Wednesday, December 18, 2024
HomeCyber AIMicrosoft Copilot for Security: AI tool to Help Security and IT professionals

Microsoft Copilot for Security: AI tool to Help Security and IT professionals

Published on

SIEM as a Service

Microsoft Copilot for security was a generative AI solution that can help security and IT professionals handle their security operations much more efficiently.

This was claimed to be the industry’s first generative AI solution for strengthening an organization’s security expertise. 

However, Microsoft has announced that Microsoft Copilot for security will be available worldwide by April 1, 2024.

- Advertisement - SIEM as a Service

Microsoft also stated that Copilot’s threat intelligence comprises 78 Trillion security signals that are processed by Microsoft every single day.

This is combined with Large language models (LLMs) to deliver the best possible insights and guidance towards the next steps.

Microsoft has recently introduced PyRIT, a Red Team tool designed to assist in the creation of generative AI systems. This tool’s capabilities enable it to identify weaknesses in AI systems and identify potential vulnerabilities that can be exploited.

PyRIT utilizes a combination of automated techniques and expert knowledge to create a more efficient and effective Red Team process for generative AI systems.

Microsoft Copilot for Security

According to the reports shared with Cyber Security News, Copilot for Security’s economic study reveals that experienced security professionals could perform complex security functions swiftly and more accurately.

In addition, Microsoft specified that experienced security analysts could work 22% faster by using Copilot for security.

Studies of Copilot for Security (Source: Microsoft)
Studies of Copilot for Security (Source: Microsoft)

Moreover, 97% of the users mentioned wanting to use Copilot when doing the next task.

This study focused on experienced security professionals and a randomized controlled trial published last November.

Both of these studies combined showed that people with any level of experience and expertise can use Copilot effectively.

Pay-as-you-go Model & Global Availability

Alongside this new public availability, Microsoft has also launched its pay-as-you-go Licensing model for Copilot for Security, enabling access to a wide range of organizations.

Microsoft mentioned, “With this flexible, consumption-based pricing model, you can get started quickly, then scale your usage and costs according to your needs and budget.”

Copilot is described as multilingual and capable of processing prompts in eight languages.

Furthermore, the interface contains 25 different languages, making it readily available and usable across major regions, including North America, South America, Europe, and Asia.

Microsoft detailed the workflow in a video.

New Innovations and AI-powered Security

As Copilot becomes available worldwide, Microsoft has also added additional capabilities, such as 

  • Custom promptbooks – Create and save self-made Natural language prompts for common security tasks.
  • Knowledgebase Integrations – Integrate Copilot for security with business logic and perform tasks based on step-by-step guides.
  • Multi-language support – Process prompts and respond in eight different languages with 25 supported interfaces
  • Third-party Integrations – Integrate with global partners that work on developing integrations and services.
  • Connection with External Attack Surface from Microsoft Defender ASM – Identify and analyze the most recent information from external attack surface risks.
  • Microsoft Entra Audit Logs and Diagnostic Logs – Gather additional insights for a security investigation or IT issue analysts of audit logs associated with specific user/events summarized in natural language.
  • Usage reporting – Dashboard insights on how teams are using Copilot and identify more opportunities.

This AI-powered Copilot for Security is available as two rich user experiences: an immersive standalone portal or embedded into security products.

Integrating Copilot with Microsoft Security Products is even easier for IT and security professionals, as it offers the advantages of speed and accuracy demonstrated in the Microsoft study.

Furthermore, Copilot still has many more features and capabilities in an organization’s security infrastructure.

Microsoft has also mentioned additional features that are coming soon, such as a unified security operations platform, Copilot in Microsoft Entra, Copilot in Microsoft Purview, and Copilot in Microsoft Intune.

Some of these features are currently available, and others have yet to be made available.

With Perimeter81 malware protection, you can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits. All are incredibly harmful and can wreak havoc on your network.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Eswar
Eswar
Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Cyber Criminals Exploit Windows Management Console to Deliver Backdoor Payloads

A recent campaign dubbed FLUX#CONSOLE has come to light, leveraging Microsoft Common Console Document (.MSC) files...

Texas Tech Systems Breach, Hackers Accessed System Folders & Files

The Texas Tech University Health Sciences Center (TTUHSC) and Texas Tech University Health Sciences...

Beware of Malicious Ads on Captcha Pages that Deliver Password Stealers

Malicious actors have taken cybercrime to new heights by exploiting captcha verification pages, a...

Hitachi Authentication Bypass Vulnerability Allows Attackers to Hack the System Remotely

Critical Authentication Bypass Vulnerability Identified in Hitachi Infrastructure Analytics Advisor and Ops Center Analyzer.A...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Cyber Criminals Exploit Windows Management Console to Deliver Backdoor Payloads

A recent campaign dubbed FLUX#CONSOLE has come to light, leveraging Microsoft Common Console Document (.MSC) files...

Texas Tech Systems Breach, Hackers Accessed System Folders & Files

The Texas Tech University Health Sciences Center (TTUHSC) and Texas Tech University Health Sciences...

Beware of Malicious Ads on Captcha Pages that Deliver Password Stealers

Malicious actors have taken cybercrime to new heights by exploiting captcha verification pages, a...