Skip to content

Commit cfe794e

Browse files
committed
fix for acronlinx
1 parent ba19899 commit cfe794e

10 files changed

Lines changed: 52 additions & 39 deletions
Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,16 @@
11
Microsoft Security Copilot is a cutting-edge AI-driven platform designed to enhance security workflows by automating tasks and providing actionable insights, making it an essential tool for security engineers.
22

3-
Imagine you're a security engineer at a mid-sized financial institution. Your team is overwhelmed with the sheer volume of security alerts, phishing attempts, and identity access requests that need to be analyzed daily. Recently, a phishing attack slipped through the cracks, leading to a data breach that could have been prevented with better tools and processes. You’re tasked with finding a solution that not only streamlines your team’s workload but also improves the accuracy and speed of threat detection and response. This is where Microsoft Security Copilot comes in. By using specialized agents like the Phishing Triage Agent and Conditional Access Optimization Agent, you can automate repetitive tasks, generate detailed threat intelligence reports, and optimize access policies—all while integrating seamlessly with tools like Microsoft Defender and Microsoft Entra. These capabilities allow your team to focus on high-priority issues, reduce false positives, and strengthen your organization’s overall security posture.
3+
Imagine you’re a security engineer at a mid-sized financial institution. Your team manages a complex environment spanning identity management with Microsoft Entra, endpoint protection with Microsoft Intune, threat detection with Microsoft Defender, and data protection with Microsoft Purview. Every day, your team is flooded with alerts from phishing attempts, identity risks, policy misconfigurations, and data loss incidents. Recently, a phishing attack slipped through the cracks, leading to a data breach that could have been prevented with better tools and processes. You’re tasked with finding a solution that not only streamlines your team’s workload but also improves the accuracy and speed of threat detection and response across all these platforms. This is where Microsoft Security Copilot agents come in. These AI-powered agents automate repetitive tasks, provide actionable insights, and integrate seamlessly across Microsoft security products—helping your team focus on high-priority issues, reduce false positives, and strengthen your organization’s overall security posture.
44

5-
In this module, you get an introduction to some of the Microsoft Security Copilot agents, including the Threat Intelligence briefing agent, the Conditional Access Optimization agent, and the Phishing Triage agent.
5+
In this module, you get an introduction to Microsoft Security Copilot agents, including agent identities and permissions. You explore the Threat Intelligence Briefing Agent in the standalone experience and learn about Security Copilot agents across Microsoft Entra, Microsoft Defender, Microsoft Purview, and Microsoft Intune. You also learn how Security Copilot supports building your own agents.
66

77
> [!NOTE]
8-
>This module is intended to give you a flavor of just a few of the Microsoft agents available in Security Coplot, through both the standalone and embedded experience. Agents that are available through the embedded Copilot experience, are described in training that relates to the specific security solution in which it's embedded. For example, agents that are embedded in Microsoft Purview solutions are described in the training that relates to that Microsoft Purview solution.
8+
> This module is intended to give you a flavor of just a few of the Microsoft agents available in Security Copilot, through both the standalone and embedded experiences. Agents that are available through the embedded Copilot experience are described in training that relates to the specific security solution in which they’re embedded. For example, agents that are embedded in Microsoft Purview solutions are described in the training that relates to that Microsoft Purview solution.
99
1010
After completing this module, you’ll be able to:
1111

1212
- Describe the role and functionality of Microsoft Security Copilot agents in automating security workflows.
13-
- Describe the Threat Intelligence Briefing Agent.
14-
- Describe the Conditional Access Optimization Agent.
15-
- Describe the Phishing Triage agent.
13+
- Describe agent identities and permissions in Microsoft Security Copilot.
14+
- Describe the Threat Intelligence Briefing Agent in the Security Copilot standalone experience.
15+
- Describe Security Copilot agents in Microsoft Entra, Microsoft Defender, Microsoft Purview, and Microsoft Intune.
1616
- Describe how Security Copilot supports building your own agents.

