Skip to main content
Version: 2.0.0

Test-MtAIAgentRiskyHttpConfig

SYNOPSIS

Tests if AI agents have risky HTTP configurations.

SYNTAX

Test-MtAIAgentRiskyHttpConfig [-ProgressAction <ActionPreference>] [<CommonParameters>]

DESCRIPTION

Checks all Copilot Studio agents for HTTP actions that connect to non-standard ports or non-connector endpoints. HTTP actions to unexpected destinations may indicate data exfiltration, command-and-control communication, or misconfigured integrations.

EXAMPLES

EXAMPLE 1

Test-MtAIAgentRiskyHttpConfig

PARAMETERS

-ProgressAction

{{ Fill ProgressAction Description }}

Type: ActionPreference
Parameter Sets: (All)
Aliases: proga

Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

CommonParameters

This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters.

INPUTS

OUTPUTS

[bool] - Returns $true if no risky HTTP configurations are found, $false if any

agent has suspicious HTTP actions, $null if data is unavailable.

NOTES

https://maester.dev/docs/commands/Test-MtAIAgentRiskyHttpConfig