Table of Contents

Overview – How It Works

The KAMIND Security Agent (KSA) is a Copilot-style agent integrated directly into Microsoft Teams. It allows users to ask natural-language questions about their Microsoft security posture — including logins, malware detections, device compliance, conditional access, and more.

KSA translates those natural-language prompts into secure technical queries using services such as Microsoft Graph, Defender for Endpoint, and Log Analytics (KQL). All queries are executed within your own tenant environment, ensuring complete data residency and control.

KSA is designed to enhance your security team’s visibility by delivering fast insights into identity risk, endpoint health, policy enforcement, and alert activity — all without requiring knowledge of KQL or API syntax.

KSA Overview Diagram or Interface Screenshot

Minimum Requirements

Before using KSA, ensure your environment meets the following prerequisites:

  • Required Services:
    • Microsoft Sentinel with a connected Log Analytics workspace
    • Office 365 Security & Compliance Center data connectors
    • Microsoft Defender for Endpoint (P1 or P2)
    • Microsoft Entra ID sign-in logs routed to Log Analytics
    • Microsoft 365 E3+ or G5 Security licenses
  • Required API Access:

ℹ️ If these services or APIs are not in place or configured properly, some KSA functionality may be limited or unresponsive.

Back to Top

Step 1 – Set Up Enterprise Application Access

  1. Log in to the Azure Portal
    Go to https://portal.azure.com and sign in as a Global Admin.
  2. Approve the Enterprise Application
    Paste the following link in your browser after logging in:
    Approve KSA App
    This grants necessary read-only access to directory data and creates the “KAMIND Security Agent” Enterprise Application.

Access Control Role Assignment Screenshot

Role Description Example Prompts
User.Read Sign in and read user profile The app needs to know who the user is and from which tenant they are connecting.
Device.Read.All Read all devices "List all compliant devices." "What devices are not compliant?"
DeviceManagementConfiguration.Read.All Read Microsoft Intune device configuration and policies "List all device compliance policies." "Which policies are assigned to Intune groups?"
DeviceManagementManagedDevices.Read.All Read Microsoft Intune devices "Show device health summary." "Show the most vulnerable devices."
Directory.Read.All Read directory data "List all users in the tenant." "Who are the global administrators?" "What groups is clandis@kamind.com a member of?"
Policy.Read.All Read your organization's policies "What Conditional Access policies are in place?" "MFAExcludedUsersAndLocations"
RoleManagement.Read.Directory Read all directory RBAC settings "GlobalAdminAccess"
SecurityEvents.Read.All Read your organization’s security events "What is our Secure Score?" "List sign-in failures for the last 2 days."
UserAuthenticationMethod.Read.All Read all users' authentication methods "List MFA methods for alice@company.com." "Who does not have MFA configured?"
Machine.Read.All Read all machine profiles "List all onboarded machines." "What is the OS version of device ABC123?"
Alert.Read.All Read all alerts "List all security alerts in the last 24 hours." "Show high severity alerts in the last 7 days."
SecurityRecommendation.Read.All Read Threat and Vulnerability Management security recommendations "What are the top 5 exposure score recommendations?" "What are the device secure score recommendations?"
Software.Read.All Read TVM software information "List all software installed on device KAMIND-10495."
Vulnerability.Read.All Read TVM vulnerability information "List vulnerabilities by CVE." "What vulnerabilities are unpatched?"
Score.Read.All Read TVM score "What is our exposure score?" "Show the most vulnerable devices."
SecurityConfiguration.Read.All Read all security configurations "List all applied Defender configurations." "Show attack surface reduction settings."
SecurityBaselinesAssessment.Read.All Read all security baselines assessment information "List baseline deviations." "Which devices are not compliant with security baselines?"
LogAnalytics.reports.read.all Read all usage reports "Show antivirus scan events for the last 7 days." "Who are the risky users in the last 30 days?"

These permissions are used to run technical queries based on your natural language input. KSA uses Azure OpenAI to interpret your prompt and securely query Microsoft Graph, Defender for Endpoint, and Log Analytics across your tenant.

