SC 200T00A ENU Powerpoint CopilotForSecurity
SC 200T00A ENU Powerpoint CopilotForSecurity
• Fundamentals of Generative AI
Learning objectives
By the end of this module, you'll be able to describe:”
• What is generative AI?
• Large language models
• What is Azure OpenAI?
• What are copilots?
• Improve generative AI responses with prompt engineering
AI: imitates human behavior by using machine learning to interact with the environment and execute tasks
without explicit directions on what to output.
Generative AI: creates original content, such as generative AI that has been built into chat applications.
Generative AI applications take in natural language input, and return appropriate responses in a variety of
formats:
Natural language
Image generation Code generation
generation
Large language models
Generative AI applications are powered by large language models (LLMs), which are
a specialized type of machine learning model that you can use to perform natural
language processing (NLP) tasks, including:
• Determining sentiment or otherwise classifying natural language text.
• Summarizing text.
• Comparing multiple text sources for semantic similarity.
• Generating new natural language.
Azure OpenAI service is Microsoft's cloud solution for deploying, customizing, and hosting
large language models.
Azure OpenAI service consists of:
• Pre-trained generative AI models.
• Customization capabilities.
• Built-in tools to detect and mitigate harmful use cases so users can implement AI responsibly.
• Enterprise-grade security with role-based access control (RBAC) and private networks.
You can use several methods to develop Azure OpenAI solutions: Azure AI Studio,
REST API, supported SDKs, and Azure CLI.
Description Example
You can get the most useful completions by being “Create a list of 10 things to do in
Direct language
explicit about the kind of response you want. Edinburgh during August”.
"You're a helpful assistant that
System messages Describe how the chat should act. responds in a cheerful, friendly
manner“.
LLMs generally support zero-shot learning in which
responses can be generated without prior examples. “Visit the castle in the morning
Providing examples
However, you can also provide a few example responses, before the crowds arrive”.
known as few-shot learning.
Including email text with the
Grounding data You can include grounding data to provide context.
prompt “Summarize my email”.
Learning objectives
By the end of this module, you'll be able to:
• Describe what Microsoft Copilot for Security is.
• Describe the terminology of Microsoft Copilot for Security.
• Describe how Microsoft Copilot for Security processes prompt requests.
• Describe the elements of an effective prompt
• Describe how to enable Microsoft Copilot for Security.
Incident summarization. Distil complex security alerts into concise actional summaries.
Impact analysis. Assess the potential impact of security incidents to enable quicker response times
and streamlined decision-making.
Reverse engineering of scripts. Analyze complex command line scripts and translate them into
natural language with clear explanations of actions.
Guided responses. Actionable step-by-step guidance for incident response, including directions for
triage, investigation, containment, and remediation.
To start using Microsoft Copilot for Security, organizations need to take steps to onboard the
service and users. These include:
1. Navigate to https:\\securitycopilot.Microsoft.com
2. Choose an Azure subscription and choose or create a new Resource Group
3. Provision Copilot capacity – name your capacity and add at least 1 SCU (Security compute unit)
4. Set up the default environment
5. Assign role permissions
To provision capacity:
• You must have an Azure subscription.
• You must be an Azure owner or Azure contributor, at a
resource group level, as a minimum.
2 A security analyst is crafting a prompt to investigate an incident involving the Pearl Sleet
actor. Which prompt will likely yield the most comprehensive results?
Can you give me information about Pearl Sleet activity, including a list of known indicators of
compromise and tools, tactics, and procedures (TTPs)?
Describe Pearl Sleet.
List Pearl Sleet activities.
3 An admin is tasked with setting up Microsoft Copilot for Security and needs to provision
capacity. Which is the correct method to provision capacity for their organization?
Provision capacity through a third-party vendor
Provision capacity within Copilot for Security
Provision capacity by directly purchasing SCUs from a software retailer
Module 4 summary
Microsoft Copilot for Security has a rich set of features. Learn about available plugins, promptbooks, the ways
you can export and share information from Copilot, and much more.
Learning objectives
By the end of this module, you'll be able to:
• Describe the features available in the standalone Copilot experience.
• Describe the features available in a session of the standalone experience
• Describe the plugins available in Copilot.
• Describe custom promptbooks.
• Describe knowledge base connections.
• Filter by date
Copilot for Security comes with prebuilt promptbooks, a collection of prompts that have been
put together to accomplish specific security-related tasks.
o Select the sources icon to access and manage all plugins and files.
Copilot has features that are common across all sessions and to the individual prompts that make
up a session, including:.
• The process log
• Actions available on a prompt and its response
• Prompt feedback
• The pin board
Edit a prompt
Rerun a prompt
Delete a prompt
Export a response
Provide feedback
Copy a response
on a response
A security analyst needs to review past sessions created in Microsoft Copilot for Security.
1
After accessing the standalone experience, which option should they select to manage
and review these sessions?
Select the My sessions option from the home menu.
Select the Help icon.
Select settings.
After enabling the Defender EASM plugin in Copilot, a security analyst wants to assess the
2
organization's exposure to a specific vulnerability; which prompt should they use to obtain this
information?
Get assets by CVSS score.
Get expired SSL certificates.
Is my external attack surface impacted by CVE-2023-21709?
A security analyst needs to integrate ServiceNow incident management with Microsoft Copilot for
3
Security. Which authentication method should be configured to enable this integration?
Anonymous authentication
OAuth authorization
Copilot uses on-behalf-of authentication, so no other authentication is required for ServiceNow integration.
Module 5 summary
Microsoft Copilot for • How to describe the features available in the standalone
Security is a platform Copilot experience.
that provides
• How to describe the plugins available in Copilot.
guidance specific to
your organization's • How to describe custom promptbooks.
security.
• How to describe knowledge base connections.
Microsoft Copilot for Security is accessible directly from some Microsoft security products, this is referred to
as the embedded experience. Learn about the scenarios supported by the Copilot embedded experience in
Microsoft’s security solutions.
Learning objectives
By the end of this module, you'll be able to:
• Describe Microsoft Copilot in Microsoft Defender XDR.
• Describe Microsoft Copilot in Microsoft Purview.
• Describe Microsoft Copilot in Microsoft Entra.
• Microsoft Copilot for Security is accessible directly from some Microsoft security products (Defender XDR,
Microsoft Entra, Microsoft Purview, and more coming).
• In the embedded experience, Copilot invokes the product specific capabilities directly, providing
processing efficiency.
• The embedded experience is a great place to start a security investigation.
• Easily transition to the standalone experience to pursue a more detailed, cross product investigation that
brings to bear all the Copilot capabilities enabled for your role.
• Microsoft plugin for the specific solution must be enabled and the user must have role permission to
access Copilot plus any role permission required to access data associated with the specific solution.
The organization needs to be licensed for Microsoft Purview eDiscovery (Standard), as a minimum.
After enabling the Entra plugin in Copilot and assigning the appropriate role permissions, an admin navigates to
3
the Risky users report to investigate a user's risky sign-ins. What should the admin do next to view the Copilot
generated summary?
Select the 'Export' option to download the user's risk details.
Microsoft Copilot for • How to describe Microsoft Copilot in Microsoft Defender XDR.
Security is accessible • How to describe Microsoft Copilot in Microsoft Purview.
directly from some
Microsoft security • How to describe Microsoft Copilot in Microsoft Entra.
products. This is
referred to the
embedded
experience.