<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>New blog articles in Microsoft Community Hub</title>
    <link>https://techcommunity.microsoft.com/t5/</link>
    <description>Microsoft Community Hub</description>
    <pubDate>Fri, 01 May 2026 15:02:09 GMT</pubDate>
    <dc:creator>Community</dc:creator>
    <dc:date>2026-05-01T15:02:09Z</dc:date>
    <item>
      <title>Microsoft 365 E7 and Agent 365 are now generally available</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-365-blog/microsoft-365-e7-and-agent-365-are-now-generally-available/ba-p/4516295</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Frontier&amp;nbsp;Transformation&amp;nbsp;is about&amp;nbsp;fundamentally changing how&amp;nbsp;organizations&amp;nbsp;operate&amp;nbsp;–&amp;nbsp;embedding&amp;nbsp;AI into everyday workflows&amp;nbsp;to&amp;nbsp;accelerate decisions,&amp;nbsp;improve outcomes,&amp;nbsp;and drive measurable&amp;nbsp;business&amp;nbsp;impact.&amp;nbsp;Achieving these&amp;nbsp;benefits&amp;nbsp;requires more than just access to powerful models.&amp;nbsp;At Microsoft,&amp;nbsp;we&amp;nbsp;see&amp;nbsp;transformations&amp;nbsp;succeed only when&amp;nbsp;two&amp;nbsp;elements&amp;nbsp;come together:&amp;nbsp;Intelligence&amp;nbsp;and&amp;nbsp;Trust.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft 365 E7 is&amp;nbsp;built&amp;nbsp;to&amp;nbsp;do exactly that&amp;nbsp;–&amp;nbsp;combining&amp;nbsp;advanced&amp;nbsp;AI capabilities with enterprise-grade security&amp;nbsp;and governance&amp;nbsp;so&amp;nbsp;organizations&amp;nbsp;can&amp;nbsp;move&amp;nbsp;beyond isolated pilots and deploy AI confidently&amp;nbsp;at scale.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Today, Microsoft 365 E7&amp;nbsp;– the Frontier Suite&amp;nbsp;– is&amp;nbsp;generally available,&amp;nbsp;offering a single, integrated solution&amp;nbsp;that unifies intelligence and trust, so&amp;nbsp;organizations&amp;nbsp;can&amp;nbsp;move from experimentation&amp;nbsp;to enterprise-wide AI adoption.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft 365 E7 brings these capabilities together in one suite:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Wingdings" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Wingdings&amp;quot;,&amp;quot;469769242&amp;quot;:[9642],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft 365 Copilot:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;AI&amp;nbsp;built&amp;nbsp;for&amp;nbsp;work&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Wingdings" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Wingdings&amp;quot;,&amp;quot;469769242&amp;quot;:[9642],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft 365 E5:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;enterprise‑grade productivity, security, identity, and compliance&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Wingdings" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Wingdings&amp;quot;,&amp;quot;469769242&amp;quot;:[9642],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft Entra Suite:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;identity and&amp;nbsp;network&amp;nbsp;access controls&amp;nbsp;that secure employee use of all apps and&amp;nbsp;AI&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Wingdings" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Wingdings&amp;quot;,&amp;quot;469769242&amp;quot;:[9642],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Microsoft Agent 365:&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;the control plane for governing,&amp;nbsp;observing, and securing AI agents at scale&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This integrated approach helps organizations confidently deploy AI&amp;nbsp;and&amp;nbsp;agents&amp;nbsp;at scale&amp;nbsp;while&amp;nbsp;maintaining&amp;nbsp;the security and compliance posture they&amp;nbsp;need, using the enterprise-grade tools they&amp;nbsp;trust&amp;nbsp;from Microsoft.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;With today’s general availability, customers can now&amp;nbsp;purchase&amp;nbsp;and deploy Microsoft 365 E7 across their organizations.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN data-contrast="auto"&gt;Agent 365 is now&amp;nbsp;generally&amp;nbsp;available&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Today also marks&amp;nbsp;the general availability of&amp;nbsp;Microsoft Agent 365.&amp;nbsp;Agent 365&amp;nbsp;is&amp;nbsp;the control&amp;nbsp;plane&amp;nbsp;for agents, extending&amp;nbsp;the&amp;nbsp;visibility, control, and trust&amp;nbsp;that organizations&amp;nbsp;rely&amp;nbsp;on for users to&amp;nbsp;the&amp;nbsp;agents&amp;nbsp;they&amp;nbsp;deploy.&amp;nbsp;To learn more about Agent 365 and&amp;nbsp;expanded&amp;nbsp;capabilities&amp;nbsp;we are announcing&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://aka.ms/A365GAblog" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;read the latest Blog here.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;As agents become part of everyday work, Agent 365&amp;nbsp;provides&amp;nbsp;a consistent way to:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Observe:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;Gain visibility into agents in your environment, understand how&amp;nbsp;they’re&amp;nbsp;used, and act quickly on performance, ​behavior, and risk signals before they&amp;nbsp;impact&amp;nbsp;the business.​&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Govern:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Establish&amp;nbsp;guardrails for&amp;nbsp;agents and people,&amp;nbsp;onboard agents with IT&amp;nbsp;oversight, and govern&amp;nbsp;agent access to&amp;nbsp;resources and data. Be&amp;nbsp;audit ready with built-in compliance and&amp;nbsp;data retention.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Secure&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;:&lt;/STRONG&gt;&amp;nbsp;Secure agent&amp;nbsp;identities, control&amp;nbsp;access to resources,&amp;nbsp;prevent data&amp;nbsp;oversharing and leaks,&amp;nbsp;and defend against&amp;nbsp;threats and&amp;nbsp;vulnerabilities with&amp;nbsp;enterprise-grade&amp;nbsp;security solutions.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="lia-embeded-content" contenteditable="false"&gt;&lt;IFRAME src="https://www.youtube.com/embed/viPY8ZFsYos?si=ZGFL5FbBFLqj6oqG" width="560" height="315" title="YouTube video player" allowfullscreen="allowfullscreen" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" frameborder="0" sandbox="allow-scripts allow-same-origin allow-forms"&gt;&lt;/IFRAME&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Agent 365 provides management and protection for agents built across platforms and runtimes, including SaaS, cloud, and local agents. Agent 365 also supports agents with both their&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;own access&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;and&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;delegated access&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;,&amp;nbsp;helping to ensure&amp;nbsp;a consistent approach across all agent scenarios.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN data-contrast="auto"&gt;Get started with&amp;nbsp;Microsoft 365 E7&amp;nbsp;and Agent&amp;nbsp;365&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;At $99 per user per month, E7&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-fontsize="12"&gt;&lt;SUP&gt;1&lt;/SUP&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;is priced below purchasing these capabilities à la carte, giving customers a simpler, more cost-effective way to deploy enterprise AI at scale.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In addition to being included with Microsoft 365 E7, Agent 365 is available as a standalone license at $15 per user per month.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-fontsize="12"&gt;&lt;SUP&gt;1&lt;/SUP&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft 365 E7 is available with and without Teams.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;SPAN data-contrast="auto"&gt;Read related articles and resources:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;A href="https://blogs.microsoft.com/blog/2026/03/09/introducing-the-first-frontier-suite-built-on-intelligence-trust/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Introducing the First Frontier Suite built on Intelligence + Trust&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.microsoft.com/en-us/microsoft-365/blog/2026/03/09/powering-frontier-transformation-with-copilot-and-agents/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Powering Frontier Transformation with Copilot and agents&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;A class="lia-external-url" href="https://partner.microsoft.com/blog/article/microsoft-365-e7-general-availability" target="_blank"&gt;Partner Blog:&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://partner.microsoft.com/blog/article/microsoft-365-e7-general-availability" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Lead Frontier Transformation&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;with Microsoft 365 E7, now&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;generally available&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.microsoft.com/en-us/microsoft-365/microsoft-365-enterprise" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft 365&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Enterprise&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Webp&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;age&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.microsoft.com/en-us/microsoft-agent-365?msockid=2ab77f387373666836e769cc726967b6" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Agen&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;t 36&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;5&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;W&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;e&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;bpage&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Agent 365 adoption resources and a Getting Started Guide are available at&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://aka.ms/A365adoption" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;aka.ms/A365adoption&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;To discuss how&amp;nbsp;Microsoft 365&amp;nbsp;E7&amp;nbsp;can meet your organization’s needs&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;, please&amp;nbsp;connect with&amp;nbsp;your Microsoft representative or&amp;nbsp;partner&amp;nbsp;of choice.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 01 May 2026 15:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-365-blog/microsoft-365-e7-and-agent-365-are-now-generally-available/ba-p/4516295</guid>
      <dc:creator>carolinestanford</dc:creator>
      <dc:date>2026-05-01T15:00:00Z</dc:date>
    </item>
    <item>
      <title>What’s New in Agent 365: May 2026</title>
      <link>https://techcommunity.microsoft.com/t5/agent-365-blog/what-s-new-in-agent-365-may-2026/ba-p/4516340</link>
      <description>&lt;P&gt;&lt;EM&gt;By Alex Pozin, Samer Baroudi&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;As we celebrate the&amp;nbsp;&lt;A class="lia-external-url" href="https://aka.ms/A365GAblog" target="_blank" rel="noopener"&gt;general availability of Agent 365,&lt;/A&gt; we’re sharing a closer look at the core capabilities that help organizations adopt agents at scale, responsibly and with speed. Agent 365 is built on three core value pillars: observe, govern, and secure, designed to give IT and security teams clear visibility, consistent controls, and enterprise-grade protection across your entire agent fleet. In this series, we’ll highlight new Agent 365 features and enhancements now and over the months ahead. Let’s dive deep into all the things you can do today. &amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Observe: Monitor and manage agents in real time&lt;/H2&gt;
&lt;H3&gt;Agent 365 overview dashboard&lt;/H3&gt;
&lt;P&gt;The Agent 365 overview dashboard is your starting point for Agent 365 in the Microsoft 365 admin center. With the overview dashboard you gain a clear, real-time view of your agents fleet by surfacing key metrics such as total registered agents, active users, growth trends, connected platforms, total runtime in hours, and emerging risk signals. At a glance, admins can understand the scale, adoption, and overall risk posture of their agent fleet, while recommended actions highlight where attention is needed most, such as reviewing pending agent requests, assigning owners to unclaimed agents, or addressing agents with exceptions (e.g. errors in conversation). Deeper analytics enable exploration of who is building agents, which platforms are gaining traction, how adoption is trending over time, and which agents are most heavily used, helping organizations move from basic visibility to informed, proactive governance as their agent ecosystem grows. As we continue to enrich the overview dashboard based on your needs, use this surface to quickly assess the scale, health, and risk posture of your agent environment, and take prioritized actions to stay in control as adoption grows.&lt;/P&gt;
&lt;img&gt;An image showing the Agent 365 overview page with tile cards displaying key metrics, top actions and agent analytics.&lt;/img&gt;
&lt;H3&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc1064385918"&gt;&lt;/A&gt;Registry&lt;/H3&gt;
&lt;P&gt;As organizations scale their use of agents, having a single, authoritative system of record for agents becomes foundational to visibility, control, and trust. Agent 365 provides a centralized and unified registry that serves as the system of record for agents in the organization. Each agent&lt;SUP&gt;1&lt;/SUP&gt;, including those built by Microsoft, your organization, or ecosystem partners, is detailed with a complete record enriched with metadata like its name, description, publisher, platform, ownership, availability and deployment status, permissions from the Microsoft Graph, data and tools access, security and compliance details, certifications, usage activity, and more, giving IT and security teams a full view and eliminating blind spots.&lt;/P&gt;
&lt;img&gt;&lt;SPAN data-contrast="auto"&gt;An image displaying the Agent 365 registry, showing a list view of agents, tile cards for agent counts, and filter/search navigation elements.&lt;/SPAN&gt;&lt;/img&gt;
&lt;H3&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc34039003"&gt;&lt;/A&gt;Map&lt;/H3&gt;
&lt;P&gt;The agents map view provides a visual graph of the agent ecosystem, organizing agents by platform into clear clusters and surfacing agent counts so admins can quickly understand the scale and composition of their environment. As you zoom in, the map reveals individual agents and, for a selected agent, visualizes its connections to other agents, making dependencies and relationships explicit as agent usage grows across Microsoft and third-party platforms. Together, these views help IT and security teams move beyond static lists to spot patterns, understand how agents interact, and maintain visibility as their agent landscape becomes more complex.&lt;/P&gt;
&lt;img&gt;An image showing the map view of all agents in the organization clustered by platform&lt;/img&gt;
&lt;H3&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc603326186"&gt;&lt;/A&gt;Agent-level activity&lt;/H3&gt;
&lt;P&gt;Agent‑level activity metrics give admins operational visibility into how each agent is running and being used across the organization. Metrics such as usage sessions, engagement trends, and active users, help admins assess agent usage and validate adoption. Additionally, by correlating activity with users and policy signals, teams can quickly assess unusual behavior, exception alerts, or misconfigurations. Exportable activity data enables deeper analysis and reporting.&lt;/P&gt;
&lt;img&gt;&lt;SPAN data-contrast="auto"&gt;An image showing a fictitious agent named Zava Alerting agent selected in the registry and displaying agent activity details with metrics and charts for active users, sessions and agent responses&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;/img&gt;
&lt;H2&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc713979040"&gt;&lt;/A&gt;Registry sync (Preview)&lt;/H2&gt;
&lt;P&gt;As agents are increasingly built and deployed across multiple platforms, organizations often lack a unified way to discover, inventory, and govern them. Registry sync enables AI admins to securely consent to and connect ecosystem partner agent platforms to Agent 365, bringing external agents and their metadata into the Agent 365 registry for a more unified view of your agent population. Where supported by the synced platform, you can also take agent-level governance actions directly from the Agent 365 registry, starting with agent deletion, to agents built on these platforms. The initial preview includes connections to AWS and Google Cloud, with additional partner platforms planned for future releases.&lt;/P&gt;
&lt;img&gt;An image showing the registry sync detail view for the Amazon Bedrock connection showing options to sync, edit, and delete the connection, connection details, and a list of synced agents.&lt;/img&gt;
&lt;H3&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc1664103494"&gt;&lt;/A&gt;Shadow AI detection and blocking (Preview)&lt;/H3&gt;
&lt;P&gt;Local agents installed on company devices outside IT and security visibility is an emerging endpoint risk. These agents can read files, execute code, and act on a user’s behalf, enabling access to sensitive data or risky operations without touching managed cloud services. Agent 365 provides the control plane to register and manage approved agents across the environment.&lt;/P&gt;
&lt;P&gt;A new Shadow AI page, enabled by Microsoft Defender and Microsoft Intune, helps identify local agent activity on Windows devices and apply endpoint controls. Initial support includes OpenClaw, with plans to expand to additional widely used agents over time. Admins get a centralized view of local agent usage and can take action to limit unsanctioned execution paths at the endpoint, helping reduce risk while supporting approved tools.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Detect — one view of local agents across the environment with Agent 365&lt;/LI&gt;
&lt;LI&gt;Block — Intune policies that help stop unsanctioned agent execution at the endpoint&lt;/LI&gt;
&lt;LI&gt;Protect at scale — guardrails expand with your estate as coverage extends beyond OpenClaw to GitHub Copilot CLI, Claude Code, and more.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These capabilities help reduce Shadow AI exposure and bring local agents into a governed, secure endpoint posture.&lt;/P&gt;
&lt;img&gt;&lt;SPAN data-contrast="auto"&gt;An image showing the &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;new Shadow AI page in Agent 365 in the Microsoft 365 admin center, with a list of devices that OpenClaw agents are running on.&lt;/SPAN&gt;&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;SPAN data-contrast="auto"&gt;An image showing the &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;new &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;Shadow AI &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;page of Agent 365 in the Microsoft 365 admin center, where Intune policies are being applied&lt;/SPAN&gt;&lt;/img&gt;
&lt;H2&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc926392280"&gt;&lt;/A&gt;Govern: Establish guardrails for agents and users&lt;/H2&gt;
&lt;H3&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc66579357"&gt;&lt;/A&gt;Agent-level lifecycle and governance actions&lt;/H3&gt;
&lt;P&gt;AI admins can install, publish, block, unblock, delete, assign new owner for agents - all directly from the Agent 365 registry. Centralized lifecycle and governance actions remove friction, reduce delays, and enable fast response as agents are created, shared, and retired.&lt;/P&gt;
&lt;img&gt;&lt;SPAN data-contrast="auto"&gt;An image showing the agent-level governance actions in the Agent 365 registry&lt;/SPAN&gt;&lt;/img&gt;
&lt;H3&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc195144610"&gt;&lt;/A&gt;Agent distribution and availability controls&lt;/H3&gt;
&lt;P&gt;Agent distribution and availability controls ensure the right agents reach the right users without overexposure or risk. You can install an agent and precisely control where it’s available across the organization, choosing to make it available to no users, all users, or specific users and groups. This foundational control is critical as it can help enable safe and intentional rollout of agents aligned to roles, readiness, and business need.&lt;/P&gt;
&lt;img&gt;An image displaying the Zava Alerting agent selected in the registry showing installation and availability controls, making it available to only the Agent 365 AI admin and Security Admin user groups&lt;/img&gt;
&lt;H3&gt;Admin approval and publication flow for requested agents&lt;/H3&gt;
&lt;P&gt;The agent approval and publication flow gives admins a centralized control point to review agents before they reach users. Assess each requested agent’s capabilities, data access, permissions, and security and compliance posture in the Agent 365 registry, then choose to publish or reject it from a single workflow. This prevents agent sprawl, reduces over‑privileged access, and ensures agents are onboarded with the right governance across Copilot Studio, Microsoft Foundry, and expanding agent platforms.&lt;/P&gt;
&lt;img&gt;&lt;SPAN data-contrast="auto"&gt;An image displaying requested agents showing the fictitious Staffing Agent selected with options to either public to store or reject submission&lt;/SPAN&gt;&lt;/img&gt;
&lt;H3&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc578845148"&gt;&lt;/A&gt;Agent management rules&lt;/H3&gt;
&lt;P&gt;To help scale governance as adoption grows, Agent 365 automates routine management jobs with rules that act when conditions are met such as expiring inactive agents or blocking agents flagged as risky. Initially, rules-based governance will include standard rules for auto-deployment&amp;nbsp;of Microsoft-built agents as well as auto-reassignment of ownerless agents (starting with agents built with Agent Builder).&lt;/P&gt;
&lt;img&gt;An image displaying agent management rules in Agent 365 settings displaying the standard rule for reassigning ownerless agents.&lt;/img&gt;
&lt;H3&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc1903669693"&gt;&lt;/A&gt;Policy templates&lt;/H3&gt;
&lt;P&gt;Policy templates address the challenge of applying consistent security, compliance, and access controls as agent adoption scales across the organization. By grouping existing policies from services like Microsoft Entra, Microsoft Purview, Microsoft Defender, and Microsoft SharePoint into reusable templates, admins can apply standardized settings and guardrails to agents during approval or onboarding. This ensures consistent governance without configuring individual policies per agent, and is distinct from rules based automation, which manages lifecycle actions after deployment.&lt;/P&gt;
&lt;img&gt;An image displaying policy templates in Agent 365 settings showing a specific policy template detail view including policies from Microsoft Entra, Purview, Defender, and SharePoint&lt;/img&gt;
&lt;H3&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc1519144774"&gt;&lt;/A&gt;Tools management&lt;/H3&gt;
&lt;P&gt;Tools are the resources and services an agent uses to take action and get work done within approved boundaries; for example, an agent can use the Microsoft Teams MCP to schedule a meeting, summarize a conversation, and post updates back to a Teams channel for the group. As agents are built with more capabilities taking more actions across Microsoft 365 and beyond, unmanaged tools introduce security, compliance, and operational risk. Tools management in Agent 365 gives AI admins a centralized control point to view, allow, or block the tools agents can use, such as Microsoft MCP servers, across the tenant. By enforcing consistent, admin-approved tooling policies, organizations ensure agents operate only within approved boundaries and permissions, reducing risk without slowing innovation or requiring per-agent configuration.&lt;/P&gt;
&lt;img&gt;&lt;SPAN data-contrast="auto"&gt;An image displaying the Tools management pane in Agent 365 displaying a list view of MCP servers&lt;/SPAN&gt;&lt;/img&gt;
&lt;H3&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc1655251611"&gt;&lt;/A&gt;Identity governance for agents&lt;/H3&gt;
&lt;P&gt;High-impact agents often rely on access to a wide range of organizational resources to perform their tasks, making it critical to manage permissions with precision and control. Microsoft Entra ID Governance for agents brings agents into the same identity governance model used for people. Access packages help define and manage agent permissions with appropriate scope and control, while sponsor lifecycle workflows ensure each agent identity has an assigned user responsible for overseeing access, maintaining accountability, and keeping access aligned with organizational policies over time. Together, these capabilities help organizations keep agent access visible, intentional, and manageable as agents evolve, enabling consistent governance and control at scale as agent adoption grows.&lt;/P&gt;
&lt;img&gt;An image displaying ID Governance access package policy being applied to a policy template in Agent 365&lt;/img&gt;
&lt;H3&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc2131807634"&gt;&lt;/A&gt;Data Lifecycle Management for agents and interactions&lt;/H3&gt;
&lt;P&gt;As agents reason over and generate content, organizations need clear controls over how long agent interactions are retained and when they’re removed. Microsoft Purview Data Lifecycle Management enables admins to define retention and deletion policies for human‑to‑agent and agent‑to‑human interactions, scoped by users, agents, or groups, with custom retention periods and post‑retention actions. By extending proven Purview controls to agent interactions, organizations can reduce data exposure and scale agent adoption with consistent, auditable data governance.&lt;/P&gt;
&lt;img&gt;An image displaying a data lifecycle management retention policy in Microsoft Purview&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc1881885847"&gt;&lt;/A&gt;Communication compliance for agents&lt;/H3&gt;
&lt;P&gt;As agents interact with people at scale, organizations need visibility and controls to detect unethical, inappropriate, or non-compliant behavior. Microsoft Purview Communication Compliance in Agent&amp;nbsp;365 enables you to define and apply policies to human-to-agent and agent-to-human interactions, enabling centralized detection, review, and investigation of risky behavior. By bringing AI interactions into existing compliance operations, organizations can promote responsible agent use, protect employees, and scale agent adoption with built-in oversight and accountability.&lt;/P&gt;
&lt;img&gt;&lt;SPAN data-contrast="auto"&gt;An image displaying a communication compliance policy in Microsoft Purview&lt;/SPAN&gt;&lt;/img&gt;
&lt;H3&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc358132836"&gt;&lt;/A&gt;eDiscovery for agent activity&lt;/H3&gt;
&lt;P&gt;Agents generate and act on organizational data, and legal and compliance teams need a way to preserve, search, and review agent activity with the same rigor as human communications. Purview eDiscovery lets organizations place agent interactions under legal hold, search agent‑to‑human and human‑to‑agent interactions across all agents, and review both agent outputs and the documents accessed during execution runtime, all within Microsoft Purview. This delivers a defensible, end‑to‑end discovery experience for agent activity using familiar legal and compliance workflows, enabling confident adoption while meeting regulatory and litigation obligations.&lt;/P&gt;
&lt;img&gt;An image displaying an eDiscovery query in Microsoft Purview&lt;/img&gt;
&lt;H2&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc628245340"&gt;&lt;/A&gt;Secure: Protect agents comprehensively&lt;/H2&gt;
&lt;H3&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc1175728563"&gt;&lt;/A&gt;Risk flags in Agent 365 registry and overview&lt;/H3&gt;
&lt;P&gt;Agent 365 brings IT and Security teams together to create a connected experience for governing AI agents. Agent 365 surfaces agent‑level security and compliance risk flags, powered by first‑party signals from Microsoft Defender, Entra, and Purview, giving AI admins a unified view of risky agents directly in the Microsoft 365 admin center. From the Agent 365 overview or registry, admins can take actions like block agents or restrict access, and escalate to security teams to quickly responds and reduce risk. By bringing IT and Security signals together in a single management surface, Agent 365 enables stronger cross‑team collaboration, making agent management a shared responsibility where IT and Security teams work together to assess risk, take action, and govern agents securely and at scale.&lt;/P&gt;
