Control 1.8: Runtime Protection and External Threat Detection - Troubleshooting
This playbook provides troubleshooting guidance for Control 1.8.
Common Issues
Issue: Runtime Protection Not Blocking Threats
Symptoms: Malicious prompts not being blocked
Solutions:
- Verify Managed Environment is enabled
- Check runtime protection settings are active
- Review sensitivity threshold (may need adjustment)
- Ensure agent security settings are configured
- Check for policy conflicts
Issue: Too Many False Positives
Symptoms: Legitimate queries being blocked
Solutions:
- Review blocking patterns
- Adjust sensitivity from High to Medium
- Add exclusions for common legitimate patterns
- Tune content moderation thresholds
- Review and whitelist specific scenarios
Issue: Alerts Not Being Generated
Symptoms: Security events not triggering alerts
Solutions:
- Verify alert policy is enabled
- Check activity matches alert conditions
- Confirm notification recipients are valid
- Review alert threshold settings
- Check mailflow for alert delivery
Issue: SIEM Not Receiving Events
Symptoms: Power Platform events missing in SIEM
Solutions:
- Verify data export is configured
- Check Event Hub connectivity
- Confirm data connector is enabled in Sentinel
- Review permissions for data streaming
- Check for throttling or quota issues
Issue: External Threat Detection Webhook Not Responding
Symptoms: Agent tool invocations timing out
Solutions:
- Verify webhook endpoint is publicly accessible via HTTPS
- Confirm endpoint responds within 1-second timeout
- Check Entra app registration exists with correct Application ID
- Verify Federated Identity Credential is configured correctly
- Test endpoint manually using curl/Postman
Issue: External Threat Detection Blocking Legitimate Tool Calls
Symptoms: Valid agent tool invocations being blocked
Solutions:
- Review external provider's evaluation criteria
- Check if specific tools are triggering false positives
- Temporarily set default behavior to "Allow" to isolate issue
- Work with provider to tune detection rules
- Consider using Microsoft Defender integration
Issue: Federated Identity Credential Authentication Failing
Symptoms: Webhook receives requests but authentication fails
Solutions:
- Regenerate FIC subject identifier with correct base64 encoding
- Verify tenant ID is correct in issuer URL and subject
- Confirm webhook endpoint URL matches exactly
- Check app registration has not been modified
- Review Entra sign-in logs for error details
Issue: "Problem saving settings" in Additional Threat Detection
Symptoms: Error when saving Additional Threat Detection configuration in PPAC
Solutions:
- Verify the Entra app registration exists and is not deleted
- Confirm the Application ID format is correct (GUID format: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx)
- Check that Federated Identity Credential is properly configured
- Verify the endpoint URL is HTTPS and publicly accessible
- Ensure you have Power Platform Admin role
- Wait 1 minute and retry (propagation delay)
Issue: "Connection to protection provider failed"
Symptoms: Agent interactions fail with connection error to threat detection provider
Solutions:
- Verify webhook endpoint is publicly accessible (not behind firewall/VPN)
- Test endpoint connectivity with curl or Postman
- Check endpoint SSL certificate is valid and not expired
- Verify endpoint responds within 1-second timeout
- Review Azure Function/API Gateway logs if hosting custom webhook
- Check for rate limiting or throttling on the endpoint
Issue: Agent Tool Invocations Timing Out
Symptoms: Agent interactions hang when invoking tools in protected environments
Solutions:
- Verify webhook endpoint response time is under 1 second
- Check for network latency between Power Platform and webhook
- Optimize webhook code for faster response
- Consider caching threat evaluation results for common patterns
- Review webhook infrastructure scaling (Azure Function consumption plan may cold-start)
- Temporarily set error behavior to "Allow" to isolate timeout issue
Issue: Defender Not Receiving Tool Invocation Requests
Symptoms: No requests appearing in Defender/webhook logs
Solutions:
- Verify Additional Threat Detection is enabled in PPAC for the environment
- Confirm the agent is a generative orchestration agent (classic agents not supported)
- Check the agent is published and users are interacting with it
- Verify data sharing consent is enabled
- Review Entra app registration sign-in logs for authentication failures
- Ensure Environment Group settings are not overriding environment-level config
Issue: App ID Changes Not Taking Effect
Symptoms: Updated App ID not recognized by Power Platform
Solutions:
- Wait up to 1 minute for propagation (documented delay)
- Clear browser cache and refresh PPAC
- Sign out and sign back in to PPAC
- Verify the new app registration is in the correct tenant
- Check that old app registration is not being cached
Issue: Base64 Encoding Errors in FIC Subject Identifier
Symptoms: FIC configuration fails with invalid subject error
Solutions:
- Use PowerShell to generate correct base64 encoding:
$TenantIdBase64 = [Convert]::ToBase64String([Text.Encoding]::UTF8.GetBytes($TenantId)) $EndpointBase64 = [Convert]::ToBase64String([Text.Encoding]::UTF8.GetBytes($WebhookEndpoint)) - Ensure no trailing newlines or spaces in the encoded values
- Verify the subject identifier format matches exactly:
/eid1/c/pub/t/{base64-tenant-id}/a/m1WPnYRZpEaQKq1Cceg--g/{base64-endpoint} - Use the provided PowerShell script for automated encoding
Issue: Error Behavior "Block" Causing Production Outages
Symptoms: Legitimate agent interactions blocked when Defender is temporarily unavailable
Solutions:
- Review Defender/webhook service health and SLA
- Implement high-availability for webhook endpoint (multiple regions, load balancing)
- Configure alerting for webhook endpoint availability
- For Zone 1 environments, consider switching to "Allow the agent to respond"
- Implement circuit breaker pattern in webhook to fail fast
- Document incident response procedures for threat detection provider outages
Native Microsoft Defender Integration Issues
Issue: Native Defender Toggle Not Available in PPAC
Symptoms: "Microsoft Defender - Copilot Studio AI Agents" option not visible in Security > Threat detection
Solutions:
- Verify you have Microsoft Defender for Cloud Apps license (M365 E5)
- Ensure you have Power Platform Admin role
- Check if the feature is enabled in your tenant (may require tenant enablement)
- Verify the Defender portal has Copilot Studio AI Agents feature enabled first
- Wait 30 minutes after enabling in Defender portal before checking PPAC
Issue: AI Agent Inventory Not Populating
Symptoms: No agents visible in Defender portal after enabling integration (24+ hours)
Solutions:
- Verify native Defender integration is enabled in both portals:
- Microsoft Defender Portal: Settings > Cloud Apps > Copilot Studio AI Agents = On
- Power Platform Admin Center: Security > Threat detection > Microsoft Defender toggle = On
- Confirm Microsoft 365 App Connector is connected in Defender portal
- Ensure agents are generative orchestration agents (classic agents not supported)
- Verify agents are published and have recent user interactions
- Check Defender service health for any ongoing issues
- Wait full 24-hour propagation period before escalating
Issue: Microsoft 365 App Connector Not Connected
Symptoms: Defender shows M365 App Connector disconnected or unhealthy
Solutions:
- Navigate to Defender Portal > Settings > Cloud Apps > App connectors
- Locate Microsoft 365 connector and check status
- If disconnected, click Reconnect and follow authentication flow
- Ensure service account has required permissions:
- Entra Global Admin (for initial setup)
- Or Entra Security Admin + Purview Compliance Admin
- Verify OAuth consent has not been revoked in Entra ID
- Check Entra audit logs for any app permission changes
Issue: Defender XDR Alerts Not Generating for Blocked Actions
Symptoms: Agent tool invocations blocked but no alerts appear in Defender
Solutions:
- Verify real-time protection is active (check agent interaction logs)
- Confirm blocked action was actually blocked by Defender (not by DLP or other policy)
- Check alert filters in Defender portal - ensure Copilot Studio alerts are not filtered out
- Review alert policies - custom policies may override default alerting
- Wait 15-30 minutes for alert propagation
- Use Advanced Hunting to query CloudAppEvents for blocked actions:
CloudAppEvents | where Application == "Microsoft Copilot Studio" | where ActionType contains "Blocked" | take 50
Issue: Defender Portal Shows "Not Connected" Status
Symptoms: PPAC shows toggle enabled but Defender portal shows disconnected
Solutions:
- Re-toggle the integration off and on in PPAC
- Wait 30 minutes for synchronization
- Verify both admin accounts (PPAC and Defender) are in the same tenant
- Check for any Conditional Access policies blocking the integration
- Review Defender service health status
- Contact Microsoft Support if status remains inconsistent after 1 hour
Issue: Licensing Errors When Enabling Defender Integration
Symptoms: Error message about insufficient licensing when enabling toggle
Solutions:
- Verify Defender for Cloud Apps license is assigned to admin account
- Check tenant has active M365 E5 or Defender for Cloud Apps standalone license
- Ensure license is properly activated (may take 24 hours after purchase)
- Verify license is assigned to users who will interact with protected agents
- Review Microsoft 365 Admin Center > Billing > Licenses for license status
Issue: Defender Integration Causing Agent Performance Degradation
Symptoms: Agent responses noticeably slower after enabling Defender integration
Solutions:
- Defender inspection adds ~100-200ms latency per tool invocation (expected)
- Check Defender service health for any performance issues
- Review agent complexity - many tool invocations multiply latency impact
- Consider if latency is acceptable for use case (Zone 3 may tolerate more latency for security)
- Monitor CloudAppEvents for timeout or retry patterns
- If latency exceeds 1 second consistently, open Microsoft Support case
Escalation Path
If issues persist:
- First tier: Power Platform Admin - verify configuration
- Second tier: Security Operations - check alert/SIEM issues
- Third tier: Entra Security Admin - app registration and FIC issues
- Fourth tier: Microsoft Support - platform-level issues
For Additional Threat Detection (third-party webhook) issues:
| Issue Category | Escalation Path |
|---|---|
| App registration/FIC | Entra Security Admin → Microsoft Identity Support |
| Webhook connectivity | Network Admin → Azure Support (if Azure-hosted) |
| PPAC configuration errors | Power Platform Admin → Microsoft Power Platform Support |
For Native Microsoft Defender Integration issues:
| Issue Category | Escalation Path |
|---|---|
| Defender portal configuration | Defender XDR Admin → Microsoft Defender Support |
| PPAC toggle issues | Power Platform Admin → Microsoft Power Platform Support |
| M365 App Connector | Defender XDR Admin → Microsoft Defender Support |
| Agent inventory issues | Security Operations → Microsoft Defender Support |
| Licensing issues | Microsoft 365 Admin → Microsoft Licensing Support |
| Cross-portal sync issues | Both admins coordinate → Microsoft Support (joint ticket) |
Updated: February 2026 | Version: v1.3