From the course: Complete Guide to Microsoft Copilot for Security: Empower and Protect the Security Operations Center (SOC) by Microsoft Press
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
3.6 Prompt engineering examples: Intune - Microsoft Security Copilot Tutorial
From the course: Complete Guide to Microsoft Copilot for Security: Empower and Protect the Security Operations Center (SOC) by Microsoft Press
3.6 Prompt engineering examples: Intune
- [Instructor] In this next section, we'll talk about Intune. And so as you've noticed, we've been talking a lot about the products that are related to Microsoft or what we would call first-party tools. We'll also get into more of those third party or the plugins that you could build yourself in a later section. In this case, talking about Intune and understanding the device posture where the device management of all of your estate, I can ask it things like how many devices were enrolled in Intune in the last 24 hours. I can ask it about devices assigned to a particular user. I can ask about apps and ones that are related to devices. So now if I know that there's an app that's out there, that there's a vulnerability or there's some sort of issue, that I can then go quickly find that out using this power, this knowledge of Copilot for security to be able to find that information quickly. And then I can also look at building policies. So as in many things in cyber, Intune runs on…
Contents
-
-
-
-
-
(Locked)
Learning objectives48s
-
3.1 Introducing prompt engineering15m 13s
-
(Locked)
3.2 Tokens and why they matter7m 49s
-
(Locked)
3.3 Prompt engineering examples: Sentinel7m 7s
-
(Locked)
3.4 Prompt engineering examples: MDE2m 45s
-
(Locked)
3.5 Prompt engineering examples: MDTI and EASM6m 11s
-
(Locked)
3.6 Prompt engineering examples: Intune7m 21s
-
(Locked)
3.7 Nested prompts and promptbooks3m 4s
-
(Locked)
3.8 Nested prompt examples3m 48s
-
(Locked)
-
-
-
-
-
-
-
-
-
-