Control 1.8: Runtime Protection and External Threat Detection
Control ID: 1.8
Pillar: Security
Regulatory Reference: FINRA Rule 3110, FINRA 25-07, SEC 2025 Examination Priorities, GLBA 501(b), NIST SP 800-53 SI-3/SI-4/SI-10
Last UI Verified: February 2026
Governance Levels: Baseline / Recommended / Regulated
Agent 365 Architecture Update
Agent 365 provides a centralized security posture dashboard showing misconfigurations, policy violations, and risk scores across all agent types in real time. This offers unified threat visibility beyond per-platform detection (such as Defender for Cloud Apps for Copilot Studio). See Unified Agent Governance for security posture management details.
Sovereign Cloud Availability (GCC / GCC High / DoD)
Several Control 1.8 surfaces are Preview or Prerelease in commercial cloud and have not been documented at parity for US Government clouds:
- Defender for Cloud Apps AI Agent Protection — Preview in commercial; no documented GCC / GCC High / DoD parity (verify against Defender for Cloud Apps – AI Agent Protection)
- Additional Threat Detection / Security Webhooks API — Prerelease in commercial; verify Azure Entra Federated Identity Credential parity in DoD (see external security provider)
- Copilot Studio Prompt Shields and content moderation — Copilot Studio is GA in GCC and GCC High (requirements-licensing-gcc); generative-AI dependencies have separate availability constraints by cloud
- AISPM dashboard in Defender XDR — Verify per-cloud availability against current Microsoft 365 Roadmap
For GCC High / DoD tenants: confirm per-capability availability against the live Learn pages and Power Platform service availability matrix before committing to native Defender or webhook-based runtime protection. Record any gap in your Zone-3 exception register and use the alternative surfaces (Prompt Shields + content moderation) until parity is confirmed.
Objective
Implement runtime security controls for Copilot Studio agents to detect and block prompt injection attacks, jailbreak attempts, and malicious agent behavior. This control provides real-time protection against adversarial inputs and external threats targeting AI agents.
Why This Matters for FSI
- FINRA Rule 3110 / 25-07: Demonstrate AI governance and risk controls for agent operations; FINRA 25-07 requires real-time monitoring of AI outputs and comprehensive decision logging
- SEC 2025 Examination Priorities: Implement appropriate safeguards for AI-driven customer interactions; examination focus includes adequacy of AI monitoring and supervision policies
- GLBA 501(b): Protect customer NPI from exfiltration via AI agents
- OCC 2011-12 / Fed SR 11-7: Model risk controls including ongoing performance monitoring and output controls for AI/ML systems handling financial data
- NIST SP 800-53 SI-3/SI-4/SI-10: Malicious code protection, system monitoring, and input validation map directly to agent runtime protection requirements
- FFIEC IT Handbook: Continuous monitoring and anomaly detection requirements for cybersecurity controls
Automation Available
Companion solutions in FSI-AgentGov-Solutions:
- Content Moderation Governance Monitor — automated content moderation level validation against zone-specific requirements
- File Upload Security Configurator — automated per-agent file upload validation against zone governance policies with drift detection
Control Description
Runtime Protection provides real-time security controls for Copilot Studio agents, detecting and blocking attacks before they execute. Combined with egress controls and SIEM integration, this creates a defense-in-depth approach to agent security.
| Capability | Description |
|---|---|
| AI Prompt Shield | Block attempts to manipulate agent behavior through malicious inputs (prompt injection prevention) |
| Jailbreak detection | Identify attempts to bypass agent guardrails |
| Content moderation | Filter harmful, inappropriate, or sensitive content via Azure AI Content Safety |
| Egress controls | Prevent data exfiltration via tools and connectors |
| External threat detection | Real-time evaluation via third-party security providers (preview) |
| Defender integration | Environment-level threat detection for Copilot Studio agents (Preview — verify GA status) |
| Native Defender for Cloud Apps | AI agent inventory, activity logging, and real-time protection via Microsoft Defender |
Native Microsoft Defender Integration (Defender for Cloud Apps)
Verify GA Status Before Production Deployment
Native Microsoft Defender integration for Copilot Studio agents provides comprehensive security capabilities through Defender for Cloud Apps, including agent discovery, activity logging, and real-time runtime protection. As of February 2026, Microsoft Learn documentation still indicates this feature may be in Preview. Verify current GA status at Microsoft Learn before deploying in production environments.
