Skip to main content Learn how to get the most out of AI agents, Microsoft 365 Copilot, and more. Join us at the Microsoft 365 Community Conference April 21-23.
Learn more

Security Copilot agents

Security Copilot agents are autonomous AI designed to tackle high-volume security tasks. Built on Security Copilot and seamlessly integrated with Microsoft Security solutions and partner ecosystem, these agents are tailored to security-specific use cases, adapt to your workflows, and learn from feedback, all while keeping your team fully in control. Every agent launched is built on the Security Copilot platform, ensuring a consistent, secure, and unified experience across capabilities.

Get to know these agents today!

Defender agentsEntra agentThreat Intelligence agent3P AgentsPurview agentsIntune agents

Resources by role

Explore our most common roles and scenarios below to better understand how Security Copilot can help you be more efficient and productive in your day-to-day tasks.

Security Operations Center (SOC) analyst

SOC analysts are often faced with the challenges of:

  • Complex and fragmented tooling: A typical organization’s security stack is a complex patchwork with insufficient integration. This piecemeal approach creates gaps in security and is inefficient in time and budget.
  • Immense data volume: The volume of data across identities, devices, clouds, and apps that must be managed and protected continues to expand the threat landscape for organizations. This volume is challenging to manage and may hide vulnerabilities within the organization.
  • Shortage of security expertise: Experienced security talent is difficult to find and train, with one in three cybersecurity jobs sitting vacant. Staff shortages slow response time to security incidents and limit resources to proactive posture management.

Security Copilot helps security analysts:

  1. Catch what others miss: Security Copilot enables teams to reason over real-time threat signals and their organization’s data to cut through noise, detect threats before they cause harm, and reinforce security posture. With out-of-the-box agents, analysts get specialized automation that continuously elevates visibility. Security Copilot is interoperable with Microsoft Security products and Microsoft threat intelligence to help teams uncover deeper insight. 
  2. Outpace adversaries: Security Copilot doesn’t just help analysts keep up with threats — it helps them outrun them. The Threat Hunting Agent accelerates proactive defense by turning natural-language hypotheses into executable KQL with NL2KQL, guiding analysts through endtoend hunts, and automatically surfacing anomalous patterns.  
  3. Strengthen team expertiseIt enables junior staff to perform more advanced capabilities and redirects expert staff to the hardest challenges, elevating the proficiency of the entire team. Built-in agents and skills—like guided responses, vibe hunting, malware/script analysis, autonomous phishing triage, and automated intel briefings—ensure every analyst can operate at a higher level. 

Agents:

  • Phishing Triage AgentAutonomously analyzes user reported phishing emails to separate true threats from false positives, learns from analyst feedback, and provides clear natural language verdicts—cutting manual triage time dramatically.  
  • Dynamic Threat Detection AgentAn always on detection agent that continuously correlates telemetry to create new, context aware detections in real time—surfacing unseen threats traditional rules miss. 
  • Threat Hunting AgentTurns natural language questions into guided, real-time hunts that reveal hidden patterns and meaningful pivots—giving every analyst expert level investigation power with zero query writing. 
  • Threat Intelligence Briefing AgentDelivers daily, tailored intel briefings directly in Microsoft Defender—synthesizing Microsoft global threat insights with customer specific context to surface prioritized risks, clear actions, and relevant assets in minutes. 

Resources:

Phishing Triage AgentDynamic Threat Detection AgentThreat Hunting AgentThreat Intelligence Briefing Agent

IT admin

IT admins are often faced with the challenges of:

  • Adapting to rapidly changing technology: Due to a shortage of skilled IT professionals, particularly in advanced analytics, cloud management, and AI-driven automation, IT teams face significant challenges. They must balance the ongoing needs of maintaining current systems with the complexities involved in adopting new technologies. 
  • Safeguarding organizations against advanced cyber threats: As cybersecurity risks continue to evolve, IT administrators must address vulnerabilities by implementing comprehensive device policies and proactive security measures, all while adapting to shifting regulatory requirements and emerging threat landscapes. 
  • Ensuring worker productivity across a wide range of endpoints and data: Maintaining a consistent and high-quality user experience across devices, operating systems, and locations is critical yet complex. IT teams must be able to efficiently access and act on device, application, compliance, and policy data to proactively identify and resolve issues, optimizing both productivity and the end-user experience. 

