Azure Web Application Firewall Integration in Microsoft Copilot for Security (preview)
About
A cloud-based artificial intelligence platform called Microsoft Copilot for Security offers a Copilot experience in natural language. In a variety of situations, such as incident response, threat hunting, and intelligence collection, it can assist security professionals.
Deep analysis of Azure Web Application Firewall (WAF) events is made possible by Microsoft Copilot for Security's integration with Azure WAF. In just a few minutes, it can assist in examining WAF logs that were triggered by Azure WAF and offer relevant attack vectors through machine-speed natural language responses. It gives insight into the threat landscape of the surroundings. It enables one to find the most offending IP addresses in an environment and obtain a list of the WAF rules that are most frequently triggered.
Both Azure WAF on Azure Application Gateway and Azure WAF on Azure Front Door support Microsoft Copilot for Security integration.
Key Features
- Providing a list of top Azure WAF rules triggered in the customer environment and generating deep context with related attack vectors.
- providing a list of malicious IP addresses in the customer environment and generating related threats.
- Summarizing SQL injection(SQLi) attacks.
- Summarizing Cross-site scripting(XSS) attacks.
Enable the Azure WAF Integration in Copilot for Security
- Make sure that you have at least Copilot contributor permissions.
- Open https://securitycopilot.microsoft.com/.
- Open the Copilot for Security menu.
- Open Sources in the prompt bar.
- On the plugins page, set the Azure Web Application Firewall toggle to On.
- Select the settings on the Azure Web Application Firewall plugin to configure the Log Analytics workspace, Log Analytics subscription ID, and the Log Analytics resource group name for Azure Front Door WAF and/or the Azure Application Gateway WAF.
- To start using the skills, use the prompt bar.
Comments
Post a Comment