Coming soon to the Microsoft Security Store

LEX Agent

Lockbase EXposure Agent — executive exposure intelligence across the Microsoft security stack

Synthesize XSPM exposure, Defender vulnerability management, Entra identity risk, and behavioral signals into ranked, executive-ready exposure briefings — without manual correlation.

[ DESIGNED FOR ]

Designed for CISOs and security leaders who need cross-domain exposure visibility across Microsoft Defender XDR, Entra ID, Intune, and Microsoft Threat Intelligence — without manual correlation between consoles. LEX Agent converts fragmented Microsoft security telemetry into executive-grade exposure judgment.

live // LEX_AGENT.describe()

What it
actually does

> Three-paragraph technical brief. No marketing fluff. Read top to bottom — it walks the agent's job from input to output.

  1. [ OVERVIEW ] 01 / 03

    LEX Agent (Lockbase EXposure Agent) provides executive-level exposure intelligence by synthesizing four Microsoft data layers — Enterprise Exposure Graph (XSPM), Defender Threat & Vulnerability Management, Microsoft Secure Score, and behavioral activity patterns — into clear business-risk briefings. Its unified job is to convert fragmented Microsoft security telemetry into executive judgment a CISO can act on the same hour.

  2. [ INVESTIGATION ] 02 / 03

    The agent operates across five operating modes: Executive Risk Ranking (top exposures by exploitability and business impact), Focus Validation (compare exposures to active incidents for SOC alignment), Finding Consolidation (identify compound risk from overlapping findings on the same asset), Patch Tuesday Triage (campaign exposure and deployment tracking), and Behavioral Risk Assessment (jump-box compliance, lateral movement, service-account misuse, credential attacks, local-admin overuse).

  3. [ DELIVERABLE ] 03 / 03

    LEX Agent outputs executive briefings with ranked P1–P4 exposure tiers, affected hostnames, CVSS and EPSS scores, exploit status, recommended owners, and — when an analyst confirms — Microsoft Intune remediation tasks created and tracked through resolution. Every claim is source-labeled so the security leader can trace any exposure statement back to ExposureGraph, TVM, Entra, or Defender for Identity.

// end.report | sections: 3 | chars: 1,327 v1.0.0 — phase 1

Capabilities

LEX_AGENT.skills[]

35 hunting & enrichment skills,
organized by tradecraft.

The LOX Agent ships with a built-in library of cross-EDR investigation skills — categorized below by attacker phase. Each skill is a named capability the agent invokes inline; analysts never write the underlying KQL or FQL by hand.

  • GetCriticalAssetRiskProfile

    Joins CVEs to critical devices and VMs. Returns a combined asset-plus-CVE view ranked by exploitability, asset criticality, exposure score, and device role.

  • GetExploitableCVEs

    Filters for actively exploited, verified-exploit, exploit-kit, and zero-day CVEs with the affected asset list — highest-urgency findings.

  • GetDeviceExposureSummary

    Fleet-wide device, VM, and hybrid-machine posture: exposure scores, criticality classification, device role, sensor health, and onboarding status.

  • GetFindingSummaryByCategory

    Big-picture finding volume and severity breakdown across security, management, auditing, and Entra recommendation categories.

  • GetAssetFindingSummary

    Per-asset compound risk: counts findings by type and severity for each asset to identify where multiple CVEs and recommendations overlap.

  • GetIdentityRiskProfile

    Maps users with Entra security recommendations to their permission and authentication blast radius — what at-risk identities can actually access.

  • GetPermissionMap

    Every privilege relationship across identities: which service principals, users, managed identities, and groups hold what permissions, roles, and credentials.

  • GetCVESeverityDistribution

    Per-asset CVE severity breakdown with exploitability flags and high-severity hotspots — fleet-wide vulnerability posture in one view.

  • GetSecureScoreSummary

    Microsoft Secure Score by category (Identity / Device / Apps / Data) with per-control implementation status; supports historical trending across 7, 30, and 90 days.

  • GetDeviceVulnerabilities

    CVEs affecting specific devices with software context: name, version, fix availability — fills the gap where ExposureGraph recommendations lack asset mapping.

