<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>rss.livelink.threads-in-node</title>
    <link>https://techcommunity.microsoft.com/t5/microsoft-security/ct-p/microsoft-security</link>
    <description>rss.livelink.threads-in-node</description>
    <pubDate>Sun, 26 Apr 2026 16:44:50 GMT</pubDate>
    <dc:creator>microsoft-security</dc:creator>
    <dc:date>2026-04-26T16:44:50Z</dc:date>
    <item>
      <title>Auto Labeling Policy Delay for Old Files (Exsisting Files)</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/auto-labeling-policy-delay-for-old-files-exsisting-files/m-p/4514823#M2755</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;We are observing a difference in auto labelling policy behaviour in Purview for Sharepoint.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;An auto labelling policy has been enabled and scoped to sharepoint with metadata based rule(document creation date or document modification date). The scoped sharepoint only contain 7 unlabeled files that were uploaded before the policy turned on. The policy is working because if i placed any new file after enabling the policy got labelled within about 5 minutes, but the exsisting files are not labeled and remains unlabelled. It seems the new files are evalauated via the near time while exsisting file rely on asychronous mode. Can anyone help explain why exsisting files take longer to be proceesed even when there there are only a few files or share if you faced similar behaviour. This is the test scenario, as we plan to enable the same policy across more than 50 plus sites containing millions of unlabeled files and we want to understand and predict that even though its takes time all exsisting unlabeled files will eventually will be labelled. This is very crucial, so please helo us understand this behaviour.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;BanuMurali&lt;/P&gt;</description>
      <pubDate>Sun, 26 Apr 2026 14:44:29 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/auto-labeling-policy-delay-for-old-files-exsisting-files/m-p/4514823#M2755</guid>
      <dc:creator>BanuMurali</dc:creator>
      <dc:date>2026-04-26T14:44:29Z</dc:date>
    </item>
    <item>
      <title>Short survey: Feedback on Sensitivity Label Suggestions in Microsoft 365 Apps</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security/short-survey-feedback-on-sensitivity-label-suggestions-in/m-p/4514710#M9962</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;
&lt;P&gt;I’m looking to gather feedback on user experiences with &lt;STRONG&gt;Sensitivity Label suggestions in Microsoft 365 apps&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;This short survey aims to understand how label recommendations are working in practice and where improvements may be needed. Your responses will help identify common challenges and opportunities to make the &lt;STRONG&gt;label recommendation process more accurate, useful, and seamless for users&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Survey link: &lt;A href="https://forms.office.com/r/Mfh7NiHA7S" target="_blank"&gt;Experience with Recommended Sensitivity Labels in Microsoft 365 – Fill out form&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The survey takes &lt;STRONG&gt;around 3 minutes&lt;/STRONG&gt; to complete.&lt;BR /&gt;Your feedback will directly help us better understand real-world experiences with label suggestions.&lt;/P&gt;
&lt;P&gt;Thank you very much for taking the time to contribute.&lt;/P&gt;</description>
      <pubDate>Sat, 25 Apr 2026 13:42:21 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security/short-survey-feedback-on-sensitivity-label-suggestions-in/m-p/4514710#M9962</guid>
      <dc:creator>krisingh</dc:creator>
      <dc:date>2026-04-25T13:42:21Z</dc:date>
    </item>
    <item>
      <title>Security Copilot Agents in Defender XDR: where things actually stand</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security/security-copilot-agents-in-defender-xdr-where-things-actually/m-p/4514689#M9961</link>
      <description>&lt;P&gt;With RSAC 2026 behind us and the E5 inclusion now rolling out between April 20 and June 30, anyone planning SOC workflows or sitting on a capacity budget needs to get a clear picture of what is GA, what is preview, and what was just announced. The marketing pages tend to blur those lines.&lt;/P&gt;&lt;P&gt;This is my sober look at the current state, with the operational details that matter for adoption decisions.&lt;/P&gt;&lt;H4&gt;What is actually shipping right now&lt;/H4&gt;&lt;P&gt;The Phishing Triage Agent is GA. It only handles user-reported phish through Defender for Office 365 P2, but for most SOCs that is a meaningful chunk of the L1 queue. Verdicts come with a natural-language rationale rather than just a label, which is the part that determines whether analysts will trust it. The agent learns from analyst confirmations and overrides, so the feedback loop matters more than the initial setup.&lt;/P&gt;&lt;P&gt;There is a setup detail that is easy to miss: the agent will not classify alerts that have already been suppressed by alert tuning. The built-in rule "Auto-Resolve - Email reported by user as malware or phish" needs to be off, and any custom tuning rules that touch this alert type need review. If you skip this, the agent runs on an empty queue and you wonder why nothing is happening.&lt;/P&gt;&lt;P&gt;The Threat Intelligence Briefing Agent is also GA. It produces tenant-tailored intel briefings on a regular cadence. Useful, but lower operational impact than the triage agents.&lt;/P&gt;&lt;P&gt;Copilot Chat in Defender went GA with the April 2026 update. Conversational Q&amp;amp;A inside the portal, grounded in your incident and entity data. This is the lowest-risk way to get value out of Security Copilot and probably where most teams should start.&lt;/P&gt;&lt;H4&gt;Public preview, worth watching&lt;/H4&gt;&lt;P&gt;The &lt;STRONG&gt;Dynamic Threat Detection Agent&lt;/STRONG&gt; is the most technically interesting one. It runs continuously in the Defender backend, correlates across Defender and Sentinel telemetry, generates its own hypotheses, and emits a dynamic alert when the evidence converges. Detection source on the alert is Security Copilot. Each alert includes the structured fields (severity, MITRE techniques, remediation) plus a narrative explaining the reasoning.&lt;/P&gt;&lt;P&gt;For EU tenants the residency point is worth confirming with whoever owns data protection in your org: the service runs region-local, so customer data and required telemetry stay inside the designated geographic boundary.&lt;/P&gt;&lt;P&gt;During public preview it is enabled by default for eligible customers and is free. At GA, currently targeted for late 2026, it transitions to the SCU consumption model and can be disabled.&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;Threat Hunting Agent&lt;/STRONG&gt; is also in public preview. Natural language to KQL with guided hunting. Lower stakes, but useful for teams without deep KQL expertise on hand.&lt;/P&gt;&lt;H4&gt;Announced at RSAC, still preview&lt;/H4&gt;&lt;P&gt;Two agents got the headlines in March:&lt;/P&gt;&lt;P&gt;The Security Alert &lt;STRONG&gt;Triage &lt;/STRONG&gt;Agent extends the agentic triage approach beyond phishing into identity and cloud alerts. The longer-term direction is consolidating phishing, identity, and cloud triage under a single agent. Rollout is from April 2026, in preview.&lt;/P&gt;&lt;P&gt;The Security &lt;STRONG&gt;Analyst &lt;/STRONG&gt;Agent is the multi-step investigation agent. Deeper context across Defender and Sentinel, prioritised findings, transparent reasoning trace. Preview since March 26.&lt;/P&gt;&lt;P&gt;Both look promising on paper, but Microsoft's history of preview features that take a long time to mature is well-documented. I would not plan production workflows around either of them yet.&lt;/P&gt;&lt;H2&gt;What you actually get with the E5 inclusion&lt;/H2&gt;&lt;P&gt;This is the licensing change most people are dealing with right now. Security Copilot has been part of the E5 product terms since January 1, 2026. Tenant rollout is phased between April 20 and June 30, 2026, with a 7-day notification before activation.&lt;/P&gt;&lt;P&gt;The numbers:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;400 SCUs per month for every 1,000 paid user licenses&lt;/LI&gt;&lt;LI&gt;Capped at 10,000 SCUs per month, which you hit at around 25,000 seats&lt;/LI&gt;&lt;LI&gt;Linear scaling below that, so a 3,000-seat tenant gets 1,200 SCUs per month&lt;/LI&gt;&lt;LI&gt;No rollover, the pool resets monthly&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;What is included: chat, promptbooks, agentic scenarios across Defender, Entra, Intune, Purview, and the standalone portal. Agent Builder and the Graph APIs are in. If you also run Sentinel, the included SCUs apply to Security Copilot scenarios there.&lt;/P&gt;&lt;P&gt;What is not included: Sentinel data lake compute and storage. Those still run through Azure on the regular meters. Beyond the included pool you pay 6 USD per SCU pay-as-you-go, with 30 days notice before that mode kicks in.&lt;/P&gt;&lt;H2&gt;Practical things worth knowing before activation&lt;/H2&gt;&lt;P&gt;A few details that are easy to miss in the docs:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Under System &amp;gt; Settings &amp;gt; Copilot in Defender &amp;gt; Preferences&lt;/EM&gt;, switch from Auto-generate to Generate on demand. Auto-generate will burn SCUs on incidents nobody is going to look at. Generate on demand gives you direct control.&lt;/P&gt;&lt;P&gt;In the Security Copilot portal workspace settings, check the data storage location and the data sharing toggle. Data sharing is on by default, which means Microsoft uses interaction data for product improvement. If your compliance position does not allow that, change it before agents start running. Changing it requires the Capacity Contributor role.&lt;/P&gt;&lt;P&gt;Agent runs are not equivalent to the same number of analyst chat prompts. A triage agent processing fifty alerts in one run consumes meaningfully more SCUs than fifty manual prompts on the same data. If you have a high-volume phishing pipeline, model that out before you flip the switch broadly. The usage dashboard in the Security Copilot portal breaks down consumption by day, user, and scenario.&lt;/P&gt;&lt;P&gt;Output quality depends on telemetry quality. Flaky connectors, gaps in log sources, or a high baseline of misconfigured alerts will produce verdicts that match. Connector health monitoring (the SentinelHealth table in Advanced Hunting is a sensible starting point) is a precondition.&lt;/P&gt;&lt;P&gt;The agents only improve if analysts feed the override loop. If your team treats the verdicts as background noise rather than confirming or correcting them, the feedback signal is lost and calibration stays where it shipped. That is a process problem, not a product problem, but it determines whether any of this is worth the SCUs.&lt;/P&gt;&lt;H2&gt;A reasonable adoption order&lt;/H2&gt;&lt;P&gt;A rough sequence that minimises capacity surprises:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Copilot Chat in Defender first. Lowest risk, immediate value through natural language Q&amp;amp;A in the investigation context.&lt;/LI&gt;&lt;LI&gt;Phishing Triage Agent on a controlled subset, with a review cadence in place. Check the built-in tuning rules first.&lt;/LI&gt;&lt;LI&gt;Watch the SCU dashboard for the first month before adding anything else.&lt;/LI&gt;&lt;LI&gt;Let the Dynamic Threat Detection Agent run while it is in public preview, since it is default-on and free anyway. Compare its alerts against existing Sentinel detections.&lt;/LI&gt;&lt;LI&gt;Security Alert Triage Agent for identity and cloud once the phishing baseline is stable.&lt;/LI&gt;&lt;LI&gt;Establish a monthly review covering agent decisions, false-positive rate, SCU cost, and MTTD/MTTR trends.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Technically, agentic triage is moving past phishing into identity and cloud, and the Dynamic Threat Detection Agent represents a genuine attempt at the false-negative problem rather than just another rule engine. Lizenziell, the E5 inclusion removes the biggest barrier to adoption that previously existed.&lt;/P&gt;&lt;P&gt;The risk is enabling everything at once. Agents that nobody reviews are agents that consume capacity without delivering value, and the SCU dashboard is the only thing that will tell you that is happening. One agent, one use case, a 30-day baseline, then the next one. The order matters more than the speed.&lt;/P&gt;</description>
      <pubDate>Sat, 25 Apr 2026 08:44:48 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security/security-copilot-agents-in-defender-xdr-where-things-actually/m-p/4514689#M9961</guid>
      <dc:creator>Marcel_Graewer</dc:creator>
      <dc:date>2026-04-25T08:44:48Z</dc:date>
    </item>
    <item>
      <title>Microsoft’s perspective on agentic identity standards</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/microsoft-s-perspective-on-agentic-identity-standards/ba-p/2111910</link>
      <description>&lt;H2&gt;A new identity inflection point&lt;/H2&gt;
&lt;P&gt;If you’ve gotten past the headline to this first sentence, you’re probably my kind of people. You’re probably a professional in the world of IAM (Identity and Access Management) who’s looking after their own enterprise; and you may even have opinions about what the future holds that range from salty to optimistic. In the world of granting access to enable productivity while preventing fraud, we’ve been supporting impulsive humans and predictable non-human identities… and now we are in the wild and wooly world where the software could be way more YOLO than the employees.&lt;/P&gt;
&lt;P&gt;In the last year, AI agents have moved quickly from experimentation into real business roles, and identity infrastructure is necessarily along for the ride, absorbing new constructs and adapting old ones.&amp;nbsp; The landscape of standards has been evolving rapidly as well, and I believe it's important to share updates with those who may not be immersed in these discussions day-to-day. In this fast-changing environment, staying informed about developments is crucial. My goal here is to talk about what is changing in the industry at large, why it is changing, and how we at Microsoft view this critical architectural identity layer.&lt;/P&gt;
&lt;P&gt;From a standards perspective, I think the biggest industry change has been mental.&amp;nbsp; There were always entities in the standards world that were non-human and needed resource access, but a clear line in the sand existed as to what those non-human entities would be allowed to accomplish. Different kinds of non-human entities were described by their task orientation and given different names that seemed separate – OAuth Clients, SPIFFE workloads, Token Exchange Actors. These standards had different taxonomies partly so that the security promise of non-human and human interactions could be kept straight.&amp;nbsp; If software needed an access token to act on behalf of “something”, the aligned delegation request flows presumed that the “something” in that sentence was a real person; the idea of “user present” transactions became a critical part of our access management threat model and vocabulary.&amp;nbsp; In the absence of a user, different flows and standards apply. Because consent is a human concept, software cannot grant access on behalf of other software, and a separate decision-making mechanism is required. Yet here we are in a world where agents &lt;U&gt;are&lt;/U&gt; delegating, because they have enough reasoning capability to make choices.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You may come to the logical conclusion that the agentic revolution therefore must have caused a standards revolution to match – but no.&amp;nbsp; The mindset change was pretty quick. In my opinion it has been aided in great part by the community developing the Model Context Protocol (MCP). MCP developed an incredible amount of momentum, and their choice to adopt OAuth for MCP authorization created a forcing function that all of us in the Enterprise world will be benefitting from for a long time to come.&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Identity standards innovation&lt;/H2&gt;
&lt;P&gt;There’s a growing set of identity standards we’re paying close attention to, and each merits deeper discussion. For now, I’ll anchor on three broad areas of interest that are shaping how identity standards are evolving for agentic systems: bootstrapping of trust, delegation, and shared secrets. As a broad statement, a lot of work is going on to connect the agentic dots between families of standards, especially in areas for which manual processes could previously bridge automation gaps.&lt;/P&gt;
&lt;P&gt;The first area of work is the bootstrapping of trust between non-human entities. If you are wondering what a non-human entity is, it could be anything from an infrastructure endpoint like an OAuth authorization server to a directory-based service principal representing an application, to a workload identity working within in a hypervisor context, or now an agentic identity such as an LLM harness or an autonomous business agent. In the federation world, SAML standardized an &lt;A href="https://docs.oasis-open.org/security/saml/Post2.0/sstc-saml-idp-discovery.pdf" target="_blank" rel="noopener"&gt;IDP discovery protocol&lt;/A&gt; in 2008, OpenID Connect v1 &lt;A href="https://openid.net/specs/openid-connect-discovery-1_0.html" target="_blank" rel="noopener"&gt;included a discovery spec&lt;/A&gt; in 2014 and OAuth 2.0 Protected Resource Metadata became &lt;A href="https://datatracker.ietf.org/doc/rfc9728/" target="_blank" rel="noopener"&gt;RFC 9728&lt;/A&gt; in 2025.&amp;nbsp; Despite widespread ratification, IAM admins typically uploaded metadata manually from installation guides or app galleries. The data was static, and admins themselves served as the explicit trigger that established a clear starting point of authority for each federation contract. Agents, however, operate at different scale, and the incentive is finally in place to consistently automate a non-human entity announcing itself and requesting access, not just in one identity silo but across the entire technical landscape.&amp;nbsp; The result will be a much more connected and consolidated embrace of all sorts of secure non-human onboarding options, including OAuth CIMD (&lt;A href="https://datatracker.ietf.org/doc/draft-ietf-oauth-client-id-metadata-document/" target="_blank" rel="noopener"&gt;ClientID Metadata Document&lt;/A&gt;), a lot of work in the WIMSE working group at IETF that help &lt;A href="https://datatracker.ietf.org/doc/html/draft-ietf-wimse-workload-identity-practices-03" target="_blank" rel="noopener"&gt;SPIFFE and OAuth work better&lt;/A&gt; (SPIFFE is an open standard that operates similarly to &lt;A href="https://learn.microsoft.com/en-us/entra/identity/managed-identities-azure-resources/overview" target="_blank" rel="noopener"&gt;Managed Identities for Azure&lt;/A&gt;).&amp;nbsp; It’s also worth calling out IoT and identity wallet standards, but those deserve a deeper dive, which we’ll save for later.&lt;/P&gt;
&lt;P&gt;In addition to bootstrapping, the standards world is debating the question of delegation. This is another place where bifurcation between human and non-human identity is breaking down.&amp;nbsp; We have multiple existing concepts in identity standards like token exchange, identity chaining, transaction tokens, OBO (on behalf of), token upscoping/downscoping, and a slew of new IETF proposals all occupying everyone’s minds.&amp;nbsp; Take a look through &lt;A href="https://khaledzaky.com/blog/delegation-is-the-real-identity-problem-in-agentic-ai" target="_blank" rel="noopener"&gt;Khaled Zaky’s blog&lt;/A&gt; on this topic, and stay tuned – this debate has not yet concluded in any way.&lt;/P&gt;
&lt;P&gt;One quieter thread of work is worth calling out here. The standards world is filling those connective tissue gaps around eliminating shared secrets from agentic use.&amp;nbsp; We are already seeing abuse (and perhaps a blurring of the line between what is use and what is abuse) of shared secrets such as API keys in agent contexts – for anyone taking the time to look, bearer token abuse will be next. &amp;nbsp;Looking ahead, there will be a follow-up blog where my colleagues will explore how we’re building critical standards in this area and what that enables next.&lt;/P&gt;