&lt;img&gt;&lt;SPAN data-contrast="auto"&gt;An image displaying the security details for a fictitious Comms agent showing two risk flags identified by Microsoft Purview&lt;/SPAN&gt;&lt;/img&gt;
&lt;H3&gt;Conditional Access for agents&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Agents acting on behalf of users can introduce new access risks, especially when interacting with organizational resources. Microsoft Entra Conditional Access enforces dynamic, granular access policies for agents that operate independently, and extends existing user policies to agents acting on behalf of users. It applies the same Zero Trust principles to ensure agent actions are consistently evaluated based on real-time context and risk. This helps organizations reduce the risk of unauthorized or unsafe access by enforcing adaptive, risk-based access controls without introducing a new policy model. Note that Conditional Access for agents&amp;nbsp;is&amp;nbsp;generally available&amp;nbsp;for&amp;nbsp;delegated access agents&amp;nbsp;(agents that act on behalf of the user) and is in public preview for own access agents (agents that operate with their own identity, not tied to a user session).&lt;/SPAN&gt;&lt;/P&gt;
&lt;img&gt;An image showing the creation of a new conditional access policy for agents in Microsoft Entra admin center&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc1956793408"&gt;&lt;/A&gt;Identity protection for agents&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Agents, whether they are acting on behalf of users or operate independently, can introduce new access risks when elevated agent risk, user risk or sign-in risk is present. Microsoft Entra ID Protection prevents compromise with dynamic evaluation of agent and user identity compromise risk. These risk signals can then be used by Conditional Access policies to block or constrain access to prevent compromise with risk-based Conditional access for agents that act independently and extending risk-based conditional access from users to agents for agents that work on behalf of users. Similar to&amp;nbsp;Conditional Access, Identity protection for agents is&amp;nbsp;generally available&amp;nbsp;for&amp;nbsp;delegated access agents&amp;nbsp;(agents that act on behalf of the user) and is in Public preview for&amp;nbsp;own access agents&amp;nbsp;(agents that&amp;nbsp;operate&amp;nbsp;with their own identity, not tied to a user session).&lt;/SPAN&gt;&lt;/P&gt;
&lt;img&gt;An image displaying a Conditional Access policy for agents in the Microsoft Entra admin center&lt;/img&gt;
&lt;H3&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc699769135"&gt;&lt;/A&gt;&lt;/H3&gt;
&lt;H3&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc1604745883"&gt;&lt;/A&gt;Secure Access Service Edge for agents&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Secure Access Service Edge (SASE) for agents extends identity-aware, network-level security controls to agent traffic. For Microsoft Copilot Studio agents&amp;nbsp;and&amp;nbsp;agents running on local endpoint devices&amp;nbsp;with&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/global-secure-access/how-to-install-windows-client" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Global Secure Access client&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;installed,&amp;nbsp;it provides prompt injection protection, threat intelligence filtering, web and URL filtering, and network file filtering to help reduce exposure to malicious destinations and unsafe transfers&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Together, these capabilities help organizations extend consistent network protections to agent traffic and support safer agent adoption at scale.&lt;/SPAN&gt;&lt;/P&gt;
&lt;img&gt;&lt;SPAN data-contrast="auto"&gt;An image showing Global Secure Access for agents and traffic details in Microsoft Entra&lt;/SPAN&gt;&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Threat detection and blocking for agents (Preview)&lt;/H2&gt;
&lt;P&gt;Agent adoption brings new threats, such as prompt attacks and tool misuse. Microsoft Defender enables security teams to detect, block, and investigate agent threats in runtime. For example, when an agent abuses its permissions to an email MCP server, exhibiting suspicious behaviors that may cause security incidents, Microsoft Defender can block the email invocation to reduce the incident's impact and trigger incident alerts in the Defender portal for investigation and response. This capability enables security teams to effectively defend agents against the evolving AI threat landscape.&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;An image showing how a security team can detect, block, and investigate agent threats such as prompt attack and tool misuse in the Microsoft Defender portal&lt;/P&gt;
&lt;/img&gt;
&lt;H2&gt;Threat hunting and investigation for agents (Preview)&lt;/H2&gt;
&lt;P&gt;Beyond threat detection and blocking, security teams can use the unified observability logs in Agent 365 for Advanced Hunting to proactively search for threats, vulnerabilities, and potential exposures in their organization's agentic environment. For example, security teams can identify&amp;nbsp;risky configurations, such as agents with MCP tools using maker credentials. These permissions allow MCP tools to operate as the maker, potentially leading to privilege escalation and exposure. Security teams can run queries in Advanced Hunting to generate a list of agents that present this risk, then collaborate across teams to remediate these risks before they turn into incidents.&lt;/P&gt;
&lt;img&gt;Security team can proactively identify vulnerabilities and exposure leveraging Advanced Hunting capabilities in Microsoft Defender&lt;/img&gt;
&lt;H3&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc1894137746"&gt;&lt;/A&gt;Agent security posture management (Preview)&lt;/H3&gt;
&lt;P&gt;As organizations deploy more agents, security teams need continuous insight into which agents are over‑privileged, misconfigured, or exposed to attack. Microsoft Defender provides agent security posture management by assessing the security posture of Foundry and Copilot Studio agents, identifying vulnerabilities such as excessive permissions and misconfigurations, and surfacing prioritized security recommendations, risk context, and attack path analysis to AI agents. This enables teams to focus remediation where risk is highest, reduce exposure early, and ensure agents are built, deployed, and operated securely across their lifecycle.&lt;/P&gt;
&lt;img&gt;An image showing the fictitious agent Zava Assist in Microsoft Defender&lt;/img&gt;
&lt;H3&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc568899743"&gt;&lt;/A&gt;Data Security Posture Management (DSPM) AI Observability for agents&lt;/H3&gt;
&lt;P&gt;Organizations lack clear visibility into how AI agents access and expose sensitive data, increasing the risk of oversharing and unintended data leakage. Microsoft Purview AI Observability in DSPM provides unified visibility into all agents operating across your environment, Microsoft and non‑Microsoft, and continuously assesses agent data risk posture. This enables security teams to identify sensitive data exposure early, make informed decisions, and proactively reduce risk before it becomes an incident.&lt;/P&gt;
&lt;img&gt;An image showing AI observability within Data Security Posture Management (DSPM) in Microsoft Purview&lt;/img&gt;
&lt;H3&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc1188330610"&gt;&lt;/A&gt;Insider Risk Management for agents&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;As organizations scale AI agents, they lack visibility&amp;nbsp;into&amp;nbsp;whether agents are accessing, generating, or exposing sensitive data in risky ways. Microsoft Purview Insider Risk Management for agents&amp;nbsp;evaluated&amp;nbsp;insider risk&amp;nbsp;for agents&amp;nbsp;by treating&amp;nbsp;them&amp;nbsp;as first&lt;/SPAN&gt;‑&lt;SPAN data-contrast="auto"&gt;class identities, enabling detection of risky agent behaviors such as anomalous data access or sensitive content in outputs. This allows security teams to intervene early and confidently scale AI agents while maintaining security, accountability, and compliance.&lt;/SPAN&gt;&lt;/P&gt;
&lt;img&gt;An image showing an alert spotting an agent attempt at sensitive file exfiltration within Microsoft Purview&lt;/img&gt;
&lt;H3&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc1383738578"&gt;&lt;/A&gt;Data loss prevention for agents&lt;/H3&gt;
&lt;P&gt;As agent adoption scales, confidential information can be unintentionally included in agent interactions, increasing the risk of data exposure across the organization. Microsoft Purview Data Loss Prevention (DLP) extends the same protections organizations use for people - such as to prevent data exfiltration and oversharing - to AI agents, for example by blocking an agent from emailing a confidential file to an external recipient.&lt;/P&gt;
&lt;P&gt;Also, DLP controls for grounding data protect the data agents rely on to reason and respond to interactions. It leverages DLP and labeling policies directly to the data sources used for grounding, preventing agents from accessing or using sensitive content that shouldn’t inform AI decisions or outputs. This gives organizations confidence that advanced AI agents can be deployed without increasing data exposure or compliance risk, even as agents operate across multiple data systems.&lt;/P&gt;
&lt;img&gt;An image displaying a conversation with fictitious agent Zava Procurement Agent showing a DLP-protected document cannot be summarized&lt;/img&gt;
&lt;H2&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc813205042"&gt;&lt;/A&gt;Conclusion&lt;/H2&gt;
&lt;P&gt;As agents become a core part of everyday work, organizations need a way to extend the controls they already trust, from managing people, devices, apps, and data, to managing agents. With Agent 365, Microsoft brings agents into the same, familiar identity, security, and compliance frameworks customers already rely on today. These GA capabilities lay the foundation for scaling agent adoption with confidence, enabling organizations to unlock innovation and productivity while ensuring agents remain governed, secure, and aligned with your organization's needs.&lt;/P&gt;
&lt;P&gt;Next steps:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/a365gablog" target="_blank" rel="noopener"&gt;Read the announcement of new public preview capabilities&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/event/microsoft365-events/live-ama-microsoft-agent-365/4511700" target="_blank" rel="noopener"&gt;Register for our upcoming Agent 365 live AMA&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/Agent365onASN" target="_blank" rel="noopener"&gt;Learn via AI Skills Navigator for Agent 365&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://htts:/admin.cloud.microsoft" target="_blank" rel="noopener"&gt;Get started with Agent 365 in the Microsoft 365 admin center&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Footnotes&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Agent metadata available in the Agent 365 registry differs based on the agent’s source platform, as well as factors such as how the agent was built, integrated, and registered. As a result, some agents may expose richer or more standardized metadata, while others may only provide a subset of fields.&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Fri, 01 May 2026 15:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/agent-365-blog/what-s-new-in-agent-365-may-2026/ba-p/4516340</guid>
      <dc:creator>alexpozin</dc:creator>
      <dc:date>2026-05-01T15:00:00Z</dc:date>
    </item>
    <item>
      <title>Windows 365 for Agents now in public preview: Run AI agents securely, at scale</title>
      <link>https://techcommunity.microsoft.com/t5/windows-it-pro-blog/windows-365-for-agents-now-in-public-preview-run-ai-agents/ba-p/4513479</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="none"&gt;AI agents are rapidly evolving from tools that answer questions to performing human-level work inside an enterprise ecosystem, powering essential business workflows that have traditionally been completed manually. But while governance and policy models are emerging, one critical question remains unresolved for IT: where should agents actually&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;&lt;SPAN data-contrast="none"&gt;run&lt;/SPAN&gt;&lt;/EM&gt;&lt;SPAN data-contrast="none"&gt;?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Many applications that enterprises rely on, from legacy line-of-business systems to complex multistep workflows, were not built with APIs. As a result, critical work still happens through user interfaces, where context, data, and intent are conveyed visually. To unlock their full potential, AI agents need to interact with applications the same way people do, using a computer to interact directly through clicks, typing, and navigation. Today, many agents execute on ad&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;hoc infrastructure—local machines, shared virtual machines, or unmanaged cloud environment—creating gaps in identity, policy enforcement, auditability, and control. That makes it difficult for IT teams to confidently scale agentic workloads beyond API- or MCP-based pilots.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Today, we’re bringing&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Windows 365 for Agents&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="none"&gt; to public preview (US only), providing a secured, purpose-built, IT-managed Cloud PC environment designed specifically for running AI agents at enterprise scale. Windows 365 for Agents provides agents with a dedicated, Microsoft Intune-managed Cloud PC—bringing the same identity, security, and compliance model IT already uses for employees to agent execution.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Windows 365 for Agents works alongside &lt;/SPAN&gt;&lt;A href="https://aka.ms/A365GAblog" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft A&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;gent 365&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;(now generally available&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;), which serves as the control plane for AI agents. It's where organizations define agent behavior, set up organizational policies, manage permissions, and maintain visibility into what agents are doing across the enterprise, whether those agents are built by Microsoft or third-party agent makers.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Together, these two offerings give IT teams a clear model for governing what agents can do and securely managing where that work runs, enabling organizations to move from early agent experiments to IT-managed, production-ready deployments.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Think of it this way: every employee in an organization has an identity and works on a managed device, such as a Windows 365 Enterprise Cloud PC. Now, each AI agent also has its own identity, governed through Agent 365 and running on a managed Cloud PC provided by Windows 365 for Agents. It’s the same trust model and same IT controls—now extended to AI. By extending this proven model to agent workloads, organizations gain:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt;Enterprise-grade identity and access controls for ever&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt;y&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt; agent&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt;Unified device and policy management through the tools IT already use&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt;Global scalability and &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt;geo-level&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt;&amp;nbsp;data residency options&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt; to meet compliance requirements&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt;How Windows 365 for Agents fits into the Microsoft AI ecosystem&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Microsoft 365 Copilot brings AI into the flow of work inside the apps employees already use. Behind it is &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Microsoft IQ&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="none"&gt;, the intelligence layer that provides shared context across people, work, and the business—helping AI understand what matters in the moment and make informed decisions.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;That intelligence enables agents to reason, but completing real work—especially for AI agents that interact with UI-based or legacy applications and browsers through computer-use workflows—requires a secured place to execute. &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;STRONG&gt;Windows 365 for Agents&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;provides that execution layer, delivering a fully managed Windows environment purpose-built for agentic workloads. Unlike ad-hoc infrastructure, Windows 365 for Agents is a complete, IT-managed Cloud PC service, with identity, security, policy, and lifecycle management handled for you.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Microsoft IQ gives agents the smarts; Windows 365 for Agents gives them the trusted runtime to get work done. All of this runs on &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Microsoft Azure&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="none"&gt;, the global cloud foundation for secure, scalable AI.&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Agent 365&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;complements this model by providing the control plane to govern agent&amp;nbsp;behavior&amp;nbsp;end to end. These capabilities&amp;nbsp;combine to&amp;nbsp;form a single platform that lets organizations scale AI with confidence—without compromising trust.&lt;/SPAN&gt;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;Windows 365for Agents is the foundational layer for running agents securely across first-party and third-party agent makers.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/img&gt;
&lt;H4 aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt;E&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt;valuating Windows 365 for Agents&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Windows 365 for Agents is built for enterprise IT teams and the organizations they support, specifically those that:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Rely on applications that require UI interaction&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;STRONG&gt;, &lt;/STRONG&gt;including legacy tools, browser-based workflows, and systems where APIs alone aren't enough&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Need enterprise-grade security and compliance for AI agents&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;STRONG&gt;, &lt;/STRONG&gt;with identity governance, policy controls, and audit trails&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Want IT-managed environments for agent workloads&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;without building and&amp;nbsp;maintaining&amp;nbsp;custom infrastructure&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Are exploring human-in-the-loop models&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;where agents work alongside people, requesting approval for sensitive actions&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;This includes IT administrators, security teams, digital workplace leaders, and platform teams responsible for enabling AI safely across the organization.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;To bring this to life, &lt;/SPAN&gt;&lt;A href="http://aka.ms/W365AAdminDemo" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;this&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Windows 365 for Agents&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;demo&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt; shows how agents move from setup to execution in a secured, managed environment.&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="lia-embeded-content" contenteditable="false"&gt;&lt;IFRAME src="https://www.youtube.com/embed/SPT32EbckVg?si=mtFlhW7YCErQz9g7" width="560" height="315" title="YouTube video player" allowfullscreen="allowfullscreen" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" frameborder="0" sandbox="allow-scripts allow-same-origin allow-forms"&gt;&lt;/IFRAME&gt;&lt;/DIV&gt;
&lt;H4 aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt;Join the Windows 365 for Agents public preview (US only) &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:200}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Ready to try Windows 365 for Agents?&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;You will need:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Agent 365 license&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Intune license&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;An active Azure subscription to support Window 365 for Agents billing&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Setup and onboarding&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Explore Agent 365&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;to understand how agents are defined, governed, and managed&amp;nbsp;[&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-agent-365/overview" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Agent 365 overview | Microsoft Learn&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;]&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Create an agent blueprint&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;for scenarios that require Windows 365 for Agents&amp;nbsp;[&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-agent-365/onboard" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Discover, create, and onboard an agent&amp;nbsp; | Microsoft Learn&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;]&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Set up billing for Windows 365 for Agents&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;using your existing Azure subscription&amp;nbsp;[&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/windows-365/agents/billing-w365a?branch=pr-en-us-1359" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Windows 365 for Agents Billing | Microsoft Learn&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;]&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Create a Cloud PC pool&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;for agent workloads&amp;nbsp;[&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/windows-365/agents/cloud-pc-agent-pools?branch=pr-en-us-1359" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Cloud PC Agent Pools | Microsoft Learn&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;]&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Explore and validate scenarios&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;by running agents&amp;nbsp;in a secure environment&amp;nbsp;[&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-agent-365/use" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Use and collaborate with agents in Agent 365 | Microsoft Learn&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;]&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:200}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;HR /&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:200}"&gt;&lt;EM&gt;&lt;SPAN data-contrast="none"&gt;Continue the conversation. Find best practices. Bookmark the&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://aka.ms/community/Windows" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Windows Tech Community&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;, then follow us on&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/company/windows-it-pro" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;LinkedIn&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;or&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://twitter.com/mswindowsitpro" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;@MSWindowsITPro&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;for updates. Looking for support? Visit&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs.microsoft.com/answers/products/windows#windows-client-for-it-pros" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Windows on Microsoft Q&amp;amp;A&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 01 May 2026 15:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-it-pro-blog/windows-365-for-agents-now-in-public-preview-run-ai-agents/ba-p/4513479</guid>
      <dc:creator>SwarnimSrivastava</dc:creator>
      <dc:date>2026-05-01T15:00:00Z</dc:date>
    </item>
    <item>
      <title>AI‑Accelerated AVM Refactoring: Modernizing Legacy IaC Safely and Swiftly</title>
      <link>https://techcommunity.microsoft.com/t5/azure-infrastructure-blog/ai-accelerated-avm-refactoring-modernizing-legacy-iac-safely-and/ba-p/4516437</link>
      <description>&lt;H2&gt;Why AVM refactoring is harder in brownfield&lt;/H2&gt;
&lt;P&gt;Greenfield AVM adoption is straightforward: pick the module, deploy, and iterate. Brownfield is different. You’re refactoring *live* infrastructure — where state, naming conventions, diagnostic settings, and policy baselines already exist.&lt;/P&gt;
&lt;P&gt;In one anonymized engagement, an AI‑assisted audit found that **43% of module invocations (~10 modules) ** still relied on legacy, non‑AVM wrappers — even though modernization work was already underway.&lt;/P&gt;
&lt;P&gt;That number wasn’t just a KPI. It became the roadmap: which modules to prioritize, where inconsistency risk was highest, and which components needed deeper plan review.&lt;/P&gt;
&lt;H2&gt;The hidden risks you only feel during refactor&lt;/H2&gt;
&lt;P&gt;AVM adoption often introduces more than a module source change. It can also bring:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;New naming patterns (especially around extensions like diagnostics)&lt;/LI&gt;
&lt;LI&gt;More structured configuration objects (maps/objects replacing flat inputs)&lt;/LI&gt;
&lt;LI&gt;Additional ‘helper’ resources (RBAC, wait timers, diagnostics wiring)&lt;/LI&gt;
&lt;LI&gt;Policy‑aligned defaults (encryption, public access disabled, logging enabled)&lt;/LI&gt;
&lt;LI&gt;Provider/version constraint pressure (to meet AVM expectations)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;None of these are bad — in fact, they’re usually improvements. But in a live estate, each change must be checked through one lens: **state safety**.&lt;/P&gt;
&lt;H2&gt;Where AI actually helps (and where it doesn’t)&lt;/H2&gt;
&lt;P&gt;AI is most valuable when it reduces *mechanical effort* — the repetitive work that slows teams down — while humans keep ownership of architecture and risk.&lt;/P&gt;
&lt;H3&gt;1) Automated codebase audit (the fastest win)&lt;/H3&gt;
&lt;P&gt;AI can scan a repo and produce an inventory of module usage, versions, and adoption status: direct AVM, AVM‑wrapped, legacy wrappers, and native resources. This turns hours of manual inspection into a structured baseline report.&lt;/P&gt;
&lt;H3&gt;2) Draft refactors scaffolding (with mandatory human review)&lt;/H3&gt;
&lt;P&gt;Tools like GitHub Copilot can generate first‑pass Terraform refactors — reshaping legacy calls into AVM‑style interfaces and scaffolding optional blocks (diagnostics, identities, RBAC).&lt;/P&gt;
&lt;P&gt;But AI output should be treated as *a proposal*, not a truth. The most dangerous failures aren’t syntax errors — they’re subtle mismatches: a parameter mapped to the wrong field, a default that changes behavior, or an omitted lifecycle constraint.&lt;/P&gt;
&lt;H3&gt;3) Terraform plan diff interpretation (explain what changed)&lt;/H3&gt;
&lt;P&gt;Refactoring to AVM can expand plan output. AI can help summarize large diffs into:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Benign additions (telemetry wiring, diagnostics scaffolding, RBAC helpers)&lt;/LI&gt;
&lt;LI&gt;Behavioral changes requiring sign‑off (network exposure, encryption posture, identity model)&lt;/LI&gt;
&lt;LI&gt;High‑risk actions (destroy/recreate) and the exact resource addresses involved&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This doesn’t replace plan review — it accelerates understanding so reviewers can focus on what truly matters.&lt;/P&gt;
&lt;H3&gt;4) Policy violation translation (from red to ready)&lt;/H3&gt;
&lt;P&gt;When policy gates fail (Azure Policy, Checkov, etc.), AI is great at translating requirements into actionable remediation — and checking whether AVM supports it natively or needs supplementary configuration.&lt;/P&gt;
&lt;H3&gt;5) Repository hygiene enforcement (structure as a hard gate)&lt;/H3&gt;
