Rediģēt

Kopīgot, izmantojot


Script analysis with Microsoft Copilot in Microsoft Defender

Through AI-powered investigation capabilities from Microsoft Copilot for Security in the Microsoft Defender portal, security teams can speed up their analysis of malicious or suspicious scripts and command lines.

This guide describes what the script analysis capability is and how it works, including how you can provide feedback on the results generated.

Know before you begin

If you're new to Copilot for Security, you should familiarize yourself with it by reading the following articles:

Most complex and sophisticated attacks like ransomware evade detection through numerous ways, including the use of scripts and PowerShell command lines. Moreover, these scripts are often obfuscated, which adds to the complexity of detection and analysis. Security operations teams need to quickly analyze scripts to understand capabilities and apply appropriate mitigation, immediately stopping attacks from progressing further within a network.

The script analysis capability provides security teams added capacity to inspect scripts without using external tools. This capability also reduces complexity of analysis, minimizing challenges and allowing security teams to quickly assess and identify a script as malicious or benign.

Copilot for Security integration in Microsoft Defender

The script analysis capability is available in the Microsoft Defender portal for customers who have provisioned access to Copilot for Security.

Script analysis is also available in the Copilot for Security standalone experience through the Microsoft Defender XDR plugin. Know more about preinstalled plugins in Copilot for Security.

Key features

You can access the script analysis capability within the attack story below the incident graph on an incident page and in the device timeline.

To begin analysis, perform the following steps:

  1. Open an incident page then select an item on the left pane to open the attack story below the incident graph. Within the attack story, select an event with a script or command line that you want to analyze. Click Analyze to start the analysis.

    Screenshot that shows the script analysis button in the attack story view.

    Alternately, you can select an event to inspect in the device timeline view. On the file details pane, select Analyze to run the script analysis capability.

    Screenshot that shows the Analyze button in the device timeline.

  2. Copilot runs script analysis and displays the results in the Copilot pane. Select Show code to expand the script, or Hide code to close the expansion.

    Screenshot that shows the Copilot pane with script analysis results in the Microsoft Defender XDR incident page.

  3. Select the More actions ellipsis (...) on the upper right of the script analysis card to copy or regenerate the results, or view the results in the Copilot for Security standalone experience. Selecting Open in Copilot for Security opens a new tab to the Copilot standalone portal where you can input prompts and access other plugins.

    Screenshot that shows the More actions option in the Copilot script analysis card.

  4. Review the results an use the information to guide your investigation and response to the incident.

Sample script analysis prompt

In the Copilot for Security standalone portal, you can use the following prompt identify and analyze scripts:

  • Identify the scripts in Defender incident {incident ID}. Are these malicious scripts?

Tip

When analyzing scripts in the Copilot for Security portal, Microsoft recommends including the word Defender in your prompts to ensure that the script analysis capability delivers the results.

Provide feedback

Microsoft highly encourages you to provide feedback to Copilot, as it’s crucial for a capability’s continuous improvement. You can provide feedback on the results by selecting the feedback icon Screenshot of the feedback icon for Copilot in Defender cards. found at the end of the script analysis card.

See also

Tip

Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: Microsoft Defender XDR Tech Community.