Control 1.8: Runtime Protection and External Threat Detection - Verification & Testing
This playbook provides verification and testing guidance for Control 1.8.
Verification Steps
| Step | Action | Expected Result |
|---|---|---|
| 1 | Confirm Managed Environment | Environment shows as Managed |
| 2 | Test prompt injection detection | Blocked with log entry |
| 3 | Validate egress controls | Blocked connector/tool invocation logged |
| 4 | Verify alert configuration | FSI alerts created and enabled |
| 5 | Test content moderation | Appropriate moderation response |
| 6 | Validate SIEM integration (Zone 3) | Events streaming within SLA |
| 7 | Verify external threat detection | Webhook receives requests (if enabled) |
| 8 | Verify Additional Threat Detection config | App ID and endpoint configured correctly |
| 9 | Test Defender webhook connectivity | Webhook responds within 1 second |
| 10 | Validate error behavior | Correct action when provider unavailable |
| 11 | Verify native Defender integration | Toggle enabled in both portals |
| 12 | Validate AI agent inventory | Agents visible in Defender portal |
| 13 | Test Defender XDR alerting | Blocked action generates incident |
Test Cases
Test 1: Prompt Injection Detection
- Submit test prompt with injection pattern (e.g., "ignore previous instructions")
- Expected: Blocked with log entry
- Verify event appears in audit log
Test 2: Egress Controls
- Attempt to invoke a blocked/high-risk connector from the agent
- Attempt to reach a non-approved destination
- Expected: Invocation blocked; audit log captured with policy reason
Test 3: Content Moderation
- Submit content that should be blocked (e.g., harmful content)
- Expected: Appropriate moderation response
- Verify moderation event logged
Test 4: Alert Generation
- Generate test security event (e.g., prompt injection attempt)
- Expected: Alert generated and delivered to configured recipients
- Verify alert appears in Purview
Test 5: SIEM Integration
- Generate test security event
- Expected: Event appears in SIEM within SLA
- Verify event correlation is working
Test 6: Additional Threat Detection Configuration
- Navigate to Power Platform Admin Center > Security > Threat detection > Additional threat detection
- Select a Zone 2/3 environment
- Verify: Data sharing is enabled
- Verify: Azure Entra App ID is populated and valid
- Verify: Endpoint link is populated with HTTPS URL
- Verify: Error behavior is set to "Block the query" for regulated environments
Test 7: Entra App Registration Verification
- Navigate to Microsoft Entra Admin Center > App registrations
- Search for the CopilotStudio-ThreatDetection app
- Verify: App exists with correct display name
- Verify: Sign-in audience is "Single tenant"
- Navigate to Certificates & secrets > Federated credentials
- Verify: FIC exists with correct issuer and subject identifier
Test 8: Webhook Endpoint Connectivity
- Use curl or Postman to test webhook endpoint:
curl -X POST https://your-webhook-endpoint/api/evaluate \ -H "Content-Type: application/json" \ -d '{"test": true}' - Expected: Response within 1 second
- Expected: HTTP 200 status code
- Verify: Response format is valid (allow/block/warn)
Test 9: End-to-End Defender Integration
- Interact with a generative agent in a protected environment
- Agent invokes a tool (e.g., retrieves data from SharePoint)
- Verify: Webhook receives the tool invocation payload
- Verify: Webhook returns evaluation within 1-second SLA
- Verify: Agent action proceeds (if allowed) or is blocked (if denied)
Test 10: Error Behavior Validation (Zone 2/3 Only)
- Temporarily disable the webhook endpoint or simulate unavailability
- Interact with a generative agent that invokes a tool
- Expected (if "Block the query"): Agent query is blocked with error message
- Expected (if "Allow the agent to respond"): Agent continues without threat evaluation
- Re-enable webhook and verify normal operation resumes
Test 11: Native Microsoft Defender Integration Configuration
- Navigate to Microsoft Defender Portal > Settings > Cloud Apps > Copilot Studio AI Agents
- Verify: Copilot Studio AI Agents toggle is On
- Verify: Microsoft 365 App Connector is connected and healthy
- Navigate to Power Platform Admin Center > Security > Threat detection
- Verify: Microsoft Defender - Copilot Studio AI Agents toggle is On
- Verify: Both portals show connected status
Test 12: AI Agent Inventory Population
- Wait 2-24 hours after enabling native Defender integration
- Navigate to Microsoft Defender Portal > Identities > AI agents (or Cloud Apps > AI Agents)
- Verify: Copilot Studio agents are listed in inventory
- Verify: Agent metadata is populated (name, environment, owner)
- Verify: Security posture indicators are displayed for each agent
Test 13: Defender XDR Alert Generation
- Trigger a blocked action (e.g., prompt injection in a protected agent)
- Navigate to Microsoft Defender Portal > Incidents & alerts
- Verify: Alert generated for blocked action
- Verify: Alert contains agent name, user, and action details
- Verify: Alert severity matches expected level (High for prompt injection)
Test 14: Defender Advanced Hunting Query
- Navigate to Microsoft Defender Portal > Hunting > Advanced hunting
- Run the following query:
CloudAppEvents | where Application == "Microsoft Copilot Studio" | where ActionType == "AgentInteraction" | take 10 - Verify: Results return agent interaction events
- Verify: Events include agent name, user, and action details
Test 15: Activity Logging to Microsoft Purview
- Interact with a protected generative agent
- Navigate to Microsoft Purview > Audit log search
- Search for Copilot Studio activities
- Verify: Agent interaction events appear in audit log
- Verify: Events include tool invocations and user prompts (metadata)
Test 16: Defender CloudAppEvents for Agent Activity
- Navigate to Microsoft Defender Portal > Hunting > Advanced hunting
- Run the following query to verify Defender is capturing agent activity:
CloudAppEvents | where Timestamp > ago(24h) | where Application == "Microsoft Copilot Studio" | extend ActionType = tostring(RawEventData.ActionType) | summarize count() by ActionType, bin(Timestamp, 1h) | order by Timestamp desc - Verify: Results show agent interaction events from the past 24 hours
- Verify: Activity types include tool invocations, user prompts, and agent responses
- Verify: Event volume matches expected agent usage patterns
Test 17: DSPM Activity Explorer Integration with Defender Events
- Navigate to Microsoft Purview > DSPM for AI > Activity explorer
- Filter for Copilot Studio agent activities
- Verify: Defender-sourced activity events appear in Activity Explorer
- Verify: Events show security context (UPIA/XPIA detection flags if applicable)
- Verify: Cross-portal consistency between Defender and Purview audit data
Expected Result: Defender activity logging integrates seamlessly with DSPM Activity Explorer for comprehensive compliance monitoring.
