{"id":2887,"date":"2026-02-28T18:12:22","date_gmt":"2026-02-28T16:12:22","guid":{"rendered":"https:\/\/www.jussimetso.com\/?p=2887"},"modified":"2026-02-28T18:13:49","modified_gmt":"2026-02-28T16:13:49","slug":"book-review-of-microsoft-security-copilot-for-security-operations","status":"publish","type":"post","link":"https:\/\/www.jussimetso.com\/index.php\/2026\/02\/28\/book-review-of-microsoft-security-copilot-for-security-operations\/","title":{"rendered":"Book review of Microsoft Security Copilot for Security Operations"},"content":{"rendered":"<div id=\"bsf_rt_marker\"><\/div>\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2887\" class=\"elementor elementor-2887\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-12f5cf38 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"12f5cf38\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4ae0f524\" data-id=\"4ae0f524\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-972116d elementor-toc--minimized-on-tablet elementor-widget elementor-widget-table-of-contents\" data-id=\"972116d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;headings_by_tags&quot;:[&quot;h2&quot;,&quot;h3&quot;,&quot;h4&quot;,&quot;h5&quot;],&quot;exclude_headings_by_selector&quot;:[],&quot;no_headings_message&quot;:&quot;No headings were found on this page.&quot;,&quot;marker_view&quot;:&quot;numbers&quot;,&quot;minimize_box&quot;:&quot;yes&quot;,&quot;minimized_on&quot;:&quot;tablet&quot;,&quot;hierarchical_view&quot;:&quot;yes&quot;,&quot;min_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"table-of-contents.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__header\">\n\t\t\t\t\t\t<h4 class=\"elementor-toc__header-title\">\n\t\t\t\tTable of Contents\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--expand\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__972116d\" aria-expanded=\"true\" aria-label=\"Open table of contents\"><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/div>\n\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--collapse\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__972116d\" aria-expanded=\"true\" aria-label=\"Close table of contents\"><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<div id=\"elementor-toc__972116d\" class=\"elementor-toc__body\">\n\t\t\t<div class=\"elementor-toc__spinner-container\">\n\t\t\t\t<i class=\"elementor-toc__spinner eicon-animation-spin eicon-loading\" aria-hidden=\"true\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-257c92b elementor-widget elementor-widget-heading\" data-id=\"257c92b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">About the book<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d351454 elementor-widget elementor-widget-text-editor\" data-id=\"2d351454\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p>Sami Lamppu and Raghu Boddu have made another book. This time it is all about the Security Copilot from Security operations point of view. Their previous book was <a href=\"https:\/\/www.jussimetso.com\/index.php\/2024\/04\/11\/book-review-of-unified-xdr-and-siem-solution-handbook\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\" data-type=\"link\" data-id=\"https:\/\/www.jussimetso.com\/index.php\/2024\/04\/11\/book-review-of-unified-xdr-and-siem-solution-handbook\/\">this<\/a>.<\/p>\n\n<p>The book contains 12 chapters which are divided to 4 sections.\u00a0<\/p>\n\n<p>You can get this book from <a href=\"https:\/\/orangeava.com\/products\/ultimate-microsoft-security-copilot-for-security-operations?\" target=\"_blank\" rel=\"noreferrer noopener nofollow\" data-type=\"link\" data-id=\"https:\/\/orangeava.com\/products\/ultimate-microsoft-security-copilot-for-security-operations?\">orangeava.com<\/a> and from <a href=\"https:\/\/www.amazon.com\/Ultimate-Microsoft-Security-Copilot-Operations\/dp\/9349888114\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Amazon.com<\/a><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d9e5079 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"d9e5079\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0cb318c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0cb318c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e62226b\" data-id=\"e62226b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3c8b1e2 elementor-widget elementor-widget-heading\" data-id=\"3c8b1e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">For who<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f8136cd elementor-widget elementor-widget-text-editor\" data-id=\"f8136cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This is a comprehensive set of Microsoft Security Copilot. Whether you are beginner or pro you will definitely learn something new. This book is not just pure technical people. This book offers ROI calculations for business decicision makers.\u00a0<\/p>\n<p>S0 anyone who needs to know, learn, or use the Security Copilot. This is for you.<\/p>\n<!-- \/wp:paragraph --><!-- wp:heading --><!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f2c850c elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"f2c850c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-838674f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"838674f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-eb0569d\" data-id=\"eb0569d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e38c898 elementor-widget elementor-widget-heading\" data-id=\"e38c898\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Content of the book<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf2a4e9 elementor-widget elementor-widget-text-editor\" data-id=\"bf2a4e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9858f24 elementor-widget elementor-widget-text-editor\" data-id=\"9858f24\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p>The book has a lot of content and you can see the short description here of each chapter.