<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>rss.livelink.threads-in-node</title>
    <link>https://techcommunity.microsoft.com/t5/public-sector/ct-p/PublicSector</link>
    <description>rss.livelink.threads-in-node</description>
    <pubDate>Sun, 26 Apr 2026 19:56:43 GMT</pubDate>
    <dc:creator>PublicSector</dc:creator>
    <dc:date>2026-04-26T19:56:43Z</dc:date>
    <item>
      <title>Architecture Risk Brief: Silent Data Integrity Failures in Distributed Criminal Justice Systems</title>
      <link>https://techcommunity.microsoft.com/t5/public-sector-local-state/architecture-risk-brief-silent-data-integrity-failures-in/m-p/4514586#M398</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Why Modernized Public Safety Environments Need Stronger Data Integrity Controls&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;In criminal justice information services systems, the most dangerous failures are often the ones you cannot see.&lt;/P&gt;&lt;P&gt;A system may appear fully operational—dashboards green, services responsive, transactions flowing—while critical data is incomplete, inconsistent, or out of sync across connected platforms. In these environments, the absence of alerts does not necessarily mean the absence of problems. Instead, it can signal that data integrity issues are developing silently beneath normal system behavior.&lt;/P&gt;&lt;P&gt;As agencies modernize criminal justice information services (CJIS) systems, adopt cloud platforms, and expand data sharing across jurisdictions, the challenge is not only keeping systems online; it is ensuring the data moving between them remains accurate, consistent, and trustworthy.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Why This Risk Is Growing&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Criminal justice agencies are going through rapid modernization, and with that comes a level of complexity that simply didn’t exist in earlier, more isolated systems. In many environments, legacy applications are still running alongside newer cloud-based platforms, which creates gaps in how data is processed and interpreted. At the same time, transaction volumes have increased significantly, and under heavy load it’s not uncommon to see partial commits, retry behavior, or subtle inconsistencies that are hard to detect.&lt;/P&gt;&lt;P&gt;There’s also a growing expectation for near real-time synchronization across systems, even when those systems weren’t originally designed to stay perfectly in sync. As more agencies begin sharing data across jurisdictions, the number of integration points increases, and each one introduces its own risk. None of these changes are inherently problematic, but together they create conditions where data integrity issues can develop quietly without triggering any obvious system failures.&lt;/P&gt;&lt;P&gt;These changes improve capability but also create new failure modes that traditional monitoring does not detect. System uptime alone is no longer a reliable indicator of operational health. The CJIS Security Policy reinforces this requirement by mandating that criminal justice information (CJI) remain accurate, complete, and protected from unauthorized alteration throughout its lifecycle.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;What Silent Data Integrity Failures Look Like&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Silent failures almost never show up as outages. Most of the time, everything looks fine on the surface—systems are up, jobs are running, dashboards are green. The problems usually come to light much later, often when someone is preparing for an audit, reconciling data between agencies, or digging into a case where something just doesn’t add up.&lt;/P&gt;&lt;P&gt;In one scenario, a transaction completed successfully in the source system but never made it to a downstream platform. There were no errors, no retries flagged—just missing data. In another case, records looked perfectly valid within each system, but when compared across environments, they didn’t match. These kinds of discrepancies tend to surface during reporting or compliance checks, not during normal operations.&lt;/P&gt;&lt;P&gt;That’s what makes them difficult to catch. From an operational standpoint, everything appears healthy. There are no alerts or obvious failures, but underneath that, the data has slowly drifted out of sync.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Database Corruption: The Most Silent Failure of All&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Beyond synchronization gaps, database corruption represents an even more dangerous and often invisible threat. Corruption can arise from:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Storage subsystem issues&lt;/LI&gt;&lt;LI&gt;Hardware degradation&lt;/LI&gt;&lt;LI&gt;Incomplete writes under high load&lt;/LI&gt;&lt;LI&gt;Failover anomalies&lt;/LI&gt;&lt;LI&gt;Legacy-to-cloud interactions&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Low-severity corruption may go unnoticed for weeks but eventually impacts multiple agency systems. Because corruption directly threatens the accuracy and integrity of CJI, it poses a significant CJIS compliance risk.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;My Implementation: Automated Corruption Alerts&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;To deal with this, I implemented a simple automated alerting system that monitors corruption indicators and notifies me as soon as something looks off. Instead of waiting for issues to surface during audits or downstream failures, this provides an early signal that something isn’t right.&lt;/P&gt;&lt;P&gt;In practice, it means I can react quickly, investigate the issue before it spreads, and avoid situations where bad data propagates into other systems. In CJIS environments, even a single corrupted record can have real consequences, so early visibility makes a meaningful difference.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Flow Diagram to Detect Integrity&lt;/STRONG&gt;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&lt;STRONG&gt;Root Causes of Silent Data Drift&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;In most cases, these data integrity issues don’t come from obvious failures—they build up during normal day-to-day operations. In high-volume systems, retries and partial commits under load can leave data in an inconsistent state without triggering any errors. During modernization or cloud migrations, subtle differences in schema behavior or transformation logic can cause data to drift between systems over time.&lt;/P&gt;&lt;P&gt;Another common gap is monitoring. Most setups track uptime and performance, but very few validate whether the data itself remains consistent across platforms. And once data moves across multiple systems and integrations, each handoff becomes a potential point where something can go slightly wrong. None of these issues stand out individually, but together they create conditions where inconsistencies quietly accumulate.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Next Steps for Agencies&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Criminal justice organizations don’t need to overhaul their entire technology stack to strengthen data integrity. Instead, they can take practical, incremental steps that build resilience into existing systems while preparing for future modernization.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Establish a Baseline for Data Integrity&lt;/STRONG&gt; Map where data originates, how it moves, and where it is stored across multiple agency systems.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Implement Routine Cross-System Validation&lt;/STRONG&gt; Use Azure Data Factory, Azure SQL Data Sync, and Log Analytics queries to automate comparisons between operational and reporting systems.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Monitor for Corruption and Synchronization Failures&lt;/STRONG&gt; Enable corruption detection and configure automated notifications—similar to the low-to-critical corruption alerts I implemented.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Treat Failover and Migration as Integrity Events&lt;/STRONG&gt; Use Azure SQL Failover Groups and ADF pipelines to verify data consistency before and after transitions.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Strengthen Governance and Documentation&lt;/STRONG&gt; Use Microsoft Purview to track lineage, schema changes, and data ownership.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Build a Culture of Data Integrity&lt;/STRONG&gt; Encourage teams to treat data correctness as a shared responsibility across the organization.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Final Thoughts&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Criminal justice information systems have made significant progress in availability, scalability, and security. But as these systems become more distributed and interconnected, data integrity—including corruption detection—is emerging as one of the most critical and least visible operational risks.&lt;/P&gt;&lt;P&gt;The challenge is no longer simply ensuring systems stay online. It is ensuring that the data moving through them remains correct, consistent, and trustworthy across every system, agency, and workflow that depends on it.&lt;/P&gt;&lt;P&gt;In environments where data directly impacts investigations, reporting, and compliance decisions, integrity must be engineered, validated, and continuously enforced with the same rigor applied to system availability and security.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Apr 2026 17:18:12 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/public-sector-local-state/architecture-risk-brief-silent-data-integrity-failures-in/m-p/4514586#M398</guid>
      <dc:creator>deepeshd87</dc:creator>
      <dc:date>2026-04-24T17:18:12Z</dc:date>
    </item>
    <item>
      <title>B2B SPO:  GCCH tenant members as guests on commercial Entra</title>
      <link>https://techcommunity.microsoft.com/t5/public-sector-local-state/b2b-spo-gcch-tenant-members-as-guests-on-commercial-entra/m-p/4514554#M397</link>
      <description>&lt;P&gt;Has anyone successfully enabled&amp;nbsp;GCC guest access to a Commercial SharePoint Online site?&lt;/P&gt;&lt;P&gt;We support customers on GCCH tenants and are migrating an on‑prem SharePoint workload to Commercial M365 SPO. Inviting GCC users as guests fails with token/Token ID errors. Entra sign‑in succeeds, but SharePoint token issuance fails. CTAP is configured on both GCC (outbound) and Commercial (inbound).&lt;/P&gt;&lt;P&gt;Microsoft support indicated it may not be possible (“Entra won’t pass OIDC to SPO”), but Microsoft documentation suggests B2B for SharePoint works across US Gov and Commercial.&lt;/P&gt;&lt;P&gt;If you’ve made this work (or confirmed it can’t), I’d appreciate any practical guidance or gotchas. Thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 24 Apr 2026 15:35:39 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/public-sector-local-state/b2b-spo-gcch-tenant-members-as-guests-on-commercial-entra/m-p/4514554#M397</guid>
      <dc:creator>Kristin_L_365</dc:creator>
      <dc:date>2026-04-24T15:35:39Z</dc:date>
    </item>
    <item>
      <title>Strengthening Microsoft 365 and Copilot in Government Clouds with In-Product User Feedback</title>
      <link>https://techcommunity.microsoft.com/t5/public-sector-blog/strengthening-microsoft-365-and-copilot-in-government-clouds/ba-p/4510072</link>
      <description>&lt;P&gt;Delivering secure, reliable, mission-aligned productivity experiences in government clouds requires ongoing collaboration between Microsoft and the public sector organizations we serve. As organizations deploy Microsoft 365 apps and Copilot, tenant administrators need a way to understand how these experiences perform in real-world environments and pass that feedback on to Microsoft.&lt;/P&gt;
&lt;P&gt;In-Product Feedback enables IT leaders to capture end-user signals inside Microsoft 365 and Copilot while keeping controls aligned to their compliance posture. In GCC, GCC High, and DoD, In-Product Feedback helps IT leaders spot mission-impacting experience issues, capture environment-specific needs, and share actionable signals with Microsoft.&lt;/P&gt;
&lt;H2&gt;Feedback Options for Government Clouds&lt;/H2&gt;
&lt;P&gt;Tenant administrators can choose between two configurations. The table below summarizes the key differences to help you decide what is appropriate for your environment and governance model.&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Decision area&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Restricted Feedback&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;(Default)&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Verbatim Feedback&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;(Admin-Enabled)&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;What users can submit&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Thumbs up / thumbs down and optional Microsoft-defined categories. No written comments.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Thumbs up / thumbs down and optional written comments. Categories available where applicable.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Where feedback is collected&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Copilot experiences only.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Microsoft 365 and Copilot experiences.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Admin action required&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;None. Available by default.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Enable in Microsoft 365 feedback policy settings.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Operational use&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Identify broad experience trends across your organization(s).&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Identify and help understand mission-impacting usability or workflow opportunities.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Engineering influence&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Supports aggregate experience analysis.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Supports engineering understanding of environment-specific feature behavior.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Why choose it&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Low-friction signal at scale, with structured inputs aligned to tighter governance requirements.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Richer scenario context to help accelerate triage and improvement of specific product or feature challenges.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;H2&gt;Value for Tenant Admins and IT Leaders&lt;/H2&gt;
&lt;P&gt;In-Product Feedback provides:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Early visibility into user experience trends and mission-workflow issues&lt;/LI&gt;
&lt;LI&gt;A clear signal path to share environment-specific issues with Microsoft engineering&lt;/LI&gt;
&lt;LI&gt;Real-world input to guide Copilot rollout, adoption, and support&lt;/LI&gt;
&lt;LI&gt;Evidence to inform operating model, governance, and change-management decisions&lt;/LI&gt;
&lt;LI&gt;Data-driven input that helps prioritize future product improvements&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Choosing Restricted or Verbatim Feedback enables tenant admins to adjust the signal they receive and the data they share based on their governance, compliance, and support model.&lt;/P&gt;
&lt;H2&gt;How Microsoft Uses Feedback from Government Clouds&lt;/H2&gt;
&lt;P&gt;Feedback submitted by users in GCC, GCC High, and DOD environments is reviewed in aggregate to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Detect recurring user experience challenges in sovereign cloud deployments&lt;/LI&gt;
&lt;LI&gt;Prioritize quality improvements relevant to usage scenarios for these environments&lt;/LI&gt;
&lt;LI&gt;Refine feature behavior across Microsoft 365 and Copilot workloads&lt;/LI&gt;
&lt;LI&gt;Inform roadmap planning for GCC, GCC High and DOD environments&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Microsoft uses these aggregated insights to help improve product quality in sovereign cloud deployments — triaging recurring issues, validating feature behavior, and informing product decisions across Microsoft 365 and Copilot for GCC, GCC High, and DoD.&lt;/P&gt;
&lt;H2&gt;Get Started Today&lt;/H2&gt;
&lt;P&gt;Tenant administrators can either:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Enable Verbatim Feedback&lt;/STRONG&gt; in Microsoft 365 feedback policy settings to allow users to include optional written comments. Tenant administrators should consider this option when: richer scenario context is needed for Microsoft 365 and Copilot, piloting or deployed Microsoft 365 Copilot, investigating workflow-specific items, exploring deployment adjustments, or collaborating with Microsoft to explore and address capabilities or feature behavior.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Take no action&lt;/STRONG&gt; to keep Restricted Feedback available using sentiment-based responses (i.e., thumbs up/thumbs down).&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Choose the option that fits your governance model and together we can keep improving Microsoft 365 and Copilot.&lt;/P&gt;
&lt;P&gt;To learn more about managing feedback policies in Microsoft 365 visit the following resources:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/admin/manage/manage-feedback-ms-org?view=o365-worldwide#feedback-policies-in-united-states-government-environments" target="_blank" rel="noopener"&gt;Managing Microsoft Feedback&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://support.microsoft.com/en-us/topic/providing-feedback-about-microsoft-copilot-with-microsoft-365-apps-c481c26a-e01a-4be3-bdd0-aee0b0b2a423" target="_blank" rel="noopener"&gt;Providing Feedback about Microsoft Copilot&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/admin/misc/feedback-user-control?view=o365-worldwide" target="_blank" rel="noopener"&gt;Learn about Microsoft Feedback&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/copilot/microsoft-365/microsoft-365-copilot-privacy" target="_blank" rel="noopener"&gt;Data, Privacy, and Security for Microsoft 365 Copilot&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Mon, 13 Apr 2026 15:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/public-sector-blog/strengthening-microsoft-365-and-copilot-in-government-clouds/ba-p/4510072</guid>
      <dc:creator>jacobcamp</dc:creator>
      <dc:date>2026-04-13T15:00:00Z</dc:date>
    </item>
    <item>
      <title>From Fragmentation to Resilience: Why Next Gen “Whole of State” Is Future of Pub Sec Cybersecurity</title>
      <link>https://techcommunity.microsoft.com/t5/public-sector-blog/from-fragmentation-to-resilience-why-next-gen-whole-of-state-is/ba-p/4507434</link>
      <description>&lt;P&gt;Each year at the &lt;STRONG&gt;Billington State and Local Cybersecurity Summit&lt;/STRONG&gt;, one message comes through clearly: the cyber threat landscape facing state and local governments is accelerating faster than traditional models of defense can keep up.&lt;/P&gt;
&lt;P&gt;Cyber risk is no longer confined to a single agency, system, or jurisdiction. It spans emergency management, education, healthcare, critical infrastructure, and the workforce itself. At the same time, public sector leaders are being asked to modernize services, adopt AI responsibly, and do more with constrained resources.&lt;/P&gt;
&lt;P&gt;These pressures are not isolated—and neither can the response be.&lt;/P&gt;
&lt;P&gt;That is why Microsoft is focused on a &lt;STRONG&gt;Next Gen Whole of State&lt;/STRONG&gt; approach: a state-wide, coordinated model that brings together &lt;STRONG&gt;cyber defense, risk management, and workforce development&lt;/STRONG&gt; into a unified strategy—designed for scale, resilience, and trust.&lt;/P&gt;
&lt;H3&gt;Why “Whole of State” Matters Now&lt;/H3&gt;
&lt;P&gt;Many states have invested significantly in cybersecurity over the past decade. Yet most efforts remain &lt;STRONG&gt;fragmented&lt;/STRONG&gt;—with agencies operating independently, duplicating tools, and competing for scarce talent.&lt;/P&gt;
&lt;P&gt;Internal Microsoft analysis and field experience show that this model creates three persistent challenges:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Limited visibility across agencies and jurisdictions&lt;/LI&gt;
&lt;LI&gt;Inconsistent security posture and response capability&lt;/LI&gt;
&lt;LI&gt;Ongoing workforce shortages that slow modernization efforts&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;A &lt;STRONG&gt;Next Gen Whole of State&lt;/STRONG&gt; program is designed to address these challenges holistically. It is a &lt;STRONG&gt;state-wide shared services model&lt;/STRONG&gt; that improves efficiency, strengthens critical infrastructure defense, and accelerates AI and cyber talent development—while respecting the autonomy of individual agencies.&lt;/P&gt;