The Microsoft Defender - Copilot Studio AI Agents toggle in Power Platform Admin Center enables native integration with Microsoft Defender for Cloud Apps. This is distinct from the "Additional Threat Detection" feature (third-party webhooks) and provides three core capabilities:
| Capability | Description | Data Population Time |
|---|---|---|
| AI Agents Inventory | Discovers and catalogs all Copilot Studio agents across the tenant with security posture visibility | Connection status: up to 30 minutes; full inventory: variable, depending on tenant size and complexity (Learn) |
| AI Agents Activity Logging | Captures audit logs of agent runtime invocations via the MDA M365 Connector to Microsoft Purview | Near real-time |
| Real-Time Protection | Blocks suspicious tool invocations before execution with UPIA/XPIA detection | Synchronous evaluation prior to tool execution; latency documented per Microsoft Learn |
Prerequisites:
| Requirement | Details |
|---|---|
| Licensing (one of) | (a) Microsoft Agent 365 license, OR (b) Microsoft Defender for Cloud Apps license AND Microsoft Copilot Studio license — per ai-agent-inventory |
| Defender preview opt-in | Mandatory opt-in to preview features in both Microsoft Defender for Cloud and Microsoft Defender XDR |
| Roles | Microsoft Defender XDR System Administrator (or Security Administrator) for Defender preview opt-in and portal toggle; Power Platform Administrator for the PPAC handshake. See role catalog. |
| Connector | Microsoft 365 App Connector must be in Connected state in the Defender portal (Settings → Cloud apps → App connectors) |
| Agent Type | Generative orchestration agents only (not "classic" agents) |
Two-Portal Configuration Required:
- Microsoft Defender Portal - Enable Copilot Studio AI Agents feature and verify M365 App Connector
- Power Platform Admin Center - Enable the "Microsoft Defender - Copilot Studio AI Agents" toggle
Propagation Timeline:
- Initial connection status: up to 30 minutes (Learn)
- Full agent inventory population: variable; depends on tenant size and complexity (no Microsoft-published ceiling)
- Real-time protection: active immediately after enablement
Defender XDR Integration:
When enabled, blocked agent actions create Defender XDR incidents that integrate with your SOC workflows:
- Alert Generation: Blocked tool invocations generate Defender alerts
- Advanced Hunting: Agent data available in Defender advanced hunting queries
- Incident Correlation: Agent security events correlate with other M365 security signals
Security Event Visibility Gap
Blocked prompt events from Copilot Studio agents may not consistently appear in Defender advanced hunting. This inconsistency is acknowledged by Microsoft and under review. Organizations relying on advanced hunting queries for comprehensive blocked-prompt visibility should implement supplementary monitoring through Power Platform Admin Center analytics and Purview audit logs until this gap is resolved.
Defender XDR Retention Boundary (Records-Retention Disclaimer)
Defender XDR alerts and CloudAppEvents are operational telemetry with product-default retention windows — they are not WORM and not the system of record for SEC 17a-4 / FINRA 4511 records-retention obligations. For books-and-records retention of agent transcripts, blocked-prompt evidence, and tool-invocation artifacts, rely on Audit Premium long-term retention (Control 1.7) and Microsoft Purview retention policies (Control 1.5). Do not present Defender alerts as books-and-records evidence.
Licensing Consideration
Defender for Cloud Apps licensing is required for all users interacting with protected agents. Verify licensing coverage before enabling for production environments.
