LemonBits

  • Home
  • About
  • Contact me
Uncategorized

Agent 365 is GA

Frane Borozan - May 5, 2026

 

 

Microsoft Agent 365 went GA on May 1, 2026. If you’re the person who gets paged when something in M365 breaks, this one’s for you.

I’ll skip the keynote summary. Here’s what changed in your tenant, where to click, what licenses you actually need, and what’s going to break first.

What showed up in your admin center

Open the Microsoft 365 admin center. You now have:

  • Agent Registry under the Copilot section. Single inventory of every registered agent in the tenant: Copilot Studio, Foundry, M365 Agents Toolkit, Agent Framework, ecosystem partners (Adobe, SAP, Zendesk, Manus), and any custom registrations.
  • Shadow AI page. Discovers local agents on Windows endpoints via Defender and Intune signals. Starts with OpenClaw detection. GitHub Copilot CLI and Claude Code coverage on the roadmap.
  • Copilot > Settings > Copilot Frontier. This is where Frontier preview access toggles live. If you don’t want preview features bleeding into production, set this to “No access” today.

Agents now appear as first-class objects in Entra. They get an identity, they show up in audit logs, and Conditional Access can target them.

The licensing reality, with the gotchas

$15 per user per month standalone. $99 per user per month bundled into Microsoft 365 E7. Per user.

A few things admins need to know that aren’t on the marketing page:

  • No prerequisite license is required to buy Agent 365. But the security capabilities you actually want depend on user-side licensing.
  • Conditional Access for OBO agents is evaluated against the user’s identity token. The user needs M365 E3 (or equivalent CA licensing) for CA to apply to their agents.
  • Identity Protection for OBO agents requires the user to have M365 E5 (or equivalent).
  • Identity Governance for OBO agents requires the user to have Identity Governance standalone or Entra Suite. Without it, there’s no delegation relationship to govern.
  • Label-based DLP for agent-grounded data requires the data to be labeled, which typically means M365 E3+ (or Purview PAYG for non-M365 data).
  • Agent 365 does not grant E5-level Purview or Defender capabilities at the user level. If you’re on E3, you stay on E3. The license buys agent-specific functionality, not a general security upgrade.
  • No agent count limit. A licensed user can have one agent or a thousand.
  • Foundry and Copilot Studio cost the same. No premium for either platform when registering OBO agents.
  • EU Data Boundary alignment is confirmed for E7 and Agent 365 — relevant if you’re a European admin.

One licensing change to flag because it bit a lot of community tooling last week: pulling agent inventory through the Microsoft Graph Agent and App Package Management API behavior changed at GA. If you have PowerShell scripts or community tools (mine included, the Agent Registry Tool from the Syskit whitepaper) running against that endpoint, expect licensing-related errors and check whether the calling identity needs Agent 365 assigned. Test before your next scheduled run.

What’s GA vs preview, and why it matters for change control

If you write change tickets, this is the section to bookmark.

GA on May 1:

  • Agent Registry and lifecycle management
  • Entra identity for OBO agents (agents acting on behalf of a licensed user)
  • Conditional Access targeting agents
  • Purview DLP, sensitivity labels, and audit on agent activity
  • Defender threat detection for agents
  • Intune Shadow AI discovery on Windows (OpenClaw baseline)
  • Standalone licensing and E7 bundle, commercial and education tenants

Public preview at GA:

  • Autonomous “agentic users” with their own identity, mailbox, OneDrive
  • Agent 365 SDK
  • Security posture management for Foundry and Copilot Studio agents
  • Agent 365 tools gateway (runtime threat protection)
  • Windows 365 for Agents Cloud PC class
  • Multicloud registry sync with AWS Bedrock and Google Gemini Enterprise

Not yet:

  • GCC: late 2026
  • GCC High: late 2026
  • DoD: early 2027

If your tenant is GCC or above, you’re on the sidelines until at least Q4. Plan accordingly and don’t let leadership assume parity.

The discovery pass you should run this week

Don’t wait for a project plan. Run this in a maintenance window:

  1. Open the Shadow AI page. Note the count of detected local agents. If you see OpenClaw on machines you didn’t expect, those endpoints had no agent governance until last week.
  2. Pull the Agent Registry export. Filter by registration source. Anything with no clear owner is your first cleanup target.
  3. Check Entra sign-in logs filtered to agent identities. You’re looking for agents authenticating from unexpected IPs, off-hours patterns, or against resources outside their declared scope.
  4. Audit Copilot Studio publishers. Anyone with maker rights has been able to publish agents into the tenant. Cross-reference with HR. You will find agents owned by people who left.
  5. Check Purview audit for agent activity over the last 30 days. Sensitive label hits, DLP near-misses, downloads. The history is there now whether you were watching or not.

Block out a day. You’ll need it.

Conditional Access policies to write first

Don’t try to govern everything on day one. Three policies cover most of the immediate risk:

  • Block unmanaged local agents on managed devices. Intune compliance + Conditional Access targeting agent sign-ins. OpenClaw and similar tools running locally without registration get blocked at auth.
  • Require named locations for high-privilege agents. Any agent with access to Finance, HR, or Legal data only authenticates from corporate IP ranges or trusted networks.
  • Session controls on agent access to sensitive sites. Force Purview session policies for agents touching labeled content. Stops bulk download patterns before they finish.