&lt;P&gt;This is not about centralizing control. It is about &lt;STRONG&gt;coordinating outcomes&lt;/STRONG&gt;.&lt;/P&gt;
&lt;H3&gt;Cybersecurity as Critical Infrastructure&lt;/H3&gt;
&lt;P&gt;At Billington, state and local leaders consistently emphasize that cybersecurity must be treated as &lt;STRONG&gt;critical infrastructure protection&lt;/STRONG&gt;, not simply an IT function.&lt;/P&gt;
&lt;P&gt;Next Gen Whole of State reflects that reality by enabling:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Shared cyber services&lt;/STRONG&gt; across agencies and local governments&lt;/LI&gt;
&lt;LI&gt;Proactive identification of vulnerabilities and “slow-burn” risks&lt;/LI&gt;
&lt;LI&gt;Streamlined collaboration during incident response and emergencies&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;By aligning technology platforms, processes, and partners, states can move toward a more &lt;STRONG&gt;collective defense posture&lt;/STRONG&gt;—reducing duplication while improving resilience across the entire ecosystem.&lt;/P&gt;
&lt;P&gt;This approach supports more consistent policy enforcement, better situational awareness, and more efficient use of limited funding—priorities that resonate strongly across the state and local community.&lt;/P&gt;
&lt;H3&gt;Workforce Development Is a Security Imperative&lt;/H3&gt;
&lt;P&gt;Another theme that consistently surfaces at Billington is the workforce challenge.&lt;/P&gt;
&lt;P&gt;Technology alone does not secure a state. &lt;STRONG&gt;People do.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Next Gen Whole of State explicitly integrates &lt;STRONG&gt;workforce and economic development&lt;/STRONG&gt; into the security strategy. Through hands-on skilling, apprenticeships, and industry-recognized certifications, states can help build sustainable pipelines of AI and cyber talent using real-world platforms and tools.&lt;/P&gt;
&lt;P&gt;This model supports:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Career-ready training aligned to actual state and local needs&lt;/LI&gt;
&lt;LI&gt;Opportunities for students, veterans, and career changers&lt;/LI&gt;
&lt;LI&gt;Long-term reduction in dependency on external resources&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;By investing locally, states strengthen both their security posture and their communities—an outcome public sector leaders increasingly view as inseparable.&lt;/P&gt;
&lt;H3&gt;Microsoft’s Role: Thought Leadership at Scale&lt;/H3&gt;
&lt;P&gt;Microsoft’s contribution to Next Gen Whole of State is grounded in three principles reflected across our public sector work:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Unified platforms&lt;/STRONG&gt; that span identity, security, compliance, and AI&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Cross-sector collaboration&lt;/STRONG&gt;, connecting government, education, and partners&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Responsible innovation&lt;/STRONG&gt;, aligned with Zero Trust and secure-by-design practices&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;This enables states to move beyond isolated pilots toward &lt;STRONG&gt;enduring, state-wide programs&lt;/STRONG&gt;—while positioning themselves to adapt as threats and technologies evolve.&lt;/P&gt;
&lt;P&gt;Importantly, Whole of State also creates a framework for consistent executive engagement, allowing leaders to align strategy, funding, and outcomes around a shared vision.&lt;/P&gt;
&lt;H3&gt;Looking Ahead&lt;/H3&gt;
&lt;P&gt;The conversations happening at Billington reflect a broader shift underway across the public sector.&lt;/P&gt;
&lt;P&gt;States that lead in the next decade will be those that:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Treat cybersecurity as a shared responsibility&lt;/LI&gt;
&lt;LI&gt;Align technology, policy, and workforce strategy&lt;/LI&gt;
&lt;LI&gt;Build trust through resilience, transparency, and scale&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Next Gen Whole of State is not a single product or program.&lt;BR /&gt;It is a &lt;STRONG&gt;strategic approach&lt;/STRONG&gt; to how states protect critical infrastructure, modernize services, and prepare their workforce for an AI-driven future.&lt;/P&gt;
&lt;P&gt;And it is increasingly clear that this approach is no longer optional—it is foundational.&lt;/P&gt;
&lt;H3&gt;Join the Conversation&lt;/H3&gt;
&lt;P&gt;Microsoft continues to work with state and local leaders, educators, and partners to advance &lt;STRONG&gt;Next Gen Whole of State&lt;/STRONG&gt; initiatives across the country.&lt;/P&gt;
&lt;P&gt;To learn more or engage with the Microsoft Security community, visit the &lt;STRONG&gt;Microsoft Tech Community&lt;/STRONG&gt; and continue the conversation.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Apr 2026 11:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/public-sector-blog/from-fragmentation-to-resilience-why-next-gen-whole-of-state-is/ba-p/4507434</guid>
      <dc:creator>CyberCorey</dc:creator>
      <dc:date>2026-04-06T11:00:00Z</dc:date>
    </item>
    <item>
      <title>Continuing our momentum: Expanding Microsoft 365 Copilot capabilities across U.S. Government clouds</title>
      <link>https://techcommunity.microsoft.com/t5/public-sector-blog/continuing-our-momentum-expanding-microsoft-365-copilot/ba-p/4506954</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In December&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/blog/publicsectorblog/microsoft-365-copilot-is-now-available-in-gcc-high/4473310" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;we announced the availability of Microsoft 365 Copilot for customers in GCC&lt;/SPAN&gt;&lt;/SPAN&gt;‑&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;High&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;—an important milestone in bringing work‑ready AI to organizations that meet the required security and compliance thresholds. Since then, we’ve continued to make steady progress expanding Copilot capabilities across GCC, GCC‑High, and DoD, building on earlier launches and deepening the value customers can access today.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;With the rollout of the&amp;nbsp;Analyst&amp;nbsp;and&amp;nbsp;Researcher&amp;nbsp;agents and&amp;nbsp;expanded agent creation&amp;nbsp;capabilities in U.S. Government clouds,&amp;nbsp;we’re&amp;nbsp;marking another step forward in our commitment to delivering Copilot experiences to public sector customers—deliberately, responsibly, and ready for use from day one.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Agentic experiences, built for U.S. Government clouds&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Agentic&amp;nbsp;capabilities&amp;nbsp;in&amp;nbsp;Copilot for&amp;nbsp;U.S. Government clouds now&amp;nbsp;include&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Researcher&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;and&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Analyst&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;,&amp;nbsp;along with&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Agent Builder&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;and&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Copilot Studio publishing&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;to&amp;nbsp;create and share&amp;nbsp;agents.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Researcher&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;(rolling out&amp;nbsp;now, starting with GCC)&amp;nbsp;supports&amp;nbsp;multi&lt;/SPAN&gt;‑&lt;SPAN data-contrast="auto"&gt;step&amp;nbsp;research by gathering and synthesizing information across work content to produce clearer, grounded drafts—within U.S. Government cloud security and compliance boundaries.&amp;nbsp;Learn&amp;nbsp;how to&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://support.microsoft.com/en-us/topic/get-started-with-researcher-in-microsoft-365-copilot-e63ab760-f3de-4c47-ae87-dad601b0e9c4" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;get started with&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Researcher&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;today.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Analyst&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;(now available in GCC, GCC-High, and DoD)&amp;nbsp;supports&amp;nbsp;data analysis by turning information into structured insights and visualizations&amp;nbsp;for&amp;nbsp;decisions and briefings,&amp;nbsp;including pattern detection and clear summaries of large volumes of information.&amp;nbsp;Learn&amp;nbsp;how to&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://support.microsoft.com/en-us/topic/get-started-with-analyst-in-microsoft-365-copilot-ff505b9c-a06c-4be9-b855-69d89b1d25d2" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;get started with&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&amp;nbsp;Analyst&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;today.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Agent Builder&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;(now available in GCC and GCC-High)&amp;nbsp;expands agent creation capabilities in U.S. Government clouds by enabling users to package instructions, prompts, and work knowledge into reusable agents that help ensure more consistent Copilot responses—grounded in the right organizational context and shareable across teams.&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/copilot/extensibility/agent-builder" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Learn more about Agent Builder&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Publishing&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Copilot Studio&amp;nbsp;Agents&amp;nbsp;to Teams and Microsoft 365&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;(now available in GCC)&amp;nbsp;extends agentic experiences to the tools users rely on every day. By enabling agencies to make vetted, purpose-built agents available directly in familiar Microsoft 365 surfaces, this capability helps scale consistent, role-relevant guidance and workflows—while keeping usage within the same security and compliance boundaries of U.S. Government clouds. Learn how to&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-copilot-studio/publication-add-bot-to-microsoft-teams" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;connect and configure an agent for Teams and Microsoft 365&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;What&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;else is&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;new&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;this&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;quarter&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Many&amp;nbsp;core Microsoft 365 Copilot capabilities have&amp;nbsp;also&amp;nbsp;been enhanced&amp;nbsp;in&amp;nbsp;U.S. Government clouds&amp;nbsp;in recent months, including:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="•" data-font="Calibri" data-listid="7" data-list-defn-props="{&amp;quot;335551671&amp;quot;:0,&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Calibri&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;•&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="0" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Updated&amp;nbsp;OpenAI models&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;(GCC, GCC-High, DoD): Microsoft 365 Copilot for U.S. Government&amp;nbsp;now leverages&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;GPT 5.1 for&amp;nbsp;Copilot Chat, GPT-5 for reasoning, and GPT-4o for image generation,&amp;nbsp;supporting more&amp;nbsp;accurate&amp;nbsp;and contextual responses.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="•" data-font="Calibri" data-listid="7" data-list-defn-props="{&amp;quot;335551671&amp;quot;:0,&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Calibri&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;•&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft 365 Copilot app&amp;nbsp;enhancements&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://support.microsoft.com/en-us/topic/get-started-with-search-in-the-microsoft-365-copilot-app-acc4d31f-496e-4f9d-ade0-67bae32d14ba" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Copilot Search&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;(GCC, GCC-High, DoD)&amp;nbsp;helps users find relevant info across work content; the&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://support.microsoft.com/en-us/topic/get-started-with-create-in-microsoft-365-copilot-6e0c616d-69fb-42f2-a4cb-c59e006ec4f5" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Create&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;module&amp;nbsp;(GCC, GCC-High)&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;helps draft and refine images and other content. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="•" data-font="Calibri" data-listid="7" data-list-defn-props="{&amp;quot;335551671&amp;quot;:0,&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Calibri&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;•&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Copilot Chat&amp;nbsp;improvements&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;(GCC, GCC-High, DoD), including&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;enhanced language understanding for clearer, more&amp;nbsp;accurate&amp;nbsp;responses; Code Interpreter for in-chat data analysis and complex problem solving; and image upload with OCR&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;to extract text for summaries, interpretation, and next steps.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="•" data-font="Calibri" data-listid="7" data-list-defn-props="{&amp;quot;335551671&amp;quot;:0,&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Calibri&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;•&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Microsoft 365 Copilot Connectors&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;(GCC, GCC-High)&amp;nbsp;expand&amp;nbsp;access to relevant third-party and line-of-business data sources to ground Copilot experiences in more of your organization’s knowledge.&amp;nbsp;Learn more about&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/copilot/extensibility/overview-copilot-connector" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft 365 Copilot Connectors&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="•" data-font="Calibri" data-listid="7" data-list-defn-props="{&amp;quot;335551671&amp;quot;:0,&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Calibri&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;•&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;In-product user feedback&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;(GCC, GCC-High, DoD). U.S. Government users can now submit &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/microsoft-365/admin/manage/manage-feedback-ms-org?view=o365-worldwide#feedback-policies-in-united-states-government-environments" target="_blank" rel="noopener"&gt;in-product feedback&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;directly&amp;nbsp;within&amp;nbsp;Microsoft 365 and Copilot&amp;nbsp;to help&amp;nbsp;improve&amp;nbsp;product&amp;nbsp;experiences&amp;nbsp;for mission work.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;All these capabilities – agentic and otherwise – are built to support applicable regulatory and compliance requirements &lt;STRONG&gt;out of the box&lt;/STRONG&gt;. U.S. Government compliance needs—including data residency, operational isolation, and restricted personnel access—are carefully considered prior to release, reducing the need for administrators to retrofit controls, disable features, or manage separate compliance workflows.&lt;/P&gt;
&lt;H2 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Moving forward&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Delivering Copilot to U.S. Government clouds is a journey, not a single moment. Each new capability reflects a careful, staged approach to availability—helping to ensure features are compliant by design and usable as-is by government organizations.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;For guidance on&amp;nbsp;leveraging&amp;nbsp;Microsoft 365 Copilot effectively,&amp;nbsp;visit&amp;nbsp;the&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://adoption.microsoft.com/en-us/copilot/us-government/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft 365 Copilot for US Government Adoption site&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;. Admins can also review&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/admin/manage/manage-copilot-agents-integrated-apps?view=o365-worldwide" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;how to manage Copilot agents in the Microsoft 365 Admin Center&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;to help&amp;nbsp;make the most of&amp;nbsp;new agentic capabilities as they roll out.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We’ll&amp;nbsp;continue to share updates as&amp;nbsp;additional&amp;nbsp;Microsoft 365 Copilot features&amp;nbsp;continue to roll out&amp;nbsp;across GCC,&amp;nbsp;GCC&lt;/SPAN&gt;‑&lt;SPAN data-contrast="auto"&gt;High, and DoD.&amp;nbsp;Thank you to our government customers and partners for your continued engagement and feedback.&amp;nbsp;Your input helps shape how we responsibly bring AI to&amp;nbsp;mission critical&amp;nbsp;work.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2026 16:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/public-sector-blog/continuing-our-momentum-expanding-microsoft-365-copilot/ba-p/4506954</guid>
      <dc:creator>elisabeth_jones</dc:creator>
      <dc:date>2026-04-02T16:00:00Z</dc:date>
    </item>
    <item>
      <title>Microsoft 365 Copilot Prompt a thon for Government is Coming to Ft. Lauderdale</title>
      <link>https://techcommunity.microsoft.com/t5/public-sector-blog/microsoft-365-copilot-prompt-a-thon-for-government-is-coming-to/ba-p/4504215</link>
      <description>&lt;P&gt;On &lt;STRONG&gt;April 16&lt;/STRONG&gt;, Microsoft is bringing the &lt;STRONG&gt;Microsoft 365 Copilot Prompt‑a‑thon – Government Roadshow&lt;/STRONG&gt; to &lt;STRONG&gt;Ft. Lauderdale, Florida&lt;/STRONG&gt;, inviting &lt;STRONG&gt;all Government &lt;/STRONG&gt;customers to experience Copilot in action through a hands‑on, in‑person session.&lt;/P&gt;
&lt;P&gt;This government‑focused Prompt‑a‑thon is designed to help public sector organizations move beyond AI awareness and into practical, responsible use of Microsoft 365 Copilot. Attendees will learn how to apply effective prompting techniques to real‑world scenarios that reflect how government and education teams work every day.&lt;/P&gt;
&lt;H3&gt;What You’ll Experience&lt;/H3&gt;
&lt;P&gt;Participants will:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Practice using Microsoft 365 Copilot through guided, hands‑on exercises&lt;/LI&gt;
&lt;LI&gt;Learn practical prompting techniques tailored to government and education workflows&lt;/LI&gt;
&lt;LI&gt;Explore real scenarios relevant to policy, operations, communications, and IT teams&lt;/LI&gt;
&lt;LI&gt;Leave with skills and examples they can immediately apply and share&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This is an interactive working session—not a lecture—focused on learning by doing.&lt;/P&gt;
&lt;H3&gt;Who Should Attend&lt;/H3&gt;
&lt;P&gt;This event is designed for:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Federal End Users&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;State and Local Government professionals&lt;/LI&gt;
&lt;LI&gt;Education sector customers&lt;/LI&gt;
&lt;LI&gt;Commercial users&lt;/LI&gt;
&lt;LI&gt;IT, program, policy, communications, and innovation leaders&lt;/LI&gt;
&lt;LI&gt;Teams beginning or expanding their Copilot adoption journey&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Whether you’re exploring Copilot for the first time or looking to drive broader adoption, this session is built to meet public sector needs.&lt;/P&gt;
&lt;H3&gt;Join Us in Florida&lt;/H3&gt;
&lt;P&gt;Attending in person provides the opportunity to learn alongside peers, ask questions in real time, and engage directly with Microsoft experts who support government and education customers.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Register &lt;A href="https://cloudevents.microsoft.com/en/event/microsoft_365_copilot_prompt-a-thon_government_roadshow_fortlauderdale_16thApril" target="_blank"&gt;HERE&lt;/A&gt;&lt;/STRONG&gt;&lt;/H4&gt;</description>
      <pubDate>Fri, 20 Mar 2026 17:37:18 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/public-sector-blog/microsoft-365-copilot-prompt-a-thon-for-government-is-coming-to/ba-p/4504215</guid>
