πŸ“Œ Author's note: This site synthesises the author's own understanding from publicly available Microsoft documentation, official Microsoft Security blog posts, RSAC 2026 announcements, and insights from Microsoft Security professionals and MVPs. It is independent and not affiliated with or endorsed by Microsoft. Microsoft updates products and documentation frequently β€” always verify current status directly with Microsoft before making architecture or purchasing decisions.
UPDATED Β· RSAC 2026 Β· MARCH 24, 2026

Microsoft Security
Products for AI

Every Microsoft security product mapped to the AI security stack. Updated with RSAC 2026 announcements. GA/Preview status reflects what was confirmed on March 20, 2026.

Control Plane & Governance

Unified Visibility & Agent Governance

β†— Click on a product name to navigate to the Microsoft documentation page.

Agent 365 β†—
GA May 1, 2026 Β· $15/user/month
Unified control plane for all agents. Inventory, governance, and security posture across Microsoft and partner agents. Licensing is per-user, not per-agent β€” governance scope does not scale with agent count. Includes new Defender, Entra, and Purview capabilities to secure agent access and prevent data oversharing.
GA May 1 2026⚠ Per-user only$15/user/mo
β†— Learn More
Security Dashboard for AI β†—
Unified CISO-level AI risk aggregation from Defender + Entra + Purview. AI inventory covering agents, MCP servers, models, apps β€” including third-party AI (ChatGPT, Gemini). Security Copilot NL-driven risk exploration. Now generally available β€” previously preview.
βœ“ Now GA Β· RSAC 2026No extra licenseAI Risk Scorecard
β†— Learn More
Foundry Guardrails β†—
Assign control collections to specific models or agents in Microsoft Foundry. Limits tools available to each agent, constrains output behaviour, enforces content safety at the orchestration layer. Only applies to Foundry-deployed agents.
PreviewPaaSPer-agent control setsFoundry only
β†— Learn More
Microsoft 365 E7: The Frontier Suite β†—
Bundles M365 Copilot + Agent 365 + Entra Suite + M365 E5. Agent 365 included but inherits the same per-user licensing model. Best for orgs where agents are tightly coupled to named users.
GA May 1 2026⚠ Per-user licensing$99/user/mo
β†— Learn More
Windows 365 for Agents (Public Preview Β· US only) β†—
Secured, purpose-built, IT-managed Cloud PC environment for running AI agents at enterprise scale. Many enterprise apps have no APIs β€” agents must interact via UI (clicks, typing, navigation) like humans. Today most agents run on ad-hoc infrastructure creating identity, policy, and auditability gaps. Windows 365 for Agents closes this gap.

The employee analogy: Every employee has an identity + managed device. Every agent now has an identity (Agent 365) + managed Cloud PC (Windows 365 for Agents). Same trust model, extended to AI.

Prerequisites: Agent 365 licence + Intune licence + Azure subscription (compute billed separately via Azure).
Benefits: Enterprise-grade identity/access, unified Intune management, geo-level data residency for compliance.
Preview Β· US only Β· May 2026Managed via IntuneObservable in Agent 365Agentic Cloud PCs
β†— Learn More
Identity & Access

Identity Primitives for AI Agents

β†— Click on a product name to navigate to the Microsoft documentation page.

Entra Agent ID β†—
Register agents as non-human identities. Human sponsor required. Lifecycle automation. Currently limited preview β€” frontier/large enterprise only. Agents still use OBO flow underneath. Only applies to Modern Agents β€” most existing Copilot Studio agents are Classic Agents (Service Principals) and receive no Entra Agent ID protection. Migration tool from Classic to Modern does not yet exist. Agent names do not sync on rename β€” original "Agent #" name persists in Entra.