&lt;P&gt;In multi‑team repos, drift happens: ad‑hoc scripts, local module copies, inconsistent folder patterns. AI can continuously scan for these anti‑patterns and flag deviations early — before they become ‘how we do it now’.&lt;/P&gt;
&lt;H3&gt;6) Specification‑driven development (the future‑proof approach)&lt;/H3&gt;
&lt;P&gt;Microsoft’s AVM guidance now explicitly discusses **AI‑assisted IaC solution development** — pairing AVM modules with AI tools to speed delivery while keeping humans in control. In parallel, approaches like Spec Kit promote structured, specification‑driven workflows so requirements and constraints remain the source of truth.&lt;/P&gt;
&lt;H2&gt;The operating model that keeps you safe&lt;/H2&gt;
&lt;P&gt;Here’s the simplest rule I’ve seen work consistently:&lt;/P&gt;
&lt;P&gt;**AI drafts. Humans validate. The Terraform plan decides.**&lt;/P&gt;
&lt;P&gt;That operating model prevents two extremes: (1) refusing AI because it’s imperfect, and (2) trusting AI output blindly because it sounds confident.&lt;/P&gt;
&lt;H2&gt;A practical AI‑accelerated refactor playbook&lt;/H2&gt;
&lt;P&gt;If you want a repeatable approach that scales across environments, here’s a playbook that balances speed and safety:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Baseline audit: inventory module sources and adoption categories.&lt;/LI&gt;
&lt;LI&gt;Equivalence check: identify AVM‑ready modules vs AVM gaps.&lt;/LI&gt;
&lt;LI&gt;Slice the work: refactor one bounded component first.&lt;/LI&gt;
&lt;LI&gt;Use AI for scaffolding: generate draft code and a migration checklist.&lt;/LI&gt;
&lt;LI&gt;Plan review discipline: categorize additions vs updates vs replacements.&lt;/LI&gt;
&lt;LI&gt;Import decision framework: import where state safety matters; accept in‑place updates only when semantics are unchanged.&lt;/LI&gt;
&lt;LI&gt;Governance gates: enforce structure + policy + plan review before merge.&lt;/LI&gt;
&lt;LI&gt;Iterate: expect multiple cycles — AI should compress cycles, not eliminate them.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H2&gt;Don’t couple refactoring with compliance&lt;/H2&gt;
&lt;P&gt;One more lesson worth calling out: **AVM adoption and compliance are related, but not identical.**&lt;/P&gt;
&lt;P&gt;Treat policy enforcement as a continuous pipeline requirement from Dev through Prod — independent of whether a component is fully AVM‑aligned. This avoids scope creep (“refactor means fix everything”) while still driving the estate toward a no‑surprises posture.&lt;/P&gt;
&lt;H2&gt;What ‘success’ looks like&lt;/H2&gt;
&lt;P&gt;A successful AI‑accelerated AVM refactor typically delivers:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Lower variance between environments&lt;/LI&gt;
&lt;LI&gt;Fewer one‑off wrappers and exceptions&lt;/LI&gt;
&lt;LI&gt;Stronger defaults aligned to policy&lt;/LI&gt;
&lt;LI&gt;A smaller drift surface area&lt;/LI&gt;
&lt;LI&gt;Faster, safer change velocity&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;And the best part? It changes the mindset from ‘IaC as scripts’ to **IaC as a governed product** — with standards that hold up in audits and operations.&lt;/P&gt;
&lt;H2&gt;Closing thought&lt;/H2&gt;
&lt;P&gt;AI won’t replace your architectural accountability — and it shouldn’t try to. But it *can* remove the friction that makes refactoring feel impossible.&lt;/P&gt;
&lt;P&gt;If you’re sitting on a pile of legacy wrapper modules today, consider this: the safest time to modernize is **before** the next urgent change lands in your backlog.&lt;/P&gt;
&lt;H2&gt;References (public)&lt;/H2&gt;
&lt;UL&gt;
&lt;LI&gt;Azure Verified Modules (AVM): https://azure.github.io/Azure-Verified-Modules/&lt;/LI&gt;
&lt;LI&gt;AI‑Assisted IaC Solution Development (AVM): https://azure.github.io/Azure-Verified-Modules/experimental/ai-assisted-sol-dev/&lt;/LI&gt;
&lt;LI&gt;Spec Kit (AVM): https://azure.github.io/Azure-Verified-Modules/experimental/ai-assisted-sol-dev/spec-kit/&lt;/LI&gt;
&lt;LI&gt;AVM Telemetry guidance: https://azure.github.io/Azure-Verified-Modules/help-support/telemetry/&lt;/LI&gt;
&lt;LI&gt;Microsoft Learn – Azure Verified Modules overview: https://learn.microsoft.com/en-us/community/content/azure-verified-modules&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Fri, 01 May 2026 12:14:29 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-infrastructure-blog/ai-accelerated-avm-refactoring-modernizing-legacy-iac-safely-and/ba-p/4516437</guid>
      <dc:creator>HimanshuYadav</dc:creator>
      <dc:date>2026-05-01T12:14:29Z</dc:date>
    </item>
    <item>
      <title>From Terminal to Autonomous Coding: Mastering GitHub Copilot CLI ACP Server</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-developer-community/from-terminal-to-autonomous-coding-mastering-github-copilot-cli/ba-p/4508604</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Introduction&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The rise of AI-powered development is no longer just about autocomplete—it’s about &lt;STRONG&gt;autonomous agents that can think, act, and collaborate&lt;/STRONG&gt;. At the center of this transformation is the &lt;A class="lia-external-url" href="https://agentclientprotocol.com/get-started/introduction" target="_blank"&gt;&lt;STRONG&gt;Agent Client Protocol (ACP)&lt;/STRONG&gt;&lt;/A&gt; and its integration with &lt;A class="lia-external-url" href="https://github.com/features/copilot/cli/" target="_blank"&gt;&lt;STRONG&gt;GitHub Copilot CLI&lt;/STRONG&gt;&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;If you’ve ever wanted to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Integrate Copilot into your own tools&lt;/LI&gt;
&lt;LI&gt;Build custom AI-driven developer workflows&lt;/LI&gt;
&lt;LI&gt;Orchestrate coding agents in CI/CD&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Then understanding the &lt;A class="lia-external-url" href="https://docs.github.com/en/copilot/reference/copilot-cli-reference/acp-server" target="_blank"&gt;&lt;STRONG&gt;GitHub Copilot CLI ACP Server&lt;/STRONG&gt;&lt;/A&gt; is a game-changer.&lt;/P&gt;
&lt;P&gt;This article will take you from &lt;STRONG&gt;zero to advanced&lt;/STRONG&gt;, covering concepts, architecture, setup, and real-world use cases.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What Is Agent Client Protocol (ACP)?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The &lt;STRONG&gt;Agent Client Protocol (ACP)&lt;/STRONG&gt; is an &lt;STRONG&gt;open standard designed to connect clients (like IDEs or tools) with AI agents&lt;/STRONG&gt; in a consistent and interoperable way.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Why ACP Exists&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Before ACP:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Every IDE needed custom integration for each AI agent&lt;/LI&gt;
&lt;LI&gt;Every agent needed custom APIs per editor&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;ACP solves this by introducing a &lt;STRONG&gt;universal communication layer&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Key Idea&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;“Any editor can talk to any agent.”&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Core Capabilities&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;ACP enables:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Standardized messaging between client and agent&lt;/LI&gt;
&lt;LI&gt;Streaming responses&lt;/LI&gt;
&lt;LI&gt;Tool execution with permissions&lt;/LI&gt;
&lt;LI&gt;Session lifecycle management&lt;/LI&gt;
&lt;LI&gt;Multi-agent coordination&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This makes ACP a &lt;STRONG&gt;foundation layer for the agentic developer ecosystem&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What Is GitHub Copilot CLI ACP Server?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;GitHub Copilot CLI can run as an &lt;STRONG&gt;ACP-compatible server&lt;/STRONG&gt;, exposing its AI capabilities programmatically.&lt;/P&gt;
&lt;P&gt;👉 In simple terms:&lt;/P&gt;
&lt;P&gt;It turns Copilot into a &lt;STRONG&gt;backend AI agent service&lt;/STRONG&gt; that any tool can connect to.&lt;/P&gt;
&lt;P&gt;According to GitHub Docs:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Copilot CLI can run in &lt;STRONG&gt;ACP mode&lt;/STRONG&gt; using a flag&lt;/LI&gt;
&lt;LI&gt;It supports &lt;STRONG&gt;standardized communication via ACP&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;It enables integration with &lt;STRONG&gt;IDEs, pipelines, and custom tools&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Architecture: How ACP + Copilot CLI Works&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Components&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;thead&gt;&lt;tr&gt;&lt;th&gt;Component&lt;/th&gt;&lt;th&gt;Role&lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;Client&lt;/td&gt;&lt;td&gt;Sends prompts, receives responses&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;ACP Protocol&lt;/td&gt;&lt;td&gt;Standard communication layer&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Copilot CLI&lt;/td&gt;&lt;td&gt;AI agent executing tasks&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;System&lt;/td&gt;&lt;td&gt;Files, repos, tools&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 50.00%" /&gt;&lt;col style="width: 50.00%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Getting Started (Beginner Level)&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt; Install GitHub Copilot CLI&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Ensure:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Copilot subscription is active&lt;/LI&gt;
&lt;LI&gt;CLI installed and authenticated&lt;/LI&gt;
&lt;/UL&gt;
&lt;OL start="2"&gt;
&lt;LI&gt;&lt;STRONG&gt; Start ACP Server&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;Default (stdio mode – recommended)&lt;/STRONG&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;TCP Mode (for remote systems)&lt;/STRONG&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;UL&gt;
&lt;LI&gt;stdio: Best for IDE integration&lt;/LI&gt;
&lt;LI&gt;TCP: Best for distributed systems&lt;/LI&gt;
&lt;/UL&gt;
&lt;OL start="3"&gt;
&lt;LI&gt;&lt;STRONG&gt; Connect Using ACP Client (Example)&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Using TypeScript SDK:&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;You:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Start Copilot as a process&lt;/LI&gt;
&lt;LI&gt;Create streams&lt;/LI&gt;
&lt;LI&gt;Initialize connection&lt;/LI&gt;
&lt;LI&gt;Send prompt&lt;/LI&gt;
&lt;LI&gt;Receive streaming response&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;ACP uses:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;NDJSON streams over stdin/stdout&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Event-driven communication&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;ACP Workflow Explained&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;A typical flow looks like this:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step-by-step lifecycle&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Initialize connection&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Create session&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Send prompt&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Agent processes task&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Streaming updates returned&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Optional tool execution (with permissions)&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Session ends&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;ACP supports:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Text + multimodal inputs&lt;/LI&gt;
&lt;LI&gt;Incremental responses&lt;/LI&gt;
&lt;LI&gt;Cancellation and control&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Real-World Use Cases&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt; IDE Integration (Custom Editors)&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Build your own AI-powered editor:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Connect via ACP&lt;/LI&gt;
&lt;LI&gt;Send code context&lt;/LI&gt;
&lt;LI&gt;Receive suggestions&lt;/LI&gt;
&lt;/UL&gt;
&lt;OL start="2"&gt;
&lt;LI&gt;&lt;STRONG&gt; CI/CD Automation&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Imagine:&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;Use ACP to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Auto-fix bugs&lt;/LI&gt;
&lt;LI&gt;Generate tests&lt;/LI&gt;
&lt;LI&gt;Refactor code&lt;/LI&gt;
&lt;/UL&gt;
&lt;OL start="3"&gt;
&lt;LI&gt;&lt;STRONG&gt; Multi-Agent Systems&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;ACP enables:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Copilot + other agents working together&lt;/LI&gt;
&lt;LI&gt;Task delegation&lt;/LI&gt;
&lt;LI&gt;Workflow orchestration&lt;/LI&gt;
&lt;/UL&gt;
&lt;OL start="4"&gt;
&lt;LI&gt;&lt;STRONG&gt; Custom Developer Tools&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Examples:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;AI code review dashboards&lt;/LI&gt;
&lt;LI&gt;Internal dev assistants&lt;/LI&gt;
&lt;LI&gt;ChatOps integrations&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Advanced Concepts&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt; Session Management&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;ACP allows:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Isolated sessions&lt;/LI&gt;
&lt;LI&gt;Custom working directories&lt;/LI&gt;
&lt;LI&gt;Context persistence&lt;/LI&gt;
&lt;/UL&gt;
&lt;OL start="2"&gt;
&lt;LI&gt;&lt;STRONG&gt; Streaming Responses&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Instead of waiting:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Receive responses in chunks&lt;/LI&gt;
&lt;LI&gt;Build real-time UIs&lt;/LI&gt;
&lt;/UL&gt;
&lt;OL start="3"&gt;
&lt;LI&gt;&lt;STRONG&gt; Permission Handling&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;ACP includes:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Tool execution approvals&lt;/LI&gt;
&lt;LI&gt;Security boundaries&lt;/LI&gt;
&lt;LI&gt;Controlled automation&lt;/LI&gt;
&lt;/UL&gt;
&lt;OL start="4"&gt;
&lt;LI&gt;&lt;STRONG&gt; Extensibility&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;ACP supports:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Multiple SDKs (TypeScript, Python, Rust, Kotlin)&lt;/LI&gt;
&lt;LI&gt;Custom clients&lt;/LI&gt;
&lt;LI&gt;Future protocol evolution&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;ACP vs Traditional Integration&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;thead&gt;&lt;tr&gt;&lt;th&gt;Feature&lt;/th&gt;&lt;th&gt;Traditional APIs&lt;/th&gt;&lt;th&gt;ACP&lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;Integration&lt;/td&gt;&lt;td&gt;Custom per tool&lt;/td&gt;&lt;td&gt;Standardized&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Streaming&lt;/td&gt;&lt;td&gt;Limited&lt;/td&gt;&lt;td&gt;Native&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Multi-agent&lt;/td&gt;&lt;td&gt;Hard&lt;/td&gt;&lt;td&gt;Built-in&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Extensibility&lt;/td&gt;&lt;td&gt;Low&lt;/td&gt;&lt;td&gt;High&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Interoperability&lt;/td&gt;&lt;td&gt;Poor&lt;/td&gt;&lt;td&gt;Excellent&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Why ACP + Copilot CLI Is a Big Deal&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This combination unlocks:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;✅ Platform-level AI integration&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;No more vendor lock-in per editor&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;✅ True agentic workflows&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Agents don’t just suggest—they &lt;STRONG&gt;act&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;✅ Ecosystem growth&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Any tool can plug into Copilot&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Challenges &amp;amp; Considerations&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;ACP is still in &lt;STRONG&gt;public preview&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Requires understanding of:&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;Streams&lt;/LI&gt;
&lt;LI&gt;Async communication&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI&gt;Debugging agent workflows can be complex&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Future of Developer Experience&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;ACP represents a shift toward:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;“AI-native development platforms”&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Future possibilities:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Fully autonomous CI/CD pipelines&lt;/LI&gt;
&lt;LI&gt;Cross-agent collaboration&lt;/LI&gt;
&lt;LI&gt;Self-healing codebases&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Final Thoughts&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The &lt;A class="lia-external-url" href="https://docs.github.com/en/copilot/reference/copilot-cli-reference/acp-server" target="_blank"&gt;&lt;STRONG&gt;GitHub Copilot CLI ACP Server&lt;/STRONG&gt;&lt;/A&gt; is not just a feature—it’s a &lt;STRONG&gt;foundation for the next generation of software development&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;If you are:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;A developer → build smarter tools&lt;/LI&gt;
&lt;LI&gt;A tech lead → design AI-driven workflows&lt;/LI&gt;
&lt;LI&gt;A CTO aspirant → understand this deeply&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Then ACP is something you &lt;STRONG&gt;must master early&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Quick Summary&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;ACP = Standard protocol for AI agents&lt;/LI&gt;
&lt;LI&gt;Copilot CLI = Can run as ACP server&lt;/LI&gt;
&lt;LI&gt;Enables = IDEs, CI/CD, multi-agent systems&lt;/LI&gt;
&lt;LI&gt;Key power = interoperability + automation&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Fri, 01 May 2026 07:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-developer-community/from-terminal-to-autonomous-coding-mastering-github-copilot-cli/ba-p/4508604</guid>
      <dc:creator>Ravindra_Kumar_Vishwakarma</dc:creator>
      <dc:date>2026-05-01T07:00:00Z</dc:date>
    </item>
    <item>
      <title>AHEAD helps us launch the Strategic Azure Storage Services Partner Program</title>
      <link>https://techcommunity.microsoft.com/t5/azure-storage-blog/ahead-helps-us-launch-the-strategic-azure-storage-services/ba-p/4516355</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Authors:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Aung Oo, Vice President Azure Storage Product Management&lt;/P&gt;
&lt;P&gt;Parker Leavitt, Partner Account Manager, AHEAD&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Special thanks to: &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Michael Johnson, Vice President, Cloud, AHEAD&lt;/P&gt;
&lt;img /&gt;
&lt;H1&gt;AHEAD background&lt;/H1&gt;
&lt;P&gt;&lt;A href="https://www.ahead.com/partner/microsoft/" target="_blank" rel="noopener"&gt;AHEAD&lt;/A&gt; was formed in 2007 and possesses deep expertise in Infrastructure, Cloud Platforms, AI, Analytics, Networking, Storage, Security and many more technical disciplines. 80% of AHEAD’s employees are engineers who help customers with the assessment of their needs to design optimal solutions and through implementation of complex application and infrastructure deployments. Headquartered in Chicago, IL, AHEAD has locations worldwide and is ready to assist with your most complex Azure projects. They hold over 1,000 Microsoft certifications and 4 Advanced Specializations.&lt;/P&gt;
&lt;H1&gt;Valued collaboration&lt;/H1&gt;
&lt;P&gt;AHEAD has been a key advisor to Azure Storage throughout the design and build of our Channel strategy. As a premier Microsoft Cloud and AI Partner, and with decades of Storage expertise, AHEAD helped us to create the Learning Path channel partners will need to complete to qualify as a &lt;STRONG&gt;Strategic Azure Storage Services Partner&lt;/STRONG&gt; (SASS). SASS Partners have been validated by us to possess the skills to offer consulting, design, implementation, and migration services to Azure and ISV Storage services.&lt;/P&gt;
&lt;H1&gt;What can you expect?&lt;/H1&gt;
&lt;P&gt;AHEAD brings their history of infrastructure expertise to Azure Storage customers through a catalog of services that make it possible to select the optimal solution to ensure the ideal blend of price, performance, and resiliency.&lt;/P&gt;
&lt;H2&gt;Assessment&lt;/H2&gt;
&lt;P&gt;What are you doing to prepare for the industry wide memory shortage? How well do you understand your datasets? What are your performance requirements? Are there features you are paying for and not using? When was the last time that directory hosting the “Super Important Project” files was accessed? Is there mission critical data hiding that you should be leveraging to fuel Enterprise AI Agents? Is an Azure Storage Service the best fit for your data, or is it better to migrate it to one of our Storage ISV services?&lt;/P&gt;
&lt;P&gt;AHEAD provides Microsoft-funded assessments that deliver data-driven guidance to help you align your application and data set needs with the ideal storage service(s) on Azure. We have long advocated that the best solution is the one that meets your requirements both today and in the future. AHEAD can help you get there.&lt;/P&gt;
&lt;H2&gt;Migration&lt;/H2&gt;
&lt;P&gt;After gaining insight into your data estate, AHEAD has the experience to help you migrate safely with best-of-breed solutions. Whether offline migration with Data Box or online over the network with Storage Mover or one of our validated ISVs like Komprise, Cirrus Data, or Cirata, AHEAD can help you move your data to an Azure Storage service like Blob Storage, Files, Elastic SAN, or NetApp Files – or one of our ISV Partners like Nasuni and Pure Storage. You can find our full list of validated partners on &lt;A href="https://aka.ms/azurestoragepartners" target="_blank" rel="noopener"&gt;Microsoft Learn&lt;/A&gt;.&lt;/P&gt;
&lt;H2&gt;Azure Storage ISV Strength&lt;/H2&gt;
&lt;P&gt;An important reason we chose to onboard AHEAD as our first Strategic Channel Partner was the large crossover in mutual ISV relationships they possess, and their proven skills with each. You can view AHEAD’s full list of partners, including Nasuni, NetApp, Everpure, Commvault, Veeam, Rubrik, and Dell on&amp;nbsp;&lt;A href="https://www.ahead.com/partners/" target="_blank" rel="noopener"&gt;their website&lt;/A&gt;. Our recent engagements with AHEAD and Nasuni are a great example of AHEAD’s depth. They were able to quickly determine Nasuni as the best fit for a customer who required a single centralized Azure-based repository for their data that could then be accessed within Azure and multiple remote locations simultaneously.&lt;/P&gt;
&lt;P&gt;AHEAD has shown us that across their portfolio of ISVs, they can help you implement best-of-breed ISV services that include solutions in:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Air Gap Business Continuity&lt;/LI&gt;
&lt;LI&gt;VMware Modernization&lt;/LI&gt;
&lt;LI&gt;Storage Modernization&lt;/LI&gt;
&lt;LI&gt;Cloud Scale Analytics&lt;/LI&gt;
&lt;LI&gt;AI Dataset Curation&lt;/LI&gt;
&lt;/UL&gt;
&lt;H1&gt;How can you move forward?&lt;/H1&gt;
&lt;P&gt;Do you need help understanding your data estate? Could you use expertise selecting the ideal service in Azure to host your data? Reach out to the AHEAD Azure team at &lt;A href="mailto:info@ahead.com" target="_blank" rel="noopener"&gt;info@ahead.com&lt;/A&gt; or via their &lt;A href="https://marketplace.microsoft.com/en-us/marketplace/consulting-services/aheadllc1585153938726.rapid_assess?tab=Overview" target="_blank" rel="noopener"&gt;Rapid Assess&lt;/A&gt; offer on Microsoft Marketplace and get started today!&lt;/P&gt;
&lt;H1&gt;Strategic Azure Storage Services Partner&lt;/H1&gt;
&lt;P&gt;In coming months, you will see our list of SASS Channel Partners expand, but we could not be more grateful to AHEAD for being a not only a pioneer, but a trusted advisor. Their commitment to Azure and Azure customers has made an impact that will benefit our customers worldwide.&lt;/P&gt;</description>
      <pubDate>Fri, 01 May 2026 00:49:28 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-storage-blog/ahead-helps-us-launch-the-strategic-azure-storage-services/ba-p/4516355</guid>
      <dc:creator>karautenMSFT</dc:creator>
      <dc:date>2026-05-01T00:49:28Z</dc:date>
    </item>
    <item>
      <title>Announcing Native PowerShell Tooling for ReFS Snapshots</title>