Regulatory Alignment for FSI:
| Regulation | Alignment |
|---|---|
| FINRA Rule 3110 | Real-time monitoring of AI agent behavior supports supervisory requirements |
| SEC Regulation SCI | System integrity controls for AI systems processing financial data |
| NYDFS Cyber | Threat detection capabilities for AI-enabled attack patterns |
| GLBA 501(b) | Protection of customer NPI accessed by AI agents |
Additional Threat Detection (Third-Party/Custom Webhook)
Additional Threat Detection vs. Native Defender
Additional Threat Detection (this section) enables integration with third-party security providers or custom webhooks. For native Microsoft Defender integration (recommended for most FSI organizations), see the "Native Microsoft Defender Integration" section above.
The Additional Threat Detection capability in Power Platform Admin Center enables organizations to connect Copilot Studio agents to third-party security providers or custom webhooks for real-time threat evaluation. When enabled, every tool invocation by a generative agent is evaluated by the security provider before execution.
| Configuration Item | Description |
|---|---|
| Azure Entra App ID | App registration for webhook authentication (with Federated Identity Credentials) |
| Endpoint Link | Security provider webhook URL receiving tool invocation payloads |
| Error Behavior | Action when provider is unavailable: Allow agent to respond OR Block query |
| Data Sharing | Consent to share agent interaction data with the security provider |
Key Characteristics:
- Scope: Applies to generative orchestration agents only (not "classic" agents)
- Response Timeout (provider-side requirement): The third-party security provider must respond within 1 second per external-security-provider — this is a publisher requirement on the third-party webhook, not a Microsoft-delivered SLA
- Propagation Delay: App ID changes may take up to 1 minute to propagate
- Environment-Level: Configured per environment or via Environment Groups for bulk deployment
Error Behavior Recommendation for FSI:
| Setting | Use Case | FSI Recommendation |
|---|---|---|
| Allow agent to respond | Lower friction, availability prioritized | Zone 1 (Personal Productivity) |
| Block the query | Higher security, fail-closed | Zone 2/3 (Team/Enterprise) |
For regulated financial services environments, select Block the query to maintain strict security posture when the threat detection provider is unavailable.
Security Webhooks API (External Threat Detection)
The Security Webhooks API enables integration with third-party security providers for real-time threat evaluation of Copilot Studio agent interactions. This preview capability allows organizations to extend runtime protection with specialized security services.
| Provider Type | Integration Pattern | Example Providers |
|---|---|---|
| Prompt Security | Webhook evaluates prompts before execution | Palo Alto Networks, Robust Intelligence |
| Content Filtering | External content safety evaluation | Third-party content moderation APIs |
| Threat Intelligence | Real-time threat lookup | SIEM integration, threat feeds |
| Custom Rules | Organization-specific detection logic | Internal security services |
Configuration Requirements:
- Entra App Registration - Create app registration for webhook authentication
- Webhook Endpoint - Deploy secure HTTPS endpoint (Azure Function, API Gateway)
- Response Format - Return
allow,block, orwarndecisions per message - SLA Requirements - Webhook must respond within 1 second to avoid timeout
Security Webhooks API vs. Additional Threat Detection
The Security Webhooks API (documented below) is the underlying mechanism that powers the Additional Threat Detection feature in Power Platform Admin Center. Organizations can use either:
- Power Platform Admin Center UI (recommended) - Simplified configuration via Security → Threat Protection (URL slug:
/security/threatdetection) - Security Webhooks API (advanced) - Direct API configuration for automation scenarios
Third-Party Provider Assessment
When integrating third-party security providers (non-Microsoft Defender), evaluate provider security posture per Control 2.7 (Vendor Risk Management) before production deployment.
Vendor Assessment for Security Webhooks:
Before integrating third-party security providers, complete vendor risk assessment per Control 2.7:
- Data handling: Does the provider process or store conversation content?
- Geographic location: Where is the webhook endpoint hosted?
- SOC 2 compliance: Is the provider SOC 2 Type II certified?
- Breach notification: What is the provider's incident response SLA?