learn-pr/wwl-sci/security-copilot-describe-agents/includes/2-describe-agents.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ To effectively use Security Copilot agents, it's essential to understand the ter
1414
|--------------|-------------|
1515
| **Trigger** | An event or condition that tells an agentic system to initiate an action or series of actions. |
1616
| **Permissions** | The level of authorization an AI agent is given by an admin during configuration that enables it to access specific information or carry out its tasks. |
17-
| **Identity** | An agent needs an identity to authenticate and securely access resources when it runs. During the agent setup process, you choose from two types of identity: (1) **Create an agent identity**Creates a dedicated identity for the agent using the Microsoft Entra Agent ID capability, keeping access scoped, secure, and easier to manage. Currently, this option is only available for Microsoft-built agents. (2) **Connect with an existing user account**Lets the agent use your credentials to run, inheriting your access and permissions while it's active. |
17+
| **Identity** | An agent needs an identity to authenticate and securely access resources when it runs. During the agent setup process, you choose from two types of identity: (1) **Create an agent identity**Creates a dedicated identity for the agent using the Microsoft Entra Agent ID capability, keeping access scoped, secure, and easier to manage. Currently, this option is only available for Microsoft-built agents. (2) **Connect with an existing user account**Lets the agent use your credentials to run, inheriting your access and permissions while it's active. |
1818
| **Plugins** | A component that extends what an agent can do by giving it access to capabilities in Microsoft and non-Microsoft services and public websites through APIs. While some plugins may be required to run an agent, some agents may employ optional plugins that can enhance its functionality by providing access to more data sources or tools.|
1919
| **Role-based access control (RBAC)** | Determines who can view and manage the outputs generated by agents in Microsoft Security Copilot, and ensures that sensitive information is accessible only to authorized users. |
2020

learn-pr/wwl-sci/security-copilot-describe-agents/includes/2a-understand-agent-identities-permissions.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -31,10 +31,10 @@ This option lets the agent use an existing user's credentials. The agent inherit
3131

3232
An AI agent can use its identity to:
3333

34-
- **Access web services**Request access tokens from Microsoft Entra to call Microsoft Graph, organization-built services, or third-party APIs.
35-
- **Autonomous access**Act independently using rights assigned directly to the agent identity, including Microsoft Graph permissions, Azure RBAC roles, and Microsoft Entra directory roles.
36-
- **Delegated access**Act on behalf of a human user, using rights the user controls and delegates.
37-
- **Authenticate incoming messages**Accept and validate requests from other clients, users, or agents using Microsoft Entra access tokens.
34+
- **Access web services**Request access tokens from Microsoft Entra to call Microsoft Graph, organization-built services, or non-Microsoft APIs.
35+
- **Autonomous access**Act independently using rights assigned directly to the agent identity, including Microsoft Graph permissions, Azure role-based access control (RBAC) roles, and Microsoft Entra directory roles.
36+
- **Delegated access**Act on behalf of a human user, using rights the user controls and delegates.
37+
- **Authenticate incoming messages**Accept and validate requests from other clients, users, or agents using Microsoft Entra access tokens.
3838

3939
### Permissions for agents
4040

@@ -46,8 +46,8 @@ When an agent identity is created, the required permissions are assigned automat
4646

4747
RBAC determines who can view and manage agent outputs in Security Copilot. The Security Copilot platform defines two roles:
4848

49-
- **Security Copilot owner**Set up agents, manage settings, assign permissions, and perform all platform tasks. Build, test, and publish agents at workspace scope.
50-
- **Security Copilot contributor**Run agents, create sessions, and interact with agent outputs. Build, test, and publish agents at user scope.
49+
- **Security Copilot owner**Set up agents, manage settings, assign permissions, and perform all platform tasks. Build, test, and publish agents at workspace scope.
50+
- **Security Copilot contributor**Run agents, create sessions, and interact with agent outputs. Build, test, and publish agents at user scope.
5151

