Security

Microsoft Agent 365 Secures Enterprise AI Agents

3 min read

Summary

Microsoft has introduced Agent 365, a centralized control plane for managing enterprise AI agents across Microsoft and partner ecosystems, with tools for inventory, observability, risk monitoring, and policy enforcement. It matters because it brings identity, access, and security governance to AI agents through Microsoft Entra, Defender, and Purview, helping organizations safely scale agentic AI while reducing the risks of unmanaged autonomous systems.

Need help with Security?Talk to an Expert

Introduction

As enterprises move from AI experimentation to large-scale deployment of autonomous and semi-autonomous agents, governance is quickly becoming the biggest blocker. Microsoft’s new Agent 365 is designed to address that challenge by giving IT, security, and business teams a shared control plane for tracking, securing, and managing agentic AI across Microsoft and partner ecosystems.

What’s new

Unified control plane for AI agents

Microsoft Agent 365 provides centralized visibility into agents across the organization, including Microsoft-built agents, partner agents, and agents registered through APIs.

Key capabilities include:

  • Agent Registry for a unified inventory of enterprise agents
  • Usage and performance observability with reports, adoption metrics, and activity details
  • Agent risk signals surfaced through Microsoft Defender, Entra, and Purview
  • Security policy templates to help security teams define controls that IT can enforce during onboarding

Identity and access controls for agents

Microsoft is treating agents more like managed digital identities.

Notable Entra-based features include:

  • Agent ID to assign each agent a unique identity in Microsoft Entra
  • Conditional Access and Identity Protection for agents using risk, device compliance from Intune, and custom security attributes
  • Identity Governance for agents to limit access and audit granted permissions

This is important because unmanaged agents can easily become over-privileged or operate outside standard organizational controls.

Compliance and data protection for agentic AI

Purview capabilities extend compliance controls to AI agents, helping reduce oversharing and leakage risks.

Highlights include:

  • Information Protection so agents inherit Microsoft 365 sensitivity labels
  • Inline DLP for Microsoft Copilot Studio prompts
  • Insider Risk Management for risky agent interactions with sensitive data
  • Data Lifecycle Management for retention and deletion of prompts and agent-generated data
  • Audit, eDiscovery, and Communication Compliance for investigating and governing agent activity

Threat protection for emerging AI attacks

Defender adds protections specifically aimed at AI-centric threats such as:

  • Prompt manipulation
  • Model tampering
  • Agent-driven attack chains
  • Misconfigurations in Foundry and Copilot Studio agents

Some Defender and Purview capabilities remain in public preview as of the May 1 release.

Impact on IT administrators and security teams

For admins, the biggest change is operational: agents are becoming first-class enterprise entities that need the same lifecycle management as users, apps, and devices. Organizations deploying Copilot Studio, Foundry, or partner-built agents will now have a clearer path to enforce identity, compliance, and monitoring controls without building separate governance processes.

Action items

  • Review where AI agents already exist in your environment and who owns them
  • Assess whether your Entra, Defender, and Purview policies are ready to extend to agents
  • Plan for Agent 365 GA on May 1, 2026
  • Evaluate licensing impact: Agent 365 is priced at $15 per user/month
  • Track preview features if you need advanced risk and investigation scenarios at launch

Microsoft’s message is clear: if AI agents are going to scale safely, they need the same trust, visibility, and control framework as every other enterprise identity.

Need help with Security?

Our experts can help you implement and optimize your Microsoft solutions.

Talk to an Expert

Stay updated on Microsoft technologies

Agent 365Microsoft SecurityEntra IDMicrosoft PurviewMicrosoft Defender

Related Posts

Security

Dirty Frag Linux Vulnerability Raises Root Risk

Microsoft has warned of active exploitation involving the newly disclosed Dirty Frag Linux local privilege escalation vulnerability, which can help attackers move from a low-privileged account to root. The issue affects kernel networking components such as esp4, esp6, and rxrpc, making it especially important for administrators to review module exposure, restrict local access, and prepare for vendor kernel patches.

Security

AI Agent RCE Flaws in Semantic Kernel Explained

Microsoft Defender researchers disclosed two fixed vulnerabilities in Semantic Kernel that could let prompt injection escalate into host-level remote code execution in AI agents. The findings matter because they show how unsafe tool parameter handling in agent frameworks can turn natural language inputs into code execution paths, raising the stakes for organizations building or securing AI-powered apps.

Security

Microsoft Entra Passkeys: 2026 Passwordless Updates

Microsoft outlined major passkey and account recovery updates across Entra ID, Windows, External ID, and Microsoft Password Manager as part of World Passkey Day. The changes matter for IT teams because they expand phishing-resistant sign-in options, improve recovery security, and continue the retirement of weaker authentication methods such as security questions.

Security

Microsoft AI SOC Report 2026: KuppingerCole Leader

Microsoft says it has been named an Overall Leader and Market Leader in KuppingerCole Analysts’ 2026 Emerging AI Security Operations Center report. The announcement highlights Microsoft’s push beyond traditional SOAR toward AI-driven, agent-assisted security operations in Sentinel and Security Copilot to help SOC teams improve speed, consistency, and scale.

Security

ClickFix macOS Campaign Delivers Infostealers

Microsoft has identified a new ClickFix-style campaign targeting macOS users with fake troubleshooting and utility instructions hosted on blogs and content platforms. Instead of downloading apps, victims are tricked into running Terminal commands that bypass typical macOS app checks and deploy infostealers such as Macsync, SHub Stealer, and AMOS.

Security

AiTM Phishing Campaign Targets Microsoft 365 Users

Microsoft has detailed a large-scale adversary-in-the-middle (AiTM) phishing campaign that used fake code-of-conduct investigations to steal authentication tokens. The attack combined polished social engineering, staged CAPTCHA pages, and a legitimate Microsoft sign-in flow, highlighting why phishing-resistant protections and stronger email defenses matter.