39-
1. Sign into the [Microsoft Purview portal](https://purview.microsoft.com?azure-portal=true).
40-
1. In the left navigation pane, select **Solutions** > **Audit**.
41-
1. Select **New Search** tab at the top of the **Audit** page.
42-
1. Configure your search on the **New Search** tab:
43-
1. Set the **Start date** and **End date** for your search, with the last seven days selected by default.
44-
1. Enter relevant keywords or phrases in the **Keyword Search**, using asterisks (*) to replace special characters.
45-
1. Select administrative units from the **Admin Units** dropdown if needed.
46-
1. Under **Activities - friendly names** select specific activities relevant to Copilot by navigating to **Copilot activities** and selecting **Interacted with Copilot**. You can also use the search bar to find activities related to Copilot by entering _Copilot_.
47-
:::image type="content" source="../media/audit-copilot-new-search-activities.png" alt-text="Screenshot showing Interacted with Copilot selected under Activities - friendly names." lightbox="../media/audit-copilot-new-search-activities.png":::
48-
1. For precise searches, use **Activities - operations names** and enter _CopilotInteraction_ as the operation name for Copilot activities.
49-
1. In the **Record types** dropdown, select record types linked to Copilot activities. Enter _Copilot_ in the search box above the list for easier selection.
50-
:::image type="content" source="../media/audit-copilot-new-search-record-type.png" alt-text="Screenshot showing CopilotInteraction selected under Record types." lightbox="../media/audit-copilot-new-search-record-type.png":::
51-
1. Name your search in the **Search name** field for easy identification.
52-
1. Enter specific users in the **Users** field or leave it blank to return entries for all users (and service accounts) in your organization.
53-
1. Enter **File, folder, or site** names for targeted searches, or leave this box blank to return entries for all files and folders in your organization.
54-
1. Select **Search** to start your search job. A maximum of 10 search jobs can be run in parallel for one user account. If a user requires more than 10 search jobs, they must wait for an _In progress_ job to finish or delete a search job.
49+
The Microsoft Purview portal allows you to search audit logs by activity type, app, user, and other filters. These searches help identify when and how Copilot and AI apps were used.
5550

56-
## Limitations and considerations for auditing Copilot interactions
51+
To search for Copilot-related activity:
5752

58-
Microsoft Purview Audit provides useful insight into how users interact with Microsoft 365 Copilot, but there are a few limitations to be aware of. Understanding these limitations helps set accurate expectations for what can and can't be captured in the audit logs.
53+
1. Go to the [Microsoft Purview portal](https://purview.microsoft.com/?azure-portal=true).
54+
1. Select **Solutions** > **Audit**.
55+
1. On the **Search** page, set a **Start date** and **End date**.
56+
1. Under **Activities - friendly names**, enter a keyword like _Copilot_ or _AI_ to view related user and admin activities. Select the activities relevant to your investigation or review. These might include interactions with Copilot, updates to plugins or promptbooks, or actions related to AI-powered meeting notes.
57+
:::image type="content" source="../media/audit-copilot-search-activities.png" alt-text="Screenshot showing Interacted with Copilot selected under Activities - friendly names." lightbox="../media/audit-copilot-search-activities.png":::
58+
1. For more targeted searches, use **Activities - operation names** and enter operation values such as `CopilotInteraction`, `AINotesUpdate`, or other known operation names.
59+
1. In the **Record types** dropdown, select types such as `CopilotInteraction`, `ConnectedAIAppInteraction`, or `AIAppInteraction` to scope the results to AI activity.
60+
1. (Optional) Use fields like **Users**, **AppIdentity**, or **File, folder, or site** to narrow your results based on specific criteria.
61+
1. Enter a name for your search and select **Search** to run it.
5962

60-
### What's captured in the audit log
63+
> [!TIP]
64+
> You can run up to 10 searches in progress at one time. If all slots are used, wait for one to complete or remove an existing search.
6165
62-
- Copilot activity is recorded based on the app in which it occurred (such as Word, Teams, or Excel).
63-
- Events typically include user IDs, time stamps, and references to accessed files.
64-
- If a referenced file has a sensitivity label, that label is included in the log entry.
66+
### Example scenarios and audit entries
6567

66-
### What's not captured in audit logs
68+
The following examples show how different types of Copilot interactions appear in audit records:
6769

68-
- **Prompts and responses**: Audit logs record that Copilot was used, but not the actual content of the prompt or the AI-generated response. For more detailed content-level review, use Microsoft Purview eDiscovery.
69-
- **Copilot configuration changes**: Administrative updates to Copilot settings (such as enabling or disabling features) aren't currently logged in Audit.
70-
- **Device details**: Device identifiers aren't included in Copilot-related audit entries.
70+
| Scenario | Operation | RecordType | AppIdentity | AppHost |
71+
|-----|-----|-----|-----|-----|
72+
| Microsoft 365 Copilot in Chat | CopilotInteraction | CopilotInteraction | `Copilot.MicrosoftCopilot.BizChat` | BizChat |
73+
| Security Copilot in Microsoft Defender | CopilotInteraction | CopilotInteraction | `Copilot.Security.SecurityCopilot` | Defender |
74+
| Custom Copilot Studio app in Teams | CopilotInteraction | CopilotInteraction | `Copilot.Studio.<GUID>` | Teams |
75+
| AI Notes or Live Notes updated in Teams | AINotesUpdate / LiveNotesUpdate | TeamCopilotInteraction | `Copilot.TeamCopilot.*` | Teams |
7176

72-
### Application-specific considerations
77+
## Scope and limitations
7378

74-
- **Copilot in Teams**: If meeting transcripts are turned off, Copilot activities in Teams aren't captured in the audit log.
75-
- **App identifiers**: The source app for each interaction is listed in the log, such as Copilot in Word or Copilot in Teams.
79+
### Included in audit logs
7680

77-
Knowing these limitations can help you plan which tools to use for broader investigations or compliance reviews. Audit is a useful first step for visibility into Copilot activity, but might need to be paired with other solutions for full context.
81+
- Interactions across Microsoft 365 apps such as Word, Excel, PowerPoint, Outlook, Teams, and more
82+
- Application and user context for each interaction
83+
- References to sensitivity labels when protected content is involved
84+
- Indications when public web data was accessed (via AISystemPlugin.Id)
85+
86+
### Not included in audit logs
87+
88+
- Prompt text submitted by the user
89+
- AI-generated responses from Copilot
90+
- Device-specific details
91+
- Some admin configuration changes (not all are logged)
92+
93+
### App-specific considerations
94+
95+
- Copilot in Teams: If transcription is disabled, interactions in meetings might not be recorded
96+
- Logs include the host app name to clarify where the interaction occurred
97+
98+
Microsoft Purview Audit captures and stores detailed records of activity related to Microsoft 365 Copilot and other AI applications. This logging supports your ability to search for and review how these tools are used across Microsoft 365 apps and services. While the audit log provides useful insights into app usage and file access, it doesn't include prompt or response content. For deeper investigations, use audit logs alongside other tools such as eDiscovery.
58.8 KB
Loading

0 commit comments

Comments
 (0)