Learning Path 2 - Lab 1 - Exercise 1 - Explore Microsoft Security Copilot
Lab scenario
The organization you work for wants to increase the efficiency and capabilities for its security operations analysts, and to improve security outcomes. In support of that objective, the office of the CISO determined that deploying Microsoft Security Copilot is a key step towards that objective. As a Security administrator for your organization, you’re tasked with setting up Copilot.
In this exercise, you go through the first run experience of Microsoft Security Copilot to provision Copilot with one security compute unit (SCU).
Note: The environment for this exercise is a simulation generated from the product. As a limited simulation, links on a page may not be enabled and text-based inputs that fall outside of the specified script may not be supported. A pop-up message will display stating, “This feature is not available within the simulation.” When this occurs, select OK and continue the exercise steps.
:::image type=”content” source=”../media/simulation-pop-up-error.png” alt-text=”Screenshot of pop-up screen indicating that this feature is not available within the simulation.”:::
Estimated time to complete this lab: 45 minutes
Task 1: Provision Microsoft Security Copilot
For this exercise, you’re logged in as Avery Howard and you have the global administrator role in Microsoft Entra. You’ll work in both the Azure portal and Microsoft Security Copilot.
This exercise should take approximately 15 minutes to complete.
Note: When a lab instruction calls for opening a link to the simulated environment, it is generally recommended that you open the link in a new browser window so that you can simultaneously view the instructions and the exercise environment. To do so, select the right mouse key and select the option.
Before users can start using Copilot, admins need to provision and allocate capacity. To provision capacity:
- You must have an Azure subscription.
- You need to be an Azure owner or Azure contributor, at a resource group level, as a minimum.
In this task, you walk through the process of ensuring you have the appropriate role permissions. This starts by enabling access management for Azure resources.
Once you’re assigned the User Access Administrator role in Azure, you can assign a user the necessary access to provision SCUs for Copilot. For the purpose of this exercise only, which is to show you the steps involved, you will be assigning yourself the necessary access. The steps that follow will guide you through the process.
-
Open the simulated environment by selecting this link: Azure portal.
- You’ll start by enabling Access management for Azure resources. To access this setting:
- From the Azure portal, select Microsoft Entra ID.
- From the left navigation panel, expand Manage.
- From the left navigation panel, scroll down and select Properties.
- Enable the toggle switch for Access management for Azure resources, then select Save.
- Now that you can view all resources and assign access in any subscription or management group in the directory, assign yourself the Owner role for the Azure subscription.
- From the blue banner on the top of the page, select Microsoft Azure to return to the landing page of the Azure portal.
- Select Subscriptions then select the subscription listed Woodgrove - GTP Demos (Exernal/Sponsored).
- Select Access control (IAM).
- Select Add, then Add role assignment.
- From the Role tab, select Privileged administrator roles.
- Select Owner, then select Next.
- Select + Select members.
- Avery Howard is the first name on this list, select the + to the right of the name. Avery Howard is now listed under selected members. Select the Select button, then select Next.
- Select Allow user to assign all roles except privileged administrator roles, Owner, UAA, RBAC (Recommended).
- Select Review + assign, then select Review + assign one last time.
As an owner to the Azure subscription, you’ll now be able to provision capacity within Copilot.
Sub-task 1: Provision capacity
In this task, you go through the steps of provisioning capacity for your organization. There are two options for provisioning capacity:
- Provision capacity within Security Copilot (recommended)
- Provision capacity through Azure
For this exercise, you provision capacity through Security Copilot. When you first open Security Copilot, a wizard guides you through the steps in setting up capacity for your organization.
-
Open the simulated environment by selecting this link: Microsoft Security Copilot.
- Follow the steps in the Wizard, select Get started.
- On this page, you set up your security capacity. For any of the fields listed below, you can select the information icon for more information.
- Azure subscription: From the drop-down, select Woodgrove - GTP Demos (External/Sponsored).
- Resource group: From the drop-down, select RG-1.
- Capacity name: Enter a capacity name.
- Prompt evaluation location [Geo]: From the drop-down, select your region.
- You can choose whether you want to select the option, “If this location has too much traffic, allow Copilot to evaluate prompts anywhere in the world (recommended for optimal performance).
- Capacity region is set based on location selected.
- Security compute: This field is automatically populated with the minimum required SCU units, which is 1. Leave field with the value of 1.
- Select the box, “I acknowledge that I have read, understood, and agree to the Terms and Conditions.
- Select Continue on the bottom right corner of the page.
-
The wizard displays information about where your customer data will be stored. The region displayed is based on the region you selected in the Prompt evaluation field. Select Continue.