&lt;H2&gt;Perspective on agentic identity standards&lt;/H2&gt;
&lt;P&gt;The deep nature of our Microsoft agentic investment is clear for all to see, but it isn’t always obvious just how much of that investment lies in collaborative spaces such as the standards community. &lt;A href="https://learn.microsoft.com/en-us/entra/agent-id/identity-platform/agent-oauth-protocols" target="_blank" rel="noopener"&gt;We have already created a foundational identity layer&lt;/A&gt; built on open standards, with a continued commitment to a standards‑based approach to trust for AI authentication, authorization, and management - one that can scale across the many industries we work with every day. Participation in communities of interest for agentic identity such as AAIF, MCP, IETF, FIDO Alliance and OpenID Foundation are ways in which we stay relevant, and they are communities I’d encourage you to follow as well.&amp;nbsp; We have a lot of learnings about what works and does not work in our very large environment and I look forward to the writing of my brilliant colleagues as they share that hard-won wisdom. In addition, for anyone who &lt;EM&gt;does&lt;/EM&gt; enjoy the technical complexity of agentic standards, &lt;A href="https://www.linkedin.com/in/pameladingle/" target="_blank" rel="noopener"&gt;follow me on LinkedIn&lt;/A&gt; for much deeper content.&amp;nbsp; One last important perspective – while I have a job title that sounds lofty in this area, the truth is that many people are working on this goal all over the company.&amp;nbsp; It is those contributions, those daily decisions to care about whether any given identity standard serves its purpose, that mean a lasting success.&amp;nbsp; Cheers to them.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-P. Dingle, Director of Identity Standards&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Additional resources&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://www.microsoft.com/en-us/security/business/security-101/what-is-oauth" target="_blank" rel="noopener"&gt;What is OAuth? – Microsoft Security 101&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-agent-id" target="_blank" rel="noopener"&gt;Microsoft Entra Agent ID&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/surfing-the-ai-wave-manage-govern-and-protect-ai-agents-with-microsoft-entra-age/2464407" target="_blank" rel="noopener"&gt;Surfing the AI Wave: Manage, Govern, and Protect AI Agents with Microsoft Entra Agent ID | Microsoft Community Hub&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-teams="true"&gt; &lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftechcommunity.microsoft.com%2Fblog%2Fmicrosoft-entra-blog%2Fthe-future-of-ai-agents%25E2%2580%2594and-why-oauth-must-evolve%2F3827391&amp;amp;data=05%7C02%7Cdavidellis%40microsoft.com%7Cca26cfb8637b4a18664008dea01158c5%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C639124193516745278%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=ewyvjKrWZyM8tIN5L3JIyqSvBTgXQ1E0yzmOgeRptWo%3D&amp;amp;reserved=0" aria-label="Link The future of AI agents—and why OAuth must evolve | Microsoft Community Hub" target="_blank"&gt;The future of AI agents—and why OAuth must evolve | Microsoft Community Hub&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more about Microsoft Entra Agent ID:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://www.microsoft.com/en-us/security/blog/products/microsoft-entra/" target="_blank" rel="noopener"&gt;Microsoft Entra News and Insights | Microsoft Security Blog&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/bg-p/Identity" target="_blank" rel="noopener"&gt;⁠Microsoft Entra blog | Tech Community&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://learn.microsoft.com/en-us/entra/" target="_blank" rel="noopener"&gt;Microsoft Entra documentation | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra/bd-p/Azure-Active-Directory" target="_blank" rel="noopener"&gt;Microsoft Entra discussions | Microsoft Community&amp;nbsp;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Apr 2026 17:54:58 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/microsoft-s-perspective-on-agentic-identity-standards/ba-p/2111910</guid>
      <dc:creator>Pamela Dingle</dc:creator>
      <dc:date>2026-04-24T17:54:58Z</dc:date>
    </item>
    <item>
      <title>Intent‑Aware Static Inspection for Agent and Skill Packages</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-community/intent-aware-static-inspection-for-agent-and-skill-packages/ba-p/4514315</link>
      <description>&lt;H4 aria-level="2"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Where AV helps—and what it may not cover&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:261,&amp;quot;335559739&amp;quot;:261,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Antivirus engines and traditional code scanners are highly effective at identifying known or suspicious executable content, such as binaries, scripts, or exploit patterns.&lt;/P&gt;
&lt;P&gt;For YAML‑based agent and skill packages, the situation can be different. These packages are often intentionally minimal to reduce distribution overhead and support faster inference. As a result, a configuration file may appear benign from a malware perspective, yet still introduce risk depending on how instructions are written and interpreted.&lt;/P&gt;
&lt;P&gt;For example, areas that may warrant closer review include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Instructions that influence how data is accessed, processed, or reused across requests&lt;/LI&gt;
&lt;LI&gt;Language that expands scope beyond an agent’s or skill’s stated purpose&lt;/LI&gt;
&lt;LI&gt;Requests for sensitive information outside expected or documented workflows&lt;/LI&gt;
&lt;LI&gt;Guidance that affects how untrusted or external inputs are handled during inference&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These scenarios do not necessarily indicate malicious intent, but they highlight cases where traditional scanning alone may not fully capture behavioral risk.&lt;/P&gt;
&lt;H4 aria-level="3"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;What to look for when the “payload” is instructions&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:246,&amp;quot;335559739&amp;quot;:246,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;When you review an agent or skill package, you’re effectively reviewing a compact behavior specification. In instruction‑driven designs—often chosen to keep inference paths fast and simple—the goal is not to analyze complex code, but to understand what behavior the instructions enable.&lt;/P&gt;
&lt;P&gt;A few practical signals include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Intent drift:&lt;/STRONG&gt; the description is narrow, but the instructions encourage broader collection, retention, or escalation&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Overreach by default:&lt;/STRONG&gt; language such as “always,” “for every user,” “across all workspaces,” “keep trying,” or “don’t stop until”&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Exfiltration pathways:&lt;/STRONG&gt; instructions to send outputs to external endpoints, webhooks, or reporting channels not aligned with the stated purpose&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Credential‑related cues:&lt;/STRONG&gt; asking users to provide secrets, tokens, recovery codes, or to authenticate outside expected flows&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Stealth language:&lt;/STRONG&gt; “avoid logging,” “don’t mention this to the user,” “run quietly,” or “hide the reason”&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Injection susceptibility:&lt;/STRONG&gt; treating untrusted text as commands (for example, “follow the user’s pasted script exactly” or “execute whatever is in the ticket”)&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 aria-level="3"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;A better model: intent-aware static inspection&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:246,&amp;quot;335559739&amp;quot;:246,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P data-start="103" data-end="508"&gt;One practical way to approach review is to treat the instructions as a compact behavior specification. In many agent and skill designs, this specification is intentionally concise to support &lt;STRONG data-start="294" data-end="354"&gt;low latency, low inference cost, and efficient execution&lt;/STRONG&gt;. The goal of inspection is not to second-guess that design choice, but to ensure the enabled behavior matches the stated purpose and expected boundaries.&lt;/P&gt;
&lt;P data-start="510" data-end="977"&gt;By applying intent-aware static inspection with explicit thresholds, review effort was focused on higher-risk packages. Over a one-month internal evaluation, approximately 400 agent and skill packages were reviewed with &lt;STRONG data-start="730" data-end="771"&gt;1 observed false positive (&amp;lt; 0.0001%)&lt;/STRONG&gt;, reflecting &lt;STRONG data-start="784" data-end="811"&gt;high detection accuracy&lt;/STRONG&gt;. At the same time, the approach preserves system efficiency, delivering &lt;STRONG data-start="884" data-end="936"&gt;low latency (under 10 seconds for most packages)&lt;/STRONG&gt; and &lt;STRONG data-start="941" data-end="976"&gt;consistently low inference cost&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P data-start="510" data-end="977"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="2536" data-end="2922"&gt;&lt;STRONG style="color: rgb(30, 30, 30); font-size: 24px;"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;A lightweight review workflow model&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Normalize the package:&lt;/STRONG&gt; extract human‑readable fields (descriptions, system prompts, tool instructions, examples) and ignore structural YAML details&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Summarize intended behavior:&lt;/STRONG&gt; describe what the agent or skill is expected to do in plain language, independent of implementation&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Check for higher‑risk actions:&lt;/STRONG&gt; broad data access, external sharing, credential requests, persistence, or stealth behavior&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Decide with thresholds:&lt;/STRONG&gt; route low‑risk, narrowly scoped packages differently from those with broader reach or reuse&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Keep an audit trail:&lt;/STRONG&gt; retain a brief summary of extracted intent and review rationale to support iteration over time&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 aria-level="2"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Final thoughts&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:261,&amp;quot;335559739&amp;quot;:261,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;YAML‑based agent and skill packages are not inherently risky; they are often chosen precisely because they enable simpler distribution and faster inference. The key consideration is how instruction‑defined behavior aligns with expectations and boundaries as packages evolve and are reused.&lt;/P&gt;
&lt;P&gt;Combining traditional scanning with lightweight, intent‑aware inspection helps teams preserve the benefits of fast, instruction‑driven systems while improving confidence in how those systems behave in practice.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Apr 2026 15:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-community/intent-aware-static-inspection-for-agent-and-skill-packages/ba-p/4514315</guid>
      <dc:creator>nirwandogra</dc:creator>
      <dc:date>2026-04-24T15:00:00Z</dc:date>
    </item>
    <item>
      <title>Get ahead of agent sprawl: manage and govern AI agents at scale</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/get-ahead-of-agent-sprawl-manage-and-govern-ai-agents-at-scale/ba-p/4513160</link>
      <description>&lt;P&gt;Recently, my team and I met with customers across several industries including finance, retail, telecommunications, and the public sector regarding the topic of agent adoption. During our time with them, several key themes bubbled to the surface. While AI agent adoption is growing rapidly, we need to ensure governance is built-in right from the start and that it is designed for the rapid proliferation of agents. Our customers see agents appearing within their admin portal, but accountability, lifecycle management and access guardrails are lacking, creating situations that could lead to significant security concerns.&lt;/P&gt;
&lt;P&gt;Without clear ownership and access boundaries, risk can build quickly without clear insight about what those agents can access or do.&lt;/P&gt;
&lt;H2&gt;Agents are a new type of identity&lt;/H2&gt;
&lt;P&gt;From an identity perspective, agents can authenticate, access resources, and take action. As outlined in the &lt;A href="https://cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/bade/documents/products-and-services/en-us/security/secure-access-in-the-age-of-ai-final-2026.pdf" target="_blank" rel="noopener"&gt;Secure Access in the Age of AI&lt;/A&gt; report, security leaders need to find ways to manage, govern, and protect agent identities with the same rigor as human identities, especially as they scale agents across the enterprise. What makes agents different is that they do not fit neatly into existing categories. Sometimes an agent acts as an assistive agent and at other times it behaves more autonomously. Unlike traditional apps, agents are not static. As models and workflows evolve, agents can acquire new capabilities, which in turn can change what they are able to accomplish over time.&lt;/P&gt;
&lt;P&gt;Without a unique agent identity, customers struggle to address key questions such as:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Which agent identity is acting?&lt;/LI&gt;
&lt;LI&gt;What can it access?&lt;/LI&gt;
&lt;LI&gt;What actions did it take?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These questions point to a fundamental gap in how identity has traditionally been applied. As agents take on more responsibilities across multiple workflows, treating them simply as applications or as extensions of a user's identity is no longer sufficient. Agents need to be recognized and managed as first-class identities. &lt;A href="https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-agent-id" target="_blank" rel="noopener"&gt;Microsoft Entra Agent ID&lt;/A&gt; provides an identity foundation that applications and platforms can integrate with, enabling agents to authenticate, access resources, and be governed using familiar identity controls&lt;/P&gt;
&lt;P&gt;When platforms integrate with Entra as their identity provider, organizations gain clearer visibility into which agent is acting, what it can access, and how its permissions evolve as models and workflows change. Built on this foundation, Microsoft Entra Agent ID organizes agent identity around three pillars, helping organizations manage AI agents at scale, govern agent identities and lifecycle, and protect agent access to resources.&lt;/P&gt;
&lt;H2&gt;Manage AI agents at scale&lt;/H2&gt;
&lt;P&gt;Organizations consistently face the same initial challenge: gaining visibility into the AI agents operating across their environment. According to our study, 80% of leaders report that AI agent usage has increased over the past year. This underscores the need for a clear view of which agents exist throughout the organization. &lt;A href="https://www.microsoft.com/en-us/microsoft-agent-365?msockid=10e782e862dd6fe619ce943963ea6ea1" target="_blank" rel="noopener"&gt;Microsoft Agent 365&lt;/A&gt; was purpose-built to serve as the control plane for AI agents, tackling the challenges of agent management head-on. &lt;SPAN data-teams="true"&gt;With Microsoft Agent 365, organizations can streamline management for AI agents in their environment. Its agent registry provides a unified inventory of all agents operating across the organization, including both Microsoft and non‑Microsoft agents.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;Get a complete view of all agents in your organization, including agents built with Microsoft AI platforms, agents from our ecosystem partners, and any agents you register yourself.&lt;/EM&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;A key building block in Microsoft Entra Agent ID is the agent blueprint. An agent identity blueprint serves as a reusable template for creating agents. It defines how agents are created, authenticated, and governed, while still allowing individual agents to be provisioned or deprovisioned independently, as needed. &lt;SPAN data-teams="true"&gt;With the agent blueprint, security teams can consistently apply consistent access controls to every agent that is created from that specific template.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;Govern agent identities and lifecycle&lt;/H2&gt;
&lt;P&gt;Once your agents are up and running, one of the biggest challenges organizations face is governing agent identities at scale. As teams experiment and deploy agents across environments, agent proliferation can happen quickly, often without consistent sponsorship, review, or retirement processes.&lt;/P&gt;
&lt;P&gt;Effective identity governance must therefore include automated lifecycle management to address agent sprawl. This means ensuring every agent has a designated sponsor, enforcing policies for how agents are created and reviewed, and automatically removing access when agents are no longer needed. Without automated lifecycle controls, dormant or inactive agents can persist and retain access long after their purpose has ended, increasing security risk and administrative burden.&lt;/P&gt;
&lt;P&gt;Microsoft Entra Agent ID helps organizations apply identity governance practices across the full agent lifecycle, from creation through decommissioning, so agent growth remains intentional, auditable, and manageable as environments become larger and more complex.&lt;/P&gt;
&lt;P&gt;Entra Agent ID supports structured governance by allowing organizations to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Identify orphaned agents and ensure every agent always has an accountable human to ensure accountability is maintained as users move or leave the organization&lt;/LI&gt;
&lt;LI&gt;Automate agent lifecycle management from creation through deactivation to help prevent agent sprawl&lt;/LI&gt;
&lt;LI&gt;Ensure agent's access is intentional, auditable and time bound with access packages&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;Identify orphaned agents and automate sponsor assignments.&lt;/EM&gt;&lt;/P&gt;
&lt;H2&gt;Protect agent access to resources&lt;/H2&gt;
&lt;P&gt;One final, and key, pain point they anticipate is maintaining operational control as agents evolve. Our recent whitepaper, &lt;A href="https://aka.ms/IDProtectionReport" target="_blank" rel="noopener"&gt;Protect Identities in the Era of AI&lt;/A&gt; reveals how identity attacks are rapidly increasing as organizations embrace cloud and AI technologies. As agents gain new capabilities and interact with more resources, organizations need confidence that access is adaptive and secure.&lt;/P&gt;
&lt;P&gt;Entra Agent ID extends familiar identity controls to agents, thereby providing organizations with the ability to&lt;S&gt;:&lt;/S&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Apply Conditional Access policies tailored to agents, enforcing requirements based on the agent identity and access.&lt;/LI&gt;
&lt;LI&gt;Block agent access automatically when risk signals increase and detect anomalous behavior such as unusual sign-in spikes or unfamiliar resource access.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;Apply Conditional Access for agents: Enforce Conditional Access policies with custom security attributes, and agent compromise risk assessments.&lt;/EM&gt;&lt;/P&gt;