Test in report-only mode for at least a week. Agents fail differently than users and the failures are noisier.

Owners, not just policies

The platform makes inventory and policy enforcement possible. It does not solve ownership. Every registered agent needs an accountable human, and the platform won’t pick one for you. Decide now:

  • Does ownership default to the publisher, the requester, or a central AI ops team?
  • What happens to agents when their owner leaves? (Spoiler: you need an offboarding step for this.)
  • Who approves new agent registrations? Not “who can,” but who is accountable when one misbehaves.

Write this down before your first incident. The platform gives you a kill switch. It doesn’t tell you who’s allowed to pull it.

The bottom line for admins

The inventory is solid, the Entra integration is solid, the Intune shadow AI story is the surprise hit. The autonomous agent story and the SDK are still preview, so don’t promise features you don’t have yet.

Run discovery this week. Write your first three CA policies next week. Talk to your security team about the Defender tuning. And get ownership defined before someone audits you for it.

 0 0
Share Now

Frane Borozan

Helping SBC administrators kick-ass Google+

Leave a Reply Cancel Reply

Your email address will not be published. Required fields are marked *

Previous Post Microsoft 365 Configuration Drift: How to Detect and Prevent Tenant Misconfigurations with UTCM

Connect with me on

Latest Posts

  • Agent 365 is GA

  • Creating a secure Microsoft Teams and Shared Channels environment for guest users

    Microsoft 365 Configuration Drift: How to Detect and Prevent Tenant Misconfigurations with UTCM

  • Full Visibility Into Every Copilot Agent in Your Tenant

  • Extended senstibitiy labels to the files that are downloaded from SharePoint

  • Subscribing to M365 Insider preview manually

  • Your guide to a SharePoint Online Site

    SharePoint alerts retirement

  • Introducing Teams Client Health: Proactive Monitoring for Microsoft Teams

  • Tracking and monitoring user access in Microsoft Teams and Shared channels

    Restricted content discovery or how Copilot can see that site too?

  • SharePoint Agents: Revolutionizing Workplace Collaboration

  • Microsoft Data Security Posture Management for AI

Recent Comments

  • Nigel Sampath on Installing Remote Desktop Services 2016
  • Christoph Juli on VPN doesn’t work aka how to clear ARP cache on the computer when you connect to the VPN
  • Amir on The curious case of saved-critical Hyper-V machines in Hyper-V Manager or Incomplete VM Configuration in Virtual Machine Manager
  • Frane Borozan on Downloads folder slow to load/sort in Windows 10
  • güvenlik kamerası on Downloads folder slow to load/sort in Windows 10
  • Laki Lakovic on Opening group policy editor on a remote computer and forcing GP Update
  • Diane on Opening group policy editor on a remote computer and forcing GP Update
  • Manoj B on Differences between L1, L2, L3 system administrator guidlines
  • Travis Vroman on Teams slow
  • Yossi B on Remote Desktop Services Manager 2016
  • astha on SharePoint audit logs
  • Frane Borozan on Installing Remote Desktop Services 2016
  • Joe Zhou on Installing Remote Desktop Services 2016
  • Pino on Installing standalone Remote Desktop Gateway on the Windows Server 2012 R2 without complete Remote Desktop Services infrastructure
  • Eddy Wilson on Windows 10: Share a VPN Connection
  • haleybri.com on Remote Desktop Services Manager 2016
  • Atif on Remote Desktop Services Manager 2016
  • Tan Vu on KB2919355 The update is not applicable to your computer
  • Vinay on Installing Remote Desktop Services 2016
  • JOEL FERDY FEUBI TABOUE on KB2919355 The update is not applicable to your computer
  • Delmar on Installing standalone Remote Desktop Gateway on the Windows Server 2012 R2 without complete Remote Desktop Services infrastructure
  • Luke Welden on KB2919355 The update is not applicable to your computer
  • LM on Installing standalone Remote Desktop Gateway on the Windows Server 2012 R2 without complete Remote Desktop Services infrastructure
  • Anonymous987 on KB2919355 The update is not applicable to your computer
  • ANonyommus987 on KB2919355 The update is not applicable to your computer
  • Alan on Remote Desktop Services Manager 2016
  • Jagz on Installing Remote Desktop Services 2016
  • VG on SharePoint audit logs
  • VG on SharePoint audit logs
  • Kalle on SharePoint audit logs
  • 3 pandas on SQL Server security best practices
  • Kalle on SharePoint audit logs
  • Frane Borozan on Installing standalone Remote Desktop Gateway on the Windows Server 2012 R2 without complete Remote Desktop Services infrastructure
  • Erin Platt on Installing standalone Remote Desktop Gateway on the Windows Server 2012 R2 without complete Remote Desktop Services infrastructure
  • Tad Benoit on Remote Desktop Services Manager 2016

Copyright © 2023 Frane Borozan. All rights reserved