πŸ‡ΊπŸ‡ΈMiamiπŸ‡ΊπŸ‡ΈOrlandoπŸ‡ΊπŸ‡ΈLos AngelesπŸ‡¨πŸ‡¦VancouverπŸ‡¨πŸ‡¦Toronto
1-855-KOO-TECH
KootechnikelKootechnikel
Insights Β· Field notes from the SOC
Plain-language briefings from the people watching the alerts.
Weekly Β· No spam
GA Β· May 1, 2026 Β· Microsoft Cloud Solution Provider

Microsoft Agent 365.
The control plane for every AI agent in your tenant.

Microsoft Agent 365 went generally available on May 1, 2026 as the unified control plane for autonomous AI agents β€” Microsoft Copilot Studio, Salesforce Agentforce, ServiceNow Now Assist, Workday Illuminate, custom builds, and open-source frameworks. It solves agent sprawl by giving IT and SecOps one place to inventory agents, assign Entra identities, monitor runtime behavior with Defender, govern data with Purview, and measure business impact through a unified observability dashboard. $15/user/mo standalone, or bundled in the new Microsoft 365 E7 Frontier Suite at $99/user/mo.

The problem Β· agent sprawl

Every SaaS vendor ships an agent platform. Yours is being colonized whether you see it or not.

In 2024 you had Microsoft Copilot. In 2025 you had Microsoft Copilot AND Salesforce Einstein/Agentforce AND ServiceNow Now Assist AND Workday Illuminate AND a developer team running LangChain in a container nobody knows about. Each platform ships its own agents with its own admin console, identity model, audit trail, and DLP posture β€” none of which talk to each other. This is agent sprawl. Below are four common shadow-agent patterns we surface on the first day of an Agent Registry rollout.

A Salesforce admin built an Agentforce agent for the sales team

Risk: Has read access to the entire Salesforce instance. No DLP policies. No audit trail outside Salesforce.

Agent 365 fix: Agent Registry surfaces it on Day 1. Apply Entra identity, scope to the right opportunity records, route audit logs to Purview.

A line-of-business team built a ServiceNow Now Assist agent for IT helpdesk Tier-0

Risk: Routes user queries to LLMs without prompt-inspection DLP. Could leak sensitive ticket content to the model provider.

Agent 365 fix: Agent 365 enforces DLP via Purview at the agent boundary. Block sensitive content from being included in prompts.

A developer built a custom Copilot Studio agent that calls 12 external APIs

Risk: Service-to-service authentication is hardcoded credentials. Agent can be impersonated if credentials leak.

Agent 365 fix: Agent 365 issues a managed Entra identity for the agent. OAuth-style flows replace hardcoded secrets. Conditional Access applies.

An open-source LangChain agent runs in a Docker container on a developer laptop

Risk: No tenant visibility. No DLP. No audit. Effectively a backdoor into corporate data.

Agent 365 fix: Agent Registry detects the agent on first connection to tenant resources. Quarantine pending approval workflow.

The five capabilities

Registry. Identity. Runtime. Governance. Observability.

Agent 365 ships with five capabilities that integrate with the Microsoft security and management stack you already operate. Each one solves a specific dimension of the agent governance problem.

Capability 01

Agent Registry

A single source of truth for every AI agent operating in your tenant β€” Microsoft Copilot Studio agents, Salesforce Agentforce, ServiceNow Now Assist, Workday Illuminate, custom-built ones, and open-source frameworks.

IT admins use the registry to inventory agents at any point in time, classify them by department / use case / risk tier, and discover unmanaged "shadow agents" that line-of-business teams have spun up without IT visibility. Unsanctioned agents can be quarantined with one click β€” paused, restricted, or fully disabled β€” without touching the underlying vendor consoles.

  • Tenant-wide agent inventory across Microsoft AND third-party platforms
  • Shadow agent discovery β€” find what your line-of-business teams shipped without IT
  • One-click quarantine of unsanctioned agents
  • Per-agent metadata: owner, business unit, data scope, last-active, cost
  • Continuous discovery scans (new agents detected within minutes of registration)
Capability 02

Unique Agent Identities

Every agent gets a unique managed identity in Microsoft Entra ID β€” the same identity surface human users get. Apply Conditional Access. Enforce least-privilege. Treat agents as first-class principals in your zero-trust model.