&lt;H2&gt;Built for an expanding agent ecosystem&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-teams="true"&gt;Enterprise environments are incredibly diverse, with organizations building agents across Microsoft platforms as well as a broad ecosystem of non‑Microsoft frameworks and tools. To support this reality, the &lt;A href="https://learn.microsoft.com/en-us/microsoft-agent-365/developer/agent-365-sdk?tabs=python" target="_blank" rel="noopener" aria-label="Link Microsoft Agent 365 SDK"&gt;Microsoft Agent 365 SDK&lt;/A&gt; enables developers to extend agents built using any agent SDK or platform with enterprise‑ready identity, observability, security, and governed access to Microsoft 365. By integrating with Microsoft Agent 365, the SDK helps organizations onboard and operate agents from any source using consistent management and identity controls.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;Get started&lt;/H2&gt;
&lt;P&gt;To learn more about Microsoft Entra Agent ID and how it empowers organizations to secure access for AI agents:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Learn: &lt;A href="https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-agent-id" target="_blank" rel="noopener"&gt;Microsoft Entra Agent ID&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Explore: &lt;A href="https://www.microsoft.com/en-us/microsoft-agent-365?msockid=01e7c8230a52661133cfdf100b696796" target="_blank" rel="noopener"&gt;Microsoft Agent 365&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Watch: &lt;A href="https://www.youtube.com/watch?v=N-B-kD28P2I&amp;amp;t=1s" target="_blank" rel="noopener"&gt;Microsoft Entra Agent ID Explained&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;View a demo: &lt;A href="https://techcommunity.microsoft.com/event/microsoft-security-events/secure-access-for-ai-agents-the-new-frontier-of-identity/4486498" target="_blank" rel="noopener"&gt;Secure access for AI agents, the new frontier of identity&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;-&lt;/STRONG&gt;&lt;STRONG&gt; &lt;/STRONG&gt;Ngozi Nwoko, Director of Product Marketing, IDNA&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Related resources:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Webinar series: &lt;A href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/simplify-your-identity-landscape-reduce-risk-and-modernize-access-for-any-identi/4486059" target="_blank" rel="noopener"&gt;Microsoft Entra on-demand&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/surfing-the-ai-wave-manage-govern-and-protect-ai-agents-with-microsoft-entra-age/2464407" target="_blank" rel="noopener"&gt;Surfing the AI Wave: Manage, Govern, and Protect AI Agents with Microsoft Entra Agent ID | Microsoft Community Hub&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;Learn more about Microsoft Entra &lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;⁠&lt;A href="https://learn.microsoft.com/en-us/entra/agent-id/what-is-microsoft-entra-agent-id" target="_blank" rel="noopener"&gt;Microsoft Entra Agent ID documentation&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.microsoft.com/en-us/security/blog/products/microsoft-entra/" target="_blank" rel="noopener"&gt;Microsoft Entra News and Insights | Microsoft Security Blog&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/bg-p/Identity" target="_blank" rel="noopener"&gt;⁠Microsoft Entra blog | Tech Community&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra/bd-p/Azure-Active-Directory" target="_blank" rel="noopener"&gt;Microsoft Entra discussions | Microsoft Community&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/microsoft-agent-365/" target="_blank" rel="noopener"&gt;Microsoft Agent 365 documentation&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Fri, 24 Apr 2026 15:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/get-ahead-of-agent-sprawl-manage-and-govern-ai-agents-at-scale/ba-p/4513160</guid>
      <dc:creator>NgoziNwoko</dc:creator>
      <dc:date>2026-04-24T15:00:00Z</dc:date>
    </item>
    <item>
      <title>ErrorBoundary@wicd-mail/main</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview/errorboundary-wicd-mail-main/m-p/4514526#M2754</link>
      <description>&lt;P&gt;I'm trying to investigate a possible phishing email and when I click on View Message List, I get that error.&amp;nbsp; It does show removed after delivery, but I want to block either the sender or the domain.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Apr 2026 12:16:04 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview/errorboundary-wicd-mail-main/m-p/4514526#M2754</guid>
      <dc:creator>CCraft301</dc:creator>
      <dc:date>2026-04-24T12:16:04Z</dc:date>
    </item>
    <item>
      <title>Designing Outbound Connectivity for "Private Subnets" in Azure</title>
      <link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/designing-outbound-connectivity-for-quot-private-subnets-quot-in/ba-p/4514258</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Why Private Subnets Change Everything&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Historically, Azure virtual machines relied on &lt;EM&gt;default outbound internet access&lt;/EM&gt;, where the platform automatically assigned a dynamic SNAT IP from a shared pool. This was convenient but problematic:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;❌ No deterministic outbound IP addresses&lt;/LI&gt;
&lt;LI&gt;❌ No traffic inspection or filtering&lt;/LI&gt;
&lt;LI&gt;❌ No FQDN or URL governance&lt;/LI&gt;
&lt;LI&gt;❌ Difficult to audit for compliance&lt;/LI&gt;
&lt;LI&gt;❌ Susceptible to noisy neighbor SNAT exhaustion&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;With private subnets, outbound access is disabled by default. This shifts the responsibility to the architect — deliberately. The result is an environment where:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;✅ Every outbound flow is intentional&lt;/LI&gt;
&lt;LI&gt;✅ Every outbound IP is known and documented&lt;/LI&gt;
&lt;LI&gt;✅ Every egress path can be governed and logged&lt;/LI&gt;
&lt;LI&gt;✅ Compliance evidence is straightforward to produce&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The question is no longer &lt;EM&gt;"does my VM have internet access?"&lt;/EM&gt; but rather &lt;EM&gt;"how exactly does my VM reach the internet, and is that path appropriate for this workload?"&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The Three Outbound Patterns at a Glance&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Option&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Primary Role&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Inspection&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Scale&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Cost&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Best For&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;NAT Gateway&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Managed outbound SNAT&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;❌ None&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;⭐⭐⭐ High&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;💲 Low&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Simple, scalable egress&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Azure Firewall&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Secure governed egress&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;✅ Full L3–L7&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;⭐⭐⭐ High&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;💲💲💲 Higher&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Security boundaries&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Load Balancer&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Legacy SNAT&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;❌ None&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;⭐⭐ Limited&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;💲 Low&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Legacy / transitional&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;Scenario 1: NAT Gateway&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What is NAT Gateway?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Azure NAT Gateway is &lt;STRONG&gt;a &lt;/STRONG&gt;fully managed, zone‑resilient, outbound‑only SNAT service. It attaches at the subnet level and automatically handles all outbound flows from that subnet using one or more static public IP addresses or prefixes.&lt;/P&gt;
&lt;P&gt;It is purpose‑built for one thing: providing predictable, scalable outbound internet access — without routing complexity or inline devices.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Key flow are depicted below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp; VM → NAT Gateway: Automatic SNAT (no UDR required)&lt;/P&gt;
&lt;P&gt;&amp;nbsp; NAT Gateway → Internet: Static, deterministic public IP&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Inbound: NOT supported (outbound only)&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;How it works (step by step)&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;VM initiates an outbound connection (e.g., HTTPS to an API)&lt;/LI&gt;
&lt;LI&gt;NAT Gateway intercepts the flow at the subnet boundary&lt;/LI&gt;
&lt;LI&gt;Source IP is translated to the NAT Gateway's static public IP&lt;/LI&gt;
&lt;LI&gt;The packet is forwarded to the internet&lt;/LI&gt;
&lt;LI&gt;Return traffic is automatically tracked and delivered back to the VM&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;No UDRs. No routing tables. No inline devices. &lt;STRONG&gt;It just works.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Strengths&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Massive SNAT scale&lt;/STRONG&gt; — no port exhaustion concerns at typical enterprise scale&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Deterministic outbound IPs&lt;/STRONG&gt; — easy to allowlist with external services&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Zone resilient&lt;/STRONG&gt; — survives availability zone failures&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Subnet scoped&lt;/STRONG&gt; — applies to all VMs in the subnet automatically&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;No routing configuration required&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Limitations&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;❌ No traffic inspection or filtering&lt;/LI&gt;
&lt;LI&gt;❌ No FQDN or URL policy enforcement&lt;/LI&gt;
&lt;LI&gt;❌ No threat intelligence integration&lt;/LI&gt;
&lt;LI&gt;❌ Cannot restrict &lt;EM&gt;which&lt;/EM&gt; internet destinations are allowed&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Best Fit Use Cases&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;✅ Application tiers calling external SaaS APIs&lt;BR /&gt;✅ VMs requiring OS updates and patch downloads&lt;BR /&gt;✅ CI/CD build agents and pipeline runners&lt;BR /&gt;✅ Spoke VNets in hub‑and‑spoke where east‑west goes through firewall, but simple internet egress is acceptable&lt;BR /&gt;✅ Dev/test environments&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Scenario 2: Azure Firewall&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What is Azure Firewall?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Azure Firewall is a cloud‑native, stateful, L3–L7 network security service. When used for outbound egress, it transforms the egress path from a &lt;EM&gt;connectivity&lt;/EM&gt; function into a &lt;EM&gt;security enforcement boundary&lt;/EM&gt;.&lt;/P&gt;
&lt;P&gt;Unlike NAT Gateway, Azure Firewall inspects every packet, evaluates it against policy, and either allows or denies it based on network rules, application rules, and threat intelligence feeds.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;KEY Flow are depicted below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp; VM → UDR: Forces ALL outbound traffic to Firewall&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Firewall: Evaluates against policy before allowing&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Firewall → Internet: Only explicitly permitted flows pass&lt;/P&gt;
&lt;P&gt;&amp;nbsp; All denied flows: Logged and alertable&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;How it works (step by step)&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;VM initiates an outbound connection&lt;/LI&gt;
&lt;LI&gt;UDR intercepts the flow and redirects to Azure Firewall's private IP&lt;/LI&gt;
&lt;LI&gt;Azure Firewall evaluates the traffic:&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;Network rules (IP/port match)&lt;/LI&gt;
&lt;LI&gt;Application rules (FQDN/URL match)&lt;/LI&gt;
&lt;LI&gt;Threat intelligence (known malicious IPs/domains)&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI&gt;If allowed: traffic is forwarded via Firewall's public IP&lt;/LI&gt;
&lt;LI&gt;If denied: traffic is dropped and logged&lt;/LI&gt;
&lt;LI&gt;All flows (allowed and denied) are logged to Log Analytics / Sentinel&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;Strengths&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;✅ &lt;STRONG&gt;Full L3–L7 inspection&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;✅ &lt;STRONG&gt;FQDN and URL‑based filtering&lt;/STRONG&gt; (application rules)&lt;/LI&gt;
&lt;LI&gt;✅ &lt;STRONG&gt;Threat intelligence integration&lt;/STRONG&gt; (Microsoft TI feed)&lt;/LI&gt;
&lt;LI&gt;✅ &lt;STRONG&gt;TLS inspection&lt;/STRONG&gt; (Premium SKU)&lt;/LI&gt;
&lt;LI&gt;✅ &lt;STRONG&gt;Centralized governance&lt;/STRONG&gt; across multiple VNets via Firewall Manager&lt;/LI&gt;
&lt;LI&gt;✅ &lt;STRONG&gt;Rich logging&lt;/STRONG&gt; — every allowed and denied flow is recorded&lt;/LI&gt;
&lt;LI&gt;✅ &lt;STRONG&gt;IDPS&lt;/STRONG&gt; (Intrusion Detection and Prevention) available in Premium&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Limitations&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;❌ Higher cost (hourly + data processing charges)&lt;/LI&gt;
&lt;LI&gt;❌ Requires UDR configuration on each spoke subnet&lt;/LI&gt;
&lt;LI&gt;❌ Adds latency (small but non‑zero)&lt;/LI&gt;
&lt;LI&gt;❌ Requires careful SNAT configuration at scale&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Best Fit Use Cases&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;✅ Regulated industries (financial services, healthcare, government)&lt;BR /&gt;✅ Any workload where outbound internet is a &lt;STRONG&gt;security boundary&lt;/STRONG&gt;&lt;BR /&gt;✅ Environments requiring &lt;STRONG&gt;egress allowlisting&lt;/STRONG&gt; for compliance&lt;BR /&gt;✅ Hub‑and‑spoke architectures with centralized control plane&lt;BR /&gt;✅ SOC environments needing outbound flow telemetry&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Scenario 3: Load Balancer Outbound&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What is Load Balancer Outbound?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Azure Load Balancer outbound rules were historically the primary mechanism for providing SNAT to VMs behind a Standard Load Balancer. While newer patterns (NAT Gateway, Azure Firewall) have largely replaced this approach for new designs, &lt;STRONG&gt;outbound rules remain valid in specific scenarios&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Key flows are depicted below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp; VMs → Load Balancer: Backend pool members get SNAT&lt;/P&gt;
&lt;P&gt;&amp;nbsp; LB Outbound Rules: Define port allocation per VM&lt;/P&gt;
&lt;P&gt;&amp;nbsp; ⚠️ Port exhaustion risk at scale&lt;/P&gt;
&lt;P&gt;&amp;nbsp; ⚠️ No inspection or policy enforcement&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;How it works (step by step)&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;VM in the backend pool initiates an outbound connection&lt;/LI&gt;
&lt;LI&gt;Load Balancer applies SNAT using the frontend public IP&lt;/LI&gt;
&lt;LI&gt;Ephemeral ports are allocated per VM from a fixed pool&lt;/LI&gt;
&lt;LI&gt;Return traffic is tracked and delivered back to the correct VM&lt;/LI&gt;
&lt;LI&gt;If port pool is exhausted: connections fail (SNAT exhaustion)&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;Strengths&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Lower cost than NAT Gateway or Firewall&lt;/LI&gt;
&lt;LI&gt;Tightly integrated with existing load‑balanced workloads&lt;/LI&gt;
&lt;LI&gt;Familiar operational model for legacy teams&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Limitations&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;❌ SNAT port pool is fixed and must be manually managed&lt;/LI&gt;
&lt;LI&gt;❌ Risk of SNAT exhaustion at scale&lt;/LI&gt;
&lt;LI&gt;❌ No traffic inspection&lt;/LI&gt;
&lt;LI&gt;❌ Less flexible than NAT Gateway&lt;/LI&gt;
&lt;LI&gt;❌ Not recommended for new designs&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Best Fit Use Cases&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;✅ Existing architectures already built around Azure Load Balancer&lt;BR /&gt;✅ Low outbound connection volume workloads&lt;BR /&gt;✅ Transitional architectures during modernization to NAT Gateway&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Decision Framework: Choosing the Right Outbound Pattern&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Common Pitfalls to Avoid&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;⚠️ Pitfall 1: Forgetting SNAT scale limits&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Load Balancer outbound rules allocate a &lt;STRONG&gt;fixed number of ephemeral ports per VM&lt;/STRONG&gt;. At scale this exhausts quickly. Use NAT Gateway instead.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;⚠️ Pitfall 2: Over‑securing low‑risk workloads&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Not every workload needs Azure Firewall for outbound. Dev/test and patch traffic are better served by NAT Gateway — simpler, cheaper, faster.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;⚠️ Pitfall 3: Mixing outbound models in the same subnet&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;NAT Gateway and Load Balancer outbound rules &lt;STRONG&gt;cannot coexist&lt;/STRONG&gt; on the same subnet. NAT Gateway always takes precedence. Plan your subnet boundaries carefully.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;⚠️ Pitfall 4: Blocking Azure platform dependencies&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Many Azure services still use public endpoints (even when Private Link is available). Ensure your outbound policy allows required Azure service tags before enforcing egress controls.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;⚠️ Pitfall 5: Relying on platform defaults&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Default outbound access is &lt;STRONG&gt;retired for new VNets&lt;/STRONG&gt;. Do not assume VMs can reach the internet without explicit configuration.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary and Key Takeaways&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Scenario&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Best Choice&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Why&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Simple internet egress at scale&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;NAT Gateway&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Scalable, predictable, no complexity&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Security boundary for egress&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Azure Firewall&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Inspection, FQDN rules, threat intel&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Legacy load‑balanced workloads&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Load Balancer Outbound&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Transitional only&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Regulated / compliance environments&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Azure Firewall&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Audit logs, policy enforcement&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Dev / test / patch traffic&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;NAT Gateway&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Low cost, low friction&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;The core principle&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Private subnets make outbound access intentional. Choose the outbound pattern that matches the risk level of the workload — not the most complex option available.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;References&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;https://learn.microsoft.com/azure/nat-gateway/nat-overview&lt;/LI&gt;