      <link>https://techcommunity.microsoft.com/t5/storage-at-microsoft/announcing-native-powershell-tooling-for-refs-snapshots/ba-p/4516377</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We’re excited to share a new open-source PowerShell module on GitHub that provides PowerShell-native management of ReFS snapshots. It wraps the existing&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;refsutil streamsnapshot&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;in cmdlets designed for scripting and automation, with pipeline support and consistent error handling.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;If&amp;nbsp;you’re&amp;nbsp;already using&amp;nbsp;ReFS&amp;nbsp;for resilient storage on Windows&amp;nbsp;Server or client, this tooling makes it significantly easier to integrate&amp;nbsp;ReFS&amp;nbsp;snapshots into your existing PowerShell-based management and automation workflows.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Why PowerShell-native&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;ReFS&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;&amp;nbsp;snapshot management?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;ReFS&amp;nbsp;has long supported stream-level snapshots through the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;refsutil&amp;nbsp;streamsnapshot&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;command-line utility, enabling point-in-time capture of individual files or streams rather than an entire volume or filesystem. This makes stream snapshots well suited for targeted comparison or recovery scenarios where full volume snapshots would be unnecessary or too heavyweight. While powerful,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;refsutil&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;was designed as a low-level utility—not easy to compose into scripts, pipelines, or scheduled automation.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The&amp;nbsp;ReFSSnapshots&amp;nbsp;PowerShell module addresses that gap by exposing&amp;nbsp;ReFS&amp;nbsp;snapshot functionality through idiomatic PowerShell cmdlets, making snapshots easier to:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Automate as part of routine server operations&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Integrate into existing PowerShell scripts and modules&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Apply consistently across many files or volumes using the pipeline&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Manage safely with parameter validation and structured error handling&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;What the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;ReFSSnapshots&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;module provides&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The&amp;nbsp;ReFSSnapshots&amp;nbsp;module supports the following capabilities:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Create snapshots&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;of files or streams at a specific point in time&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;List snapshots&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;, including wildcard-based queries&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Delete snapshots&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;with confirmation safeguards&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Compare snapshots&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;against the current file state&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="5" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Restore files&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;from&amp;nbsp;a previous&amp;nbsp;snapshot state&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="6" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Export snapshots&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;to standalone files on any volume&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="7" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Automate snapshot creation&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;via Task Scheduler&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="8" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Apply retention policies&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;to clean up older snapshots automatically&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;All cmdlets are designed with pipeline support, so they can&amp;nbsp;be composed alongside existing storage, monitoring, or validation scripts.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Some common scenarios&amp;nbsp;that this module addresses&amp;nbsp;include:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Operational safety points&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;taken before patching, upgrades, or configuration changes&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Automated comparison workflows&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;, where changes between known states need to be evaluated programmatically&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Scripted maintenance jobs&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;that incorporate snapshot creation and cleanup as part of routine operations&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Advanced Windows client or workstation scenarios&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;using&amp;nbsp;ReFS&amp;nbsp;for large datasets, development artifacts, or experimental workflows, where lightweight,&amp;nbsp;file&lt;/SPAN&gt;‑&lt;SPAN data-contrast="auto"&gt;level&amp;nbsp;snapshots are useful without introducing a full backup solution&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Getting started&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Setup instructions,&amp;nbsp;documentation, and examples are available in the&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://github.com/microsoft/ReFSSnapshots" target="_blank"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;GitHub repository&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;System requirements&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="5" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Windows Server 2019+&amp;nbsp;or Windows 10+&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="6" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;An&amp;nbsp;ReFS-formatted volume (version 3.7 or later)&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="7" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;PowerShell 5.1 or newer (including PowerShell Core)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Examples&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The following snippets are drawn from the module's GitHub examples and mapped to the scenarios called out above. They illustrate how&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;ReFSSnapshots&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;can be composed into routine operations, comparison workflows, scheduled maintenance, and lightweight workstation use.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Operational safety point before a configuration change&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;— Take a named snapshot of a critical file immediately before applying a server configuration update, so you have a known-good point to compare against or restore from.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN data-contrast="auto"&gt;New-RefsSnapshot -Path D:\Data\database.dat -Name "PreChange_$(Get-Date -Format 'yyyyMMdd_HHmm')"&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:15921906}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Automated comparison workflow&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;— List recent snapshots for a file and compare the most recent one against the current state to evaluate what has changed since the last known baseline.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN data-contrast="auto"&gt;Get-RefsSnapshot -Path D:\Data\database.dat -Name "PreChange_*" |&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Sort-Object SnapshotName -Descending |&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Select-Object -First 1 |&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Compare-RefsSnapshot&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:15921906}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Scripted maintenance job with retention&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;— Register a daily scheduled task that automatically creates snapshots of a database file and keeps only the most recent 14, so older snapshots are cleaned up as part of routine operations.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN data-contrast="auto"&gt;Register-RefsSnapshotSchedule -Path D:\Data\database.dat -Interval Daily -At "2:00 AM" -RetentionCount 14&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:15921906}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Lightweight workstation snapshots for development artifacts&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;— Use the pipeline to create a single named snapshot across many files in a working directory—useful on a Windows client when you want a quick, file-level safety net before an experimental change, without standing up a full backup solution.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN data-contrast="auto"&gt;Get-ChildItem E:\Repos\MyProject\artifacts\*.bin |&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;New-RefsSnapshot -Name "BeforeRefactor_$(Get-Date -Format 'yyyyMMdd')"&lt;/SPAN&gt; &lt;/PRE&gt;
&lt;H3 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Try it out!&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335559685&amp;quot;:0,&amp;quot;335559737&amp;quot;:0,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;ReFSSnapshots&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;provides a PowerShell-native surface over existing&amp;nbsp;ReFS&amp;nbsp;stream snapshot capabilities, enabling composable, scriptable&amp;nbsp;file-level&amp;nbsp;snapshot management on&amp;nbsp;supported&amp;nbsp;Windows Server and client systems.&amp;nbsp;Give it a try&amp;nbsp;and&amp;nbsp;share&amp;nbsp;your&amp;nbsp;feedback&amp;nbsp;on&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://github.com/microsoft/ReFSSnapshots" target="_blank"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;GitHub&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335559685&amp;quot;:0,&amp;quot;335559737&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;‑‑&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335559685&amp;quot;:0,&amp;quot;335559737&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt; Christina Curlette&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 01 May 2026 00:30:50 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/storage-at-microsoft/announcing-native-powershell-tooling-for-refs-snapshots/ba-p/4516377</guid>
      <dc:creator>Christina_Curlette</dc:creator>
      <dc:date>2026-05-01T00:30:50Z</dc:date>
    </item>
    <item>
      <title>Introducing DeepSeek V4 Flash and V4 Pro in Microsoft Foundry</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-foundry-blog/introducing-deepseek-v4-flash-and-v4-pro-in-microsoft-foundry/ba-p/4515174</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;As AI adoption matures, the conversation is shifting from model capability to&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;system design,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;how to orchestrate models that deliver the right balance of quality, speed, and cost.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Today,&amp;nbsp;we’re&amp;nbsp;expanding the Microsoft Foundry model catalog with&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;DeepSeek V4 Flash,&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;and &lt;STRONG&gt;DeepSeek V4 Pro&lt;/STRONG&gt; coming soon. It enables teams to build more adaptable and production-ready AI systems.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5 aria-level="2"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Why this&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;matters&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:299,&amp;quot;335559739&amp;quot;:299}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Teams building AI applications today face a common challenge:&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;no single model is&amp;nbsp;optimal&amp;nbsp;for every task.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Complex workflows require deep reasoning and long-context understanding&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;High-volume applications demand low latency and cost efficiency&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Production systems need the flexibility to switch models as requirements evolve&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;With DeepSeek V4 Pro and Flash in Microsoft Foundry, you can&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;match the right model to the right task&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;without changing your infrastructure.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5 aria-level="2"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Meet DeepSeek V4 Pro and Flash&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;H6 aria-level="3"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;DeepSeek V4 Pro – for advanced reasoning and complex workflows&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:281,&amp;quot;335559739&amp;quot;:281}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H6&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;DeepSeek V4 Pro is designed for&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;high-precision tasks&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;that require strong reasoning and deeper context understanding.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Best suited for:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Multi-step reasoning and analysis&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Complex coding and debugging workflows&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Long-document understanding and synthesis&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Agentic workflows requiring planning and decision-making&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Key benefits:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Strong reasoning performance for complex tasks&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;High-quality outputs for enterprise-grade use cases&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Ideal for “high-stakes” workloads where accuracy matters most&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P aria-level="3"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;DeepSeek V4 Flash – for speed and scale&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:281,&amp;quot;335559739&amp;quot;:281}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;DeepSeek V4 Flash is&amp;nbsp;optimized&amp;nbsp;for&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;low latency and high-throughput scenarios&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;, making it ideal for real-time and cost-sensitive applications.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Best suited for:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Chat and conversational experiences&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;High-volume content generation&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Classification, summarization, and extraction&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Real-time copilots and assistants&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Key benefits:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Fast response times&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Cost-efficient at scale&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Optimized for production workloads with high concurrency&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5 aria-level="2"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;One platform, multiple models built for production&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:299,&amp;quot;335559739&amp;quot;:299}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Both DeepSeek V4 Pro and Flash are available through&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft Foundry’s unified platform&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;, so you can:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Access both models through a single API and endpoint&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Easily switch between models&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;based on workload needs&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Route intelligently across models&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;for cost and performance optimization&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Evaluate and compare models&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;using your own data&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="5" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Deploy with enterprise-grade governance and security built in&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This means you can move from experimentation to production&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;without re-architecting your system&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5 aria-level="2"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Build smarter systems with model choice&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:299,&amp;quot;335559739&amp;quot;:299}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In practice, most production systems&amp;nbsp;benefit&amp;nbsp;from&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;using multiple models together&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Use&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;DeepSeek V4 Flash&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;for high-volume, real-time interactions&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Route complex queries to&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;DeepSeek V4 Pro&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;for deeper reasoning&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Combine both in agentic workflows to balance&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;cost and quality dynamically&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;With Microsoft Foundry, this orchestration becomes seamless—enabling teams to build&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;more efficient and resilient AI systems&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5 aria-level="2"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Enterprise-ready by design&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;DeepSeek models in Microsoft Foundry inherit the platform’s enterprise-grade capabilities:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Security and compliance controls&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;to meet organizational requirements&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Built-in content safety and governance&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Observability and monitoring&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;for usage, latency, and cost&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Flexible deployment options&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;aligned to your infrastructure needs&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This ensures you can adopt new models&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;without&amp;nbsp;compromising on&amp;nbsp;trust or control&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;Pricing&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="width: 56.6667%; height: 106px; border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;&lt;STRONG&gt;Model&lt;/STRONG&gt;&lt;/td&gt;&lt;td&gt;Input (1M tokens)&lt;/td&gt;&lt;td&gt;Output (1M tokens)&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;DeepSeek V4 Flash&lt;/td&gt;&lt;td&gt;$1.03&lt;/td&gt;&lt;td&gt;$4.12&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;DeepSeek V4 Pro&lt;/td&gt;&lt;td&gt;TBD&lt;/td&gt;&lt;td&gt;TBD&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;H5 aria-level="2"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Getting started&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:299,&amp;quot;335559739&amp;quot;:299}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;A class="lia-external-url" href="https://ai.azure.com/catalog/models/DeepSeek-V4-Flash" target="_blank"&gt;DeepSeek V4 Flash&lt;/A&gt; is now available in Microsoft Foundry.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt; DeepSeek V4 Pro will be available soon.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;You can:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Explore both models in the Foundry model catalog&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Evaluate them using your own datasets&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Start building and deploying applications in minutes&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;AI is no longer about choosing a single “best” model.&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;It’s&amp;nbsp;about building systems that intelligently balance&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;quality, speed, and cost&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;With DeepSeek V4 Pro and Flash in Microsoft Foundry, you get the flexibility to do exactly that—on a platform designed for enterprise-scale AI.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 01 May 2026 00:09:35 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-foundry-blog/introducing-deepseek-v4-flash-and-v4-pro-in-microsoft-foundry/ba-p/4515174</guid>
      <dc:creator>RashaudSavage</dc:creator>
      <dc:date>2026-05-01T00:09:35Z</dc:date>
    </item>
    <item>
      <title>SASE 101: How to get started with secure access in a cloud-first world</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/sase-101-how-to-get-started-with-secure-access-in-a-cloud-first/ba-p/4516005</link>
      <description>&lt;P&gt;As organizations adopt cloud applications, hybrid work, and distributed teams, many are re-evaluating how users securely access applications and data. &lt;STRONG&gt;Secure Access Service Edge (SASE)&lt;/STRONG&gt; has become a common starting point for these conversations, but for many teams, understanding where to begin can feel unclear.&lt;/P&gt;
&lt;P&gt;This article provides a practical foundation for teams learning about SASE for the first time. It explains what SASE is, why it emerged, how it differs from Security Service Edge (SSE), and how organizations can use SASE as a modern framework for secure access. The goal is to build shared understanding before diving into tools or technical decisions.&lt;/P&gt;
&lt;H2&gt;What is SASE?&lt;/H2&gt;
&lt;P&gt;Secure Access Service Edge (SASE) is a &lt;STRONG&gt;cloud-delivered approach&lt;/STRONG&gt; that combines networking and security capabilities into a unified access model.&lt;/P&gt;
&lt;P&gt;Instead of relying on centralized data centers and fixed network perimeters, SASE delivers secure access closer to users and applications, using cloud services to apply policies in most user locations.&lt;/P&gt;
&lt;P&gt;At a foundational level, SASE shifts access and security from being &lt;STRONG&gt;network-centric&lt;/STRONG&gt; to &lt;STRONG&gt;identity-centric&lt;/STRONG&gt;. This is why SASE is often discussed early in security modernization efforts that also include Zero Trust.&lt;/P&gt;
&lt;H2&gt;Why SASE is often a starting point&lt;/H2&gt;
&lt;P&gt;Many organizations begin exploring SASE because existing models no longer match how work happens today.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Traditional assumptions:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Users worked primarily from corporate offices&lt;/LI&gt;
&lt;LI&gt;Applications lived inside data centers&lt;/LI&gt;
&lt;LI&gt;Network location determined trust&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Today’s reality:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Employees work remotely or in hybrid models&lt;/LI&gt;
&lt;LI&gt;Applications live across multiple clouds and SaaS platforms&lt;/LI&gt;
&lt;LI&gt;Contractors and partners require controlled access&lt;/LI&gt;
&lt;LI&gt;Devices connect from many different networks&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;SASE provides a way to align secure access with these realities, making it a natural entry point for organizations looking to modernize without immediately restructuring their entire environment.&lt;/P&gt;
&lt;H2&gt;Core concepts to understand when getting started with SASE&lt;/H2&gt;
&lt;P&gt;SASE is not a single technology or deployment. It is a &lt;STRONG&gt;framework&lt;/STRONG&gt; made up of several core ideas:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Cloud-Delivered Networking&lt;/STRONG&gt;&lt;BR /&gt;Connectivity adapts to where users and applications are located rather than forcing traffic through fixed sites.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Integrated Security Controls&lt;/STRONG&gt;&lt;BR /&gt;Security inspection and enforcement are applied consistently across users, devices, and destinations.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Identity-Aware Access&lt;/STRONG&gt;&lt;BR /&gt;Access decisions are based on who the user is and the context of the request, not the network they are coming from.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Globally Distributed Delivery&lt;/STRONG&gt;&lt;BR /&gt;Services are delivered through cloud infrastructure that operates close to users around the world.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Understanding these concepts early helps teams define what SASE means for their environment before evaluating vendors or technologies.&lt;/P&gt;
&lt;H2&gt;How SASE fits with Zero Trust&lt;/H2&gt;
&lt;P&gt;SASE is closely aligned with &lt;STRONG&gt;Zero Trust principles&lt;/STRONG&gt;, which require continuous verification of access requests and avoid relying on implicit trust.&lt;/P&gt;
&lt;P&gt;Rather than replacing Zero Trust, SASE provides a scalable architecture for supporting it in distributed, &lt;STRONG&gt;cloud-first&lt;/STRONG&gt; environments. It helps enforce &lt;STRONG&gt;identity-based&lt;/STRONG&gt; access and apply consistent security policies regardless of user or application location.&lt;/P&gt;
&lt;P&gt;For many organizations, SASE is a practical way to begin operationalizing Zero Trust for real-world access scenarios.&lt;/P&gt;
&lt;H2&gt;SASE vs. SSE: An important early distinction&lt;/H2&gt;
&lt;P&gt;When getting started with SASE, teams often encounter the related term &lt;STRONG&gt;Security Service Edge (SSE)&lt;/STRONG&gt;. Understanding the distinction helps clarify scope and expectations.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What Is SSE (Security Service Edge)?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;SSE is a&amp;nbsp;&lt;STRONG&gt;cloud-delivered&lt;/STRONG&gt; security model focused specifically on protecting user access to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;The web&lt;/LI&gt;
&lt;LI&gt;Cloud and SaaS applications&lt;/LI&gt;
&lt;LI&gt;Private applications&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;SSE concentrates on security controls and policy enforcement. It does not address network optimization or routing.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;How SASE and SSE Are Related:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;SASE&lt;/STRONG&gt; is the broader architecture that combines networking and security.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;SSE&lt;/STRONG&gt; represents the security portion of SASE.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;In other words, SSE is a subset of SASE. Many organizations begin their modernization journey with SSE because it allows them to improve user access security before making broader networking changes.&lt;/P&gt;
&lt;H2&gt;Using scenarios to build early understanding&lt;/H2&gt;
&lt;P&gt;When first learning about SASE, scenarios often help bring the concepts to life. For example:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;A remote employee securely accesses applications without routing traffic through a corporate office.&lt;/LI&gt;
&lt;LI&gt;A contractor receives limited, identity-based access without joining the internal network.&lt;/LI&gt;
&lt;LI&gt;A branch office connects directly to cloud services without relying on complex on-premises infrastructure.&lt;/LI&gt;
&lt;LI&gt;These examples illustrate the outcomes that SASE helps enable, which helps teams evaluate alignment with their needs.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;Who should be involved when getting started with SASE?&lt;/H2&gt;
&lt;P&gt;SASE discussions often involve multiple roles, even in early conversations:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;IT leaders&lt;/STRONG&gt; evaluating future access models&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Security teams&lt;/STRONG&gt; supporting Zero Trust initiatives&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Network professionals&lt;/STRONG&gt; adapting connectivity to cloud delivery&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Business leaders&lt;/STRONG&gt; focused on reducing complexity and risk&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Because SASE spans both networking and security, early alignment across these teams often determines long-term success.&lt;/P&gt;
&lt;H2&gt;How to get started with Microsoft Global Secure Access&lt;/H2&gt;
&lt;P&gt;Microsoft Global Secure Access helps organizations begin their SASE journey by delivering &lt;STRONG&gt;identity-aware&lt;/STRONG&gt;, &lt;STRONG&gt;cloud-delivered&lt;/STRONG&gt; access controls. Here’s how to start:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Deploy the traffic forwarding client&lt;/STRONG&gt; to route user traffic through Microsoft’s global network for policy enforcement.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Apply Conditional Access policies&lt;/STRONG&gt; to enforce identity-based access decisions.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Enable shadow AI visibility&lt;/STRONG&gt; to monitor and control unsanctioned app usage.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These steps help organizations operationalize Zero Trust principles while building toward a full SASE architecture.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://demos.microsoft.com/app/present/3070#/0/0" target="_blank"&gt;See Microsoft Global Secure Access in action&lt;/A&gt;&lt;/P&gt;
&lt;H2&gt;Getting started means building the right foundation&lt;/H2&gt;
&lt;P&gt;Getting started with SASE does not begin with tools or deployments. It begins with a shared understanding. SASE provides a way to think about secure access that is:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Cloud-based&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Identity-driven&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Consistent across users and locations&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;For organizations navigating hybrid work and cloud adoption, understanding SASE concepts early helps create a foundation for designing secure access strategies that scale with the business.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Next Steps&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Explore &lt;A href="https://learn.microsoft.com/entra/global-secure-access" target="_blank"&gt;Microsoft Global Secure Access documentation&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Take the &lt;A href="https://learn.microsoft.com/training/paths/zero-trust/" target="_blank"&gt;Microsoft Learn Zero Trust modules&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Read related blogs on &lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/bg-p/MicrosoftEntraBlog" target="_blank"&gt;modern identity security strategies&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-Sule Tatar, Senior Product Marketing Manager&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Additional resources&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://www.microsoft.com/en-us/security/business/security-101/what-is-sase" target="_blank"&gt;What Is Secure Access Service Edge (SASE)? | Microsoft Security&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/identity-and-network-security-practitioner-webinar-series/4448759" target="_blank"&gt;Identity and Network Security Practitioner Webinar Series | Microsoft Community Hub&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoftmechanicsblog/replace-your-vpn-%E2%80%94-global-secure-access-in-microsoft-entra/4473004" target="_blank"&gt;Replace your VPN — Global Secure Access in Microsoft Entra | Microsoft Community Hub&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more about Microsoft Entra &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;⁠&lt;A href="https://www.microsoft.com/en-us/security/blog/products/microsoft-entra/" target="_blank"&gt;Microsoft Entra News and Insights | Microsoft Security Blog&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/bg-p/Identity" target="_blank"&gt;⁠Microsoft Entra blog | Tech Community&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://learn.microsoft.com/en-us/entra/" target="_blank"&gt;Microsoft Entra documentation | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra/bd-p/Azure-Active-Directory" target="_blank"&gt;Microsoft Entra discussions | Microsoft Community&amp;nbsp;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2026 23:48:02 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/sase-101-how-to-get-started-with-secure-access-in-a-cloud-first/ba-p/4516005</guid>