Registry convergence (April 2026): The Entra admin center now focuses on identity and access management only β€” it shows agents with Entra Agent ID only. For comprehensive inventory of all agents (including those without an identity), use Agent 365 via M365 admin center β†’ Agents β†’ All agents. Roles: Agent ID Administrator for Entra operations; AI Administrator or AI Reader for Agent 365 inventory (no licence required for inventory view).
⚠ Preview · Frontier Only⚠ Modern Agents only⚠ Name sync bugAI Reader = least-privilege inventory role
β†— Learn More
Entra Workload Identity β†—
Today's real-world primitive for non-human identities. Designed for apps/services β€” not purpose-scoped for individual agents. Lacks agent-specific lifecycle governance and sponsor model. The current stopgap while Agent ID matures.
GA · Available Now⚠ Not agent-purpose-scoped
β†— Learn More
Conditional Access for AI Agents β†—
CA for Agent ID (Preview) β€” extends Zero Trust Conditional Access to AI agents as first-class identities. Applies to Modern agents with Entra Agent ID (Agent Identities + Agent Users). Supports: block by agent risk level (from ID Protection), target by custom security attributes, scope by Blueprint, or select specific agent object IDs. Does NOT apply to: Classic Copilot Studio agents (OBO/maker/service principal auth), custom Security Copilot agents ("Connect with existing user account"). CA carve-outs by design: Blueprint token acquisition (T1/creation flows) and intermediate token exchange are excluded β€” agentic task flows (T2) are protected.
PreviewModern/Foundry agents⚠ Classic Copilot Studio: NOT coveredCustom security attributes for segmentationAgent risk condition (ID Protection)
β†— Learn More
Entra Internet Access β†—
Secure web and AI gateway. Shadow AI Detection now GA on March 31 β€” uses network layer to identify unknown AI applications. Prompt Injection Protection also GA March 31 2026 β€” enforces universal network-level policies to block malicious AI prompts across apps and agents.
Shadow AI Detection: GA Mar 31 2026Prompt Injection: GA Mar 31 2026
β†— Learn More
Secure Web and AI Gateway for Agents (GA Β· May 1, 2026) β†—
Extends Global Secure Access network security controls to Copilot Studio agent outbound traffic β€” the same policies applied to user browser traffic now apply to agent HTTP, custom connector, and MCP Server Connector calls. Agent traffic is forwarded from Power Platform to Global Secure Access's proxy. Policies evaluated before traffic reaches external resources.

Traffic covered: HTTP Node, Custom connectors, MCP Server Connector.
Configure: Power Platform Admin Center β†’ per-environment or per-environment-group.
Policy via: Global Secure Access baseline profile (tenant-level).
Prerequisite: Entra Agent ID (Frontier programme) + M365 Copilot licence.
PreviewHTTP + Custom connectors + MCP trafficPower Platform Admin Center⚠ Frontier required
β†— Learn More
Entra External MFA β†—
Connect external MFA providers directly with Microsoft Entra β€” leverage pre-existing MFA investments or use highly specialised MFA methods alongside Entra authentication flows. New at RSAC 2026.
βœ“ GA March 25 2026, 2026External MFA Providers
β†— Learn More
Entra Backup and Recovery β†—
Automated backup of Entra directory objects to enable rapid recovery in case of accidental deletion or unauthorised changes. New resilience capability for identity infrastructure.
Preview Β· RSAC 2026Directory BackupRapid Recovery
β†— Learn More
Entra Tenant Governance β†—
Discover unmanaged (shadow) Entra tenants and establish consistent tenant policies and governance in multi-tenant environments. Addresses the risk of unsanctioned AI deployments creating orphaned tenants.
Preview Β· RSAC 2026Shadow Tenant DiscoveryMulti-tenant
β†— Learn More
Unified Identity Security Dashboard β†—
New dashboard in Microsoft Defender highlighting the most impactful insights across human and non-human identities. New identity risk score unifies account-level risk signals for real-time access decisions and SecOps investigations.
Preview Β· RSAC 2026Human + NHI IdentitiesRisk Score
β†— Learn More
Ephemerality Controls β€” JIT for Agents β†—
Time-bound access for AI agents β€” credentials expire the moment a specific task is completed. Delivered via Entra Agent ID lifecycle workflows and time-limited access packages. If an agent is compromised mid-task, the attacker's access window is minutes, not days. Part of the ZT4AI framework announced at RSAC 2026. Applies to Modern agents only.
Preview Β· Modern Agents onlyZT4AI frameworkAccess Packages
β†— Learn More
Threat Detection & Runtime

Runtime Defence & Threat Detection

πŸ“Œ How Sentinel and Defender work together for AI agent security

Defender and Sentinel play complementary roles β€” Defender is the real-time detection and blocking layer, Sentinel is the SIEM correlation and long-term investigation layer. Neither alone is sufficient for full AI agent security coverage.