<\/p>\n<p><strong>Chapter1<\/strong>\u00a0will cover some of the basics of Gen AI&#8217;s role in Cybersecurity, examining the impact and its integral role in reshaping the security industry.<\/p>\n<p><strong>Chapter2 <\/strong>describes the comprehensive overview of Microsoft Security Copilot capabilities and architecture.<\/p>\n<p><strong>Chapter3\u00a0<\/strong>will further describe the integrations between SC and Defender XDR and Sentinel as primary focus.<\/p>\n<p><strong>Chapter4.<\/strong> The art of prompt engineering and the power of promptbooks. Discover how Security Copilot integrates with Microsoft ecosystem.<\/p>\n<p><strong>Chapter5\u00a0<\/strong>takes a closer look at the AI agents era, exploring how these agents can advice security teams worldwide.<\/p>\n<p><strong>Chapter6<\/strong> describes how SC elevates SOC capabilities, bridging cybersecurity skill gaps and empowering teams with intelligent insights.<\/p>\n<\/div>\n<p><strong>Chapter7\u00a0<\/strong>examines the benefits of Risk Operations Center (ROC) and how these paradigm signals a transformative shift in organizational security culture. And how automation driven by\u00a0 SC can streamline processes.<\/p>\n<p><strong>Chapter8\u00a0<\/strong>examines the importance of conducting a thorough needs analysis, evaluate current security postures and perform gap assessments to identify vulnerabilities and areas for improvement.<\/p>\n<p><strong>Chapter9\u00a0<\/strong>explains how SC eases AI automation and real-time monitoring with both Microsoft and non-Microsoft security tools.\u00a0<\/p>\n<p><strong>Chapter10<\/strong> is for costs and pricing. Guidance for the SCU (Secure Compute Unit) purchase strategy and demonstration to effectively use the pricing calculator. Also a focus on ROI (Return of Investment) offering best practices to maximize the value of SC investment.<\/p>\n<p><strong>Chapter11<\/strong> offers a case study.<\/p>\n<p><strong>Chapter12<\/strong> presents a thorough collection of key resources to deepen your understanding of AI and security, including various SC content, third-party resources (blogs, tools, GitHub repositories).<\/p>\n<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-613416c elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"613416c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bdc649b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bdc649b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-863201d\" data-id=\"863201d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dd1a85e elementor-widget elementor-widget-heading\" data-id=\"dd1a85e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Some topics<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4b2ca4 elementor-widget elementor-widget-heading\" data-id=\"d4b2ca4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Gen AI in Cybersecurity use cases (from chapter 1)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b92d248 elementor-blockquote--skin-boxed elementor-widget elementor-widget-blockquote\" data-id=\"b92d248\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"blockquote.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<blockquote class=\"elementor-blockquote\">\n\t\t\t<p class=\"elementor-blockquote__content\">\n\t\t\t\tGen AI is rapidly transforming the cybersecurity landscape presenting both exciting opportunities for enhanced defense and concerning new avenues for attack. It's ability to learn patterns, generate new data and automate complex tasks makes it powerful tool with a dual nature.\t\t\t<\/p>\n\t\t\t\t\t\t\t<div class=\"e-q-footer\">\n\t\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-blockquote__author\">Sami Lamppu &amp; Raghu Boddu<\/cite>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/blockquote>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-725f540 elementor-widget elementor-widget-image\" data-id=\"725f540\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"640\" height=\"716\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2026\/02\/bookreview_genaicyberusecases.jpg?fit=640%2C716&amp;ssl=1\" class=\"attachment-large size-large wp-image-2955\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2026\/02\/bookreview_genaicyberusecases.jpg?w=711&amp;ssl=1 711w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2026\/02\/bookreview_genaicyberusecases.jpg?resize=268%2C300&amp;ssl=1 268w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2026\/02\/bookreview_genaicyberusecases.jpg?resize=300%2C335&amp;ssl=1 300w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Cybersecurity use cases - Property of SL &amp; RB<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba3cad elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"2ba3cad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5996257 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5996257\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ed67f0c\" data-id=\"ed67f0c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d4c3715 elementor-widget elementor-widget-heading\" data-id=\"d4c3715\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Good prompt vs bad prompt (from chapter 4)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eea5857 elementor-blockquote--skin-boxed elementor-widget elementor-widget-blockquote\" data-id=\"eea5857\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"blockquote.