-
GetCriticalAssetRiskProfileJoins CVEs to critical devices and VMs. Returns a combined asset-plus-CVE view ranked by exploitability, asset criticality, exposure score, and device role.
-
GetExploitableCVEsFilters for actively exploited, verified-exploit, exploit-kit, and zero-day CVEs with the affected asset list — highest-urgency findings.
-
GetDeviceExposureSummaryFleet-wide device, VM, and hybrid-machine posture: exposure scores, criticality classification, device role, sensor health, and onboarding status.
-
GetFindingSummaryByCategoryBig-picture finding volume and severity breakdown across security, management, auditing, and Entra recommendation categories.
-
GetAssetFindingSummaryPer-asset compound risk: counts findings by type and severity for each asset to identify where multiple CVEs and recommendations overlap.
-
GetIdentityRiskProfileMaps users with Entra security recommendations to their permission and authentication blast radius — what at-risk identities can actually access.
-
GetPermissionMapEvery privilege relationship across identities: which service principals, users, managed identities, and groups hold what permissions, roles, and credentials.
-
GetCVESeverityDistributionPer-asset CVE severity breakdown with exploitability flags and high-severity hotspots — fleet-wide vulnerability posture in one view.
-
GetSecureScoreSummaryMicrosoft Secure Score by category (Identity / Device / Apps / Data) with per-control implementation status; supports historical trending across 7, 30, and 90 days.
Coming soon to the Microsoft Security Store
LEX Agent
Lockbase EXposure Agent — executive exposure intelligence across the Microsoft security stack
Synthesize XSPM exposure, Defender vulnerability management, Entra identity risk, and behavioral signals into ranked, executive-ready exposure briefings — without manual correlation.
[ DESIGNED FOR ]
Designed for CISOs and security leaders who need cross-domain exposure visibility across Microsoft Defender XDR, Entra ID, Intune, and Microsoft Threat Intelligence — without manual correlation between consoles. LEX Agent converts fragmented Microsoft security telemetry into executive-grade exposure judgment.
What it
actually does
> Three-paragraph technical brief. No marketing fluff. Read top to bottom — it walks the agent's job from input to output.
- [ OVERVIEW ] 01 / 03
LEX Agent (Lockbase EXposure Agent) provides executive-level exposure intelligence by synthesizing four Microsoft data layers — Enterprise Exposure Graph (XSPM), Defender Threat & Vulnerability Management, Microsoft Secure Score, and behavioral activity patterns — into clear business-risk briefings. Its unified job is to convert fragmented Microsoft security telemetry into executive judgment a CISO can act on the same hour.
- [ INVESTIGATION ] 02 / 03
The agent operates across five operating modes: Executive Risk Ranking (top exposures by exploitability and business impact), Focus Validation (compare exposures to active incidents for SOC alignment), Finding Consolidation (identify compound risk from overlapping findings on the same asset), Patch Tuesday Triage (campaign exposure and deployment tracking), and Behavioral Risk Assessment (jump-box compliance, lateral movement, service-account misuse, credential attacks, local-admin overuse).
- [ DELIVERABLE ] 03 / 03
LEX Agent outputs executive briefings with ranked P1–P4 exposure tiers, affected hostnames, CVSS and EPSS scores, exploit status, recommended owners, and — when an analyst confirms — Microsoft Intune remediation tasks created and tracked through resolution. Every claim is source-labeled so the security leader can trace any exposure statement back to ExposureGraph, TVM, Entra, or Defender for Identity.
Capabilities
-
Critical asset exposure profile
Joins CVEs to critical devices and VMs with asset criticality, exposure score, device role, and exploit status — the primary executive exposure view.
-
Exploitable CVE hunting
Surfaces zero-day, actively-exploited, verified-exploit, and exploit-kit CVEs with affected asset counts and blast-radius assessment.
-
Executive exposure ranking
Applies a P1–P4 prioritization matrix that considers exploitability, asset criticality, lateral-movement paths, and business impact — not just CVSS.
-
Cross-domain correlation
Correlates vulnerability posture with active Defender XDR incidents, Entra identity risk, and behavioral activity to surface compound exposures.
-
Behavioral risk detection
Detects direct Tier 0 access, lateral movement, service-account misuse, stale privileged accounts, brute force, and local-admin overuse via time-series analysis.
-
Remediation tracking
Creates Intune remediation tasks with LEX priority mapping, asset details, and due dates — and lists existing tasks to prevent duplicates.
35 hunting & enrichment skills,
organized by tradecraft.
The LOX Agent ships with a built-in library of cross-EDR investigation skills — categorized below by attacker phase. Each skill is a named capability the agent invokes inline; analysts never write the underlying KQL or FQL by hand.
-
GetDeviceVulnerabilitiesCVEs affecting specific devices with software context: name, version, fix availability — fills the gap where ExposureGraph recommendations lack asset mapping.