Back to Top

Step 2 – Grant Access to Log Analytics

  1. In the Azure Portal, go to Enterprise Applications
  2. Search for and select KAMIND Security Agent (as shown in the image below)
  3. Go to Properties and copy the Object ID
  4. Navigate to your Log Analytics Workspace (e.g., GuardPlus-law2025)
  5. Select Access control (IAM)Add role assignment
  6. Choose Log Analytics Reader as the role
  7. Under Select members, search for and choose KAMIND Security Agent Application
  8. Click Select, then Review + assign to finish

Grant Log Analytics Reader Role to KSA

Back to Top

Step 3 – Send Us the Log Analytics Workspace ID

  1. In the Azure Portal, open the Log Analytics Workspace that is connected to Microsoft Sentinel and other security data connectors.
  2. Go to the Overview tab and copy the Workspace ID (highlighted in the image below)
  3. Email the Workspace ID to support@kamind.com — this allows us to securely configure the KSA to query security logs within your environment.

Workspace Overview showing Log Analytics Workspace ID

Back to Top

Step 4 – Deploy the Manifest into Microsoft Teams

  1. Download the Manifest ZIP (you should have received this from KAMIND)
  2. Go to Teams Admin Center as a Teams Admin
  3. Enable custom app uploads by visiting Org-wide App Settings and making sure “Allow uploading of custom apps” is ON
  4. Navigate to Teams Apps → Manage Apps and click Upload at the top
  5. Select the manifest ZIP file you received from KAMIND
  6. After upload, locate the app and click Allow to approve it for tenant-wide availability
  7. Optionally, go to Teams Apps → Setup Policies and pin the app to the Teams sidebar for users
  8. Open Microsoft Teams and test the app by searching for it under “Apps” — you should see a welcome screen or confirmation message

Upload custom app manifest in Microsoft Teams Admin Center

Back to Top

Tips for Using KSA

Once the KAMIND Security Agent is deployed in Microsoft Teams, launch it from the sidebar to access the main screen. You’ll find categories of queries, each with example prompts to guide your investigation.

Security Events

View real-time or historical alerts from Microsoft Defender and Sentinel.

  • Mail Flow Alerts – Detect abnormal or blocked mail patterns (e.g., spoofing, transport rules)
  • Identity Protection Alerts – Identify risky sign-ins (e.g., leaked credentials, impossible travel)
  • Email Action Alerts – Track inbox rule changes or mass deletions
  • Security Alerts – View alerts from Defender for Endpoint, Identity, and Cloud Apps
  • DLP Alerts – Detect when sensitive data is shared, accessed, or exfiltrated

Example prompts:

  • What types of Sentinel alerts did we have this week?
  • How many Office 365 ATP alerts did we get this week?

Logins

Investigate sign-in activity, failures, and risks across your environment.

Example prompts:

  • How many users logged in this week from outside City A?
  • How many login attempts originated outside the U.S.?

MFA (Multi-Factor Authentication)

See which logins required MFA and which didn’t.

Example prompts:

  • How many sign-ins used MFA today?
  • Which devices signed in using MFA today?

Conditional Access

Review which Conditional Access policies were triggered and which were bypassed.

Example prompts:

  • What Conditional Access policies were applied to logins this week?
  • What logins didn’t trigger Conditional Access for jmsmith@contoso.com this week?

Virus Scans

Summarize antivirus scan data from Defender for Endpoint.

Example prompts:

  • How many full and quick scans ran this week?
  • What antivirus scans were run today on device Device123?

Devices

Get a list of devices and their compliance policies.

Example prompts:

  • What devices do we have?
  • What compliance policies apply to Windows devices?

Users

View user accounts, their groups, and roles.

Example prompts:

  • List all users in Active Directory.
  • Which groups is jsmith@contoso.com in?

Scores and Reports

Review your organization’s security posture scores.

Example prompts:

  • What is my exposure score?
  • What is my secure score for devices?
  • What is my Defender for Cloud score?

Contact Us

KAMIND IT has been developing growth- and security-focused cloud computing solutions that help clients achieve their business goals — even in the most challenging circumstances — for over two decades.

As a full-service cybersecurity firm and Microsoft Tier 1 Gold Partner, we specialize in advanced, modern strategies to protect organizations against cyber threats and help them compete with much larger enterprises.

If you need support with the KAMIND Security Agent (KSA) or have technical questions, please email us at: support@kamindit.com

If you’re looking to improve your overall security posture and want our sales team to contact you about KSA or other cybersecurity services, reach out to: sales@kamind.com