Edit

Share via


Identity Risk Management Agent (Preview)

IT administrators and security analysts face mounting pressure to identify and respond to threats quickly while managing increasingly complex environments. They're often overwhelmed by the sheer volume of alerts, struggle to prioritize which risks need immediate attention, and find it difficult to connect scattered data points across their organization's systems. The Identity Risk Management Agent with Security Copilot in Microsoft Entra helps these professionals investigate potential risks, understand their effect, and take decisive action to protect their organization's critical assets.

Note

The Identity Risk Management Agent is currently being deployed and in preview. This information relates to a prerelease product that might be substantially modified before it's released. Microsoft makes no warranties, expressed or implied, with respect to the information provided here.

Prerequisites

Important

Microsoft Entra Agent ID is part of Microsoft Agent 365, available now in Frontier, the Microsoft early access program for the latest AI innovations. For more information, see Microsoft Entra Agent ID.

Known limitations

  • Each agent run currently investigates up to 100 risky users. To customize the scope within this limitation, use the Agent Scope Setting.
  • Once an agent run starts, it can't be stopped or paused. It can take 10-15 minutes to finish the run on 100 users.
  • The agent currently analyzes user identity only. At this time, agent analysis on Workload Identities isn't supported.
  • Agent suggestions require manual admin approval. At this time, automatic remediation isn't supported.
  • The agent reasons over Microsoft Entra data, such as sign-in logs, risk detections, risky users, and audit logs.
  • Investigation summaries and recommendations are AI-generated and might be incomplete or incorrect. Review before enforcement and use human judgment when applying changes.

How it works

If the agent identifies new risky identities that weren't previously identified, it takes the following steps. The initial scanning steps do not consume any SCUs.

  1. The agent checks for new risky users in your tenant who currently have a risk state of "At risk".
  2. The agent identifies risky users that are within your defined scope settings.

If the agent identifies something that wasn't previously suggested, it takes the following steps. These agent action steps consume SCUs.

  1. Investigate the risky user: The agent checks the user's risky sign-ins and risk detections to analyze what's risky about this user.
  2. Generate findings and a risk summary: The agent generates findings based on the investigation, which includes a thorough risk summary explaining the suggestion and defining the key risk factors.
  3. Generate a recommended remediation action: The agent suggests a remediation action, using the information gathered during the investigation.
  4. Answer questions through chat: IT administrators ask the agent questions related to the risky users and the risk summary.
  5. Store custom instructions in agent memory: Customers can give the agent custom instructions through agent chat, which the agent stores in its memory and applies for future runs. Currently, agent memory can store preferred remediation actions.

Getting started

  1. Sign in to the Microsoft Entra admin center as at least a Security Administrator.

  2. Browse to ID Protection > Risky users.

  3. From the banner message at the top of the report, select Start agent to begin your first run.

    • Avoid using an account with a role activated through PIM.
    • A message that says "The agent is starting its first run" appears in the upper-right corner.
    • The first run might take a few minutes to complete.