- Cloud Collectors Overview
- Administration
- Administrative Access
- Shareable Service Accounts
- Add Accounts for AWS Cloud Collectors
- Add Accounts for Cisco Duo Cloud Collector
- Add Accounts for Google Cloud Collectors
- Add Accounts for Microsoft Cloud Collectors
- Add Accounts for Okta Cloud Collectors
- Add Accounts for Salesforce Cloud Collectors
- Add Accounts for Splunk Cloud Collectors
- Add Accounts for Trend Micro Cloud Collectors
- Add Accounts for Wiz
- Define a Unique Site Name
- Sign Up for the Early Access Program
- Supported Cloud Collectors
- Onboard Cloud Collectors
- Abnormal Security Cloud Collector
- Anomali Cloud Collector
- AWS CloudTrail Cloud Collectors
- AWS CloudWatch Cloud Collector
- AWS CloudWatch Alarms Cloud Collector
- AWS GuardDuty Cloud Collector
- AWS S3 Cloud Collector
- AWS Security Lake Cloud Collector
- AWS SQS Cloud Collector
- Azure Activity Logs Cloud Collector
- Azure Blob Storage Cloud Collector
- Azure Log Analytics Cloud Collector
- Azure Event Hub Cloud Collector
- Azure Storage Analytics Cloud Collector
- Azure Virtual Network Flow Cloud Collector
- Box Cloud Collector
- Broadcom Carbon Black Cloud Collector
- Cato Networks Cloud Collector
- ChatGPT Enterprise Cloud Collector
- Cisco Duo Cloud Collector
- Cisco Meraki Cloud Collector
- Cisco Secure Endpoint Cloud Collector
- Cisco Umbrella Cloud Collector
- Cloudflare Cloud Collector
- Cribl Cloud Collector
- CrowdStrike Cloud Collectors
- Cylance Protect (now Arctic Wolf) Cloud Collector
- DataBahn Cloud Collector
- Dropbox Cloud Collector
- GCP Cloud Logging Cloud Collector
- GCP Pub/Sub Cloud Collector
- GCP Security Command Center Cloud Collector
- Gemini Enterprise Cloud Collector
- GitHub Cloud Collector
- Gmail BigQuery Cloud Collector
- Google Workspace Cloud Collector
- LastPass Cloud Collector
- Microsoft Copilot Integration
- Microsoft Defender XDR (via Azure Event Hub) Cloud Collector
- Microsoft Entra ID Context Cloud Collector
- Microsoft Entra ID Logs Cloud Collector
- Microsoft 365 Exchange Admin Reports Cloud Collector
- Supported Sources from Microsoft 365 Exchange Admin Reports
- Migrate to the Microsoft 365 Exchange Admin Reports Cloud Collector
- Prerequisites to Configure the Microsoft 365 Exchange Admin Reports Cloud Collector
- Configure the Microsoft 365 Exchange Admin Reports Cloud Collector
- Troubleshooting the Microsoft 365 Exchange Admin Reports Cloud Collector
- Microsoft 365 Management Activity Cloud Collector
- Microsoft Security Alerts Cloud Collector
- Microsoft Sentinel (via Event Hub) Cloud Collector
- Mimecast Cloud Collector
- Mimecast Incydr Cloud Collector
- Netskope Alerts Cloud Collector
- Netskope Events Cloud Collector
- Okta Cloud Collector
- Okta Context Cloud Collector
- Palo Alto Networks Cortex Data Lake Cloud Collector
- Palo Alto Networks XDR Cloud Collector
- Phishing Email Inbox Cloud Collector
- Progress ShareFile Cloud Collector
- Proofpoint On-Demand Cloud Collector
- Proofpoint Targeted Attack Protection Cloud Collector
- Qualys Cloud Collector
- Recorded Future Cloud Collector
- Recorded Future Context Cloud Collector
- Rest API Cloud Collector
- S2W Threat Intelligence Cloud Collector
- Salesforce Cloud Collector
- Salesforce EventLog Cloud Collector
- SentinelOne Alerts Cloud Collector
- SentinelOne Cloud Funnel Cloud Collector
- SentinelOne Threats Cloud Collector
- SentinelOne Cloud Collector
- ServiceNow Cloud Collector
- Slack Cloud Collector
- Snowflake Cloud Collector
- Sophos Central Cloud Collector
- Splunk Cloud Collector
- STIX/TAXII Cloud Collector
- Symantec Endpoint Security Cloud Collector
- Tenable Cloud Collector
- Trend Vision One Cloud Collector
- Trellix Endpoint Security Cloud Collector
- Vectra Cloud Collector
- Zoom Cloud Collector
- Zscaler ZIA Cloud Collector
- Webhook Cloud Collectors
- Wiz Issues Cloud Collector
- Wiz API Cloud Collector
- Troubleshooting Cloud Collectors
Microsoft Copilot Integration
To monitor the behavior of your AI agents and secure digital workforces against threats, New-Scale Security Operations Platform offers Agent Behavior Analytics (ABA). By centralizing logs and automating incident timelines, it identifies access abuse in real time without relying on static rules. Dedicated dashboards and risk scoring help you track AI agent activity and continuously improve your security posture.