CapabilityDefender (XDR)Sentinel (SIEM)
Agent inventoryβœ“ AIAgentsInfo table β€” all agent types via Advanced Huntingβœ“ Copilot Data Connector β†’ CopilotActivity table. 21 record types from Purview UAL. Single-tenant only. Content Hub install. Global/Security Admin required.
Real-time blockingβœ“ ATG blocks unsafe tool invocations before execution❌ Detection only β€” no inline blocking
Alert generationβœ“ Every ATG block β†’ SOC alert in Defender XDRβœ“ Analytics Rules on CopilotActivity (auth changes, anomalies)
Auth change detectionβœ“ AIAgentsInfo change detection KQLβœ“ Sentinel Analytics Rule (auth type downgrade β†’ Incident)
MCP server visibilityβœ“ Cloud App discovery + ATG on tool callsβœ“ MCP Entity Analyzer (GA April 2026) β€” cross-entity correlation
Long-term retention90 days (Advanced Hunting)βœ“ Years β€” Sentinel data lake via Microsoft Fabric
SOAR / automationβœ“ Automated response playbooks in XDRβœ“ Playbook Generator (Preview) β€” natural language orchestration
Copilot audit logsβœ“ CloudAppEvents table β€” all M365 Copilot and Security Copilot activity, agent changes, DLP rule matches. Requires: Settings β†’ Cloud Apps β†’ App connectors β†’ M365 activities checkbox enabled. Metadata only β€” no prompt/response content.βœ“ Same CloudAppEvents data available in Sentinel via XDR raw event log connector β€” no separate Copilot Data Connector needed for this. Security Copilot auditβœ“ CloudAppEvents β€” ActionType: CopilotForSecurityTrigger, plugin invocations, promptbook operations. Enable via Defender XDR connector.βœ“ Enable Defender raw event logs in Sentinel workspace β†’ CloudAppEvents flows in automatically. Deploy 3 Analytics Rules from the Security Copilot workbook. Prompt/response content❌ CloudAppEvents metadata only β€” no prompt or response textβœ“ Purview DSPM for AI Activity Explorer β€” full prompt, response, SIT matches. Pivot from CloudAppEvents β†’ Activity Explorer for deep investigation.

Recommended setup: Enable CloudAppEvents (M365 app connector) for Copilot audit hunting in Defender XDR. Use the XDR connector in Sentinel to bring the same data in for long-term retention and correlation. Use the Copilot Data Connector (CopilotActivity table) for Sentinel-specific analytic rules on agent auth changes. Pivot to DSPM for AI Activity Explorer when you need prompt content.

Note β€” "Defender for AI" is an umbrella term covering: Defender for Cloud Apps (CASB + CloudAppEvents), Security for AI portal (AIAgentsInfo + ATG), and Defender for Cloud AI Workloads plan (Azure AI Foundry protection). It is not a standalone product you can purchase separately.

β†— Click on a product name to navigate to the Microsoft documentation page.

Prompt Shields β†—
Runtime defence against direct and indirect prompt injection at the orchestration layer. Inspects user inputs AND content retrieved by the agent (RAG, tool outputs) before it reaches the model decision loop.
GADirect + Indirect PIOrchestration Layer
β†— Learn More
Azure AI Content Safety β†—
API-level model I/O filters: harmful content, jailbreak attempts, protected material, groundedness violations. Operates at the model boundary β€” separate from Prompt Shields which operates at the orchestration layer.
GAModel BoundaryJailbreak Β· Groundedness
β†— Learn More
Defender Predictive Shielding β†—
Dynamically adjusts identity and access policies during active attacks β€” reducing exposure and limiting lateral movement in real time. Applies to both human and agent identities during incidents. New at RSAC 2026.
Preview Β· RSAC 2026Dynamic PolicyActive Attack Response
β†— Learn More
Defender for Cloud (AI Workloads) β†—
CSPM and runtime threat protection for AI infrastructure. Monitors model deployments, API access patterns, and agent behaviour. Expanded container security at RSAC 2026 including binary drift and antimalware prevention.
GAContainer security: PreviewMulti-cloud
β†— Learn More
Copilot Data Connector (Sentinel) β†—
Public Preview (February 3, 2026). Ingests Copilot audit logs from the Purview Unified Audit Log (UAL) β€” which is enabled by default for all tenants β€” into the CopilotActivity table in Sentinel. Eliminates the need to go to the Purview portal to see Copilot activity; data is proactively available in Sentinel for analytic rules, workbooks, hunting queries, and automation.