      <dc:creator>Abby_Quinn</dc:creator>
      <dc:date>2026-03-20T17:37:18Z</dc:date>
    </item>
    <item>
      <title>Built on Trust: Microsoft’s Commitment to FedRAMP High and Federal Cloud Security</title>
      <link>https://techcommunity.microsoft.com/t5/public-sector-blog/built-on-trust-microsoft-s-commitment-to-fedramp-high-and/ba-p/4500465</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft builds cloud services for the U.S. government with one foundational principle: trust. For federal agencies, that trust is anchored in FedRAMP—a rigorous, government-led framework designed to ensure cloud services meet the highest security standards.&amp;nbsp;The FedRAMP process plays a critical role in protecting government missions. It is a process Microsoft takes seriously, and we invest significant resources in building products that&amp;nbsp;meet FedRAMP requirements and&amp;nbsp;are secure-by-design and secure-by-default.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We unequivocally stand by&amp;nbsp;all of&amp;nbsp;our products and services for the U.S.&amp;nbsp;government,&amp;nbsp;as well as our FedRAMP authorizations and adherence to the FedRAMP process.&amp;nbsp;While we recognize that conversations about security and compliance are both important and essential,&amp;nbsp;recent flawed reporting&amp;nbsp;seeks to undermine confidence in&amp;nbsp;the U.S. government’s FedRAMP process&amp;nbsp;and our Office 365&amp;nbsp;products.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To be clear, Office 365 GCC High is a fully authorized service at FedRAMP High following a comprehensive and exhaustive technical review by authorizing agencies, accredited third-party assessors, and the FedRAMP Program Management Office (PMO). Additionally, the service is continuously monitored, annually audited, and supported by one of the industry’s largest and most extensive security and compliance teams.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Why FedRAMP&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;High&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Authorization Matters&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:261,&amp;quot;335559739&amp;quot;:261,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;FedRAMP High represents rigorous cybersecurity authorization framework. Its mandate is designed to validate that cloud services meet consistently high security standards. Authorization is grounded in independent verification by an accredited third‑party assessment organization (3PAO), which conducts a comprehensive evaluation of a provider’s security controls. Final risk acceptance rests with federal agency Authorizing Officials, supported by oversight from the FedRAMP PMO, which enforces standardized requirements and review processes across agencies.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Critically, FedRAMP authorization is not a one‑time certification, but an ongoing compliance posture. Cloud service providers must&amp;nbsp;maintain&amp;nbsp;continuous monitoring, including regular reporting, vulnerability management, incident response activities,&amp;nbsp;and&amp;nbsp;demonstrate&amp;nbsp;sustained adherence to FedRAMP High requirements over time. This&amp;nbsp;continuous&amp;nbsp;oversight model reflects the reality that security risk evolves.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;O&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;ff&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;ice &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;365&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;GCC High Authorization P&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;rocess&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:261,&amp;quot;335559739&amp;quot;:261,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The authorization of&amp;nbsp;Microsoft’s&amp;nbsp;Office 365 GCC High followed a multi‑year review process involving the Department of Justice, accredited 3PAOs, and sustained oversight by the FedRAMP PMO. Over the course of&amp;nbsp;these&amp;nbsp;reviews,&amp;nbsp;additional&amp;nbsp;assessments and validation activities&amp;nbsp;were&amp;nbsp;conducted as requirements evolved. This process culminated in&amp;nbsp;the Fall 2024, with the FedRAMP&amp;nbsp;PMO’s&amp;nbsp;final&amp;nbsp;assessment&amp;nbsp;that&amp;nbsp;resulted in FedRAMP authorization, reflecting a comprehensive evaluation against FedRAMP High security standards.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;That authorization signifies satisfaction of applicable security requirements based on documented evidence and risk acceptance by the&amp;nbsp;appropriate authorizing&amp;nbsp;officials.&amp;nbsp;As is standard practice for FedRAMP authorizations and consistent with continuous risk management principles, the authorization included Plans of Actions and Milestones (POA&amp;amp;M) to address residual items under ongoing oversight. This approach aligns with FedRAMP’s established model, in which authorization&amp;nbsp;represents&amp;nbsp;a sustained compliance posture supported by continuous monitoring, rather than a static or one‑time determination.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Throughout the authorization process, Microsoft provided extensive technical artifacts, clarifications, and updated documentation in response to detailed review by accredited 3PAOs and the FedRAMP PMO. These materials were&amp;nbsp;submitted&amp;nbsp;as a comprehensive package&amp;nbsp;that&amp;nbsp;reflected&amp;nbsp;the depth and complexity of assessing a hyperscale cloud environment. Microsoft’s complete security authorization package is made available to agency Chief Information Officers through the FedRAMP PMO, enabling independent government review and informed risk decisions.&amp;nbsp;Iterative exchanges with the PMO and 3PAOs are a normal and expected feature of rigorous FedRAMP High assessments, particularly for large, evolving cloud services.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This effort culminated in Office 365 GCC High being fully authorized at FedRAMP High.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;FedRAMP 20x&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Under new leadership, the FedRAMP PMO took steps to modernize the FedRAMP process and reduce a backlog of accreditations, while still ensuring the same level of rigorous review and oversight.&amp;nbsp;&amp;nbsp;The FedRAMP reform effort launched in March 2025—often referred to as “FedRAMP 20x”—builds on input from agencies, Congress, and cloud service providers to improve clarity, accountability, and efficiency while preserving rigorous security standards.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We appreciate the Administration’s progress under FedRAMP 20x and welcome continued modernization and transparency in the program. We remain committed to working constructively with government partners to support a FedRAMP program that is both rigorous and responsive, and that continues to earn the trust of agencies, policymakers, and the public.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We stand behind the security of our cloud service offerings, especially those with FedRAMP High authorization.&amp;nbsp;&amp;nbsp;Federal customers can continue to rely on Microsoft’s service with high confidence to support mission‑critical operations. As always, we remain committed to transparency, rigorous compliance, and delivering national‑security‑grade cloud services for the U.S. Government.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&lt;SPAN data-teams="true"&gt;&lt;EM&gt;Paul Lorimer, Corporate Vice President, Office 365 Enterprise and Cloud Engineering&lt;/EM&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2026 14:54:44 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/public-sector-blog/built-on-trust-microsoft-s-commitment-to-fedramp-high-and/ba-p/4500465</guid>
      <dc:creator>PaulLorimer</dc:creator>
      <dc:date>2026-03-19T14:54:44Z</dc:date>
    </item>
    <item>
      <title>Unlock the Power of M365 Copilot: Government Prompt-a-thon Comes to Charlotte, NC</title>
      <link>https://techcommunity.microsoft.com/t5/public-sector-blog/unlock-the-power-of-m365-copilot-government-prompt-a-thon-comes/ba-p/4503133</link>
      <description>&lt;P&gt;Government agencies are under growing pressure to do more with less—modernize operations, increase productivity, and deliver better services to citizens, all while maintaining trust, security, and compliance. On &lt;STRONG&gt;April 8 in Charlotte, North Carolina&lt;/STRONG&gt;, government professionals will have the opportunity to experience how &lt;STRONG&gt;M365 Copilot&lt;/STRONG&gt; can help meet those challenges head‑on.&lt;/P&gt;
&lt;P&gt;The &lt;STRONG&gt;M365 Copilot Prompt‑a‑thon – Government Roadshow&lt;/STRONG&gt; is coming to Charlotte, bringing together public sector leaders, IT professionals, and mission owners for an immersive, hands‑on experience focused on real‑world M365 Copilot use cases for government.&lt;/P&gt;
&lt;P&gt;This is not a keynote-only event. It’s a working session designed to help you &lt;EM&gt;actually use&lt;/EM&gt; M365 Copilot—confidently, responsibly, and effectively.&lt;/P&gt;
&lt;H3&gt;What Is a M365 Copilot Prompt‑a‑thon?&lt;/H3&gt;
&lt;P&gt;A Prompt‑a‑thon is a highly interactive learning experience where attendees go beyond “what M365 Copilot is” and focus on &lt;STRONG&gt;how to use it well&lt;/STRONG&gt;. Participants learn how to ask better questions, structure effective prompts, and apply M365 Copilot to everyday government workflows.&lt;/P&gt;
&lt;P&gt;Rather than abstract examples, the Prompt‑a‑thon centers on &lt;STRONG&gt;practical, job‑relevant scenarios&lt;/STRONG&gt;—the kinds of tasks government employees handle every day, such as:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Drafting and refining documents and guidance&lt;/LI&gt;
&lt;LI&gt;Summarizing long or complex information&lt;/LI&gt;
&lt;LI&gt;Preparing for meetings or briefings&lt;/LI&gt;
&lt;LI&gt;Turning notes and ideas into clear, actionable content&lt;/LI&gt;
&lt;LI&gt;Finding insights across existing work artifacts&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Attendees leave with prompt patterns, techniques, and confidence they can immediately bring back to their teams.&lt;/P&gt;
&lt;H3&gt;Why This Event Matters for Government&lt;/H3&gt;
&lt;P&gt;M365 Copilot is already transforming how organizations work—but government adoption requires thoughtful implementation. This event is intentionally designed for &lt;STRONG&gt;public sector realities&lt;/STRONG&gt;, including:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Security and compliance considerations&lt;/LI&gt;
&lt;LI&gt;Responsible AI usage&lt;/LI&gt;
&lt;LI&gt;Change management and adoption challenges&lt;/LI&gt;
&lt;LI&gt;Supporting diverse roles across IT, operations, policy, and mission teams&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The Charlotte Prompt‑a‑thon focuses on helping government organizations move from &lt;STRONG&gt;curiosity to capability&lt;/STRONG&gt;—bridging the gap between AI potential and everyday impact.&lt;/P&gt;
&lt;H3&gt;What You’ll Gain From Attending&lt;/H3&gt;
&lt;P&gt;By attending the Charlotte Prompt‑a‑thon, participants can expect to:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Learn by Doing&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This is a hands‑on experience. You’ll actively work with M365 Copilot and practice prompt techniques you can reuse long after the event ends.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;See Real Government Use Cases&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Explore scenarios grounded in how government teams actually work—not generic demos.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Build Confidence With M365 Copilot&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Understand how to engage M365 Copilot thoughtfully and responsibly, increasing trust and adoption within your organization.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Take Home Practical Assets&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Walk away with prompt ideas, workflows, and approaches you can immediately apply and share with colleagues.&lt;/P&gt;
&lt;H3&gt;Who Should Attend?&lt;/H3&gt;
&lt;P&gt;This event is ideal for a broad range of government roles, including:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Program and mission leaders&lt;/LI&gt;
&lt;LI&gt;Policy and communications teams&lt;/LI&gt;
&lt;LI&gt;IT and security professionals&lt;/LI&gt;
&lt;LI&gt;Transformation and innovation leads&lt;/LI&gt;
&lt;LI&gt;Knowledge workers looking to improve daily productivity&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Whether you are just beginning your M365 Copilot journey or looking to deepen usage across your organization, the Prompt‑a‑thon offers value at every stage.&lt;/P&gt;
&lt;H3&gt;Why Attend In Person in Charlotte?&lt;/H3&gt;
&lt;P&gt;The in‑person format allows for deeper engagement, peer learning, and real-time coaching. You’ll have the opportunity to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Ask questions and experiment live&lt;/LI&gt;
&lt;LI&gt;Learn alongside peers facing similar challenges&lt;/LI&gt;
&lt;LI&gt;Gain insights from Microsoft experts who work closely with government customers&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The result is a more meaningful, memorable learning experience—one that accelerates understanding and adoption.&lt;/P&gt;
&lt;H3&gt;Reserve Your Spot&lt;/H3&gt;
&lt;P&gt;Seats are limited, and interest in M365 Copilot across government continues to grow. If you’re ready to move beyond AI curiosity and start applying M365 Copilot in practical, responsible ways, this event is for you.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://cloudevents.microsoft.com/en/event/microsoft_365_copilot_prompt-a-thon_government_roadshow_charlotte_8thApril" target="_blank" rel="noopener"&gt;Register Here&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Mar 2026 22:45:30 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/public-sector-blog/unlock-the-power-of-m365-copilot-government-prompt-a-thon-comes/ba-p/4503133</guid>
      <dc:creator>Abby_Quinn</dc:creator>
      <dc:date>2026-03-17T22:45:30Z</dc:date>
    </item>
    <item>
      <title>Microsoft 365 Copilot Prompt-a-thon for Government Comes to Boston</title>
      <link>https://techcommunity.microsoft.com/t5/public-sector-blog/microsoft-365-copilot-prompt-a-thon-for-government-comes-to/ba-p/4503130</link>
      <description>&lt;P&gt;On &lt;STRONG&gt;April 8&lt;/STRONG&gt;, Microsoft is bringing the &lt;STRONG&gt;Microsoft 365 Copilot Prompt‑a‑thon – Government Roadshow&lt;/STRONG&gt; to &lt;STRONG&gt;Boston, MA&lt;/STRONG&gt;, inviting &lt;STRONG&gt;State and Local Government&lt;/STRONG&gt; and &lt;STRONG&gt;Education&lt;/STRONG&gt; customers to experience Copilot in action through a hands‑on, in‑person session.&lt;/P&gt;
&lt;P&gt;This government‑focused Prompt‑a‑thon is designed to help public sector organizations move beyond AI awareness and into practical, responsible use of Microsoft 365 Copilot. Attendees will learn how to apply effective prompting techniques to real‑world scenarios that reflect how government and education teams work every day.&lt;/P&gt;
&lt;H3&gt;What You’ll Experience&lt;/H3&gt;
&lt;P&gt;Participants will:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Practice using Microsoft 365 Copilot through guided, hands‑on exercises&lt;/LI&gt;
&lt;LI&gt;Learn practical prompting techniques tailored to government and education workflows&lt;/LI&gt;
&lt;LI&gt;Explore real scenarios relevant to policy, operations, communications, and IT teams&lt;/LI&gt;
&lt;LI&gt;Leave with skills and examples they can immediately apply and share&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This is an interactive working session—not a lecture—focused on learning by doing.&lt;/P&gt;
&lt;H3&gt;Who Should Attend&lt;/H3&gt;
&lt;P&gt;This event is designed for:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;State and Local Government professionals&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Federal End Users&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Education sector customers&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;IT, program, policy, communications, and innovation leaders&lt;/LI&gt;
&lt;LI&gt;Teams beginning or expanding their Copilot adoption journey&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Whether you’re exploring Copilot for the first time or looking to drive broader adoption, this session is built to meet public sector needs.&lt;/P&gt;
&lt;H3&gt;Join Us in Boston&lt;/H3&gt;
&lt;P&gt;Attending in person provides the opportunity to learn alongside peers, ask questions in real time, and engage directly with Microsoft experts who support government and education customers.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Interested in joining? Reach out to Jay Leask at &lt;/STRONG&gt;&lt;A href="mailto:jay.leask@microsoft.com" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;jay.leask@microsoft.com&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt; or Abby Quinn at &lt;/STRONG&gt;&lt;A href="mailto:abby.quinn@microsoft.com" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;abby.quinn@microsoft.com&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt;. &lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Mar 2026 22:45:24 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/public-sector-blog/microsoft-365-copilot-prompt-a-thon-for-government-comes-to/ba-p/4503130</guid>
      <dc:creator>Abby_Quinn</dc:creator>
      <dc:date>2026-03-17T22:45:24Z</dc:date>
    </item>
    <item>
      <title>Don't Miss the Agent-a-thon Coming to Arlington, Virginia April 22!</title>
      <link>https://techcommunity.microsoft.com/t5/public-sector-blog/don-t-miss-the-agent-a-thon-coming-to-arlington-virginia-april/ba-p/4503079</link>
      <description>&lt;H3&gt;Don’t Just Hear About AI at Work — Experience It&lt;/H3&gt;
&lt;H4&gt;Register now for the upcoming Microsoft 365 Copilot Agent-a-thon in Arlington, Virginia&lt;/H4&gt;
&lt;P&gt;AI isn’t “coming someday.” It’s already reshaping how teams write, analyze, collaborate, and deliver outcomes—especially in environments where time, accuracy, and accountability matter.&lt;/P&gt;
&lt;P&gt;That’s why this upcoming &lt;STRONG&gt;Agent-a-thon&lt;/STRONG&gt; is the one you’ll want on your calendar.&lt;/P&gt;
&lt;P&gt;This is your chance to move beyond the hype and get clear, practical insight into how Copilot can help teams work smarter inside the M365 Copilot tools they already use—while keeping governance, security, and responsible use at the center of the conversation.&lt;/P&gt;
&lt;H4&gt;Why this event matters (and why now)&lt;/H4&gt;
&lt;P&gt;If your organization is asking any of these questions, you belong in this session:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;“Where do we start with agents—without overwhelming users?”&lt;/LI&gt;
&lt;LI&gt;“How do we turn early excitement into real adoption?”&lt;/LI&gt;
&lt;LI&gt;“What use cases actually translate into time saved and better outcomes?”&lt;/LI&gt;
&lt;LI&gt;“How do we maintain trust, controls, and compliance while scaling AI?”&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This event is designed to help you walk away with &lt;STRONG&gt;clarity&lt;/STRONG&gt; and &lt;STRONG&gt;momentum&lt;/STRONG&gt;—not just inspiration.&lt;/P&gt;
&lt;H4&gt;What you can expect&lt;/H4&gt;
&lt;P&gt;You’ll explore how M365 Copilot Agents can support real work across everyday tools and workflows—think: turning information overload into summaries, accelerating drafting and revision, helping teams prepare, communicate, and decision faster, and improving consistency in outputs.&lt;/P&gt;
&lt;P&gt;Just as important: you’ll get language and framing you can take back to your stakeholders—leadership, IT, security, and end users—to help align on &lt;STRONG&gt;responsible adoption&lt;/STRONG&gt; and &lt;STRONG&gt;high‑value scenarios&lt;/STRONG&gt;.&lt;/P&gt;
&lt;H4&gt;Who should attend&lt;/H4&gt;
&lt;P&gt;Bring your &lt;STRONG&gt;builders, your decision-makers, and end users&lt;/STRONG&gt;—this is valuable whether you’re:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Leading productivity or modernization efforts&lt;/LI&gt;
&lt;LI&gt;Supporting end users and change management&lt;/LI&gt;
&lt;LI&gt;Shaping AI governance, security, or compliance&lt;/LI&gt;
&lt;LI&gt;Driving outcomes for a mission, program, or service line&lt;/LI&gt;
&lt;LI&gt;Looking to scale practical “Copilot-first” ways of working&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If you’re trying to operationalize AI (not just discuss it), this is for you.&lt;/P&gt;
&lt;H4&gt;The biggest takeaway: confidence&lt;/H4&gt;