Security Copilot helps IT admins resolve endpoint issues by:

  1. Empowering IT: Copilot delivers contextual guidance that removes uncertainty and enhances the capabilities of IT teams through AI-driven expertise. Natural language querying streamlines processes and helps minimize the learning curve for administrators. This feature enables swift access to insights, simplifies troubleshooting procedures, and facilitates action. Additionally, role-aware experiences are tailored to each administrator’s permissions, prioritizing relevant tasks and alleviating cognitive demands. 
  2. Protecting endpoints: Copilot helps IT teams keep pace with evolving threats by proactively surfacing vulnerabilities, automating remediation, and aligning with Zero Trust principles. Intune provides unified visibility and control across all endpoints—including Windows 365 Cloud PCs, Windows, Mac, Android and mobile—so IT teams can manage their entire fleet with less friction.
  3. Optimizing work: Copilot simplifies tasks and helps scale operations efficiently. It offers contextual chat support to help admins troubleshoot quickly, analyzing device policies and suggesting fixes. Instead of reactive problem-solving, Copilot enables proactive management, converting device data into actionable insights and handling complex analyses that usually require extra resources. 

Key scenarios:

  • Manage security and risk: Assess security postures and quickly see device status to determine policy compliance. Instantly identify which devices are missing critical patches with natural language. 
  • Troubleshoot efficiently: Investigate device and app issues quickly and precisely with Copilot gathering and analyzing data for you. Learn more here. 
  • Identify policy conflicts: Reduce the risk of operational disruptions and vulnerabilities caused by conflicting or misconfigured policies. 
  • Draft KQL queries to get device insights: Use Copilot to construct a KQL query and run the query to get device details from single and multiple devices. 
  • Explore data: Interact with data using natural language queries and view customized data sets with the Copilot explorer experience. Learn more here. 
  • Automate with agents: Security Copilot agents in Intune help make complex tasks easier and security stronger. From transforming requirements into policies, to identifying devices for removal, to assessing changes before they impact productivity — these agents help deliver smarter decisions, better compliance, and reduced risk through intelligence and automation Learn more here.
Security Copilot in Intune documentation

Identity admin

Identity admins are often faced with the challenges of:

  • Overwhelming identity threats requiring complex, time-consuming investigations and expertise: They must troubleshoot and adjust policies in real time while maintaining a balance between security and business continuity.
  • Inconsistent IAM policies that increase risk, weaken security, and cause inefficiency: Variations in identity practices, such as unauthorized or undocumented policy adjustments, complicate data correlation, increase the risk of errors, and lead to significant gaps. These inconsistencies reduce operational efficiency and increase exposure to identity-related threads.
  • Operational overload limits IAM focus: Identity admins manage billions of identities, each with unique policies and access rights, while defending against AI-driven attacks. This limits their ability to focus on proactive security improvements and IAM optimization.
  • Cybersecurity talent shortage heightens risks and strains IAM capacity: A shortage of skilled cybersecurity professionals mean identity admins are stretched thin with managing complex IAM systems. When skilled admins are unavailable, routine tasks can be delayed, leading to potential misconfigurations, inefficient processes, and heightened security risks. This impacts both security and operational continuity.

Security Copilot helps identity admins by:

  1. Simplifying repetitive IAM tasks to help automate identity management and policy enforcement. Automating routine activities frees up time to focus on high impact tasks, improving overall productivity and reducing human error.
  2. Helping with AI-driven threat detection, insights, and mitigation. It brings advanced identity contextualization and real time insights to the admins’ fingertips. Natural language summarization brings the most critical context forward, allowing for data-driven decision making.
  3. Providing natural language insights and contextual recommendations. This empowers admins to make data-driven, precise decisions. It helps bridge skill gaps and supports collaboration and makes complex IAM tasks more manageable for less experienced team members. This enables identity teams to handle sophisticated identity challenges more effectively, opening resources to focus on strategic, high impact issues.