21 supported record types (full list):
261 CopilotInteraction Β· 310-314 Plugin lifecycle (create/update/delete/enable/disable) Β· 315-319 Workspace lifecycle Β· 320-324 PromptBook lifecycle Β· 325 UpdateCopilotSettings Β· 334 TeamCopilotInteraction Β· 363 Microsoft365CopilotScheduledPrompt Β· 371 OutlookCopilotAutomation Β· 389 CopilotForSecurityTrigger Β· 390 CopilotAgentManagement

Deployment: Sentinel Content Hub β†’ search "Copilot" β†’ Install solution β†’ Open Connector Page β†’ Enable. Requires Global Administrator or Security Administrator role.

Sentinel data lake: Also supports data lake ingestion β€” lower cost, longer retention, integrates with Custom Graphs, MCP server, and Power BI.

Critical caveats:
⚠ Single-tenant only β€” not designed for multi-tenant or MSSP scenarios.
⚠ Ingestion costs apply β€” billed at workspace or data lake tier pricing.
⚠ Prompt content is a sensitive artifact β€” apply field-level masking and strict access controls on the CopilotActivity table. Not all record types include prompt text, but CopilotInteraction and CopilotForSecurityTrigger may.
Public Preview · Feb 3 2026CopilotActivity table21 record typesUAL source (default enabled)⚠ Single-tenant only⚠ Ingestion costs⚠ Prompt data sensitivityContent Hub install
β†— Learn More
CloudAppEvents (Advanced Hunting) β†—
Advanced Hunting table in Defender XDR capturing all M365 Copilot and Security Copilot audit activity, agent lifecycle events, DLP rule matches, and cloud app activity across M365 and connected SaaS apps. Populated by Defender for Cloud Apps.

Key ActionTypes for AI security: UpdateCopilotAgent, CopilotInteraction, CopilotForSecurityTrigger, DLPRuleMatch, plugin lifecycle events (create/update/delete).

Prerequisites: Settings β†’ Cloud Apps β†’ App connectors β†’ Microsoft 365 β†’ select Microsoft 365 activities checkbox. Without this, CloudAppEvents queries return no results.

Critical limitation: Metadata only β€” user identity, app name, agent name, ActionType, timestamp. No prompt content, no response text. For full prompt/response visibility, pivot to Purview DSPM for AI Activity Explorer.

Also available in Sentinel: Enable Defender raw event logs in your Sentinel workspace. CloudAppEvents flows in automatically β€” no separate connector needed. Enables cross-signal KQL correlation: CloudAppEvents + EmailEvents + IdentityLogonEvents + AIAgentsInfo.

Sample cross-correlation query: Copilot agent change β†’ suspicious email from same account (join CloudAppEvents where ActionType startswith "UpdateCopilotAgent" with EmailEvents where Subject has "confidential").
GAM365 app connector required⚠ Metadata only β€” no prompt contentAlso in Sentinel via XDR connector
β†— Learn More
AI Model Scanning (Defender for Cloud) β†—
Scans AI models in Azure ML registries and workspaces for malware, unsafe operators, and backdoors across common model formats. Recurring scans surface as security recommendations per model. High-confidence detections generate Defender XDR SOC alerts. CLI integration enables in-pipeline scanning during CI/CD build. Gating capability blocks unsafe models from reaching a registry. New at RSAC 2026.
GA Β· RSAC 2026Azure MLSupply ChainCI/CD Gating
β†— Learn More
Defender for Cloud Apps (CASB) β†—
Governs how AI agents and MCP tools access SaaS. Discovers shadow AI, governs OAuth permissions, detects over-privileged agent-to-SaaS access. For Copilot Studio specifically: provides real-time protection β€” blocks tool invocations if a prompt is suspicious. 1-second timeout: if no decision returned in time, tool executes. Not a guaranteed prevention control.
GAOAuth GovernanceMCP-SaaSRT Protection: Preview Β· 1s timeout
β†— Learn More
AI Agent Inventory / Security for AI (Defender) β†—
Runtime monitoring and inventory for AI agents in Microsoft Defender. Defender discovers agents registered with Agent 365 and provides unified inventory across Copilot Studio, Foundry, Bedrock, Vertex AI, and custom agents. New RegistrySource column in AIAgentsInfo distinguishes "A365" (Agent 365 registered) vs "PowerPlatform" (Copilot Studio).