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<blockquote class=\"elementor-blockquote\">\n\t\t\t<p class=\"elementor-blockquote__content\">\n\t\t\t\tA good prompt is clear, spesific and detailed VS bad prompt is vague and ambiguous which leads to incomplete or inaccurate outputs.\t\t\t<\/p>\n\t\t\t\t\t\t\t<div class=\"e-q-footer\">\n\t\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-blockquote__author\">Sami Lamppu &amp; Raghu Boddu<\/cite>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/blockquote>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-838dad2 elementor-widget elementor-widget-text-editor\" data-id=\"838dad2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Good prompt example:<\/p>\n<p><strong>&#8220;Analyze the last 24 hours of login attempts and identify any suscipious activity, including IP addresses and timestamps&#8221;.<\/strong><\/p>\n<p>Bad prompt example:<\/p>\n<p><strong>&#8220;Check recent logins&#8221;.<\/strong><\/p>\n<p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d9e333b elementor-widget elementor-widget-image\" data-id=\"d9e333b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"640\" height=\"376\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2026\/02\/bookreview_sc_prompt.jpg?fit=640%2C376&amp;ssl=1\" class=\"attachment-large size-large wp-image-2956\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2026\/02\/bookreview_sc_prompt.jpg?w=1600&amp;ssl=1 1600w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2026\/02\/bookreview_sc_prompt.jpg?resize=300%2C176&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2026\/02\/bookreview_sc_prompt.jpg?resize=1024%2C601&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2026\/02\/bookreview_sc_prompt.jpg?resize=768%2C451&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2026\/02\/bookreview_sc_prompt.jpg?resize=1536%2C901&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2026\/02\/bookreview_sc_prompt.jpg?resize=850%2C499&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2026\/02\/bookreview_sc_prompt.jpg?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">SC prompt processing - property of SL &amp; RB<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-be3d4df elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"be3d4df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-89c6820 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"89c6820\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5ef2da6\" data-id=\"5ef2da6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cedbbf1 elementor-widget elementor-widget-heading\" data-id=\"cedbbf1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cyber Risk Operations Center (from chapter 7)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b8d05a7 elementor-blockquote--skin-boxed elementor-widget elementor-widget-blockquote\" data-id=\"b8d05a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"blockquote.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<blockquote class=\"elementor-blockquote\">\n\t\t\t<p class=\"elementor-blockquote__content\">\n\t\t\t\tBenefits of adopting CROC is more than a tactical upgrade -&gt; It's strategic investment that yields profound benefits across the entire spectrum of organizational performance.\t\t\t<\/p>\n\t\t\t\t\t\t\t<div class=\"e-q-footer\">\n\t\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-blockquote__author\">Sami Lamppu &amp; Raghu Boddu<\/cite>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/blockquote>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f0a8a1b elementor-widget elementor-widget-image\" data-id=\"f0a8a1b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"640\" height=\"640\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2026\/02\/bookreview_roc.jpg?fit=640%2C640&amp;ssl=1\" class=\"attachment-large size-large wp-image-2957\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2026\/02\/bookreview_roc.jpg?w=1024&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2026\/02\/bookreview_roc.jpg?resize=300%2C300&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2026\/02\/bookreview_roc.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2026\/02\/bookreview_roc.jpg?resize=768%2C768&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2026\/02\/bookreview_roc.jpg?resize=850%2C850&amp;ssl=1 850w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Cyber Life cycle -  property of SL &amp; RB<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d0a9ea0 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"d0a9ea0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e4cbc6e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e4cbc6e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b6055b0\" data-id=\"b6055b0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-465c546 elementor-widget elementor-widget-heading\" data-id=\"465c546\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Security Copilot Automation and monitoring (from chapter 9)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d350872 elementor-blockquote--skin-boxed elementor-widget elementor-widget-blockquote\" data-id=\"d350872\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"blockquote.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<blockquote class=\"elementor-blockquote\">\n\t\t\t<p class=\"elementor-blockquote__content\">\n\t\t\t\tAn effective monitoring strategy is essential to maximize its value, ensure optimal performance and maintain security compliance across Data, Privacy and Security.