microsoft 365
5039 TopicsOneNote’s new Sticky Notes feature for Windows receives update
Discover the latest updates to OneNote's Sticky Notes feature for Windows! Thanks to your feedback, we've added a Start menu shortcut, always-on-top notes, and easy note copying. Stay tuned for more exciting features!19KViews4likes17CommentsAuthorization and Identity Governance Inside AI Agents
Designing Authorization‑Aware AI Agents Enforcing Microsoft Entra ID RBAC in Copilot Studio As AI agents move from experimentation to enterprise execution, authorization becomes the defining line between innovation and risk. AI agents are rapidly evolving from experimental assistants into enterprise operators—retrieving user data, triggering workflows, and invoking protected APIs. While many early implementations rely on prompt‑level instructions to control access, regulated enterprise environments require authorization to be enforced by identity systems, not language models. This article presents a production‑ready, identity‑first architecture for building authorization‑aware AI agents using Copilot Studio, Power Automate, Microsoft Entra ID, and Microsoft Graph, ensuring every agent action executes strictly within the requesting user’s permissions. Why Prompt‑Level Security Is Not Enough Large Language Models interpret intent—they do not enforce policy. Even the most carefully written prompts cannot: Validate Microsoft Entra ID group or role membership Reliably distinguish delegated user identity from application identity Enforce deterministic access decisions Produce auditable authorization outcomes Relying on prompts for authorization introduces silent security failures, over‑privileged access, and compliance gaps—particularly in Financial Services, Healthcare, and other regulated industries. Authorization is not a reasoning problem. It is an identity enforcement problem. Common Authorization Anti‑Patterns in AI Agents The following patterns frequently appear in early AI agent implementations and should be avoided in enterprise environments: Hard‑coded role or group checks embedded in prompts Trusting group names passed as plain‑text parameters Using application permissions for user‑initiated actions Skipping verification of the user’s Entra ID identity Lacking an auditable authorization decision point These approaches may work in demos, but they do not survive security reviews, compliance audits, or real‑world misuse scenarios. Authorization‑Aware Agent Architecture In an authorization‑aware design, the agent never decides access. Authorization is enforced externally, by identity‑aware workflows that sit outside the language model’s reasoning boundary. High‑Level Flow The Copilot Studio agent receives a user request The agent passes the User Principal Name (UPN) and intended action A Power Automate flow validates permissions using Microsoft Entra ID via Microsoft Graph Only authorized requests are allowed to proceed Unauthorized requests fail fast with a deterministic outcome Authorization‑aware Copilot Studio architecture enforces Entra ID RBAC before executing any business action. The agent orchestrates intent. Identity systems enforce access. Enforcing Entra ID RBAC with Microsoft Graph Power Automate acts as the authorization enforcement layer: Resolve user identity from the supplied UPN Retrieve group or role memberships using Microsoft Graph Normalize and compare memberships against approved RBAC groups Explicitly deny execution when authorization fails This keeps authorization logic: Centralized Deterministic Auditable Independent of the AI model Reference Implementation: Power Automate RBAC Enforcement Flow The following import‑ready Power Automate cloud flow demonstrates a secure RBAC enforcement pattern for Copilot Studio agents. It validates Microsoft Entra ID group membership before allowing any business action. Scenario Trigger: User‑initiated agent action Identity model: Delegated user identity Input: userUPN, requestedAction Outcome: Authorized or denied based on Entra ID RBAC { "$schema": "https://schema.management.azure.com/providers/Microsoft.Logic/schemas/2016-06-01/workflowdefinition.json#", "contentVersion": "1.0.0.0", "triggers": { "Copilot_Request": { "type": "Request", "kind": "Http", "inputs": { "schema": { "type": "object", "properties": { "userUPN": { "type": "string" }, "requestedAction": { "type": "string" } }, "required": [ "userUPN" ] } } } }, "actions": { "Get_User_Groups": { "type": "Http", "inputs": { "method": "GET", "uri": "https://graph.microsoft.com/v1.0/users/@{triggerBody()?['userUPN']}/memberOf?$select=displayName", "authentication": { "type": "ManagedServiceIdentity" } } }, "Normalize_Group_Names": { "type": "Select", "inputs": { "from": "@body('Get_User_Groups')?['value']", "select": { "groupName": "@toLower(item()?['displayName'])" } }, "runAfter": { "Get_User_Groups": [ "Succeeded" ] } }, "Check_Authorization": { "type": "Condition", "expression": "@contains(body('Normalize_Group_Names'), 'ai-authorized-users')", "runAfter": { "Normalize_Group_Names": [ "Succeeded" ] }, "actions": { "Authorized_Action": { "type": "Compose", "inputs": "User authorized via Entra ID RBAC" } }, "else": { "actions": { "Access_Denied": { "type": "Terminate", "inputs": { "status": "Failed", "message": "Access denied. User not authorized via Entra ID RBAC." } } } } } } } This pattern enforces authorization outside the agent, aligns with Zero Trust principles, and creates a clear audit boundary suitable for enterprise and regulated environments. Flow Diagram: Agent Integrated with RBAC Authorization Flow and Sample Prompt Execution: Delegated vs Application Permissions Scenario Recommended Permission Model User‑initiated agent actions Delegated permissions Background or system automation Application permissions Using delegated permissions ensures agent execution remains strictly within the requesting user’s identity boundary. Auditing and Compliance Benefits Deterministic and explainable authorization decisions Centralized enforcement aligned with identity governance Clear audit trails for security and compliance reviews Readiness for SOC, ISO, PCI, and FSI assessments Enterprise Security Takeaways Authorization belongs in Microsoft Entra ID, not prompts AI agents must respect enterprise identity boundaries Copilot Studio + Power Automate + Microsoft Graph enable secure‑by‑design AI agents By treating AI agents as first‑class enterprise actors and enforcing authorization at the identity layer, organizations can scale AI adoption with confidence, trust, and compliance.Quickly add approval workflows to any list or library in Microsoft 365
