Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
| Attribute | Value |
|---|---|
| Connector ID | MicrosoftCopilot |
| Publisher | Microsoft |
| Used in Solutions | Microsoft Copilot |
| Collection Method | CCF |
| Connector Definition Files | MicrosoftCopilot_ConnectorDefinition.json |
| CCF Configuration | MicrosoftCopilot_PollingConfig.json |
| CCF Capabilities | PurviewAudit |
The Microsoft Copilot logs connector in Microsoft Sentinel enables seamless ingestion of Copilot-generated activity logs from M365 Copilot and Security Copilot into Microsoft Sentinel for advanced threat detection, investigation and response. It collects telemetry from Microsoft Copilot services such as usage data and system responses and ingests into Microsoft Sentinel, allowing security teams to monitor for misuse, detect anomalies, and maintain compliance with organizational policies.
This connector ingests data into the following tables:
| Table | Transformations | Ingestion API | Lake-Only |
|---|---|---|---|
CopilotActivity |
✓ | ✗ | ? |
Resource Provider Permissions: - Workspace (Workspace): read and write permissions.
Custom Permissions: - Tenant Permissions: 'Security Administrator' or 'Global Administrator' on the workspace's tenant.
⚠️ Note: These instructions were automatically generated from the connector's user interface definition file using AI and may not be fully accurate. Please verify all configuration steps in the Microsoft Sentinel portal.
1. Connect Microsoft Copilot audit logs to Microsoft Sentinel
This connector uses the Office Management API to get your Microsoft Copilot audit logs. The logs will be stored and processed in your existing Microsoft Sentinel workspace. You can find the data in the CopilotActivity table. - Click 'Connect' to establish connection
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