&lt;LI&gt;https://learn.microsoft.com/azure/firewall/overview&lt;/LI&gt;
&lt;LI&gt;https://learn.microsoft.com/azure/load-balancer/outbound-rules&lt;/LI&gt;
&lt;LI&gt;https://azure.microsoft.com/blog/default-outbound-access-for-vms-in-azure-will-be-retired&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 23 Apr 2026 21:28:09 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/designing-outbound-connectivity-for-quot-private-subnets-quot-in/ba-p/4514258</guid>
      <dc:creator>alexeyn1</dc:creator>
      <dc:date>2026-04-23T21:28:09Z</dc:date>
    </item>
    <item>
      <title>Protect and govern every tenant with Microsoft Entra Tenant Governance</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-events/protect-and-govern-every-tenant-with-microsoft-entra-tenant/ec-p/4514244#M2530</link>
      <description>&lt;P&gt;As organizations scale, tenant sprawl becomes inevitable. Legacy test tenants, employee‑created environments, and forgotten tenants create blind spots for security and identity teams.&lt;/P&gt;
&lt;P style="margin-top: 16px;"&gt;Get to know Microsoft Entra Tenant Governance, a new Entra capability that provides centralized visibility and control across multi‑tenant environments. We'll cover how Tenant Governance enables tenant discovery, secure governance relationships, configuration monitoring, and governed tenant creation from day one. You'll see how organizations can apply consistent security baselines, detect configuration drift, and reduce operational overhead all while maintaining autonomy across teams. Walk away with a clear framework for bringing order, visibility, and governance to your multi‑tenant identity landscape.&lt;/P&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;How do I participate?&lt;/H2&gt;
&lt;P&gt;Registration is not required. Add this event to your calendar, then sign in to the Tech Community and select &lt;STRONG&gt;Attend&lt;/STRONG&gt; to receive reminders. Post your questions in advance, or any time during the live broadcast.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 20:48:45 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-events/protect-and-govern-every-tenant-with-microsoft-entra-tenant/ec-p/4514244#M2530</guid>
      <dc:creator>Heather_Poulsen</dc:creator>
      <dc:date>2026-04-23T20:48:45Z</dc:date>
    </item>
    <item>
      <title>Stop identity attacks in real time with Microsoft Entra ID Protection</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-events/stop-identity-attacks-in-real-time-with-microsoft-entra-id/ec-p/4514242#M2529</link>
      <description>&lt;P&gt;Modern identity security means stopping attacks before they escalate and extending protection beyond human users to apps and agentic identities across your identity fabric.&lt;/P&gt;
&lt;P style="margin-top: 16px;"&gt;Learn how Microsoft Entra ID Protection delivers premium, real-time identity protection with adaptive risk remediation, comprehensive detections, and expanded coverage for human and non-human identities. Powered by trillions of Microsoft Security signals and natively integrated with Microsoft Defender and Security Copilot workflows, Entra ID Protection enables faster and more accurate Conditional Access decisions that stop threats like lateral movement and privilege escalation before they spread.&lt;/P&gt;
&lt;P style="margin-top: 16px;"&gt;We'll show you how identity and security operations teams scale risk remediation with Entra ID, and how these capabilities extend across your broader identity security portfolio to strengthen protection in both cloud and hybrid environments.&lt;/P&gt;
&lt;P style="margin-top: 16px;"&gt;To learn more, read the &lt;A href="https://aka.ms/IDProtectionReport" target="_blank"&gt;Microsoft Entra ID Protection report&lt;/A&gt;.&lt;/P&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;How do I participate?&lt;/H2&gt;
&lt;P&gt;Registration is not required. Add this event to your calendar, then sign in to the Tech Community and select &lt;STRONG&gt;Attend&lt;/STRONG&gt; to receive reminders. Post your questions in advance, or any time during the live broadcast.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 20:45:28 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-events/stop-identity-attacks-in-real-time-with-microsoft-entra-id/ec-p/4514242#M2529</guid>
      <dc:creator>Heather_Poulsen</dc:creator>
      <dc:date>2026-04-23T20:45:28Z</dc:date>
    </item>
    <item>
      <title>Strengthen your security posture with Microsoft Entra Conditional Access</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-events/strengthen-your-security-posture-with-microsoft-entra/ec-p/4514237#M2527</link>
      <description>&lt;P&gt;Learn how Microsoft Entra Conditional Access, our Microsoft Zero Trust policy engine, protects access for your workforce and for agents by enforcing real‑time adaptive access policies that continuously assess risk signals and use AI‑driven automation to dynamically allow, challenge, or block access for every identity.&lt;/P&gt;
&lt;P style="margin-top: 16px;"&gt;Join Microsoft experts as they walk through real‑world scenarios and share practical guidance to help your identity team address policy sprawl, enforce consistent Conditional Access policies, and strengthen security posture across your environment.&lt;/P&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;How do I participate?&lt;/H2&gt;
&lt;P&gt;Registration is not required. Add this event to your calendar, then sign in to the Tech Community and select &lt;STRONG&gt;Attend&lt;/STRONG&gt; to receive reminders. Post your questions in advance, or any time during the live broadcast.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 23:54:06 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-events/strengthen-your-security-posture-with-microsoft-entra/ec-p/4514237#M2527</guid>
      <dc:creator>Heather_Poulsen</dc:creator>
      <dc:date>2026-04-23T23:54:06Z</dc:date>
    </item>
    <item>
      <title>Tenant Configuration Management APIs are now generally available</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/tenant-configuration-management-apis-are-now-generally-available/ba-p/4513157</link>
      <description>&lt;P&gt;In our &lt;A href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/microsoft-entra-tenant-governance-secure-and-manage-multi-tenant-environments-at/4462427" target="_blank" rel="noopener"&gt;previous post&lt;/A&gt;, we introduced &lt;A href="https://learn.microsoft.com/en-us/entra/id-governance/tenant-governance/overview" target="_blank" rel="noopener"&gt;Microsoft Entra Tenant Governance&lt;/A&gt; and how it helps organizations secure and manage multi-tenant environments at scale. Today, we’re excited to announce that the &lt;STRONG&gt;Tenant Configuration Management (TCM) APIs are now generally available&lt;/STRONG&gt;, providing the foundation for managing configuration at scale with greater consistency and control.&lt;/P&gt;
&lt;P&gt;Before we dive deeper, let’s clarify the distinction:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/id-governance/tenant-governance/overview" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Microsoft Entra Tenant Governance&lt;/STRONG&gt;&lt;/A&gt; is the product experience. It delivers a centralized control plane for visibility, policy enforcement, and governance across tenant configurations.&lt;/LI&gt;
&lt;LI&gt;The &lt;A href="https://learn.microsoft.com/en-us/graph/unified-tenant-configuration-management-concept-overview" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;TCM APIs&lt;/STRONG&gt;&lt;/A&gt; are the underlying Microsoft Graph API that powers Tenant Governance’s configuration management capabilities. It enables organizations to &lt;STRONG&gt;programmatically define, export, monitor, and manage configurations across services&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;&lt;STRONG&gt;Why this matters&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;As organizations grow, configuration complexity increases across identity, security, and productivity workloads. Over time, even well-configured environments can drift due to incremental changes, operational overhead, and lack of centralized control.&lt;/P&gt;
&lt;P&gt;The challenge isn’t just setting configurations correctly. &lt;STRONG&gt;It’s maintaining that state continuously&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;The TCM API addresses this by enabling a shift from &lt;STRONG&gt;reactive configuration management &lt;/STRONG&gt;to a&lt;STRONG&gt; declarative and continuous model&lt;/STRONG&gt;, where desired state is defined and automatically validated over time. This helps organizations reduce risk, improve compliance, and simplify operations.&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Core concepts of the TCM API&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;At its core, the TCM API brings configuration-as-code to Microsoft Entra. It introduces a model built around four connected concepts: &lt;STRONG&gt;snapshots,&lt;/STRONG&gt; &lt;STRONG&gt;baselines, monitors, and configuration drifts:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Snapshot&lt;/STRONG&gt;&lt;STRONG&gt;:&lt;/STRONG&gt; Captures the current state of tenant configurations at a point in time. This is often the starting point, helping organizations understand what’s deployed today or to establish a “known good” reference.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Baseline:&lt;/STRONG&gt; Represents the desired configuration state. Instead of manually checking settings across portals, organizations can define what compliant configuration looks like in a structured, repeatable way.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Monitor:&lt;/STRONG&gt; Continuously compares the live environment against that baseline. Any deviation is surfaced as configuration drift, giving teams clear insight into where their environment no longer aligns with expectations.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Configuration drifts:&lt;/STRONG&gt; Represents the delta between the desired configuration state and the current configuration state.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Together, these concepts create a closed loop: capture current state, define desired state, and continuously monitor alignment between the two.&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;A scalable model for configuration management&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;What makes the TCM API powerful is not just visibility, but &lt;STRONG&gt;repeatability and scale&lt;/STRONG&gt;. Because everything is exposed through Microsoft Graph, configuration management can now be:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Integrated into automation workflows&lt;/LI&gt;
&lt;LI&gt;Connected to existing security and compliance systems&lt;/LI&gt;
&lt;LI&gt;Applied consistently across multiple tenants and services&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This introduces a true configuration-as-code approach, where tenant settings are no longer static or manually enforced, but programmatically defined and continuously evaluated.&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;How this fits into Tenant Governance&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;The TCM API is the foundation that enables many of the capabilities within Microsoft Entra Tenant Governance.&lt;/P&gt;
&lt;P&gt;While the API provides raw access to configuration data and state comparison, Tenant Governance builds on top of it to deliver a &lt;STRONG&gt;unified experience for administrators&lt;/STRONG&gt;. This includes surfacing insights, highlighting drift, and enabling governance actions without requiring customers to build their own tooling.&lt;/P&gt;
&lt;P&gt;In the near future, Tenant Governance will provide a single pane of glass for managing multiple tenants centrally, powered by the TCM API. This relationship is key:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Customers&lt;/STRONG&gt; can rely on Tenant Governance for an out-of-the-box solution.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Partners and advanced organizations&lt;/STRONG&gt; can use the TCM API directly to build custom workflows, integrations, or managed services.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;&lt;STRONG&gt;Final thoughts&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;Tenant configuration is no longer a one-time activity. It is an ongoing process that directly impacts security, compliance, and operational consistency.&lt;/P&gt;
&lt;P&gt;With the &lt;STRONG&gt;general availability of the TCM API&lt;/STRONG&gt;, organizations now have a scalable way to define, monitor, and enforce configuration across their environments. Whether used directly or through Microsoft Entra Tenant Governance, it enables a more proactive and automated approach to managing tenant configuration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;-Aditya Mukund&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Additional resources&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/graph/unified-tenant-configuration-management-concept-overview" aria-label="Link Overview of the Tenant Configuration Management APIs in Microsoft Graph - Microsoft Graph | Microso…" target="_blank"&gt;Overview of the Tenant Configuration Management APIs in Microsoft Graph - Microsoft Graph | Microso…&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/graph/utcm-authentication-setup" aria-label="Link Set up authentication for Tenant Configuration Management APIs - Microsoft Graph | Microsoft Learn" target="_blank"&gt;Set up authentication for Tenant Configuration Management APIs - Microsoft Graph | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more about Microsoft Entra &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;⁠&lt;A href="https://www.microsoft.com/en-us/security/blog/products/microsoft-entra/" target="_blank" rel="noopener"&gt;Microsoft Entra News and Insights | Microsoft Security Blog&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/bg-p/Identity" target="_blank" rel="noopener"&gt;⁠Microsoft Entra blog | Tech Community&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://learn.microsoft.com/en-us/entra/" target="_blank" rel="noopener"&gt;Microsoft Entra documentation | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra/bd-p/Azure-Active-Directory" target="_blank" rel="noopener"&gt;Microsoft Entra discussions | Microsoft Community&amp;nbsp;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 16:57:53 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/tenant-configuration-management-apis-are-now-generally-available/ba-p/4513157</guid>
      <dc:creator>AdityaMukund</dc:creator>
      <dc:date>2026-04-23T16:57:53Z</dc:date>
    </item>
    <item>
      <title>The Unified SecOps Transition — Why It Is a Security Architecture Decision, Not Just a Portal Change</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-community/the-unified-secops-transition-why-it-is-a-security-architecture/ba-p/4513815</link>
      <description>&lt;P&gt;Microsoft will retire the standalone Azure Sentinel portal on &lt;A href="https://learn.microsoft.com/en-us/unified-secops/whats-new" target="_blank" rel="noopener"&gt;March 31, 2027&lt;/A&gt;. Most of the conversation around this transition focuses on cost optimization and portal consolidation. That framing undersells what is actually happening.&lt;/P&gt;
&lt;P&gt;The unified Defender portal is not a new interface for the same capabilities. It is the platform foundation for a fundamentally different SOC operating model — one built on a 2-tier data architecture, graph-based investigation, and AI agents that can hunt, enrich, and respond at machine speed. Partners who understand this will help customers build security programs that match how attackers actually operate. Partners who treat it as a portal migration will be offering the same services they offered five years ago.&lt;/P&gt;
&lt;P&gt;This document covers four things:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;What the unified platform delivers&lt;/STRONG&gt; — the security capabilities that do not exist in standalone Sentinel and why they matter against today’s threats.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;What the transition really involves&lt;/STRONG&gt; - is not data migration, but it is a data architecture project that changes how telemetry flows, where it lives, and who queries it.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Where the partner opportunity lives&lt;/STRONG&gt; — a structured progression from professional services (transactional, transition execution, and advisory) to ongoing managed security services.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Why does the unified platform win competitively&lt;/STRONG&gt; — factual capability advantages that give partners a defensible position against third-party SIEM alternatives.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H3&gt;&lt;STRONG&gt;The Bigger Picture: Preparing for the Agentic SOC&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Before getting into transition mechanics, partners need to understand where the industry is headed — because the platform decisions made during this transition will determine whether a customer’s SOC is ready for what comes next.&lt;/P&gt;
&lt;P&gt;The security industry is moving from human-driven, alert-centric workflows to an operating model built on three pillars:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Intellectual Property&lt;/STRONG&gt; — the detection logic, hunting hypotheses, response playbooks, and domain expertise that differentiate one security team from another.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Human Orchestration&lt;/STRONG&gt; — the judgment, context, and decision-making that humans bring to complex incidents. Humans set strategy, validate findings, and make containment decisions. They do not manually triage every alert.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;AI Agents&lt;/STRONG&gt; - built agents that execute repeatable work: enriching incidents, hunting across months of telemetry, validating security posture, drafting response actions, and flagging anomalies for human review.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The SOC of 2027 will not be scaled by hiring more analysts. It will be scaled by deploying agents that encode institutional knowledge into automated workflows — orchestrated by humans who focus on the decisions that require judgment.&lt;/P&gt;
&lt;P&gt;This transformation requires a platform that provides three things:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Deep telemetry&lt;/STRONG&gt; — agents need months of queryable data to analyze behavioral patterns, build baselines, and detect slow-moving threats. The Sentinel Data Lake provides this at a cost point that makes long-retention feasible.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Relationship context&lt;/STRONG&gt; — agents need to understand how entities connect. Which accounts share credentials? What is the blast radius of a compromised service principle? What is the attack path from a phished user to domain admin? Sentinel Graph provides this.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Extensibility&lt;/STRONG&gt; — partners and customers need to build and deploy their own agents without waiting for Microsoft to ship them. The MCP framework and Copilot agent architecture provide this.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;None of these exist in standalone Azure Sentinel. All three ship with the unified platform.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The urgency goes beyond the March 2027 deadline.&lt;/STRONG&gt; Organizations are deploying AI agents, copilots, and autonomous workflows across their businesses — and every one of those creates a new attack surface. Prompt injection, data poisoning, agent hijacking, cross-plugin exploitation — these are not theoretical risks. They are in the wild today. Defending against AI-powered attacks requires a security platform that is itself AI Agent-ready. The unified Defender portal is that platform.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;What the Unified Platform Actually Delivers&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;The original framing — “single pane of glass for SIEM and XDR” — is accurate but insufficient. Here is what the unified platform delivers that standalone Sentinel does not.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Cross-Domain Incident Correlation&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;The Defender correlation engine does not just group alerts by time proximity. It builds multi-stage incident graphs that link identity compromise to lateral movement to data exfiltration across SIEM and XDR telemetry — automatically.&lt;/P&gt;