      <dc:creator>SuleTatar</dc:creator>
      <dc:date>2026-04-30T23:48:02Z</dc:date>
    </item>
    <item>
      <title>Designed for Surface Accessories for Frontline Work</title>
      <link>https://techcommunity.microsoft.com/t5/surface-it-pro-blog/designed-for-surface-accessories-for-frontline-work/ba-p/4516000</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Frontline scenarios often involve Surface devices that are shared across shifts, used in physically demanding settings, or deployed across multiple locations. In these situations, accessories play a&amp;nbsp;critical&amp;nbsp;role in shaping how devices are configured for&amp;nbsp;day&lt;/SPAN&gt;‑&lt;SPAN data-contrast="auto"&gt;to&lt;/SPAN&gt;‑&lt;SPAN data-contrast="auto"&gt;day&amp;nbsp;use and how well they&amp;nbsp;perform within&amp;nbsp;the environments in which they are used.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Designed for Surface (DfS) accessories are built to support&amp;nbsp;these frontline needs, providing&amp;nbsp;purpose&lt;/SPAN&gt;‑&lt;SPAN data-contrast="auto"&gt;built&amp;nbsp;solutions for shared use, mobile workstyles, and access-controlled environments.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Below are a few frontline deployment patterns that help illustrate how accessories can be used to adapt Surface devices for healthcare, manufacturing, and government use cases.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Healthcare | Shared Devices and Fixed-Station Use&lt;/STRONG&gt;&lt;/H5&gt;
&lt;img&gt;&lt;EM&gt;Pictured, left to right: UAG Plasma Healthcare for Surface Pro, 13-inch, The Joy Factory Elevate II Countertop Kiosk in White.&lt;/EM&gt;&lt;/img&gt;
&lt;P&gt;In many healthcare scenarios, Surface devices are deployed both in fixed locations and on-the-go, often by multiple users throughout the day. Fixed stations typically benefit from a consistent physical setup that supports reliability and frequent interaction in busy environments, while shared mobile devices require added protection to withstand regular handling.&lt;/P&gt;
&lt;P&gt;Common in areas such as check-in desks or shared workspaces, enclosures such as &lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/surface/designed-for-surface/products?accessory=displays%20%26%20mounts&amp;amp;industry=healthcare&amp;amp;brand=the%20joy%20factory&amp;amp;sort=new&amp;amp;page=6" target="_blank" rel="noopener"&gt;The Joy Factory’s Elevate&amp;nbsp;II kiosks&lt;/A&gt; allow Surface devices to stay protected in fixed locations across departments or facilities and come in a variety of mounting options. Shared devices in this environment are also frequently handled, so protective options such as the UAG Plasma Healthcare cases for &lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/surface/designed-for-surface/products/uag-plasma-healthcare-series-case-for-surface-pro/11414c67-664a-ed11-97b1-00155dd3c884" target="_blank" rel="noopener"&gt;Surface Pro, 13-inch&lt;/A&gt; and&amp;nbsp;&lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/surface/designed-for-surface/products/uag-plasma-healthcare-for-surface-pro-12-inch/2271abda-4b2c-f011-9d47-6045bd05c5d8" target="_blank" rel="noopener"&gt;Surface Pro, 12-inch&lt;/A&gt; can be sanitized with disinfectants repeatedly without altering case integrity and are tested by an independent third-party to MIL‑STD‑810G standards&lt;SUP class="lia-linked-item"&gt;1&lt;/SUP&gt;. The Surface Pro, 12-inch variant also features swappable rear camera rings for colorful differentiation and visually identifying devices across business departments.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Manufacturing | Rugged Mobile Use&lt;/STRONG&gt;&lt;/H5&gt;
&lt;img&gt;
&lt;P&gt;&lt;EM&gt;Pictured, left to right: MobileDemand xCase with Scanner for Surface Pro, The Joy Factory aXtion Go MP for Surface Pro, 12-inch.&lt;/EM&gt;&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;In manufacturing settings, Surface devices are often on the move—being carried across a site, handled during active workflows, or used alongside task specific equipment and peripherals.&lt;/P&gt;
&lt;P&gt;Surface devices in demanding environments are benefited by accessories designed for mobile and rugged use. For example, &lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/surface/designed-for-surface/products/the-joy-factory-axtion-go-mp-for-surface-pro-12/0530112e-3638-f011-a2da-000d3a314bff" target="_blank" rel="noopener"&gt;The Joy Factory’s aXtion&amp;nbsp;Go&amp;nbsp;MP for Surface&amp;nbsp;Pro, 12‑inch&lt;/A&gt; is IP68-rated for protection against dust and water ingress&lt;SUP&gt;1&lt;/SUP&gt;, supporting usage in environments where devices can be handled in various contexts. Other protective solutions like the &lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/surface/designed-for-surface/products/mobiledemand-xcase-for-surface-pro-with-scanner-and-rotating-hand-strap-with-kickstand/dd4924b7-5824-f011-9d47-6045bd05c5d8" target="_blank" rel="noopener"&gt;MobileDemand xCase with Scanner for Surface&amp;nbsp;Pro&lt;/A&gt; can also be used for inventory tracking. These accessories illustrate how Surface devices can be paired with additional, industry-specific capabilities for task focused workflows.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Government | Access&lt;/STRONG&gt;‑&lt;STRONG&gt;Controlled and Physically Secured Use&lt;/STRONG&gt;&lt;/H5&gt;
&lt;img&gt;
&lt;P&gt;&lt;EM&gt;Pictured, left to right: UAG Scout Series Smart Card Reader Case, Kensington BlackBelt Rugged Case with Integrated Smart Card Reader &amp;amp; HDMI, Kensington Keyed Cable Lock.&lt;/EM&gt;&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;Some environments call for additional considerations around how Surface devices are accessed and secured during use. This pattern is often seen in government, where devices may be shared, deployed in the field, or used in sensitive environments that require additional security needs.&lt;/P&gt;
&lt;P&gt;In environments where security matters, these deployments are supported by accessories that integrate security features into their design. Surface devices can integrate with smart card-based authentication workflows when paired with cases like the &lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/surface/designed-for-surface/products/uag-scout-series-case-w-smart-card-reader-scr-for-surface-pro/5e64275f-6652-ee11-a81c-000d3a3608be" target="_blank" rel="noopener"&gt;UAG Scout Series Smart Card Reader Case&lt;/A&gt;, or the &lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/surface/designed-for-surface/products/kensington-blackbelt-rugged-case-with-integrated-smart-card-reader-cac-hdmi-for-surface-pro/d2ac1956-4a26-ee11-a81c-0022480b130a" target="_blank" rel="noopener"&gt;Kensington BlackBelt Rugged Case with Integrated Smart Card Reader (CAC) &amp;amp; HDMI&lt;/A&gt;, which have built-in, TAA-compliant card readers for access‑controlled use in shared or secured environments.&lt;/P&gt;
&lt;P&gt;These solutions can also be combined with physical security options such as locks, to physically secure devices both in and out of use. Non-invasive solutions, such as the&amp;nbsp;&lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/surface/designed-for-surface/products/kensington-combination-lock-for-surface-pro-and-surface-go/bda70e1f-6a7d-ec11-b820-00155dd3b150" target="_blank" rel="noopener"&gt;Kensington Combination Lock&lt;/A&gt; and &lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/surface/designed-for-surface/products/kensington-keyed-cable-lock-for-surface-pro-and-surface-go/901a638d-ad61-ec11-b820-00155dd3b150" target="_blank" rel="noopener"&gt;Keyed Cable Lock&lt;/A&gt;, provide an added layer of deterrence against unauthorized removal without requiring device modification.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Applying These Patterns&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Frontline deployments need to scale across roles, sites, and environments, while still supporting the different ways people actually work. Looking at these deployments through common patterns offers a framework for choosing the right combinations of Surface devices and accessories to help meet a broad range of frontline needs.&lt;/P&gt;
&lt;P&gt;The Designed for Surface program offers an ecosystem of certified accessories from trusted manufacturers that support these patterns across industries, helping organizations leverage Surface across frontline use cases.&lt;/P&gt;
&lt;P&gt;Explore the full catalog of 200+ Designed for Surface accessories and see how they can support frontline work&lt;SUP&gt;2&lt;/SUP&gt; by visiting &lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/surface/designed-for-surface" target="_blank" rel="noopener"&gt;DesignedforSurface.com&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Footnotes&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SUP class="lia-linked-item"&gt;1&lt;/SUP&gt; MIL‑STD‑810G and IP68-rating testing conducted by the accessory manufacturer. Testing is not a guarantee of future performance under all conditions.&lt;/P&gt;
&lt;P&gt;&lt;SUP&gt;2 &lt;/SUP&gt;Surface devices and Designed for Surface accessories are intended for general business use. Third‑party accessories may require additional validation to meet industry specific regulatory, safety, or procurement requirements.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2026 21:52:43 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/surface-it-pro-blog/designed-for-surface-accessories-for-frontline-work/ba-p/4516000</guid>
      <dc:creator>hannahtodd</dc:creator>
      <dc:date>2026-04-30T21:52:43Z</dc:date>
    </item>
    <item>
      <title>Prompt flow is being retired</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-foundry-blog/prompt-flow-is-being-retired/ba-p/4513587</link>
      <description>&lt;H1&gt;What you need to know&lt;/H1&gt;
&lt;P&gt;Prompt flow in &lt;STRONG&gt;Microsoft Foundry&lt;/STRONG&gt; and &lt;STRONG&gt;Azure Machine Learning&lt;/STRONG&gt; will be retired on &lt;STRONG&gt;20 April 2027&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;As part of this change, Microsoft recommends moving to &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/agent-framework/overview/?pivots=programming-language-csharp" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Microsoft Agent Framework&lt;/STRONG&gt;&lt;/A&gt;, which provides a production-ready foundation for building agent and workflow-based AI applications. Microsoft Agent Framework 1.0 is generally available for both Python and .NET. During the transition period, customers should begin planning and executing their migration so that existing applications, workflows, and deployments are moved to supported alternatives before the retirement date.&lt;/P&gt;
&lt;H1&gt;What is changing&lt;/H1&gt;
&lt;P&gt;After 20 April 2027,&lt;STRONG&gt; &lt;/STRONG&gt;prompt flow components will no longer be supported.&lt;/P&gt;
&lt;P&gt;This includes:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;the web authoring experience in Microsoft Foundry and Azure Machine Learning&lt;/LI&gt;
&lt;LI&gt;the VS Code extensions for prompt flow&lt;/LI&gt;
&lt;LI&gt;the prompt flow base image used in deployments&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;During deprecation period till 20 April 2027, prompt flow will continue to receive security and critical bug fixes, but no further feature development is planned.&lt;/P&gt;
&lt;H1&gt;Recommended path forward&lt;/H1&gt;
&lt;P&gt;Microsoft recommends &lt;STRONG&gt;Microsoft Agent Framework&lt;/STRONG&gt; (&lt;A href="https://devblogs.microsoft.com/agent-framework/microsoft-agent-framework-version-1-0/" target="_blank" rel="noopener"&gt;GA&lt;/A&gt; since 3 April 2026) as the primary path forward for customers using prompt flow. The framework supports both agents and workflows, and is designed for production use with stable APIs and long-term support.&lt;/P&gt;
&lt;P&gt;You can learn more here:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/agent-framework/overview/" target="_blank" rel="noopener"&gt;Microsoft Agent Framework overview&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/PFtoMAFMigration" target="_blank" rel="noopener"&gt;Migration guide&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/PFMigrationCodeSamples" target="_blank" rel="noopener"&gt;Migration Samples&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H1&gt;What customers need to do&lt;/H1&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt; Review your current prompt flow usage&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Start by identifying where prompt flow is currently used across your organization, including:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;active applications&lt;/LI&gt;
&lt;LI&gt;existing workflows&lt;/LI&gt;
&lt;LI&gt;deployed endpoints&lt;/LI&gt;
&lt;LI&gt;development or evaluation workflows&lt;/LI&gt;
&lt;LI&gt;operational dependencies tied to Prompt Flow&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This helps you understand the scope of migration and prioritize the most important workloads first.&lt;/P&gt;
&lt;OL start="2"&gt;
&lt;LI&gt;&lt;STRONG&gt; Plan your migration target&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;For most workflow and orchestration scenarios, the recommended destination is Microsoft Agent Framework. If you also rely on evaluation and tracing capabilities, review the latest supported options in Microsoft Foundry as part of your migration plan.&lt;/P&gt;
&lt;OL start="3"&gt;
&lt;LI&gt;&lt;STRONG&gt; Rebuild and validate&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Migration should include both:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;rebuilding the application or workflow in the new framework&lt;/LI&gt;
&lt;LI&gt;validating that the new implementation behaves as expected before production cutover&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;A phased approach is usually best: migrate one business-critical scenario first, validate it, and then expand to additional workloads. Migration is a multi-phase process that includes audit, rebuild, validation, operational migration, and cutover.&lt;/P&gt;
&lt;OL start="4"&gt;
&lt;LI&gt;&lt;STRONG&gt; Update deployments and operations&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;If your solution uses prompt flow deployments today, plan to move those deployments to supported alternatives before retirement.&lt;/P&gt;
&lt;H1&gt;What to expect during migration&lt;/H1&gt;
&lt;P&gt;&lt;STRONG&gt;Migration may not always be like-for-like&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Customers should plan for migration as an application update, not just a platform switch.&lt;/P&gt;
&lt;P&gt;In some cases, especially where prompt flow was used heavily as a visual authoring experience, migration may require some redesign of the solution rather than a direct one-to-one replacement. Customers should not assume a simple visual replacement and may need to preserve the business outcome rather than recreate the exact previous experience.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Start with the highest-value scenarios&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;A practical approach is to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;identify production-critical flows first&lt;/LI&gt;
&lt;LI&gt;migrate the most important scenarios before lower-priority ones&lt;/LI&gt;
&lt;LI&gt;validate outputs side-by-side where needed&lt;/LI&gt;
&lt;LI&gt;complete rollout well before the retirement date&lt;/LI&gt;
&lt;/UL&gt;
&lt;H1&gt;Support and help&lt;/H1&gt;
&lt;P&gt;If you need additional guidance:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Review the &lt;A href="https://aka.ms/PFtoMAFMigration" target="_blank" rel="noopener"&gt;migration guide&lt;/A&gt; and &lt;A href="https://aka.ms/PFMigrationCodeSamples" target="_blank" rel="noopener"&gt;code samples&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Learn more about &lt;A href="https://learn.microsoft.com/en-us/agent-framework/overview/" target="_blank" rel="noopener"&gt;Microsoft Agent Framework&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;If you need technical assistance, use your standard Azure support channels:
&lt;UL&gt;
&lt;LI&gt;Get answers from community experts in &lt;A href="https://aka.ms/azureqa" target="_blank" rel="noopener"&gt;Microsoft Q&amp;amp;A&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Create a &lt;A style="font-style: normal; font-weight: 400; background-color: rgb(255, 255, 255);" href="https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/newsupportrequest" target="_blank" rel="noopener"&gt;support request&lt;/A&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;. &lt;/SPAN&gt;
&lt;UL&gt;
&lt;LI&gt;For &lt;EM style="color: rgb(30, 30, 30);"&gt;Issue type&lt;/EM&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;, select &lt;/SPAN&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;Technical&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;. &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;For &lt;EM style="color: rgb(30, 30, 30);"&gt;Subscription&lt;/EM&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;, select your subscription. &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;For &lt;EM style="color: rgb(30, 30, 30);"&gt;Service&lt;/EM&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;,&amp;nbsp;select &lt;/SPAN&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;My services&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;, then select &lt;/SPAN&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;Machine Learning or Microsoft Foundry&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;. &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;For &lt;EM style="color: rgb(30, 30, 30);"&gt;Summary&lt;/EM&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;, type a description of your issue. &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;For&amp;nbsp;&lt;EM style="color: rgb(30, 30, 30);"&gt;Problem type&lt;/EM&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;, select prompt flow.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;For &lt;EM&gt;Problem subtype&lt;/EM&gt;, select your appropriate problem area.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;EM&gt;Learn more about service retirements that may impact your resources in the&amp;nbsp;&lt;/EM&gt;&lt;A href="https://aka.ms/ServicesRetirementWorkbook" target="_blank" rel="noopener"&gt;&lt;EM&gt;Azure Retirement Workbook&lt;/EM&gt;&lt;/A&gt;&lt;EM&gt;. Please note that retirements may not be visible in the workbook for up to two weeks after being announced.&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2026 21:15:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-foundry-blog/prompt-flow-is-being-retired/ba-p/4513587</guid>
      <dc:creator>Shubhendu_Satsangi</dc:creator>
      <dc:date>2026-04-30T21:15:00Z</dc:date>
    </item>
    <item>
      <title>What’s new in Microsoft Sentinel: April 2026</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/what-s-new-in-microsoft-sentinel-april-2026/ba-p/4516354</link>
      <description>&lt;P&gt;Welcome to the April 2026 edition of What's new in Microsoft Sentinel. April brings a broad set of updates, with &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftsentinelblog/what%E2%80%99s-new-in-microsoft-sentinel-rsac-2026/4503971" target="_blank" rel="noopener" data-lia-auto-title="RSAC 2026 announcements" data-lia-auto-title-active="0"&gt;RSAC 2026 announcements&lt;/A&gt; rolling out alongside new features. Highlights include cost limit enforcement to prevent runaway query costs, curated open-source intelligence in Threat Analytics, and new data connectors for CrowdStrike, Imperva, AWS, and Logstash. Together, these innovations help security teams control costs, stay ahead of emerging threats, and broaden visibility without added complexity.&lt;/P&gt;
&lt;P&gt;Read on to learn what's new with Sentinel.&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;What's new&lt;/STRONG&gt;&lt;/H2&gt;
&lt;H3&gt;&lt;STRONG&gt;OSINT&lt;/STRONG&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;STRONG&gt;reports in Threat Analytics&lt;/STRONG&gt;&lt;STRONG&gt; [Preview]&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Customers can now consume curated OSINT articles alongside Microsoft-authored Threat Analytics reports, all in one place. (OSINT, or open-source intelligence, is any information readily available to the public.) These OSINT articles come enriched, as detailed in the following list, to help security teams move quickly from awareness to action.&lt;/P&gt;
&lt;P&gt;What’s included:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Curated OSINT articles derived from trusted&amp;nbsp;open-source research&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;Clear summaries with links back to original sources&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;Extracted indicators of compromise (IOCs)&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;Mapped MITRE ATT&amp;amp;CK tactics and techniques&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;Microsoft enrichment, analysis, and recommended actions (when available)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;By bringing OSINT directly into Threat Analytics, we’re reducing context switching, improving analyst efficiency, and helping customers operationalize open-source intelligence faster within their Defender workflows. &lt;A href="https://learn.microsoft.com/en-us/defender-xdr/threat-analytics" target="_blank" rel="noopener"&gt;Learn more&lt;/A&gt;.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Cost limit enforcement&lt;/STRONG&gt;&lt;STRONG&gt; for KQL queries and notebooks [Preview]&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Sentinel data lake cost policies do more than just send an alert when usage gets too high. You can set hard limits for KQL queries, jobs, and notebook sessions that block new work once a threshold is exceeded, eliminating surprise bills from runaway queries or heavy workloads. For example, instead of finding out about cost spikes after you run large queries against the data lake tier, enforcement stops further queries before the damage is done. Anything already running still finishes normally, and you get clear messaging about what happened and what to do next. You can lift guardrails temporarily, adjust thresholds, or disable enforcement on the fly. &lt;A href="https://techcommunity.microsoft.com/blog/microsoftsentinelblog/enforce-cost-limits-on-kql-queries-and-notebooks-in-the-microsoft-sentinel-data-/4511329" target="_blank" rel="noopener"&gt;Learn more.&lt;/A&gt;&lt;/P&gt;
&lt;img&gt;Figure 1: Create cost management policies in the Microsoft Defender portal to automatically block new queries and jobs when usage limits are exceeded&lt;/img&gt;
&lt;H3&gt;&lt;STRONG&gt;Sentinel data connectors&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;With 380 Sentinel data connectors, customers achieve broad visibility into complex digital environments and can expand their security operations effectively. Below are the latest updates.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;CrowdStrike API Connector [Generally Available]&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;The CrowdStrike API Connector ingests logs from CrowdStrike APIs into Sentinel, fetching details on hosts, detections, incidents, alerts, and vulnerabilities from your CrowdStrike environment.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Imperva Cloud WAF [Preview]&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;The Imperva Cloud WAF data connector ingests Imperva logs into Sentinel through AWS S3 buckets, giving you visibility into web application traffic and threats detected by your Imperva deployment for monitoring, investigation, and threat hunting in Sentinel.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;AWS Elastic Load Balancer (ELB) [Preview]&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;This connector allows you to ingest AWS Elastic Load Balancer (ALB, NLB, and GLB) logs into Sentinel. These logs contain detailed records for requests handled by your load balancers, including client IPs, latencies, request paths, and status codes. These logs are useful for monitoring traffic patterns, investigating anomalies, and ensuring security compliance.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Logstash Output Plugin&lt;/STRONG&gt;&lt;STRONG&gt; [Preview]&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;For organizations that rely on Logstash to collect from on-premises, legacy, or air-gapped environments, the Sentinel Logstash Output Plugin has been rebuilt in Java to align with Microsoft's Secure Future Initiative (SFI) and provide improved security and long-term maintainability. The plugin uses the Azure Monitor Logs Ingestion API with Data Collection Rules (DCRs), giving you full schema control and the ability to ingest directly into Sentinel data lake as well as standard Sentinel tables. &lt;A href="https://techcommunity.microsoft.com/blog/microsoftsentinelblog/introducing-the-new-microsoft-sentinel-logstash-output-plugin-public-preview/4508904" target="_blank" rel="noopener"&gt;Learn more.&lt;/A&gt;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Sentinel data federation &lt;/STRONG&gt;&lt;STRONG&gt;[P&lt;/STRONG&gt;&lt;STRONG&gt;review&lt;/STRONG&gt;&lt;STRONG&gt;]&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Sentinel data federation enables unified visibility and security analytics across federated and ingested data, without compromising data governance. Security teams can quickly query data in Microsoft Fabric, Azure Data Lake Storage (ADLS) Gen2, and Azure Databricks directly from Sentinel, no data movement required. This approach allows teams to explore data broadly through federation, then selectively ingest what matters most into Sentinel to unlock advanced detections, automation, and AI‑powered analytics. &lt;A href="https://techcommunity.microsoft.com/blog/microsoftsentinelblog/microsoft-sentinel-data-federation-expand-visibility-while-preserving-governance/4511258" target="_blank" rel="noopener"&gt;Learn more.&lt;/A&gt;&lt;/P&gt;
&lt;img&gt;Figure 2: Federated data appears alongside native Sentinel tables for unified investigation and hunting&lt;/img&gt;
&lt;H3&gt;&lt;STRONG&gt;Sentinel cost estimation tool [Preview]&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Customers and partners can confidently estimate Sentinel costs using the cost estimation tool. With meter-level guidance, you can model ingestion across analytics and data lake tiers, compare retention options, and estimate compute costs. Built‑in projections of up to three years offer transparency into spend, making it easier to plan, optimize, and share estimates. &lt;A href="https://azure.microsoft.com/en-us/pricing/calculator/" target="_blank" rel="noopener"&gt;Try the Sentinel Cost Estimator.&lt;/A&gt;&lt;/P&gt;
&lt;img&gt;Figure 3: A guided, meter-level Sentinel cost estimator with three-year projections helps organizations model data growth, predict spend, and plan Sentinel adoption with confidence.&lt;/img&gt;