Adaptive, risk-based access policies apply to agents the way they apply to humans: device posture, IP reputation, sign-in anomaly detection, time-of-day restrictions, geo-fencing. Least-privilege is enforced by default β€” an agent that needs read access to one SharePoint site does not get read access to the whole tenant. Identity Governance access reviews now include agents alongside human accounts.

  • Managed Entra identity per agent β€” same governance surface as humans
  • Adaptive Conditional Access (device, IP, anomaly, geo, time)
  • Least-privilege enforcement β€” explicit scope, not "Allow All"
  • Identity Governance access reviews extended to agents
  • Service-to-service auth between agents using OAuth-style flows
Capability 03

Runtime Protection (Defender)

Microsoft Defender monitors agent behavior in real time. Detects excessive data retrieval, prompt-injection attempts, lateral movement patterns, anomalous API call sequences, and tool-use that deviates from baseline.

When an agent is compromised β€” by prompt injection, credential theft, or misuse β€” Defender can dynamically restrict the agent (revoke specific tool permissions), pause the agent (halt all execution pending review), or fully isolate it (cut off network access). Incidents flow into Defender XDR alongside endpoint, identity, and email signals so SecOps gets a unified incident view that includes the agent dimension.

  • Real-time behavioral monitoring per agent
  • Anomaly detection: excessive data retrieval, unusual tool-use patterns
  • Prompt-injection attack detection (model-aware)
  • Dynamic restriction / pause / isolate response actions
  • Defender XDR correlation across agents + endpoints + identities + email
Capability 04

Data Governance (Purview)

Microsoft Purview policies extend to agents the same way they apply to humans. Sensitivity labels propagate from source documents into agent outputs. DLP blocks agents from processing or leaking sensitive content. Records management applies to agent-generated artifacts.

A Confidential-labeled file fed into an agent produces a Confidential-labeled output. An agent attempting to retrieve credit-card numbers gets blocked by DLP just like a user would. Insider Risk Management correlates agent activity with the user the agent acts on behalf of, surfacing patterns where an agent is being used to exfiltrate data the user could not exfiltrate directly. The Purview AI Hub is the unified governance surface for all AI activity in the tenant.

  • Sensitivity labels propagate into agent outputs
  • DLP policies applied to agent prompts AND responses
  • Records management extended to agent-generated artifacts
  • Insider Risk Management correlates agent + human activity
  • Purview AI Hub: unified inventory + audit + policy for all AI
Capability 05

Observability Dashboard

A unified dashboard for IT, SecOps, and line-of-business leaders. Per-agent performance, latency, cost, success rate, error patterns, and security posture. Role-based reporting tracks business impact.

IT sees operational health (latency, errors, capacity). SecOps sees security posture (anomalies, policy violations, incident attribution). Line-of-business leaders see business impact (cost per agent, deflection rate, time-saved estimates, ROI). Filters by department / vendor / use case / risk tier let each persona drill into the slice that matters to them.

  • Per-agent KPIs: latency, success rate, error rate, cost
  • Security posture: policy violations, anomaly count, incident links
  • Business impact: deflection rate, time saved, cost per outcome
  • Role-based views (IT / SecOps / business leader / agent owner)
  • Cost telemetry: per-agent, per-vendor, per-department spend
Pricing Β· two ways to buy

Standalone for governance-only buyers. E7 for the whole AI stack.

Microsoft Agent 365 (standalone)

$15/user/mo

Annual commit

Layered onto an existing M365 plan. The right buy for tenants that already have the licensing they need but want the agent governance layer added.

Microsoft 365 E7 Frontier Suite

$99/user/mo

M365 E5 + M365 Copilot + Microsoft Entra Suite + Agent 365

Γ€ la carte = $117/user/mo. E7 saves $18/user/mo. The default for any client refreshing licensing in 2026.

The 2026 renewal math: if you already have M365 E5 + Microsoft 365 Copilot + Microsoft Entra Suite, switch to E7 at renewal β€” saves $18/user/mo and adds Agent 365 with no incremental cost. If you only need governance for a multi-vendor agent estate (e.g., Salesforce Agentforce + ServiceNow Now Assist + custom builds) and Copilot is not in scope, buy Agent 365 standalone.
Cross-vendor landscape

How Agent 365 compares to vendor-specific and pure-play alternatives.

