Microsoft Security Copilot Experiences Demystified for CISOs (part 1)

As organizations evaluate Microsoft Security Copilot, CISOs are increasingly focused on quantifying marketing claims related to cost reductions or greater efficiency of SecOps workflows. These discussions present an opportunity to spotlight how the integration between Microsoft Security Copilot and SecOps tools helps enhance overall effectiveness. Through this blog series I intend to help you better facilitate those conversations by going beyond buzzwords to demystify Microsoft Security Copilot Experiences.

Let’s start with defining what “Security Copilot experience” even means. Basically, there are two ways to access (read: experience) Security Copilot. 

  • Way 1 – the “standalone” experience is similar to how a member of your SecOps Team would access any of the security and compliance tools they use every day – by directly logging in to the respective portal (i.e.: the Microsoft Defender portal, or the Microsoft Purview portal). Security Copilot can also be accessed directly in a “standalone” way through https://securitycopilot.microsoft.com. The main benefit to this approach is if what you’re trying to do or see is something you can only do via Security Copilot.
  • Way 2 – the “embedded” experience is where a member of your SecOps Team works in the way they’ve always worked, but opportunistically leverages “embedded” Security Copilot to speed up or otherwise enhance their investigation and response processes (bypassing the “standalone” experience).

There’s quite an extensive list of embedded experiences which I will be spotlighting throughout this series. Each post will focus on a specific set of products where Security Copilot embedded experiences are currently supported. I will cover what the embedded experiences are, and the main benefit. In this post, let’s focus on the embedded experience within Microsoft Defender XDR, Defender for Cloud, and Defender Threat Intelligence.

Product: Microsoft Defender XDR.

Embedded experienceMain benefits
Analyze filesSophisticated file assessment and analysis provides certificate details and content summary needed for further investigation.
Analyze scripts, codesDetect obfuscation of scripts and PowerShell command lines that are otherwise challenging to discover, and to stop attacks from progressing further.
Summarize incidentsIncidents with up to 100 alerts can be summarized in a single summary, including attack start time, involved assets and entities, Indicators of Compromise (IoCs), and a timeline summary.
Create incident reportsOne-click comprehensive and clear incident reports that also list manual and automated actions implemented, along with analysts’ comments
Generate KQL queries for huntingKusto Query Language can be daunting and it can take a while before analysts become proficient. It’s more efficient to ask a question in natural language (e.g.: get all alerts involving user admin123).
Summarize device informationNo more sifting through device data to determine a device’s security posture, vulnerabilities, or unusual behaviour.
Summarize identitiesSecurity Copilot can help identify suspicious or risky identity-related changes and potential misconfigurations. At the time of this writing, this capability is only available for users but is expected to be expanded to service accounts in the future.
Use guided responseGuided responses from Security Copilot can recommend actions related to triage, containment, investigation, and remediation.

Product: Microsoft Defender for Cloud.

Embedded experienceMain benefits
Analyze and summarize recommendationsSecurity Copilot will summarize recommendations to understand the specific risks and vulnerabilities in your environment in natural language, which lets your SecOps teams prioritize remediation efforts.
Remediate recommendationsOnce a recommendation is summarized, you can use natural language prompts to have Security Copilot assist with remediation. If you’re unable or unsure how to remediate a recommendation, you can ask Copilot for additional information to assist you with more prompts!
Delegate recommendationsRecommendations from the above step can be delegated in alignment with your SecOps triage and response process, so the right people or teams address the risks and vulnerabilities in your environment.
Remediate codeInfrastructure as Code (IaC) misconfigurations and vulnerabilities in your code repositories can be addressed promptly and early in the development cycle by automatically generating Pull Requests (PRs) that correct the weaknesses identified.

Product: Microsoft Defender Threat Intelligence.

Embedded experienceMain benefits
Using Security Copilot for threat intelligenceBuilt-in Defender Threat Intelligence prompts within Security Copilot can quickly summarize the latest threats related to your organization, prioritize which threats to focus on, and learn more about the threat actors involved.

If your organization is currently using Microsoft Security Copilot, I’d be eager to know which of these embedded experiences your SecOps teams are using most frequently. The next post within this series will detail the embedded experiences within Microsoft Purview. Come back to check that out too!

Thanks for reading, and please reach out if you have a question or just want to chat more!