Integration with Microsoft Copilot expands the reach of ABA to cover Microsoft agents that are active in your environment. It includes coverage for:
Microsoft 365 Copilot – an AI-powered productivity assistant integrated into Microsoft 365 applications, such as Word, Excel, Outlook, Teams, and PowerPoint.
Microsoft Copilot – a generative artificial intelligence chatbot developed by Microsoft AI
Copilot Studio – a platform for building and managing agents.
ABA includes the following the key benefits.
AI Monitoring: Track AI agent behavior to detect and respond to threats.
Automated Timelines: View sequenced activity logs for faster incident investigation.
Risk Management: Measure your AI security against peer standards to identify and close security gaps and scale AI automation.
Centralized Dashboards: Gain a unified view of all non-human entity activity.
Options for Onboarding Microsoft Copilot Logs
The Microsoft Copilot integration makes it possible to ingest Microsoft Copilot logs via existing Exabeam cloud collectors. These logs can be collected via the following options:
Microsoft 365 Management Activity Cloud Collector AND Microsoft Security Alerts Cloud Collector (onboard both collectors to provide full coverage)
OR
Supported Data Types
The table below lists the types of events each of the onboarding options can ingest. For each data type, information is included about the service that holds the data, its purpose, and its usability.
Data type – Describes the type of data generated by the AI product
Where data lives – Shows a service that holds or stores data
Purpose – Explains why the data exists and its usage
Externally collectable and useful – Indicates if data is retrievable via logs, APIs, or integrations
Collector that can ingest the data – Indicates which collector the data can be ingested through.
Based on the following table you can check feasibility of using associated existing cloud collectors for collecting Microsoft Copilot logs via Microsoft Copilot integration.
Data type | Where data lives | Purpose | Externally collectable and useful | Collector that can ingest the data |
|---|---|---|---|---|
Prompts and Responses | Microsoft 365 workloads that include Exchange mailboxes, Teams chats, SharePoint, and OneDrive | User productivity content | No | |
Activity Metadata | Microsoft Purview Unified Audit Log (UAL) | Investigation and compliance | Yes | Microsoft 365 Management Activity (or Microsoft Sentinel) |
Prompts, Responses, and Metadata (risk views) | Microsoft Purview DSPM for AI | Data exposure and governance | No | |
Alerts and detections | Microsoft Defender (Defender for Cloud Apps / XDR) | Security operations | Yes | Microsoft Security Alerts (or Microsoft Sentinel) |
Agent lifecycle audit events | Microsoft Purview Unified Audit Log. Workload typically appears as Power Platform Analytics for Copilot Studio agents. | Security operations and data governance | Yes | Microsoft Security Alerts (or Microsoft Sentinel) |
Security Use Cases and Detections/Coverage
Integrating with Microsoft Copilot provides access to all of the Agent Behavior Analytics (ABA) functionality that New-Scale Analytics provides in its downstream applications. This functionality includes the following capabilities:
Establish a baseline for AI activity in your environment so that abnormal behavior can be detected, such as an abnormal volume of AI requests, new agent creation, or unauthorized outbound activity.
Detect early signs of prompt injection, model manipulation, or tool exploitation.
Monitor for privilege escalation and misuse in the AI platform, such as new users or role assignments.
Provide visibility into the lifecycle of AI agents, including creation, modification, and usage of agents.
To support ABA functionality, New-Scale Analytics includes behavioral models and security content dedicated to monitoring AI agent-related activity in your environment. For detailed information about the security content Exabeam provides, see the latest New-Scale Content Package Release Notes.