📄️ Provision Security Copilot Units (SCUs)
Implementation Effort: Medium — Provisioning SCUs requires IT and Security Operations teams to configure and manage capacity through Azure or the Security Copilot portal.
📄️ Manage and Monitor Usage of Security Compute Units (SCUs)
Implementation Effort: Medium — Administrators only need to perform targeted actions in the Security Copilot or Azure portal to view usage or adjust capacity.
📄️ Manage Plugins in Microsoft Security Copilot
Implementation Effort: Medium — Admins must configure, approve, and govern plugin access, which requires a defined project effort.
📄 ️ Threat Hunting Agent (Microsoft Defender)
Implementation Effort: Medium – This requires IT and Security Operations teams to configure access and incorporate the Threat Hunting Agent into existing Defender XDR hunting workflows, which is a project rather than a long‑term operational program.
📄️ Defender Threat Intelligence Agent
Implementation Effort: Medium — IT and Security Operations teams must enable and integrate Microsoft Defender for Endpoint and Defender External Attack Surface Management so the agent has the required telemetry to operate effectively.
📄️ View Incident Summaries and Use Guided Response to Remediate
Implementation Effort: Low — Security administrators only need to perform targeted actions in Microsoft Defender XDR to view AI‑generated summaries and guided remediation steps.
📄️ Analyze Potentially Malicious Files, Scripts, and Code with Microsoft Security Copilot
Implementation Effort: Low — Security teams only need to enable and use built‑in Security Copilot capabilities, requiring targeted actions rather than ongoing programs.
📄️ Review and Understand Details About Identities and Devices Using Microsoft Security Copilot
Implementation Effort: Low — Only targeted actions by administrators are required; there is no large deployment project.
📄️ Enable Microsoft Defender for Cloud Apps
Implementation Effort: Low
📄️ Identity and Device Pillars of the Zero Trust Workshop
Identity Pillar
📄️ Discover Cloud Apps
Implementation Effort: Medium – Requires integration with network infrastructure (e.g., firewalls, proxies, Defender for Endpoint) and setup of log collection or API automation.
📄️ Enable App Governance
Implementation Effort: Low
📄️ Create File Policies with Microsoft Defender for Cloud Apps
Implementation Effort: Medium
📄️ Connect Apps to Microsoft Defender for Cloud Apps
Implementation Effort: High
📄️ Regulate apps with priority account consent
Implementation Effort Customer IT and Security Operations teams need to drive projects to set up and customize app governance policies based on organizational needs.
📄️ View the Cloud Discovery dashboard to see what apps are being used in your organization
Implementation Effort Customer IT and Security Operations teams need to drive projects to set up and configure the Cloud Discovery dashboard and manage ongoing monitoring and filtering of apps.
📄️ Create access policies - Microsoft Defender for Cloud Apps
Implementation Effort Creating access policies involves configuring multiple prerequisites, including licenses, onboarding apps, and setting up Conditional Access policies, which require ongoing management and monitoring.
📄️ Govern discovered apps - Microsoft Defender for Cloud Apps
Implementation Effort Customer IT and Security Operations teams need to drive projects to review, sanction, and unsanction apps, and potentially integrate with existing security appliances.
📄️ Get insights on and regulate access to sensitive content with app governance - Microsoft Defender for Cloud Apps
Implementation Effort This effort score was chosen because customer IT and Security Operations teams need to drive projects to customize policies and monitor app activities.
📄️ Block download of sensitive information with conditional access app control
Implementation Effort Customer IT and Security Operations teams need to implement programs that require ongoing time or resource commitment. This involves setting up and managing policies in Microsoft Defender for Cloud Apps and ensuring continuous monitoring and adjustments.
📄️ Conditional Access app control - Microsoft Defender for Cloud Apps
Implementation Effort Configuring Conditional Access app control requires setting up access and session policies, which involves project-level work by IT teams.
📄️ Create Defender for Cloud Apps anomaly detection policies
Implementation Effort Customer IT and Security Operations teams need to drive projects to configure and manage the anomaly detection policies effectively.
📄️ Microsoft Defender for Cloud Apps - EntraID Identity Protection integration and reporting
Implementation Effort Implementing visibility and control over cloud apps requires ongoing monitoring, configuration, and management by IT and Security Operations teams.
📄️ Require step-up authentication (authentication context) upon risky action
Implementation Effort This effort score is chosen because it involves creating and managing Conditional Access policies and session policies, which require ongoing time and resource commitment from IT and Security Operations teams.
📄️ App Discovery Policy in Microsoft Defender for Cloud Apps
Implementation Effort: Medium
📄️ Create policies to control OAuth apps - Microsoft Defender for Cloud Apps
Implementation Effort Creating an OAuth app policy involves configuring settings and permissions within the Microsoft Defender Portal, which requires project-level effort from IT teams.
📄️ Create session policies - Microsoft Defender for Cloud Apps
Implementation Effort Creating session policies requires configuring multiple settings and ensuring prerequisites are met, which involves project-level effort.
📄️ Integrate Microsoft Defender for Endpoint - Microsoft Defender for Cloud Apps
Implementation Effort Customer IT and Security Operations teams need to drive projects to integrate and configure the systems.
📄️ Deploy the Defender for Cloud Apps Log Collector on Your Firewalls and Other Proxies
Implementation Effort: Medium – This deployment requires IT teams to configure network devices (firewalls, proxies) and set up a log collector server, which involves coordination and testing.
📄️ SaaS Security Initiative - Microsoft Defender for Cloud Apps
Implementation Effort Customer IT and Security Operations teams need to drive projects to connect applications to Microsoft Defender for Cloud Apps and manage security recommendations.