Skip to main content

Challenge 49: Security Copilot – Microsoft Agents and Security Store

Exam skills covered

  • Enable and configure built-in Microsoft security agents
  • Configure Security Store agents and custom solutions
  • Create custom promptbooks for investigation workflows
  • Set up agent orchestration policies and guardrails
  • Manage agent permissions and data access boundaries

Scenario

Contoso Ltd wants to leverage Security Copilot's autonomous agents to reduce SOC workload. The security team handles 500+ phishing alerts daily and needs automated triage. Additionally, Contoso's vulnerability management team spends excessive time prioritizing patches. You must enable the built-in agents, configure custom promptbooks for specialized workflows, and set up orchestration policies that ensure agents operate within approved boundaries.


Prerequisites

  • 🔒 License required: Security Copilot compute units (SCU) provisioned and active
  • Security Copilot workspace configured (from Challenge 48)
  • Microsoft Sentinel workspace with active incidents
  • Microsoft Defender XDR with alerts flowing
  • Microsoft Defender Vulnerability Management enabled
  • Copilot Owner role in Security Copilot
  • Security Administrator role in Entra ID

Task 1: Enable the Phishing Triage Agent

Configure the built-in phishing triage agent to automatically analyze and classify phishing alerts.

Portal Steps:

  1. Navigate to Security Copilot
  2. Go to SettingsAgentsMicrosoft agents
  3. Locate Phishing Triage Agent and click Configure
  4. Enable the agent with the following settings:
SettingValue
StatusEnabled
Data sourcesMicrosoft Defender XDR, Exchange Online
Auto-classify confidence thresholdHigh (90%+)
Actions on high-confidence phishingMove to quarantine, notify user
Actions on suspicious (medium confidence)Flag for analyst review
Actions on benign (low threat)Close alert, no action
Working hours24/7
Maximum alerts per hour100
  1. Configure the triage criteria:
CriteriaWeight
Known malicious sender domainsHigh
URL reputation (VirusTotal, Microsoft)High
Attachment analysis (detonation)High
Impersonation detectionMedium
SPF/DKIM/DMARC failuresMedium
User-reported vs. automated detectionLow
  1. Set escalation rules:
ConditionAction
VIP target (C-suite, finance)Immediate analyst notification
Business email compromise indicatorsEscalate to Tier 2
Credential harvesting link detectedBlock sender domain, escalate
Agent confidence < 60%Route to human analyst
  1. Click Save and activate

Verify agent operation:

  1. Navigate to Security CopilotAgent activity
  2. Confirm the phishing agent shows status: Active
  3. Review recent triage decisions in the agent log
  4. Verify alert volume reduction in Defender XDR alerts queue

Task 2: Enable the Alert Triage Agent

Configure the alert triage agent for non-phishing security alerts from Defender XDR.

Portal Steps:

  1. Navigate to SettingsAgentsMicrosoft agents
  2. Locate Alert Triage Agent and click Configure
  3. Enable with settings:
SettingValue
StatusEnabled
ScopeAll Defender XDR alerts (excluding email)
Auto-resolve true positivesNo (flag for review)
Auto-close false positivesYes (confidence > 95%)
Enrichment sourcesSentinel, Entra ID, Threat Intelligence
Incident correlationEnabled
  1. Configure alert categories and handling:
Alert CategoryAgent Action
Malware detection (endpoint)Enrich with device context, check lateral movement
Suspicious process executionCorrelate with MITRE ATT&CK, check other endpoints
Impossible travelVerify with Entra sign-in logs, check VPN usage
Anomalous Azure resource accessCheck role assignments, verify authorization
Credential access attemptsCorrelate with identity protection, check MFA status
  1. Configure enrichment prompts the agent uses internally:
Enrichment 1: "What is the risk score and recent activity for the user associated with this alert?"
Enrichment 2: "Are there related alerts from the same entity in the last 48 hours?"
Enrichment 3: "What MITRE ATT&CK stage does this alert represent and what is the typical next stage?"
Enrichment 4: "Is the affected device compliant with Intune policies?"
  1. Set output format:
FieldDescription
Triage verdictTrue positive / False positive / Needs review
Confidence score0-100%
Enrichment summaryKey context gathered by agent
Recommended actionSuggested next steps for analyst
Related incidentsLinks to correlated incidents
  1. Click Save and activate

Task 3: Enable the Vulnerability Remediation Agent

Configure the agent to prioritize and recommend remediation for discovered vulnerabilities.