&lt;H3&gt;&lt;STRONG&gt;Microsoft Entra and Azure Resource Graph (ARG) connector &lt;/STRONG&gt;&lt;STRONG&gt;enhancements&lt;/STRONG&gt;&lt;STRONG&gt; [&lt;/STRONG&gt;&lt;STRONG&gt;Preview&lt;/STRONG&gt;&lt;STRONG&gt;]&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Enable new Entra assets (EntraDevices, EntraOrgContacts) and ARG assets (ARGRoleDefinitions) in existing asset connectors, expanding inventory coverage and powering richer, built‑in graph experiences for greater visibility.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Create workbook reports directly from the data lake [Preview]&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Sentinel workbooks can directly run on the data lake using KQL, enabling you to visualize and monitor security data straight from the data lake. By selecting the data lake as the workbook data source, you can create trend analysis and executive reporting.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Custom graphs&lt;/STRONG&gt;&lt;STRONG&gt; [Preview]&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Custom graphs let you model relationships unique to your organization using data from Sentinel data lake, non-Microsoft sources, and federated data sources, all powered by Fabric. Instead of stitching together dozens of tables manually, you can build graphs that surface blast radius, trace attack paths, map privilege chains, and spot structural outliers like unusually broad access or anomalous email exfiltration. You can generate custom graphs using AI-assisted coding in the Microsoft Sentinel VS Code extension, persist them via a schedule job, and access them in the graphs experience in the Defender portal. Run Graph Query Language (GQL) queries, visualize results, and interactively traverse the graph to the next hop with a single click. These graphs also provide the knowledge context that enables AI-powered agent experiences to work more effectively, speeding investigations and helping you move from disconnected alerts to confident decisions at scale. Custom graph API usage for creating and querying graphs is billed according to the Sentinel graph meter. &lt;A href="https://techcommunity.microsoft.com/blog/microsoft-security-blog/announcing-public-preview-of-custom-graphs-in-microsoft-sentinel/4507410" target="_blank" rel="noopener"&gt;Learn more.&lt;/A&gt;&lt;/P&gt;
&lt;img&gt;Figure 4: Query, visualize, and traverse custom graphs with the graph experience in Sentinel&lt;/img&gt;
&lt;H3&gt;&lt;STRONG&gt;MCP entity analyzer [General availability]&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Entity analyzer provides reasoned, out-of-the-box risk assessments that help you quickly understand whether a URL or user identity represents potential malicious activity. It analyzes data across threat intelligence, prevalence, and organizational context to generate clear, explainable verdicts you can trust. Entity analyzer integrates with your agents through Sentinel MCP server connections to first-party and third-party AI runtime platforms, or with your SOAR workflows through Logic Apps. It also serves as a trusted foundation for the Defender Triage Agent, delivering more accurate alert classifications and deeper investigative reasoning. Entity analyzer is billed based on Security Compute Units (SCU) consumption. &lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/datalake/sentinel-mcp-data-exploration-tool#entity-analyzer" target="_blank" rel="noopener"&gt;Learn more about entity analyzer&lt;/A&gt; and &lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/datalake/sentinel-mcp-billing" target="_blank" rel="noopener"&gt;MCP billing&lt;/A&gt;.&lt;/P&gt;
&lt;img&gt;Figure 5: Entity analyzer delivers explainable, multi-signal risk assessments for URLs and user identities directly within your investigation workflow&lt;/img&gt;
&lt;H3&gt;&lt;STRONG&gt;Sentinel MCP graph tool collection [Preview]&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Graph tool collection helps security teams visualize and explore relationships between identities and device assets, threats, and activity signals ingested by data connectors and alerted by analytic rules. The tool provides a clear graph view that highlights dependencies and configuration gaps, which makes it easier to understand interactions across environments. This tool helps security teams assess coverage, optimize content deployment, and identify areas that may need tuning or additional data sources—all from a single, interactive workspace. Executing graph queries via the MCP tools triggers the graph meter.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Claude MCP connector [Preview]&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Anthropic Claude can connect to Sentinel through a custom MCP connector, giving you AI-assisted analysis across your Sentinel environment. Microsoft provides step-by-step guidance for configuring a custom connector in Claude that securely connects to a Sentinel MCP server. With this connection you can summarize incidents, investigate alerts, and reason over security signals while keeping data inside Microsoft's security boundary. Access to large language models (LLMs) is managed through Microsoft authentication and role-based controls, supporting faster triage and investigation workflows while maintaining compliance and visibility.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;CVEs of interest in the Threat Intelligence Briefing Agent [Preview]&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;The Threat Intelligence Briefing Agent delivers curated intelligence based on your organization’s configuration, preferences, and unique industry and geographic needs. The agent surfaces Common Vulnerabilities and Exposures (CVEs) of interest, highlighting vulnerabilities actively discussed across the security landscape and assessing their potential impact on your environment for more timely threat intelligence insights. The agent automatically incorporates internet exposure data powered by the Sentinel platform to surface threats targeting technologies exposed in your organization. Together, these enhancements help you focus faster on the threats that matter most, without manual investigation.&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Additional resources&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;Blogs and documentation:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Featured blog:&lt;/STRONG&gt; &lt;A href="https://aka.ms/SentinelAdvisoryService" target="_blank" rel="noopener"&gt;App Assure launches its Sentinel Advisory Service&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/AppAssure_AgenticUseCases" target="_blank" rel="noopener"&gt;Agentic use cases for developers on Microsoft Sentinel&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoft-security-blog/the-unified-secops-transition-%E2%80%94-why-it-is-a-security-architecture-decision-not-j/4513815" target="_blank" rel="noopener"&gt;The Unified SecOps Transition: Why It Is a Security Architecture Decision, Not Just a Portal Change&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/DefenderNews" target="_blank" rel="noopener"&gt;What's new in Microsoft Defender – April 2026&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Webinars and training:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Featured webinar:&lt;/STRONG&gt; &lt;A href="https://info.microsoft.com/ww-landing-powering-the-agentic-soc.html?lcid=en-us" target="_blank" rel="noopener"&gt;Powering the Agentic SOC with Scott Woodgate, General Manager, Microsoft Threat Protection&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Featured training:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/blog/microsoftsentinelblog/introducing-the-microsoft-sentinel-training-lab-hands-on-security-operations-in-/4513274" target="_blank" rel="noopener"&gt;Introducing the Microsoft Sentinel Training Lab. Hands-On Security Operations in Minutes&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.youtube.com/watch?v=xJTw_Q2WVD8" target="_blank" rel="noopener"&gt;Beyond KQL – Unlocking SOC Insights with Sentinel data lake Jupyter Notebooks&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://forms.office.com/r/ha21YfCgaR" target="_blank" rel="noopener"&gt;Hyper scale your SOC: Manage delegated access and role-based scoping in Microsoft Defender&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;&lt;STRONG&gt;Stay connected&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;Check back each month for the latest innovations, updates, and events to ensure you’re getting the most out of &lt;A href="https://aka.ms/microsoftsentinel" target="_blank" rel="noopener"&gt;Microsoft Sentinel&lt;/A&gt;. We’ll see you in the next edition!&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2026 20:59:31 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/what-s-new-in-microsoft-sentinel-april-2026/ba-p/4516354</guid>
      <dc:creator>vkokkengada</dc:creator>
      <dc:date>2026-04-30T20:59:31Z</dc:date>
    </item>
    <item>
      <title>Work IQ API Public Preview: Build Copilot Powered Agents with A2A</title>
      <link>https://techcommunity.microsoft.com/t5/copilot-studio-blog/work-iq-api-public-preview-build-copilot-powered-agents-with-a2a/ba-p/4516286</link>
      <description>&lt;P&gt;Today, the Work IQ API is available in public preview, expanding access to the same underlying intelligence capabilities used by Microsoft 365 Copilot for developers and partners.&lt;/P&gt;
&lt;P&gt;Work IQ gives developers programmatic access to Copilot so you can build agents and apps that use Copilot’s grounding, context, and reasoning without wiring raw data or permissions. In this public preview, that access is exposed in three formats—Agent‑to‑Agent (A2A) for agent collaboration, Model Context Protocol (MCP) for IDEs and tools, and REST for app integrations—letting you choose the right surface for your scenario while relying on the same intelligence runtime.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoft365copilotblog/a-closer-look-at-work-iq/4499789" target="_blank" rel="noopener"&gt;Work IQ&lt;/A&gt; continuously builds context through memory and a semantic index across organizational data, Microsoft 365, line‑of‑business systems, and external sources. &amp;nbsp;The result is a unified foundation for building agents, applications, and workflows grounded in how work actually happens, with enterprise‑grade security and governance built in by default.&lt;/P&gt;
&lt;P&gt;With the Work IQ API, developers build on &lt;STRONG&gt;permission&lt;/STRONG&gt;‑&lt;STRONG&gt;aware intelligence&lt;/STRONG&gt;—context, intent, signals, and skills—so applications and agents understand what’s in motion, what’s been decided, and what needs attention next.&lt;/P&gt;
&lt;P&gt;For developers, this means:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;No raw data wiring:&lt;/STRONG&gt; Work with intelligence instead of directly accessing emails, files, or chats.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;No orchestration overhead:&lt;/STRONG&gt; A single runtime handles context assembly, grounding, skill selection, and tool invocation.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;No security rework&lt;/STRONG&gt;: Enterprise compliance, governance, and access controls are inherited automatically.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H2&gt;Where Work IQ API is available&lt;/H2&gt;
&lt;P&gt;Work IQ API meets developers where they are, supporting four protocols that share the same underlying intelligence runtime. This means that the behavior, grounding, and response quality stay consistent across every surface.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Model Context Protocol (MCP) — local server&lt;/STRONG&gt;&lt;STRONG&gt; &lt;/STRONG&gt;(available now): Works with &lt;A href="https://developer.microsoft.com/blog/bringing-work-context-to-your-code-in-github-copilot" target="_blank" rel="noopener"&gt;GitHub Copilot through the Work IQ CLI&lt;/A&gt;, giving MCP-compliant agents governed access to organizational context as tools and resources directly from their IDE or CLI workflow.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Agent-to-Agent (A2A),&lt;/STRONG&gt; new in this public preview: A cloud-hosted protocol that enables custom agents to interact directly with Copilot intelligence as a peer—delegating work, receiving grounded responses, and maintaining context across interactions.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;REST&lt;/STRONG&gt; (coming May 2026): Standard request/response access to Work IQ intelligence for applications and integrations that don't require streaming or agent-to-agent coordination.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Model Context Protocol (MCP) — remote server&lt;/STRONG&gt; (coming May 2026): A hosted MCP server exposing a standard set of tools and skills for interacting with M365 data, so any MCP-aware surface can connect to Work IQ without running a local server.&lt;/LI&gt;
&lt;/OL&gt;
&lt;img /&gt;
&lt;H2&gt;What’s new: Agent-to-Agent (A2A) protocol&lt;/H2&gt;
&lt;P&gt;This public preview introduces the &lt;A href="https://a2a-protocol.org/latest/" target="_blank" rel="noopener"&gt;Agent‑to‑Agent (A2A)&lt;/A&gt; protocol, which allows custom‑built agents to interact directly with the intelligence layer behind Copilot. Over time, A2A will expand to support collaboration across a broader set of agents and tools that support A2A or MCP, meaning agents can work together with specialized, organization‑aware capabilities.&lt;/P&gt;
&lt;P&gt;With A2A, agents communicate as peers. Rather than calling a traditional API and parsing a response, an agent can delegate work to another agent running on Work IQ—an agent with access (subject to the user’s and tenant’s permissions) to organizational context across emails, meetings, files, and conversations—and receive responses that are grounded in enterprise data and governed by the same security and compliance policies.&lt;/P&gt;
&lt;P&gt;Here’s what that looks like in practice: a single A2A message sent to a Copilot agent using standard .NET A2A SDK:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;var&amp;nbsp;credential&amp;nbsp;=&amp;nbsp;new&amp;nbsp;InteractiveBrowserCredential(clientId);&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; var&amp;nbsp;token&amp;nbsp;=&amp;nbsp;await&amp;nbsp;credential.GetTokenAsync(new&amp;nbsp;(["api://workiq.svc.cloud.microsoft/WorkIQAgent.Ask"]));&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; var&amp;nbsp;httpClient&amp;nbsp;=&amp;nbsp;new&amp;nbsp;HttpClient();&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;httpClient.DefaultRequestHeaders.Authorization&amp;nbsp;=&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; new&amp;nbsp;AuthenticationHeaderValue("Bearer",&amp;nbsp;token.Token);&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; //&amp;nbsp;Create&amp;nbsp;an&amp;nbsp;A2A&amp;nbsp;client&amp;nbsp;that&amp;nbsp;talks&amp;nbsp;to&amp;nbsp;the&amp;nbsp;default&amp;nbsp;WorkIQ&amp;nbsp;agent&amp;nbsp;endpoint,&amp;nbsp;using&amp;nbsp;the&amp;nbsp;authenticated&amp;nbsp;HttpClient&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; var&amp;nbsp;client&amp;nbsp;=&amp;nbsp;new&amp;nbsp;A2AClient(new&amp;nbsp;Uri("https://workiq.svc.cloud.microsoft/a2a/"),&amp;nbsp;httpClient);&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; //&amp;nbsp;Compose&amp;nbsp;a&amp;nbsp;query&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; var&amp;nbsp;question&amp;nbsp;=&amp;nbsp;"What&amp;nbsp;meetings&amp;nbsp;do&amp;nbsp;I&amp;nbsp;have&amp;nbsp;tomorrow&amp;nbsp;that&amp;nbsp;I&amp;nbsp;need&amp;nbsp;to&amp;nbsp;prepare&amp;nbsp;for?";&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; //&amp;nbsp;Send&amp;nbsp;the&amp;nbsp;query&amp;nbsp;and&amp;nbsp;WorkIQ&amp;nbsp;returns&amp;nbsp;an&amp;nbsp;A2A&amp;nbsp;task&amp;nbsp;that&amp;nbsp;when&amp;nbsp;complete&amp;nbsp;will&amp;nbsp;contain&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; //&amp;nbsp;&amp;nbsp;a&amp;nbsp;grounded,&amp;nbsp;permission-trimmed&amp;nbsp;answer&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; var&amp;nbsp;response&amp;nbsp;=&amp;nbsp;await&amp;nbsp;client.SendMessageAsync(new&amp;nbsp;SendMessageRequest&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;{&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Message&amp;nbsp;=&amp;nbsp;new&amp;nbsp;Message&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;{&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;MessageId&amp;nbsp;=&amp;nbsp;Guid.NewGuid().ToString("N"),&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Role&amp;nbsp;=&amp;nbsp;Role.User,&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Parts&amp;nbsp;=&amp;nbsp;[Part.FromText(question)]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;}&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;});&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Developers can rely on Work IQ to handle common retrieval and permission-enforcement tasks, reducing the need to build and maintain custom pipelines. The full working samples (C#, Rust, and Swift) are available &lt;A href="https://github.com/microsoft/work-iq-samples" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;H3&gt;What A2A unlocks for developers&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Multi-agent collaboration&lt;/STRONG&gt;: Your agents delegate to Copilot agents that understand organizational context.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Embedded intelligence via agents&lt;/STRONG&gt;&lt;STRONG&gt; &lt;/STRONG&gt;inside SaaS products that tap into a customer’s real work context.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Enterprise assistants&lt;/STRONG&gt; tailored to specific roles, powered by Copilot’s grounding and reasoning.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Autonomous workflows&lt;/STRONG&gt; where agents hand off tasks, track progress, and exchange structured artifacts.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;See A2A in action&lt;/H2&gt;
&lt;DIV style="position: relative; width: 100%; padding-bottom: 56.25%; height: 0; overflow: hidden;"&gt;&lt;IFRAME src="https://medius.microsoft.com/Embed/video-nc/7296c474-5d3b-44af-9860-dc213f74cc23?r=776257266850" title="Work IQ A2A" allowfullscreen="allowfullscreen" frameborder="0" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%;" sandbox="allow-scripts allow-same-origin allow-forms"&gt;&lt;/IFRAME&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The demo above shows an agent sending a natural-language request to Copilot via A2A and receiving a streamed, grounded response—backed by the user’s real organizational data, with no custom retrieval or permissions code. Try it yourself with the &lt;A href="https://github.com/microsoft/work-iq-samples" target="_blank" rel="noopener"&gt;Work IQ samples&lt;/A&gt; on GitHub.&lt;/P&gt;
&lt;H2&gt;How developers can use Work IQ API&lt;/H2&gt;
&lt;P&gt;Whether you’re connecting agents via A2A, surfacing organizational context through MCP in developer surfaces like IDEs and CLIs, or embedding conversational experiences via REST, the patterns share a common foundation.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;A2A &lt;/STRONG&gt;is the natural fit when your agent needs to collaborate with Copilot intelligence as a peer—delegating work, receiving structured results, and maintaining context across interactions. For example, a sales enablement agent could ask to pull together a customer's recent email threads, meeting notes, and shared documents, then use that grounded summary to auto-generate a pre-call brief—without ever touching the raw data itself.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;MCP &lt;/STRONG&gt;is ideal when you need to expose Work IQ data as tools and resources to an existing MCP-compliant agent using standard protocols and tooling, without needing custom, one-off connections. For example, with the &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/microsoft-365/copilot/extensibility/workiq-overview" target="_blank" rel="noopener"&gt;Work IQ CLI&lt;/A&gt; running as a local MCP server, a developer using GitHub Copilot can ask, "What did the team decide about the migration timeline?" and get an answer grounded in actual emails, meeting transcripts, and chat threads—right inside their IDE, without leaving their coding workflow.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;The common thread across these approaches is a shift from isolated AI features to agent‑driven systems that stay aligned with how work actually unfolds.&lt;/P&gt;
&lt;H2&gt;Security and governance&lt;/H2&gt;
&lt;P&gt;Developers can rely on Work IQ for common security and compliance controls. The Work IQ API draws a clear platform boundary between data access and intelligence:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Permissions&lt;/STRONG&gt;: User and tenant permissions, conditional access policies, and sensitivity labels are automatically enforced.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Responses&lt;/STRONG&gt;: Permission-trimmed by design.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Compliance:&lt;/STRONG&gt; All activity operates within the same audit, compliance, and data-loss-prevention boundaries as Microsoft 365.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Because the API exposes intelligence rather than raw data, applications cannot accidentally bypass tenant security or create shadow-AI risks. Agents operate within the tenant’s existing security and compliance controls from day one.&lt;/P&gt;
&lt;H2&gt;What comes next for Work IQ&lt;/H2&gt;
&lt;P&gt;Users with the appropriate license will be able to access Work IQ in customer and partner apps and agents starting today. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;General availability is planned for summer 2026. The Work IQ API will also be available to unlicensed users on a consumption basis in summer 2026.&lt;/P&gt;
&lt;P&gt;We will continue to add more to the Work IQ API in the coming weeks and months. Our investments will target three areas:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;M365 Agent access,&lt;/STRONG&gt; enabling more M365 agents to work with and alongside agents across the Copilot ecosystem, unlocking richer multi-agent collaboration patterns.&lt;/LI&gt;
&lt;LI&gt;Remote &lt;STRONG&gt;MCP server public preview,&lt;/STRONG&gt; exposing Work IQ as tools and related skills for MCP-compliant agents, so any MCP-aware surface can access governed organizational context.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Deeper connection and &lt;/STRONG&gt;&lt;STRONG&gt;richer intelligence&lt;/STRONG&gt;, expanding across platforms and developer tools in addition to building on top of organizational data with contextual grounding, skills, and tools.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H2&gt;Resources&lt;/H2&gt;
&lt;P&gt;Building with the Work IQ API and have questions? Join our developer communities for support:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Microsoft Q&amp;amp;A:&lt;/STRONG&gt; &lt;A href="https://learn.microsoft.com/en-us/answers/tags/466/microsoft-copilot-microsoft-365-copilot-development-routing" target="_blank" rel="noopener"&gt;Microsoft Copilot | Microsoft 365 Copilot | Development&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;GitHub:&lt;/STRONG&gt; Work IQ GitHub repository: &lt;A href="https://github.com/microsoft/work-iq" target="_blank" rel="noopener"&gt;microsoft/work-iq: MCP Server and CLI for accessing Work IQ&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Reddit: &lt;/STRONG&gt;&lt;A href="https://www.reddit.com/r/copilotstudio/" target="_blank" rel="noopener"&gt;copilotstudio&lt;/A&gt; or &lt;A href="https://www.reddit.com/r/microsoft_365_copilot/" target="_blank" rel="noopener"&gt;microsoft_365_copilot&lt;/A&gt; subreddits&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Documentation&lt;/STRONG&gt;: &lt;A href="https://learn.microsoft.com/en-us/microsoft-365/copilot/extensibility/work-iq-api-overview" target="_blank"&gt;Microsoft Work IQ API (preview) | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Samples&lt;/STRONG&gt;: &lt;A href="https://github.com/microsoft/work-iq-samples" target="_blank" rel="noopener"&gt;https://github.com/microsoft/work-iq-samples&lt;/A&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We can’t wait to see what you build.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2026 20:22:39 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/copilot-studio-blog/work-iq-api-public-preview-build-copilot-powered-agents-with-a2a/ba-p/4516286</guid>
      <dc:creator>tolgaki</dc:creator>
      <dc:date>2026-04-30T20:22:39Z</dc:date>
    </item>
    <item>
      <title>Accelerating the Flow of Learning</title>
      <link>https://techcommunity.microsoft.com/t5/education-blog/accelerating-the-flow-of-learning/ba-p/4485406</link>
      <description>&lt;P&gt;By Vince Frankson, Authentica Solutions | Guest Post via the Microsoft Education Blog&lt;/P&gt;
&lt;P&gt;Education technology leaders are not short on vision; they are short on time. They know exactly what their Microsoft 365 environment is capable of. What they deserve are better tools, smarter automation, and a partner that shows up ready to serve.&lt;/P&gt;
&lt;P&gt;At Authentica Solutions, we pride ourselves on our culture of servant leadership, not just as a slogan, but as our guiding principle. Our mission is to support and serve district technology teams, ensuring that technology enhances their valuable work rather than making it more complex.&lt;/P&gt;
&lt;P&gt;Everything we build is organized around one purpose: accelerating the flow of learning. Not technology for its own sake... tools and services focused at getting teachers back to teaching, students back to learning, and district leaders back to the decisions that matter most.&lt;/P&gt;
&lt;P&gt;With the school year winding down and Back to School planning already on the horizon, there is no better moment to look at where your Microsoft 365 environment stands, and how the right tools and the right team can compress your timeline, free your people, and make this the smoothest Back to School launch yet.&lt;/P&gt;
&lt;H3&gt;District Technology Teams Deserve Better Tools&lt;/H3&gt;
&lt;P&gt;K-12 technology leaders oversee complex systems, sometimes across multiple campuses, and support a wide range of users. While Microsoft 365 offers advanced features, many remain underused due to the time and expertise required for full implementation.&lt;/P&gt;
&lt;P&gt;Microsoft’s School Data Sync (SDS) is a great example. It is a genuinely powerful free service that automates the flow of student roster and identity data from your Student Information System (SIS) into Microsoft Entra ID, provisioning Teams classrooms, Intune device groups, SharePoint sites, and OneNote Class Notebooks automatically, at scale. The platform is exceptional. Fully configuring it, keeping it healthy across an academic year, and extending its value into the rest of the data ecosystem is specialized work that deserves specialized support.&lt;/P&gt;
&lt;P&gt;Authentica addresses this gap by providing support so school IT teams can focus on high-impact tasks, helping educators and students achieve more.&lt;/P&gt;
&lt;H3&gt;Authentica seed™: Built to Accelerate the Flow of Learning&lt;/H3&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://zurl.co/AuthenticaSeed" target="_blank" rel="noopener"&gt;Authentica seed™&lt;/A&gt; is Authentica’s Education Intelligence Cloud Service, designed to streamline learning by enabling clean, automated, bidirectional data pipelines. This allows teachers to access rosters quickly, students to begin learning immediately, and administrators to monitor instruction in real time, accelerating progress for everyone.&lt;/P&gt;
&lt;H4&gt;Getting Your Data into Microsoft 365&lt;/H4&gt;
&lt;P&gt;seed™ sits between your SIS and SDS, handling data preparation, mapping, and delivery so your team can focus on higher-value work. Districts that previously invested significant time in validation cycles and configuration troubleshooting are reaching full value in a fraction of the time.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Automated SIS-to-SDS&lt;/STRONG&gt; delivery with built-in validation, so errors are caught before they ever reach your tenant.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Support for OneRoster API and CSV formats&lt;/STRONG&gt; across all major SIS platforms, meeting your district where it already is.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Automatic provisioning&lt;/STRONG&gt; of users, classes, and groups across Microsoft Entra ID, Teams, SharePoint, Exchange, and Intune for Education.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Manage Student Age Groups&lt;/STRONG&gt; to limit or support access to Microsoft Copilot for students 13+.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Every hour returned from focusing on the data pipeline is an hour returned to learning. That is Cloud with Purpose.&lt;/P&gt;
&lt;H4&gt;Getting Your Data Back Where It Belongs&lt;/H4&gt;
&lt;P&gt;Learning does not stop at the edge of Microsoft 365, and neither should your data. seed™ closes the loop by moving grade data, assessment data, and engagement signals back to the platforms that need them, automatically.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Back to your SIS:&lt;/STRONG&gt; Keeping your system of record current and authoritative without double grade entry.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;To your Analytics platform:&lt;/STRONG&gt; Giving administrators and instructional coaches visibility into what is working, event making Microsoft 365 activity visible, without waiting for manual exports.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Building your dream data estate:&lt;/STRONG&gt; What if you could combine your academic and instructional data, your operations and staff data, and your financial data into a single place? What if you could have it prepped and ready so you can ask questions with Copilot and / or AI Agents.
