Security

Microsoft Agent 365 GA Adds Security and AI Controls

3 min read

Summary

Microsoft Agent 365 is now generally available for commercial customers, giving IT and security teams a unified control plane to observe, govern, and secure AI agents across Microsoft 365, endpoints, and cloud environments. New preview capabilities also extend visibility to shadow AI, local Windows agents, multicloud agent platforms, and policy-based controls through Defender and Intune.

Need help with Security?Talk to an Expert

Microsoft Agent 365 reaches general availability

Introduction

AI agents are quickly moving from pilot projects into daily business operations, often with access to sensitive data, tools, and workflows. Microsoft Agent 365 is now generally available for commercial customers, giving organizations a central way to monitor, govern, and secure these agents before agent sprawl turns into a security problem.

What’s new in Microsoft Agent 365

Microsoft positions Agent 365 as a control plane for AI agents across Microsoft and partner ecosystems. With general availability, organizations can now manage:

  • Agents acting on behalf of users with delegated access
  • Agents operating independently with their own credentials and permissions
  • Agents participating in team workflows in public preview

The release also adds several important preview capabilities:

Shadow AI and local agent discovery

Through Microsoft Defender and Intune, organizations can discover and manage local AI agents on Windows devices. Initial support includes OpenClaw, with expansion planned for tools such as GitHub Copilot CLI and Claude Code.

Admins can:

  • Identify where local agents are running
  • See discovered agents in the new Shadow AI experience
  • Use Intune policies to block common ways unmanaged agents run

More context for security investigations

Starting in June 2026 public preview, Defender will add richer asset context mapping for agents, including:

  • The devices where agents run
  • Configured MCP servers
  • Associated identities
  • Reachable cloud resources

This should help security teams understand exposure, investigate suspicious activity, and prioritize high-risk agents.

Runtime protections and policy controls

Microsoft also announced policy-based controls and runtime protections for coding agents. If an agent shows malicious behavior, such as attempts to access or exfiltrate sensitive data, Defender will be able to block the agent and raise alerts with investigation context.

Multicloud visibility

Agent 365 now supports public preview registry sync with AWS Bedrock and Google Cloud, helping admins discover and inventory cloud agents across multiple AI builder platforms. Microsoft also plans to support basic lifecycle actions such as starting, stopping, and deleting agents.

Why this matters for IT and security teams

For administrators, the main value is visibility and consistency. AI agents increasingly exist outside traditional governance processes, whether on endpoints, in SaaS apps, or across cloud platforms. Agent 365 brings those signals into familiar Microsoft 365, Intune, and Defender workflows.

This is especially important for:

  • Controlling shadow AI usage
  • Reducing overprivileged agent access
  • Investigating agent-related incidents faster
  • Applying governance across hybrid and multicloud environments

Next steps

IT and security teams should review current AI agent usage across Microsoft 365, Windows devices, and connected cloud platforms. Organizations already using Intune and Defender should also evaluate the new preview capabilities, especially for local agent discovery, policy enforcement, and multicloud registry sync.

As AI adoption accelerates, Agent 365 gives Microsoft customers a more practical way to secure agents without introducing a separate management model.

Need help with Security?

Our experts can help you implement and optimize your Microsoft solutions.

Talk to an Expert

Stay updated on Microsoft technologies

Microsoft Agent 365AI agentsMicrosoft DefenderIntuneshadow AI

Related Posts

Security

Email Threat Landscape Q1 2026: Key Microsoft Insights

Microsoft reports 8.3 billion phishing emails detected in Q1 2026, with QR code phishing more than doubling and CAPTCHA-gated campaigns evolving quickly. The findings matter for security teams because attackers are shifting toward link-based credential theft, while disruption efforts against Tycoon2FA show coordinated action can reduce phishing impact.

Security

Microsoft Security Updates: Agent 365 and Defender

Microsoft has announced new security capabilities across Agent 365, Defender for Cloud, GitHub Advanced Security, and Microsoft Purview. The updates focus on improving visibility into AI agent activity, strengthening code-to-runtime protection, and accelerating data security investigations for security and IT teams.

Security

CISO Risk Reviews: 8 Microsoft Security Best Practices

Microsoft has published a practical framework for CISOs and security leaders to run more effective risk reviews amid rising AI-enabled cyberthreats. The guidance focuses on eight review areas—from assets and applications to authentication, authorization, and network isolation—to help organizations shift from reactive response to proactive risk reduction.

Security

Microsoft Sentinel UEBA Expands AWS Detection

Microsoft Sentinel UEBA now adds richer behavioral analytics for AWS CloudTrail data, giving security teams built-in context like first-time geography, uncommon ISP, unusual actions, and abnormal operation volume. The update helps defenders detect suspicious AWS activity faster and reduces the need for complex KQL baselines and manual enrichment.

Security

Microsoft AI-Powered Defense for Emerging AI Threats

Microsoft says AI is accelerating how vulnerabilities are found and exploited, shrinking the time defenders have to respond. In response, the company is expanding AI-driven vulnerability discovery, exposure management, and Defender-based protections, while also previewing a new multi-model scanning solution for customers in June 2026.

Security

Microsoft Defender Detects Infiltrating IT Workers

Microsoft has outlined detection strategies for identifying North Korea-aligned threat actors posing as remote IT hires to infiltrate organizations. The guidance focuses on correlating HR SaaS, identity, email, conferencing, and Microsoft 365 signals so security and HR teams can spot suspicious candidates before and after onboarding.