AI-Enabled Threat Patterns (NYDFS Cyber Guidance)
NYDFS cybersecurity guidance emphasizes detection of AI-enabled attack techniques. Runtime protection should address:
| Threat Pattern | Detection Approach | FSI Impact |
|---|---|---|
| AI-Generated Phishing | Analyze prompts for social engineering patterns targeting employee credentials or customer data | Account takeover, unauthorized transactions |
| Deepfake Impersonation | Detect requests referencing voice/video verification or C-suite authorization claims | Wire fraud, unauthorized approvals |
| Synthetic Identity Prompts | Flag prompts containing combinations of personal data that may indicate synthetic identities | KYC/AML bypass, fraudulent account creation |
| Adversarial Data Extraction | Block multi-turn conversations attempting to aggregate sensitive data incrementally | Data exfiltration, MNPI exposure |
| AI-Assisted Reconnaissance | Detect prompts probing for system architecture, security controls, or employee information | Targeted attacks, insider threat enablement |
Detection Configuration:
- Enable runtime protection with expanded pattern library for AI-enabled attacks
- Configure alert thresholds for social engineering indicators
- Integrate with security awareness training for detected attack patterns
- Report AI-enabled attack attempts to security operations within 15-minute SLA (Zone 3)
Key Configuration Points
- Enable Managed Environments (required prerequisite)
- Configure agent security settings in Power Platform Admin Center
- Enable runtime protection with prompt injection and jailbreak detection
- Configure content moderation with strict thresholds for regulated agents (see zone-specific levels below)
- Implement egress controls via DLP and connector allowlists (Control 1.4)
- Set up alert policies in Microsoft Purview for security events
- Integrate with SIEM for real-time monitoring (Zone 2-3)
- Enable native Microsoft Defender integration (recommended for non-production validation while in Preview; defer Zone 3 enablement until GA, or document explicit risk acceptance per Control 2.7 / Control 2.13)
- Consider additional threat detection webhook for third-party providers (Prerelease — requires vendor assessment per Control 2.7 and TPRM sign-off; not recommended for Zone 3 customer-data agents until GA)
Content Moderation Level Configuration
Copilot Studio provides configurable content moderation levels that control how aggressively the Azure AI Content Safety service filters agent responses. Configure per agent in Copilot Studio > Agent > Settings > Generative AI > Content moderation.
| Moderation Level | Behavior | Recommended Zone |
|---|---|---|
| Low | Minimal filtering; allows broader responses | Not recommended for FSI |
| Medium | Balanced filtering; blocks clearly harmful content | Zone 1 (Personal) minimum |
| High | Strict filtering; blocks potentially sensitive or harmful content | Zone 2 (Team) and Zone 3 (Enterprise) |
FSI Recommendation: Set Content Moderation to High
For regulated financial services environments, set content moderation to High for all Zone 2 and Zone 3 agents. Zone 1 agents should use Medium at minimum. Agents with lower settings should be explicitly approved and documented with risk acceptance.
Zone-Specific Requirements
| Zone | Requirement | Rationale |
|---|---|---|
| Zone 1 (Personal) | Runtime protection optional; log-only mode; best-effort response; content moderation set to Medium minimum | Low risk, reduced friction |
| Zone 2 (Team) | Runtime protection required; block and log; 4-hour response SLA; content moderation set to High | Shared agents require accountability |
| Zone 3 (Enterprise) | Maximum protection; block and investigate; 15-minute response SLA; incident playbook required; content moderation set to High | Customer-facing, highest risk |
Roles & Responsibilities
| Role | Responsibility |
|---|---|
| Power Platform Admin | Environment configuration, runtime protection settings, PPAC handshake (Security → Threat Protection) for native Defender, and Additional Threat Detection toggle |
| Microsoft Defender XDR System Administrator (or Security Administrator) | Defender preview-feature opt-in (both Defender for Cloud and Defender XDR) and Defender portal toggle for Copilot Studio AI Agents; Defender XDR alert tuning and AISPM dashboard |
| Application Administrator (or Cloud Application Administrator) | Entra app registration and Federated Identity Credential creation for Additional Threat Detection webhook |
| Compliance / Audit Admin | Audit Logs / Audit Reader role for Unified Audit Log search of runtime events |
| Security Operations | Monitor Defender XDR alerts and AISPM, investigate threats, route incidents to FSI Incident Handling |
