Skip to content

Control 3.7: PPAC Security Posture Assessment - Portal Walkthrough

This playbook provides step-by-step portal configuration guidance for Control 3.7.


Prerequisites

  • Power Platform Admin role
  • Entra Security Admin role for Defender integration
  • Power BI Pro license for advanced reporting

Step 1: Access Security Dashboard

Portal Path: Power Platform Admin Center > Security

  1. Navigate to Power Platform Admin Center
  2. Select Security in the left navigation
  3. Review the Security dashboard components

Step 2: Review Security Page Overview

The Security page provides four tabs:

Tab Purpose Key Metrics
Overview Security recommendations Top recommendations, linked controls
Health Posture recommendations Recommendations list
Monitor Audit logs and sign-ins Activity monitoring
Controls Link to Copilot settings Configuration access

Step 3: Review Security Recommendations

Portal Path: PPAC > Security > Overview

The Overview tab displays security recommendations:

Section Content
Top recommendations Priority security actions
Linked recommendations Related security controls

Click "See more recommendations in Health" to view full list.


Step 4: Review Health Recommendations

Portal Path: PPAC > Security > Health

The Health tab shows all recommendations:

Column Description
Recommendation Security improvement
Recommendation status Not started / In progress / Completed
Risk level High / Medium / Low
Category Security area

Common Recommendations:

Recommendation Category Risk
Enable managed environments Environment High
Configure DLP policies Data protection High
Enable Copilot Studio security settings AI governance Medium
Restrict sharing scope Access control Medium

Step 5: Configure Monitor Tab

Portal Path: PPAC > Security > Monitor

Monitor tab provides links to:

Section Destination
Audit logs Unified audit log
Sign-ins Entra ID sign-in logs
Activity Power Platform activity

Step 6: Access Controls Configuration

Portal Path: PPAC > Security > Controls

The Controls tab links to:

  • Copilot Studio settings
  • Generative AI configuration
  • Security policies

Step 7: Create Posture Assessment Report

Build a periodic assessment report:

Section Content
Summary Score Overall posture rating
Recommendations Status Count by status
Risk Distribution Count by risk level
Trend Score over time
Action Items Open recommendations

Step 8: Integrate with Microsoft Defender

For enhanced security visibility:

  1. Navigate to Microsoft Defender portal
  2. Configure Power Platform connector
  3. Enable threat detection for agents
  4. Review security alerts

Step 9: Perform Configuration Hardening Baseline Review

Conduct a periodic review of security-critical settings that may drift between native PPAC recommendation reviews:

  1. Open Copilot Studio and verify:
  2. All agents have authentication enabled (not "No Authentication")
  3. Content moderation is set to High for Zone 2/3 agents
  4. Agent action consent is enabled for all actions
  5. Connected agent access is disabled unless approved
  6. AI feature toggles (Generative Actions, File Analysis, Model Knowledge, Semantic Search) are disabled unless approved

  7. Open PPAC > Tenant Settings and verify:

  8. Environment creation restricted to authorized admins
  9. Tenant isolation enabled
  10. Environment routing configured

  11. Open PPAC > Environment > Settings for each environment and verify:

  12. Dataverse auditing is enabled with adequate retention
  13. Security groups are assigned

  14. Document findings and archive as evidence for audit readiness

See Configuration Hardening Baseline for the complete checklist and automated verification scripts.


Step 10: Verify Environment Security Settings

Review environment-level privacy and security settings that help protect against file-based attacks, session hijacking, and code injection:

  1. Open PPAC > Environments and select the target environment
  2. Navigate to Settings > Privacy + Security and verify:
  3. Blocked Attachments: Dangerous file extensions are listed (ade, adp, app, asa, asp, bat, cmd, com, dll, exe, hta, jar, js, jse, msi, pst, reg, scr, vb, vbe, vbs, ws, wsc, wsf, wsh, etc.)
  4. Blocked MIME Types: High-risk MIME types are listed (application/javascript, application/x-javascript, application/hta, text/javascript, application/msaccess, text/scriplet, application/xml, application/prg)
  5. Inactivity Timeout: Enabled with duration ≤ 120 minutes
  6. Session Expiration: "Set custom session timeout" enabled with maximum session length ≤ 1440 minutes
  7. Content Security Policy: Navigate to the "Content security policy" section > "Model Driven" > Verify "Enforce content security policy" is enabled

  8. Repeat for each Zone 2/3 environment

  9. Document findings and archive as evidence for audit readiness

Per-Environment Settings

These settings are configured per environment — each Dataverse environment must be verified individually. Prioritize Zone 2 and Zone 3 environments for compliance.


Back to Control 3.7 | PowerShell Setup | Verification Testing | Troubleshooting


Updated: February 2026 | Version: v1.3