-
You can select options to help improve Copilot. You can select the toggle based on your preferences. Select Continue.
- As part of the initial setup, Copilot provides contributor access to everyone by default and includes Global administrators and Security administrators as Copilot owners. In your production environment, you can change who has access to Copilot, once you’ve completed the initial setup. Select Continue.
- You’re all set! Select Finish.
- Close the browser tab, as the next exercise will use a separate link to the lab-like environment.
Task 2: Explore the Microsoft Security Copilot standalone experience
The security administrator for your organization provisioned Copilot. Since you’re the senior analyst on the team, the administrator added you as a Copilot owner and asked you to familiarize yourself with the solution.
In this exercise, you explore all the key landmarks in the landing page of the standalone experience of Microsoft Security Copilot.
You’re logged in as Avery Howard and have the Copilot owner role. You’ll work in the standalone experience of Microsoft Security Copilot.
This exercise should take approximately 15 minutes to complete.
Sub-task 1: Explore the menu options
In this task, you start your exploration in the home menu.
-
Open the simulated environment by selecting this link: Microsoft Security Copilot.
-
Select the Menu icon , which is sometimes referred to as the hamburger icon.
- Select My sessions and note the available options.
- Select recent to view the most recent sessions
- Select filter and note the available options, then close the filer.
- Select the home menu icon to open the home menu.
- Select Promptbook library.
- Select My promptbooks. A subsequent task dives deeper into promptbooks.
- Select Woodgrove.
- Select Microsoft.
- Select filter to view the available options, then select the X to close.
- Select the home menu icon to open the home menu.
- Select Owner settings. These settings are available to you as a Copilot owner. A Copilot contributor does have not access to these menu options.
- For plugins for Security Copilot, select the drop-down for Who can add and manage their own custom plugins to view the available options.
- Select drop-down for Who can add and manage custom plugins for everyone in the organization to view the available options. Note, this option is greyed out if Who can add and manage their own custom plugins is set to owners only.
- Select the information icon next to “Allow Security Copilot to access data from your Microsoft 365 Services.” This setting must be enabled if you want to use the Microsoft Purview plugin. You’ll work with this setting in a later exercise.
- Select the drop-down for who can upload files to view the available options.
- Select the home menu icon to open the home menu.
- Select Role assignment.
- Select Add members, then close.
- Expand owner.
- Expand contributor.
- Select the home menu icon to open the home menu.
- Select Usage monitoring.
- Select the date filter to view available options.
- Select the home menu icon to open the home menu.
- Select Settings.
- Select preferences. Scroll down to view available options.
- Select data and privacy.
- Select About.
- Select the X to close the preferences window.
- Select where it says Woodgrove at the bottom left of the home menu.
- When you select this option, you see your tenants. This is referred to as the tenant switcher. In this case, Woodgrove is the only available tenant.
- Select the Home to return to the landing page.
Sub-task 2: Explore access to recent sessions
In the center of the landing page, there are cards representing your most recent sessions.
- The largest card is your last session. Selecting the title of any session card takes you to that session.
- Select View all sessions to go to the My sessions page.
- Select Microsoft Copilot for Security, next to the home menu icon, to return to the landing page.
Sub-task 3: Explore access to promptbooks
The next section of the Copilot landing page revolves around promptbooks. The landing page shows tiles for some Microsoft security promptbooks. Here you explore access to promptbooks and the promptbook library. In a subsequent exercise, you explore creating and running a promptbook.
-
To the right of where it says “Get started with these promptbooks” are a left and right arrow key that allows you to scroll through the tiles for Microsoft security promptbooks. Select the right arrow >
- Each tile shows the title of the promptbook, a brief description, the number of prompts, and a run icon. Select the title of any of the promptbook tiles to open that promptbook. Select Vulnerability impact assessment, as an example.
- The window for the selected promptbook provides information, including who created the promptbook, tags, a brief description, inputs required to run the promptbook, and a listing of the prompts.
- Note the information about the promptbook and the available options. For this simulation you can’t start a new session, you’ll do that in a subsequent exercise.
- Select X to close the window.
- Select View the promptbook library.
- To view promptbooks that you own, select My promptbooks.
- Select Woodgrove for a listing of promptbooks owned by Woodgrove, the name of a fictitious organization.
- To view built-in, Microsoft owned/developed promptbooks, select Microsoft.
- Select the filter icon. Here you can filter based on tags assigned to the workbook. Close the filter window by selecting the X in the New filter tab.
- Select Microsoft Copilot for Security, next to the home menu icon, to return to the landing page.
Sub-task 4: Explore the prompts and sources icon in the prompt bar
At the bottom center of the page is the prompt bar. The prompt bar includes the prompts and sources icon, which you explore in this task. In subsequent exercises you’ll enter inputs directly in the prompt bar.