\t\t\t<\/p>\n\t\t\t\t\t\t\t<div class=\"e-q-footer\">\n\t\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-blockquote__author\">Sami Lamppu &amp; Raghu Boddu<\/cite>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/blockquote>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0185db7 elementor-widget elementor-widget-image\" data-id=\"0185db7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"281\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2026\/02\/bookreview_aitmflow.png?fit=640%2C281&amp;ssl=1\" class=\"attachment-large size-large wp-image-2958\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2026\/02\/bookreview_aitmflow.png?w=1129&amp;ssl=1 1129w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2026\/02\/bookreview_aitmflow.png?resize=300%2C132&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2026\/02\/bookreview_aitmflow.png?resize=1024%2C450&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2026\/02\/bookreview_aitmflow.png?resize=768%2C337&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2026\/02\/bookreview_aitmflow.png?resize=850%2C373&amp;ssl=1 850w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Example of AiTM investigation flow with SC - property of SL &amp; RB<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cc7d40 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8cc7d40\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e028361 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e028361\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a84d74f\" data-id=\"a84d74f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f04cbda elementor-widget elementor-widget-heading\" data-id=\"f04cbda\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Summary<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cddb7fe elementor-widget elementor-widget-text-editor\" data-id=\"cddb7fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:heading --><!-- \/wp:heading --><!-- wp:paragraph --><!-- \/wp:heading --><!-- wp:paragraph -->\n<div class=\"elementor-element elementor-element-693c9ea elementor-widget elementor-widget-text-editor\" data-id=\"693c9ea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p>The way Sami and Raghu have written the book is clear and understandable. Even the table of contents is very good. I see right away what I was looking for.\u00a0<\/p>\n<p>There are easy use cases and this case study in chapter 11 with a fictional company describes a good way things could also do in real life.<\/p>\n<p>Every chapter has its key terms and further reading links available.<\/p>\n<p>To read and understand this book you\u00a0 it helps if you know something about Microsoft security products like Entra ID, Defender XDR, Sentinel and some Azure. This is book is not for dummies but still welcomes everyone to read it though the learning curve can be steep.<\/p>\n<p>And for me who does security with Microsoft security products this is a very good book since I have not been studying Security Copilot lately because I have focused to Sentinel and Defender for Cloud transitions.\u00a0<\/p>\n<\/div>\n<\/div>\n<p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1353f68 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1353f68\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-22788f84\" data-id=\"22788f84\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-677e324b elementor-widget elementor-widget-author-box\" data-id=\"677e324b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"author-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-author-box\">\n\t\t\t\t\t\t\t<div  class=\"elementor-author-box__avatar\">\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/07\/jussi_06_2024.jpg?fit=262%2C300&#038;ssl=1\" alt=\"Picture of Jussi Metso\" loading=\"lazy\">\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t<div class=\"elementor-author-box__text\">\n\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t<h6 class=\"elementor-author-box__name\">\n\t\t\t\t\t\t\tJussi Metso\t\t\t\t\t\t<\/h6>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-author-box__bio\">\n\t\t\t\t\t\t<p>Author is a lifelong IT enthusiast, Microsoft Security MVP and interested in Cloud Security, XDR, SIEM and AI. Motto: Learning is the key for your future. <\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The book takes you from understanding the foundations of AI in cybersecurity to fully integrating Microsoft Security Copilot into modern SOC, XDR, and SIEM operations.<\/p>\n","protected":false},"author":1,"featured_media":2888,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_theme","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[60],"tags":[49,36,48,59],"class_list":["post-2887","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securitycopilot","tag-bookreview","tag-cloudsecurity","tag-defenderxdr","tag-securitycopilot"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2026\/02\/securitycopilot-kansi-e1771787504388.png?fit=425%2C510&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pes24X-Kz","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/posts\/2887","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/comments?post=2887"}],"version-history":[{"count":36,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/posts\/2887\/revisions"}],"predecessor-version":[{"id":2975,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/posts\/2887\/revisions\/2975"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/media\/2888"}],"wp:attachment":[{"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/media?parent=2887"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/categories?post=2887"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/tags?post=2887"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}