Overview
The Security Copilot integration exposes SoCMate capabilities as Copilot skills. Security analysts can use natural language in Copilot to trigger SoCMate actions without switching between tools.Plugin Setup
Create an API key in SoCMate
Navigate to Admin > API Keys and create a key with the following scopes:
investigations:readinvestigations:writeincidents:readsearch:readgraph:read
Download the plugin manifest
The SoCMate plugin manifest is an OpenAI-compatible plugin descriptor that defines the available skills and API endpoints. Contact your SoCMate administrator or download it from your SoCMate instance:
Upload to Security Copilot
In Microsoft Security Copilot:
- Go to Sources (plugin icon in the prompt bar)
- Click Manage plugins
- Select Custom and click Add a plugin
- Upload the plugin manifest file or provide the manifest URL
- Enter your SoCMate API key when prompted for authentication
- Enable the plugin
Available Skills
Investigate Entity
Start a SoCMate investigation on a security entity. Copilot prompt examples:- “Use SoCMate to investigate IP 203.0.113.50 for malicious activity”
- “Ask SoCMate to check user john@example.com for suspicious sign-ins”
- “Have SoCMate investigate host SRV-DC01”
POST /api/v1/investigations/start with the entity and a default SOC Analyst persona. Returns a summary of the investigation findings.
Query Knowledge Graph
Look up an entity in SoCMate’s knowledge graph to see its history and connections. Copilot prompt examples:- “Check SoCMate knowledge graph for IP 203.0.113.50”
- “What does SoCMate know about user admin@corp.local?”
- “Show SoCMate connections for domain evil-phishing.com”
GET /api/v1/graph/entity/{value} and returns the entity’s neighborhood — connected entities and relationships from past investigations.
List Recent Incidents
Retrieve the latest Sentinel incidents from SoCMate’s synced incident store. Copilot prompt examples:- “Show me high severity incidents from SoCMate”
- “List the latest critical incidents in SoCMate”
- “What are the new SoCMate incidents from the last 24 hours?”
GET /api/v1/incidents with severity and time filters. Returns incident titles, severity, status, and SoCMate links.
Get Investigation Report
Retrieve a completed investigation report by session ID. Copilot prompt examples:- “Get the SoCMate investigation report for session sess_abc123”
- “Show me the results of SoCMate investigation sess_abc123”
GET /api/v1/sessions/{session_id} and returns the investigation summary, risk score, entities, and findings.
Search Investigations
Search across all SoCMate investigations for relevant findings. Copilot prompt examples:- “Search SoCMate for phishing investigations”
- “Find SoCMate investigations related to brute force attacks”
GET /api/v1/search with the query and returns matching investigation sessions.
Data Flow
- User asks a question in Security Copilot mentioning SoCMate
- Copilot identifies the SoCMate plugin skill that best matches the request
- Copilot formats the API call using the plugin manifest schema
- The request is sent to SoCMate’s API with the configured API key
- SoCMate processes the request and returns results
- Copilot formats the response for display in the conversation
Authentication
The plugin authenticates with SoCMate using an API key stored in Security Copilot’s plugin configuration. The key is sent as anX-API-Key header with every request.
Limitations
- Streaming not supported — Security Copilot receives the final investigation result, not real-time streaming updates
- Persona selection — The plugin defaults to the SOC Analyst persona; CISO-level reports require manual selection
- Rate limits — API key rate limits apply; high-frequency usage may require limit increases
- Follow-ups — Multi-turn investigation conversations are not supported through the plugin; use the SoCMate UI for follow-up questions