Leverage the power and simplicity of lightweight approvals on any list or library with a few simple clicks! SharePoint and Teams seamlessly integrate across files, lists, loops, and pages. And now, we’re excited to release the latest integration. SharePoint + the Teams Approvals app bringing you fast, easy approval-tracking business solutions – to any list or library. A single toggle gets you started: Create, approve, reject, and cancel – without leaving your content or the context of your conversations. Whether you need to approve a purchase order, a vacation request, project milestones, or a blog post, Approvals in lists and libraries help streamline the process and collaboration among your team members.12KViews6likes24CommentsOutlook web UTF-8 charset
Outlook Web sends emails in my organization using the ISO-8859-1 character set. However, Copilot claims: "Outlook Web (Outlook on the Web, OWA) does not generate your messages in ISO-8859-1. It always uses UTF-8." My Outlook Web only switches to the UTF-8 character set if the email contains Unicode characters that cannot be displayed in ISO-8859-1. How can I enforce UTF-8 globally for my organization?22Views0likes1CommentPer certification designed badges
Hi First Microsoft opted out from awesome Credly (awesome, as learners collected “all” personal certifications in one place, no matter the vendor - easy to share the Credly profile link for various reasons) And now you have quit creating “per certification branded badge”s, and only provide standard “Associate” & “Expert” badges with a “Learn diploma) showing the name of the certification “in text” (the new Fabric exam as example) For us globally in roles like “Alliance Managers”, “Partner Managers”, driving and summarizing partners excellence in the area of Microsoft + pushing with marketing us and Microsoft- this is bad! Example on how we earlier are using the per certification badges Is it just by mistake you have taken this path? Or is it just me and my learners that have missed where they can download per exam branded badges for newer certifications now? Regards Gabriel940Views3likes2CommentsAgentCon Hong Kong - Come One Come All for FREE
AgentCon is coming to Hong Kong! 🚀 The AI Agents Developer Conference lands on Saturday, 11 April 2026, at Hong Kong Institute of Information Technology (HKIIT) (VTC Tsing Yi Complex). If you're building with AI agents, automation, or intelligent systems, don't miss this gathering of developers, architects, and AI leaders for a full day of real-world sessions focused on designing, deploying, and scaling AI agents. Secure your spot ➡️ https://aka.ms/AgentconHongKong202621Views0likes0CommentsAgentCon Seoul - Come One Come All for FREE
AgentCon is coming to Seoul! 🚀 The AI Agents Developer Conference lands on Thursday, 16 April 2026, at Seoul National University. If you're building with AI agents, automation, or intelligent systems, don't miss this gathering of developers, architects, and AI leaders for a full day of real-world sessions focused on designing, deploying, and scaling AI agents. Secure your spot ➡️ https://aka.ms/agentconSeoul202629Views0likes0CommentsAgentCon New York - Come One Come All for FREE
On March 9, 2026, #AgentCon lands at Nasdaq, Times Square, bringing together developers, engineers, and innovators shaping the future of AI agents. Expect deep‑dive talks, hands‑on learning, practical demos and plenty of networking with the AI community. This isn’t just another AI event, it’s where builders meet to talk real code. ➡️ Register now!46Views0likes0CommentsI can't add an O365 email to Outlook desktop client but I can access it from the web
I can't add a O365 to Outlook desktop client but I can access from the web This a weird thing, whenever I try to add in Outlook from File > Add Account I get the message "Something went wrong and Outlook couldn't set up your account". From Control Panel > Mail > Email accounts > New > Manual Setup > here I put the email and gets stuck at "Searching for... Settings" and then " An encrypted connection to your email is not available, click Next to attempt using an unencrypted connection", so I do that and get the error "We're sorry we couldn't set up your account automatically. To try setting up the account yourself click Next" which is basically the same. Everything works fine in the browser, any ideas on this?19KViews1like11CommentsAssist me with Shared Mailbox Alias Configuration in Outlook 365
We have a shared mailbox with different email alias configurations for various applications. Each application needs to send emails using its respective alias. Shared Mailbox Name: email address removed for privacy reasons Application 1: From email ID – email address removed for privacy reasons Application 2: From email ID – email address removed for privacy reasons Similarly, I need to define aliases for each application. Could you please assist me with setting this up in Outlook 365? Additionally, could you explain if there are any limitations related to using aliases?252Views0likes4Comments