Agent Tooling Gateway (ATG) β€” what it blocks: Credential/system instruction exfiltration attempts, sensitive data leakage via tool calls, misuse of internal tools, routing to malicious destinations, obfuscated content manipulation, credential leakage via email or external APIs. Blocks occur before tool invocation β€” preventing any data access or harmful action from occurring.

SOC-ready alerts: Every ATG block generates a comprehensive alert explaining what was stopped, why it was considered risky, and which agent, user, and tool were involved. These flow directly into Defender XDR SOC workflows. Critical limitation: ATG only operates on the tool execution path β€” it does NOT inspect raw model prompts or model reasoning between tool calls. If an agent behaves suspiciously entirely within its reasoning loop without calling tools, ATG won't catch it.

Coverage depth by agent type: Copilot Studio = deepest (audit logs by default, extended alert set, real-time protection). Agent 365 SDK agents = near-real-time detection + ATG protection. Foundry / Bedrock / Vertex AI = UI inventory + security posture assessment, less detection depth unless SDK instrumented.

Agent 365 is platform-agnostic: Works with Copilot Studio, Foundry, Microsoft Agent Framework, OpenAI Agents SDK, Claude Code SDK, LangChain SDK β€” and agents hosted on AWS or GCP. Not Microsoft-only.

Portal:
security.microsoft.com/securitysettings/security_for_ai
PreviewRegistrySource: A365 + PowerPlatform⚠ ATG: tool path only β€” no reasoning inspectionPlatform-agnostic SDK⚠ Dual-admin setup
β†— Learn More
PyRIT β€” Python Risk Identification Tool (Open Source) β†—
Microsoft's open-source AI red teaming framework for automated adversarial testing of AI agents and LLM applications before deployment. Battle-tested on 100+ Microsoft products including Copilot. MIT licensed, 3,800+ GitHub stars.

53+ adversarial datasets: AIRT, HarmBench, AdvBench, XSTest β€” curated prompts covering content harms, jailbreaks, data exfiltration, and social bias.
70+ prompt converters: Base64, ROT13, Leetspeak, Unicode confusables, LLM-powered rephrasing, translation, multimodal injection. Converters stack β€” a prompt can be translated, Base64-encoded, then embedded in an image.
6 attack strategies: PromptSendingAttack (single-turn), CrescendoAttack (gradual escalation), TreeOfAttacksWithPruning (TAP), and multi-turn dialogue attacks.
20+ scorers: LLM-as-judge, Azure AI Content Safety, true/false classifiers, Likert scales.
10+ targets: OpenAI, Azure, HuggingFace, HTTP endpoints, Playwright, WebSockets.

Key distinction: Tests two risk surfaces simultaneously β€” security vulnerabilities (prompt injection, data exfiltration) AND responsible AI harms (bias, toxicity, manipulation). Traditional pen testers focus on one.
Open Source Β· MITPre-deployment testingOWASP LLM Top 10 mappingCI/CD integrationpip install pyrit
β†— Learn More
M365 Copilot Automated Readiness Assessment (ARA) β†—
Open-source Microsoft tool for pre-deployment Copilot readiness assessment. Queries your tenant APIs directly (Microsoft Graph, Defender, Exchange Online, Power Platform) and generates a prioritised, actionable report in minutes β€” not weeks of manual discovery.

Six service domains assessed in one run: M365 licensing, Entra identity protection, Defender security posture, Purview compliance, Power Platform governance, Copilot Studio readiness. 200+ feature evaluations with Copilot-specific risk context for every finding.

Output: CSV and Excel reports with High/Medium/Low priority recommendations, direct links to Microsoft remediation docs, and timestamps for tracking progress across multiple runs.

Security: Runs entirely within your environment. Read-only API permissions. No data leaves your tenant. Zero cost β€” open source, no licensing fees.

git clone https://github.com/microsoft/m365-copilot-automated-readiness-assessment
python main.py
Open Source Β· MITGA Β· January 2026Pre-deployment assessment200+ evaluationsRead-only Β· no data egress
β†— Learn More
AI Red Teaming Agent (Preview) β†—
Microsoft Foundry tool for automated adversarial testing of AI models and agents. Runs automated scans simulating adversarial probing, scores each attack-response pair, and generates Attack Success Rate (ASR) metrics and a deployment scorecard. Built on PyRIT (open-source).

