Every Microsoft security product mapped to the AI security stack. Updated with RSAC 2026 announcements. GA/Preview status reflects what was confirmed on March 20, 2026.
β Click on a product name to navigate to the Microsoft documentation page.
β Click on a product name to navigate to the Microsoft documentation page.
Defender and Sentinel play complementary roles β Defender is the real-time detection and blocking layer, Sentinel is the SIEM correlation and long-term investigation layer. Neither alone is sufficient for full AI agent security coverage.
| Capability | Defender (XDR) | Sentinel (SIEM) |
|---|---|---|
| Agent inventory | β AIAgentsInfo table β all agent types via Advanced Hunting | β Copilot Data Connector β CopilotActivity table. 21 record types from Purview UAL. Single-tenant only. Content Hub install. Global/Security Admin required. |
| Real-time blocking | β ATG blocks unsafe tool invocations before execution | β Detection only β no inline blocking |
| Alert generation | β Every ATG block β SOC alert in Defender XDR | β Analytics Rules on CopilotActivity (auth changes, anomalies) |
| Auth change detection | β AIAgentsInfo change detection KQL | β Sentinel Analytics Rule (auth type downgrade β Incident) |
| MCP server visibility | β Cloud App discovery + ATG on tool calls | β MCP Entity Analyzer (GA April 2026) β cross-entity correlation |
| Long-term retention | 90 days (Advanced Hunting) | β Years β Sentinel data lake via Microsoft Fabric |
| SOAR / automation | β Automated response playbooks in XDR | β Playbook Generator (Preview) β natural language orchestration |
Recommended setup: Enable CloudAppEvents (M365 app connector) for Copilot audit hunting in Defender XDR. Use the XDR connector in Sentinel to bring the same data in for long-term retention and correlation. Use the Copilot Data Connector (CopilotActivity table) for Sentinel-specific analytic rules on agent auth changes. Pivot to DSPM for AI Activity Explorer when you need prompt content.
Note β "Defender for AI" is an umbrella term covering: Defender for Cloud Apps (CASB + CloudAppEvents), Security for AI portal (AIAgentsInfo + ATG), and Defender for Cloud AI Workloads plan (Azure AI Foundry protection). It is not a standalone product you can purchase separately.
β Click on a product name to navigate to the Microsoft documentation page.
CopilotActivity table in Sentinel. Eliminates the need to go to the Purview portal to see Copilot activity; data is proactively available in Sentinel for analytic rules, workbooks, hunting queries, and automation.261 CopilotInteraction Β· 310-314 Plugin lifecycle (create/update/delete/enable/disable) Β· 315-319 Workspace lifecycle Β· 320-324 PromptBook lifecycle Β· 325 UpdateCopilotSettings Β· 334 TeamCopilotInteraction Β· 363 Microsoft365CopilotScheduledPrompt Β· 371 OutlookCopilotAutomation Β· 389 CopilotForSecurityTrigger Β· 390 CopilotAgentManagementUpdateCopilotAgent, CopilotInteraction, CopilotForSecurityTrigger, DLPRuleMatch, plugin lifecycle events (create/update/delete).RegistrySource column in AIAgentsInfo distinguishes "A365" (Agent 365 registered) vs "PowerPlatform" (Copilot Studio).git clone https://github.com/microsoft/m365-copilot-automated-readiness-assessmentpython main.pyβ Click on a product name to navigate to the Microsoft documentation page.
Policy layer (DLP for M365 Copilot) β covers Microsoft Copilot experiences on managed devices. Browser layer (Edge for Business inline protection) β inspects typed prompts to any GenAI app, including shadow AI, on managed and BYOD devices where users are signed into Edge for Business. Network layer (Network Data Security via Global Secure Access) β catches what browser DLP misses: desktop apps, Office add-ins, API calls, devices without Edge. Full coverage requires all three.
β Click on a product name to navigate to the Microsoft documentation page.