-
GetExploitableVulnerabilitiesWithDevicesCVEs with confirmed exploits, affected device counts, software families, CVSS, EPSS, and patch availability — urgent patching priorities at a glance.
-
GetDeviceConfigCompliancePer-device security configuration: CIS benchmarks, security baselines, hardening status with pass/fail rates and compliance percentage.
-
GetSoftwareInventoryInstalled software per device with end-of-support status and dates for asset profiling and EOL risk detection.
-
GetPatchTuesdayCveExposureFleet exposure to a batch of CVEs from a Patch Tuesday or threat campaign: severity, CVSS, exploit availability, EPSS, and software context per device.
-
GetUnpatchedDevicesByUpdateDevices still missing a specific security update with CVE counts, worst severity, and exploitable count — tracks deployment progress and identifies stragglers.
-
GetOfficeSoftwareExposureDevices running Microsoft Office products with known vulnerabilities — critical for preview-pane RCE classes (e.g., CVE-2026-26110 family).
-
GetSqlServerExposureSQL Server vulnerability posture across the fleet for privilege-escalation and authentication-bypass risk assessment.
-
GetCveExposureGraphImpactFor a specific CVE, every asset it affects via ExposureGraph affecting edges — enriches TVM data with asset criticality, exposure score, device role, and sensor health.
-
GetDirectAccessToTier0AssetsDevices connecting to Domain Controllers, ADFS, ADCS, and PKI servers on admin ports (RDP, SSH, WinRM, SMB) bypassing jump-box controls.
-
GetLateralMovementPatternsWorkstation-to-workstation connections on admin ports — high volume indicates active lateral movement or segmentation failure.
-
GetServiceAccountInteractiveLogonsService accounts performing interactive, RDP, or cached logons (when they should only use batch/service/network) — credential theft or hygiene failure indicator.
-
GetStalePrivilegedAccountActivityDormant privileged accounts ordered least-active-first — prime targets for credential stuffing because unauthorized logons go unnoticed.
-
GetBruteForceAndCredentialAttacksActive brute force, password-spray, and credential-stuffing patterns: accounts and devices with 10+ failed logons, distinct account counts (spray) and target counts (targeted).
-
GetLocalAdminLogonActivityDevices with frequent local-admin interactive logons that defeat endpoint privilege management and hand attackers easy SYSTEM-escalation paths.
-
GetDefenderIncidentsActive Defender XDR incidents with severity, status, affected entities, and alerts — cross-referenced with posture findings.
-
GetDefenderIncidentReportDetailed incident narrative with device and user names extracted for correlation with posture data.
-
GetDefenderDeviceSummaryDevice risk and threat status from Defender endpoint protection.
-
GetDefenderIdentitySummaryIdentity-focused threat context from Microsoft Defender for Identity.
-
GetEntraRiskyUsersUsers flagged by Entra ID Protection with risk level and current state.
-
GetEntraSignInLogsV1Sign-in events: risky sign-ins, MFA status, impossible-travel patterns.
-
GetEntraUserDetailsV1User profile, role, and group membership pulled from Entra ID.
-
GetCvesByKeywordSearchDtiMicrosoft Defender Threat Intelligence: CVE details, threat-actor context, and exploit intelligence by keyword.
-
GetIntuneDevicesDevice compliance, OS version, and last check-in pulled from Microsoft Intune.
-
ListRemediationTasksExisting Intune remediation tasks with status, priority, and assignee — prevents duplicate task creation.
-
CreateRemediationTaskWrite-capable: create a new Intune remediation task with LEX priority mapping, asset details, and due date. Requires user confirmation before execution.
Requirements
To deploy LEX Agent into your Microsoft Security Copilot workspace you'll need:
- Microsoft Security Copilot license
- Microsoft Defender XDR with Advanced Hunting access (ExposureGraph + TVM tables)
- Microsoft Entra ID with
SecurityReaderrole minimum (queries) orSecurity Adminfor remediation task creation - Microsoft Defender for Identity (recommended for behavioral risk skills)
- Microsoft Intune (recommended for remediation task creation)
Documentation and support
-
Setup guide
Step-by-step deployment for Security Copilot and LEX Agent's integrations: Microsoft Defender XDR, Microsoft Defender for Identity, Microsoft Entra ID, Microsoft Intune, and more.
Contact us for early access →
-
Five operating modes
Executive Risk Ranking, Focus Validation, Finding Consolidation, Patch Tuesday Triage, and Behavioral Risk Assessment — worked examples for each.
Request the playbook →
-
Microsoft Security Store listing
Listing pending Microsoft Partner Center review.
Coming soon
-
LockBase Cyber support
Implementation help, custom hunting skills, or detection engineering services.
Email the team →