Skip to content

Commit f024636

Browse files
committed
fix blocking issues
1 parent 30af69e commit f024636

14 files changed

+37
-34
lines changed

learn-pr/wwl-sci/security-copilot-describe-agents/includes/1-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ Imagine you're a security engineer at a mid-sized financial institution. Your te
55
In this module, you get an introduction to some of the Microsoft Security Copilot agents, including the Threat Intelligence briefing agent, the Conditional Access Optimization agent, and the Phishing Triage agent.
66

77
> [!NOTE]
8-
>This module is intended to give you a flavor of just a few of the Microsoft agents available in Security Coplot, through both the standalone and embedded experience. Agents that are available through the embedded Copilot experience, are described in training that relates to the specific security solution in which it's embedded. For example, agents that are embedded in Microsoft Purview solutions are described in the training that relates to that Microsoft Purview solution.
8+
>This module is intended to give you a flavor of just a few of the Microsoft agents available in Security Coplot, through both the standalone and embedded experience. Agents that are available through the embedded Copilot experience, are described in training that relates to the specific security solution in which it's embedded. For example, agents that are embedded in Microsoft Purview solutions are described in the training that relates to that Microsoft Purview solution.
99
1010
After completing this module, you’ll be able to:
1111

learn-pr/wwl-sci/security-copilot-describe-agents/includes/3-describe-threat-intelligence-briefing-agent.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -16,31 +16,31 @@ The Threat Intelligence Briefing Agent, which is available through the standalon
1616

1717
### Set up
1818

19-
Follow these steps to configure the Threat Intelligence Briefing Agent:
19+
Follow these steps to configure the Threat Intelligence Briefing Agent, corresponding images are shown in the tabbed images that follow:
2020

21-
1. Navigate to the **Agents** page in the Microsoft Security Copilot portal and select **View details** under the Threat Intelligence Briefing Agent.
22-
2. Review the agent details and select **Set up**.
23-
3. Connect a user account by selecting **Next** and choosing the appropriate account.
24-
4. Specify parameters to customize the output, such as:
21+
1. Agents - Navigate to the **Agents** page in the Microsoft Security Copilot portal and select **View details** under the Threat Intelligence Briefing Agent.
22+
2. Details page - Review the agent details and select **Set up**.
23+
3. Set up - Connect a user account by selecting **Next** and choosing the appropriate account.
24+
4. Parameters - Specify parameters to customize the output, such as:
2525
- Number of insights to research.
2626
- Look-back period for threats.
2727
- Email address for report delivery.
2828
- Geographical region and industry scope.0
29-
5. After setup, access the agent overview page to run the agent manually or schedule it to run automatically.
29+
5. Run - After setup, access the agent overview page to run the agent manually or schedule it to run automatically.
3030

31-
# [Step 1 - Agents](#tab/agents)
31+
# [Agents](#tab/agents)
3232
:::image type="content" source="../media/agents-copilot-v2.png" lightbox="../media/agents-copilot-v2.png" alt-text="Screen capture showing the navigation flow to access the Agents page in Microsoft Security Copilot. ":::
3333

34-
# [Step 2 - Details page](#tab/details-page)
34+
# [Details page](#tab/details-page)
3535
:::image type="content" source="../media/threat-intelligence-agent-view-details.png" lightbox="../media/threat-intelligence-agent-view-details.png" alt-text="Screenshot of Threat Intelligence Briefing Agent details page.":::
3636

37-
# [Step 3 - Set up](#tab/set-up-agent)
38-
:::image type="content" source="../media/threat-intelligence-agent-setup1.png" lightbox="../media/threat-intelligence-agent-setup1.png"alt-text="Screenshot of Threat Intelligence Briefing Agent set up page that provides information on the permissions and identity needed to run the agent.":::
37+
# [Set up](#tab/set-up-agent)
38+
:::image type="content" source="../media/threat-intelligence-agent-setup-1.png" lightbox="../media/threat-intelligence-agent-setup-1.png"alt-text="Screenshot of Threat Intelligence Briefing Agent set up page that provides information on the permissions and identity needed to run the agent.":::
3939

