Microsoft Security Copilot in Microsoft Defender Threat Intelligence

 






Introduction

Cloud-based artificial intelligence tool called Microsoft Security Copilot offers a Copilot experience in natural language. In a variety of situations, such as incident response, threat hunting, and intelligence collection, it can assist security experts. Microsoft Defender Threat Intelligence (Defender TI) is made available to Copilot customers for each of their verified Copilot users. After gaining access to Security Copilot, the key features become accessible in either Security Copilot portal or the Microsoft Defender portal. 

Key Features

Security Copilot empowers security teams to comprehend, prioritize, and act upon threat intelligence information without delay. 

You can inquire about a specific threat actor, an attack campaign, or any other intelligence related to threats, and Copilot produces responses derived from threat analytics reports, intelligence profiles, articles, and additional Defender TI resources. 

Turn On the Security Copilot Integration in Defender TI

  1. Go to Microsoft Security Copilot and sign-in with your credentials.
  2. Ensure that the Microsoft Threat Intelligence plugin is turned on. In the prompt bar, choose the Sources icon.
  3. In the Manage sources pop-up window that appears, under Plugins, confirm that the Microsoft Threat Intelligence toggle is turned on, then close the window. 
  4. Enter your prompt in the prompt bar.

Built-in System Features

Security Copilot includes integrated features that can retrieve data from the various activated plugins. To view the list of built-in system capabilities for Defender TI:
  1. Select the Prompts icon in the prompt bar.
  2. Choose See all system capabilities. The Microsoft Threat Intelligence section lists all the available usable capabilities for Defender TI.

Copilot also has the following promptbooks that deliver information from Defender TI:

  • Check impact of an external threat article- Reviews an article from a third-party source (not published in Defender TI) to identify relevant IOCs, encapsulate the intelligence, and create hunting queries to evaluate the possible impact of the reported threat on an organization. 

  • Threat actor profile- Produces a report that profiles a known threat actor and offers advice on how to counteract their frequently used tools and strategies. 

  • Threat Intelligence 360 report based on MDTI article- Determines the possible impact of the danger described in a Defender TI article on your organization by analyzing the article to extract relevant IOCs, condense the information, and produce hunting queries. 

  • Vulnerability impact assessment- Creates a report that summarizes the intelligence regarding a known vulnerability and provides instructions on how to fix it. 

To view these promptbooks, in the prompt bar, select the Prompts icon then select See all promptbooks. 

Provide Feedback

Your feedback regarding the Security integration of Defender TI Copilot facilitates growth. In Copilot, to offer feedback, choose How's this response? at the bottom of every finished prompt and select the appropriate options.









































Comments

Popular posts from this blog

Deployment (Part 3)

Deployment (Part 1)

Deployment (Part 2)