Skip to content
Last updated

The Capsule Security platform provides comprehensive AI agent discovery, monitoring, and security management across multiple platforms.

Supported AI Platforms

The platform integrates with leading AI agent platforms:

  • Microsoft: CopilotStudio, PowerAutomate
  • Salesforce: AgentForce
  • ServiceNow: AgentSpace
  • AWS: Bedrock
  • Azure: Azure AI
  • Google Cloud: Vertex AI
  • Automation Tools: Zapier, UiPath, n8n
  • Enterprise: Databricks, SAP, Box, Workato

Agent Discovery

Automatic Discovery

Once integrated, the platform automatically discovers and catalogs:

  • All deployed AI agents
  • Agent configurations and permissions
  • Tools and capabilities
  • Data sources and connections
  • Ownership information
  • Environment details

Manual Registration

For custom or unsupported platforms, agents can be manually registered through the API:

POST /api/v1/agents
{
  "name": "Custom Support Agent",
  "platform": "CUSTOM",
  "environment": "production",
  "owner": {
    "email": "owner@example.com"
  },
  "accessibility": "TENANT",
  "description": "Customer support automation agent",
  "tools": ["email", "database", "api"]
}

Agent Search and Filtering

Search Capabilities

The agent list page provides powerful search and filtering:

GET /api/v1/agents?search=support&severity=HIGH&access=PUBLIC

// Filter parameters:
// - search: Text search in name and description
// - severity: LOW, MEDIUM, HIGH, CRITICAL
// - access: PUBLIC, TENANT, LIMITED
// - environment: production, staging, development
// - platform: COPILOTSTUDIO, POWERAUTOMATE, etc.
// - ownership: Owner email or ID
// - tools: Tool types used by agent

Agent List View

The AgentsList component displays agents in a responsive grid:

  • Visual severity indicators
  • Platform icons
  • Owner information
  • Last activity timestamps
  • Quick access to details
  • Bulk action capabilities

Agent Details

Each agent profile includes:

Basic Information

  • Agent name and description
  • Platform and environment
  • Owner details with contact info
  • Creation and modification dates
  • Unique identifiers (internal and external)

Security Assessment

  • Accessibility Level

    • PUBLIC: Accessible to anyone
    • TENANT: Restricted to tenant users
    • LIMITED: Specific user access only
  • Risk Severity

    • Highest issue severity indicator
    • Number of open security issues
    • Compliance status

Technical Details

Tools and Capabilities

Comprehensive list of tools the agent can access:

  • Database connections
  • API integrations
  • File system access
  • Email capabilities
  • External service connections

Data Flow Visualization

Visual representation of:

  • Data sources (nodes)
  • Data connections (edges)
  • Flow direction (ATOB, BTOA, BOTH)
  • Security checkpoints

Usage Metrics

  • Total session count
  • Invocation frequency
  • Last used timestamp
  • Peak usage times
  • User interaction patterns

Security Issues Management

Issue Categories

Issues are categorized by type:

  • Supply Chain: Third-party dependency risks
  • Data: Data exposure or leakage risks
  • Compliance: Regulatory compliance violations
  • Integrity: Data integrity concerns
  • Access: Unauthorized access risks
  • Miscellaneous: Other security concerns

Issue Severity Levels

  • CRITICAL: Immediate action required
  • HIGH: Address within 24 hours
  • MEDIUM: Address within 1 week
  • LOW: Address in next maintenance cycle

Issue Workflow

  1. Detection: Automated scanning identifies issues
  2. Classification: Issues categorized and prioritized
  3. Assignment: Routed to appropriate team
  4. Resolution: Fix implemented and tested
  5. Verification: Issue confirmed resolved
GET /api/v1/agents/{agentId}/issues?status=OPEN

// Issue statuses:
// - OPEN: Awaiting resolution
// - RESOLVED: Issue fixed
// - IGNORED: Accepted risk

Agent Monitoring

Real-time Monitoring

The platform provides continuous monitoring:

  • Active session tracking
  • Anomaly detection
  • Performance metrics
  • Error rate tracking
  • Resource utilization

Session Timeline

Visualize agent activity over time:

  • Session frequency
  • Duration patterns
  • User interactions
  • Peak usage periods
  • Trend analysis

Best Practices

Agent Governance

  1. Ownership Assignment

    • Every agent must have a designated owner
    • Owners responsible for security compliance
    • Regular ownership reviews
  2. Access Control

    • Follow principle of least privilege
    • Regular access reviews
    • Document access requirements
  3. Tool Management

    • Minimize tool permissions
    • Regular capability audits
    • Remove unused integrations

Security Recommendations

  1. Regular Audits

    • Weekly security issue reviews
    • Monthly compliance checks
    • Quarterly architecture reviews
  2. Issue Resolution

    • Prioritize CRITICAL and HIGH severity
    • Document resolution steps
    • Implement preventive measures
  3. Monitoring

    • Set up alerting for anomalies
    • Track usage patterns
    • Monitor for unauthorized access

Troubleshooting

Common Issues

  1. Agents Not Appearing

    • Verify integration is connected
    • Check sync status
    • Review platform permissions
    • Wait for next sync cycle
  2. Missing Agent Details

    • Ensure platform API permissions
    • Check network connectivity
    • Review error logs
  3. Incorrect Severity Ratings

    • Refresh agent assessment
    • Review issue detection rules
    • Contact support for calibration