Test-MtAIAgentRiskyHttpConfig
SYNOPSISโ
Tests if AI agents have risky HTTP configurations.
SYNTAXโ
Test-MtAIAgentRiskyHttpConfig [-ProgressAction <ActionPreference>] [<CommonParameters>]
DESCRIPTIONโ
Checks all Copilot Studio agents for HTTP actions that connect to non-standard ports or non-connector endpoints. HTTP actions to unexpected destinations may indicate data exfiltration, command-and-control communication, or misconfigured integrations.
EXAMPLESโ
EXAMPLE 1โ
Test-MtAIAgentRiskyHttpConfig
PARAMETERSโ
-ProgressActionโ
{{ Fill ProgressAction Description }}
Type: ActionPreference
Parameter Sets: (All)
Aliases: proga
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
CommonParametersโ
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters.
INPUTSโ
OUTPUTSโ
[bool] - Returns $true if no risky HTTP configurations are found, $false if anyโ
agent has suspicious HTTP actions, $null if data is unavailable.โ
NOTESโ
RELATED LINKSโ
https://maester.dev/docs/commands/Test-MtAIAgentRiskyHttpConfig