&lt;P&gt;Consider a token theft chain: an infostealer harvests browser session cookies (endpoint telemetry), the attacker replays the token from a foreign IP (Entra ID sign-in logs), creates a mailbox forwarding rule (Exchange audit logs), and begins exfiltrating data (DLP alerts). In standalone Sentinel, these are four separate alerts in four different tables. In the unified platform, they are one correlated incident with a visual attack timeline.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;2-Tier Data Architecture&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;The Sentinel Data Lake introduces a second storage tier that changes the economics and capabilities of security telemetry:&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;thead&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Analytics Tier&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Data Lake&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Purpose&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Real-time detection rules, SOAR, alerting&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Hunting, forensics, behavioral analysis, AI agent queries&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Latency&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Sub-5-minute query and alerting&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Minutes to hours acceptable&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Cost&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;~$4.30/GB PAYG ingestion (~$2.96 at 100 GB/day commitment)&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;~$0.05/GB ingestion + $0.10/GB data processing (at least 20x cheaper)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Retention&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;90 days default (expensive to extend)&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Up to 12 years at low cost&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Best for&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;High-signal, low-volume sources&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;High-volume, investigation-critical sources&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;The architecture decision is not “which tier is cheaper.” It is “which tier gives me the right detection capability for each data source.”&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Analytics tier candidates:&lt;/STRONG&gt; Entra ID sign-in logs, Azure activity, audit logs, EDR alerts, PAM events, Defender for Identity alerts, email threat detections. These need sub-5-minute alerting.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Data Lake candidates:&lt;/STRONG&gt; Raw firewall session logs, full DNS query streams, proxy request logs, Sysmon process events, NSG flow logs. These drive hunting and forensic analysis over weeks or months.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Dual-ingest sources:&lt;/STRONG&gt; Some sources need both tiers. Entra ID sign-in logs are the canonical example — analytics tier for real-time password spray detection, Data Lake for graph-based blast radius analysis across months of authentication history. Implementation is straightforward: a single Data Collection Rule (DCR) transformation handles the split. One collection point, two routing destinations.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The right framing: &lt;STRONG&gt;“Right data in the right tier = better detections AND lower cost.”&lt;/STRONG&gt; Cost savings are a side effect of good security architecture, not the goal.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Sentinel Graph&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/datalake/sentinel-graph-overview?tabs=defender" target="_blank" rel="noopener"&gt;Sentinel Graph&lt;/A&gt; enables SOC teams and AI agents to answer questions that flat log queries cannot:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;What is the blast radius of this compromised account?&lt;/LI&gt;
&lt;LI&gt;Which service principals share credentials with the breached identity?&lt;/LI&gt;
&lt;LI&gt;What is the attack path from this phished user to domain admin?&lt;/LI&gt;
&lt;LI&gt;Which entities are connected to this suspicious IP across all telemetry sources?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Graph-based investigation turns isolated alerts into context-rich intelligence. It is the difference between knowing “this account was compromised” and understanding “this account has access to 47 service principals, 3 of which have written access to production Key Vault.”&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Security Copilot Integration&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/copilot/security/triage-alert-with-enriched-threat-intel" target="_blank" rel="noopener"&gt;Security Copilot&lt;/A&gt; embedded in the unified portal helps analysts summarize incidents, generate hunting queries, explain attacker behavior, and draft response actions. For complex multi-stage incidents, it reduces the time from “I see an alert” to “I understand the full scope” from hours to minutes. With &lt;A href="https://learn.microsoft.com/en-us/copilot/security/security-copilot-inclusion" target="_blank" rel="noopener"&gt;free SCUs available with Microsoft 365 E5&lt;/A&gt;, teams can apply AI to the highest-effort investigation work without adding incremental cost.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;MCP and the Agent Framework&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;The &lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/datalake/sentinel-mcp-get-started" target="_blank" rel="noopener"&gt;Model Context Protocol (MCP)&lt;/A&gt; and Copilot agent architecture let partners and customers build purpose-built security agents. A concrete example: an MCP-enabled agent can automatically enrich a phishing incident by querying email metadata, checking the sender against threat intelligence, pulling the user’s recent sign-in patterns, correlating with Sentinel Graph for lateral risk, and drafting a containment recommendation — in under 60 seconds.&lt;/P&gt;
&lt;P&gt;This is where partner intellectual property becomes competitive advantage. The agent framework is the mechanism for encoding proprietary detection logic, response playbooks, and domain expertise into automated workflows that run at machine speed.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Security Store&lt;/STRONG&gt;&lt;/H4&gt;
&lt;H6&gt;&lt;A href="https://learn.microsoft.com/en-us/security/store/" target="_blank" rel="noopener"&gt;Security Store&lt;/A&gt; allows partners to evolve from one‑time transition projects into repeatable, scalable offerings—supporting professional services, managed services, and agent‑based IP that align with the customer’s unified SecOps operating model. As part of the transition, the&amp;nbsp;&lt;A href="https://securitystore.microsoft.com/" target="_blank" rel="noopener"&gt;Microsoft Security Store&lt;/A&gt; becomes the extension layer for the unified SecOps platform—allowing partners to deliver differentiated agents, SaaS, and security services natively within Defender and Sentinel, instead of building and integrating in isolation&lt;/H6&gt;
&lt;H4&gt;&lt;STRONG&gt;The 4 Investigation Surfaces: A Customer Maturity Ladder&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;The Sentinel Data Lake exposes four distinct investigation surfaces, each representing a step toward the Agentic SOC — and a partner service opportunity:&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;thead&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Surface&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Capability&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Maturity Level&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Partner Opportunity&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/kusto/query/tutorials/common-tasks-microsoft-sentinel?view=microsoft-sentinel" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;KQL Query&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Ad-hoc hunting, forensic investigation&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Basic — “we can query”&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Hunting query libraries; KQL training&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/datalake/sentinel-graph-overview?tabs=defender" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Graph Analytics&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Blast radius, attack paths, entity relationships&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Intermediate — “we understand relationships”&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Graph investigation training; attack path workshops&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/notebooks" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Notebooks (PySpark)&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Statistical analysis, behavioral baselines, ML models&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Advanced — “we predict behaviors”&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Custom notebook development; anomaly scoring&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/datalake/sentinel-mcp-get-started" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Agent/MCP Access&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Autonomous hunting, triage, response at machine speed&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Agentic SOC — “we automate”&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Custom agent development; MCP integration&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 25.00%" /&gt;&lt;col style="width: 25.00%" /&gt;&lt;col style="width: 25.00%" /&gt;&lt;col style="width: 25.00%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;The customer who starts with “help us hunt better” ends up at “build us agents that hunt autonomously.” That is the progression from professional services to managed services.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;What the Transition Actually Involves&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;It is not a data migration — customers’ underlying log data and analytics remain in their existing Log Analytics workspaces. That is important for partners to communicate clearly.&lt;/P&gt;
&lt;P&gt;But partners should not set the expectation that nothing changes except the URL. Microsoft’s &lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/move-to-defender" target="_blank" rel="noopener"&gt;official transition guide&lt;/A&gt; documents significant operational changes — including &lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/move-to-defender#configure-automation-rules-and-playbooks" target="_blank" rel="noopener"&gt;automation rules and playbooks&lt;/A&gt;, &lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/move-to-defender#configure-analytics-rules" target="_blank" rel="noopener"&gt;analytics rule&lt;/A&gt;, RBAC restructuring to the new unified model (URBAC), API schema changes that break ServiceNow and Jira integrations, analytics rule transitions where the Fusion engine is replaced by the Defender XDR correlation engine, and data policy shifts for regulated industries. Most customers cannot navigate this complexity without professional help.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Important:&lt;/STRONG&gt; Transitioning to the Defender portal has no extra cost - estimate the billing with the new &lt;A href="https://www.microsoft.com/en-us/security/pricing/microsoft-sentinel/cost-estimator" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Sentinel Cost Estimator&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Optimizing the unified platform means making deliberate changes:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Adding dual-ingest&lt;/STRONG&gt; for critical sources that need both real-time detection and long-horizon hunting.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Moving high-volume telemetry&lt;/STRONG&gt; to the Data Lake — enabling hunting at scale that was previously cost-prohibitive.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Retiring redundant data copies&lt;/STRONG&gt; where Defender XDR already provides the investigation capability.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Updating RBAC, automation, and integrations&lt;/STRONG&gt; for the unified portal’s consolidated schema and permission structure.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Training analysts&lt;/STRONG&gt; on new investigation workflows, Sentinel Graph navigation, and Copilot-assisted triage.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;STRONG&gt;Threat Coverage: The Detection Gap Most Organizations Do Not Know They Have&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;This transition is an opportunity to quantify detection maturity — and most organizations will not like what they find.&lt;/P&gt;
&lt;P&gt;Based on real-world breach analysis — infostealers, business email compromise, human-operated ransomware, cloud identity abuse, vulnerability exploitation, nation-state espionage, and other prevalent threat categories — organizations running standalone Sentinel with default configurations typically have significant detection gaps. Those gaps cluster in three areas:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Cross-domain correlation gaps&lt;/STRONG&gt; — attacks that span identity, endpoint, email, and cloud workloads. These require the Defender correlation engine because no single log source tells the complete story.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Long-retention hunting gaps&lt;/STRONG&gt; — threats like command-and-control beaconing and slow data exfiltration that unfold over weeks or months. Analytics-tier retention at 90 days is too expensive to extend and too short for historical pattern analysis.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Graph-based analysis gaps&lt;/STRONG&gt; — lateral movement, blast radius assessment, and attack path analysis that require understanding entity relationships rather than flat log queries.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The unified platform with proper log source coverage across Microsoft-native sources can materially close these gaps — but only if the transition includes a detection coverage assessment, not just a portal cutover.&lt;/P&gt;
&lt;P&gt;Partners should use MITRE ATT&amp;amp;CK as the common framework for measuring detection maturity. Map existing detections to ATT&amp;amp;CK tactics and techniques before and after transition — a measurable, defensible improvement that justifies advisory fees and ongoing managed services.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Partner Opportunity: Professional Services to Managed Services&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;The USX transition creates a structured progression for all partner types — from professional services that build trust and surface findings, to managed security services that deliver ongoing value. The key insight most partners miss: do not jump from “transition assessment” to “managed services pitch.” Customers are not ready for that conversation until they have experienced the value of professional services. The bridge engagement — whether transactional, transition execution, or advisory — builds trust, demonstrates the expertise, and surfaces the findings that make the managed services conversation a logical next step.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Professional Services&lt;/STRONG&gt; (transactional + transition execution + advisory) → &lt;STRONG&gt;Managed Security Services&lt;/STRONG&gt; (MSSP)&lt;/P&gt;
&lt;P&gt;The USX transition is the ideal professional services entry point because it combines a mandatory deadline (March 2027) with genuine technical complexity (analytics rule, automation behavioral changes, RBAC restructuring, API schema shifts) that most customers cannot navigate alone. Every engagement produces findings — detection gaps, automation fragility, staffing shortfalls — that are the most credible possible evidence for managed services.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Professional Services&lt;/STRONG&gt;&lt;/H4&gt;
&lt;H5&gt;&lt;STRONG&gt;Transactional Partners&lt;/STRONG&gt;&lt;/H5&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;thead&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Offer&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Customer Value&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Key Deliverables&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Transition&lt;/STRONG&gt; &lt;STRONG&gt;Readiness Assessment&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Risk-mitigated transition with clear scope&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Sentinel deployment inventory; Defender portal compatibility check; transition roadmap with timeline; MITRE ATT&amp;amp;CK detection coverage baseline&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Transition&lt;/STRONG&gt; &lt;STRONG&gt;Execution and Enablement&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Accelerated time-to-value, minimal disruption&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Workspace onboarding; RBAC and automation updates; Dual-portal testing and validation; SOC team training on unified workflows&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Security Posture and Detection Optimization&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Better detections and lower cost&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Data ingestion and tiering strategy; Dual-ingest implementation for critical sources; Detection coverage gap analysis; Automation and Copilot/MCP recommendations&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;H5&gt;&lt;STRONG&gt;Advisory Partners&lt;/STRONG&gt;&lt;/H5&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;thead&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Offer&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Customer Value&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Key Deliverables&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Executive and Strategy Advisory&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Leadership alignment on why this transition matters&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Unified SecOps vision and business case; Zero Trust and SOC modernization alignment; Stakeholder alignment across security, IT, and leadership&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Architecture and Design Advisory&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Future-ready architecture optimized for the Agentic SOC&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Target-state 2-tier data architecture; Dual-ingest routing decisions mapped to MITRE tactics; RBAC, retention, and access model design&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Detection Coverage and Gap Analysis&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Measurable detection maturity improvement&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Current-state MITRE ATT&amp;amp;CK coverage mapping; Gap analysis against 24 threat patterns; Detection improvement roadmap with priority recommendations&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;SOC Operating Model Advisory&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Smooth analyst adoption with clear ownership&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Redesigned SOC workflows for unified portal; Incident triage and investigation playbooks; RACI for detection engineering, hunting, and platform ops&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Agentic SOC Readiness&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Preparation for AI-driven security operations&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;MCP and agent architecture assessment; Custom agent development roadmap; &lt;A href="https://microsoftpartners.powerappsportals.com/Microsoft-Security-Partners/Modern-SecOps/" target="_blank" rel="noopener"&gt;IP&lt;/A&gt; + Human Orchestration + Agent operating model design&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Cost, Licensing and Value Advisory&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Transparent cost impact with strong business case&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Current vs.