&lt;P&gt;The best events don’t just inform—they &lt;STRONG&gt;activate&lt;/STRONG&gt;. This one is built to help you leave with:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Stronger understanding of &lt;STRONG&gt;where Copilot fits&lt;/STRONG&gt; in daily work&lt;/LI&gt;
&lt;LI&gt;Clearer ideas for &lt;STRONG&gt;repeatable, high-impact use cases&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Better readiness to talk about &lt;STRONG&gt;adoption and change&lt;/STRONG&gt; in a structured way&lt;/LI&gt;
&lt;LI&gt;A practical next step: &lt;STRONG&gt;what to do Monday morning after the event&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;Seats fill. Momentum matters. Register now.&lt;/H4&gt;
&lt;P&gt;If you’ve been waiting for the “right moment” to lean into M365 Copilot, this is it.&lt;/P&gt;
&lt;P&gt;✅ &lt;STRONG&gt;Save your spot here:&lt;/STRONG&gt; &lt;A href="https://msevents.microsoft.com/event?id=1331659306" target="_blank"&gt;Agent-a-thon Registration&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;And if you know someone who keeps saying, “I want to see what Copilot can really do,” forward this and bring them with you.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Mar 2026 20:08:58 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/public-sector-blog/don-t-miss-the-agent-a-thon-coming-to-arlington-virginia-april/ba-p/4503079</guid>
      <dc:creator>Abby_Quinn</dc:creator>
      <dc:date>2026-03-17T20:08:58Z</dc:date>
    </item>
    <item>
      <title>ITAR Compliance in the Microsoft Cloud: Navigating GCC, Azure Commercial, and Azure Government</title>
      <link>https://techcommunity.microsoft.com/t5/public-sector-blog/itar-compliance-in-the-microsoft-cloud-navigating-gcc-azure/ba-p/4501314</link>
      <description>&lt;H3&gt;Why ITAR Compliance Matters in the Cloud&lt;/H3&gt;
&lt;P&gt;The International Traffic in Arms Regulations (ITAR) govern the export, temporary import, reexport, and transfer of defense articles, services, and related technical data directly related to defense articles listed on the United States Munitions List (USML) as well as furnishing defense services. Administered by the United States’ Department of State's Directorate of Defense Trade Controls (DDTC), the ITAR imposes strict requirements on manufacturers, exporters, and brokers of defense-related items - and those requirements extend to how and where ITAR-controlled data is stored, processed, and accessed in the cloud.&lt;/P&gt;
&lt;P&gt;For federal agencies, Defense Industrial Base (DIB) organizations, and government contractors, choosing the right Microsoft cloud environment is not just a technical decision - &amp;nbsp;it is a compliance imperative. Getting it wrong can result in civil penalties, criminal prosecution, loss of export privileges, and the erosion of trust with federal partners. It can even cause the government to bar companies from federal contracts.&lt;/P&gt;
&lt;P&gt;This guide walks through how ITAR compliance maps to our cloud offerings - specifically Microsoft 365 GCC, Azure Commercial, and Azure Government - drawing exclusively from official Microsoft documentation to help you make informed decisions about where your ITAR-controlled workloads belong.&lt;/P&gt;
&lt;H3&gt;Understanding ITAR: Core Requirements&lt;/H3&gt;
&lt;P&gt;Before evaluating cloud environments, it is essential to understand what the ITAR requires:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Registration with DDTC:&lt;/STRONG&gt; Organizations that manufacture, export, or broker defense articles must register with the Directorate of Defense Trade Controls.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Access Restricted to US Persons:&lt;/STRONG&gt; ITAR-controlled technical data may only be accessed by US persons unless specific DDTC authorization has been granted.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Prohibition on Unauthorized Export&lt;/STRONG&gt;&lt;STRONG&gt;:&lt;/STRONG&gt; ITAR-controlled technical data may not be exported - included by making it available to foreign person – without authorization from the DDTC. As described in additional detail below, the ITAR does not impose an affirmative requirement that data be stored within the Continental United States (CONUS). However, storing data within CONUS and restricting access to U.S. persons is a widely adopted mitigation strategy. &lt;STRONG&gt;End-to-End Encryption:&lt;/STRONG&gt; The revised ITAR rules, effective March 25, 2020, introduced a carve-out stating that sending, taking, or storing unclassified technical data does not constitute an export if the data is secured using end-to-end encryption with FIPS 140 compliant cryptographic modules, the means of decryption are not provided to any person other than the intended recipient, and the data &amp;nbsp;is not intentionally sent to or stored in a proscribed country listed under 22 CFR § 126.1. Additionally, there are specific requirements for protecting and sharing access information for ITAR data to qualify for the carve-out.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Think of ITAR requirements as a vault within a vault. It is not enough that the building is secure — the room, the safe, and the access list all have to meet the standard independently.&lt;/P&gt;
&lt;H3&gt;There Is No ITAR Certification&lt;/H3&gt;
&lt;P&gt;A critical point that often creates confusion: &lt;STRONG&gt;there is no ITAR compliance certification for cloud service providers.&lt;/STRONG&gt; We design and operate our in-scope services to be capable of supporting your ITAR obligations and compliance program, but there is no formal ITAR certification to obtain. This means that ITAR compliance is ultimately the responsibility of the data owner — we provide the capable platform, and you are responsible for the protection, architecture, and access controls within your environment.&lt;/P&gt;
&lt;P&gt;Reference: &lt;A href="https://learn.microsoft.com/en-us/azure/compliance/offerings/offering-itar" target="_blank" rel="noopener"&gt;International Traffic in Arms Regulations (ITAR) - Azure Compliance | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;H3&gt;Microsoft Cloud Environments: Where Does ITAR Fit?&lt;/H3&gt;
&lt;img /&gt;
&lt;H4&gt;Microsoft 365 GCC&lt;/H4&gt;
&lt;P&gt;Microsoft 365 Government Community Cloud (GCC) is designed for US federal, state, local, and tribal government entities, along with contractors holding or processing data on behalf of the US Government. GCC provides compliance with FedRAMP High, DFARS, and requirements for criminal justice and federal tax information systems.&lt;/P&gt;
&lt;P&gt;However, GCC does not natively support ITAR or EAR-controlled data. While GCC stores data within the United States and restricts access to screened personnel, it runs on Microsoft Entra ID Commercial. Support staff may include non-US persons, and we will only agree to ITAR contract language for the GCC High environment - not standard GCC.&lt;/P&gt;
&lt;H4&gt;Can Compensating Controls Make GCC Viable for ITAR? A Risk-Based Decision&lt;/H4&gt;
&lt;P&gt;&lt;EM&gt;We recognize that not every organization is positioned to leverage to GCC High&lt;/EM&gt; - whether due to budget constraints, licensing timelines, or operational complexity. For organizations evaluating GCC, it is worth understanding the compensating controls available, the case they enable, and efforts need to reduce risk within their organization.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The core argument for GCC viability rests on four points:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Data never leaves the United States.&lt;/STRONG&gt; GCC stores all customer data within US boundaries. Unlike Azure Commercial, where data residency depends on customer configuration, GCC's CONUS data residency is part of the environment boundary itself.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;No unauthorized human access.&lt;/STRONG&gt; When CMK and Customer Lockbox are implemented together, they eliminate the risk of unauthorized human access to ITAR-controlled data — regardless of the background check status of any individual. CMK ensures that we and our agents cannot decrypt your data without keys your organization controls. Customer Lockbox ensures that in rare instances where our support engineers need elevated access, you explicitly approve or reject every request.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Automated processing stays within the GCC boundary in CONUS.&lt;/STRONG&gt; Automated service operations that process your data remain within the GCC environment and do not leave the United States.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Therefore, no export occurs.&lt;/STRONG&gt; If the data never leaves the US, no&amp;nbsp; Microsoft employee can access it in decrypted form without explicit customer approval, and all processing remains within CONUS - the conditions that would constitute an export under ITAR are not met.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;Customer Managed Keys (CMK):&lt;/STRONG&gt; GCC supports customer-managed encryption keys through Azure Key Vault. With CMK, your organization retains exclusive control of the encryption keys that protect your data at rest. Because Azure Key Vault is designed so that we and our agents cannot see or extract your cryptographic keys, CMK is a critical component of meeting &amp;nbsp;the ITAR end-to-end encryption carve-out requirement that the means of decryption are not provided to any third party. This is the critical control - even if a non-US person were to encounter the encrypted data, nothing is revealed because they cannot decrypt it without your keys.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Customer Lockbox:&lt;/STRONG&gt; Customer Lockbox for Microsoft 365 provides an explicit access governance gate. In rare instances where our support engineers need elevated access to your data to resolve a service request, Customer Lockbox requires your approval before any access is granted. This gives your organization direct control over who touches your data and when — making the background check status of individual support personnel a secondary concern, because no human access occurs without your authorization.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;This is fundamentally a risk-based decision - and one that typically falls to the CISO and organizational leadership to approve and be held accountable for.&lt;/STRONG&gt; Organizations that implement CMK and Customer Lockbox in GCC can build a defensible technical case that no export occurs, but they should ensure that decision is documented, reviewed by compliance stakeholders, and aligned with their organization's risk tolerance. For many organizations — particularly those in the DIB handling ITAR-controlled technical data&amp;nbsp; — GCC High will remain the appropriate path because it eliminates these considerations by design.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Bottom line:&lt;/STRONG&gt; Ultimately, it is incumbent on the data owner to decide what tools meet their purposes. GCC is suitable for Federally Controlled Information (FCI) and certain categories of Controlled Unclassified Information (CUI). Organizations with ITAR-controlled data may prefer GCC High or DoD environments, but CMK and Customer Lockbox can serve as meaningful compensating controls for organizations managing the transition or making a documented, risk-based determination that the technical controls in GCC are sufficient for their specific use case.&lt;/P&gt;
&lt;P&gt;Reference: &lt;A href="https://learn.microsoft.com/en-us/office365/servicedescriptions/office-365-platform-service-description/office-365-us-government/office-365-us-government" target="_blank" rel="noopener"&gt;Office 365 US Government - Service Descriptions | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;H4&gt;Azure Commercial&lt;/H4&gt;
&lt;P&gt;Azure Commercial can play a role in supporting ITAR compliance — but with an important distinction from our government cloud environments: &lt;STRONG&gt;the compliance boundary in Azure Commercial is customer-implemented rather than environment-guaranteed.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Both Azure and Azure Government can help you meet your ITAR compliance obligations. Our Azure datacenters (except for the Hong Kong SAR region) are not located in proscribed countries or the Russian Federation. Azure services rely on FIPS 140 validated cryptographic modules and provide multiple options for encrypting data in transit and at rest, including customer-managed keys (CMK) through Azure Key Vault backed by FIPS 140 validated HSMs.&lt;/P&gt;
&lt;H4&gt;Data Residency in Azure Commercial&lt;/H4&gt;
&lt;P&gt;While Azure Commercial is not hard-locked to CONUS the way Azure Government is, we provide you with the tools and transparency to control where your data resides. You select the Azure region where your applications and data are deployed. Most Azure services enable you to specify the region where your customer data will be stored and processed, and we will not store or process customer data outside the selected geography. We publish a &lt;A href="https://azure.microsoft.com/en-us/explore/global-infrastructure/data-residency" target="_blank" rel="noopener"&gt;data residency page&lt;/A&gt; and per-service documentation that identifies which services store data at rest in-region and which have global components that may process data outside the selected geography.&lt;/P&gt;
&lt;P&gt;To enforce data residency in Azure Commercial, you can leverage region selection during deployment, Azure Policy to restrict resource creation to specific US regions, and service-specific residency controls documented for each service. It is your responsibility to review per-service documentation to understand which services are fully regional and which may have global processing components, and to architect your environment accordingly.&lt;/P&gt;
&lt;P&gt;This is the fundamental difference: &lt;STRONG&gt;in Azure Government, the CONUS boundary is part of the environment. In Azure Commercial, you are building that boundary yourself through policy, encryption, access controls, and deliberate architecture choices for the available localized services.&lt;/STRONG&gt;&lt;/P&gt;
&lt;H4&gt;The Encryption Carve-Out&lt;/H4&gt;
&lt;P&gt;The key enabler for ITAR in Azure Commercial is the &lt;STRONG&gt;ITAR end-to-end encryption carve-out.&lt;/STRONG&gt; The ITAR states that storing encrypted technical data does not constitute an export when the data is unclassified, encrypted end-to-end with FIPS 140 compliant modules, and not intentionally stored in a proscribed country. Also, the means of encryption must not be provided to a third party. Azure Key Vault is designed so that Microsoft and its agents cannot see or extract customers’ cryptographic keys. Customer Lockbox for Azure puts you in charge of approving or rejecting any elevated access requests from our support engineers, providing an additional layer of access governance.&lt;/P&gt;
&lt;P&gt;However, Azure Commercial does not provide the additional contractual commitments that Azure Government offers, such as guaranteed storage within the United States and access limited exclusively to screened US persons. The compliance controls are available to you - but the responsibility for implementing, configuring, and maintaining them rests entirely with your organization.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Bottom line:&lt;/STRONG&gt; Azure Commercial can support ITAR workloads under the encryption carve-out, but you are building and enforcing the compliance boundary yourself. Most organizations with ITAR obligations are best served by Azure Government, where the boundary is built into the environment.&lt;/P&gt;
&lt;P&gt;Reference: &lt;A href="https://learn.microsoft.com/en-us/azure/compliance/offerings/offering-itar" target="_blank" rel="noopener"&gt;International Traffic in Arms Regulations (ITAR) - Azure Compliance | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;H4&gt;Azure Government&lt;/H4&gt;
&lt;P&gt;Azure Government is a physically and logically isolated cloud environment built specifically for US government agencies and their partners. Data transmission and processing are restricted to CONUS, and access to systems processing customer data is limited to screened US persons. Azure Government provides contractual commitments regarding data residency and personnel access that go beyond what Azure Commercial offers.&lt;/P&gt;
&lt;P&gt;Azure Government holds FedRAMP High authorization and supports DISA SRG Impact Level 5 (IL5), ITAR, and Export Administration Regulations (EAR). For organizations that need to store and process ITAR-regulated data, Azure Government provides the strongest alignment with ITAR requirements available in our cloud ecosystem.&lt;/P&gt;
&lt;P&gt;Key capabilities that support ITAR compliance in Azure Government include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Data location control:&lt;/STRONG&gt; Robust tools to restrict data storage to US regions, ensuring customer data is not intentionally stored in a non-conforming location.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Access controls:&lt;/STRONG&gt; Our technical support personnel do not have default access to customer data. Customer Lockbox for Azure enables you to approve or reject any elevated access requests.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;End-to-end encryption:&lt;/STRONG&gt; FIPS 140 validated cryptographic modules with customer-managed key options through Azure Key Vault HSMs.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Screened US citizens:&lt;/STRONG&gt; Personnel with potential access to customer data undergo verification of US citizenship and additional background screening. This is more than what the ITAR requires, which is a US person.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Bottom line:&lt;/STRONG&gt; Azure Government is the recommended environment for ITAR-&lt;STRONG&gt;controlled&lt;/STRONG&gt; workloads and provides the strongest contractual and technical protections.&lt;/P&gt;
&lt;P&gt;Reference: &lt;A href="https://learn.microsoft.com/en-us/azure/azure-government/documentation-government-overview-itar" target="_blank" rel="noopener"&gt;Azure support for export controls | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;H4&gt;Microsoft 365 GCC High and DoD&lt;/H4&gt;
&lt;P&gt;For organizations that need Microsoft 365 productivity services (Exchange, SharePoint, Teams, OneDrive) alongside ITAR compliance, &lt;STRONG&gt;GCC High is the appropriate environment.&lt;/STRONG&gt; GCC High is built on Azure Government infrastructure, stores data exclusively in US data centers, and limits access to screened US citizens. We will agree to ITAR contract language for the GCC High environment.&lt;/P&gt;
&lt;P&gt;The Office 365 GCC High and DoD environments deliver compliance with Department of Defense Security Requirements Guidelines, DFARS, and ITAR. You must sign additional agreements notifying us of your intention to store ITAR-controlled data so that we can comply with our obligations to both you and the US government.&lt;/P&gt;
&lt;P&gt;Reference: &lt;A href="https://learn.microsoft.com/en-us/office365/servicedescriptions/office-365-platform-service-description/office-365-us-government/gcc-high-and-dod" target="_blank" rel="noopener"&gt;Office 365 GCC High and DoD - Service Descriptions | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;H4&gt;Comparing the Environments at a Glance&lt;/H4&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table class="lia-background-color-16 lia-border-color-21 lia-border-style-solid" border="1" style="width: 100%; height: 768.8px; border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr style="height: 44.8px;"&gt;&lt;td class="lia-border-color-21" style="height: 44.8px;"&gt;
&lt;H5&gt;&lt;STRONG&gt;Capability&lt;/STRONG&gt;&lt;/H5&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 44.8px;"&gt;
&lt;H5&gt;&lt;STRONG&gt;GCC&lt;/STRONG&gt;&lt;/H5&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 44.8px;"&gt;
&lt;H5&gt;&lt;STRONG&gt;Azure Commercial&lt;/STRONG&gt;&lt;/H5&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 44.8px;"&gt;
&lt;H5&gt;&lt;STRONG&gt;Azure Government&lt;/STRONG&gt;&lt;/H5&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 44.8px;"&gt;
&lt;H5&gt;&lt;STRONG&gt;GCC High / DoD&lt;/STRONG&gt;&lt;/H5&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 38.8px;"&gt;&lt;td class="lia-border-color-21" style="height: 38.8px;"&gt;
&lt;H5&gt;&lt;STRONG&gt;ITAR Contract Language&lt;/STRONG&gt;&lt;/H5&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 38.8px;"&gt;
&lt;P&gt;No&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 38.8px;"&gt;
&lt;P&gt;No&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 38.8px;"&gt;
&lt;P&gt;Yes&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 38.8px;"&gt;
&lt;P&gt;Yes&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 122.8px;"&gt;&lt;td class="lia-border-color-21" style="height: 122.8px;"&gt;