| AI Governance Lead | Agent security policies, exception register, incident playbooks, regulatory reportability decisions |
Related Controls
| Control | Relationship |
|---|---|
| 2.1 - Managed Environments | Required prerequisite for runtime protection |
| 1.7 - Audit Logging | Logs runtime protection events |
| 1.4 - Advanced Connector Policies | Egress controls complement runtime protection |
| 1.6 - Microsoft Purview DSPM for AI | DSPM Activity Explorer ingests Defender agent activity events for compliance monitoring |
| 1.12 - Insider Risk Detection | Insider threat correlation |
| 2.7 - Vendor Risk Management | Third-party webhook provider assessment |
| FSI Incident Handling Playbook | Incident-handling workflow and regulatory reportability for confirmed AI threat events |
Regulatory Reportability for Confirmed AI Threat Events
Confirmed prompt-injection, jailbreak, or data-exfiltration events on Zone 2 / Zone 3 customer-facing agents may trigger one or more US regulatory notification obligations:
- NY DFS Part 500 (23 NYCRR 500.17(a)) — 72-hour notification of cybersecurity events to the Superintendent
- SEC Regulation S-P §248.30(a)(4) — customer notification timing for unauthorized access to NPI
- FINRA Rule 4530(b) — written reports of specified events including security breaches affecting customer accounts
The determination of whether a given runtime-protection event triggers a reportable obligation is a Compliance / Legal decision, not an automated one. Use the FSI Incident Handling playbook above to route confirmed events to the firm's incident-response and reportability workflow within the documented intake SLA.
Automated Validation: Deny Event Correlation Report
For runtime threat detection correlation across RAI telemetry, Purview Audit, and DLP events with anomaly detection and zone-based alerting, see the Deny Event Correlation Report solution.
Capabilities:
- Multi-source deny event extraction (RAI telemetry, Purview Audit, Purview DLP)
- Daily correlation engine with 7-day trend analysis and volume anomaly detection
- Zone-based alerting with Teams adaptive cards and email notifications
- Dataverse persistence with zone-based retention (90d/365d/730d)
- SHA-256 integrity-hashed evidence export with regulatory alignment mapping
Deployable Solution: deny-event-correlation-report provides PowerShell extraction scripts, Dataverse infrastructure, Power Automate orchestration flow, and evidence export pipeline.
Automated Validation: Content Moderation Governance Monitor
For automated detection of non-compliant content moderation settings on Copilot Studio agents per governance zone, see the Content Moderation Governance Monitor solution.
Capabilities:
- Per-agent content moderation level validation (Low/Medium/High vs zone requirements)
- Zone-based compliance checking (Zone 1: Medium minimum, Zone 2/3: High)
- Drift detection with baseline comparison for configuration change tracking
- Teams adaptive card alerts with severity classification and regulatory context
- SHA-256 integrity-hashed evidence export for examination support
Deployable Solution: content-moderation-monitor provides PowerShell validation scripts, Power Automate flow definitions, and Dataverse schema for persistent governance state.
RAI Telemetry Capture (Copilot Studio)
For Copilot Studio agents, Application Insights integration enables capture of Responsible AI (RAI) content filtering events that are not available in Microsoft Purview audit logs.
Why RAI Telemetry Matters
| Event Type | Source | What It Captures |
|---|---|---|
| ContentFiltered | Application Insights | RAI safety filter blocked agent response |
| PolicyDetails | Purview Audit | DLP/sensitivity policy enforcement |
| ResponseOutcome=Blocked | Purview Audit | Agent response blocked by policy |
| UPIA/XPIA Detection | Defender CloudAppEvents | Prompt injection attempts (requires Defender for Cloud Apps) |
Prompt Injection Detection Locations
UPIA (User Prompt Injection Attack) and XPIA (Cross-domain Prompt Injection Attack) detections are available in both locations:
- Purview CopilotInteraction schema: Contains
JailbreakDetectedandXPIADetectedboolean flags as native fields (audit trail) - Defender CloudAppEvents: Provides threat analysis context, attack patterns, and investigation tools (security operations)
For compliance, Purview flags which resources had attacks detected. For security response, Defender provides the investigation context. Organizations without Defender for Cloud Apps can still audit detections through Purview, but should use Application Insights ContentFiltered events for RAI-layer blocking visibility.