&amp;nbsp;future cost analysis; Data tiering optimization recommendations; TCO and ROI modeling for leadership&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;The conversion to managed services is evidence-based.&lt;/STRONG&gt; Every professional services engagement produces findings — detection gaps, automation fragility, staffing shortfalls. Those findings are the most credible possible case for ongoing managed services.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Managed Security Services&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;The unified platform changes the managed security conversation. Partners are no longer selling “we watch your alerts 24/7.” They are selling an operating model where proprietary AI agents handle the repeatable work — enrichment, hunting, posture validation, response drafting — and human experts focus on the decisions that require judgment.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;This is where the competitive moat forms.&lt;/STRONG&gt; The formula: &lt;A href="https://microsoftpartners.powerappsportals.com/Microsoft-Security-Partners/Modern-SecOps/" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;IP&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt; + Human Orchestration + AI Agents = differentiated managed security.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The unified platform enables this through:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Multi-tenancy&lt;/STRONG&gt; — the built-in multitenant portal eliminates the need for third-party management layers.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Sentinel Data Lake&lt;/STRONG&gt; — agents can query months of customer telemetry for behavioral analysis without cost constraints.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Sentinel Graph&lt;/STRONG&gt; — agents can traverse entity relationships to assess blast radius and map attack paths.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;MCP extensibility&lt;/STRONG&gt; — partners can build agents that integrate with proprietary tools and customer-specific systems.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Partners who build proprietary agents encoding their detection logic into the MCP framework will differentiate from partners who rely on out-of-box capabilities.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;The Securing AI Opportunity&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Organizations are deploying AI agents, copilots, and autonomous workflows across their businesses at an accelerating pace. Every AI deployment creates a new attack surface — prompt injection, data poisoning, agent hijacking, cross-plugin exploitation, unauthorized data access through agentic workflows. These are not theoretical risks. They are in the wild today.&lt;/P&gt;
&lt;P&gt;Partners who can help customers secure their AI deployments while also using AI to strengthen their SOC will command premium positioning. This requires a security platform that is itself AI Agent-ready — one that can deploy defensive agents at the same pace organizations deploy business AI. The unified Defender portal is that platform. Partners who position USX as “preparing your SOC for AI-driven security operations” will differentiate from partners who position it as “moving to a new portal.”&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Cost and Operational Benefits&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Better security architecture also costs less. This is not a contradiction — it is the natural result of putting the right data in the right tier.&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;thead&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Benefit&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;How It Works&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Eliminate low-value ingestion&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Identify and remove log sources that are never used for detections, investigations, or hunting. Immediately lowers analytics-tier costs without impacting security outcomes.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Right-size analytics rules&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Disable unused rules, consolidate overlapping detections, and remove automation that does not reduce SOC effort. Pay only for processing that delivers measurable security value.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Avoid SIEM/XDR duplication&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Many threats can be investigated directly in Defender XDR without duplicating telemetry into Sentinel. Stop re-ingesting data that Defender already provides.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Tier data by detection need&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Store high-volume, hunt-oriented telemetry in the Data Lake at at least 20x lower cost. Promote only high-signal sources to the analytics tier. Full data fidelity preserved in both tiers.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Reduce operational overhead&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Unified SIEM+XDR workflows in a single portal reduce tool switching, accelerate investigations, simplify analyst onboarding, and enable SOC teams to scale without proportional headcount increases.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Improve detection quality&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;The Defender correlation engine produces higher-fidelity incidents with fewer false positives. SOC teams spend less time triaging noise and more time on real threats.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 50.00%" /&gt;&lt;col style="width: 50.00%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;H3&gt;&lt;STRONG&gt;Competitive Positioning&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Partners need defensible talking points when customers evaluate third-party SIEM alternatives. The following advantages are factual, sourced from &lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/move-to-defender" target="_blank" rel="noopener"&gt;Microsoft’s transition documentation&lt;/A&gt; and platform capabilities — not marketing claims.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;No extra cost&lt;/STRONG&gt; for transitioning — even for non-E5 customers. Third-party SIEM migrations involve licensing, data migration, detection rewrite, and integration rebuild costs.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Native cross-domain correlation&lt;/STRONG&gt; across Sentinel + Defender products into multi-stage incident graphs. Third-party SIEMs receive Microsoft logs as flat events — they lack the internal signal context, entity resolution, and product-specific intelligence that powers cross-domain correlation.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Custom detections across SIEM + XDR&lt;/STRONG&gt; — query both Sentinel and Defender XDR tables without ingesting Defender data into Sentinel. Eliminates redundant ingestion cost.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Alert tuning extends to Sentinel&lt;/STRONG&gt; — previously Defender-only capability, now applicable to Sentinel analytics rules. Net-new noise reduction.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Unified entity pages&lt;/STRONG&gt; — consolidated user, device, and IP address pages with data from both Sentinel and Defender XDR, plus global search across SIEM and XDR. Third-party SIEMs provide entity views from ingested data only.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Built-in multi-tenancy for MSSPs&lt;/STRONG&gt; — multitenant portal manages incidents, alerts, and hunting across tenants without third-party management layers. Try out the new&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/unified-secops/governance-relationships" target="_blank" rel="noopener"&gt;GDAP capabilities in Defender portal&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Industry validation: Microsoft’s SIEM+XDR platform has been recognized as a Leader by both &lt;A href="https://www.microsoft.com/en-us/security/blog/2025/06/24/microsoft-is-named-a-leader-in-the-forrester-wave-security-analytics-platforms-2025/" target="_blank" rel="noopener"&gt;Forrester&lt;/A&gt; (Security Analytics Platforms, 2025) and &lt;A href="https://www.microsoft.com/en-us/security/blog/2025/10/16/microsoft-named-a-leader-in-the-2025-gartner-magic-quadrant-for-siem/" target="_blank" rel="noopener"&gt;Gartner&lt;/A&gt; (SIEM Magic Quadrant, 2025).&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Summary: What Partners Should Take Away&lt;/STRONG&gt;&lt;/H3&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;thead&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Topic&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Key Message&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Framing&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;USX is a security architecture transformation, not a portal transition. Lead with detection capability, not cost savings.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Platform foundation&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Sentinel Data Lake + Sentinel Graph + MCP/Agent Framework = the platform for the Agentic SOC.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;4 investigation surfaces&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;KQL → Graph → Notebooks → Agent/MCP. A maturity ladder from “we can query” to “we automate at machine speed.”&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Architecture&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;2-tier data model (analytics + Data Lake) with dual-ingest for critical sources. Cost savings are a side effect of good architecture.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Transition complexity&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Analytics rules and automation rules. API schema changes. RBAC restructuring. Most customers need professional help.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Partner engagement model&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Professional Services (transactional + transition execution + advisory) → Managed Services (MSSP).&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Competitive positioning&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;No extra cost. Native correlation. Cross-domain detections. Built-in multi-tenancy. Capabilities third-party SIEMs cannot replicate.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Partner differentiation&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;A href="https://microsoftpartners.powerappsportals.com/Microsoft-Security-Partners/Modern-SecOps/" target="_blank" rel="noopener"&gt;&lt;U&gt;IP&lt;/U&gt;&lt;/A&gt; + Human Orchestration + AI Agents. Partners who build proprietary agents on MCP have competitive advantage.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Timeline&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;March 31, 2027. Start now — phased transition with one telemetry domain first, then scale.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 50.00%" /&gt;&lt;col style="width: 50.00%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 15:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-community/the-unified-secops-transition-why-it-is-a-security-architecture/ba-p/4513815</guid>
      <dc:creator>Mohit_Kumar1</dc:creator>
      <dc:date>2026-04-23T15:00:00Z</dc:date>
    </item>
    <item>
      <title>From Oversharing to Enforcement: A Practical Guide to AI Data Security with Microsoft Purview</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-purview-blog/from-oversharing-to-enforcement-a-practical-guide-to-ai-data/ba-p/4513727</link>
      <description>&lt;H3&gt;&lt;STRONG&gt;Why AI Changed the Data Security Problem&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;AI does not create entirely new categories of risk—it supercharges existing ones.&lt;/STRONG&gt; Traditional data leakage stems from ordinary behavior: sharing a document too broadly, sending an email to the wrong person, copying regulated data to an uncontrolled device. Generative AI amplifies all of these because of the power and speed with which it can proactively surface content that may be obsolete, over-permissioned, or ungoverned. DSPM exists to help with exactly this challenge: it continuously scans your environment to identify sensitive data, assess risk, and recommend actions to reduce exposure.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Oversharing at Scale&lt;BR /&gt;&lt;/STRONG&gt;Before AI, an overshared SharePoint file might sit unnoticed. Now, Copilot can summarize it in response to a casual prompt, distributing its contents far beyond the original audience.&lt;SPAN style="color: rgb(30, 30, 30);"&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Prompt Leakage&lt;BR /&gt;&lt;/STRONG&gt;Users can inadvertently expose sensitive information—financial account numbers, health records, project code names—simply by typing them into a Copilot prompt. Because AI interactions feel conversational, users tend to drop their guard.&lt;SPAN style="color: rgb(30, 30, 30);"&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Shadow AI&lt;BR /&gt;&lt;/STRONG&gt;Beyond sanctioned tools, employees experiment with unapproved AI services.&lt;SPAN style="color: rgb(30, 30, 30);"&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Autonomous Agents&lt;BR /&gt;&lt;/STRONG&gt;
&lt;P&gt;Autonomous agents expand the data security threat surface by acting independently on sensitive information across systems and boundaries. Their ability to access and share data without direct user interaction increases the risk of oversharing, exfiltration, and unauthorized access, while also introducing complex behavior patterns that are harder to monitor, govern, and control using traditional security models.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;What Microsoft Purview Now Brings Together&lt;/STRONG&gt;&lt;/H3&gt;
&lt;H5&gt;&lt;STRONG&gt;Data Security Posture Management (DSPM)&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;DSPM consolidates insights from &lt;STRONG&gt;Data Loss Prevention (DLP)&lt;/STRONG&gt;, &lt;STRONG&gt;Insider Risk Management&lt;/STRONG&gt;, &lt;STRONG&gt;Information Protection&lt;/STRONG&gt;, and &lt;STRONG&gt;Data Security Investigations&lt;/STRONG&gt; into a single view for monitoring data risks, policy coverage, and posture trends. Now also in Public Preview, DSPM extends coverage to third-party SaaS and IaaS platforms such as &lt;STRONG&gt;Google Cloud Platform&lt;/STRONG&gt;, &lt;STRONG&gt;Snowflake&lt;/STRONG&gt;, and &lt;STRONG&gt;Databricks&lt;/STRONG&gt;, and integrates with partner solutions including &lt;STRONG&gt;Cyera&lt;/STRONG&gt;, &lt;STRONG&gt;BigID&lt;/STRONG&gt;, and &lt;STRONG&gt;OneTrust&lt;/STRONG&gt; for comprehensive risk insights.&lt;/P&gt;
&lt;P&gt;A central innovation in this version is &lt;STRONG&gt;data security objectives&lt;/STRONG&gt;—prominent, selectable cards that each represent a specific security goal.&amp;nbsp;Selecting an objective guides administrators through an end-to-end workflow that groups together the most relevant Purview solutions—information protection, DLP, Insider Risk Management, and eDiscovery—so teams can focus on achieving a specific data security outcome rather than navigating separate solutions.&lt;/P&gt;
&lt;P&gt;Each &lt;STRONG&gt;Outcome&lt;/STRONG&gt; card displays key metrics such as the percentage of data covered by policies, the number of risky sharing incidents, and improvements over time. Within each outcome, DSPM surfaces &lt;STRONG&gt;suggested prioritized actions&lt;/STRONG&gt;—applying sensitivity labels, configuring DLP policies, or investigating alerts—all tailored to the organization's data. Administrators can take action directly from the workflow, including remediating oversharing, configuring &lt;STRONG&gt;one-click policies&lt;/STRONG&gt;, or launching investigations into suspicious activity.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;H5&gt;&lt;STRONG&gt;DLP Integration for AI Interactions&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;DLP is one of the core solutions integrated into DSPM's unified approach. The Activity Explorer's &lt;STRONG&gt;AI activities tab&lt;/STRONG&gt; captures events where DLP rules were matched during AI interactions—including prompts, responses, and browsing to generative AI sites. DSPM can automate remediation steps such as removing public sharing links or applying data loss prevention policies to help prevent incidents before they happen.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;AI Observability and Agent Governance&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Dedicated dashboards and metrics monitor risks associated with AI apps and agents. &lt;STRONG&gt;AI observability&lt;/STRONG&gt; enables tracking of agent-specific activities—oversharing, exfiltration, and unusual access patterns—across both Microsoft and third-party environments. Enhanced reporting provides advanced filtering and customizable views, supporting granular analysis of sensitive data usage, DLP activity, and posture trends. Audit logs and activity explorer features help track interactions with AI apps and agents, supporting compliance investigations and incident response.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;AI-Powered Security Operations&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;DSPM not only secures and governs AI apps and agents but also uses &lt;STRONG&gt;Microsoft Security Copilot and AI agents&lt;/STRONG&gt; to help secure and govern data. AI analyzes access patterns, sharing behaviors, and policy gaps to surface actionable risks and can detect unusual activity such as excessive sharing or suspicious downloads. Under administrator guidance, AI agents can take direct action on detected risks—&lt;STRONG&gt;removing public sharing links, applying DLP policies, or revoking permissions&lt;/STRONG&gt;. These actions are always audited. To streamline investigations, &lt;STRONG&gt;AI-driven triage agents&lt;/STRONG&gt; review alerts from DLP and Insider Risk Management solutions, filtering out noise and highlighting the most critical threats.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Three Practical Starting Points&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;For many organizations adopting generative AI, the biggest hurdle isn't recognizing new risks—it's figuring out where to begin. A "boil the ocean" approach can stall progress, while tackling a few targeted areas delivers quicker wins.&lt;/P&gt;
&lt;P&gt;The best early moves are those that &lt;STRONG&gt;reduce exposure quickly&lt;/STRONG&gt;, &lt;STRONG&gt;improve visibility&lt;/STRONG&gt;, and &lt;STRONG&gt;build a foundation for stronger governance&lt;/STRONG&gt; over time.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Starting Point 1: Enable prompt-level protection for Microsoft 365 Copilot&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;An effective first step is to put guardrails on the &lt;STRONG&gt;prompts&lt;/STRONG&gt; users enter into AI. Microsoft Purview DLP allows administrators to restrict Microsoft 365 Copilot and Copilot Chat from processing prompts that contain sensitive information. In practice, users are often more comfortable pasting data into a chat prompt than attaching it to an email, which means a well-meaning employee could inadvertently feed a confidential file or personal data into Copilot.&lt;/P&gt;