40-
# [Step 4 - Parameters](#tab/parameters)
41-
:::image type="content" source="../media/threat-intelligence-agent-setup2.png" lightbox="../media/threat-intelligence-agent-setup2.png" alt-text="Screenshot of Threat Intelligence Briefing Agent set up parameters page.":::
40+
# [Parameters](#tab/parameters)
41+
:::image type="content" source="../media/threat-intelligence-agent-setup-2.png" lightbox="../media/threat-intelligence-agent-setup-2.png" alt-text="Screenshot of Threat Intelligence Briefing Agent set up parameters page.":::
4242

43-
# [Step 5 - Run](#tab/run)
43+
# [Run](#tab/run)
4444
:::image type="content" source="../media/threat-intelligence-agent-first-run.png" lightbox="../media/threat-intelligence-agent-first-run.png" alt-text="Screenshot of Threat Intelligence Briefing Agent overview page.":::
4545

4646
---
@@ -62,7 +62,7 @@ Select a report to assess its content and view the agent’s progress by clickin
6262
:::image type="content" source="../media/threat-intelligence-agent-report.png" lightbox="../media/threat-intelligence-agent-report.png" alt-text="Screenshot of a Threat Intelligence Briefing Agent report.":::
6363

6464
# [Activity](#tab/activity)
65-
:::image type="content" source="../media/threat-intelligence-agent-activity2.png" lightbox="../media/threat-intelligence-agent-activity2.png" alt-text="Screenshot of a Threat Intelligence Briefing Agent activity diagram.":::
65+
:::image type="content" source="../media/threat-intelligence-agent-activity-2.png" lightbox="../media/threat-intelligence-agent-activity-2.png" alt-text="Screenshot of a Threat Intelligence Briefing Agent activity diagram.":::
6666

6767
---
6868

learn-pr/wwl-sci/security-copilot-describe-agents/includes/4-describe-conditional-access-optimization-agent.md

Lines changed: 16 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -21,24 +21,27 @@ The Conditional Access Optimization Agent, which is available in Microsoft Entra
2121

2222
Follow these steps to configure and run the Conditional Access optimization agent:
2323

24-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) with at least a Security Administrator role.
25-
1. From the home page, select **Go to agents** from the agent notification card.
26-
1. Select **View details** and under the Conditional Access Optimization Agent, then select **Start agent** to being your first run.
27-
1. When the agent overview page loads, you see most recent and next scheduled runtimes, performance highlights, recent suggestions, and recent activity.
28-
1. Selecting a suggestion takes you to the policy details page where you can view the agent summary, user impact, policy details, make edits, and more.
24+
1. Go to agents - Once you sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) with at least a Security Administrator role, from the Microsoft Entra home page, select **Go to agents** from the agent notification card.
25+
1. Available agents - The Security Copilot agents page, shows tiles for the available agents. The page currently only shows the Conditional Access Optimization Agent, but more agents are coming soon.
26+
1. Start Agent - In the Conditional Access Optimization Agent tile, select **View details**. If you have not previously run the agent, you'll see the option to **Star agent** to begin the agent's first run.
27+
1. Overview page - If you have previously run the agent, selecting view details, brings you to the Overview page. The Overview page shows you see most recent and next scheduled runtimes, performance highlights, recent suggestions, and recent activity.
28+
1. Policy details - Selecting a suggestion takes you to the policy details page where you can view the agent summary, user impact, policy details, make edits, and more.
2929
1. Newly created policies are created in report-only mode. As a best practice organizations should exclude their break-glass accounts from policy to avoid being locked out due to misconfiguration.
3030
1. After administrators evaluate the policy settings using policy impact or report-only mode, they can move the Enable policy toggle from Report-only to On. Policies created by the agent are tagged with Conditional Access Optimization Agent in the Conditional Access policies pane.
3131