  • GetExploitableVulnerabilitiesWithDevices

    CVEs with confirmed exploits, affected device counts, software families, CVSS, EPSS, and patch availability — urgent patching priorities at a glance.

  • GetDeviceConfigCompliance

    Per-device security configuration: CIS benchmarks, security baselines, hardening status with pass/fail rates and compliance percentage.

  • GetSoftwareInventory

    Installed software per device with end-of-support status and dates for asset profiling and EOL risk detection.

  • GetPatchTuesdayCveExposure

    Fleet exposure to a batch of CVEs from a Patch Tuesday or threat campaign: severity, CVSS, exploit availability, EPSS, and software context per device.

  • GetUnpatchedDevicesByUpdate

    Devices still missing a specific security update with CVE counts, worst severity, and exploitable count — tracks deployment progress and identifies stragglers.

  • GetOfficeSoftwareExposure

    Devices running Microsoft Office products with known vulnerabilities — critical for preview-pane RCE classes (e.g., CVE-2026-26110 family).

  • GetSqlServerExposure

    SQL Server vulnerability posture across the fleet for privilege-escalation and authentication-bypass risk assessment.

  • GetCveExposureGraphImpact

    For a specific CVE, every asset it affects via ExposureGraph affecting edges — enriches TVM data with asset criticality, exposure score, device role, and sensor health.

  • GetDirectAccessToTier0Assets

    Devices connecting to Domain Controllers, ADFS, ADCS, and PKI servers on admin ports (RDP, SSH, WinRM, SMB) bypassing jump-box controls.

  • GetLateralMovementPatterns

    Workstation-to-workstation connections on admin ports — high volume indicates active lateral movement or segmentation failure.

  • GetServiceAccountInteractiveLogons

    Service accounts performing interactive, RDP, or cached logons (when they should only use batch/service/network) — credential theft or hygiene failure indicator.

  • GetStalePrivilegedAccountActivity

    Dormant privileged accounts ordered least-active-first — prime targets for credential stuffing because unauthorized logons go unnoticed.

  • GetBruteForceAndCredentialAttacks

    Active brute force, password-spray, and credential-stuffing patterns: accounts and devices with 10+ failed logons, distinct account counts (spray) and target counts (targeted).

  • GetLocalAdminLogonActivity

    Devices with frequent local-admin interactive logons that defeat endpoint privilege management and hand attackers easy SYSTEM-escalation paths.

  • GetDefenderIncidents

    Active Defender XDR incidents with severity, status, affected entities, and alerts — cross-referenced with posture findings.

  • GetDefenderIncidentReport

    Detailed incident narrative with device and user names extracted for correlation with posture data.

  • GetDefenderDeviceSummary

    Device risk and threat status from Defender endpoint protection.

  • GetDefenderIdentitySummary

    Identity-focused threat context from Microsoft Defender for Identity.

  • GetEntraRiskyUsers

    Users flagged by Entra ID Protection with risk level and current state.

  • GetEntraSignInLogsV1

    Sign-in events: risky sign-ins, MFA status, impossible-travel patterns.

  • GetEntraUserDetailsV1

    User profile, role, and group membership pulled from Entra ID.

  • GetCvesByKeywordSearchDti

    Microsoft Defender Threat Intelligence: CVE details, threat-actor context, and exploit intelligence by keyword.

  • GetIntuneDevices

    Device compliance, OS version, and last check-in pulled from Microsoft Intune.

  • ListRemediationTasks

    Existing Intune remediation tasks with status, priority, and assignee — prevents duplicate task creation.

  • CreateRemediationTask

    Write-capable: create a new Intune remediation task with LEX priority mapping, asset details, and due date. Requires user confirmation before execution.

// catalog.complete categories: 5 total: 35 skills Source: LOX Agent manifest v2 + KQL hunting feed v3

Requirements

To deploy LEX Agent into your Microsoft Security Copilot workspace you'll need:

  • Microsoft Security Copilot license
  • Microsoft Defender XDR with Advanced Hunting access (ExposureGraph + TVM tables)
  • Microsoft Entra ID with SecurityReader role minimum (queries) or Security Admin for remediation task creation
  • Microsoft Defender for Identity (recommended for behavioral risk skills)
  • Microsoft Intune (recommended for remediation task creation)