Control 3.7: PPAC Security Posture Assessment - Portal Walkthrough
This playbook provides step-by-step portal configuration guidance for Control 3.7.
Prerequisites
- Power Platform Admin role
- Entra Security Admin role for Defender integration
- Power BI Pro license for advanced reporting
Step 1: Access Security Dashboard
Portal Path: Power Platform Admin Center > Security
- Navigate to Power Platform Admin Center
- Select Security in the left navigation
- Review the Security dashboard components
Step 2: Review Security Page Overview
The Security page provides four tabs:
| Tab | Purpose | Key Metrics |
|---|---|---|
| Overview | Security recommendations | Top recommendations, linked controls |
| Health | Posture recommendations | Recommendations list |
| Monitor | Audit logs and sign-ins | Activity monitoring |
| Controls | Link to Copilot settings | Configuration access |
Step 3: Review Security Recommendations
Portal Path: PPAC > Security > Overview
The Overview tab displays security recommendations:
| Section | Content |
|---|---|
| Top recommendations | Priority security actions |
| Linked recommendations | Related security controls |
Click "See more recommendations in Health" to view full list.
Step 4: Review Health Recommendations
Portal Path: PPAC > Security > Health
The Health tab shows all recommendations:
| Column | Description |
|---|---|
| Recommendation | Security improvement |
| Recommendation status | Not started / In progress / Completed |
| Risk level | High / Medium / Low |
| Category | Security area |
Common Recommendations:
| Recommendation | Category | Risk |
|---|---|---|
| Enable managed environments | Environment | High |
| Configure DLP policies | Data protection | High |
| Enable Copilot Studio security settings | AI governance | Medium |
| Restrict sharing scope | Access control | Medium |
Step 5: Configure Monitor Tab
Portal Path: PPAC > Security > Monitor
Monitor tab provides links to:
| Section | Destination |
|---|---|
| Audit logs | Unified audit log |
| Sign-ins | Entra ID sign-in logs |
| Activity | Power Platform activity |
Step 6: Access Controls Configuration
Portal Path: PPAC > Security > Controls
The Controls tab links to:
- Copilot Studio settings
- Generative AI configuration
- Security policies
Step 7: Create Posture Assessment Report
Build a periodic assessment report:
| Section | Content |
|---|---|
| Summary Score | Overall posture rating |
| Recommendations Status | Count by status |
| Risk Distribution | Count by risk level |
| Trend | Score over time |
| Action Items | Open recommendations |
Step 8: Integrate with Microsoft Defender
For enhanced security visibility:
- Navigate to Microsoft Defender portal
- Configure Power Platform connector
- Enable threat detection for agents
- Review security alerts
Step 9: Perform Configuration Hardening Baseline Review
Conduct a periodic review of security-critical settings that may drift between native PPAC recommendation reviews:
- Open Copilot Studio and verify:
- All agents have authentication enabled (not "No Authentication")
- Content moderation is set to High for Zone 2/3 agents
- Agent action consent is enabled for all actions
- Connected agent access is disabled unless approved
-
AI feature toggles (Generative Actions, File Analysis, Model Knowledge, Semantic Search) are disabled unless approved
-
Open PPAC > Tenant Settings and verify:
- Environment creation restricted to authorized admins
- Tenant isolation enabled
-
Environment routing configured
-
Open PPAC > Environment > Settings for each environment and verify:
- Dataverse auditing is enabled with adequate retention
-
Security groups are assigned
-
Document findings and archive as evidence for audit readiness
See Configuration Hardening Baseline for the complete checklist and automated verification scripts.
Step 10: Verify Environment Security Settings
Review environment-level privacy and security settings that help protect against file-based attacks, session hijacking, and code injection:
- Open PPAC > Environments and select the target environment
- Navigate to Settings > Privacy + Security and verify:
- Blocked Attachments: Dangerous file extensions are listed (ade, adp, app, asa, asp, bat, cmd, com, dll, exe, hta, jar, js, jse, msi, pst, reg, scr, vb, vbe, vbs, ws, wsc, wsf, wsh, etc.)
- Blocked MIME Types: High-risk MIME types are listed (application/javascript, application/x-javascript, application/hta, text/javascript, application/msaccess, text/scriplet, application/xml, application/prg)
- Inactivity Timeout: Enabled with duration ≤ 120 minutes
- Session Expiration: "Set custom session timeout" enabled with maximum session length ≤ 1440 minutes
-
Content Security Policy: Navigate to the "Content security policy" section > "Model Driven" > Verify "Enforce content security policy" is enabled
-
Repeat for each Zone 2/3 environment
- Document findings and archive as evidence for audit readiness
Per-Environment Settings
These settings are configured per environment — each Dataverse environment must be verified individually. Prioritize Zone 2 and Zone 3 environments for compliance.
Back to Control 3.7 | PowerShell Setup | Verification Testing | Troubleshooting
Updated: February 2026 | Version: v1.3