32-
# [Step 2 - Go to agents](#tab/go-to-agents)
33-
:::image type="content" source="../media/conditional-access-agent-home-page.png" lightbox="../media/conditional-access-agent-home-page.png" alt-text="Screenshot showing the Microsoft Entra home page with the Copilot agent tile.":::
32+
# [Go to agents](#tab/go-to-agents)
33+
:::image type="content" source="../media/conditional-access-agent-home-page.png" lightbox="../media/conditional-access-agent-home-page.png" alt-text="Screenshot of the Microsoft Entra home page that includes the agent notification tile.":::
3434

35-
# [Step 3 - Agent details](#tab/agent-details)
36-
:::image type="content" source="../media/conditional-access-agent-view-details.png" lightbox="../media/conditional-access-agent-view-details.png" alt-text="Screenshot showing the Conditional Access Optimization Agent details page.":::
35+
# [Available agents](#tab/available-agents)
36+
:::image type="content" source="../media/conditional-access-agent-tile.png" lightbox="../media/conditional-access-agent-tile.png" alt-text="Screenshot of the Security Copilot agents page showing that lists available agents.":::
3737

38-
# [Step 4 - Overview](#tab/overview)
39-
:::image type="content" source="../media/conditional-access-agent-overview-page.png" lightbox="../media/conditional-access-agent-overview-page.png" alt-text="Screenshot showing the Conditional Access Optimization Agent overview page showing the most recent and next scheduled runtimes, performance highlights, recent suggestions, and recent activity.":::
38+
# [Start agent](#tab/start-agent)
39+
:::image type="content" source="../media/conditional-access-agent-view-details.png" lightbox="../media/conditional-access-agent-view-details.png" alt-text="Screenshot showing the Conditional Access Optimization Agent details page. From here, you can select start if you haven't previously run the agent.":::
4040

41-
# [Step 5 - Policy details](#tab/policy-details)
41+
# [Overview page](#tab/overview-page)
42+
:::image type="content" source="../media/conditional-access-agent-overview-page-v2.png" lightbox="../media/conditional-access-agent-overview-page-v2.png" alt-text="Screenshot showing the Conditional Access Optimization Agent overview page showing the most recent and next scheduled runtimes, performance highlights, recent suggestions, and recent activity.":::
43+
44+
# [Policy details](#tab/policy-details)
4245
:::image type="content" source="../media/conditional-access-agent-policy-details-page.png" lightbox="../media/conditional-access-agent-policy-details-page.png" alt-text="Screenshot showing the Conditional Access Optimization Agent policy details page.":::
4346

4447
---
@@ -49,7 +52,7 @@ The agent is configured to run every 24 hours based on when it's initially confi
4952

5053
Use the checkboxes under Objects to specify what the agent should monitor when making policy recommendations. By default the agent looks for both new users and applications in your tenant over the previous 24 hour period.
5154

52-
The agent runs under the Identity and permissions of the user who enabled the agent in your tenant. Because of this requirement you should avoid using an account that requires elevation like those that use PIM for just-in-time elevation.
55+
The agent runs under the Identity and permissions of the user who enabled the agent in your tenant. Because of this requirement, you should avoid using an account that requires elevation like those that use Privileged Identity Management (PIM) for just-in-time elevation.
5356

5457
You can tailor policy to your needs using the optional Custom Instructions field. This allows you to provide a prompt to the agent as part of its execution. For example: "The user "Break Glass" should be excluded from policies created." When you save the custom instruction prompt Security Copilot will attempt to interpret and the results appear in the settings page.
5558

learn-pr/wwl-sci/security-copilot-describe-agents/includes/5-describe-phishing-triage-agent.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,9 +16,9 @@ The Phishing Triage Agent uses advanced large language model (LLM)-based analysi
1616
The Phishing Triage Agent, which is available in Microsoft Defender XDR as part of the Copilot embedded experience, is characterized as follows:
1717