5252
These roles are managed within Security Copilot and are separate from Microsoft Entra ID roles. They control platform access only and don't grant access to security data by themselves. The data an agent can access is still governed by the user's existing Microsoft Entra and Azure RBAC roles—Security Copilot never exceeds the access a user already has.
5353

learn-pr/wwl-sci/security-copilot-describe-agents/includes/4-describe-conditional-access-optimization-agent.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ Microsoft Entra agents can automate many identity and access management operatio
33
Microsoft Entra agents analyze your identity environment, apply best practices, and take automated actions to improve your identity and access security posture and operational efficiency. They integrate directly with Microsoft Entra services, using your organization’s identity data and configuration to provide contextual, actionable insights.
44

55
> [!NOTE]
6-
> This unit is designed to provide a high-level overview of the Security Copilot agents in Microsoft Entra. For additional information, refer to training that relates to Microsoft Entra.
6+
> The list of Security Copilot agents in Microsoft Entra is continually growing. This unit is designed to provide a high-level overview of a few of the Security Copilot agents in Microsoft Entra. Fo more information, refer to training that relates to Microsoft Entra.
77
88
### What are Microsoft Entra agents?
99

@@ -46,7 +46,7 @@ The [Access Review Agent](https://learn.microsoft.com/entra/id-governance/access
4646

4747
| Attribute | Description |
4848
|-----------|-------------|
49-
| **Identity** | A unique agent identity for authorization is created when the agent is turned on. The agent uses this identity to scan your tenant for active access reviews, gather additional insights, and save its recommendations. Final decisions, submitted through the Microsoft Teams conversation, use the reviewer’s identity. |
49+
| **Identity** | A unique agent identity for authorization is created when the agent is turned on. The agent uses this identity to scan your tenant for active access reviews, gather insights, and save its recommendations. Final decisions, submitted through the Microsoft Teams conversation, use the reviewer’s identity. |
5050
| **Licenses** | Microsoft Entra ID Governance or Microsoft Entra Suite. |
5151
| **Plugins** | Microsoft Entra (mandatory). |
5252
| **Products** | ID Governance Access Reviews. |

learn-pr/wwl-sci/security-copilot-describe-agents/includes/5-describe-phishing-triage-agent.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,10 @@ Microsoft Security Copilot includes agents embedded in the Microsoft Defender po
22

33

44
> [!NOTE]
5-
> This unit is designed to provide a high-level overview of the Security Copilot agents in Microsoft Defender, which are focused on SOC tasks. For additional information related to the SOC tasks, such as threat hunting, threat detection, etc. refer to [Defend against cyberthreats with Microsoft's security operations platform](/training/courses/sc-200t00).
5+
> The list of Security Copilot agents in Microsoft Entra is continually growing. This unit is designed to provide a high-level overview of a few of the Security Copilot agents in Microsoft Entra. Fo more information, refer to training that relates to Microsoft Entra.
6+
7+
> [!NOTE]
8+
> The list of Security Copilot agents in Microsoft Defender is continually growing. This unit is designed to provide a high-level overview of just a few of the Security Copilot agents in Microsoft Defender. For more information related to agents in Microsoft Defender and focused on SOC tasks, see [Defend against cyberthreats with Microsoft's security operations platform](/training/courses/sc-200t00).
69
>
710
### Microsoft Security Copilot agents in Microsoft Defender
811

@@ -38,7 +41,7 @@ The [Threat Intelligence Briefing Agent](https://learn.microsoft.com/defender-xd
3841

3942
#### Threat Hunting Agent
4043

41-
The [Threat Hunting Agent](https://learn.microsoft.com/defender-xdr/advanced-hunting-security-copilot-threat-hunting-agent) enables you to investigate threats using natural language from start to finish. It not only generates KQL queries but also interprets results, surfaces insights, and guides you through full hunting sessions. These capabilities empower you to hunt threats faster, more accurately, and with greater confidence.
44+
The [Threat Hunting Agent](https://learn.microsoft.com/defender-xdr/advanced-hunting-security-copilot-threat-hunting-agent) enables you to investigate threats using natural language from start to finish. It not only generates Kusto Query Language (KQL) queries but also interprets results, surfaces insights, and guides you through full hunting sessions. These capabilities empower you to hunt threats faster, more accurately, and with greater confidence.
4245