&lt;H5&gt;&lt;STRONG&gt;Data Residency (CONUS)&lt;/STRONG&gt;&lt;/H5&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 122.8px;"&gt;
&lt;P&gt;US only (environment boundary)&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 122.8px;"&gt;
&lt;P&gt;Customer-configured via region selection, Azure Policy, and per-service residency controls&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 122.8px;"&gt;
&lt;P&gt;US only (contractual)&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 122.8px;"&gt;
&lt;P&gt;US only (contractual)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 94.8px;"&gt;&lt;td class="lia-border-color-21" style="height: 94.8px;"&gt;
&lt;H5&gt;&lt;STRONG&gt;Compliance Boundary&lt;/STRONG&gt;&lt;/H5&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 94.8px;"&gt;
&lt;P&gt;Environment-guaranteed&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 94.8px;"&gt;
&lt;P&gt;Customer-built through policy, encryption, and architecture&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 94.8px;"&gt;
&lt;P&gt;Environment-guaranteed&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 94.8px;"&gt;
&lt;P&gt;Environment-guaranteed&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 94.8px;"&gt;&lt;td class="lia-border-color-21" style="height: 94.8px;"&gt;
&lt;H5&gt;&lt;STRONG&gt;Personnel Screening (US Persons)&lt;/STRONG&gt;&lt;/H5&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 94.8px;"&gt;
&lt;P&gt;Screened personnel, but support staff may include non-US persons&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 94.8px;"&gt;
&lt;P&gt;No specific commitment&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 94.8px;"&gt;
&lt;P&gt;Screened US persons&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 94.8px;"&gt;
&lt;P&gt;Screened US citizens&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 66.8px;"&gt;&lt;td class="lia-border-color-21" style="height: 66.8px;"&gt;
&lt;H5&gt;&lt;STRONG&gt;Physical/Logical Isolation&lt;/STRONG&gt;&lt;/H5&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 66.8px;"&gt;
&lt;P&gt;Logical segregation on Azure Commercial&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 66.8px;"&gt;
&lt;P&gt;Shared commercial infrastructure&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 66.8px;"&gt;
&lt;P&gt;Physically isolated&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 66.8px;"&gt;
&lt;P&gt;Physically isolated (Azure Gov)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 38.8px;"&gt;&lt;td class="lia-border-color-21" style="height: 38.8px;"&gt;
&lt;H5&gt;&lt;STRONG&gt;FIPS 140 Encryption&lt;/STRONG&gt;&lt;/H5&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 38.8px;"&gt;
&lt;P&gt;Yes&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 38.8px;"&gt;
&lt;P&gt;Yes&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 38.8px;"&gt;
&lt;P&gt;Yes&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 38.8px;"&gt;
&lt;P&gt;Yes&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 66.8px;"&gt;&lt;td class="lia-border-color-21" style="height: 66.8px;"&gt;
&lt;H5&gt;&lt;STRONG&gt;Customer Managed Keys (CMK)&lt;/STRONG&gt;&lt;/H5&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 66.8px;"&gt;
&lt;P&gt;Yes (Azure Key Vault)&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 66.8px;"&gt;
&lt;P&gt;Yes (Azure Key Vault)&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 66.8px;"&gt;
&lt;P&gt;Yes (Azure Key Vault)&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 66.8px;"&gt;
&lt;P&gt;Yes (Azure Key Vault)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 38.8px;"&gt;&lt;td class="lia-border-color-21" style="height: 38.8px;"&gt;
&lt;H5&gt;&lt;STRONG&gt;Customer Lockbox&lt;/STRONG&gt;&lt;/H5&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 38.8px;"&gt;
&lt;P&gt;Yes&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 38.8px;"&gt;
&lt;P&gt;Yes&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 38.8px;"&gt;
&lt;P&gt;Yes&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 38.8px;"&gt;
&lt;P&gt;Yes&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 38.8px;"&gt;&lt;td class="lia-border-color-21" style="height: 38.8px;"&gt;
&lt;H5&gt;&lt;STRONG&gt;FedRAMP Authorization&lt;/STRONG&gt;&lt;/H5&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 38.8px;"&gt;
&lt;P&gt;FedRAMP High&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 38.8px;"&gt;
&lt;P&gt;Varies by service&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 38.8px;"&gt;
&lt;P&gt;FedRAMP High&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 38.8px;"&gt;
&lt;P&gt;FedRAMP High&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 122.8px;"&gt;&lt;td class="lia-border-color-21" style="height: 122.8px;"&gt;
&lt;H5&gt;&lt;STRONG&gt;ITAR-Capable&lt;/STRONG&gt;&lt;/H5&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 122.8px;"&gt;
&lt;P&gt;Not natively; CMK + Customer Lockbox enable a defensible no-export case (risk-based decision)&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 122.8px;"&gt;
&lt;P&gt;Under encryption carve-out (customer-built boundary)&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 122.8px;"&gt;
&lt;P&gt;Yes&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-21" style="height: 122.8px;"&gt;
&lt;P&gt;Yes&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 20.00%" /&gt;&lt;col style="width: 20.00%" /&gt;&lt;col style="width: 20.00%" /&gt;&lt;col style="width: 20.00%" /&gt;&lt;col style="width: 20.00%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;H3&gt;Shared Responsibility: Your Role in ITAR Compliance&lt;/H3&gt;
&lt;img /&gt;
&lt;P&gt;Regardless of which cloud environment you choose, ITAR compliance is a shared responsibility. We provide the platform capabilities — encryption, data residency, access controls, and personnel screening — but your organization is responsible for:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Registering with DDTC&lt;/STRONG&gt; if you manufacture, export, or broker defense articles.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Classifying and labeling data&lt;/STRONG&gt; to identify ITAR-controlled technical data.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Configuring access controls&lt;/STRONG&gt; to ensure only authorized US persons can access regulated information.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Signing additional agreements&lt;/STRONG&gt; with us to formalize your intention to store ITAR-controlled data (required for Azure Government and GCC High).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Designing application architecture&lt;/STRONG&gt; to maintain end-to-end encryption that meets ITAR requirements. We do not inspect, approve, or monitor your applications.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Managing third-party integrations&lt;/STRONG&gt; that may fall outside the compliance boundary.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The Microsoft Enterprise Agreement Amendment enables us and the customer to work together in reporting ITAR violations, fulfilling the specific reporting obligations that ITAR requires.&lt;/P&gt;
&lt;P&gt;Reference: &lt;A href="https://learn.microsoft.com/en-us/compliance/regulatory/offering-itar" target="_blank" rel="noopener"&gt;International Traffic in Arms Regulations (ITAR) - Microsoft Compliance | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;H4&gt;Action Plan for Getting Started&lt;/H4&gt;
&lt;img /&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Step 1: Assess Your Data&lt;/STRONG&gt; Determine whether your organization handles defense articles, services, or technical data on the USML. Understand which data is ITAR-controlled and map your data flows.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 2: Choose the Right Environment&lt;/STRONG&gt; For ITAR-&lt;STRONG&gt;controlled&lt;/STRONG&gt; workloads, Azure Government and Microsoft 365 GCC High provide the strongest alignment. If you are evaluating GCC with compensating controls like CMK and Customer Lockbox, or Azure Commercial under the encryption carve-out, ensure the decision is documented and approved by your CISO and compliance stakeholders — as the CISO is ultimately accountable for the risk acceptance and the defensibility of the chosen approach.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 3: Engage Your Microsoft Account Team&lt;/STRONG&gt; If you are seeking to host ITAR-&lt;STRONG&gt;controlled&lt;/STRONG&gt; data, work with your Microsoft account and licensing teams to obtain proper agreements and access relevant system architecture information.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 4: Develop Your Compliance Architecture&lt;/STRONG&gt; Leverage tools like Azure Policy, Microsoft Defender for Cloud, Microsoft Purview Compliance Manager, and Customer Lockbox to enforce and monitor your compliance posture.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 5: Document and Maintain&lt;/STRONG&gt; Develop a System Security Plan (SSP) that reflects your ITAR controls, and continuously monitor and update your controls as your environment evolves.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Resources and Further Reading&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/compliance/offerings/offering-itar" target="_blank" rel="noopener"&gt;International Traffic in Arms Regulations (ITAR) - Azure Compliance | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/azure-government/documentation-government-overview-itar" target="_blank" rel="noopener"&gt;Azure support for export controls | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/compliance/regulatory/offering-itar" target="_blank" rel="noopener"&gt;International Traffic in Arms Regulations (ITAR) - Microsoft Compliance | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/office365/servicedescriptions/office-365-platform-service-description/office-365-us-government/office-365-us-government" target="_blank" rel="noopener"&gt;Office 365 US Government - Service Descriptions | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/office365/servicedescriptions/office-365-platform-service-description/office-365-us-government/gcc-high-and-dod" target="_blank" rel="noopener"&gt;Office 365 GCC High and DoD - Service Descriptions | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://azure.microsoft.com/en-us/explore/global-infrastructure/data-residency" target="_blank" rel="noopener"&gt;Azure Data Residency&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/Azure-Export-Paper" target="_blank" rel="noopener"&gt;Microsoft Azure Export Controls Whitepaper&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/MSGovCompliance" target="_blank" rel="noopener"&gt;Microsoft Government Compliance Offerings&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.pmddtc.state.gov/?id=ddtc_public_portal_itar_landing" target="_blank" rel="noopener"&gt;DDTC ITAR Landing Page&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.ecfr.gov/current/title-22/chapter-I/subchapter-M" target="_blank" rel="noopener"&gt;ITAR Title 22 CFR Part 120-130&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Conclusion&lt;/H3&gt;
&lt;P&gt;ITAR compliance in the cloud is achievable - but it requires deliberate environment selection, proper contractual agreements, and disciplined architecture. Microsoft 365 GCC does not natively support ITAR, but Customer Managed Keys and Customer Lockbox can enable a defensible technical case that no export occurs - a risk-based decision that falls to the CISO and organizational leadership to approve. Azure Commercial can support ITAR under the encryption carve-out, but the compliance boundary is customer-built rather than environment-guaranteed, which demands careful architecture and per-service residency review. Azure Government and GCC High provide the contractual commitments, data residency guarantees, and personnel screening that most closely align with ITAR requirements — with the compliance boundary built into the environment by design.&lt;/P&gt;
&lt;P&gt;The path forward starts with understanding your data, choosing the right environment, and building your compliance architecture on our capable platform.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Join the Discussion&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Join the conversation below to ask questions, share deployment insights, and connect with other public sector professionals working with Microsoft capabilities. Your feedback and experience help strengthen the community.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Mar 2026 15:11:43 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/public-sector-blog/itar-compliance-in-the-microsoft-cloud-navigating-gcc-azure/ba-p/4501314</guid>
      <dc:creator>bryanlopez</dc:creator>
      <dc:date>2026-03-20T15:11:43Z</dc:date>
    </item>
    <item>
      <title>Sunderland City Profile: Frontier transformation in practice</title>
      <link>https://techcommunity.microsoft.com/t5/public-sector-blog/sunderland-city-profile-frontier-transformation-in-practice/ba-p/4498819</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Download the&amp;nbsp;&lt;A class="lia-external-url" href="https://www.smartcitiesworld.net/city-profile/smart-cities-reports/smartcitiesworld-city-profile-sunderland-12510" target="_blank"&gt;SmartCitiesWorld City Profile – Sunderland&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Cities everywhere are facing the same pressure: modernize infrastructure, grow the economy, and improve quality of life, without widening inequality. Sunderland offers a credible path forward.&lt;/P&gt;
&lt;P&gt;Once defined by shipbuilding and coal mining, Sunderland has spent the last four decades deliberately reinventing itself. Today, it is positioning itself as the UK’s leading smart city by investing in digital infrastructure, data, and low‑carbon innovation to drive inclusive, long‑term growth. The latest City Profile from SmartCitiesWorld captures how this strategy is being executed and why it matters for city leaders globally.&lt;/P&gt;
&lt;H3&gt;A digital backbone built for outcomes, not optics&lt;/H3&gt;
&lt;P&gt;Sunderland’s progress starts with a clear foundation: connectivity and data designed with purpose.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Full‑fibre connectivity across the city&lt;/LI&gt;
&lt;LI&gt;Citywide 5G and LoRaWAN coverage&lt;/LI&gt;
&lt;LI&gt;A secure, cloud‑based smart city data platform&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Together, this stack enables real‑time visibility across transport, environment, and public services. More importantly, it shifts the city from reactive decision‑making to proactive, evidence‑led operations.&lt;/P&gt;
&lt;P&gt;The impact is measurable. Data and analytics now support:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Safer, more predictable event planning&lt;/LI&gt;
&lt;LI&gt;Smarter traffic and mobility management&lt;/LI&gt;
&lt;LI&gt;Earlier environmental interventions&lt;/LI&gt;
&lt;LI&gt;More targeted social and health services&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;From digital health hubs that reduce exclusion to intelligent transport pilots that cut emissions and improve safety, Sunderland is applying technology where it delivers the highest public value—not where it looks most impressive on a slide.&lt;/P&gt;
&lt;H3&gt;What comes next: two opportunities to scale impact&lt;/H3&gt;
&lt;P&gt;The City Profile also highlights where cities like Sunderland can go further. Two opportunities stand out.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt; Move from smart services to predictive city operations&lt;/STRONG&gt;&lt;BR /&gt;With real‑time data already in place, the next step is predictive modeling—anticipating demand across social care, transport, energy, and public safety before pressure points emerge. Done right, this enables earlier investment decisions, lower long‑term costs, and better outcomes across services.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt; Turn digital inclusion into a workforce engine&lt;/STRONG&gt;&lt;BR /&gt;Sunderland’s digital health hubs create a foundation for something bigger: linking access and digital skills directly to workforce development. By aligning inclusion efforts with local demand in advanced manufacturing, data, and clean energy, cities can convert access into sustained economic mobility.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H3&gt;Why Sunderland’s approach matters&lt;/H3&gt;
&lt;P&gt;Sunderland’s experience reinforces a critical point: smart city transformation is not about technology in isolation. It is about aligning infrastructure, data, governance, and community priorities around a shared vision for inclusive growth.&lt;/P&gt;
&lt;P&gt;For public‑sector leaders moving from ambition to execution, the full City Profile provides practical insight into the partnerships, operating models, and decisions behind Sunderland’s approach. It’s a useful reference for anyone looking to translate a digital‑first strategy into measurable impact—for people, place, and long‑term resilience.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Mar 2026 23:30:47 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/public-sector-blog/sunderland-city-profile-frontier-transformation-in-practice/ba-p/4498819</guid>
      <dc:creator>DanNarloch</dc:creator>
      <dc:date>2026-03-02T23:30:47Z</dc:date>
    </item>
    <item>
      <title>From AI pilots to public decisions: what it really takes to close the intelligence gap</title>
      <link>https://techcommunity.microsoft.com/t5/public-sector-blog/from-ai-pilots-to-public-decisions-what-it-really-takes-to-close/ba-p/4497639</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Across the public sector, the conversation about AI has shifted. The question is no longer whether AI can generate insight—most leaders have already seen impressive pilots. The harder question is whether those insights survive the realities of government: public scrutiny, auditability, cross‑department delivery, and the need to explain decisions in plain language.&lt;/P&gt;
&lt;P&gt;That challenge was recently articulated by &lt;STRONG&gt;&lt;A class="lia-external-url" href="https://www.linkedin.com/in/sadaf-mozaffarian-6567a316/" target="_blank"&gt;Sadaf Mozaffarian&lt;/A&gt;, writing in &lt;A class="lia-external-url" href="https://www.smartcitiesworld.net/opinions/closing-the-intelligence-gap-how-cities-turn-ai-experiments-into-operational-impact" target="_blank"&gt;&lt;EM&gt;Smart Cities World&lt;/EM&gt;&lt;/A&gt;, in the context of city‑scale AI deployments&lt;/STRONG&gt;. Governments don’t need more experiments. They need decision‑ready intelligence—&lt;STRONG&gt;intelligence that can be acted on safely, governed consistently, and defended when outcomes are questioned&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;What’s emerging now is a more operational lens on AI adoption, one that exposes two issues many pilots quietly avoid.&lt;/P&gt;
&lt;H3&gt;Decision latency is the real enemy&lt;/H3&gt;
&lt;P&gt;In government, decision latency is not about slow analytics, it’s the time lost between&amp;nbsp;&lt;EM&gt;having a signal&lt;/EM&gt; and &lt;EM&gt;being able to act on it with confidence&lt;/EM&gt;.&lt;/P&gt;
&lt;P&gt;Much of the focus in AI discussions is on accuracy, bias, or model performance. But in cities, the more damaging problem is often this latency. When data is fragmented across departments, policies live in PDFs, and institutional knowledge walks out the door at 5pm, leaders may have insight but still can’t decide fast enough. AI pilots often demonstrate answers in isolation, but they don’t reduce the friction between insight, approval, and execution.&lt;/P&gt;
&lt;P&gt;Decision‑ready intelligence directly attacks this problem. It brings together:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Operational data already trusted by the organization&lt;/LI&gt;
&lt;LI&gt;Policy and regulatory context that constrains decisions&lt;/LI&gt;
&lt;LI&gt;Human checkpoints that reflect how accountability actually works&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The result isn’t faster answers—it’s faster decisions that stick, because they align with how governments are structured to operate.&lt;/P&gt;
&lt;H3&gt;Institutional memory is infrastructure&lt;/H3&gt;
&lt;P&gt;Cities invest heavily in physical infrastructure—roads, pipes, facilities—but far less deliberately in institutional memory. Yet planning rationales, inspection notes, precedent cases, and prior decisions are often what make or break today’s choices.&lt;/P&gt;
&lt;P&gt;Consider a routine enforcement or permitting decision that looks reasonable on current data, but quietly contradicts a prior settlement, a regulator’s interpretation, or a lesson learned during a past inquiry. AI systems that don’t account for this history don’t just miss context, they create risk.&lt;/P&gt;
&lt;P&gt;Decision‑ready intelligence treats institutional memory as a first‑class asset. It ensures that when AI supports a decision, it does so with:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Access to relevant historical records and prior outcomes&lt;/LI&gt;