&lt;UL&gt;
&lt;LI&gt;Which schools have the most students off track right now? Top 5, and why.&lt;/LI&gt;
&lt;LI&gt;Where are we spending the most with the weakest results? Top 3.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;One connected data ecosystem. Compounding the return on every platform investment your district has made and accelerating the flow of learning throughout.&lt;/P&gt;
&lt;H3&gt;UsageIQ™ Microsoft 365 Edition: Giving Leaders the Visibility They Deserve&lt;/H3&gt;
&lt;P&gt;District technology leaders make consequential decisions about licensing, training, and support every year. They deserve data that makes those decisions clear. &lt;A class="lia-external-url" href="https://zurl.co/AuthenticaUsageIQ" target="_blank" rel="noopener"&gt;Authentica UsageIQ™&lt;/A&gt; Microsoft 365 Edition was built to provide exactly that: a straightforward, actionable picture of how your Microsoft 365 environment is being used across the organization.&lt;/P&gt;
&lt;P&gt;Not a consultant engagement. Not a manual pull from the admin portal. A purpose-built, single view of your tenant that tells you what you need to know, when you need to know it.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;App-by-app usage across your tenant:&lt;/STRONG&gt; Teams, SharePoint, OneDrive, Exchange, OneNote, and more, in one place.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;School-by-school and role-based breakdowns:&lt;/STRONG&gt; See where adoption is strong and where targeted support would unlock real value.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;License utilization insights:&lt;/STRONG&gt; Ensure every seat is earning its value and renewal conversations are grounded in actual usage data.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Back to School readiness views:&lt;/STRONG&gt; Identify accounts and configurations that need attention before day one, not after.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;When technology leaders can see clearly, they lead confidently. That visibility is not a luxury. It is what great tools are supposed to deliver.&lt;/P&gt;
&lt;H3&gt;Managed Services for Microsoft 365: A Team That Has Been Here Before&lt;/H3&gt;
&lt;P&gt;At Authentica, we deliver Managed Services with a servant leadership mindset. We're not just a helpdesk, our team has years of experience at Microsoft, having built education solutions like SDS, Teams for Education, and Graph APIs. We support your district as an expert extension to handle critical Microsoft 365 tasks efficiently, allowing your technology staff to focus on their key responsibilities.&lt;/P&gt;
&lt;H4&gt;What Managed Services for Microsoft 365 Covers&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;End-of-Year close&lt;/STRONG&gt; support for SDS expiration management, tenant cleanup, graduating account archiving, and identity hygiene, handled on time and on spec so your team can close the year cleanly.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Back to School launch&lt;/STRONG&gt; for new year SDS configuration, classroom provisioning, device group refresh, and Conditional Access review, so teachers walk into a working environment on day one.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Ongoing SDS health monitoring&lt;/STRONG&gt; and proactive troubleshooting, so issues are resolved before they become incidents&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Microsoft Entra ID and identity management &lt;/STRONG&gt;support across the full user lifecycle.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Teams for Education&lt;/STRONG&gt; configuration, governance, and adoption enablement.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Intune for Education&lt;/STRONG&gt; device policy and deployment support.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Copilot readiness&lt;/STRONG&gt; assessment and enablement, so your district is positioned for AI-powered learning when you are ready to move.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This is what it looks like when your Microsoft 365 environment has a team behind it that is fully committed to your success, not just at launch, but every day.&lt;/P&gt;
&lt;H3&gt;End of School Checklist: Five Things Worth Doing Before Summer Break&lt;/H3&gt;
&lt;P&gt;These are the actions that make Back to School smoother, faster, and less reactive. Your team knows this; this is a reminder of what is worth prioritizing before the calendar turns.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Audit Microsoft Entra ID for inactive and graduating accounts.&lt;/STRONG&gt; Clean identities now mean a cleaner, more secure tenant heading into the new year, and fewer licensing surprises at renewal.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Review your SDS sync health. &lt;/STRONG&gt;Check error and warning logs now. Small data issues that are easy to address in the spring become August emergencies. Get ahead of them while there is room to breathe.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Check your Microsoft 365 license utilization. &lt;/STRONG&gt;If you are on A3 or A5, are those features actively working for your district? UsageIQ™ Microsoft 365 Edition can show you the full picture and give you a clear story heading into renewal season.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Archive Teams classes from the current year.&lt;/STRONG&gt; Establish your retention and archival approach before the new year roster drop. A clean tenant makes everyone faster, IT, teachers, and students.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Plan your Back-to-School timeline now.&lt;/STRONG&gt; Microsoft School Data Sync (SDS) provisioning for a large district takes time. Build in buffer, engage your support resources before August, and set your team up to launch the year confidently instead of reactively.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H3&gt;We Are Here to Serve&lt;/H3&gt;
&lt;P&gt;Authentica Solutions is offering a &lt;STRONG&gt;complimentary Microsoft 365 Readiness Assessment&lt;/STRONG&gt; for districts that want a clear picture of where they stand before the new year begins. This is a straightforward conversation with our team, people who have been inside these systems for years, helping you identify what is working, what is ready to unlock, and where the right tools can return the most value.&lt;/P&gt;
&lt;P&gt;No pressure. Just expertise, in service of your district and the learning that happens inside it.&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://zurl.co/M365Assessment" target="_blank" rel="noopener"&gt;Let’s talk&lt;/A&gt; to schedule your complimentary Microsoft 365 Readiness Assessment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;About Authentica Solutions&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Authentica Solutions is an EdTech company grounded in servant leadership and built around one purpose: accelerating the flow of learning. Our team, including former Microsoft engineers who built core Microsoft 365 education products, serves K-12 districts through seed™, UsageIQ™, reachAI™, and Managed Services for Microsoft 365. Cloud with Purpose. Visit www.authenticasolutions.com&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2026 18:07:39 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/education-blog/accelerating-the-flow-of-learning/ba-p/4485406</guid>
      <dc:creator>MikeTholfsen</dc:creator>
      <dc:date>2026-04-30T18:07:39Z</dc:date>
    </item>
    <item>
      <title>Microsoft named a Leader in the 2026 Gartner® Magic Quadrant™ for Document Management</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-sharepoint-blog/microsoft-named-a-leader-in-the-2026-gartner-magic-quadrant-for/ba-p/4516252</link>
      <description>&lt;P&gt;AI is raising the bar for document management. It’s no longer enough to store and share files— content needs to be governed, structured, and connected to the way teams actually work so AI can reason over it responsibly and help people move from information to action.&lt;/P&gt;
&lt;P&gt;That’s why we’re excited to share that Microsoft has been named a Leader in the &lt;A href="https://aka.ms/2026GartnerDocMgmtMQReport" target="_blank" rel="noopener"&gt;2026 Gartner® Magic Quadrant™ for Document Management&lt;/A&gt;, positioned highest for Ability to Execute.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;We believe this recognition reflects the investments we’ve made in making SharePoint and OneDrive the unified knowledge platform at the heart of Microsoft 365, keeping content trusted and compliant, while making it more discoverable, more actionable, and more valuable as AI adoption accelerates.&lt;/P&gt;
&lt;P&gt;In our view, this recognition is also a reflection of the customers and partners who build with us. Every day, users create 2 million new SharePoint sites, add 2 billion files, and run 3 billion automated workflows on SharePoint content each week, a scale that reflects how deeply document management is embedded in daily work. We’re excited to keep building what’s next with you.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Grounding Copilot in governed content&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;SharePoint and OneDrive serve as the trusted content layer for Microsoft 365 Copilot, giving AI a single, governed foundation to reason over. Over the past year we’ve deepened that connection across sites, files, and even encrypted content.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Reasoning over sites: &lt;/STRONG&gt;Copilot reasons across SharePoint sites and libraries, understanding pages, files, and metadata together to answer questions with full site context and governance.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Reasoning over files (including encrypted content): &lt;/STRONG&gt;Copilot can reason over individual SharePoint files — including image-level understanding in PowerPoint — and it can do so even when content is encrypted, while honoring permissions, sensitivity labels, and security policies.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Connect Copilot Studio and Foundry to SharePoint: &lt;/STRONG&gt;Use SharePoint and OneDrive as a trusted knowledge source for agents built in Copilot Studio and Foundry, so they can retrieve grounded answers from governed content while respecting the same permissions and compliance controls.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;AI-powered document insights: &lt;/STRONG&gt;Every SharePoint site has an agent that can answer questions about site and library contents. Users can do scoped Q&amp;amp;A over one or many files, summarize, compare, and generate FAQs in one click, or listen to an Audio Overview of a file on the go.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;STRONG&gt;AI-assisted work in SharePoint&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;AI in SharePoint is available now in public preview, so you can go beyond answering questions to getting real content work done right where your files live.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Turn ideas into execution: &lt;/STRONG&gt;Describe the outcome you want and &lt;A href="https://aka.ms/SharePointAI" target="_blank" rel="noopener"&gt;SharePoint proposes a structured plan&lt;/A&gt; — spanning sites, pages, libraries, lists, and starter content — so you can review and iterate before anything is created. With a single prompt, you can also kick off multi-step content work across SharePoint assets, staying in control to review, adjust, or interrupt as SharePoint executes.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Teach AI how your team works: &lt;/STRONG&gt;Capture &lt;A href="https://aka.ms/SPskills" target="_blank" rel="noopener"&gt;shared skills and context&lt;/A&gt; at the site level so one person can encode standards and everyone benefits. Skills help ensure consistent outputs, applying the same rules regardless of who asks or when.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;From content chaos to Copilot ready: &lt;/STRONG&gt;SharePoint keeps content structured, current, and governed with &lt;A href="https://aka.ms/KAmetadatablog" target="_blank" rel="noopener"&gt;automated metadata tagging&lt;/A&gt; and proactive site health monitoring, so Copilot and agent experiences across Microsoft 365 are more relevant and reliable.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;STRONG&gt;A modern, intuitive experience&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;We continue to invest in the fundamentals — fresh, clean, consumer-grade experiences that make content easier to find, author, and act on.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;New SharePoint experience (rolling out now): &lt;/STRONG&gt;A &lt;A href="https://techcommunity.microsoft.com/blog/spblog/introducing-new-agentic-building-in-sharepoint-and-more-updates/4497987" target="_blank" rel="noopener"&gt;visual refresh and simpler navigation&lt;/A&gt; oriented around three core jobs: discovering what’s new, publishing content, and building solutions. Includes new front doors like Discover, Publish, and Build plus a new app bar that makes it faster to move across SharePoint and get back to the content you need.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Refreshed document libraries: &lt;/STRONG&gt;A modernized UX with built-in AI actions and forms for file intake, bringing insights, actions, and collection into the library experience.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Page authoring and news publication: &lt;/STRONG&gt;Best-in-class web authoring with flex sections, editorial cards, design ideas, motion, fine-grained image controls, and hero carousels. Viva Connections dashboards are now available on all SharePoint sites, with a new news feed that’s both user-personalized and tenant-programmable.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;STRONG&gt;Strengthened governance and trust&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Scaling AI on content only works if the content layer is governed and secure. This past year we delivered significant advances across governance, lifecycle, and data protection.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Copilot-ready content governance: &lt;/STRONG&gt;&lt;A href="https://aka.ms/M365Conf/Blogs/SharePoint/Governance" target="_blank" rel="noopener"&gt;SharePoint Advanced Management (SAM)&lt;/A&gt; delivers permission state reports to detect overshared sites and content, and Restricted Content Discovery lets admins exclude sites that aren’t ready for Copilot.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Content lifecycle management: &lt;/STRONG&gt;SAM’s Inactive Sites Policy and Ownership Policy identify stale or unmanaged sites and drive remediation at scale.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Unified data protection with Microsoft Purview: &lt;/STRONG&gt;Dynamic watermarking and broader label support extend protection across content types.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Records management in Purview: &lt;/STRONG&gt;Multi-stage disposition through retention labels (up to five stages) enables multiphase review, relabeling, extension, and defensible deletion across Microsoft 365.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;STRONG&gt;Content management and industry solutions at scale&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;As content management needs grow, customers want a single solution that blends secure collaboration with records, compliance, and line-of-business content, built for how specific industries and roles operate. SharePoint and OneDrive provide a flexible, governed foundation for regulated and high-volume content processes.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Governance by default: &lt;/STRONG&gt;Metadata, retention, sensitivity labels, and permissions stay with content, supporting audit-ready control for regulated industries like financial services, healthcare, and the public sector.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Role-based experiences: &lt;/STRONG&gt;Build repeatable journeys for HR, legal, and operations, from onboarding and case files to contract review, approvals, and publishing.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Secure internal and external collaboration: &lt;/STRONG&gt;Enable controlled sharing for customer onboarding, vendor management, and partner workflows while maintaining policy enforcement and admin visibility.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;AI-ready content: &lt;/STRONG&gt;Keep information organized and trusted so Copilot and agents can deliver more relevant, permission-aware answers and next actions, especially for high-stakes roles working with sensitive content.&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Connected with Microsoft 365 apps: &lt;/STRONG&gt;Enter and update SharePoint metadata directly from Word; request and sign documents with eSignature from Word and PDFs in SharePoint; use AI-powered document assembly to generate compliant Word documents from approved templates; and rely on a single “hero link” per file that controls all access — no more juggling multiple sharing links.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;STRONG&gt;Learn more about SharePoint, OneDrive, and Microsoft 365 Copilot&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;We remain committed to making content governed, intelligent, and AI-ready — so every document in your organization can become knowledge that moves work forward.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Start using Microsoft 365 Copilot today. Visit Microsoft365.com/copilot or download the Microsoft 365 Copilot app.&lt;/LI&gt;
&lt;LI&gt;Learn about Microsoft SharePoint: &lt;A href="https://www.microsoft.com/en-us/microsoft-365/sharepoint/" target="_blank" rel="noopener"&gt;https://www.microsoft.com/en-us/microsoft-365/sharepoint/&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Learn about SharePoint’s latest AI capabilities: &lt;A href="https://aka.ms/SharePointAI" target="_blank" rel="noopener"&gt;https://aka.ms/SharePointAI&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Read more about 2026 Gartner® Magic Quadrant™ for Document Management: &lt;A href="https://aka.ms/2026GartnerDocMgmtMQReport" target="_blank" rel="noopener"&gt;https://aka.ms/2026GartnerDocMgmtMQReport&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;HR /&gt;
&lt;P&gt;&lt;EM&gt;Gartner, Magic Quadrant for Document Management, Tim Nelms, Jed Cawthorne, Rachel O’Farrel, Marko Sillanpaa, Stephen Emmott, April 28, 2026.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research &amp;amp; Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Gartner and Magic Quadrant are trademarks of Gartner, Inc., and/or its affiliates.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;*This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request here.&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2026 21:23:14 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-sharepoint-blog/microsoft-named-a-leader-in-the-2026-gartner-magic-quadrant-for/ba-p/4516252</guid>
      <dc:creator>Matt-Taylor</dc:creator>
      <dc:date>2026-04-30T21:23:14Z</dc:date>
    </item>
    <item>
      <title>Dynamically remove apps from managed Windows 11 devices</title>
      <link>https://techcommunity.microsoft.com/t5/windows-it-pro-blog/dynamically-remove-apps-from-managed-windows-11-devices/ba-p/4516291</link>
      <description>&lt;P&gt;You can now use policy to remove select pre-installed Microsoft Store apps on devices running Windows 11, version 25H2 or version 24H2. We've also made a significant update to this policy: a dynamic app removal list. This feature lets you remove &lt;EM&gt;any&lt;/EM&gt; preinstalled MSIX/APPX app by referencing its Package Family Name (PFN).&lt;/P&gt;
&lt;P style="margin-top: 16px;"&gt;What's the benefit? Fewer unwanted apps, simpler provisioning, and a more tailored desktop for your users. Just use a standard, policy-based approach that integrates with Microsoft Intune and Group Policy. This policy, called "Remove default Microsoft Store packages from the system," is available only on Enterprise and Education devices. The improvements are available starting with the April 2026 Windows non-security update. Additional Intune capabilities are coming.&lt;/P&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 24px; color: #333333;"&gt;Dynamic app removal list&lt;/H2&gt;
&lt;P style="margin-top: 16px;"&gt;Microsoft offers a set of robust policy controls to help you customize app availability for your users. With the latest updates to the &lt;A href="https://learn.microsoft.com/windows/configuration/policy-based-inbox-app-removal/policy-based-inbox-app-removal?tabs=intune" target="_blank"&gt;RemoveDefaultMicrosoftStorePackages&lt;/A&gt; policy, you can now remove any MSIX/APPX packaged app. Just add its Package Family Name (PFN)&lt;STRONG&gt; &lt;/STRONG&gt;to the new dynamic app removal list. Today, you can use Group Policy Object (GPO) or custom OMA-URI for mobile device management (MDM).&lt;/P&gt;
&lt;H3 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 20px; color: #333333;"&gt;Group Policy&lt;/H3&gt;
&lt;P style="margin-top: 16px;"&gt;Here's how you can make it work using Group Policy:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Find the app's PFN using PowerShell. Use the following example, replacing "Notepad" with your desired app:
&lt;PRE&gt;Get-AppxPackage *Notepad* | Select-Object PackageFamilyName&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;Open Group Policy Editor (gpedit.msc). Navigate to &lt;STRONG&gt;Computer Configuration&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;Administrative Templates&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;Windows Components&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;App Package Deployment&lt;/STRONG&gt; and select&amp;nbsp;&lt;STRONG&gt;Remove default Microsoft Store packages from the system&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Add the PFN to the multi-text list under &lt;STRONG&gt;Specify additional package family names to remove&lt;/STRONG&gt;. Enter one package family name per line.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H3 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 20px; color: #333333;"&gt;Custom OMA-URI&lt;/H3&gt;
&lt;P style="margin-top: 16px;"&gt;Alternatively, you can configure devices with the &lt;A href="https://learn.microsoft.com/windows/client-management/mdm/policy-csp-applicationmanagement" target="_blank"&gt;RemoveDefaultMicrosoftStorePackages Policy CSP&lt;/A&gt;. This ADMX-backed policy uses an XML payload to specify which apps to remove. For example, to remove Bing News and the Windows Alarms apps, see the last entry.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;OMA-URI: ./Device/Vendor/MSFT/Policy/Config/ApplicationManagement/RemoveDefaultMicrosoftStorePackages&lt;/LI&gt;
&lt;LI&gt;Data type: string&lt;/LI&gt;
&lt;LI&gt;Value:
&lt;PRE&gt;&amp;lt;enabled/&amp;gt;&lt;BR /&gt;&amp;lt;data id="WindowsFeedbackHub" value="false"/&amp;gt;&lt;BR /&gt;&amp;lt;data id="MicrosoftOfficeHub" value="false"/&amp;gt;&lt;BR /&gt;&amp;lt;data id="Clipchamp" value="false"/&amp;gt;&lt;BR /&gt;&amp;lt;data id="Copilot" value="false"/&amp;gt;&lt;BR /&gt;&amp;lt;data id="BingNews" value="true"/&amp;gt;&lt;BR /&gt;&amp;lt;data id="Photos" value="false"/&amp;gt;&lt;BR /&gt;&amp;lt;data id="MicrosoftSolitaireCollection" value="true"/&amp;gt;&lt;BR /&gt;&amp;lt;data id="MicrosoftStickyNotes" value="true"/&amp;gt;&lt;BR /&gt;&amp;lt;data id="MSTeams" value="false"/&amp;gt;&lt;BR /&gt;&amp;lt;data id="Todo" value="false"/&amp;gt;&lt;BR /&gt;&amp;lt;data id="BingWeather" value="true"/&amp;gt;&lt;BR /&gt;&amp;lt;data id="OutlookForWindows" value="false"/&amp;gt;&lt;BR /&gt;&amp;lt;data id="Paint" value="false"/&amp;gt;&lt;BR /&gt;&amp;lt;data id="QuickAssist" value="false"/&amp;gt;&lt;BR /&gt;&amp;lt;data id="ScreenSketch" value="false"/&amp;gt;&lt;BR /&gt;&amp;lt;data id="WindowsCalculator" value="false"/&amp;gt;&lt;BR /&gt;&amp;lt;data id="WindowsCamera" value="false"/&amp;gt;&lt;BR /&gt;&amp;lt;data id="MediaPlayer" value="false"/&amp;gt;&lt;BR /&gt;&amp;lt;data id="WindowsNotepad" value="false"/&amp;gt;&lt;BR /&gt;&amp;lt;data id="WindowsSoundRecorder" value="false"/&amp;gt;&lt;BR /&gt;&amp;lt;data id="WindowsTerminal" value="false"/&amp;gt;&lt;BR /&gt;&amp;lt;data id="GamingApp" value="true"/&amp;gt;&lt;BR /&gt;&amp;lt;data id="XboxGamingOverlay" value="true"/&amp;gt;&lt;BR /&gt;&amp;lt;data id="XboxIdentityProvider" value="true"/&amp;gt;&lt;BR /&gt;&amp;lt;data id="XboxSpeechToTextOverlay" value="true"/&amp;gt;&lt;BR /&gt;&amp;lt;data id="XboxTCUI" value="true"/&amp;gt;&lt;BR /&gt;&amp;lt;data id="DynamicRemovalList" value="Microsoft.BingNews_8wekyb3d8bbwe&amp;amp;#x0D;&amp;amp;#x0A;Microsoft.WindowsAlarms_8wekyb3d8bbwe"/&amp;gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P style="margin-top: 16px;"&gt;The XML payload includes a static list of app names (preceded by "data id") and corresponding values. Apps with the value of "true" will be removed. Apps with the value of "false" won't be removed.&lt;/P&gt;
&lt;P style="margin-top: 16px;"&gt;You can remove additional apps by adding them to the value field of the "DynamicRemoval List" at the end of the payload. Separate multiple apps by the HTML-encoded carriage return + line feed characters ( &amp;amp;#x0D;&amp;amp;#x0A;), indicating a new line between each app name.&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;STRONG&gt;IMPORTANT: &lt;/STRONG&gt;If you create a custom OMA-URI, you must open the dynamic list entry in the registry once on each device to which the policy is targeted. This helps ensure the correct format for the items in the dynamic list. Here is the entry: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Appx\RemoveDefaultMicrosoftStorePackages&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P style="margin-top: 16px;"&gt;Once configured, change happens at provisioning or on next user sign-in. The device uninstalls the apps you specify in the following two areas:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;The default checkbox selections&lt;/LI&gt;
&lt;LI&gt;The dynamic PFN list&lt;/LI&gt;
&lt;/UL&gt;
&lt;P style="margin-top: 16px;"&gt;Removed apps remain blocked from reinstallation while the policy is active.&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;STRONG&gt;IMPORTANT:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Removing an app also removes any associated on-disk app data. Therefore, notify users in advance if they need to save local data.&lt;/LI&gt;
&lt;LI&gt;You can't use the dynamic list to remove system components. These components aren't supposed to be removed.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H3 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 20px; color: #333333;"&gt;Prepare for Microsoft Intune capabilities&lt;/H3&gt;
&lt;P style="margin-top: 16px;"&gt;The Intune settings catalog entry for this policy doesn't yet contain the dynamic list option. It will be available in the following months.&lt;/P&gt;
&lt;P style="margin-top: 16px;"&gt;When this feature becomes generally available in Intune, search for &lt;STRONG&gt;"Remove Default Microsoft Store packages"&lt;/STRONG&gt; in the settings picker to locate it.&lt;/P&gt;
&lt;P style="margin-top: 16px;"&gt;During rollout of the updated RemoveDefaultMicrosoftStorePackages policy, devices in your environment might support different CSP versions. If a device receives a policy that doesn't match its supported schema, the policy might fail to parse and won't be applied.&lt;/P&gt;
&lt;P style="margin-top: 16px;"&gt;To prevent this, maintain your existing policy for older devices. Create a separate policy that includes the new dynamic app removal list for newer devices. Use Intune assignment filters or targeting rules (such as OS version or update rings) to help ensure that each device receives a compatible policy.&lt;/P&gt;
&lt;P style="margin-top: 16px;"&gt;Once all devices are updated, and Intune fully supports the new CSP, you can safely consolidate policies.&lt;/P&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 24px; color: #333333;"&gt;Extended support: Windows 11, version 24H2 and later&lt;/H2&gt;
&lt;P style="margin-top: 16px;"&gt;The updated app removal policy is now extended to Windows 11, version 24H2 Enterprise and Education editions. Originally, you could only use this feature on devices running Windows 11, version 25H2 or newer. If your organization has standardized on the 2024 release, you can benefit from policy-driven app management without a full OS version upgrade. The same Group Policy path and enforcement behavior apply to all supported versions.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Supported Windows versions: Windows 11, version 24H2 and later&lt;/LI&gt;
&lt;LI&gt;Supported Windows editions: Enterprise and Education (Home and Pro remain unsupported)&lt;/LI&gt;
&lt;/UL&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;STRONG&gt;IMPORTANT:&lt;/STRONG&gt; Ensure that your devices have the latest cumulative updates installed to receive these improvements. You need at least the April 2026 Windows non-security update. If you're a Windows Insider, you'd have this feature with the March 13, 2026 builds in the &lt;A href="https://blogs.windows.com/windows-insider/2026/03/13/announcing-windows-11-insider-preview-build-26300-8068-dev-channel/" target="_blank"&gt;Dev&lt;/A&gt; and &lt;A href="https://blogs.windows.com/windows-insider/2026/03/13/announcing-windows-11-insider-preview-build-26220-8062-beta-channel/" target="_blank"&gt;Beta&lt;/A&gt; channels.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 24px; color: #333333;"&gt;Control your preinstalled apps like a pro&lt;/H2&gt;
