Administrative and Security Aspects of Security Copilot

In this blog post, we will delve into the administrative and security aspects of Microsoft Security Copilot. We'll cover how to enable plugins, assign user roles, who has the authority to enable plugins and the activities that can only be performed by the owner.

Login to  https://securitycopilot.microsoft.com/.

Enabling Plugins

Plugins are essential for extending the functionality of Microsoft Security Copilot. Here's how you can enable them:

  1. Access the Admin Portal: Log in to the Microsoft Security Copilot admin portal.
  2. Navigate to Plugins: Go to the 'Plugins' section in the navigation menu.
  3. Select the Plugin: Choose the plugin you want to enable from the list of available plugins.
  4. Enable the Plugin: Click on the 'Enable' button. You may need to configure specific settings depending on the plugin.

Activities Exclusive to the Owner

Certain activities within Microsoft Security Copilot can only be performed by the owner. These include:

  • System Configuration: Only the owner can make changes to the core system settings.
  • User Role Management: While admins can assign roles, only the owner can create or delete roles.
  • Plugin Management: The owner has the final authority to enable, disable, or remove plugins.
  • Audit Logs: Access to detailed audit logs is restricted to the owner to ensure the integrity of security monitoring.

Assigning User Roles

Assigning user roles is crucial for managing access and permissions within Microsoft Security Copilot. Here’s how you can do it:

  1. Go to User Management: In the admin portal, navigate to the 'User Management' section.
  2. Select a User: Choose the user you want to assign a role to.
  3. Assign a Role: Select the appropriate role from the dropdown menu. Common roles include Admin, Analyst, and Viewer.
  4. Save Changes: Click 'Save' to apply the changes.

s

Conclusion

Understanding the administrative and security aspects of Microsoft Security Copilot is essential for maintaining a secure and efficient environment. By knowing how to enable plugins, assign user roles, and understand the exclusive activities of the owner, you can better manage and protect your organization's security infrastructure.