-
Book Overview & Buying
-
Table Of Contents
Microsoft Security Copilot
By :
In this chapter, you were introduced to the processes for setting up and customizing Security Copilot, as well as navigating its user interfaces. The chapter concluded with a real-life case study of a security incident investigation, allowing you to observe Security Copilot’s application in real-world security scenarios and understand the synergy between its various components. By gaining a clear understanding of both the embedded and standalone experiences, you can better leverage the platform’s AI capabilities to address your specific security needs.
In the next chapter, you will explore how various plugins extend Security Copilot’s functionalities. It will cover both pre-installed Microsoft plugins and third-party options, as well as the development of custom plugins tailored to unique security requirements. This will build on the foundation you’ve established, enhancing your ability to adapt the tool to your specific needs.