- From the prompt bar, you can select the prompts icon to select a built-in prompt or a promptbook. Select the prompts icon .
- Select See all promptbooks
- Scroll to view all the available promptbooks.
- Select the back-arrow next to the search bar to go back.
- Select See all system capabilities. The list shows all available system capabilities (these capabilities are in effect prompts that you can run). Many system capabilities are associated with specific plugins and as such will only be listed if the corresponding plugin is enabled.
- Scroll to view all the available promptbooks.
- Select the back-arrow next to the search bar to go back.
- Select See all promptbooks
- Select the sources icon .
- The sources icon opens the manage sources window. From here, you can access Plugins or Files. The Plugins tab is selected by default.
- Select whether you want to view all plugins, those that are enabled (on), or those that are disabled (off).
- Expand/collapse list of Microsoft, non-Microsoft, and custom plugins.
- Some plugins require configuring parameters. Select the Set up button for the Microsoft Sentinel plugin, to view the settings window. Select cancel to close the settings window. In a separate exercise, you configure the plugin.
- You should still be in the Manage sources window. Select Files.
- Review the description.
- Files can be uploaded and used as a knowledge base by Copilot. In a subsequent exercise, you’ll work with file uploads.
- Select X to close the manage sources window.
- The sources icon opens the manage sources window. From here, you can access Plugins or Files. The Plugins tab is selected by default.
Sub-task 5: Explore the help feature
At the bottom right corner of the window is the help icon where you can easily access documentation and find solutions to common problems. From the help icon, you also submit a support case to the Microsoft support team if you have the appropriate role permissions.
- Select the Help (?) icon.
- Select Documentation. This selection opens a new browser tab to the Microsoft Security Copilot documentation. Return to the Microsoft Security Copilot browser tab.
- Select Help.
- Anyone with access to Security Copilot can access the self help widget by selecting the help icon then selecting the Help tab. Here you can find solutions to common problems by entering something about the problem.
- Users with a minimum role of Service Support Administrator or Helpdesk Administrator role can submit a support case to the Microsoft support team. If you have this role, a headset icon is displayed. Close the contact support page.
Task 3: Explore the Microsoft Security Copilot embedded experience
In this exercise, you investigate an incident in Microsoft Defender XDR. As part of the investigation, you explore the key features of Microsoft Copilot in Microsoft Defender XDR, including incident summary, device summary, script analysis, and more. You also pivot your investigation to the standalone experience and use the pin board as a way to share details of your investigation with your colleagues.
You’re logged in as Avery Howard and have the Copilot owner role. You’ll work in Microsoft Defender, using the new unified security operations platform, to access the embedded Copilot capabilities in Microsoft Defender XDR. Towards the end of the exercise, you pivot to the standalone experience of Microsoft Security Copilot.
This exercise should take approximately 30 minutes to complete.
Sub-task 1: Explore Incident summary and guided responses
-
Open the simulated environment by selecting this link: Microsoft Defender portal.
- From the Microsoft Defender portal:
- Expand Investigation & response.
- Expand Incidents & alerts.
- Select Incidents.
-
Select the first incident in the list, Incident Id: 30342 named Human-operated ransomware attack was launched from a compromised asset (attack disruption).
- This is a complex incident. Defender XDR provides a great deal of information, but with 72 alerts it can be a challenge to know where to focus. On the right side of the incident page, Copilot automatically generates an Incident summary that helps guide your focus and response. Select See more.
- Copilot’s summary describes how this incident has evolved, including initial access, lateral movement, collection, credential access and exfiltration. It identifies specific devices, indicates that the PsExec tool was used to launch executable files, and more.
- These are all items you can leverage for further investigation. You explore some of these in subsequent tasks.
- Scroll down on the Copilot panel and just beneath the summary are Guided responses. Guided responses recommend actions in support of triage, containment, investigation, and remediation.
- The first item in the triage category it to Classify this incident. Select Classify to view the options. Review the guided responses in the other categories.
- Select the Status button at the top of the guided responses section and filter on Completed. Two completed activities show labeled as Attack Disruption. Automatic attack disruption is designed to contain attacks in progress, limit the impact on an organization’s assets, and provide more time for security teams to remediate the attack fully.
- Keep the incident page open, you’ll use it in the next task.
Sub-task 2: Explore device and identity summary
-
From the incident page, select the first alert Suspicious URL clicked.
-
Copilot automatically generates an Alert summary, which provides a wealth of information for further analysis. For example, the summary identifies suspicious activity, it identifies data collection activities, credential access, malware, discovery activities, and more.