Salesforce Agentforce + Trust Layer

Salesforce-native agent governance for Agentforce agents only. Strong inside Salesforce; does not extend to Microsoft, ServiceNow, or open-source agents. Most enterprises end up running Agent 365 ALONGSIDE Salesforce Trust Layer to cover both surfaces.

ServiceNow Now Assist Governance

ServiceNow-native governance for Now Assist agents. Same scope limitation β€” strong inside ServiceNow, no cross-vendor view. Pairs with Agent 365 for the unified inventory.

Pure-play AI governance startups (e.g., Credo AI, Cranium, Robust Intelligence)

Vendor-agnostic by design but lack the integration depth Agent 365 has via Microsoft Entra, Defender, and Purview. Often deployed in regulated industries that need additional fairness/bias testing capabilities Agent 365 does not include.

The deployment

4-6 weeks from kickoff to a fully governed agent estate.

  1. 01

    Agent Registry rollout

    Week 1

    Discover the existing agent estate. Classify by risk tier (shadow / sanctioned but ungoverned / fully governed). Identify the highest-risk shadow agents and quarantine the ones without owners.

  2. 02

    Identity model

    Weeks 2-3

    Assign Entra identities to discovered agents. Apply Conditional Access policies. Enforce least-privilege scope β€” an agent that needs read access to one SharePoint site does not get tenant-wide access.

  3. 03

    Defender + Purview integration

    Weeks 3-4

    Wire runtime monitoring via Defender. Apply DLP policies at the agent boundary via Purview. Configure Insider Risk Management to correlate agent + human activity. Defender XDR pulls agent incidents alongside endpoint, identity, and email signals.

  4. 04

    Observability + handoff

    Weeks 5-6

    Configure the observability dashboard. Set up role-based views for IT, SecOps, and line-of-business leaders. Wire cost telemetry. Integrate with the Copilot Dashboard for the human-AI productivity surface. Document the runbook and hand off to internal operators.

FAQ

Agent 365 questions, answered.

What is Microsoft Agent 365 and when did it launch?

Microsoft Agent 365 is a centralized control plane for governing autonomous AI agents in your tenant. It went generally available on May 1, 2026. The platform addresses "agent sprawl" β€” the rapid proliferation of AI agents from Microsoft Copilot Studio, third-party platforms (Salesforce Agentforce, ServiceNow Now Assist, Workday Illuminate), and open-source frameworks (LangChain, AutoGen, CrewAI) β€” by providing a unified surface for inventory, identity, runtime protection, data governance, and observability across all of them.

How much does Microsoft Agent 365 cost?

Microsoft Agent 365 is priced at $15 per user per month standalone (annual commit), layered onto an eligible M365 plan. It is also bundled into the new Microsoft 365 E7 Frontier Suite at $99 per user per month, which combines E5 + Microsoft 365 Copilot + Microsoft Entra Suite + Agent 365. Γ€ la carte that bundle costs $117/user/mo, so E7 saves about $18/user/mo. For organizations that already have E5 + Copilot + Entra Suite, E7 is the immediate win at next renewal.

What is "agent sprawl" and why does it matter?

Agent sprawl is the rapid accumulation of AI agents from multiple vendors and frameworks β€” Microsoft Copilot Studio, Salesforce Agentforce, ServiceNow Now Assist, Workday Illuminate, custom builds, and open-source. Each vendor ships its own agent platform with its own admin console, identity model, audit trail, and security posture. Without a unified control plane, IT and SecOps cannot see what agents exist, what data they access, what they cost, or whether they have been compromised. Agent 365 solves this by giving you one place to govern agents from any source.

How does the Agent Registry detect "shadow agents"?

The Agent Registry runs continuous discovery scans against your tenant β€” Microsoft Graph activity, Entra ID sign-in logs, Defender for Cloud Apps signals, and connector telemetry. Agents that connect to tenant resources show up in the registry within minutes of registration, even if they were never registered through an official IT process. Each entry includes the agent owner, the data scope, the last-active timestamp, and the registration path (sanctioned IT-approved vs. shadow). Unsanctioned agents can be quarantined with one click β€” pausing all execution pending review.

How does Microsoft Defender protect agents at runtime?