Three agentic-specific risk categories (cloud-only):
β€’ Prohibited actions β€” tests whether agents perform universally banned actions (facial recognition, social scoring), high-risk actions needing human-in-the-loop (financial transactions, medical decisions), or irreversible actions (file deletion, system resets)
β€’ Sensitive data leakage β€” tests for leakage of financial, medical, and personal data from internal knowledge bases via tool calls
β€’ Task adherence β€” tests whether agents faithfully complete assigned tasks: goal achievement, rule compliance, procedural discipline

Also tests: indirect prompt injection (XPIA) via synthetic mock tool outputs. Use in a "purple environment" β€” non-production with production-like resources.
PreviewFoundry hosted agents onlyCloud red teaming for agentic risksAttack Success Rate metric
β†— Learn More
PyRIT β€” Python Risk Identification Tool (Open Source) β†—
Microsoft's open-source Python framework for AI red teaming. Powers the AI Red Teaming Agent. Provides a library of attack strategies for adversarial probing of AI systems β€” including character substitution ciphers, encoding attacks (Base64, ASCII), ANSI manipulation, and multi-turn adversarial conversation. Can be used standalone outside Foundry for custom red teaming pipelines.
Open Source Β· MITPython30+ attack strategiesStandalone or Foundry-integrated
β†— Learn More
Agent Governance Toolkit (Open Source) β†—
Open-source MIT-licensed toolkit from Microsoft providing runtime security governance for autonomous AI agents. Seven packages: Agent OS β€” stateless policy engine intercepting every agent action at sub-millisecond latency (<0.1ms p99); Agent Mesh β€” cryptographic identity (DIDs, Ed25519), Inter-Agent Trust Protocol, dynamic trust scoring 0-1000; Agent Runtime β€” execution rings, saga orchestration, emergency kill switch; Agent SRE β€” circuit breakers, SLOs, chaos engineering; Agent Compliance β€” automated OWASP Agentic AI Top 10 evidence collection, EU AI Act and HIPAA mapping; Agent Marketplace β€” plugin signing and supply-chain security; Agent Lightning β€” RL training governance. Framework-agnostic β€” works with LangChain, AutoGen, CrewAI, Microsoft Agent Framework, Foundry. Available in Python, TypeScript, Rust, Go, .NET.
Open Source Β· MITGA Β· April 2026OWASP Top 10 coverageSub-ms latencypip install agent-governance-toolkit
β†— Learn More
Microsoft Sentinel β†—
SIEM + SOAR. Ingests AI-specific telemetry: agent behaviour logs, MCP server activity, Copilot interaction signals. RSAC 2026 updates: Data Federation via Microsoft Fabric (Preview), Playbook Generator (Preview), MCP Entity Analyzer (GA April), Custom Graphs via Fabric (Preview), Security Store in Purview + Entra (GA March 31), GDAP + unified RBAC for cross-tenant management (Preview). May 2026: Microsoft Copilot solution added to Content Hub β€” 6 analytic rules (Jailbreak Attempt, Access from External IP, Plugin Created by Non-Admin, Plugin Tampering, Plugin Enabled After Disabled, File Uploads Disabled) + Microsoft Copilot Activity Monitoring workbook (7 sections). Deploy as single solution from Content Hub. Source: Samik Roy, Microsoft Sentinel GitHub. UEBA Behaviors layer now GA. Custom Guidebooks for Copilot Guided Response now GA.
GAMCP Entity Analyzer: GA AprilUEBA Behaviors: GACustom Guidebooks: GAData Federation: PreviewPlaybook Generator: PreviewConnector Builder: Preview Mar 31 2026
β†— Learn More
Data Security

Purview β€” Data Governance for AI

β†— Click on a product name to navigate to the Microsoft documentation page.

