Microsoft Copilot

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Connectors Index


Attribute Value
Connector ID MicrosoftCopilot
Publisher Microsoft
Used in Solutions Microsoft Copilot
Collection Method CCF
Connector Definition Files MicrosoftCopilot_ConnectorDefinition.json
CCF Configuration MicrosoftCopilot_PollingConfig.json
CCF Capabilities PurviewAudit

The Microsoft Copilot logs connector in Microsoft Sentinel enables seamless ingestion of Copilot-generated activity logs from M365 Copilot and Security Copilot into Microsoft Sentinel for advanced threat detection, investigation and response. It collects telemetry from Microsoft Copilot services such as usage data and system responses and ingests into Microsoft Sentinel, allowing security teams to monitor for misuse, detect anomalies, and maintain compliance with organizational policies.

Tables Ingested

This connector ingests data into the following tables:

Table Transformations Ingestion API Lake-Only
CopilotActivity ?

Permissions

Resource Provider Permissions: - Workspace (Workspace): read and write permissions.

Custom Permissions: - Tenant Permissions: 'Security Administrator' or 'Global Administrator' on the workspace's tenant.

Setup Instructions

⚠️ Note: These instructions were automatically generated from the connector's user interface definition file using AI and may not be fully accurate. Please verify all configuration steps in the Microsoft Sentinel portal.

1. Connect Microsoft Copilot audit logs to Microsoft Sentinel

This connector uses the Office Management API to get your Microsoft Copilot audit logs. The logs will be stored and processed in your existing Microsoft Sentinel workspace. You can find the data in the CopilotActivity table. - Click 'Connect' to establish connection


Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Connectors Index