Skip to content

Commit cde3d77

Browse files
committed
update units
1 parent 4532e41 commit cde3d77

8 files changed

+22
-19
lines changed
Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
### YamlMime:ModuleUnit
22
uid: learn.security-copilot-describe-agents.describe-threat-intelligence-briefing-agent
3-
title: Describe
3+
title: Describe the Threat Intelligence Briefing Agent
44
metadata:
55
title: Describe the Threat Intelligence Briefing Agent
66
description: Describe the Threat Intelligence Briefing Agent.
@@ -10,6 +10,6 @@ metadata:
1010
ms.topic: unit
1111
ms.collection:
1212
- wwl-ai-copilot
13-
durationInMinutes: 1
13+
durationInMinutes: 4
1414
content: |
1515
[!include[](includes/3-describe-threat-intelligence-briefing-agent.md)]
Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
### YamlMime:ModuleUnit
22
uid: learn.security-copilot-describe-agents.describe-conditional-access-optimization-agent
3-
title: Describe
3+
title: Describe the Conditional Access Optimization Agent
44
metadata:
5-
title: Describe the Threat Intelligence Briefing Agent
6-
description: Describe the Threat Intelligence Briefing Agent.
5+
title: Describe the Conditional Access Optimization Agent
6+
description: Describe the Conditional Access Optimization Agent.
77
author: wwlpublish
88
ms.author: ceperezb
99
ms.date: 05/08/2025
1010
ms.topic: unit
1111
ms.collection:
1212
- wwl-ai-copilot
13-
durationInMinutes: 1
13+
durationInMinutes: 6
1414
content: |
1515
[!include[](includes/4-describe-conditional-access-optimization-agent.md)]

learn-pr/wwl-sci/security-copilot-describe-agents/5-describe-phishing-triage-agent.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,16 @@
11
### YamlMime:ModuleUnit
22
uid: learn.security-copilot-describe-agents.describe-phishing-triage-agent
3-
title: Describe
3+
title: Describe the Phishing Triage agent
44
metadata:
5-
title: Describe the Threat Intelligence Briefing Agent
6-
description: Describe the Threat Intelligence Briefing Agent.
5+
title: Describe the Phishing Triage agent
6+
description: Describe the Phishing Triage agent.
77
author: wwlpublish
88
ms.author: ceperezb
99
ms.date: 05/08/2025
1010
ms.topic: unit
1111
ms.collection:
1212
- wwl-ai-copilot
13-
durationInMinutes: 1
13+
durationInMinutes: 4
1414
content: |
1515
[!include[](includes/5-describe-phishing-triage-agent.md)]
1616

learn-pr/wwl-sci/security-copilot-describe-agents/includes/1-introduction.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,11 @@
11
Microsoft Security Copilot is a cutting-edge AI-driven platform designed to enhance security workflows by automating tasks and providing actionable insights, making it an essential tool for security engineers.
22

3-
Imagine you're a security engineer at a mid-sized financial institution. Your team is overwhelmed with the sheer volume of security alerts, phishing attempts, and identity access requests that need to be analyzed daily. Recently, a phishing attack slipped through the cracks, leading to a data breach that could have been prevented with better tools and processes. You’re tasked with finding a solution that not only streamlines your team’s workload but also improves the accuracy and speed of threat detection and response. This is where Microsoft Security Copilot comes in. By leveraging specialized agents like the Phishing Triage Agent and Conditional Access Optimization Agent, you can automate repetitive tasks, generate detailed threat intelligence reports, and optimize access policies—all while integrating seamlessly with tools like Microsoft Defender and Entra. These capabilities allow your team to focus on high-priority issues, reduce false positives, and strengthen your organization’s overall security posture.
3+
Imagine you're a security engineer at a mid-sized financial institution. Your team is overwhelmed with the sheer volume of security alerts, phishing attempts, and identity access requests that need to be analyzed daily. Recently, a phishing attack slipped through the cracks, leading to a data breach that could have been prevented with better tools and processes. You’re tasked with finding a solution that not only streamlines your team’s workload but also improves the accuracy and speed of threat detection and response. This is where Microsoft Security Copilot comes in. By using specialized agents like the Phishing Triage Agent and Conditional Access Optimization Agent, you can automate repetitive tasks, generate detailed threat intelligence reports, and optimize access policies—all while integrating seamlessly with tools like Microsoft Defender and Microsoft Entra. These capabilities allow your team to focus on high-priority issues, reduce false positives, and strengthen your organization’s overall security posture.
44

5-
In this module, you will get an introduction to some of the Microsoft Security Copilot agents, including the Threat Intelligence briefing agent, the Conditional Access Optimization agent, and the Phishing Triage agent.
5+
In this module, you get an introduction to some of the Microsoft Security Copilot agents, including the Threat Intelligence briefing agent, the Conditional Access Optimization agent, and the Phishing Triage agent.
6+
7+
> [!NOTE]
8+
>This module is intended to give you a flavor of just a few of the Microsoft agents available in Security Coplot, through both the standalone and embedded experience. Agents that are available through the embedded Copilot experience, are described in training that relates to the specific security solution in which it's embedded. For example, agents that are embedded in Microsoft Purview solutions are described in the training that relates to that Microsoft Purview solution.
69
710
After completing this module, you’ll be able to:
811

learn-pr/wwl-sci/security-copilot-describe-agents/includes/2-describe-agents.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ To effectively use Security Copilot agents, it's essential to understand the ter
2020

