From the course: Complete Guide to Microsoft Copilot for Security: Empower and Protect the Security Operations Center (SOC) by Microsoft Press

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

3.5 Prompt engineering examples: MDTI and EASM

3.5 Prompt engineering examples: MDTI and EASM

- The next use case is around threat hunting with MDTI, that Microsoft Defender Threat Intelligence. So again, this is taking that advanced premium data that is provided along with Copilot for security, at least in the current scenario as of this publication. So the Copilot for security can then tell me about what this advanced threat actor is doing. What are their tactics and procedures? What are the things that they actually are targeting? What are the tool sets that they use? And I can then tie that together with that massive amount of data that Microsoft has compiled and all of that signal that's pulled in on a daily basis to then understand what's going on. Tie that in with endpoints that may have been accessed or may have accessed the IP addresses that are associated with that threat actor. And then tell me where I'm affected. What endpoints have those types of indicators? Where do I need to look? So I can hone in very rapidly on what the situation is just by using that prompt…

Contents