Evidence Artifacts
- Screenshot: Managed environment confirmation
- Screenshot: Runtime protection settings
- Export: Alert policy configurations
- Log: Prompt injection detection test
- Export/screenshot: DLP policy and connector restrictions
- Log: Egress/tool blocking test
- Documentation: Incident response playbook
- SIEM: Power Platform connector status
- Screenshot: External threat detection configuration (if enabled)
- Documentation: Vendor risk assessment (if using third-party webhook)
- Screenshot: Additional threat detection settings in PPAC
- Screenshot: Entra app registration with FIC configured
- Log: Webhook endpoint connectivity test results
- Export: App registration details (AppId, ObjectId, FIC configuration)
- Documentation: Error behavior justification for each zone
- Screenshot: Native Defender integration toggle in Defender portal
- Screenshot: Native Defender integration toggle in PPAC
- Screenshot: AI agent inventory in Defender portal
- Screenshot: Defender XDR alert for blocked action
- Export: Advanced hunting query results
- Log: Purview audit log entries for agent interactions
- Export: CloudAppEvents query results for agent activity (Test 16)
- Screenshot: DSPM Activity Explorer showing Defender-sourced events (Test 17)
Zone-Specific Testing
Zone 1 (Personal Productivity)
- Runtime protection: Optional
- Prompt injection: Log only
- Response SLA: Best effort
- Native Defender: Optional
- Additional Threat Detection: Not required
Zone 2 (Team Collaboration)
- Runtime protection: Required
- Prompt injection: Block and log
- Response SLA: 4 hours
- Native Defender: Required
- Additional Threat Detection: Optional (use if third-party provider needed)
Zone 3 (Enterprise Managed)
- Runtime protection: Required - Maximum
- Prompt injection: Block, log, and investigate
- Response SLA: 15 minutes
- Incident playbook: Required
- Native Defender: Required
- Additional Threat Detection: Recommended for additional security layers
- AI agent inventory audit: Quarterly
Confirmation Checklist
- Managed Environment is enabled
- Runtime protection settings are configured
- Prompt injection detection is active
- Content moderation is enabled
- Egress controls are in place
- Alert policies are created and enabled
- SIEM integration is functional (Zone 2-3)
- Incident response playbook is documented
- Evidence artifacts collected and stored
- Additional threat detection enabled for Zone 2/3 environments
- Entra app registration created with Federated Identity Credentials
- Webhook endpoint responds within 1-second SLA
- Error behavior set to "Block the query" for regulated environments
- Vendor risk assessment completed (if using third-party provider)
- Native Microsoft Defender integration enabled (Zone 2/3)
- AI agent inventory populated in Defender portal
- Defender XDR alerts verified for blocked actions
- M365 App Connector connected in Defender portal
- CloudAppEvents query returns agent activity data (Test 16)
- DSPM Activity Explorer shows Defender-sourced events (Test 17)
SSPM Configuration Verification
Security Posture Assessment Test Cases
The following test cases validate configuration points flagged by security posture assessments. Each test maps to a specific setting in the Configuration Hardening Baseline.
| Test ID | Configuration Point | Expected Result | Portal Path | Evidence |
|---|---|---|---|---|
| SSPM-1.8-01 | Content moderation level | Set to High for Zone 2/3 agents | Copilot Studio > {Agent} > Settings > Content moderation | Screenshot |
| SSPM-1.8-02 | Minimum moderation threshold | No agents below Medium without documented risk acceptance | Copilot Studio > {Agent} > Settings > Content moderation | Screenshot |
Test Procedures
SSPM-1.8-01: Content Moderation Level
- Navigate to Copilot Studio > select a Zone 2 or Zone 3 agent > Settings > Content moderation
- Verify content moderation level is set to High
- Repeat for each Zone 2/3 agent in the environment
- Pass criteria: All Zone 2 and Zone 3 agents have content moderation set to High
- Evidence: Screenshot showing content moderation setting for each Zone 2/3 agent
SSPM-1.8-02: Minimum Moderation Threshold
- Navigate to Copilot Studio > review all agents across all environments
- For each agent, check Settings > Content moderation level
- Identify any agents with moderation level below Medium
- If agents below Medium exist, verify documented risk acceptance is on file
- Pass criteria: No agents have moderation below Medium without a signed risk acceptance document
- Evidence: Screenshot of each agent's moderation level; risk acceptance documents (if applicable)
Updated: February 2026 | Version: v1.3 | Classification: Verification Testing