1818
- **Trigger**: The agent is triggered when a user in your organization submits a phishing incident. The agent autonomously analyzes the submitted email to classify them as either phishing or not phishing based on its training and the context of the organization.
19-
- **Permissions**: This agent can read data from Defender XDR adn Microsoft Threat Intelligence.
19+
- **Permissions**: This agent can read data from Defender XDR and Microsoft Threat Intelligence.
2020
- **Identity**: Connection to an existing user account.
21-
- **Products**: Microsoft Defender for Office 365 Plan 2 and Microsoft Security Copilot with provisioned capacity is necessary to run the agent. The following Microsoft Defender capabilities are required:
21+
- **Products**: Microsoft Defender for Office 365 Plan 2 and Microsoft Security Copilot with provisioned capacity is necessary to run the agent. The following Microsoft Defender capabilities are required:
2222
- Unified role-based access control (URBAC) must be enabled for managing permissions.
2323
- The *Monitor reported messages in Outlook* must be enabled in the User reported settings page.
2424
- Enable the "Email reported by user as malware or phish" alert policy.

learn-pr/wwl-sci/security-copilot-describe-agents/includes/7-summary.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
1-
In this module, we addressed the challenge of optimizing security workflows and automating repetitive tasks for security engineers. We explored how Microsoft Security Copilot and its specialized agents streamline processes like threat analysis, phishing triage, identity management, and conditional access optimization. By leveraging AI-driven tools and seamless integration with Microsoft Defender and Entra, we demonstrated how these agents enhance efficiency and decision-making in security operations.
1+
In this module, we addressed the challenge of optimizing security workflows and automating repetitive tasks for security engineers. We explored how Microsoft Security Copilot and its specialized agents streamline processes like threat analysis, phishing triage, identity management, and conditional access optimization. By using AI-driven tools and seamless integration with Microsoft Defender and Microsoft Entra, we demonstrated how these agents enhance efficiency and decision-making in security operations.
22

3-
The techniques learned in this module offer significant advantages, including time savings, improved threat detection, and actionable insights tailored to organizational needs. These capabilities empower security engineers to focus on critical tasks while reducing manual effort and minimizing errors. The business impact includes enhanced security posture, better collaboration across IT workflows, and alignment with Zero Trust principles, ensuring robust protection against evolving threats.
3+
The techniques learned in this module offer significant advantages including time savings, improved threat detection, and actionable insights tailored to organizational needs. These capabilities empower security engineers to focus on critical tasks while reducing manual effort and minimizing errors. The business impact includes enhanced security posture, better collaboration across IT workflows, and alignment with Zero Trust principles, ensuring robust protection against evolving threats.
44

55
In this module, you learned about the key functionalities of Microsoft Security Copilot agents, including the Conditional Access Optimization Agent, Phishing Triage Agent, and Threat Intelligence Briefing Agent. You explored how these agents automate tasks like phishing classification, threat intelligence reporting, and identity risk mitigation through optimization of conditional access policies.
66

7-
After completing this module, you are able to:
7+
After completing this module, you're able to:
88

99
- Describe the role and functionality of Microsoft Security Copilot agents in automating security workflows.
1010
- Describe the Threat Intelligence Briefing Agent.
1111
- Describe the Conditional Access Optimization Agent.
1212
- Describe the Phishing Triage agent.
1313

14-
Additional Reading:
14+
More Reading:
1515
- [Microsoft Security Copilot agents](/copilot/security/agents-security-copilot)
1616
- [Microsoft Security Copilot agents overview](/copilot/security/agents-overview)
1717
- [Microsoft Security Copilot Agents in Microsoft Defender](/defender-xdr/security-copilot-agents-defender)
-31.5 KB
Loading
164 KB
Loading
116 KB
Loading
-15 KB
Loading

0 commit comments

Comments
 (0)