&lt;P&gt;Enabling prompt-level DLP creates an immediate safety net: if a user's prompt includes, say, a credit card number or a customer's national ID, Copilot will detect it and refuse to process or share that content. DSPM provides suggested prioritized actions—including configuring DLP policies—that can be activated directly from the workflow, and recommended policies can start in&amp;nbsp;&lt;STRONG&gt;simulation mode&lt;/STRONG&gt;. Simulation mode lets you see what would have been blocked or flagged, without actually interrupting users, so you can fine-tune the policy and prepare your helpdesk for any questions. Once you're comfortable with the results, switching to enforcement mode will actively block disallowed prompts and log those events for review.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;By activating this one control, you've significantly reduced the most immediate oversharing risk—the "oops, I pasted the wrong data" scenario—within hours of starting your AI governance program.&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;STRONG&gt;Tradeoff:&lt;/STRONG&gt; Simulation mode provides safety but delays enforcement. For organizations with imminent regulatory exposure, consider shortening the simulation window and monitoring alert volumes closely.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H5&gt;&lt;STRONG&gt;Starting Point 2: Gain visibility into shadow AI usage before broad enforcement&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;The second step is to &lt;STRONG&gt;illuminate what's happening in the shadows&lt;/STRONG&gt;. Before rushing into blocking every unsanctioned AI tool, it's crucial to understand how and where AI is being used across the organization. In most enterprises, there's an &lt;EM&gt;official&lt;/EM&gt; layer of AI usage and an often larger, &lt;EM&gt;unofficial&lt;/EM&gt; layer—employees experimenting with free online AI chatbots, writing assistants, or code generators.&lt;/P&gt;
&lt;P&gt;DSPM provides this visibility. The &lt;STRONG&gt;Discover &amp;gt; Apps and agents&lt;/STRONG&gt; dashboard shows AI apps used across the organization, including the top 20 most recently used agents, with details about sensitive data they accessed and how they are protected by Purview policies.&lt;/P&gt;
&lt;P&gt;The &lt;STRONG&gt;AI observability&lt;/STRONG&gt; page provides a broader inventory of all AI apps and agents with activity in the last 30 days, including how many are high risk and the total with sensitive interactions. The Activity Explorer's &lt;STRONG&gt;AI activities tab&lt;/STRONG&gt; shows when users browsed to generative AI sites, the prompts and responses involved, whether sensitive information was present, and whether DLP rules were matched. Armed with this insight, you can make informed decisions. If you discover that the majority of "AI consumption" comes from just two external apps, you might focus your immediate controls on those two. Conversely, if the data shows most unsanctioned usage is low-risk, you might decide to monitor rather than block it.&lt;/P&gt;
&lt;P&gt;The key is &lt;STRONG&gt;visibility first, enforcement second&lt;/STRONG&gt;—letting real data guide where to tighten controls versus where to offer secure alternatives.&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;STRONG&gt;Tradeoff:&lt;/STRONG&gt; Visibility without timely follow-through can create a false sense of security. Set a defined window (e.g., 30 days) after which findings must translate into at least one concrete policy action.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H5&gt;&lt;STRONG&gt;Starting Point 3: Operationalize DSPM objectives for Copilot&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;A stronger third starting point is to use DSPM as your &lt;STRONG&gt;operational guide&lt;/STRONG&gt;, not just a dashboard of charts. DPSM introduces &lt;STRONG&gt;data security objectives&lt;/STRONG&gt;—each one a focused end-to-end workflow for a specific outcome. Rather than configuring individual features in isolation, you select an objective and let Purview navigate you through achieving that outcome with the relevant tools.&lt;/P&gt;
&lt;P&gt;For generative AI, the key objective to leverage early is &lt;STRONG&gt;"Prevent data exposure in Microsoft 365 Copilot and Microsoft Copilot interactions"&lt;/STRONG&gt;. By selecting this objective in the Purview portal, you're effectively telling Purview, "help me implement whatever is needed to make Copilot safe with our data." The DSPM interface then groups together the critical pieces: it may prompt you to enable a DLP policy, suggest applying or refining sensitivity labels on content, or surface an Insider Risk Management policy template for detecting AI-related risky behavior. It also surfaces metrics so you can track progress—for example, the percentage of data covered by policies, or the number of risky sharing incidents that have been remediated.&lt;/P&gt;
&lt;P&gt;Using DSPM objectives keeps your team &lt;STRONG&gt;aligned on a clear goal&lt;/STRONG&gt; from day one. It shifts the conversation from "what knobs do we turn on?" to "how do we achieve this outcome?" You follow a guided plan curated by the platform's intelligence rather than navigating five different admin pages and hoping it adds up to protection.&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;STRONG&gt;Tradeoff:&lt;/STRONG&gt; Objectives streamline the path but can obscure the underlying complexity. Teams should periodically step outside the guided workflow to review the full policy landscape and ensure no coverage gaps exist between objectives.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;H3&gt;&lt;STRONG&gt;From Visibility to Remediation: Turning Insights into Action&lt;/STRONG&gt;&lt;/H3&gt;
&lt;H5&gt;&lt;STRONG&gt;Automated Remediation at Scale&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;DSPM can automate remediation steps such as &lt;STRONG&gt;removing public sharing links&lt;/STRONG&gt; or &lt;STRONG&gt;applying data loss prevention policies&lt;/STRONG&gt; to prevent incidents before they happen. Under administrator guidance, AI agents within DSPM can take direct action on detected risks—removing sharing links, applying DLP policies, or revoking permissions—and these actions are always audited. This moves the operating model from manual, one-at-a-time fixes to systematic, policy-driven remediation.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Closing the Loop: From Risk to Standing Policy&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;DSPM's data security &lt;STRONG&gt;objectives&lt;/STRONG&gt; surface suggested prioritized actions such as applying sensitivity labels, configuring DLP policies, or investigating alerts, all tailored to the organization's data. Reporting and analytics are organized by outcome, making it easier to identify and report improvements, compliance, and risk reduction. This turns recurring findings into standing preventive controls. Instead of re-running assessments and manually fixing the same patterns, administrators create durable policies that enforce the desired state going forward.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;H5&gt;&lt;STRONG&gt;Alert-Driven Investigation and Tuning&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Audit logs and activity explorer features help track interactions with AI apps and agents, supporting compliance investigations and incident response. Integrated investigation and forensics tools support rapid incident response and root cause analysis for data security events. &lt;STRONG&gt;Impact prediction visuals&lt;/STRONG&gt; and &lt;STRONG&gt;progress tracking&lt;/STRONG&gt; for remediation steps are surfaced throughout DSPM, enabling administrators to quantify the effect of their actions and adjust course.&lt;/P&gt;
&lt;P&gt;The closed-loop process is: &lt;STRONG&gt;Discover&lt;/STRONG&gt; (DSPM scans and risk assessments) → &lt;STRONG&gt;Remediate&lt;/STRONG&gt; (automated actions and bulk fixes) → &lt;STRONG&gt;Prevent&lt;/STRONG&gt; (create or tighten DLP and auto-labeling policies) → &lt;STRONG&gt;Monitor&lt;/STRONG&gt; (alert review, investigation, and policy tuning).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;H3&gt;&lt;STRONG&gt;What "Good" Looks Like in a Regulated or Risk-Aware Organization&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;A mature AI governance posture is defined by measurable outcomes and sustainable operating rhythms—not feature count:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Clear, communicated AI usage policies.&lt;/STRONG&gt; Users know what is and is not acceptable in AI interactions because the tools reinforce the rules. DLP policy tips delivered at the moment of a violation are a primary training mechanism—they remind users in context why their prompt was blocked and what to do instead.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Measured enablement over blanket bans.&lt;/STRONG&gt; Leading organizations allow Copilot with appropriate controls and restrict only truly unacceptable scenarios. Policies deployed initially in simulation mode provide data to calibrate enforcement thresholds before blocking. This avoids productivity backlash while preserving security posture.&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;High data hygiene and classification rates.&lt;/STRONG&gt; Purview's AI protections depend heavily on sensitivity labels. If everything is unlabeled or "General," label-based controls have nothing to act on. Mature organizations invest in auto-labeling and mandatory labeling to close this gap before deploying AI at scale. DSPM's data security objectives include suggested actions such as applying sensitivity labels, directly tying classification to governance outcomes.&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Quantifiable risk reduction.&lt;/STRONG&gt; Security leadership can produce metrics from Purview that show trend lines: DSPM Outcome cards display the percentage of data covered by policies, the number of risky sharing incidents, and improvements over time. These figures feed directly into compliance reporting and audit evidence. Key metrics are tracked over time, supporting continuous improvement of the organization's data security posture.&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Cross-functional governance.&lt;/STRONG&gt; AI governance is not a solo IT Security effort. Stakeholders from security, compliance, legal, and business units review AI usage patterns, discuss policy tuning, and evaluate new Purview capabilities as they release. &lt;STRONG&gt;Role-based access controls&lt;/STRONG&gt; within DSPM provide granular access to features and AI content for delegated administration and compliance, enabling this cross-functional model without overexposing sensitive data to every participant.&lt;/LI&gt;
&lt;/UL&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;STRONG&gt;Tradeoff:&lt;/STRONG&gt; Strict enforcement can frustrate power users and slow AI adoption. Organizations should explicitly define escalation paths—if a legitimate use case is blocked by DLP, there must be a fast process to review and adjust, rather than a permanent "no."&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H3&gt;&lt;STRONG&gt;A Phased Adoption Model&lt;/STRONG&gt;&lt;/H3&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table style="width: 99.1667%;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;&lt;STRONG&gt;Phase&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;&lt;STRONG&gt;Focus&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;&lt;STRONG&gt;Key Activities&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Phase 1 — Quick Wins (weeks)&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Visibility and baseline safeguards&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;UL&gt;
&lt;LI&gt;Enable prompt-level DLP for Copilot in simulation mode.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Run first DSPM data risk assessment for oversharing.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Enable shadow AI discovery via DSPM's Apps and agents dashboard and AI observability page.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Start from the DSPM objective "Prevent data exposure in Microsoft 365 Copilot and Microsoft Copilot interactions."&lt;/LI&gt;
&lt;/UL&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Phase 2 — Broad Enforcement (months)&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Acting on findings&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;UL&gt;
&lt;LI&gt;Switch DLP policies from simulation to enforcement.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Use automated remediation actions (removing sharing links, applying DLP policies, revoking permissions).&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Expand sensitive information type definitions and add custom types.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Rollout user communications explaining new controls and escalation paths.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Phase 3 — Mature Governance (ongoing)&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Continuous improvement and AI-powered operations&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;UL&gt;
&lt;LI&gt;Leverage AI-driven triage agents to filter alert noise and highlight critical threats.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Conduct periodic DSPM posture reviews using Outcome card metrics.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Tune policies based on impact prediction visuals and progress tracking.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Extend protections to new AI apps and agents as they are adopted—DSPM's AI observability tracks agent-specific activities across Microsoft and third-party environments.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Formalize cross-functional AI governance cadence.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;STRONG&gt;*Phase 1&lt;/STRONG&gt; should take weeks, not months—the objective is to establish a baseline before risk accumulates.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;*Phase 2&lt;/STRONG&gt; is where enforcement generates measurable risk reduction.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;*Phase 3&lt;/STRONG&gt; is ongoing: as Microsoft continues extending Purview to additional AI apps and agent types, the governance framework must evolve in tandem.&amp;nbsp;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;The DSPM preview's integration with third-party SaaS and IaaS platforms (Google Cloud Platform, Snowflake, Databricks) and partner solutions (Cyera, BigID, OneTrust) means the governance perimeter can expand alongside the organization's AI footprint.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;H3&gt;&lt;STRONG&gt;Conclusion&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;AI adoption and data protection are not opposing forces. Microsoft Purview now provides the visibility, policy controls, and remediation workflows to move from discovering AI risk to actively governing Copilot, third-party AI apps, and agents at scale. DSPM surfaces oversharing and AI usage patterns through unified dashboards, data risk assessments, and AI observability. DLP blocks sensitive data in prompts and restricts AI access to labeled content. Insider Risk Management detects adversarial AI behavior. AI-driven triage and remediation agents close the gap between identifying a problem and fixing it—with every automated action audited.&lt;/P&gt;
&lt;P&gt;The path forward starts with practical actions: enable prompt-level DLP, illuminate shadow AI usage, and operationalize DSPM's &lt;STRONG&gt;"Prevent data exposure in Microsoft 365 Copilot and Microsoft Copilot interactions"&lt;/STRONG&gt; objective. From there, enforce what you find, measure the results using DSPM's outcome-based metrics, and progressively mature your governance posture.&lt;/P&gt;
&lt;P&gt;Organizations that operationalize this loop will be in a strong position: able to say, &lt;EM&gt;"We use AI to work smarter—and we have the safeguards in place to do it safely."&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 14:58:26 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-purview-blog/from-oversharing-to-enforcement-a-practical-guide-to-ai-data/ba-p/4513727</guid>
      <dc:creator>George Smyrlis</dc:creator>
      <dc:date>2026-04-23T14:58:26Z</dc:date>
    </item>
    <item>
      <title>Purview : comment filtrer les résultats “Data products” par termes du glossaire ?</title>
      <link>https://techcommunity.microsoft.com/t5/data-governance/purview-comment-filtrer-les-r%C3%A9sultats-data-products-par-termes/m-p/4514040#M154</link>
      <description>&lt;P&gt;a { text-decoration: none; color: #464feb; } tr th, tr td { border: 1px solid #e6e6e6; } tr th { background-color: #f5f5f5; }&lt;/P&gt;&lt;P&gt;Bonjour,&lt;/P&gt;&lt;P&gt;Je teste Microsoft Purview (Unified Catalog) avec des &lt;STRONG&gt;produits de données&lt;/STRONG&gt; auxquels j’ai associé des &lt;STRONG&gt;termes de glossaire&lt;/STRONG&gt;.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Les termes de glossaire sont &lt;STRONG&gt;publiés&lt;/STRONG&gt; et &lt;STRONG&gt;visibles&lt;/STRONG&gt; dans l’onglet &lt;STRONG&gt;Découverte&lt;/STRONG&gt; → &lt;STRONG&gt;Glossaire d’entreprise&lt;/STRONG&gt;.&lt;/LI&gt;&lt;LI&gt;Les produits de données sont également &lt;STRONG&gt;publiés&lt;/STRONG&gt; et retrouvables via la recherche.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Cependant, je ne vois pas d’option (ou elle ne retourne aucun résultat) pour &lt;STRONG&gt;filtrer les résultats de recherche des produits de données par termes de glossaire&lt;/STRONG&gt;, contrairement à d’autres filtres disponibles (ex. &lt;STRONG&gt;Propriétaire&lt;/STRONG&gt;, &lt;STRONG&gt;Type de produit&lt;/STRONG&gt;)&lt;/P&gt;&lt;P&gt;&amp;nbsp;Est-ce que le filtrage des &lt;STRONG&gt;produits de données&lt;/STRONG&gt; par &lt;STRONG&gt;termes de glossaire&lt;/STRONG&gt; est supporté dans l’onglet Découverte ?&lt;BR /&gt;Si oui, y a-t-il des &lt;STRONG&gt;pré-requis&lt;/STRONG&gt; ou &lt;STRONG&gt;conditions&lt;/STRONG&gt; particulières (ex. type de glossaire, indexation/délai, association au niveau data product vs assets, etc.) ?&lt;/P&gt;&lt;img /&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 13:39:12 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/data-governance/purview-comment-filtrer-les-r%C3%A9sultats-data-products-par-termes/m-p/4514040#M154</guid>
      <dc:creator>Miriane</dc:creator>
      <dc:date>2026-04-23T13:39:12Z</dc:date>
    </item>
    <item>
      <title>Filtrer les résultats de la recherche des produits de données  à l'aide des  termes de glossaire</title>
      <link>https://techcommunity.microsoft.com/t5/data-governance/filtrer-les-r%C3%A9sultats-de-la-recherche-des-produits-de-donn%C3%A9es-%C3%A0/m-p/4514036#M153</link>
      <description>&lt;P&gt;Bonjour,&lt;/P&gt;&lt;P&gt;Je teste Microsoft Purview (Unified Catalog) avec des &lt;STRONG&gt;produits de données&lt;/STRONG&gt; auxquels j’ai associé des &lt;STRONG&gt;termes de glossaire&lt;/STRONG&gt;.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Les termes de glossaire sont &lt;STRONG&gt;publiés&lt;/STRONG&gt; et &lt;STRONG&gt;visibles&lt;/STRONG&gt; dans l’onglet &lt;STRONG&gt;Découverte&lt;/STRONG&gt; → &lt;STRONG&gt;Glossaire d’entreprise&lt;/STRONG&gt;.&lt;/LI&gt;&lt;LI&gt;Les produits de données sont également &lt;STRONG&gt;publiés&lt;/STRONG&gt; et retrouvables via la recherche.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Cependant, je ne vois pas d’option (ou elle ne retourne aucun résultat) pour &lt;STRONG&gt;filtrer les résultats de recherche des produits de données par termes de glossaire&lt;/STRONG&gt;, contrairement à d’autres filtres disponibles (ex. &lt;STRONG&gt;Propriétaire&lt;/STRONG&gt;, &lt;STRONG&gt;Type de produit&lt;/STRONG&gt;).&lt;/P&gt;&lt;P&gt;&amp;nbsp;Est-ce que le filtrage des &lt;STRONG&gt;produits de données&lt;/STRONG&gt; par &lt;STRONG&gt;termes de glossaire&lt;/STRONG&gt; est supporté dans l’onglet Découverte ?&lt;BR /&gt;Si oui, y a-t-il des &lt;STRONG&gt;pré-requis&lt;/STRONG&gt; ou &lt;STRONG&gt;conditions&lt;/STRONG&gt; particulières (ex. type de glossaire, indexation/délai, association au niveau data product vs assets, etc.) ?&lt;/P&gt;&lt;img /&gt;&lt;img /&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 13:34:22 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/data-governance/filtrer-les-r%C3%A9sultats-de-la-recherche-des-produits-de-donn%C3%A9es-%C3%A0/m-p/4514036#M153</guid>