2121
### Agents in Microsoft Security Copilot
2222

23-
You can discover Microsoft Security Copilot agents through the standalone and embedded experiences. Copilot agents are also available from partners.
23+
You can discover Microsoft Security Copilot agents through the standalone and embedded experiences. Copilot agents are also available from partners.
2424

2525
To access the full list of available agents, select Agents from the home menu. Copilot displays the list of available Microsoft and partner agents.
2626

@@ -34,7 +34,7 @@ Security Copilot includes agents that are seamlessly integrated with Microsoft s
3434
- **Conditional Access Optimization Agent**: Embedded in Microsoft Entra, the Conditional Access optimization agent ensures all users are protected by policy. It recommends policies and changes based on best practices aligned with Zero Trust and Microsoft's learnings. In preview, the agent evaluates policies requiring multifactor authentication (MFA), enforces device based controls (device compliance, app protection policies, and Domain Joined Devices), and blocks legacy authentication and device code flow.
3535
- **Phishing Triage Agent**: Embedded in Microsoft Defender, the Phishing Triage Agent helps security operations analysts to triage and classify user-submitted phishing incidents. The agent operates autonomously, provides a transparent rationale for its classification verdicts in natural language, and continuously learns and improves its accuracy based on feedback provided by analysts.
3636

37-
This list isn't all-inclusive. More Microsoft agents are planned.
37+
This list is not all-inclusive.
3838

3939
### Partner agents
4040

@@ -51,4 +51,4 @@ Helps organizations forecast and prioritize the most critical threat alerts to r
5151
- Privacy Breach Response Agent by OneTrust
5252
Analyzes data breaches to generate guidance for the privacy team on how to meet regulatory requirements.
5353

54-
This list isn't all-inclusive. More partner agents
54+
This list is not all-inclusive.

learn-pr/wwl-sci/security-copilot-describe-agents/includes/3-describe-threat-intelligence-briefing-agent.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ The Threat Intelligence Briefing Agent addresses these challenges by applying dy
55

66
### Information about the agent and prerequisites
77

8-
The Threat Intelligence Briefing Agent is characterized as follows:
8+
The Threat Intelligence Briefing Agent, which is available through the standalone experience in Security Copilot, is characterized as follows:
99

1010
- **Trigger**: The agent can be triggered manually or set to run at scheduled intervals.
1111
- **Permissions**: This agent can read data from Defender External Attack Surface Management and Defender Vulnerability Management.

learn-pr/wwl-sci/security-copilot-describe-agents/includes/4-describe-conditional-access-optimization-agent.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,12 +8,12 @@ The Conditional Access optimization agent, a Security Copilot Agent embedded in
88

99
### Information about the agent and prerequisites
1010

11-
The Conditional Access Optimization Agent is characterized as follows:
11+
The Conditional Access Optimization Agent, which is available in Microsoft Entra as part of the Copilot embedded experience, is characterized as follows:
1212

1313
- **Trigger**: The agent runs every 24 hours but can also run manually.
1414
- **Permissions**: The agent reviews your policy configuration but acts only with your approval of the suggestions.
1515
- **Identity**: The agent runs in the context of the administrator who configured the agent.
16-
- **Products**: You must have Microsoft Entra Conditional Access (at least Microsoft Entra ID P1). Device-based controls in Conditional Access require Microsoft Intune licenses. You must also have Security Copilot available provisioned with security compute units (SCU). On average, each agent run consumes less than one SCU.
16+
- **Products**: You must have Microsoft Entra Conditional Access (at least Microsoft Entra ID P1). Device-based controls in Conditional Access require Microsoft Intune licenses. You must also have Security Copilot available and provisioned with security compute units (SCU). On average, each agent run consumes less than one SCU.
1717
- **Plugins**: The Microsoft Entra is mandatory.
1818
- **Role-based access**: You must be assigned the Security Administrator or Global Administrator role during the preview. These roles also have access to Security Copilot by default.
1919

learn-pr/wwl-sci/security-copilot-describe-agents/includes/5-describe-phishing-triage-agent.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ The Phishing Triage Agent uses advanced large language model (LLM)-based analysi
1313

1414
### Information about the agent and prerequisites
1515

16-
The Phishing Triage Agent is characterized as follows:
16+
The Phishing Triage Agent, which is available in Microsoft Defender XDR as part of the Copilot embedded experience, is characterized as follows:
1717

1818
- **Trigger**: The agent is triggered when a user in your organization submits a phishing incident. The agent autonomously analyzes the submitted email to classify them as either phishing or not phishing based on its training and the context of the organization.
1919
- **Permissions**: This agent can read data from Defender XDR adn Microsoft Threat Intelligence.

0 commit comments

Comments
 (0)