&lt;LI&gt;Clear lineage back to source documents and policies&lt;/LI&gt;
&lt;LI&gt;Logging that preserves not just what was decided, but why&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This is what allows governments to move faster without relearning the same lessons under audit pressure.&lt;/P&gt;
&lt;H3&gt;Why this matters now&lt;/H3&gt;
&lt;P&gt;Public sector AI initiatives rarely fail because of a lack of ambition. They stall because trust questions—governance, records, explainability—arrive too late. By the time leaders ask, “Can we stand behind this decision?” the system was never designed to answer.&lt;/P&gt;
&lt;P&gt;Decision‑ready intelligence flips that sequence. Governance is not bolted on after the pilot; it’s built into the operating model from the start. That’s what allows agencies to scale from a single use case to repeatable patterns across departments.&lt;/P&gt;
&lt;H3&gt;A practical starting point&lt;/H3&gt;
&lt;P&gt;The cities making progress aren’t trying to transform everything at once. They start small but visible:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Identify one cross‑department “moment of truth”&lt;/LI&gt;
&lt;LI&gt;Define what must be logged, retained, and explainable&lt;/LI&gt;
&lt;LI&gt;Connect just enough data, policy, and work context to support that decision&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;From there, they reuse the same patterns—governed data products, policy knowledge bases, and human‑in‑the‑loop workflows—to scale responsibly.&lt;/P&gt;
&lt;P&gt;AI in government will ultimately be judged the same way every public investment is judged: by outcomes, fairness, and public confidence. Closing the intelligence gap isn’t about smarter models. &lt;STRONG&gt;It’s about designing decision systems that reflect how governments actually work—and are held accountable.&lt;BR /&gt;&lt;BR /&gt;Learn more by reading Sadaf's full article:&amp;nbsp;&lt;A class="lia-external-url" href="https://www.smartcitiesworld.net/opinions/closing-the-intelligence-gap-how-cities-turn-ai-experiments-into-operational-impact" target="_blank"&gt;Closing the intelligence gap: how cities turn AI experiments into operational impact&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Feb 2026 19:56:59 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/public-sector-blog/from-ai-pilots-to-public-decisions-what-it-really-takes-to-close/ba-p/4497639</guid>
      <dc:creator>DanNarloch</dc:creator>
      <dc:date>2026-02-26T19:56:59Z</dc:date>
    </item>
    <item>
      <title>Microsoft 365 Copilot Government Events Are Hitting the Road &amp; Coming to a City Near YOU</title>
      <link>https://techcommunity.microsoft.com/t5/public-sector-blog/microsoft-365-copilot-government-events-are-hitting-the-road/ba-p/4495768</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Did Someone Say &lt;EM&gt;Prompt‑a‑thon&lt;/EM&gt;?!&lt;/STRONG&gt;&lt;/P&gt;
&lt;H3&gt;M365 Copilot Government Events Are Hitting the Road&lt;/H3&gt;
&lt;P&gt;Generative AI is no longer a “future” conversation—it’s happening &lt;EM&gt;now&lt;/EM&gt; across government. And there’s no better way to move from curiosity to confidence than getting hands on with M365 Copilot alongside peers and experts who understand your mission.&lt;/P&gt;
&lt;P&gt;That’s why we’re excited to bring &lt;STRONG&gt;M365 Copilot Government in‑person experiences&lt;/STRONG&gt; to cities across the United States! These immersive, collaborative events are designed to help government organizations build real skills, unlock immediate value, and accelerate their M365 Copilot journey—&lt;EM&gt;all within GCC guardrails and responsible AI practices.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Whether you’re just getting started or ready to level up, this is your chance to roll up your sleeves and experience Copilot in action.&lt;/P&gt;
&lt;H3&gt;What to Expect: A True Hands‑On Prompt‑a‑thon Experience&lt;/H3&gt;
&lt;P&gt;Each event is a full‑day, interactive experience focused on practical learning, real scenarios, and meaningful connection.&lt;/P&gt;
&lt;H4&gt;Arrival &amp;amp; Networking&lt;/H4&gt;
&lt;P&gt;Kick off the day by connecting with peers and Microsoft specialists. This informal networking time sets the stage for open conversation—sharing challenges, exchanging ideas, and learning how other agencies are approaching AI adoption.&lt;/P&gt;
&lt;H4&gt;M365 Copilot Overviews and Prompting Masterclass&lt;/H4&gt;
&lt;P&gt;Prompting is where the magic happens. In this session, you’ll learn the fundamentals of effective prompting—how to provide the right context, structure requests, and guide Copilot toward higher‑quality results. Live demos show Copilot at work across M365 apps, turning prompts into powerful outcomes.&lt;/P&gt;
&lt;H4&gt;Hands‑On Team Scenario Building&lt;/H4&gt;
&lt;P&gt;This is where theory turns into practice. Working in small teams, you’ll tackle realistic government scenarios using M365 Copilot across &lt;STRONG&gt;Word, Excel, PowerPoint, Teams, and Outlook&lt;/STRONG&gt;. With guidance from Microsoft Cloud Solution Architects and specialists, you’ll experiment, iterate, and build workflows you can take back to your organization.&lt;/P&gt;
&lt;H4&gt;Team Showcases &amp;amp; Takeaways&lt;/H4&gt;
&lt;P&gt;Teams share what they built, what worked, and what surprised them. You’ll leave with clear takeaways on where Copilot can save time, improve quality, and reduce friction in everyday mission workflows—plus inspiration from what your peers accomplished.&lt;/P&gt;
&lt;H4&gt;What You’ll Leave With&lt;/H4&gt;
&lt;P&gt;By the end of the day, you won’t just understand M365 Copilot—you’ll know how to &lt;EM&gt;use&lt;/EM&gt; it.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Practical, reusable prompt patterns&lt;/LI&gt;
&lt;LI&gt;A clearer understanding of Copilot capabilities and limitations&lt;/LI&gt;
&lt;LI&gt;Actionable ideas to pilot with your team right away&lt;/LI&gt;
&lt;LI&gt;Ongoing connections with peers and Microsoft experts&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Coming to a City Near You&lt;/H3&gt;
&lt;P&gt;Choose the location and date that works best for you and your team:&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Date&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Location&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Registration Link&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;March 04, 2026&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Chicago, IL&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;A href="https://cloudevents.microsoft.com/en/event/microsoft_365_copilot_prompt-a-thon_government_roadshow_chicago_4thMarch" target="_blank" rel="noopener"&gt;Chicago, IL&lt;/A&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;March 18, 2026&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Arlington, VA&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;A href="https://msevents.microsoft.com/event?id=2698402546" target="_blank" rel="noopener"&gt;Arlington, VA&lt;/A&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;April 1, 2026&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Dallas, TX&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;A href="https://cloudevents.microsoft.com/en/event/microsoft_365_copilot_prompt-a-thon_government_roadshow_dallas_1stApril" target="_blank" rel="noopener"&gt;Dallas, TX&lt;/A&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;April 8, 2026&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN data-teams="true"&gt;Charlotte, NC &lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://cloudevents.microsoft.com/en/event/microsoft_365_copilot_prompt-a-thon_government_roadshow_charlotte_8thApril" target="_blank"&gt;&lt;SPAN data-teams="true"&gt;Charlotte, NC &lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;April 16, 2026&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Fort Lauderdale, FL&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;A href="https://cloudevents.microsoft.com/en/event/microsoft_365_copilot_prompt-a-thon_government_roadshow_fortlauderdale_16thApril" target="_blank" rel="noopener"&gt;Fort Lauderdale, FL&lt;/A&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;May 7, 2026&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;New York City, NY&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;A href="https://cloudevents.microsoft.com/en/event/microsoft_365_copilot_prompt-a-thon_government_roadshow_newyork_7thMay" target="_blank" rel="noopener"&gt;New York City, NY&lt;/A&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;May 13, 2026&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Seattle, WA&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;A href="https://cloudevents.microsoft.com/en/event/microsoft_365_copilot_prompt-a-thon_government_roadshow_seattle_13thMay" target="_blank" rel="noopener"&gt;Seattle, WA&lt;/A&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;May 20, 2026&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Irvine, CA&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;A href="https://cloudevents.microsoft.com/en/event/microsoft_365_copilot_prompt-a-thon_government_roadshow_irvine_20thMay" target="_blank" rel="noopener"&gt;Irvine, CA&lt;/A&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;H3&gt;Why Attend?&lt;/H3&gt;
&lt;P&gt;At each stop, you’ll collaborate with peers and Microsoft experts in a hands‑on environment to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Craft powerful, effective prompts&lt;/LI&gt;
&lt;LI&gt;Explore agentic AI scenarios&lt;/LI&gt;
&lt;LI&gt;Apply Copilot across M365 apps to solve real mission challenges&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This isn’t a lecture—it’s a &lt;STRONG&gt;Prompt‑a‑thon&lt;/STRONG&gt; built for government practitioners who want to turn AI potential into real impact.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Spots are limited—register today and secure your seat.&lt;/STRONG&gt;&lt;BR /&gt;We can’t wait to see you on the road!&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2026 15:14:43 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/public-sector-blog/microsoft-365-copilot-government-events-are-hitting-the-road/ba-p/4495768</guid>
      <dc:creator>Abby_Quinn</dc:creator>
      <dc:date>2026-03-10T15:14:43Z</dc:date>
    </item>
    <item>
      <title>Genesis Mission: How Microsoft &amp; the U.S. Department of Energy Accelerate Science</title>
      <link>https://techcommunity.microsoft.com/t5/public-sector-blog/genesis-mission-how-microsoft-the-u-s-department-of-energy/ba-p/4495259</link>
      <description>&lt;P&gt;The &lt;A href="https://genesis.energy.gov/" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Genesis Mission&lt;/STRONG&gt;&lt;/A&gt;, led by the U.S. Department of Energy (DOE), is a coordinated national initiative to &lt;STRONG&gt;dramatically accelerate scientific discovery, strengthen U.S. energy leadership, and advance national security&lt;/STRONG&gt; through the responsible application of artificial intelligence (AI), high‑performance computing (HPC), and world‑class scientific infrastructure.&lt;/P&gt;
&lt;P&gt;At Microsoft, &lt;A href="https://www.linkedin.com/posts/microsoft-on-the-issues_launching-the-genesis-mission-activity-7398863342179667968-ISIc/?utm_source=share&amp;amp;utm_medium=member_desktop&amp;amp;rcm=ACoAABP7IOMBkpN19q2Rd4HepK2psUbrImW05QM" target="_blank" rel="noopener"&gt;we are honored to support this mission&lt;/A&gt; in close partnership with the DOE and its National Laboratories. By providing&lt;STRONG&gt; &lt;/STRONG&gt;secure cloud platforms, advanced AI capabilities, and scientific domain‑specific tools, Microsoft is working alongside America’s scientists and engineers to help modernize research workflows and reduce the time required to move from hypothesis to discovery.&lt;/P&gt;
&lt;P&gt;This collaboration reflects a shared commitment to ensuring that AI serves as a force multiplier for the scientific workforce, enabling new approaches to research while maintaining the security, governance, and integrity required for mission‑critical work.&lt;/P&gt;
&lt;H2&gt;The Genesis Mission: Building an Integrated Platform for American Science&lt;/H2&gt;
&lt;P&gt;The Genesis Mission brings together the DOE’s &lt;STRONG&gt;17 National Laboratories&lt;/STRONG&gt;, advanced experimental facilities, large‑scale scientific datasets, and next‑generation computing resources into a more integrated scientific discovery platform. The goal is to &lt;STRONG&gt;double the productivity and impact of American research and innovation within the decade&lt;/STRONG&gt; by embedding AI directly into the scientific process.&lt;/P&gt;
&lt;P&gt;Achieving this vision requires trusted technology partners who understand the unique requirements of government‑led science -&lt;STRONG&gt; &lt;/STRONG&gt;from secure data handling and regulatory compliance to collaboration across institutions and disciplines.&lt;/P&gt;
&lt;P&gt;Microsoft’s work under the Genesis Mission is focused on enabling this integrated approach by delivering:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Secure, government‑ready cloud infrastructure accredited to support workloads ranging from unclassified to Secret data and protected with industry-leading cybersecurity systems&lt;/LI&gt;
&lt;LI&gt;AI capabilities designed for scientific and engineering workflows&lt;/LI&gt;
&lt;LI&gt;Responsible AI practices aligned with federal standards&lt;/LI&gt;
&lt;LI&gt;Close collaboration with DOE scientists and laboratory experts&lt;/LI&gt;
&lt;LI&gt;Collaboration on Nuclear R&amp;amp;D and Permitting&lt;/LI&gt;
&lt;LI&gt;Autonomous Lab &amp;amp; Agentic Enablement&lt;/LI&gt;
&lt;/UL&gt;
&lt;BLOCKQUOTE&gt;
&lt;H5&gt;&lt;EM&gt;Microsoft has a long-standing partnership with DOE, NNSA, and the National Laboratories to accelerate national security, scientific research, nuclear capabilities, and artificial intelligence. &lt;/EM&gt;&lt;/H5&gt;
&lt;H5&gt;&lt;EM&gt;&lt;STRONG&gt;Here are a few existing partnerships that Microsoft expects to grow in light of the Genesis Mission:&lt;/STRONG&gt;&lt;/EM&gt;&lt;/H5&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H2&gt;Accelerating Materials Science Discovery with Pacific Northwest National Laboratory&lt;/H2&gt;
&lt;P&gt;Materials science is foundational to many of the DOE’s mission priorities, including energy storage, advanced manufacturing, and sustainability. Through our partnership with &lt;STRONG&gt;Pacific Northwest National Laboratory (PNNL)&lt;/STRONG&gt;, Microsoft is helping demonstrate how AI can transform how materials are discovered and evaluated.&lt;/P&gt;
&lt;P&gt;Using , &lt;A href="https://www.pnnl.gov/pnnl-microsoft-collaboration" target="_blank" rel="noopener"&gt;Microsoft and PNNL&lt;/A&gt;&amp;nbsp; combined AI and HPC to screen &lt;STRONG&gt;more than 32 million inorganic material candidates &lt;/STRONG&gt;-&lt;STRONG&gt; &lt;/STRONG&gt;a task that would traditionally take many years using conventional methods. AI models rapidly narrowed this vast search space to a small set of promising materials, enabling PNNL researchers to experimentally synthesize and validate a previously unknown compound for potential battery applications.&lt;/P&gt;
&lt;P&gt;This collaboration illustrates how AI can:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Rapidly explore large scientific search spaces&lt;/LI&gt;
&lt;LI&gt;Prioritize the most promising candidates for laboratory validation&lt;/LI&gt;
&lt;LI&gt;Complement—not replace—the expertise of human scientists&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;By accelerating early‑stage discovery, this work supports the Genesis Mission’s objective to &lt;STRONG&gt;shorten scientific timelines while preserving rigorous experimental validation&lt;/STRONG&gt;.&lt;/P&gt;
&lt;H2&gt;Modernizing Nuclear Energy Workflows with Idaho National Laboratory&lt;/H2&gt;
&lt;P&gt;Advanced nuclear energy is a critical component of the nation’s long‑term energy strategy, and the DOE has emphasized the need to modernize processes that support reactor development and deployment.&lt;/P&gt;
&lt;P&gt;Microsoft is working with &lt;STRONG&gt;Idaho National Laboratory (INL)&lt;/STRONG&gt; to apply AI in a targeted, responsible way to &lt;STRONG&gt;streamline portions of the nuclear licensing and permitting workflow&lt;/STRONG&gt;. Preparing the engineering and safety analysis documentation required for regulatory review is labor‑intensive and time‑consuming. Together, Microsoft and INL are exploring how &lt;STRONG&gt;Azure AI&lt;/STRONG&gt; can assist by organizing and drafting documentation based on existing technical materials.&lt;/P&gt;
&lt;P&gt;Importantly:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;AI is used to &lt;STRONG&gt;support document generation&lt;/STRONG&gt;, not to perform safety analyses&lt;/LI&gt;
&lt;LI&gt;Human experts remain fully responsible for review, verification, and decision‑making&lt;/LI&gt;
&lt;LI&gt;The solution is designed to align with DOE and Nuclear Regulatory Commission requirements&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;By reducing administrative burdens, this collaboration helps engineers and scientists focus more of their time on technical innovation—directly supporting the Genesis Mission’s emphasis on &lt;STRONG&gt;accelerating energy innovation while maintaining the highest standards of safety and oversight&lt;/STRONG&gt;.&lt;/P&gt;
&lt;H2&gt;Secure AI Enablement for National Security Science at Sandia National Laboratories&lt;/H2&gt;
&lt;P&gt;For national security missions, AI adoption must meet stringent requirements for security, governance, and data protection.&lt;/P&gt;
&lt;P&gt;At &lt;STRONG&gt;Sandia National Laboratories&lt;/STRONG&gt;, Microsoft supported the deployment of a &lt;STRONG&gt;secure, private AI capability&lt;/STRONG&gt; built on &lt;STRONG&gt;Microsoft Azure and Azure OpenAI&lt;/STRONG&gt;. This solution enables Sandia personnel to use generative AI tools within a tightly controlled environment, ensuring that sensitive, unclassified data remains protected and isolated.&lt;/P&gt;
&lt;P&gt;The result is a practical example of how:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Enterprise‑grade AI can be deployed in high‑security government environments&lt;/LI&gt;
&lt;LI&gt;Scientists and staff can gain productivity benefits without compromising data protections&lt;/LI&gt;
&lt;LI&gt;Responsible AI practices can be operationalized at scale&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This work aligns directly with the Genesis Mission’s focus on ensuring that AI innovation for science is &lt;STRONG&gt;secure, trustworthy, and mission‑ready&lt;/STRONG&gt;.&lt;/P&gt;
&lt;H2&gt;Investing in Classified Cloud Capabilities for the Nation’s Most Sensitive Missions&lt;/H2&gt;
&lt;P&gt;Microsoft has made sustained, long-term investments in high security, classified cloud infrastructure to meet the U.S. government’s most stringent security and operational requirements.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Azure Government Secret and Azure Government Top Secret&lt;/STRONG&gt; are engineered to meet U.S. government requirements for classified data handling and enable government agencies and national laboratories to adopt cloud and AI technologies for sensitive scientific, energy, and national security missions without compromising security, compliance, or mission assurance.&lt;/P&gt;
&lt;H5&gt;Azure Government classified clouds ensures that the benefits of modern cloud and AI technologies are available for the full spectrum of government missions—supporting secure collaboration, operational resilience, and trusted innovation in alignment with the Genesis Mission’s objectives. A Responsible Path Forward for AI‑Powered Science&lt;/H5&gt;
&lt;P&gt;Across materials science, nuclear energy, and national security, Microsoft’s collaborations with the DOE National Laboratories demonstrate a common approach:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;AI augments scientific expertise&lt;/STRONG&gt;, rather than replacing it&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Security, compliance, and governance&lt;/STRONG&gt; are foundational, not afterthoughts&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Human‑in‑the‑loop workflows&lt;/STRONG&gt; remain central to decision‑making&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Cloud and AI platforms&lt;/STRONG&gt; are designed to scale across institutions and domains&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The Genesis Mission represents a new chapter in how the nation conducts science—one where AI is deeply integrated into research workflows to help scientists move faster, collaborate more effectively, and tackle increasingly complex challenges.&lt;/P&gt;
