Security

Microsoft Security Updates: Agent 365 and Defender

3 min read

Summary

Microsoft has announced new security capabilities across Agent 365, Defender for Cloud, GitHub Advanced Security, and Microsoft Purview. The updates focus on improving visibility into AI agent activity, strengthening code-to-runtime protection, and accelerating data security investigations for security and IT teams.

Need help with Security?Talk to an Expert

Microsoft Security updates focus on AI agents, apps, and data

Introduction

Microsoft has released a new round of security updates aimed at helping organizations secure AI-driven workflows, strengthen cloud and application protection, and improve data investigations. For IT and security administrators, these changes matter because they add more visibility, faster detection, and better coordination across security operations and development teams.

What’s new

Microsoft Defender capabilities for Agent 365 tooling gateway

Microsoft introduced new Microsoft Defender capabilities in preview for the Agent 365 tooling gateway. These features are designed to help security teams detect, block, and investigate threats targeting AI agents and agentic workflows.

Key highlights include:

  • Near real-time protection using webhooks to inspect agent actions.
  • Detection of anomalous or risky behavior before actions are executed.
  • Better visibility and control over how AI agents interact across systems.

This is especially important for organizations deploying autonomous AI agents that can access data and trigger actions across business environments.

Defender for Cloud and GitHub Advanced Security integration now GA

Microsoft also announced general availability of the Microsoft Defender for Cloud integration with GitHub Advanced Security.

This integration provides:

  • Unified visibility from code to production runtime.
  • Automatic mapping of code changes to production environments.
  • Alert prioritization based on real runtime context.
  • Coordinated remediation workflows for development and security teams.
  • AI-powered remediation tools to speed issue resolution.

For DevSecOps teams, this helps close the gap between developer findings and operational risk in production workloads.

New Microsoft Purview Data Security Investigations demo

Microsoft highlighted a new hands-on demo for Microsoft Purview Data Security Investigations. The demo shows how analysts can identify relevant data, use AI-powered deep content analysis, and investigate incidents such as breaches, leaks, fraud, or bribery.

Capabilities demonstrated include:

  • Proactive assessment of data security risks.
  • Reactive investigation of sensitive data involved in incidents.
  • Visualization of correlations between users, content, and activities through the data risk graph.

Impact on IT administrators

For security and IT teams, these updates support a more integrated security model across AI, applications, and data. Administrators can gain stronger oversight of AI agents, improve vulnerability management from source code to runtime, and streamline investigative workflows for sensitive data incidents.

Next steps

  • Evaluate the preview Defender capabilities for Agent 365 if your organization is adopting AI agents.
  • Review the Defender for Cloud and GitHub Advanced Security integration for DevSecOps workflows.
  • Explore the Purview Data Security Investigations demo to assess incident response and insider risk scenarios.
  • Monitor upcoming Microsoft Security announcements, especially ahead of Microsoft Build 2026.

These updates show Microsoft’s continued focus on Zero Trust for AI and more automated, context-aware security operations.

Need help with Security?

Our experts can help you implement and optimize your Microsoft solutions.

Talk to an Expert

Stay updated on Microsoft technologies

Microsoft SecurityMicrosoft DefenderAgent 365GitHub Advanced SecurityMicrosoft Purview

Related Posts

Security

Email Threat Landscape Q1 2026: Key Microsoft Insights

Microsoft reports 8.3 billion phishing emails detected in Q1 2026, with QR code phishing more than doubling and CAPTCHA-gated campaigns evolving quickly. The findings matter for security teams because attackers are shifting toward link-based credential theft, while disruption efforts against Tycoon2FA show coordinated action can reduce phishing impact.

Security

CISO Risk Reviews: 8 Microsoft Security Best Practices

Microsoft has published a practical framework for CISOs and security leaders to run more effective risk reviews amid rising AI-enabled cyberthreats. The guidance focuses on eight review areas—from assets and applications to authentication, authorization, and network isolation—to help organizations shift from reactive response to proactive risk reduction.

Security

Microsoft Sentinel UEBA Expands AWS Detection

Microsoft Sentinel UEBA now adds richer behavioral analytics for AWS CloudTrail data, giving security teams built-in context like first-time geography, uncommon ISP, unusual actions, and abnormal operation volume. The update helps defenders detect suspicious AWS activity faster and reduces the need for complex KQL baselines and manual enrichment.

Security

Microsoft AI-Powered Defense for Emerging AI Threats

Microsoft says AI is accelerating how vulnerabilities are found and exploited, shrinking the time defenders have to respond. In response, the company is expanding AI-driven vulnerability discovery, exposure management, and Defender-based protections, while also previewing a new multi-model scanning solution for customers in June 2026.

Security

Microsoft Defender Detects Infiltrating IT Workers

Microsoft has outlined detection strategies for identifying North Korea-aligned threat actors posing as remote IT hires to infiltrate organizations. The guidance focuses on correlating HR SaaS, identity, email, conferencing, and Microsoft 365 signals so security and HR teams can spot suspicious candidates before and after onboarding.

Security

Opportunistic Cyberattacks: Microsoft’s Design Playbook

Microsoft is urging organizations to make opportunistic cyberattacks harder by removing credentials, shrinking public attack surfaces, and standardizing secure platform patterns. The guidance is especially relevant for teams running Azure, Dynamics 365, and Power Platform workloads at scale, where inconsistent architectures and exposed secrets can make lateral movement easier for attackers.