RAI telemetry captures blocking events at the model layer (Azure AI Content Safety) rather than the governance layer (Microsoft Purview). Both are necessary for complete deny event visibility.
Application Insights Setup
Prerequisites: - Azure subscription with Application Insights resource - Copilot Studio license that supports generative agents (Application Insights configuration is part of the Generative AI advanced settings; not gated on a specific Premium SKU per current Microsoft Learn) - Application Insights connection string
Configuration per Agent:
- Open Copilot Studio > Select agent > Settings > Generative AI
- Enable Advanced settings toggle
- Under Application Insights, enter connection string
- Save and publish agent
Per-Agent Configuration
Application Insights must be configured for each Copilot Studio agent individually. There is no tenant-wide setting. Include this in agent onboarding checklists for Zone 2/3 agents.
KQL Query for ContentFiltered Events
Schema Verification Required
The Application Insights customDimensions schema for Copilot Studio events has not been published verbatim on Microsoft Learn. The query below is a starting point — validate customDimensions field names against your tenant's emitted telemetry before using it as audit evidence, and re-verify after each Copilot Studio platform update.
customEvents
| where timestamp > ago(24h)
| where name == "MicrosoftCopilotStudio"
| extend eventType = tostring(customDimensions["EventType"])
| where eventType == "ContentFiltered"
| extend
agentId = tostring(customDimensions["BotId"]),
sessionId = tostring(customDimensions["ConversationId"]),
filterReason = tostring(customDimensions["FilterReason"])
| project timestamp, agentId, sessionId, filterReason, customDimensions
| order by timestamp desc
Zone-Specific Requirements
| Zone | RAI Telemetry Requirement |
|---|---|
| Zone 1 | Optional; log-only for awareness |
| Zone 2 | Required for shared agents; daily review |
| Zone 3 | Required; real-time alerting; 15-minute response SLA |
Correlation with Purview Audit
For comprehensive deny event correlation across RAI telemetry, Purview audit, and DLP events, see:
- Deny Event Correlation Report Playbook - Multi-source correlation with Power BI dashboard
Implementation Playbooks
Step-by-Step Implementation
This control has detailed playbooks for implementation, automation, testing, and troubleshooting:
- Portal Walkthrough — Step-by-step portal configuration
- PowerShell Setup — Automation scripts
- Verification & Testing — Test cases and evidence collection
- Troubleshooting — Common issues and resolutions
Advanced Implementation: Configuration Hardening Baseline
This control is covered by the Configuration Hardening Baseline, which consolidates SSPM-detectable settings across all 7 mapped controls into a single reviewable checklist with automation classification and evidence export procedures.
Verification Criteria
Confirm control effectiveness by verifying:
- Managed Environment is enabled for all regulated environments
- Runtime protection settings are configured and active
- Test prompt injection is blocked with log entry
- Egress controls block unauthorized connector/tool invocations
- Alert policies trigger on security events
- SIEM integration streams events within SLA (Zone 2-3)
- Native Microsoft Defender integration enabled (Zone 2/3)
- AI agent inventory populated in Defender portal
- Defender XDR alerts generated for blocked actions
- Content moderation level is set to High for all Zone 2/3 agents (Copilot Studio > Agent > Settings > Generative AI)
- No agents have content moderation set below Medium without documented risk acceptance
Additional Resources
- Microsoft Learn: Managed Environments Overview
- Microsoft Learn: Copilot Studio Security
- Microsoft Learn: External Threat Detection
- Microsoft Learn: Defender for Cloud Apps - AI Agent Protection
- Microsoft Learn: Power Platform Security Best Practices
- Microsoft Learn: AI Safety and Content Moderation
- Unified Agent Governance — Agent 365 Identity Architecture - In-repo authoritative source for Agent 365 security posture and runtime protection model
Updated: February 2026 | Version: v1.4.0 | UI Verification Status: Current