&lt;P&gt;Microsoft remains committed to working with the Department of Energy and its National Laboratories to ensure that AI is applied &lt;STRONG&gt;responsibly, securely, and in service of the public mission&lt;/STRONG&gt;—supporting American scientific leadership today and for decades to come.&lt;/P&gt;
&lt;H5&gt;&lt;BR /&gt;Join the Discussion:&lt;/H5&gt;
&lt;P&gt;Comment below or reach out to&amp;nbsp;&lt;A class="lia-external-url" href="mailto:genesismission@microsoft.com" target="_blank" rel="noopener"&gt;mailto:genesismission@microsoft.com&lt;/A&gt; for more information.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2026 16:44:13 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/public-sector-blog/genesis-mission-how-microsoft-the-u-s-department-of-energy/ba-p/4495259</guid>
      <dc:creator>hekobyls</dc:creator>
      <dc:date>2026-04-02T16:44:13Z</dc:date>
    </item>
    <item>
      <title>Azure Government or Azure Commercial for CJIS 6.0: Choosing Your Compliance Path</title>
      <link>https://techcommunity.microsoft.com/t5/public-sector-blog/azure-government-or-azure-commercial-for-cjis-6-0-choosing-your/ba-p/4494085</link>
      <description>&lt;P&gt;Since 2014, United States criminal justice agencies have trusted &lt;STRONG&gt;Microsoft Azure Government&lt;/STRONG&gt; to manage Criminal Justice Information (CJI). Built exclusively for regulated government data, it provides datacenters with physical, network, and logical isolation and is operated by CJIS-screened U.S. persons—the "gold standard" for compliance.&lt;/P&gt;
&lt;P&gt;However, we understand that flexibility is critical for modern agencies. As first announced with the release of CJIS Security Policy (CJISSECPOL) v5.9.1, agencies have the &lt;STRONG&gt;option&lt;/STRONG&gt; to utilize &lt;STRONG&gt;Azure Commercial&lt;/STRONG&gt; for CJIS workloads by leveraging advanced technical controls in place of traditional personnel screening.&lt;/P&gt;
&lt;P&gt;With the release of &lt;A href="https://le.fbi.gov/cjis-division/cjis-security-policy-resource-center" target="_blank" rel="noopener"&gt;CJIS Security Policy 6.0&lt;/A&gt;, this hybrid landscape has evolved. The new policy moves beyond simple access control toward a "Zero Trust" framework which minimizes implicit trust, verifies all requests, and requires continuous monitoring.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What’s New in CJIS 6.0?&lt;/STRONG&gt; The 6.0 update (released late 2024) is a modernization overhaul. Key changes include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Phishing-Resistant MFA:&lt;/STRONG&gt; Strict requirements for FIDO2 or certificate-based authentication for all privileged access.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Continuous Monitoring:&lt;/STRONG&gt; A shift from point-in-time audits to real-time threat detection and automated logging.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Supply Chain Risk Management:&lt;/STRONG&gt; Enhanced vetting of third-party software and vendors.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;The Choice: &lt;/STRONG&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/compliance/offerings/offering-cjis" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Azure Government or Azure Commercial&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt;:&lt;/STRONG&gt; Criminal Justice Agencies can still choose between our two distinct offerings, but the "How" of compliance differs:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Azure Government:&lt;/STRONG&gt; The path of personnel screening. Microsoft executes CJIS Management Agreements with state CJIS Systems Agencies that include their screening of Microsoft personnel. &amp;nbsp;This offers the broadest feature set with the simplest compliance burden.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Azure Commercial:&lt;/STRONG&gt; The path of technical controls. Because Azure Commercial support staff are not CJIS-screened, compliance relies on an agency implementing &lt;STRONG&gt;Customer Managed Keys (CMK) encryption&lt;/STRONG&gt;. This way, Microsoft &lt;EM&gt;cannot&lt;/EM&gt; access unencrypted criminal justice information, effectively removing Microsoft staff from the scope of trust.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;Our Commitment&lt;/STRONG&gt; Whether you choose the physically secure location of Azure Government or the global scale of Azure Commercial, Microsoft provides the tools—Entra ID, Azure Key Vault, and Microsoft Sentinel—to meet the rigorous demands of CJIS 6.0.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Step-by-Step Walkthrough for CJIS 6.0 in Azure Commercial&lt;/H3&gt;
&lt;P&gt;Managing CJI in Azure Commercial requires you to bridge the gap between "standard commercial security" and "CJIS compliance" using your own configurations. Because Microsoft Commercial staff are not CJIS-screened, &lt;STRONG&gt;you must ensure they can never see unencrypted data.&lt;/STRONG&gt;&lt;/P&gt;
&lt;H4&gt;Phase 1: Foundation &amp;amp; Residency&lt;/H4&gt;
&lt;P&gt;&lt;STRONG&gt;Step 1: Restrict Data Residency&lt;/STRONG&gt; CJIS 6.0 mandates that CJI must not leave the United States.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Action:&lt;/STRONG&gt; Deploy &lt;STRONG&gt;all Azure resources&lt;/STRONG&gt; (compute, storage, disks, networking, monitoring, logging, backups, etc.) exclusively in US regions (e.g., East US, West US, Central US).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Policy:&lt;/STRONG&gt; Use &lt;STRONG&gt;Azure Policy&lt;/STRONG&gt; to deny the creation of resources in non-US regions to prevent accidental drift.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;EM&gt;Documentation&lt;/EM&gt;&lt;EM&gt;:&lt;/EM&gt; &lt;A href="https://learn.microsoft.com/en-us/azure/governance/policy/tutorials/govern-tags" target="_blank" rel="noopener"&gt;Tutorial: Manage tag governance with Azure Policy&lt;/A&gt; (See the concept of "Allowed Locations" built-in policy).&lt;/P&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;EM&gt;Documentation: &lt;/EM&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/governance/policy/overview" target="_blank" rel="noopener"&gt;Azure Policy built-in definitions and assignment (Allowed locations)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;EM&gt;Documentation&lt;/EM&gt;&lt;EM&gt;:&lt;/EM&gt; &lt;A href="https://learn.microsoft.com/en-us/azure/governance/policy/samples/allowed-locations" target="_blank" rel="noopener"&gt;Details of the "Allowed locations" policy definition&lt;/A&gt;.&lt;/P&gt;
&lt;H4&gt;Phase 2: The "Technical Control" (Encryption)&lt;/H4&gt;
&lt;P&gt;&lt;EM&gt;This is the most critical step for Azure Commercial.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 2: Implement Customer Managed Keys (CMK)&lt;/STRONG&gt; To meet CJIS requirements in Azure Commercial, which is operated by Microsoft personnel who aren’t CJIS-screened, you must use encryption where &lt;EM&gt;you&lt;/EM&gt; hold the keys, and Microsoft has no access.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Action:&lt;/STRONG&gt; Provision &lt;STRONG&gt;Azure Key Vault (Premium)&lt;/STRONG&gt; or &lt;STRONG&gt;Managed HSM&lt;/STRONG&gt; for FIPS 140-2 Level 2/3 compliance.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;EM&gt;Documentation:&lt;/EM&gt; &lt;A href="https://azure.microsoft.com/en-us/pricing/details/key-vault/" target="_blank" rel="noopener"&gt;About Azure Key Vault Premium and HSMs&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;EM&gt;Documentation:&lt;/EM&gt; &lt;A href="https://learn.microsoft.com/en-us/azure/key-vault/managed-hsm/secure-managed-hsm" target="_blank" rel="noopener"&gt;Secure your Azure Managed HSM deployment&lt;/A&gt;.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Action:&lt;/STRONG&gt; Generate your encryption keys within your HSM or import them from on-premises.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;EM&gt;Documentation:&lt;/EM&gt; &lt;A href="https://learn.microsoft.com/en-us/azure/key-vault/keys/hsm-protected-keys-byok" target="_blank" rel="noopener"&gt;How to generate and transfer HSM-protected keys (BYOK)&lt;/A&gt;.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Action:&lt;/STRONG&gt; Configure &lt;STRONG&gt;Disk Encryption Sets&lt;/STRONG&gt; and &lt;STRONG&gt;Storage Account Encryption&lt;/STRONG&gt; to use these keys. &lt;EM&gt;Do not use the default "Microsoft Managed Key" setting.&lt;/EM&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;EM&gt;Documentation:&lt;/EM&gt; &lt;A href="https://learn.microsoft.com/en-us/azure/virtual-machines/disk-encryption" target="_blank" rel="noopener"&gt;Server-side encryption of Azure Disk Storage (CMK)&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;EM&gt;Documentation:&lt;/EM&gt; &lt;A href="https://learn.microsoft.com/en-us/azure/storage/common/customer-managed-keys-configure-existing-account" target="_blank" rel="noopener"&gt;Configure customer-managed keys for Azure Storage&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;EM&gt;Documentation&lt;/EM&gt;: &lt;A href="https://learn.microsoft.com/en-us/azure/security/fundamentals/encryption-customer-managed-keys-support" target="_blank" rel="noopener"&gt;Services that support customer-managed keys (CMKs)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 3: Client-Side Encryption (For SaaS/PaaS)&lt;/STRONG&gt; For data processing, encryption should happen &lt;EM&gt;before&lt;/EM&gt; data reaches Azure.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Action:&lt;/STRONG&gt; Ensure applications encrypt CJI at the application layer before writing to databases (SQL Azure, Cosmos DB). This ensures that even a database admin with platform access sees only ciphertext.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Step 3b: Protecting CJI While In Use (Confidential Compute) -&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Azure Commercial and Customer Managed Key (CMK) encryption satisfy the requirements of the CJIS Security Policy but customers can choose to add an additional control through a Confidential Computing enclave&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;CJIS Security Policy 6.0 requires that Criminal Justice Information be protected &lt;STRONG&gt;while at rest, in transit, and in use&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;In Azure Commercial, once CJI is decrypted for processing by an application, traditional encryption controls (including CMK) no longer protect the data from platform-level access risks such as memory inspection, diagnostics, or hypervisor operations.&lt;/LI&gt;
&lt;LI&gt;To address this risk, agencies may implement &lt;STRONG&gt;Azure Confidential Computing&lt;/STRONG&gt;, which uses hardware-backed Trusted Execution Environments (TEEs) to cryptographically isolate data in memory and prevent access by cloud provider personnel—even at the infrastructure layer.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;EM&gt;Documentation:&lt;/EM&gt; &lt;A href="https://learn.microsoft.com/en-us/azure/azure-sql/database/always-encrypted-azure-key-vault-configure?view=azuresql" target="_blank" rel="noopener"&gt;Always Encrypted for Azure SQL Database&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;EM&gt;Documentation:&lt;/EM&gt; &lt;A href="https://learn.microsoft.com/en-us/azure/cosmos-db/how-to-always-encrypted" target="_blank" rel="noopener"&gt;Client-side encryption for Azure Cosmos DB&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;EM&gt;Documentation&lt;/EM&gt;: &lt;A href="https://learn.microsoft.com/en-us/azure/confidential-computing/overview" target="_blank" rel="noopener"&gt;Confidential Computing&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;EM&gt;Documentation:&lt;/EM&gt; &lt;A href="https://learn.microsoft.com/en-us/azure/confidential-computing/overview-azure-products" target="_blank" rel="noopener"&gt;Confidential Compute Offerings&lt;/A&gt;&lt;/P&gt;
&lt;H4&gt;Phase 3: Identity &amp;amp; Access (CJIS 6.0 Focus)&lt;/H4&gt;
&lt;P&gt;&lt;STRONG&gt;Step 4: Phishing-Resistant MFA&lt;/STRONG&gt; CJIS 6.0 raises the bar for Multi-Factor Authentication (MFA). SMS and simple push notifications may no longer suffice for privileged roles.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Action:&lt;/STRONG&gt; Deploy &lt;STRONG&gt;Microsoft Entra ID (formerly Azure AD)&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;EM&gt;Documentation:&lt;/EM&gt; &lt;A href="https://learn.microsoft.com/en-us/entra/fundamentals/whatis" target="_blank" rel="noopener"&gt;What is Microsoft Entra ID?&lt;/A&gt;.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Action:&lt;/STRONG&gt; Enforce &lt;STRONG&gt;FIDO2 security keys&lt;/STRONG&gt; (like YubiKeys) or &lt;STRONG&gt;Certificate-Based Authentication (CBA)&lt;/STRONG&gt; for all users accessing CJI.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;EM&gt;Documentation:&lt;/EM&gt; &lt;A href="https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-enable-passkey-fido2" target="_blank" rel="noopener"&gt;Enable passkeys (FIDO2) for your organization&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;EM&gt;Documentation:&lt;/EM&gt; &lt;A href="https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-certificate-based-authentication" target="_blank" rel="noopener"&gt;How to configure Certificate-Based Authentication in Entra ID&lt;/A&gt;.&lt;/P&gt;
&lt;H4&gt;Phase 4: Continuous Monitoring&lt;/H4&gt;
&lt;P&gt;&lt;STRONG&gt;Step 5: Unified Audit Logging&lt;/STRONG&gt; You must retain audit logs for at least one year (or longer depending on state rules) and review them weekly.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Action:&lt;/STRONG&gt; Enable &lt;STRONG&gt;Diagnostic Settings&lt;/STRONG&gt; on all CJIS resources to stream logs to an &lt;STRONG&gt;Azure Log Analytics Workspace&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;EM&gt;Documentation:&lt;/EM&gt; &lt;A href="https://learn.microsoft.com/en-us/azure/azure-monitor/essentials/diagnostic-settings" target="_blank" rel="noopener"&gt;Create diagnostic settings in Azure Monitor&lt;/A&gt;.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Action:&lt;/STRONG&gt; Deploy &lt;STRONG&gt;Microsoft Sentinel&lt;/STRONG&gt; on top of Log Analytics.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;EM&gt;Documentation:&lt;/EM&gt; &lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/quickstart-onboard" target="_blank" rel="noopener"&gt;Quickstart: Onboard Microsoft Sentinel&lt;/A&gt;.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Action:&lt;/STRONG&gt; Configure Sentinel analytic rules to detect anomalies (e.g., "Mass download of CJI," "Access from foreign IP").&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;EM&gt;Documentation:&lt;/EM&gt; &lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/detect-threats-built-in" target="_blank" rel="noopener"&gt;Detect threats out-of-the-box with Sentinel analytics rules&lt;/A&gt;.&lt;/P&gt;
&lt;H4&gt;Phase 5: Endpoint &amp;amp; Mobile&lt;/H4&gt;
&lt;P&gt;&lt;STRONG&gt;Step 6: Mobile Device Management (MDM)&lt;/STRONG&gt; If CJI is accessed on mobile devices (MDTs, tablets), CJIS 6.0 requires remote wipe and encryption capability.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Action:&lt;/STRONG&gt; Enroll devices in &lt;STRONG&gt;Microsoft Intune&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;EM&gt;Documentation:&lt;/EM&gt; &lt;A href="https://learn.microsoft.com/en-us/mem/intune/enrollment/windows-enroll" target="_blank" rel="noopener"&gt;Enroll Windows devices in Intune&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;EM&gt;Documentation:&lt;/EM&gt; &lt;A href="https://learn.microsoft.com/en-us/mem/intune/enrollment/ios-enroll" target="_blank" rel="noopener"&gt;Enroll iOS/iPadOS devices in Intune&lt;/A&gt;.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Action:&lt;/STRONG&gt; Create a Compliance Policy requiring &lt;STRONG&gt;BitLocker/FileVault encryption&lt;/STRONG&gt; and &lt;STRONG&gt;complex PINs&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;EM&gt;Documentation:&lt;/EM&gt; &lt;A href="https://learn.microsoft.com/en-us/mem/intune/protect/create-compliance-policy" target="_blank" rel="noopener"&gt;Create a compliance policy in Microsoft Intune&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;EM&gt;Documentation:&lt;/EM&gt; &lt;A href="https://learn.microsoft.com/en-us/mem/intune/protect/encrypt-devices" target="_blank" rel="noopener"&gt;Manage BitLocker policy for Windows devices with Intune&lt;/A&gt;.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Action:&lt;/STRONG&gt; Configure "App Protection Policies" to ensure CJI cannot be copied/pasted into unmanaged apps (like personal email).&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;EM&gt;Documentation:&lt;/EM&gt; &lt;A href="https://learn.microsoft.com/en-us/mem/intune/apps/app-protection-policy" target="_blank" rel="noopener"&gt;App protection policies overview&lt;/A&gt;.&lt;/P&gt;
&lt;H4&gt;Phase 6: Personnel &amp;amp; Documentation&lt;/H4&gt;
&lt;P&gt;&lt;STRONG&gt;Step 7: Update your SEIP/SSP&lt;/STRONG&gt; Since you are using Azure Commercial, your System Security Plan (SSP) must explicitly state that you are using &lt;STRONG&gt;encryption&lt;/STRONG&gt; as the compensating control for the lack of vendor personnel screening.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Action:&lt;/STRONG&gt; Document the CMK architecture in your CJIS audit packet.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Action:&lt;/STRONG&gt; Ensure your agency's "CJI Administrators" (who manage the Azure keys) have met the policy’s personnel screening requirements&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;EM&gt;Documentation:&lt;/EM&gt; &lt;A href="https://learn.microsoft.com/en-us/azure/compliance/offerings/offering-cjis" target="_blank" rel="noopener"&gt;Microsoft CJIS Audit Scope &amp;amp; Personnel Screening (Reference)&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Mar 2026 17:37:40 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/public-sector-blog/azure-government-or-azure-commercial-for-cjis-6-0-choosing-your/ba-p/4494085</guid>
      <dc:creator>Mike Smucny</dc:creator>
      <dc:date>2026-03-27T17:37:40Z</dc:date>
    </item>
    <item>
      <title>From SOP Overload to Simple Answers: Building Q&amp;A Agents With SharePoint Online + Agent Builder</title>
      <link>https://techcommunity.microsoft.com/t5/public-sector-blog/from-sop-overload-to-simple-answers-building-q-a-agents-with/ba-p/4490495</link>
      <description>&lt;P&gt;Turning SOPs Into Simple Q&amp;amp;A Agents is possibly one of the fastest wins for public‑sector teams. Take the SOPs and guidance you already have, upload them to SharePoint Online (what's that? they're already there? I know!). Then, create an agent using nothing but descriptive natural language. No code. No connectors. No fuss. (&lt;EM&gt;Disclaimer: &lt;/EM&gt;&lt;EM&gt;these claims are the author's personal boasts, not all use cases or requirements will match this example and therefore these statements are not legally binding&amp;nbsp;&lt;/EM&gt;🤣)&lt;/P&gt;
&lt;P&gt;Employees can then ask natural‑language questions such as:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;What are the steps for the annual review process?&lt;/LI&gt;
&lt;LI&gt;Do I need an attachment for a proposal amendment?&lt;/LI&gt;
&lt;LI&gt;How do I request parental leave?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The agent reads the SOPs, process manuals, and guidance documents and returns clear, plain‑language answers grounded in official policy. (see &lt;EM&gt;Marketing Review Agent &lt;/EM&gt;example below)&lt;/P&gt;
&lt;P&gt;No workflow building.&lt;/P&gt;
&lt;P&gt;No complex setup.&lt;/P&gt;
&lt;P&gt;Just natural language in, natural language out.&lt;/P&gt;
&lt;H2&gt;Using the &lt;STRONG&gt;Marketing Review Agent&lt;/STRONG&gt; to approve this blog post&lt;/H2&gt;
&lt;P&gt;As a Microsoft employee, on this blog, I have to get approval when publishing content about our products. This process requires human intervention and multiple reviews: Draft the article, submit it to Legal, wait for someone's workload to clear so they can review it, receive feedback, make changes, submit again.&lt;/P&gt;
&lt;P&gt;But the documentation is there. Dozens of word documents and PDFs that say what I can post, what I can't post, when I need to get review, when I need approval from customers. Over and over, this process must be followed exactly and without fail. By people who simply don't have the energy to be as careful as we should in the review of the policies.&lt;/P&gt;
&lt;P&gt;Microsoft's &lt;STRONG&gt;Marketing Review Agent&lt;/STRONG&gt; removes any potential bottlenecks. For example, I wrote this blog at 2:30am, submitted it to the Marketing Review Agent at 2:47, and was editing it at 2:52. Not even one day to turn around the edits and publish the blog post, in what could possibly have taken weeks.&lt;/P&gt;
&lt;img&gt;This is an actual screenshot from the Marketing Review Agent's feedback on this very blog post&lt;/img&gt;
