LockBase Cyber

Security agents for Microsoft Security Copilot

Production-grade investigation agents that bring CrowdStrike, Microsoft Defender, and Microsoft Threat Intelligence together inside Security Copilot — purpose-built for SOC teams that need answers, not more dashboards.

// scu.included? m365.e5

You may already be paying for Security Copilot SCUs.

As of November 2025, Microsoft includes Security Copilot at no extra cost for every Microsoft 365 E5 tenant — and the SCU pool covers partner-built agents like ours.

400
SCU/month per 1,000 E5 seats
10K
monthly cap
  • Auto-provisioned — no Azure setup, no manual SCU buy
  • Partner-built agent SCU costs included today
  • Pool resets monthly — get value, or it disappears

Want to actually use them? That's what our agents are for — purpose-built investigations that turn the included SCU pool into measurable SOC value.

Featured agents

Each agent is published to the Microsoft Security Store and integrates with the rest of your stack — drop one into a Copilot workspace and start investigating.

custom_agent.build()

Don't see your stack?
We'll build the agent.

LOX Agent ships against CrowdStrike + Defender out of the box. If your environment runs different EDRs, different data feeds, or has Sentinel playbooks and datalake pipelines that need first-class hand-off, we'll customize an agent purpose-built for your SOC.

  • [ EDR_OF_CHOICE ] opt.01

    Your EDR, your way

    We rebuild the active-EDR side of LOX against the platform you actually run — CrowdStrike Falcon, Microsoft Defender for Endpoint, SentinelOne Singularity, Palo Alto Cortex XDR, Carbon Black, or anything with an alerts API.

    • CrowdStrike
    • Defender for Endpoint
    • SentinelOne
    • Cortex XDR
    • Carbon Black
  • [ DATA_FEED ] opt.02

    Any data feed, correlated

    Bring your own telemetry: a SIEM you already pay for, a custom datalake, a threat-intel feed, identity logs, network sensors. We map it into the agent's investigation graph so every finding cites its source.

    • Sentinel
    • Splunk
    • Snowflake
    • ADX
    • Elastic
    • MDTI
    • Recorded Future
  • [ SENTINEL_PLAYBOOK ] opt.03

    Sentinel playbook + datalake integration

    Automate agent triage straight from Sentinel incidents using the Logic Apps connector for Security Copilot agents — fire a full investigation as a step inside any playbook. Then tap into Sentinel's MCP plugin to search deeper data sets directly inside your Sentinel datalake.

    • Sentinel Playbooks
    • Logic Apps connector
    • Sentinel MCP plugin
    • Sentinel Datalake

Why LockBase

Built by SOC practitioners

Our agents come out of real triage queues — designed by analysts and detection engineers, not marketing teams.

Multi-vendor by default

We treat CrowdStrike, Microsoft Defender, and Microsoft Threat Intelligence as complementary signals on the same incident — not parallel tools.

Source-labeled answers

Every finding is labeled with the data source it came from, so analysts can trace any claim back to the underlying alert or telemetry.