-
There’s a lot of information on the page, so to get a better view of this alert, select Open alert page. It’s on the third panel on the alert page, next to the incident graph and below the alert title.
-
On the top of the page, is card for the device parkcity-win10v. Select the ellipses and note the options. Select Summarize. Copilot generates a Device summary. It’s worth nothing that there are many ways you can access device summary and this is just one convenient method. The summary shows the device is a VM, identifies the owner of the device, it shows its compliance status against Intune policies, and more.
-
Next to the device card is a card for the owner of the device. Select parkcity\jonaw. The third panel on the page updates from showing details of the alert to providing information about the user Jonathan Wolcott, an account executive, whose Microsoft Entra ID risk and Insider risk severity are classified as high. These aren’t surprising given what you’ve learned from the Copilot incident and alert summaries. Select the ellipses then select Summarize to obtain an identity summary generated by Copilot.
-
Keep the alert page open, you’ll use it in the next task.
Sub-task 3: Explore script analysis
-
Let’s Focus on the alert story. Select Maximize , located on the main panel of the alert, just beneath the card labeled ‘partycity\jonaw’ to get a better view of the process tree. From maximized view, you begin to get a clearer view of how this incident came to be. Many line items indicate that powershell.exe executed a script. Since the user Jonathan Wolcott is an account executive, it’s reasonable to assume that executing PowerShell scripts isn’t something this user is likely to be doing regularly.
- Expand the first instance of powershell.exe execute a script, it’s the one showing the timestamp of 4:57:11 AM. Copilot has the capability to analyze scripts. Select Analyze.
- Copilot generates an analysis of the script and suggests it could be a phishing attempt or used to deliver a web-based exploit.
- Select Show code. The code shows a defanged URL.
-
There are several other items that indicate powershell.exe executed a script. Expand the one labeled powershell.exe -EncodedCommand… with the timestamp 5:00:47 AM. The original script was base 64 encoded, but Defender has decoded that for you. For the decoded version, select Analyze. The analysis highlights the sophistication of the script used in this attack.
- Close the alert story page by selecting the X (the X that is to the left of Copilot panel). Now use the breadcrumb to return to the incident. Select Human-operated ransomware attack was launched from a compromised asset (attack disruption).
Sub-task 4: Explore file analysis
-
You’re back at the incident page. In the alert summary, Copilot identified the file Rubeus.exe, which is associated with the ‘Kekeo’ malware. You can use the file analysis capability in Defender XDR to see what other insights you can get. There are several ways to access files. From the top of the page, select the Evidence and Response tab.
- From the left side of the screen select Files.
- Select the first item from the list with the entity named Rubeus.exe.
- From the window that opens, select Analyze. Copilot generates a summary.
- Review the detailed file analysis that Copilot generates.
- Close the file analysis window.
Sub-task 5: Pivot to the standalone experience
This task is complex and requires the involvement of more senior analysts. In this task, you pivot your investigation and run the Defender incident promptbook so the other analysts have a running start on the investigation. You pin responses to the pin board and generate a link to this investigation that you can share with more advanced members of the team to help investigate.
-
Return to the incident page by selecting the Attack story tab from the top of the page.
-
Select the ellipses next to Copilot’s Incident summary and select Open in Copilot for Security.
- Copilot opens in the standalone experience and shows the incident summary. You can also run more prompts. In this case, you’ll run the promptbook for an incident. Select the prompt icon .
- Select See all promptbooks.
- Select Microsoft 365 Defender incident investigation.
- The promptbook page opens and asks for the Defender Incident ID. Enter 30342 then select Run.
- Review the information provided. By pivoting to the standalone experience and running the promptbook, the investigation is able to invoke capabilities from a broader set security solution, beyond just Defender XDR, based on the plugins enabled.
-
Select the box icon next to the pin icon to select all the prompts and and the corresponding responses, then select the Pin icon to save those responses to the pin board.
-
The pin board opens automatically. The pin board holds your saved prompts and responses, along with a summary of each one. You can open and close the pin board by selecting the pin board icon .
-
From the top of the page, select Share to view your options. By sharing the incident via a link or email, people in your organization with Copilot access can view this session. Close the window by selecting the X.
- You can now close the browser tab to exit the simulation.
Summary and additional resources
In this exercise, you explored the first run experience of Microsoft Security Copilot, provisioned capacity, and explored the standalone and embedded experiences of Copilot. You investigated an incident in Microsoft Defender XDR, explored the incident summary, device summary, script analysis, and more. You also pivoted your investigation to the standalone experience and used the pin board as a way to share details of your investigation with your colleagues.
To run additional Microsoft Security Copilot use case simulations, browse to Explore Microsoft Security Copilot use case simulations