From the course: Complete Guide to Microsoft Copilot for Security: Empower and Protect the Security Operations Center (SOC) by Microsoft Press
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
3.5 Prompt engineering examples: MDTI and EASM - Microsoft Security Copilot Tutorial
From the course: Complete Guide to Microsoft Copilot for Security: Empower and Protect the Security Operations Center (SOC) by Microsoft Press
3.5 Prompt engineering examples: MDTI and EASM
- The next use case is around threat hunting with MDTI, that Microsoft Defender Threat Intelligence. So again, this is taking that advanced premium data that is provided along with Copilot for security, at least in the current scenario as of this publication. So the Copilot for security can then tell me about what this advanced threat actor is doing. What are their tactics and procedures? What are the things that they actually are targeting? What are the tool sets that they use? And I can then tie that together with that massive amount of data that Microsoft has compiled and all of that signal that's pulled in on a daily basis to then understand what's going on. Tie that in with endpoints that may have been accessed or may have accessed the IP addresses that are associated with that threat actor. And then tell me where I'm affected. What endpoints have those types of indicators? Where do I need to look? So I can hone in very rapidly on what the situation is just by using that prompt…
Contents
-
-
-
-
-
(Locked)
Learning objectives48s
-
3.1 Introducing prompt engineering15m 13s
-
(Locked)
3.2 Tokens and why they matter7m 49s
-
(Locked)
3.3 Prompt engineering examples: Sentinel7m 7s
-
(Locked)
3.4 Prompt engineering examples: MDE2m 45s
-
(Locked)
3.5 Prompt engineering examples: MDTI and EASM6m 11s
-
(Locked)
3.6 Prompt engineering examples: Intune7m 21s
-
(Locked)
3.7 Nested prompts and promptbooks3m 4s
-
(Locked)
3.8 Nested prompt examples3m 48s
-
(Locked)
-
-
-
-
-
-
-
-
-
-