Skip to main content

Connection and Configuration

Connect Shadow AI to your EDR framework and configure monitoring targets from the dashboard.

Configure Data Source

In the Data Source Configuration panel, specify your EDR integration, the agent frameworks to monitor, and your API credentials.

EDR Framework — Select Microsoft Defender as the endpoint detection and response platform for telemetry collection.

Agent Frameworks to Monitor — Select one or more AI agent applications to track (e.g. OpenClaw, Claude Code, Codex, NanoClaw). Use Select All to monitor all available frameworks.

API Credentials — Retrieve the following values from the Microsoft Entra Admin Center and enter them under API Credentials:

FieldDescription
Tenant IDDirectory (tenant) identifier
Client IDApplication (client) identifier
Client SecretClient secret key

Click Save Configuration to establish the connection. Shadow AI will begin retrieving EDR telemetry and analyzing agent activity immediately.

Data Source Configuration: EDR framework, agent frameworks, and API credentials

Review Detected Agent Sessions

Once connected, the Recent Shadow AI Events panel surfaces all detected AI agent sessions collected from endpoint telemetry. Each entry displays the agent framework and an overall risk status — Clean or Violations.

Use Sync Defender to pull the latest telemetry on demand, or Evaluate All to run a security assessment across all listed sessions.

Recent Shadow AI Events: detected agent sessions with risk status

Trajectories and Violations

Click Trajectory on any session to open the Shadow AI Trajectory view, which surfaces the raw endpoint telemetry captured by the EDR — including a timestamped activity timeline of every process, network, and file system event recorded during that session.

Shadow AI Trajectory: EDR-recorded activity timeline for a detection

Sessions flagged with a Violations badge indicate that the security assessment identified policy breaches. Click Violations to open the Action Guard Evaluation panel, which details the specific rules violated, violation categories, a full explanation of the flagged behavior, and the policy set evaluated.

Shadow AI event row flagged with violations

Action Guard Evaluation: violation details for a flagged session