DSPM for AI β†—
Dedicated posture management surface covering Copilot experiences, enterprise apps via Entra/Foundry, and third-party GenAI tools detected through browser telemetry and the Defender for Cloud Apps catalog. Data risk assessments, oversharing detection, one-click policies. A preview now unifies DSPM and DSPM for AI into a single pane of glass.
Preview Β· Unification comingOversharing DetectionOne-click policies3rd-party GenAI
β†— Learn More
DLP for Microsoft 365 Copilot β†—
Two distinct DLP capabilities for M365 Copilot and Copilot Chat. β‘  Block files/emails with sensitivity labels (GA): prevents labelled files and emails from being used in Copilot response summaries. Items still appear in citations but content is excluded. ⚑ April 2026 update β€” all storage locations: Previously, label-blocking only applied to files in SharePoint and OneDrive. Rolling out mid-April to May 2026: DLP label-blocking now applies to Word, Excel, and PowerPoint files regardless of where they are stored β€” local device, network shares, non-Microsoft cloud. No policy changes needed; existing rules apply automatically. Triggered by bug CW1226324 (January 2026) in which Copilot accessed confidential emails in Outlook Drafts/Sent Items despite DLP labels. β‘‘ Block SITs in prompts (Preview β€” GA planned June/July 2026): when a typed prompt contains a selected Sensitive Information Type, Copilot returns no response. Available in M365 Copilot, Copilot Chat, Word/Excel/PowerPoint, and prebuilt agents. Key caveats: The two conditions cannot be combined in the same rule. DLP cannot scan files uploaded directly into prompts β€” only typed text is evaluated. Policy changes take up to 4 hours to apply. Admin Units not supported.
Label Blocking: GA Β· All storage locationsStorage expansion: rolling out April–May 2026SIT Prompt Blocking: Preview Β· GA June/July 2026⚠ No response when triggered⚠ Uploaded files not scanned
β†— Learn More
πŸ“ Three DLP layers β€” they complement, not replace, each other

Policy layer (DLP for M365 Copilot) β€” covers Microsoft Copilot experiences on managed devices. Browser layer (Edge for Business inline protection) β€” inspects typed prompts to any GenAI app, including shadow AI, on managed and BYOD devices where users are signed into Edge for Business. Network layer (Network Data Security via Global Secure Access) β€” catches what browser DLP misses: desktop apps, Office add-ins, API calls, devices without Edge. Full coverage requires all three.

Browser-Layer DLP β€” Edge for Business β†—
Inline protection natively integrated into Edge for Business via Intune policy sync. Performs deep content inspection on typed prompt submissions to unmanaged GenAI apps β€” not just file transfers. Crucially, activates without endpoint DLP deployment and extends to unmanaged (BYOD) devices where users are signed into their Edge for Business profile. Covers shadow AI tools that policy-layer DLP cannot reach.
GA⚠ Covers unmanaged devicesPrompt inspectionShadow AI
β†— Learn More
Network Data Security (Network-Layer DLP) β†—
Covers the gap endpoint and browser DLP cannot reach: unmanaged devices without Edge for Business, desktop apps, Office add-ins, and API calls. Delivered natively via Microsoft Entra Global Secure Access. Optional SASE/SSE partner integrations available for broader coverage. Policies follow the data β€” not the app or device.
PreviewGlobal Secure AccessDesktop apps + API calls⚠ Fills BYOD gap
β†— Learn More
Agentic Data Governance β†—
DLP policies now explicitly extend to agent-to-human, agent-to-tools, and agent-to-agent interactions. Sensitive files can be blocked from being used as grounding data. Agent instances in Agent 365 are automatically enrolled for audit and data classification at creation β€” treated as auditable entities alongside users. IRM, DLM, and eDiscovery all apply to agent-generated content.
GAA2A + A2H + A2T coverage⚠ Grounding data blockingAuto-enrolled audit
β†— Learn More
Information Protection (AI) β†—
Extends sensitivity labels into AI workflows. Prevents agents from accessing, generating, or transmitting content violating classification policies. Integrates with Entra Internet Access for network-layer enforcement.
GASensitivity LabelsDLP in AI
β†— Learn More
Communication Compliance (AI) β†—
Monitors Copilot and agent conversations for policy violations and regulatory issues. OBO note: attribution may show user identity rather than agent identity in audit logs.
GA⚠ OBO attributionAudit Trail
β†— Learn More
Purview in Copilot Control System β†—
Unified view of AI-related data risk directly in the Microsoft 365 Admin Center. Brings Purview data security insights into the same admin surface where Copilot is configured and governed. New at RSAC 2026.
GA April Β· RSAC 2026M365 Admin CenterUnified Risk View
β†— Learn More
AI Observability (Purview) β†—
Tracks what data agents access, process, and output at runtime. Creates a complete data access audit map for compliance and forensics teams. Feeds into eDiscovery workflows.
PreviewAgent Activity LogseDiscovery
β†— Learn More
SharePoint Advanced Management (SAM) β†—
Included with Microsoft 365 Copilot licences at no extra cost. Provides Copilot-specific SharePoint governance: Content Management Assessment β€” scans for overshared, ownerless, and inactive sites that could expose data via Copilot. Restricted Content Discovery (RCD) β€” excludes specific sites from Copilot grounding entirely (interim protection while remediating). Site Access Reviews β€” lets site owners remove excess users, groups, and company-wide sharing links. Restricted Access Control (RAC) β€” enforces access defaults at provisioning. Site ownership policies ensure all sites have an accountable owner.
βœ“ Included with Copilot licenceOversharing remediation⚠ RCD: key pre-remediation control
β†— Learn More
IRM Adaptive Protection for AI β†—
Insider Risk Management detects patterns of inappropriate or non-compliant Copilot usage β€” unusual data access, risky sharing behaviour, potential exfiltration via prompts. Adaptive Protection automatically enrolls risky users into more restrictive DLP policies without manual intervention. For AI: a user exhibiting risky Copilot usage patterns gets automatically moved to stricter prompt and data access controls. Closes the gap between detection and enforcement.
GAAuto-enrol risky users into DLPCopilot misuse detection
β†— Learn More
Purview Compliance Manager (AI) β†—
Compliance Manager now includes AI-related regulatory assessment templates. Assesses your tenant against EU AI Act, NIST AI RMF, and other AI governance frameworks β€” surfacing specific improvement actions for data protection, auditability, and AI usage controls. The operational tool for closing EU AI Act (August 2026) and Colorado AI Act (June 2026) compliance gaps identified on the Frameworks page.
GAEU AI Act assessmentImprovement actions
β†— Learn More
AI-Powered SecOps