4346
#### Dynamic Threat Detection Agent
4447

learn-pr/wwl-sci/security-copilot-describe-agents/includes/5a-describe-purview-agents.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
Microsoft Security Copilot agents in Microsoft Purview help triage Microsoft Purview Data Loss Prevention (DLP) and Microsoft Purview Insider Risk Management alerts. These agents are AI-powered assistants that work seamlessly with Microsoft security products to help security teams evaluate and categorize alerts.
22

33
> [!NOTE]
4-
> This unit is designed to provide a high-level overview of the Security Copilot agents in Microsoft Purview. For additional information, refer to training that relates to Microsoft Purview.
4+
> The list of Security Copilot agents in Microsoft Purview is continually growing. This unit is designed to provide a high-level overview of a few of the Security Copilot agents in Microsoft Purview. For more information, see training that relates to Microsoft Purview.
55
66
### Microsoft Security Copilot agents in Microsoft Purview
77

@@ -14,7 +14,7 @@ The [Triage Agent in Insider Risk Management](https://learn.microsoft.com/purvie
1414
| Attribute | Description |
1515
|-----------|-------------|
1616
| **Identity** | Runs as the administrator who turned on the agent. Agent authentication expires after 90 days and must be renewed. |
17-
| **License** | Both the standard per seat licensing model and the pay-as-you-go billing model. Microsoft Purview Insider Risk Management with Microsoft 365 E3/E5/A5/F5/G5. |
17+
| **License** | Both the standard per user licensing model and the pay-as-you-go billing model. Microsoft Purview Insider Risk Management with Microsoft 365 E3/E5/A5/F5/G5. |
1818
| **Permissions** | Access policy configurations and settings in Insider Risk Management; read activities and events in Microsoft Purview; read file content and metadata involved in Insider Risk Management alerts; store user feedback and apply feedback when evaluating Insider Risk Management alerts. |
1919
| **Plugins** | Microsoft Purview. |
2020
| **Products** | Security Copilot and Insider Risk Management. |
@@ -28,7 +28,7 @@ The [Alert Triage Agent in Data Loss Prevention](https://learn.microsoft.com/pur
2828
| Attribute | Description |
2929
|-----------|-------------|
3030
| **Identity** | Runs as the administrator who turned on the agent. Agent authentication expires after 90 days and must be renewed. |
31-
| **License** | Both the standard per seat licensing model and the pay-as-you-go billing model. Microsoft Purview Data Loss Prevention with Microsoft 365 E3/E5/A5/F5/G5. |
31+
| **License** | Both the standard per user licensing model and the pay-as-you-go billing model. Microsoft Purview Data Loss Prevention with Microsoft 365 E3/E5/A5/F5/G5. |
3232
| **Permissions** | Access policy configurations and settings in DLP; read activities and events in Microsoft Purview; read file content and metadata involved in DLP alerts; store user feedback and apply feedback when evaluating DLP alerts. |
3333
| **Plugins** | Microsoft Purview. |
3434
| **Products** | Security Copilot and Data Loss Prevention. |

learn-pr/wwl-sci/security-copilot-describe-agents/includes/5b-build-agents.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -137,12 +137,12 @@ The iterative development process allows continuous refinement through conversat
137137
- Direct deployment capabilities
138138
- Support for iterative development through conversational input
139139

140-
MCP tools are perfect for developers who want to build agents within their familiar development environment while leveraging AI assistance throughout the creation process.
140+
MCP tools are perfect for developers who want to build agents within their familiar development environment while using AI assistance throughout the creation process.
141141

142142
**What you do:**
143143

144144
- Use natural language prompts within your IDE to describe agent intent
145-
- Leverage MCP tools to automatically discover relevant Security Copilot capabilities
145+
- Use MCP tools to automatically discover relevant Security Copilot capabilities
146146
- Generate and iterate on agent YAML files through conversational AI assistance
147147
- Deploy agents directly to Security Copilot from your development environment
148148
- Test and refine agents through continuous feedback loops

0 commit comments

Comments
 (0)