Skip to main content
Version: 2.0.1 (preview)

Test-MtAIAgentRiskyHttpConfig

SYNOPSISโ€‹

Tests if AI agents have risky HTTP configurations.

SYNTAXโ€‹

Test-MtAIAgentRiskyHttpConfig [-ProgressAction <ActionPreference>] [<CommonParameters>]

DESCRIPTIONโ€‹

Checks all Copilot Studio agents for HTTP actions that connect to non-standard ports or non-connector endpoints. HTTP actions to unexpected destinations may indicate data exfiltration, command-and-control communication, or misconfigured integrations.

EXAMPLESโ€‹

EXAMPLE 1โ€‹

Test-MtAIAgentRiskyHttpConfig

PARAMETERSโ€‹

-ProgressActionโ€‹

{{ Fill ProgressAction Description }}

Type: ActionPreference
Parameter Sets: (All)
Aliases: proga

Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

CommonParametersโ€‹

This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters.

INPUTSโ€‹

OUTPUTSโ€‹

[bool] - Returns $true if no risky HTTP configurations are found, $false if anyโ€‹

agent has suspicious HTTP actions, $null if data is unavailable.โ€‹

NOTESโ€‹

https://maester.dev/docs/commands/Test-MtAIAgentRiskyHttpConfig