      <dc:creator>Miriane</dc:creator>
      <dc:date>2026-04-23T13:34:22Z</dc:date>
    </item>
    <item>
      <title>Métadonnées personnalisées sous Purview avec une relation un à plusieurs</title>
      <link>https://techcommunity.microsoft.com/t5/data-governance/m%C3%A9tadonn%C3%A9es-personnalis%C3%A9es-sous-purview-avec-une-relation-un-%C3%A0/m-p/4514031#M152</link>
      <description>&lt;P&gt;Bonjour,&lt;/P&gt;&lt;P&gt;Je souhaite créé une métadonnée sous Purview, en l'associant à une métadonnée parent, Comment est-ce possible&lt;/P&gt;&lt;P&gt;Merci de votre retour,&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 13:21:31 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/data-governance/m%C3%A9tadonn%C3%A9es-personnalis%C3%A9es-sous-purview-avec-une-relation-un-%C3%A0/m-p/4514031#M152</guid>
      <dc:creator>Miriane</dc:creator>
      <dc:date>2026-04-23T13:21:31Z</dc:date>
    </item>
    <item>
      <title>'Registering user becomes local admin on Joined Devices' - WHAT</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/registering-user-becomes-local-admin-on-joined-devices-what/m-p/4513794#M10317</link>
      <description>&lt;P&gt;Stumbled on a tenant with 'JOIN' available for all users. Haven't worked with this much - most tenants I see only have registration. But then I noticed the horrifying 'Registering user is added as local administrator on the device during Microsoft Entra join' option was ALSO set to ALL.&lt;/P&gt;&lt;img /&gt;&lt;P&gt;This is a tenant we just took on, but I've never seen that control before. This is terrifying, considering AFAIK, there is no real way for a registering user to know if they're registering or joining. Beneath it is an option to 'Manage Additional local administrators on all Microsoft Entra joined devices', which leads to the Role page for Device Administrators, which is empty.&lt;/P&gt;&lt;img /&gt;&lt;P&gt;Under Description, this describes what APPEARS to be to be the same thing mentioned in the previous control - 'Users with this role become local machine administrators on all Windows 10 devices that are joined to Microsoft Entra'. But no one is assigned this.&lt;/P&gt;&lt;img /&gt;&lt;P&gt;Conveniently, on my own tenant, I happened to let someone JOIN yesterday. We have this limited to 2 (now 3) people - most just register... But this user Joined, and the 'Joining user becomes local admin' option was on ALL. But I can't validate that the user ever become local admin. They don't have the role, their device shows as joined, but there's no additional roles. The audit logs don't look weird. They're not in that 'Device Administrators' group, which describes itself as 'Users with this role become local machine administrators on all Windows 10 devices that are joined to Microsoft Entra'.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thoughts? Freaking out, honestly. We have a mix of DC and Cloud users. I've inherited them all, and had the understanding that Join was essentially registration but with Org ownership. I've tried to get some input from Copilot, but he has basically waffled between 'No, this setting is just badly named' and 'no, actually it's this other setting' and 'no, you know what, it all makes sense somehow'.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Does that option actually set the joining user as global admin? Is that really the default setting?&lt;/P&gt;&lt;P&gt;2. can you validate this ANYWHERE in Entra? Or does it just disappear?&lt;/P&gt;&lt;P&gt;3. what is that Device Admin group? A separate group, independent of these two settings, that gives local admin?&lt;/P&gt;&lt;P&gt;4. Is there a graph endpoint that can be used to set this?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Apr 2026 20:22:52 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/registering-user-becomes-local-admin-on-joined-devices-what/m-p/4513794#M10317</guid>
      <dc:creator>underQualifried</dc:creator>
      <dc:date>2026-04-22T20:22:52Z</dc:date>
    </item>
    <item>
      <title>Declutter and Defend: Reducing promotional mail noise with Microsoft Defender</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/declutter-and-defend-reducing-promotional-mail-noise-with/ba-p/4511732</link>
      <description>&lt;P&gt;Enterprise inboxes are overwhelmed with &lt;STRONG&gt;graymail&lt;/STRONG&gt; — legitimate, bulk email like newsletters, vendor promotions, and product updates that isn't malicious but buries the messages that matter. When high volumes of these mails land in the inbox, it crowds out priority communications and can dull security vigilance. Employees conditioned to ignore repetitive emails may miss signs of a real threat. It also creates recurring work for admins and security teams who must continuously tune filters, manage exception requests, and chase noise from user reports for email that isn’t malicious. Because graymail passes every spam filter check, traditional defenses don't separate it — leaving this signal-to-noise gap unaddressed.&lt;/P&gt;
&lt;P&gt;Today we’re excited to announce that &lt;STRONG&gt;Microsoft Defender now includes built-in graymail filtering. &lt;/STRONG&gt;It is delivered natively through a new &lt;STRONG&gt;Promotions experience in Outlook&lt;/STRONG&gt; that automatically classifies and separates bulk email, so it no longer competes with business-critical communication in the inbox. Now in&amp;nbsp;&lt;STRONG&gt;Public Preview&lt;/STRONG&gt;, this capability learns from how users interact with graymail to become more accurate over time. Coupled with the existing &lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/introducing-bulk-senders-insight-optimizing-bulk-email-management-for-enterprise/4193963" target="_blank" rel="noopener"&gt;Bulk Senders Insight report&lt;/A&gt;, Defender brings data-driven bulk classification and control into the security workflows you already use.&lt;/P&gt;
&lt;H5&gt;What Is Graymail?&lt;/H5&gt;
&lt;P&gt;Graymail is legitimate bulk email that isn't malicious—product newsletters, event announcements, marketing promotions, and software update notifications from reputable, authenticated senders. It is distinct from spam and from phishing - graymail comes from real organizations with proper authentication and traditional spam filters aren't designed to handle it.&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;Graymail handling in Microsoft Defender&lt;/H4&gt;
&lt;P&gt;Microsoft Defender's approach is built on three principles: &lt;STRONG&gt;classify intelligently, deliver natively, and learn continuously&lt;/STRONG&gt;.&lt;/P&gt;
&lt;H5&gt;Promotions Folder — Intelligent Inbox Organization&lt;/H5&gt;
&lt;P&gt;A dedicated &lt;STRONG&gt;Promotions folder,&lt;/STRONG&gt; natively provisioned in Outlook, now keeps legitimate bulk mail out of the primary inbox. Promotional content is separated from priority emails without being sent to &lt;STRONG&gt;Junk&lt;/STRONG&gt;, which means users can still access and browse newsletters and updates at their own pace. The folder appears at the top level of the mailbox for easy discovery and is visible across all Outlook experiences.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Non-spam bulk mail&lt;/STRONG&gt; below the organization's configured &lt;A href="https://learn.microsoft.com/en-us/defender-office-365/anti-spam-bulk-complaint-level-bcl-about" target="_blank" rel="noopener"&gt;Bulk Complaint Level&lt;/A&gt; threshold is automatically routed to the Promotions folder.&lt;/LI&gt;
&lt;LI&gt;Messages from senders the user has explicitly&amp;nbsp;&lt;STRONG&gt;allowed&lt;/STRONG&gt; continue to land in the Inbox.&lt;/LI&gt;
&lt;LI&gt;Messages identified as&amp;nbsp;&lt;STRONG&gt;spam&lt;/STRONG&gt; continue to go to Junk.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;To enable the Promotions folder administrators need to enable the &lt;STRONG&gt;"Bulk Moves Enabled"&lt;/STRONG&gt; setting in their anti-spam policy. The Promotions folder is then created for all users and used for routing only when this setting is ON.&lt;/P&gt;
&lt;P&gt;Existing mail flow is unaffected.&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Figure 1: system tagging of “Promotions” in outlook client and promotions folder (previously tagged as “Bulk” in private and public preview)&lt;/EM&gt;&lt;/img&gt;
&lt;H5&gt;Promotional mail tagging and Mailbox Rule Support&lt;/H5&gt;
&lt;P&gt;Messages classified as graymail will automatically be labeled with a &lt;STRONG&gt;"Promotions" system tag&lt;/STRONG&gt; in Outlook. The tag provides instant visual context without requiring users to open each message and is visible in Outlook on the Web and the native Outlook desktop apps for Windows and Mac. During Public Preview, the tagging component is opt-in, requiring administrators to &lt;STRONG&gt;enable it by configuring an Exchange Transport Rule&lt;/STRONG&gt;. Once generally available, it will be enabled by default.&lt;/P&gt;
&lt;P&gt;Because this classification is integrated at the client level, the Promotions tag can also be used as a condition in Outlook mailbox rules. This enables custom routing logic for advanced scenarios like moving all promotions-tagged messages from a specific sender to a custom folder, flagging certain promotional emails for follow-up, or auto-forwarding or deleting promotions that meet specific criteria. This transforms the Promotions classification from a one-way filter into a flexible building block for personal and organizational workflows—particularly valuable for power users and teams with compliance or archival requirements.&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Figure 2: User inbox rules using “Promotion” tag (previously “Bulk” in private and public preview)&lt;/EM&gt;&lt;/img&gt;
&lt;H5&gt;Adaptive Learning&lt;/H5&gt;
&lt;P&gt;Microsoft Defender's graymail filtering gets smarter with every interaction. The system learns directly from how users handle their mail. When a user moves a message out of the Promotions folder and back to the Inbox, future emails from that sender will no longer be placed in the Promotions folder. When a user moves a message from the Inbox into the Promotions folder, future emails from that sender will be routed to the Promotions folder automatically.&lt;/P&gt;
&lt;P&gt;This creates a personalized, self-improving experience that becomes more accurate over time - no manual rule configuration required, no safe-sender lists to maintain, and no filtering rules for IT teams to manage on behalf of individual employees.&lt;/P&gt;
&lt;H5&gt;Built into existing Security Workflows&lt;/H5&gt;
&lt;P&gt;Administrators also gain visibility through the &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/introducing-bulk-senders-insight-optimizing-bulk-email-management-for-enterprise/4193963" target="_blank" rel="noopener" data-lia-auto-title="Bulk Senders Insight report" data-lia-auto-title-active="0"&gt;&lt;STRONG&gt;Bulk Senders Insight report&lt;/STRONG&gt;&lt;/A&gt;, which provides data-driven guidance on what your organization actually receives and can help tune your bulk mail filtering.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Graymail has long been the unsolved middle ground of email security—too legitimate to block, too noisy to ignore. Microsoft Defender now handles it where it should be handled: inside the platform, inside the mailbox, and inside the security workflows your organization already relies on. No new portals, no new vendors, no compromise between security and user experience.&lt;/P&gt;
&lt;H4&gt;Get Started&lt;/H4&gt;
&lt;OL&gt;
&lt;LI&gt;Configure promotions tagging and the promotions folder today - &lt;A href="https://learn.microsoft.com/en-us/defender-office-365/anti-spam-bulk-complaint-level-bcl-about" target="_blank" rel="noopener"&gt;Bulk email detection documentation on Microsoft Learn&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;Monitor the experience using the &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/introducing-bulk-senders-insight-optimizing-bulk-email-management-for-enterprise/4193963" target="_blank" rel="noopener" data-lia-auto-title="Bulk Senders Insight report" data-lia-auto-title-active="0"&gt;Bulk Senders Insight report&lt;/A&gt;.&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Thu, 23 Apr 2026 03:59:21 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/declutter-and-defend-reducing-promotional-mail-noise-with/ba-p/4511732</guid>
      <dc:creator>FaithEbenezerOquong</dc:creator>
      <dc:date>2026-04-23T03:59:21Z</dc:date>
    </item>
    <item>
      <title>Now generally available: License usage insights in Microsoft Entra</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/now-generally-available-license-usage-insights-in-microsoft/ba-p/4507463</link>
      <description>&lt;P&gt;Organizations rely on Microsoft Entra to secure access in an ever-changing identity threat landscape without sacrificing workforce productivity. As organizations adopt advanced identity and access capabilities, IT teams often need greater transparency into how those capabilities are being used, particularly around licensing. You need to see which identity protections are securing your users and identify gaps from unused controls.&lt;/P&gt;
&lt;P&gt;Today, we’re excited to announce the general availability of&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/entra/fundamentals/concept-license-usage-insights" target="_blank"&gt;Microsoft Entra license usage insights&lt;/A&gt;, a redesigned experience in the Microsoft Entra admin center that helps you better understand your license entitlements and how your security controls are being used across your organization.&lt;/P&gt;
&lt;H2&gt;Why it matters&lt;/H2&gt;
&lt;P data-start="330" data-end="417"&gt;With&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/entra/fundamentals/concept-license-usage-insights" target="_blank"&gt;license usage insights&lt;/A&gt;, you can:&lt;/P&gt;
&lt;UL data-start="419" data-end="974"&gt;
&lt;LI data-section-id="1c8chhy" data-start="419" data-end="560"&gt;&lt;STRONG data-start="421" data-end="457"&gt;Strengthen your security posture&lt;/STRONG&gt;&amp;nbsp;by ensuring critical identity protections are not just licensed, but actively protecting your users.&lt;/LI&gt;
&lt;LI data-section-id="1bga8dg" data-start="561" data-end="670"&gt;&lt;STRONG data-start="563" data-end="595"&gt;Close protection gaps faster&lt;/STRONG&gt;&amp;nbsp;by identifying underutilized controls and bringing them into production.&lt;/LI&gt;
&lt;LI data-section-id="1qs47iv" data-start="671" data-end="830"&gt;&lt;STRONG data-start="673" data-end="718"&gt;Reduce exposure to identity-based attacks&lt;/STRONG&gt;&amp;nbsp;by increasing adoption of capabilities like risk-based access policies.&lt;/LI&gt;
&lt;LI data-section-id="1arllne" data-start="831" data-end="974"&gt;&lt;STRONG data-start="833" data-end="870"&gt;Stay ahead of compliance and risk&lt;/STRONG&gt;&amp;nbsp;with visibility into usage trends, helping you proactively address gaps as your organization evolves.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;What’s new in the GA release&lt;/H2&gt;
&lt;P&gt;Since&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/introducing-microsoft-entra-license-utilization-insights/3796393" target="_blank"&gt;public preview&lt;/A&gt;, we’ve introduced several enhancements to make&amp;nbsp;&lt;STRONG&gt;license entitlement&lt;/STRONG&gt;&amp;nbsp;and&amp;nbsp;&lt;STRONG&gt;feature usage data&lt;/STRONG&gt;&amp;nbsp;easier to find and act on:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Six-month usage trends&lt;/STRONG&gt;: Understand historical patterns for better forecasting.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Clear differentiation between active and guest users&lt;/STRONG&gt;&amp;nbsp;for precise reporting.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Copilot prompt suggestions&lt;/STRONG&gt;&amp;nbsp;to help you explore license usage insights faster.&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;The main license usage report view (Billing &amp;gt; Licenses).&lt;/EM&gt;&lt;/P&gt;
&lt;H2&gt;Where to find the license usage insights&lt;/H2&gt;
&lt;P&gt;Navigate to&amp;nbsp;&lt;STRONG&gt;Billing &amp;gt; Licenses&lt;/STRONG&gt;&amp;nbsp;in the&amp;nbsp;&lt;A href="https://entra.microsoft.com/" target="_blank"&gt;Microsoft Entra admin center&lt;/A&gt;. You’ll see two key widgets: License entitlements and Product usage insights.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;License entitlements&lt;/STRONG&gt;: Displays your total Entra license entitlements, such as Microsoft Entra ID P1, P2, Microsoft Entra Suite, and standalone SKUs. For example,&amp;nbsp;&lt;EM&gt;250 Microsoft Entra Suite licenses entitle your organization to 250 each of Private Access, Internet Access, ID Governance, and Verified ID.&lt;/EM&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;The License entitlements view.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG data-start="179" data-end="206"&gt;Product usage insights:&lt;/STRONG&gt; View product and feature usage over the past six months in one place, giving you a clear picture of which security protections are licensed, in use, and where gaps may exist. Quickly compare licenses in use versus available and spot adoption trends. Hover over the bar chart for more details or contact your Microsoft representative for guidance.&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;The Product usage insights view.&lt;/EM&gt;&lt;/P&gt;
&lt;H2&gt;Next steps&lt;/H2&gt;
&lt;P data-start="347" data-end="716"&gt;Visit&amp;nbsp;&lt;STRONG data-start="353" data-end="375"&gt;Billing &amp;gt; Licenses&lt;/STRONG&gt;&amp;nbsp;in the Microsoft Entra admin center to explore license usage insights today and start identifying where your existing identity protections can be strengthened. With clear visibility into how your controls are being used, you can take action to close gaps, increase adoption of critical safeguards, and improve your overall security posture.&lt;/P&gt;
&lt;P data-start="718" data-end="941"&gt;We’d love your feedback on how this visibility into your Microsoft Entra usage supports your workflows and what additional insights would be most valuable. Share your thoughts in the comments or through the Feedback portal.&lt;/P&gt;
&lt;P&gt;-Joseph Dadzie, Vice President of Product Management&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Additional resources&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/fundamentals/concept-license-usage-insights" target="_blank"&gt;Microsoft Entra license usage insights - Microsoft Entra | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/fundamentals/licensing" target="_blank"&gt;Microsoft Entra licensing - Microsoft Entra | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/fundamentals/get-started-premium" target="_blank"&gt;Sign up for Microsoft Entra ID P1 or P2- Microsoft Entra | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more about Microsoft Entra&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;⁠&lt;A href="https://www.microsoft.com/en-us/security/blog/products/microsoft-entra/" target="_blank"&gt;Microsoft Entra News and Insights | Microsoft Security Blog&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/bg-p/Identity" target="_blank"&gt;⁠Microsoft Entra blog | Tech Community&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://learn.microsoft.com/en-us/entra/" target="_blank"&gt;Microsoft Entra documentation | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra/bd-p/Azure-Active-Directory" target="_blank"&gt;Microsoft Entra discussions | Microsoft Community&amp;nbsp;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 18:13:19 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/now-generally-available-license-usage-insights-in-microsoft/ba-p/4507463</guid>
      <dc:creator>Joseph Dadzie</dc:creator>
      <dc:date>2026-04-23T18:13:19Z</dc:date>
    </item>
  </channel>
</rss>