&lt;P&gt;Compliance documents, stored in SharePoint, are the sole source of truth for the agent, and plain language instructions ensure each time the agent evaluates a blog it does so exactly the same way - over and over and over ... was there a policy change? Marketing simply updates the knowledge sources, the agent immediately applies the change to the next review it makes.&lt;/P&gt;
&lt;P&gt;New social media types?&lt;/P&gt;
&lt;P&gt;New instructions?&lt;/P&gt;
&lt;P&gt;New NDA policies?&lt;/P&gt;
&lt;P&gt;New human intervention requirements?&lt;/P&gt;
&lt;P&gt;Thousands of employees have the opportunity to take advantage of this agent without having to know the policies.&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;STRONG&gt;Disclaimer: AI assists but does not replace compliance officers or legal determination processes.&lt;/STRONG&gt; The Marketing Review Agent ensures timely delivery of content for public consumption, but also recognizes some situations require human intervention. End users are ultimately responsible for the results of AI generated content, as that content may be inaccurate - I know this because the Marketing Review Agent told me, multiple&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;The structure of the review comes from the &lt;STRONG&gt;agent’s natural language instructions&lt;/STRONG&gt;, ensuring every submitted draft receives the same consistent, policy‑aligned review—without the author crafting prompts.&lt;/P&gt;
&lt;P&gt;This same pattern applies across government scenarios - simply provide your SOPs as knowledge to an agent and ease the burden of human intervention, giving employees the ability to run their first pass on these type of scenarios:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Proposal compliance&lt;/LI&gt;
&lt;LI&gt;HR guidance updates&lt;/LI&gt;
&lt;LI&gt;Program office communications&lt;/LI&gt;
&lt;LI&gt;Grant compliance&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Requirements and features may vary, but anywhere teams need a consistent, repeatable check against policy, this agent pattern may fit.&lt;/P&gt;
&lt;H2&gt;Join Us in Arlington&lt;/H2&gt;
&lt;P&gt;We’re hosting the &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/publicsectorblog/m365-copilot-agent-a-thon-coming-to-arlington-va/4488282" target="_blank" rel="noopener" data-lia-auto-title="M365 Copilot Agent‑a‑thon in Arlington February 26" data-lia-auto-title-active="0"&gt;M365 Copilot Agent‑a‑thon in Arlington February 26&lt;/A&gt;, an interactive event for public‑sector teams.&lt;/P&gt;
&lt;P&gt;You’ll get hands on with M365 copilot and learn to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Build agents using natural language&lt;/LI&gt;
&lt;LI&gt;Connect them to SOPs, policies, and guidance in SharePoint Online&lt;/LI&gt;
&lt;LI&gt;Create Q&amp;amp;A and document‑review agents&lt;/LI&gt;
&lt;LI&gt;Learn best practices for accuracy and governance&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If your organization is buried in SOPs and process documents, this is the fastest way to turn them into service agents your workforce can actually use.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2026 21:01:27 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/public-sector-blog/from-sop-overload-to-simple-answers-building-q-a-agents-with/ba-p/4490495</guid>
      <dc:creator>jay_leask</dc:creator>
      <dc:date>2026-01-29T21:01:27Z</dc:date>
    </item>
    <item>
      <title>Upcoming M365 Copilot Government Roadshow Dates</title>
      <link>https://techcommunity.microsoft.com/t5/public-sector-blog/upcoming-m365-copilot-government-roadshow-dates/ba-p/4489799</link>
      <description>&lt;P&gt;There’s never been a more exciting time to explore what Microsoft 365 Copilot and agentic AI can do for your organization. To help you build momentum, sharpen skills, and accelerate real adoption, we’re rolling out a series of immersive, hands‑on experiences across multiple cities. These sessions are designed to help teams move beyond the basics and start building high‑impact solutions that transform the way they work.&lt;/P&gt;
&lt;P&gt;Below is an overview of three upcoming events—each offering deep technical learning, practical exercises, and direct guidance from Microsoft experts. Choose the session and location that best aligns with your goals and join us for an experience that will elevate your Copilot journey.&lt;/P&gt;
&lt;H4&gt;February 24, 2026 — Malvern, PA&lt;/H4&gt;
&lt;H5&gt;M365 Copilot Prompt‑a‑thon&lt;/H5&gt;
&lt;P&gt;&lt;A href="https://cloudevents.microsoft.com/en/event/microsoft_365_copilot_prompt-a-thon_malvern_24thFebruary" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Register here&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;The Malvern Prompt‑a‑thon is an in‑depth, hands‑on exploration of how to write high‑quality prompts that drive meaningful results with M365 Copilot. This workshop is ideal for business users in any department, technical roles, and leaders seeking to develop repeatable prompting practices that elevate productivity across their teams.&lt;/P&gt;
&lt;P&gt;During the session, attendees will:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Work through real business scenarios using Microsoft 365 Copilot across apps like Word, Excel, Teams, and Outlook.&lt;/LI&gt;
&lt;LI&gt;Learn the underlying structure of effective prompts, including clarity, sequencing, grounding, and constraints.&lt;/LI&gt;
&lt;LI&gt;Experiment with advanced techniques such as role prompting, iterative refinement, and context‑building strategies.&lt;/LI&gt;
&lt;LI&gt;Compare and analyze sample prompts to understand what improves—or diminishes—Copilot’s output.&lt;/LI&gt;
&lt;LI&gt;Receive hands‑on coaching from Microsoft Cloud Solution Architects and specialists.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Participants will leave with a library of reusable prompt patterns, a clearer understanding of Copilot capabilities, and the confidence to train and influence their own business units. Seats are limited to ensure an interactive workshop environment.&lt;/P&gt;
&lt;H4&gt;February 26, 2026 — Arlington, VA&lt;/H4&gt;
&lt;H5&gt;Agent‑a‑thon&lt;/H5&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://msevents.microsoft.com/event?id=1176790362" target="_blank"&gt;&lt;STRONG&gt;Register here&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;The Arlington Agent‑a‑thon focuses on the next phase of Copilot maturity: building agentic AI solutions. This session is designed for teams looking to go beyond prompts and begin assembling automated workflows, custom copilots, and intelligent agents using Microsoft’s latest development tooling.&lt;/P&gt;
&lt;P&gt;Throughout the event, participants will:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Explore the fundamentals of agentic AI and how agents differ from traditional automation or prompting.&lt;/LI&gt;
&lt;LI&gt;Learn how to design AI agents that can reason, execute tasks, integrate with enterprise data, and coordinate across systems.&lt;/LI&gt;
&lt;LI&gt;Use Microsoft’s newest frameworks and tooling to build functional agents—no advanced coding experience required.&lt;/LI&gt;
&lt;LI&gt;Work hands‑on with Copilot Studio, connectors, actions, and orchestration patterns.&lt;/LI&gt;
&lt;LI&gt;Review best practices for security, governance, and responsible AI when deploying agentic solutions at scale.&lt;/LI&gt;
&lt;LI&gt;Develop a roadmap that identifies practical, high‑impact agent opportunities within their own organizations.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;By the end of the session, attendees will have built real working agent prototypes and will understand how to expand these solutions into production‑ready assets across their digital estate.&lt;/P&gt;
&lt;H4&gt;March 4, 2026 — Chicago, IL&lt;/H4&gt;
&lt;H5&gt;M365 Copilot Prompt‑a‑thon&lt;/H5&gt;
&lt;P&gt;&lt;A href="https://cloudevents.microsoft.com/en/event/microsoft_365_copilot_prompt-a-thon_government_roadshow_chicago_4thMarch" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Register here&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;The Chicago event offers an expanded, immersive Prompt‑a-thon experience tailored for organizations looking to advance both prompting skills and agentic Copilot solutions. Taking place in downtown Chicago, this full‑day session blends hands‑on labs, collaborative challenges, and expert‑led instruction.&lt;/P&gt;
&lt;P&gt;Participants can expect to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Build prompts for real‑world workflows across Microsoft 365 apps, including synthesis, data analysis, content generation, and decision support.&lt;/LI&gt;
&lt;LI&gt;Work through guided labs that highlight best practices for grounding Copilot with reliable enterprise data.&lt;/LI&gt;
&lt;LI&gt;Learn how prompting and agentic patterns intersect—moving from single‑step prompts to multi‑step autonomous workflows.&lt;/LI&gt;
&lt;LI&gt;Participate in a team‑based challenge designed to simulate cross‑functional AI solution development.&lt;/LI&gt;
&lt;LI&gt;Engage directly with Microsoft AI engineers, architects, and product specialists.&lt;/LI&gt;
&lt;LI&gt;Compare approaches with peer organizations and share adoption strategies, governance lessons, and value‑tracking methods.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This session is ideal for organizations looking to accelerate Copilot adoption through structured hands‑on experience, cross‑team collaboration, and practical solution building. Seating is intentionally limited to maintain a workshop‑driven format.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jan 2026 16:21:14 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/public-sector-blog/upcoming-m365-copilot-government-roadshow-dates/ba-p/4489799</guid>
      <dc:creator>Abby_Quinn</dc:creator>
      <dc:date>2026-01-28T16:21:14Z</dc:date>
    </item>
    <item>
      <title>M365 Copilot Agent-a-thon Coming to Arlington, VA</title>
      <link>https://techcommunity.microsoft.com/t5/public-sector-blog/m365-copilot-agent-a-thon-coming-to-arlington-va/ba-p/4488282</link>
      <description>&lt;H3&gt;&lt;SPAN data-contrast="auto"&gt;Join Us In-Person on February 26, 2026 – Arlington, VA&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Ready to boost your productivity, streamline mission workflows, and get hands-on with the&amp;nbsp;latest in&amp;nbsp;Microsoft 365 AI?&amp;nbsp;We’re&amp;nbsp;excited to invite government employees to an immersive,&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;in-person&amp;nbsp;Agentathon&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;at the&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Washington DC Microsoft Innovation Hub&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;on&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Thursday, February 26, 2026&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;, from&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;9:00 AM to 4:00 PM (EST)&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This highly interactive event is designed specifically to help government teams unlock the potential of&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;agents in Microsoft 365 Copilot (GCCaligned)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;—and transform real mission work into repeatable, instruction-driven&amp;nbsp;assistance.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://msevents.microsoft.com/event?id=1176790362" target="_blank"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Register now — space is very limited!&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;H4&gt;&lt;SPAN data-contrast="auto"&gt;Why You Should Attend&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Modern government work demands more agility, smarter processes, and tools that help teams stay ahead of mission needs. This session focuses on exactly that—&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;personal productivity agents built within Microsoft 365&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; that connect your&amp;nbsp;natural language&amp;nbsp;instructions with your organization’s existing data.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;You’ll&amp;nbsp;walk away with clarity on:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: bold;" aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;When to use M365 Copilot vs. agents&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI style="font-weight: bold;" aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;How to design instruction-driven agents&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI style="font-weight: bold;" aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;How to turn common workflows into repeatable AI powered patterns&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI style="font-weight: bold;" aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;What capabilities exist today in GCC, GCC High, and DoD—plus&amp;nbsp;what’s&amp;nbsp;coming next&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Our Microsoft experts and coaches will guide&amp;nbsp;you&amp;nbsp;every step of the way.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;SPAN data-contrast="auto"&gt;What&amp;nbsp;You’ll&amp;nbsp;Do&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Collaborate&amp;nbsp;with Government Peers &amp;amp; Microsoft Experts&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Work together to explore agent concepts, compare approaches, and hone instruction patterns using government-aligned Microsoft 365 capabilities.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Hands-On Agent Building&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Draft agent instructions,&amp;nbsp;validate&amp;nbsp;inputs, define success measures, and refine solutions through real-world scenario-focused exercises.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Interactive Learning &amp;amp; Real Examples&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;See how agents fit across Microsoft 365, how they extend personal productivity, and how to map mission workflows into AI-driven guidance.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Breakout Sessions&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Small-group coaching sessions help you sharpen your scenario, simplify your design, and accelerate your build.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;SPAN data-contrast="auto"&gt;What&amp;nbsp;You’ll&amp;nbsp;Learn&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;What to use when:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;Make clear decisions on when&amp;nbsp;M365&amp;nbsp;Copilot fits your&amp;nbsp;need—and when an agent is the stronger choice.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Personal Productivity Agent Design:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Learn how natural language + your Microsoft 365 data = faster, more consistent work.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Cross Agency Best Practices:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Share designs, trade insights, and&amp;nbsp;take home&amp;nbsp;reusable patterns you can apply&amp;nbsp;immediately&amp;nbsp;in your environment.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This is your opportunity to level up your AI&amp;nbsp;expertise—at no&amp;nbsp;additional&amp;nbsp;cost.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;SPAN data-contrast="auto"&gt;Agenda Snapshot&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;09:00 – 09:30&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;Arrival &amp;amp; Networking&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;09:30 – 10:00&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;State of AI in Government&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;10:00 – 10:45&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Agents in Microsoft 365: What They Are + What to Use When&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;10:45 – 12:00&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Breakouts: Scenario Selection + Instruction Patterns&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;12:00 – 01:00&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Lunch &amp;amp; Build Sprint&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;01:00 – 02:30&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Breakouts: Build, Refine &amp;amp; Test&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;02:30 – 02:45&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Break&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;02:45 – 03:45&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; Share Out: Your Agent + Reusable Patterns&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;03:45 – 04:00&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Wrap-Up &amp;amp; Next Steps&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;SPAN data-contrast="auto"&gt;Location&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft Innovation Hub – Washington, D.C.&lt;/SPAN&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;1300 Wilson Blvd, 14th Floor&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;Arlington, VA 22209&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;SPAN data-contrast="auto"&gt;Important Notes&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Registration is processed&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;first come, first served&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Due to limited capacity (~30 participants),&amp;nbsp;you’ll&amp;nbsp;be&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;automatically waitlisted&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;&amp;nbsp;upon registration.&lt;/STRONG&gt; A confirmation email will follow within a few business days.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;All participants must adhere to the&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft Event Code of Conduct&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;:&lt;/SPAN&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;BR /&gt;&lt;A href="https://www.microsoft.com/en-us/events/codeofconduct?rtc=1" target="_blank"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;https://www.microsoft.com/en-us/events/codeofconduct?rtc=1&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Government employees should confirm participation&amp;nbsp;complies with&amp;nbsp;applicable organizational policies and laws.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;&lt;SPAN data-contrast="auto"&gt;Secure Your Spot Today&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Don’t&amp;nbsp;miss this opportunity to supercharge your personal productivity and learn how Microsoft 365 Copilot and agent capabilities can accelerate the mission each day.&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;&lt;A href="https://msevents.microsoft.com/event?id=1176790362" target="_blank"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Seats are limited—register now to save your place!&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jan 2026 20:05:54 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/public-sector-blog/m365-copilot-agent-a-thon-coming-to-arlington-va/ba-p/4488282</guid>
      <dc:creator>Abby_Quinn</dc:creator>
      <dc:date>2026-01-21T20:05:54Z</dc:date>
    </item>
    <item>
      <title>Where is the Teams Pay-As-You-Go Calling Plan for GCC Tenant License</title>
      <link>https://techcommunity.microsoft.com/t5/public-sector-local-state/where-is-the-teams-pay-as-you-go-calling-plan-for-gcc-tenant/m-p/4484516#M390</link>
      <description>&lt;P&gt;Currently we are using Direct Routing for Teams calling and want to transition to a Teams pay-as-you-go (PAYG) calling plan for GCC license. &amp;nbsp;Unfortunately, direct purchase through Microsoft 365 Admin Center "Microsoft Online Subscription Agreement" (MOSA) billing account is not available; and the license &lt;STRONG&gt;does not appear&lt;/STRONG&gt; on our reseller "Microsoft Customer Agreement" (MCA) billing account price list. &amp;nbsp;&lt;A href="https://www.microsoft.com/licensing/docs/documents/download/Modern%20Work%20FAQ_Microsoft%20Teams_July2024.pdf" target="_blank"&gt;Microsoft’s Modern Work FAQ – Microsoft Teams (&lt;/A&gt;https://www.microsoft.com/licensing/docs/documents/download/Modern%20Work%20FAQ_Microsoft%20Teams_July2024.pdf) (last updated July 29, 2024), item 103 states pay-as-you-go calling plan is available for GCC.&lt;/P&gt;&lt;P&gt;Has anyone successfully purchased a Teams PAYG calling plan for GCC license since the implementation of the new Microsoft billing experience?&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jan 2026 21:08:17 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/public-sector-local-state/where-is-the-teams-pay-as-you-go-calling-plan-for-gcc-tenant/m-p/4484516#M390</guid>
      <dc:creator>ksalvail</dc:creator>
      <dc:date>2026-01-09T21:08:17Z</dc:date>
    </item>
  </channel>
</rss>

