Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Security Store in the Microsoft Defender portal offers various agents that help you perform your security tasks efficiently. These agents include Microsoft Security Copilot agents published by Microsoft and partners. These agents integrate with Microsoft Defender and carry out various security operations (SOC) tasks, such as incident triage, investigation, threat hunting, and threat intelligence.
This article explains how to discover and deploy AI agents in Microsoft Defender.
Note
To learn more about publishing agents to Security Store, see Publish agents to Microsoft Security Store.
Prerequisites
To purchase, deploy, and use agents from Security Store, you need:
- Access to a Security Copilot workspace provisioned with SCU capacity.
- For partner-published agents, you need the Azure subscription contributor or owner role.
Discover and deploy agents in the Microsoft Defender portal
To discover and deploy agents in the Microsoft Defender portal:
Select Security Copilot > Security Store.
Browse or search for the agent you want to deploy.
Select the agent to view its details, including its capabilities, requirements, and setup instructions.
To purchase and deploy the agent:
Select Get agent to begin the deployment process if you have sufficient permissions. For more information, see Prerequisites.
Select Copy link to copy the agent's details page URL and share it with a security administrator, if you don't have permissions to deploy agents.
For partner-published agents, complete the purchase and deploy on the Security Store website, as described in the Microsoft Security Store documentation.
You can manage centralized purchases for partner-published agents through public offers, or through private offers, as described in How to Purchase SaaS Solutions (Private Offers).
After purchasing the agent, select Security Copilot > Agents, find your agent in the Ready for setup section, and then select Set up to begin agent setup.
For more information on setting up, managing, and running partner-published agents, see Manage Security Copilot agents.
For more information on Microsoft Security Copilot agents, see Microsoft Security Copilot agents in Microsoft Defender.
After setup, the agent appears in the Agents in use section.
Microsoft Security Copilot agents in Microsoft Defender
This section details the Microsoft Security Copilot agents that are available in the Microsoft Defender portal.
- Security Alert Triage Agent (Preview)
- Threat Intelligence Briefing Agent
- Threat Hunting Agent
- Security Analyst Agent
- Dynamic Threat Detection Agent
Security Alert Triage Agent (Preview)
Note
The Security Alert Triage Agent is the same agent as the Phishing Triage Agent with extended capabilities to triage a broader set of alert types. The Security Alert Triage Agent is available only to customers who are part of the preview. If you aren't part of the preview, the Phishing Triage Agent continues to be available in Security Store.
The Security Alert Triage Agent is an autonomous agent that helps security teams triage alerts at scale across multiple workloads. The agent applies AI-driven, dynamic reasoning to deliver clear verdicts for supported security workloads. This is the same agent as the Phishing Triage Agent, which has demonstrated measurable improvements in triage accuracy and efficiency. The agent can now triage a broader set of alerts in Microsoft Defender, including email and collaboration alerts (generally available), and cloud and identity alerts (preview). The agent operates autonomously, provides transparent rationale for its classification verdicts in natural language, and continuously learns and improves its accuracy based on feedback from analysts.
| Attribute | Description |
|---|---|
| Identity | Create a new agent identity or connect to an existing user account |
| License | Depends on alert types:
|
| Permissions | The agent requires these permissions to operate, depending on the alert types you want to triage:
|
| Plugins | The agent automatically activates these Security Copilot plugins: |
| Products |
|
| Role-based access | Security Administrator Microsoft Entra role is required to set up and manage the agent Users with the same permissions as the Security Alert Triage Agent can view the agent's activity and results, and provide feedback on the agent's classification verdict. |
| Trigger | Runs automatically when a new alert is detected for the configured alert types, including user-reported emails (for email and collaboration alerts), cloud security alerts (for cloud alerts), and identity alerts. |
Threat Intelligence Briefing Agent
The Threat Intelligence Briefing Agent provides security operations teams with regular, customized threat intelligence briefings. The agent autonomously gathers and synthesizes relevant threat intelligence data from various sources, delivering concise and actionable insights to help analysts stay informed about emerging threats and trends.
| Attribute | Description |
|---|---|
| Identity | Create a new agent identity or connect to an existing user account |
| License | Not Applicable |
| Permissions | Required permissions:
|
| Products | Security Copilot |
| Plugins | The following plugins are required to run this agent:
|
| Role-based access | The Security Administrator role is required to set up and manage the agent. Users with the same permissions as the Threat Intelligence Briefing Agent can view the agent's activity and results. |
| Trigger | Runs at the set time interval that you configured during setup, or manually when you want to run it |
Configure Defender for Endpoint permissions for the agent identity
When running the Threat Intelligence Briefing Agent with an agent identity, you must also configure the following Defender for Endpoint role permissions and Device Group access. Without these permissions, the Exposure Report may show as "not available" or return zero CVEs even when vulnerabilities exist in your environment.
Step 1 – Update the agent role permissions
- Sign in to the Microsoft Defender portal.
- Navigate to Settings > Endpoints > Permissions > Roles.
- Locate the custom role assigned to the Threat Intelligence Briefing Agent.
- Edit the role and confirm that the following permissions are enabled:
- Advanced Hunting – Read
- Vulnerability Management – Read
- Machine Configuration – Read
- Device Inventory – Read
- Save any changes if updates are made.
Step 2 – Grant Device Group access to the agent
- In the Microsoft Defender portal, go to Settings > Endpoints > Device Groups.
- For each Device Group that contains production endpoints:
- Open the Device Group.
- Select the User Access section.
- Add the Threat Intelligence Briefing Agent identity.
- Assign Read access.
- Save the changes.
Important
Allow time for permission updates to synchronize across Microsoft Defender services before running the agent.
Threat Hunting Agent
The Threat Hunting Agent revolutionizes threat hunting by enabling you to investigate threats using natural language from start to finish. It not only generates KQL queries but also interprets results, surfaces insights, and guides you through full hunting sessions. These capabilities empower you to hunt threats faster, more accurately, and with greater confidence.
Security Analyst Agent
The Security Analyst Agent helps security analysts quickly identify, assess, and prioritize risks by performing ready-to-use or custom analyses on security data. The agent provides actionable and prioritized insights, recommendations, and reports to uncover top vulnerabilities and risks. It supports data from Microsoft Defender XDR, Sentinel Log Analytics, or Sentinel Data Lake, and can perform complex analysis tasks such as anomaly detection, clustering, risk scoring, and forecasting without requiring code or queries.
| Attribute | Description |
|---|---|
| Identity | Tied to your user identity; each user configures the agent independently |
| License | Not Applicable |
| Permissions | Read access to Microsoft Defender XDR, Microsoft Sentinel Log Analytics Workspace, or Microsoft Sentinel Data Lake, depending on the data source you choose |
| Products |
|
| Role-based access | Users with read access to the selected data sources can configure and use the agent. |
| Trigger | Runs on demand when you enter a security analysis prompt in the agent chat or select Analyze with copilot from advanced hunting query results |
Dynamic Threat Detection Agent
The Dynamic Threat Detection Agent in the Defender portal is an always-on, adaptive backend service that uncovers hidden threats across Defender and Microsoft Sentinel environments. It uses AI to identify gaps and uncover false negatives by correlating alerts, events, anomalies, and threat intelligence. When the agent identifies a gap, it generates a dynamic alert with the full context in the alert details, including natural language explanations, mapped MITRE ATT&CK techniques, and tailored remediation steps.