Portal Steps:

  1. Navigate to SettingsAgentsMicrosoft agents
  2. Locate Vulnerability Remediation Agent and click Configure
  3. Enable with settings:
SettingValue
StatusEnabled
Data sourceMicrosoft Defender Vulnerability Management
Prioritization modelRisk-based (EPSS + asset criticality)
Remediation recommendationsEnabled
Patch scheduling suggestionsEnabled
Compensating control recommendationsEnabled
  1. Configure asset criticality mapping:
Asset GroupCriticalitySLA for Critical CVEs
Domain ControllersCritical24 hours
Public-facing web serversHigh48 hours
Database serversHigh48 hours
Developer workstationsMedium7 days
General endpointsLow14 days
  1. Configure agent output:
For each vulnerability, the agent provides:
- CVE ID and description
- EPSS score (probability of exploitation)
- Affected assets with criticality ratings
- Available patches or workarounds
- Compensating controls if patching isn't immediate
- Recommended remediation timeline based on SLA
- Impact assessment if vulnerability is exploited
  1. Set notification rules:
ConditionAction
CISA KEV additionImmediate notification to security leads
EPSS > 0.9 on critical assetHigh-priority remediation ticket
Zero-day with active exploitationEmergency change request
Patch available for aging vulnerabilityReminder to patch owner
  1. Click Save and activate

Task 4: Configure Security Store agents and custom solutions

Browse and install additional agents from the Security Store.

Portal Steps:

  1. Navigate to Security CopilotSecurity Store
  2. Browse available agents and solutions
  3. Install the following community/partner agents:

Threat Intelligence Enrichment Agent

  1. Find "Threat Intelligence Enrichment" in the Security Store
  2. Click Install
  3. Configure:
SettingValue
TI feedsMicrosoft TI, CIRCL, AlienVault OTX
Auto-enrich indicatorsEnabled
IOC aging policy90 days
Confidence threshold for blocking80%
  1. Click Activate

Compliance Posture Agent

  1. Find "Compliance Posture Monitor" in the Security Store
  2. Click Install
  3. Configure:
SettingValue
FrameworksNIST 800-53, CIS Benchmarks, ISO 27001
Scan frequencyDaily
Drift alertingEnabled
Auto-remediationDisabled (recommend only)
  1. Click Activate

Managing installed agents:

  1. Navigate to SettingsAgentsInstalled agents
  2. Review each agent's:
    • Activity log (prompts processed, actions taken)
    • Error rate and failed operations
    • Capacity consumption (SCU usage)
    • Data access audit trail

Task 5: Create custom promptbooks for agent-driven workflows

Design promptbooks that leverage agents for complex investigation scenarios.

Portal Steps:

  1. Navigate to Security CopilotPromptbook library
  2. Click + Create promptbook

Promptbook: Automated Incident Response

SettingValue
NameAgent-Driven Incident Response
DescriptionEnd-to-end incident investigation using agents and manual steps
TriggerManual or agent-initiated
SharingSOC-Leads and SOC-Analysts-Tier1
  1. Add prompts:
Prompt 1 (Agent: Alert Triage):
"Analyze incident {incident_id} and provide a triage verdict with enrichment context from all available sources"

Prompt 2 (Agent: Threat Intelligence):
"Enrich all indicators of compromise found in incident {incident_id} with threat intelligence from all configured feeds"

Prompt 3 (Copilot):
"Based on the triage and threat intelligence enrichment, what is the kill chain stage and what are the likely next attacker actions?"

Prompt 4 (Copilot):
"Generate containment recommendations for this incident. Include immediate actions and long-term remediation"

Prompt 5 (Agent: Compliance Posture):
"What compliance controls failed that allowed this incident? Recommend control improvements"

Prompt 6 (Copilot):
"Create a complete incident report for incident {incident_id} including timeline, impact assessment, root cause, and lessons learned"
  1. Configure input parameters:
    • {incident_id} — Type: String, Required: Yes
  2. Click Save promptbook

Promptbook: Weekly Vulnerability Review

SettingValue
NameWeekly Vulnerability Prioritization
DescriptionAgent-driven vulnerability assessment for weekly patch review
TriggerScheduled (Every Monday 08:00 UTC)
SharingSecurity-Operations group
  1. Add prompts:
Prompt 1 (Agent: Vulnerability Remediation):
"List all new vulnerabilities discovered in the last 7 days, sorted by risk score (EPSS × asset criticality)"

Prompt 2 (Agent: Threat Intelligence):
"Are any of the top 20 vulnerabilities being actively exploited in the wild? Check CISA KEV and exploit databases"

Prompt 3 (Copilot):
"Create a prioritized patch deployment plan for this week based on risk scores, active exploitation, and asset criticality"

Prompt 4 (Copilot):
"For vulnerabilities that cannot be patched immediately, recommend compensating controls"

Prompt 5 (Copilot):
"Generate a weekly vulnerability report suitable for the CISO including risk trends, patch compliance metrics, and recommendations"
  1. Click Save promptbook

Task 6: Configure agent orchestration policies

Set up guardrails and policies that govern how agents operate.