Security Copilot & Autonomous Agents

β†— Click on a product name to navigate to the Microsoft documentation page.

Security Copilot β†—
AI assistant embedded in Defender, Entra, Intune, Purview. Automates threat hunting, phishing triage, identity risk remediation. Included for M365 E5 at 400 SCU per 1,000 users/month. Over 15 new partner-built agents available via Security Store.
Included in E5 + E7400 SCU/1K users/mo15+ Partner Agents
β†— Learn More
Security Analyst Agent β†—
Helps accelerate threat investigations by providing contextual analysis and guided workflows in Microsoft Defender. Deep multi-step investigation using Defender and Sentinel telemetry. Announced at RSAC 2026.
Preview Mar 26 2026 Β· RSAC 2026Contextual AnalysisGuided Workflows
β†— Learn More
Security Alert Triage Agent β†—
Extends the phishing triage agent to cloud and identity β€” autonomously analyses, classifies, prioritises, and resolves repetitive low-value alerts at scale. Reduces analyst alert fatigue across identity and cloud signals.
Preview Apr 2026il Β· RSAC 2026Cloud + IdentityAutonomous Triage
β†— Learn More
Conditional Access Optimization Agent β†—
Adds context-aware recommendations, deeper analysis, and phased rollout to strengthen identity security through Conditional Access policies. Agent is GA; RSAC 2026 enhancements are in preview.
Agent: GAEnhancements: PreviewEntra
β†— Learn More
Data Security Posture Agent β†—
Purview agent with new credential scanning capability β€” proactively detects credential exposure in your data estate. Helps surface hidden identity risks embedded in documents, repositories, and data stores.
Preview Β· RSAC 2026Credential ScanningPurview
β†— Learn More
Data Security Triage Agent β†—
Purview alert triage agent with advanced AI reasoning layer and improved interpretation of custom Sensitive Information Types β€” improves agent outputs during alert review. Agent is GA; RSAC 2026 enhancements in preview from March 31.
Agent: GAEnhancements: Preview Mar 31 2026Purview
β†— Learn More
Intune Security Copilot Agents β†—
Automate device policy reviews, offboarding, and risk-based remediation within Intune. Policy Configuration Agent lets IT create and validate policies via natural language. Enhanced app inventory for AI-enabled apps GA in May.
GAApp Inventory: GA MayNatural Language Config
β†— Learn More
STAY UPDATED
Get notified when Microsoft AI security changes
Monthly updates on new controls, GA announcements, and critical gaps β€” direct to your inbox.
Subscribe to updates β†’
aiagentsecurity.substack.com Β· Free Β· No spam