From the course: Complete Guide to Microsoft Copilot for Security: Empower and Protect the Security Operations Center (SOC) by Microsoft Press

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

3.6 Prompt engineering examples: Intune

3.6 Prompt engineering examples: Intune

- [Instructor] In this next section, we'll talk about Intune. And so as you've noticed, we've been talking a lot about the products that are related to Microsoft or what we would call first-party tools. We'll also get into more of those third party or the plugins that you could build yourself in a later section. In this case, talking about Intune and understanding the device posture where the device management of all of your estate, I can ask it things like how many devices were enrolled in Intune in the last 24 hours. I can ask it about devices assigned to a particular user. I can ask about apps and ones that are related to devices. So now if I know that there's an app that's out there, that there's a vulnerability or there's some sort of issue, that I can then go quickly find that out using this power, this knowledge of Copilot for security to be able to find that information quickly. And then I can also look at building policies. So as in many things in cyber, Intune runs on…

Contents