Portal Steps:

  1. Navigate to Security CopilotSettingsAgent policies
  2. Create an orchestration policy:
SettingValue
Policy nameContoso Agent Guardrails
ScopeAll agents
PriorityHigh
  1. Configure boundaries:

Action boundaries:

Action TypePolicy
Read dataAllowed - all connected sources
Modify alert statusAllowed - with audit logging
Quarantine emailAllowed - phishing agent only
Isolate deviceRequires human approval
Disable user accountRequires human approval
Block IP/domainRequires human approval
Delete dataProhibited

Data access boundaries:

Data CategoryAccess Level
Security alerts and incidentsFull access
User sign-in logsFull access
Email contentMetadata only (no body)
File contentHash and metadata only
HR/personnel dataProhibited
Financial systemsProhibited

Operational limits:

LimitValue
Max actions per hour per agent200
Max SCU consumption per agent per hour1 SCU
Escalation timeout15 minutes
Retry limit on failures3
Circuit breaker threshold10 consecutive failures
  1. Click Save policy

  2. Configure alert routing:

Alert TypePrimary AgentFallback
Phishing/email threatsPhishing Triage AgentAlert Triage Agent
Endpoint alertsAlert Triage AgentHuman analyst
Identity alertsAlert Triage AgentHuman analyst
Cloud resource alertsAlert Triage AgentHuman analyst
Vulnerability findingsVulnerability AgentHuman analyst
  1. Click Save routing configuration

Break & Fix

Scenario 1: Phishing agent over-quarantining legitimate emails

The phishing triage agent has quarantined several legitimate emails from a new business partner, causing business disruption.

Show solution

Root cause: The new partner's domain is recently registered and has low reputation scores, triggering the agent's confidence threshold.

Fix:

  1. Navigate to SettingsAgentsPhishing Triage AgentConfiguration
  2. Add the partner domain to the Allow list:
    • Domain: newpartner.com
    • Reason: "Verified business partner - approved by IT security"
    • Expiration: 90 days (review periodically)
  3. Adjust confidence threshold for domain age:
    • Reduce weight of "recently registered domain" from High to Medium
  4. Review and release quarantined emails:
    • Go to Defender XDR → Email & collaborationQuarantine
    • Release legitimate emails and mark as "not junk"
  5. Monitor the agent's decisions for the partner domain over the next 24 hours

Scenario 2: Agent capacity exhaustion during incident surge

During a major security incident, all agents stop responding and analysts see "capacity unavailable" errors.

Show solution

Root cause: The incident generated hundreds of alerts simultaneously, exhausting the allocated SCU capacity across all agents.

Fix:

  1. Immediate: Navigate to SettingsCapacity management
    • Increase SCU allocation temporarily (e.g., from 3 to 8 SCUs)
  2. Short-term: Adjust agent operational limits:
    • Reduce phishing agent max alerts per hour during the incident
    • Pause the vulnerability agent (non-urgent during active incident)
    • Prioritize alert triage agent capacity
  3. Long-term: Configure agent priority during capacity contention:
    • Navigate to SettingsAgent policiesPriority
    • Set: Alert Triage Agent = Priority 1, Phishing Agent = Priority 2, Others = Priority 3
    • Enable "capacity reservation" for Priority 1 agents (reserve 1 SCU minimum)

Scenario 3: Custom promptbook returns inconsistent results

The weekly vulnerability review promptbook sometimes returns different prioritizations for the same data.

Show solution

Root cause: The prompts use ambiguous language, and the LLM interprets "risk score" differently across runs.

Fix:

  1. Navigate to Promptbook library → Edit the weekly vulnerability promptbook
  2. Make prompts more deterministic:
# Before (ambiguous):
"List vulnerabilities sorted by risk score"

# After (specific):
"List all new vulnerabilities discovered between {start_date} and {end_date}.
Sort by: EPSS score × Asset Criticality Score (Critical=4, High=3, Medium=2, Low=1).
Output as a table with columns: CVE-ID, EPSS, Asset Criticality, Calculated Risk Score, Affected Hosts Count"
  1. Add explicit output format requirements to each prompt
  2. Use input parameters for dates instead of relative terms ("last 7 days" can shift)
  3. Test the updated promptbook 3 times and verify consistent output

Knowledge check

1. Which built-in Security Copilot agent would you enable to automatically classify and triage email-based threats?

2. An agent needs to isolate a compromised device. Based on the orchestration policy configured in this challenge, what happens?

3. What should you configure when agents exhaust capacity during an incident surge?

4. A custom promptbook returns inconsistent results across multiple runs. What is the most effective fix?


Cleanup

Since this challenge involves portal-only agent configuration:

  1. Navigate to SettingsAgentsMicrosoft agents
  2. Disable each agent: Phishing Triage, Alert Triage, Vulnerability Remediation
  3. Navigate to Security StoreInstalled agents
  4. Uninstall Threat Intelligence Enrichment and Compliance Posture agents
  5. Delete custom promptbooks from the Promptbook library
  6. Remove orchestration policies from SettingsAgent policies

⚠️ Cost warning: Active agents consume SCU capacity even when idle (they process incoming alerts). Disable agents when not actively studying.