Defender monitors agents the way it monitors users and endpoints β€” continuous behavioral analysis with baseline-deviation detection. Specific agent threats Defender detects include: excessive data retrieval (an agent suddenly pulling 10x its baseline document volume), unusual tool-use patterns (an agent calling APIs it has never called before), prompt-injection attempts (model-aware detection of crafted input designed to override agent behavior), credential theft attempts, and lateral movement across the agent's authorized resources. Response actions include dynamic restriction (revoke specific tool permissions), pause (halt all execution), and full isolation (cut off network access). Incidents flow into Defender XDR alongside endpoint, identity, and email signals.

How does Microsoft Purview govern agent data access?

Purview policies apply to agents the same way they apply to human users. Sensitivity labels propagate from source documents into agent outputs β€” a Confidential-labeled file used as agent grounding produces a Confidential-labeled response. DLP policies inspect both agent prompts (input) and agent responses (output) for sensitive content; agents attempting to retrieve credit-card numbers get blocked exactly as a user would. Records management labels extend to agent-generated artifacts, and Insider Risk Management correlates agent activity with the user the agent acts on behalf of β€” surfacing patterns where an agent is being used to do things the user could not do directly. The Purview AI Hub is the unified governance surface for all AI activity.

Does Agent 365 work with Salesforce Agentforce, ServiceNow Now Assist, and Workday Illuminate?

Yes. Agent 365 is explicitly designed as a multi-vendor control plane. Microsoft Copilot Studio agents, Salesforce Agentforce agents, ServiceNow Now Assist agents, Workday Illuminate agents, and custom-built agents (including open-source frameworks like LangChain, AutoGen, and CrewAI) all appear in the unified Agent Registry. Identity, audit logging, DLP, and observability surfaces work consistently regardless of where the agent was built. This is the "single source of truth" promise: one place to govern every agent in your tenant.

Should we buy Agent 365 standalone or wait for the M365 E7 bundle?

It depends on your current state. If you already have M365 E5 + Microsoft 365 Copilot + Microsoft Entra Suite, switching to E7 at next renewal saves $18/user/mo and adds Agent 365 with no incremental work. If you have E5 today but no Copilot, the right sequence is: deploy E5 first, run a 3-6 month Copilot pilot, then transition to E7 when Copilot adoption justifies it. If you only need Agent 365 and not Copilot β€” for example, you have a multi-vendor agent estate from Salesforce + ServiceNow that needs governance but you have not deployed Microsoft Copilot β€” buying Agent 365 standalone at $15/user/mo on top of your existing M365 plan is the right move.

How does Agent 365 differ from Microsoft Copilot Studio governance?

Copilot Studio includes its own native governance for agents BUILT in Copilot Studio β€” environment policies, DLP policies for connectors, maker permissions, and Power Platform admin center oversight. Agent 365 sits ABOVE Copilot Studio and extends governance to agents from EVERY source β€” Studio agents, Salesforce Agentforce, ServiceNow Now Assist, Workday Illuminate, custom-built ones, open-source frameworks. The two layers are complementary: Copilot Studio governs how you BUILD agents within Microsoft's platform; Agent 365 governs the AGENT POPULATION across all platforms in your tenant. Most enterprise deployments need both.

What does an Agent 365 deployment look like for a Canadian mid-market business?

A typical Agent 365 deployment is a 4-6 week engagement. Week 1: Agent Registry rollout β€” discover the existing agent estate, classify by risk tier, identify shadow agents. Weeks 2-3: Identity model β€” assign Entra identities to discovered agents, apply Conditional Access policies, enforce least-privilege scope. Weeks 3-4: Defender + Purview integration β€” wire runtime monitoring, DLP for the agent boundary, Insider Risk Management correlation. Weeks 5-6: Observability rollout β€” dashboard configuration, role-based reporting, cost telemetry, integration with the Copilot Dashboard for the human-AI productivity surface. We map the entire deployment to PIPEDA and Quebec Law 25 obligations as part of the engagement for Canadian clients.

The agent platforms shipped. The governance is the work.

Agent 365 turns a Cambrian explosion of vendor-specific agent consoles into one governable surface. The free 90-minute IT health check we run for prospective clients includes an Agent 365 readiness review: agent inventory across your tenant (Microsoft + third-party + open-source), risk-tier classification, and a 4-6 week deployment roadmap. Yours to keep either way.