Query Details
// M365 Copilot Extensions Threat Monitoring // https://www.linkedin.com/posts/0x534c_cybersecurity-generativeai-m365-activity-7250789113249837056-D6rZ/ // This just keeps getting better and better! ๐ I absolutely refuse to accept Message Center MC908119, which claims that โAdmins will lose tenant-level control over who can use Copilot agents.โ ๐ค As a countermeasure, Iโve developed a Sentinel analytics rule that monitors all external URLs accessed by M365 Copilot extensions against my Threat Intelligence database for potential malicious activities. This rule is linked with a logic playbook automation to mark the user as compromised and isolate their access. ๐ฏ๐ CloudAppEvents | where TimeGenerated > ago(1h) | where ActionType == @"CopilotInteraction" | extend UserID = tostring(RawEventData.UserId) | extend CopilotData = todynamic(RawEventData.CopilotEventData) | extend CopilotPlugin = tostring(CopilotData.AISystemPlugin[0].Id) | where isnotempty(CopilotPlugin) | extend PluginAccessURL = tostring(CopilotData.AccessedResources) | mv-expand todynamic(PluginAccessURL) | where PluginAccessURL has "SiteUrl" | extend Url = tostring(PluginAccessURL.SiteUrl) | extend Domain = tostring(parse_url(Url).Host) | extend Action = tostring(PluginAccessURL.Action) | join ThreatIntelligenceIndicator on $left.Domain == $right.DomainName // MITRE ATT&CK // T1116 Browser Extensions
This query is designed to monitor potential threats associated with Microsoft 365 Copilot extensions by analyzing cloud application events. Here's a simplified breakdown of what the query does:
Data Source: It examines events from the CloudAppEvents table, focusing on interactions with Copilot extensions.
Time Frame: The query looks at events generated within the last hour.
Filter Criteria: It specifically targets events where the action type is "CopilotInteraction."
Data Extraction:
UserID and details about the Copilot interaction from the raw event data.URL Analysis:
Threat Intelligence:
Automation:
Security Framework: The query aligns with the MITRE ATT&CK framework, specifically addressing the tactic of using browser extensions for malicious purposes (Technique T1116).
Overall, this query is part of a security measure to detect and respond to potential threats posed by external URLs accessed through M365 Copilot extensions.

Steven Lim
Released: October 13, 2024
Tables
Keywords
Operators