Key scenarios:

  • Using Security Copilot in Entra to protect identities and secure access with AI-driven risk detection and mitigation: Security Copilot in Entra enables identity admins to significantly reduce investigation and resolution time by automating the most time-consuming aspects of their work. It automates data gathering, correlation, and contextualization, eliminating the need for admins to manually sift through auth logs, review complex policies, or conduct time-intensive investigations. Instead, Copilot provides natural language summaries that clearly explain elevated user risks, delivers actionable insights tailored to each incident, and offers customized recommendations with quick links to relevant documentation.
  • Using Security Copilot in Entra to troubleshoot access failure during critical access attempts: Identity admins no longer need to spend hours reviewing logs and gathering data (e.g., sifting through auth, application, and network logs), identifying root causes (such as MFA failures due to unregistered devices), and implementing the fix (such as re-registering the device or adjusting policies). With Security Copilot, admins can quickly leverage GenAI to help troubleshoot sign-in events directly in the Microsoft Entra admin center, with succinct summaries of the most relevant information. Copilot helps admins quickly identify the root causes of sign-in failures, interruptions, MFA prompts, and other issues, providing actionable prompts to investigate and resolve problems efficiently.
  • Using Security Copilot in Entra to investigate and remediate risky applications registered in Microsoft Entra: Organizations face challenges in securing service principals and workload identities, which often have elevated access levels and are prime targets for attackers. Traditional IAM solutions focus on user identities, leaving a gap in protecting non-human identities. Microsoft Security Copilot, integrated with Microsoft Entra, extends AI-driven risk detection to service principals and workload identities, enabling admins to quickly identify and remediate risks. Using natural language prompts like “List risky app details for my tenant,” admins can access detailed insights and take action to enhance security. This approach bridges gaps in IAM, ensuring AI-driven protection across all identity types.
  • Assisted incident investigation and troubleshooting with Microsoft Entra skills in Security Copilot: Copilot with Entra can enhance the resolution of identity incidents by streamlining the investigation process. It can quickly summarize and contextual critical information (like user roles, sign-logs, and risk factors) to provide analysts with a clear overview of the situation in natural language. This helps analysts understand the scope and specifics of potential compromises, facilitating faster decision-making and response.

Resources for IT admins:

Microsoft Entra documentationInvestigate risky usersInvestigate security incidents

Data security admin

Data security admins are often faced with the challenges of:

  • Vast data volume and quantity of alerts. The high volume and complexity of alerts leads to alert fatigue, where critical threats might be missed.
  • Incident response time and coordination. Coordinating a timely and effective response to data security incidents requires collaboration across multiple team members and departments. Delays in communication and decision-making can lead to longer resolution times and increased damage.
  • Shortage of expertise. There is a well-documented shortage of skilled cybersecurity professionals, which puts pressure on existing teams to manage a growing number of threats with limited resources. This is worsened by organizations many times having limited resources to increase and train teams.
  • Visibility risk across data and users. The complexity of diverse data environments, including on-premise systems, cloud, and hybrid infrastructures, combined with dynamic user access patterns, makes it challenging for security admins to maintain comprehensive risk visibility.

Security Copilot helps data security admins by:

    1. Uncovering hidden data risks. It analyzes large volumes of data across different solutions to enable integrated investigations. Discover and manage risks across your data security landscape with Data Security Posture Management (DSPM), and explore insights from Information Protection, Data Loss Prevention (DLP), and Insider Risk Management (IRM) under a single dashboard. DSPM provides Security Copilot-powered recommendations on your organization’s data classification, policies, alerts to be prioritize, users to analyze, and take you further into investigations with open prompt questions.
    2. Accelerating data security investigations. Security Copilot enables teams to understand cases and identify risks faster by providing contextual summaries with a single click in IRM and DLP, all within the existing investigation workflow. In IRM, it enables concise visibility from content evaluated against relevant policies and simplifies explorations with contextual evidence. In DLP, it speeds policy tuning timing and supports teams to improve data security coverage and discover additional risks.
    3. Strengthening data security expertise. It can provide actional guidance to upskill your teams, enable more assertive performance, and empower analysts at all levels to conduct advanced investigations. For experienced admins, DSPM centralizes insights across investigations and shows top data security risks, as well as recommendations on how to address, how sensitive the data landscape is, and how data is moving with users. For new admins, DSPM provides aggregated insights and helps them jump start navigating the organization’s landscape.

Key scenarios:

  • Uncover, manage and act on hidden risks. With DSPM as a launchpad for data security analysis, admins will be able to paint a broader picture of their data landscape across Information Protection, DLP and IRM under a single pane of glass. DSPM should be where to go at the beginning of each day to understand where to focus and where to get started.
  • Analyze incidents deeper and more efficiently. When evaluating alerts, data security admins can perform faster investigations by leveraging Security Copilot to gain more context from incidents, distill complex security alerts into concise, actionable summaries, which enables quicker response times and streamlined decision-making. Moreover, teams can use Copilot-driven analytics to enhanced alert and user investigation in IRM, double clicking into a user’s risk profile, and activities, beyond the alert summary. Users will be able to expand prompts available in DLP beyond the alert summary, such as data/user-specific investigation and prompts and filters in Activity Explorer.
  • Discover protection gaps and streamline controls. Data security admins can streamline policy tuning and policy planning, improving coverage and controls, with Copilot-powered DLP policy gap analysis, based on each organization’s data landscape needs and vulnerabilities.
  • Expedite data security investigation. Uplevel data security investigations natural language search that doesn’t require query language knowledge, summarization capabilities that accelerate incident exploration and understanding, and interrogation with deep content analysis in DSPM.
  • Explore AI-powered guidance to empower teams. Receive actionable guidance through Knowledge Hub to understand your data landscape and better explore the Purview solutions, with relevant deep links to recommended actions and next steps to optimize investigations and workloads.

Resources for data security admins:

Copilot for Purview at IgniteNinja training videoEmpowering organizations with integrated data securityWhat's new in Copilot in Microsoft PurviewHarnessing the power of generative AI to protect your dataSecurity Copilot in Microsoft Purview technical documentation

Security Copilot for Small and Medium Business

Security Copilot offers small businesses a powerful tool to enhance their security posture and respond to threats more effectively. By leveraging AI, it increases the efficiency and capabilities of security teams, allowing them to detect and mitigate cyber threats swiftly. Integration with the Microsoft security products you’ve already deployed ensures comprehensive coverage across multiple platforms and devices, while the step-by-step guidance empowers both junior and senior staff. Security Copilot helps reduce operational costs by minimizing the need for extensive security personnel and managing vast data volumes efficiently and provides small businesses with a cost-effective, proactive approach to maintaining robust security.

Watch our videos below to get started.

Getting started with Security CopilotMicrosoft Entra and Security CopilotGet started with Security Copilot in IntuneNew Defender XDR Security Copilot capabilitiesSecurity Copilot in Purview supports security investigations

Security Copilot experiences

Security Copilot seamlessly integrates and is natively embedded across Microsoft Security solutions to safeguard your entire organization. It consumes signals from each security tool and provides natural language guidance to increase team efficiency and manage daily security and IT workflows. Security Copilot is not a replacement for these tools; instead, Security Copilot’s generative AI enables security and IT professionals to access, summarize, and act on insights from their tools faster.

Join the Security Copilot Customer Connection Program (CCP)

Join now to access free technical skilling webinars and participate in private previews. Hear straight from our product engineers and get a sneak peek into the Security Copilot product roadmap. Membership is free and perks are plenty! A valid Microsoft NDA is required to opt-in. Please choose Security Copilot when prompted for which community you want to join.

Join now
Microsoft Security Copilot