&lt;P style="margin-top: 16px;"&gt;With dynamic app removal, you can remove any preinstalled app with a simple policy change. Benefit from a cleaner, more controlled Windows experience across your organization, now on even more devices. Start planning this policy rollout across your enterprise today.&lt;/P&gt;
&lt;P style="margin-top: 16px;"&gt;Have feedback? Share your thoughts in the Feedback Hub (accessible using the shortcut WIN + F) under &lt;STRONG&gt;Developer Platform&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;App Deployment&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P style="margin-top: 16px;"&gt;Learn more with additional resources:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/policy-based-removal-of-pre-installed-microsoft-store-apps/4463835" target="_blank"&gt;Policy-based removal of pre-installed Microsoft Store apps&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows/configuration/policy-based-inbox-app-removal/policy-based-inbox-app-removal?tabs=intune" target="_blank"&gt;Policy-based in-box app removal&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows/client-management/mdm/policy-csp-applicationmanagement#removedefaultmicrosoftstorepackages" target="_blank"&gt;ApplicationManagement Policy CSP&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 30 Apr 2026 18:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-it-pro-blog/dynamically-remove-apps-from-managed-windows-11-devices/ba-p/4516291</guid>
      <dc:creator>Ingrid_Allen</dc:creator>
      <dc:date>2026-04-30T18:00:00Z</dc:date>
    </item>
    <item>
      <title>Building Futures Through Community: Creating Pathways into Tech</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-mvp-program-blog/building-futures-through-community-creating-pathways-into-tech/ba-p/4515505</link>
      <description>&lt;P&gt;For the team behind &lt;A href="https://expertslive.dk/" target="_blank" rel="noopener"&gt;Experts Live Denmark&lt;/A&gt; - organized by the Microsoft MVP &amp;amp; RD community in Denmark - this belief has shaped how they think about community: not just as a place to share knowledge, but as a space to open doors into the industry. That thinking is what led to the collaboration with &lt;A href="https://www.redi-school.org/redi-school-denmark" target="_blank" rel="noopener"&gt;ReDI School of Digital Integration Denmark&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;ReDI supports women with migrant and refugee backgrounds through digital education, mentorship, and career guidance. But as the organizers of Experts Live Denmark recognized early on, skills alone are not enough. The missing piece is often access to real environments - to people, conversations, and experiences that make the industry tangible. This is where the collaboration comes in.&lt;/P&gt;
&lt;H2&gt;From Learning to Real-World Experience&lt;/H2&gt;
&lt;P&gt;Rather than treating volunteers as event support, the approach has been to create an experience that reflects how the tech community actually works. As&amp;nbsp; &lt;A href="https://mvp.microsoft.com/en-US/MVP/profile/b3cc7c25-1e9e-ed11-83ff-000d3a5600fa" target="_blank" rel="noopener"&gt;MVP Morten &amp;nbsp;Knudsen&lt;/A&gt; says: &lt;EM&gt;“&lt;/EM&gt;&lt;EM&gt;Our collaboration is not just about inviting volunteers to an event. It is about empowerment, mentorship, visibility, and long-term career support.”&lt;/EM&gt;&lt;/P&gt;
&lt;img&gt;Geetanjali Hinda at the Experts Live Denmark 2026 appreciation Dinner&lt;/img&gt;
&lt;P&gt;For volunteers like&amp;nbsp;&lt;A href="https://www.linkedin.com/in/geetanjali-hinda/" target="_blank" rel="noopener"&gt;Geetanjali Hinda&lt;/A&gt; and &lt;A href="https://www.linkedin.com/in/poorva-pandit/" target="_blank" rel="noopener"&gt;Poorva Tumbde&lt;/A&gt;, that difference was immediately visible.&lt;/P&gt;
&lt;P&gt;Geetanjali describes it as a turning point:&amp;nbsp;&lt;EM&gt;“It felt like a direct bridge between learning and the professional te&lt;/EM&gt;&lt;EM&gt;ch comm&lt;/EM&gt;&lt;EM&gt;unity.” &lt;/EM&gt;What stood out most was not just the scale of the event - but how it felt to be part of it: &lt;EM&gt;“There was no clear divide between volunteers, learners, and experienced professionals. Everyone was approachable and willing to engage.”&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;That openness is intentional. From the organizer perspective, creating an environment where people feel able to engage—not just observe - is what turns an event into an entry point. And for Geetanjali, it changed the experience entirely: &lt;EM&gt;“I didn’t feel like I was just supporting the event. I felt like I was contributing to it.”&lt;/EM&gt;&lt;/P&gt;
&lt;H3&gt;Confidence Comes From Participation&lt;/H3&gt;
&lt;P&gt;For many entering a new country and job market, confidence can be one of the biggest barriers. Geetanjali speaks candidly about that reality: &lt;EM&gt;“Being a job-seeking expat, you tend to lose your confidence.” &lt;/EM&gt;Working in a fast-paced, real-world setting helped shift that: &lt;EM&gt;“It reminded me of my communication and coordination skills… especially when dealing with last-minute changes.” &lt;/EM&gt;More importantly, it changed how she approached her role: &lt;EM&gt;“I became more comfortable taking initiative and stepping in where needed without waiting for direction.” &lt;/EM&gt;And something unexpected emerged: &lt;EM&gt;“Even without a formal role, I found myself thinking proactively and focusing on solutions.” &lt;/EM&gt;This shift - from waiting to contributing - is exactly what the experience is designed to enable.&lt;/P&gt;
&lt;H3&gt;Seeing the Industry Up Close&lt;/H3&gt;
&lt;img&gt;Poorva Tumbde&lt;/img&gt;
&lt;P&gt;For Poorva, the journey began through ReDI School itself: &lt;EM&gt;“It has been a meaningful bridge… helping us connect with and better understand Danish work culture.” &lt;/EM&gt;Through that connection, she stepped into Experts Live Denmark and experienced the industry firsthand. What stayed with her most was the energy of the community: &lt;EM&gt;“The event brought together more than 1,400 attendees from diverse cultural backgrounds… What stood out to me was the passion shared by everyone involved.” &lt;/EM&gt;But beyond the atmosphere, the experience helped expand her perspective: &lt;EM&gt;“I gained a better understanding of emerging technologies, the increasing role of AI… and how innovation is shaping the future of the tech industry.” &lt;/EM&gt;Exposure to real conversations, real challenges, and real expertise helped turn abstract interest into something more concrete.&lt;/P&gt;
&lt;H3&gt;Learning by Doing&lt;/H3&gt;
&lt;P&gt;A key part of the experience is hands-on involvement. Poorva highlights the practical side: &lt;EM&gt;“I gained hands-on exposure to publishing a WordPress website, automating email communications using Microsoft Forms, and understanding the intricacies of event logistics.”&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;At the same time, Geetanjali’s experience reflects another dimension—learning how to operate in dynamic environments. Together, these experiences provide something difficult to replicate elsewhere:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Applying skills in real scenarios&lt;/LI&gt;
&lt;LI&gt;Understanding how collaboration works in practice&lt;/LI&gt;
&lt;LI&gt;Navigating uncertainty and adapting in real time&lt;/LI&gt;
&lt;LI&gt;Building confidence through contribution&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;From the organizer perspective, this is the goal. Not just to expose participants to the industry - but to help them practice being part of it.&lt;/P&gt;
&lt;H2&gt;More Than Technical Skills&lt;/H2&gt;
&lt;P&gt;Both experiences point to a broader realization. For Poorva, it came through exposure to sessions and experts. For Geetanjali, it came through participation and interaction. As she puts it: &lt;EM&gt;“Being part of the tech industry is not just about technical skills, but also about collaboration and mindset.” &lt;/EM&gt;This is a critical shift. Because entering the industry is not only about what you know - it’s about how you engage, contribute, and connect.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Geetanjali welcoming people at Experts Live Denmark 2026&lt;/img&gt;
&lt;H2&gt;Why This Collaboration Matters&lt;/H2&gt;
&lt;P&gt;From the perspective of Experts Live Denmark, the collaboration with ReDI School is about creating continuity in the journey into tech.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="width: 100%; height: 122px; border-width: 1px;"&gt;&lt;colgroup&gt;&lt;col style="width: 50%" /&gt;&lt;col style="width: 50%" /&gt;&lt;/colgroup&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;ReDI provides the foundation:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Skills&lt;/LI&gt;
&lt;LI&gt;Learning&lt;/LI&gt;
&lt;LI&gt;Initial network&lt;/LI&gt;
&lt;/UL&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;The community provides the next step:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Real-world exposure&lt;/LI&gt;
&lt;LI&gt;Practical experience&lt;/LI&gt;
&lt;LI&gt;Professional confidence&lt;/LI&gt;
&lt;/UL&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;By connecting the two, the gap between learning and working becomes smaller - and more navigable.&lt;/P&gt;
&lt;H2&gt;Looking Ahead&lt;/H2&gt;
&lt;P&gt;For both Poorva and Geetanjali, the experience did not end with the event.&amp;nbsp; It shaped how they see their next steps. Geetanjali reflects this clearly: &lt;EM&gt;“Going forward, I want to combine my technical development with active participation in professional communities… showing up with a mindset of contribution, accountability, and curiosity.”&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;That mindset - more than any single skill - is what enables long-term growth. And it is exactly what collaborations like this aim to support. Because building a strong tech community is not only about sharing knowledge. It is about bringing more people into it - and helping them find their place within it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;Experts Live is a global&amp;nbsp; network of community-driven conferences&amp;nbsp; that brings together Microsoft executives, MVPs and community members sharing practical, real-world knowledge through sessions, conversations, and networking.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A class="lia-external-url" href="https://expertslive.dk/" target="_blank" rel="noopener"&gt;Experts Live Denmark &lt;/A&gt;is happening again on February 9-10, 2027.&lt;/STRONG&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;</description>
      <pubDate>Thu, 30 Apr 2026 19:19:42 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-mvp-program-blog/building-futures-through-community-creating-pathways-into-tech/ba-p/4515505</guid>
      <dc:creator>TinaStenderup</dc:creator>
      <dc:date>2026-04-30T19:19:42Z</dc:date>
    </item>
    <item>
      <title>Partner Blog | Driving channel velocity in an AI-first world: Microsoft Marketplace at Channel Partners Conference</title>
      <link>https://techcommunity.microsoft.com/t5/partner-news/partner-blog-driving-channel-velocity-in-an-ai-first-world/ba-p/4516017</link>
      <description>&lt;P&gt;The&amp;nbsp;recent&amp;nbsp;&lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fchannelpartnersconference.com%2F&amp;amp;data=05%7C02%7Cv-armourjill%40microsoft.com%7Cde5107f156c04dfe4f1b08dea625dd93%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C639130878766420214%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=IQdUwvVbKplsDIJEnxAJ1i0VWzB%2Fv5o4MQvZf%2F3kd3U%3D&amp;amp;reserved=0" target="_blank"&gt;Channel Partners Conference&amp;nbsp;&amp;amp; Expo&lt;/A&gt;&amp;nbsp;brought together thousands of channel leaders, technology providers, and ecosystem partners to explore&amp;nbsp;what’s&amp;nbsp;next for the channel—and how partners can accelerate growth in a market being rapidly reshaped by AI. With an audience deeply focused on differentiation, scale, and customer value, the conference highlighted how cloud, AI, and modern commerce models are redefining&amp;nbsp;the&amp;nbsp;partner opportunity.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Microsoft&amp;nbsp;Marketplace&amp;nbsp;participated&amp;nbsp;as a Platinum sponsor, reflecting the&amp;nbsp;central role&amp;nbsp;the channel plays as customers move AI from experimentation into production. As partners guide strategy, deployment, and outcomes, Marketplace provides the commercial foundation—connecting partners, software companies, and customers through flexible,&amp;nbsp;channel-led&amp;nbsp;sales models&amp;nbsp;that scale.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;“Microsoft Marketplace gives enterprise and SMC customers a direct path to procure&amp;nbsp;Devicie&amp;nbsp;against their Microsoft commitments, while our channel-led sales motion extends our reach through the trusted partner relationships that help customers achieve better device management outcomes.”&amp;nbsp;&lt;/EM&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;EM&gt;Connor O’Reilly, Channel Sales Manager,&amp;nbsp;Devicie&lt;/EM&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://aka.ms/partnerblog-marketplaceapril2026" target="_blank"&gt;Continue reading here&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2026 17:30:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/partner-news/partner-blog-driving-channel-velocity-in-an-ai-first-world/ba-p/4516017</guid>
      <dc:creator>JillArmourMicrosoft</dc:creator>
      <dc:date>2026-04-30T17:30:00Z</dc:date>
    </item>
    <item>
      <title>Prefix-scoped access for User Delegation SAS is now generally available for Azure Blob Storage</title>
      <link>https://techcommunity.microsoft.com/t5/azure-storage-blog/prefix-scoped-access-for-user-delegation-sas-is-now-generally/ba-p/4516010</link>
      <description>&lt;P&gt;We would like to share that &lt;STRONG&gt;prefix-scoped access for User Delegation SAS for Azure Blob Storage is generally available in all Azure regions&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;SAS tokens for Blob Storage have historically supported two levels of scope: container and individual blob. With this release, you can now scope access to a &lt;STRONG&gt;prefix or virtual directory&lt;/STRONG&gt; within a container, granting access to all blobs beneath the path.&lt;/P&gt;
&lt;P&gt;This is especially valuable for applications that organize data by tenant, workspace, project, or department within a shared container. Instead of granting access to an entire container or generating many blob-level tokens, you can now issue a single SAS token scoped to a set of blobs through a prefix.&lt;/P&gt;
&lt;P&gt;For example, if a container has these blobs:&lt;/P&gt;
&lt;P&gt;contoso/sales/Q1-report.csv&lt;/P&gt;
&lt;P&gt;contoso/sales/Q2-report.csv&lt;/P&gt;
&lt;P&gt;contoso/invoice.pdf&lt;/P&gt;
&lt;P&gt;A SAS token scoped to the prefix contoso/sales would grant access only to the two sales reports. This simplifies manageability by not having to generate multiple blob scoped tokens which significantly reduces overhead to manage permissions for large scale data storage estates. In addition, it helps customers provide more scoped permissions to a certain set of blobs rather than broader permissions at a container level.&lt;/P&gt;
&lt;P&gt;Prefix-scoped access is supported for both Blob and Data Lake storage accounts.&lt;/P&gt;
&lt;P&gt;As a best practice, we recommend using Entra ID with RBAC or ABAC for least privilege access. If you need to use SAS for your use cases, we recommend using user delegation SAS and prefix-based scoping is a good option to consider for more scoped permissions for a certain set of blobs.&lt;/P&gt;
&lt;H5&gt;Pricing and Availability&lt;/H5&gt;
&lt;P&gt;There is no additional cost for prefix-scoped access for user delegation SAS. Pricing is based on standard transaction costs for your storage account type. To learn more, see&lt;A class="lia-external-url" href="https://azure.microsoft.com/pricing/details/storage/blobs/" target="_blank" rel="noopener"&gt; Azure Storage Pricing&lt;/A&gt;. &lt;/P&gt;
&lt;P&gt;Prefix-scoped access for user delegation SAS is available in all Azure regions.&lt;/P&gt;
&lt;H5&gt;How to generate a prefix-scoped SAS&lt;/H5&gt;
&lt;P&gt;To generate and use a prefix-scoped SAS:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Identify the prefix (or virtual directory) you want to authorize.&lt;/LI&gt;
&lt;LI&gt;Follow the steps in the documentation to create a prefix-scoped SAS for &lt;A class="lia-external-url" href="https://learn.microsoft.com/rest/api/storageservices/create-user-delegation-sas" target="_blank" rel="noopener"&gt;user delegation SAS&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;Use the SAS token with your application.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Notes&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Support for prefix-scoped access parameters is available with authorization version 2020-02-10 or later via REST API and .NET Blob SDKs starting with version 12.35.0-beta.1 and newer.&lt;/LI&gt;
&lt;LI&gt;The semantics for prefix scope (sr=d) are similar to container scope (sr=c), except that access is restricted to a prefix. When creating a prefix-scoped SAS, you must specify the signedDirectoryDepth (sdd) to indicate how many directory levels from the container root to the specified directory. For example, to grant access to dir2 on path container1/dir1/dir2, set the directory depth (sdd) = 2 to indicate the SAS is scoped to dir2 and everything beneath it.&lt;/LI&gt;
&lt;LI&gt;Below are .NET SDK and REST API examples for reference.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H6&gt;&lt;U&gt;.NET SDK Sample Definition&lt;/U&gt;&lt;/H6&gt;
&lt;LI-CODE lang=""&gt;            BlobSasBuilder blobSasBuilder = new BlobSasBuilder(
                permissions: BlobContainerSasPermissions.All,
                expiresOn: Recording.UtcNow.AddDays(1))
            {
                BlobContainerName = test.Container.Name,
                BlobName = blobName,
                IsDirectory = true,
            };

            // Test using same name as SAS
            BlobUriBuilder blobUriBuilder1 = new BlobUriBuilder(test.Container.Uri)
            {
                BlobName = blobName,
                Sas = blobSasBuilder.ToSasQueryParameters(Tenants.GetNewSharedKeyCredentials())
            };
            AppendBlobClient appendBlobClient1 = new AppendBlobClient(blobUriBuilder1.ToUri(), GetOptions());
            await appendBlobClient1.CreateAsync();

            // Test using SAS name + suffix
            BlobUriBuilder blobUriBuilder2 = new BlobUriBuilder(test.Container.Uri)
            {
                BlobName = blobName + "/test",
                Sas = blobSasBuilder.ToSasQueryParameters(Tenants.GetNewSharedKeyCredentials())
            };
            AppendBlobClient appendBlobClient2 = new AppendBlobClient(blobUriBuilder2.ToUri(), GetOptions());
            await appendBlobClient2.CreateAsync();&lt;/LI-CODE&gt;
&lt;H6&gt;&lt;U&gt;REST API Sample Request&lt;/U&gt;&lt;/H6&gt;
&lt;P&gt;GET https://myaccount.blob.core.windows.net/mycontainer&lt;/P&gt;
&lt;P&gt;?restype=container&lt;/P&gt;
&lt;P&gt;&amp;amp;comp=list&lt;/P&gt;
&lt;P&gt;&amp;amp;prefix=dir1/dir2/&lt;/P&gt;
&lt;P&gt;&amp;amp;sr=d&lt;/P&gt;
&lt;P&gt;&amp;amp;sdd=2&lt;/P&gt;
&lt;P&gt;&amp;amp;sp=rl&lt;/P&gt;
&lt;P&gt;&amp;amp;sv=2024-11-04&lt;/P&gt;
&lt;P&gt;&amp;amp;se=2026-04-22T06:00:00Z&lt;/P&gt;
&lt;P&gt;&amp;amp;skoid=&amp;lt;signed-oid&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;amp;sktid=&amp;lt;signed-tid&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;amp;skt=2026-04-22T00:00:00Z&lt;/P&gt;
&lt;P&gt;&amp;amp;ske=2026-04-22T08:00:00Z&lt;/P&gt;
&lt;P&gt;&amp;amp;sks=b&lt;/P&gt;
&lt;P&gt;&amp;amp;skv=2024-11-04&lt;/P&gt;
&lt;P&gt;&amp;amp;sig=&amp;lt;signature&amp;gt;&lt;/P&gt;
&lt;H5&gt;Next Steps&lt;/H5&gt;
&lt;P&gt;For a deeper dive, explore these resources:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/azure/storage/common/storage-sas-overview" target="_blank" rel="noopener"&gt;Grant limited access to data with shared access signatures (SAS)&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/rest/api/storageservices/create-user-delegation-sas" target="_blank" rel="noopener"&gt;Create a user delegation SAS&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/rest/api/storageservices/create-service-sas" target="_blank" rel="noopener"&gt;Create a service SAS&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/azure/storage/blobs/monitor-blob-storage?tabs=azure-portal" target="_blank" rel="noopener"&gt;Monitor Azure Blob Storage&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;Help and Support&lt;/H5&gt;
&lt;P&gt;If you have questions, get answers from community experts in &lt;A class="lia-external-url" href="https://learn.microsoft.com/answers/tags/125/azure-blob-storage" target="_blank" rel="noopener"&gt;Microsoft Q&amp;amp;A&lt;/A&gt;. If you have a support plan and you need technical help, create a &lt;A class="lia-external-url" href="https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/newsupportrequest" target="_blank" rel="noopener"&gt;support request&lt;/A&gt;:  &lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;For Issue type, select&amp;nbsp;&lt;STRONG&gt;Technical&lt;/STRONG&gt;.  &lt;/LI&gt;
&lt;LI&gt;For Subscription, select your subscription.  &lt;/LI&gt;
&lt;LI&gt;For Service, select &lt;STRONG&gt;My services&lt;/STRONG&gt;.  &lt;/LI&gt;
&lt;LI&gt;For Service type, select &lt;STRONG&gt;Blob Storage&lt;/STRONG&gt;.  &lt;/LI&gt;
&lt;LI&gt;For Resource, select the Azure resource you are creating a support request for.  &lt;/LI&gt;
&lt;LI&gt;For Summary, type a description of your issue.  &lt;/LI&gt;
&lt;LI&gt;For Problem type, select &lt;STRONG&gt;Authentication and Authorization&lt;/STRONG&gt; .&lt;/LI&gt;
&lt;LI&gt;For Problem subtype, select Issues using &lt;STRONG&gt;Shared Access Signature (SAS Token)&lt;/STRONG&gt;. &lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 30 Apr 2026 17:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-storage-blog/prefix-scoped-access-for-user-delegation-sas-is-now-generally/ba-p/4516010</guid>
      <dc:creator>despindola</dc:creator>
      <dc:date>2026-04-30T17:00:00Z</dc:date>
    </item>
    <item>
      <title>Announcing Microsoft Drivers 5.13.1 for PHP for SQL Server</title>
      <link>https://techcommunity.microsoft.com/t5/sql-server-blog/announcing-microsoft-drivers-5-13-1-for-php-for-sql-server/ba-p/4516258</link>
      <description>&lt;H1 data-line="0"&gt;Announcing Microsoft Drivers 5.13.1 for PHP for SQL Server&lt;/H1&gt;
&lt;P data-line="2"&gt;We have released&amp;nbsp;&lt;STRONG&gt;Microsoft Drivers 5.13.1 for PHP for SQL Server&lt;/STRONG&gt;&amp;nbsp;(sqlsrv and pdo_sqlsrv). This patch release addresses several important bug fixes, including a security fix for access token handling in pooled connections and multiple stability improvements.&lt;/P&gt;
&lt;H2 data-line="4"&gt;Bug Fixes&lt;/H2&gt;
&lt;H3 data-line="6"&gt;Access token identity leaking across pooled connections&lt;/H3&gt;
&lt;P data-line="8"&gt;When using access token authentication with connection pooling, connections with different tokens could share the same pool entry, causing identity cross-contamination and use-after-free. This release properly incorporates the access token into the connection pool key, ensuring connections are only reused when the token matches. (&lt;A href="https://github.com/microsoft/msphpsql/pull/1592" data-href="https://github.com/microsoft/msphpsql/pull/1592" target="_blank"&gt;#1592&lt;/A&gt;, fixes&amp;nbsp;&lt;A href="https://github.com/microsoft/msphpsql/issues/1396" data-href="https://github.com/microsoft/msphpsql/issues/1396" target="_blank"&gt;#1396&lt;/A&gt;)&lt;/P&gt;
&lt;H3 data-line="10"&gt;Prepared statement silently failing on insert&lt;/H3&gt;
&lt;P data-line="12"&gt;A prepared INSERT statement could silently fail when triggers or&amp;nbsp;SET NOCOUNT OFF&amp;nbsp;produce extra result sets, causing an implicit transaction rollback with MARS enabled. The driver now correctly handles this scenario. (&lt;A href="https://github.com/microsoft/msphpsql/pull/1590" data-href="https://github.com/microsoft/msphpsql/pull/1590" target="_blank"&gt;#1590&lt;/A&gt;)&lt;/P&gt;
&lt;H3 data-line="14"&gt;Fatal error re-executing prepared statements with varying result sets&lt;/H3&gt;
&lt;P data-line="16"&gt;Re-executing a prepared statement that returns multiple result sets with different column layouts could cause a fatal error. Metadata entries are now properly freed, and the internal vector is cleared between executions. (&lt;A href="https://github.com/microsoft/msphpsql/pull/1596" data-href="https://github.com/microsoft/msphpsql/pull/1596" target="_blank"&gt;#1596&lt;/A&gt;)&lt;/P&gt;
&lt;H3 data-line="18"&gt;sqlsrv_errors() returning null after failed connection&lt;/H3&gt;
&lt;P data-line="20"&gt;When a connection attempt failed and ODBC provided no diagnostic records,&amp;nbsp;sqlsrv_errors()&amp;nbsp;would return null instead of surfacing the error. Connection failures now consistently report the underlying error. (&lt;A href="https://github.com/microsoft/msphpsql/pull/1595" data-href="https://github.com/microsoft/msphpsql/pull/1595" target="_blank"&gt;#1595&lt;/A&gt;)&lt;/P&gt;
&lt;H3 data-line="22"&gt;Stream becoming invalid when statement goes out of scope&lt;/H3&gt;
&lt;P data-line="24"&gt;A binary stream could become invalid when the originating statement went out of scope, leading to undefined behavior or crashes. The driver now properly invalidates streams when their parent statement is destroyed. (&lt;A href="https://github.com/microsoft/msphpsql/pull/1598" data-href="https://github.com/microsoft/msphpsql/pull/1598" target="_blank"&gt;#1598&lt;/A&gt;, fixes&amp;nbsp;&lt;A href="https://github.com/microsoft/msphpsql/issues/1443" data-href="https://github.com/microsoft/msphpsql/issues/1443" target="_blank"&gt;#1443&lt;/A&gt;)&lt;/P&gt;
&lt;H2 data-line="26"&gt;Installation&lt;/H2&gt;
&lt;H3 data-line="28"&gt;PECL (Linux/macOS)&lt;/H3&gt;
&lt;P&gt;sudo pecl install sqlsrv sudo pecl install pdo_sqlsrv&lt;/P&gt;
&lt;H3 data-line="35"&gt;Windows&lt;/H3&gt;
&lt;P data-line="37"&gt;Download the prebuilt binaries from the&amp;nbsp;&lt;A href="https://github.com/microsoft/msphpsql/releases" data-href="https://github.com/microsoft/msphpsql/releases" target="_blank"&gt;GitHub Releases&lt;/A&gt;&amp;nbsp;page and follow the&amp;nbsp;&lt;A href="https://docs.microsoft.com/sql/connect/php/loading-the-php-sql-driver" data-href="https://docs.microsoft.com/sql/connect/php/loading-the-php-sql-driver" target="_blank"&gt;loading instructions&lt;/A&gt;.&lt;/P&gt;
&lt;H3 data-line="39"&gt;Prerequisites&lt;/H3&gt;
&lt;UL data-line="41"&gt;
&lt;LI data-line="41"&gt;&lt;STRONG&gt;ODBC Driver&lt;/STRONG&gt;: Microsoft ODBC Driver 17 or 18 for SQL Server&lt;/LI&gt;
&lt;LI data-line="42"&gt;&lt;STRONG&gt;PHP&lt;/STRONG&gt;: 8.3, 8.4, or 8.5&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-line="44"&gt;For detailed platform-specific installation steps, see the&amp;nbsp;&lt;A href="https://github.com/microsoft/msphpsql/blob/dev/Linux-mac-install.md" data-href="https://github.com/microsoft/msphpsql/blob/dev/Linux-mac-install.md" target="_blank"&gt;Linux and macOS installation guide&lt;/A&gt;.&lt;/P&gt;
&lt;H2 data-line="46"&gt;Upgrading from 5.13.0&lt;/H2&gt;
&lt;P data-line="48"&gt;This is a drop-in hotfix release. No API changes, no configuration changes. Update via PECL or replace the DLLs on Windows.&lt;/P&gt;
&lt;P data-line="50"&gt;If you are using access token authentication with connection pooling, we strongly recommend upgrading to this release.&lt;/P&gt;
&lt;H2 data-line="52"&gt;Resources&lt;/H2&gt;
&lt;UL data-line="54"&gt;
&lt;LI data-line="54"&gt;&lt;A href="https://github.com/microsoft/msphpsql" data-href="https://github.com/microsoft/msphpsql" target="_blank"&gt;GitHub Repository&lt;/A&gt;&lt;/LI&gt;
&lt;LI data-line="55"&gt;&lt;A href="https://learn.microsoft.com/sql/connect/php/microsoft-php-driver-for-sql-server" data-href="https://learn.microsoft.com/sql/connect/php/microsoft-php-driver-for-sql-server" target="_blank"&gt;Official Documentation&lt;/A&gt;&lt;/LI&gt;
&lt;LI data-line="56"&gt;&lt;A href="https://pecl.php.net/package/sqlsrv" data-href="https://pecl.php.net/package/sqlsrv" target="_blank"&gt;PECL sqlsrv&lt;/A&gt;&lt;/LI&gt;
&lt;LI data-line="57"&gt;&lt;A href="https://pecl.php.net/package/pdo_sqlsrv" data-href="https://pecl.php.net/package/pdo_sqlsrv" target="_blank"&gt;PECL pdo_sqlsrv&lt;/A&gt;&lt;/LI&gt;
&lt;LI data-line="58"&gt;&lt;A href="https://github.com/microsoft/msphpsql/blob/dev/CHANGELOG.md" data-href="https://github.com/microsoft/msphpsql/blob/dev/CHANGELOG.md" target="_blank"&gt;Release Notes (CHANGELOG)&lt;/A&gt;&lt;/LI&gt;
&lt;LI data-line="59"&gt;&lt;A href="https://github.com/microsoft/msphpsql/issues" data-href="https://github.com/microsoft/msphpsql/issues" target="_blank"&gt;Report Issues&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2 data-line="61"&gt;Feedback&lt;/H2&gt;
&lt;P data-line="63"&gt;We welcome your feedback and contributions. Please file issues, feature requests and pull requests on our&amp;nbsp;&lt;A href="https://github.com/microsoft/msphpsql/issues" data-href="https://github.com/microsoft/msphpsql/issues" target="_blank"&gt;GitHub Issues&lt;/A&gt; page.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2026 17:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/sql-server-blog/announcing-microsoft-drivers-5-13-1-for-php-for-sql-server/ba-p/4516258</guid>
      <dc:creator>DavidLevy</dc:creator>
      <dc:date>2026-04-30T17:00:00Z</dc:date>
    </item>
  </channel>
</rss>

