
So. There we were. Tuesday evening, coffee number four, headphones on, watching Microsoft host another Ask Me Anything on Agent 365. And before you ask: yes, I took notes. Yes, far too many. And yes, I’m now turning them into the kind of blog post I would have wanted to read myself before sitting through ninety minutes of livestream.
Quick setup for the latecomers: Agent 365 is Microsoft’s control plane for agents. Think of it as the bouncer, the registry, the auditor, and the security officer for every agent running in your tenant — first-party, third-party, citizen-built, dev-built, or somewhere shady on an endpoint that nobody admitted to installing. It went GA on May 1, 2026, which means at the time of the AMA it was a grand twelve days old. A toddler with serious responsibilities.
The panel: Irina Nechaeva (GM, Microsoft Security), Paty Carlos (PM, Agent 365, demo lead), Neta Haiby (Security for AI lead), Caroline Stanford (Product Marketing, M365 Suites & Agent 365), and your host Samer Baroudi.
Below: the 25 questions and answers I think actually matter. Some are verbatim from the audience. Some I’ve teased apart from multi-part questions because the answers deserve their own oxygen. Some come from the demo, where Patti basically did a guided tour and accidentally answered five questions before anyone asked them.
Let’s go.
Per user, per month. Caroline was very clear: every agent is fundamentally tied to a person. Either it works on behalf of a user (the famous “OBO” model), or it operates independently — in which case it still needs a human manager or sponsor accountable for it.
Both flavours are covered by the same Agent 365 user license. You can buy it standalone, or get it bundled in the new Microsoft 365 E7 SKU (which also packs in M365 E5, Copilot, and Entra Suite). E7 launched, like Agent 365 itself, on May 1, 2026.
No. And this was Caroline’s polite-but-firm clarification. Agent 365 is the management, governance, and security layer on top of agents. It’s not how you procure the agent itself. Your Copilot Studio agent still runs without Agent 365 — you just don’t get observability, governance templates, risk signals, or the registry view of its life and times.
If you want to use the autonomous agent’s data — sessions, active users, traces, the whole observability column Patti showed in the demo — yes, that data lives behind the Agent 365 license. Without it, you’re flying with the autopilot on but the cockpit dark.
Three flavours of human, one license:
Irina was insistent on the sponsor role. Even autonomous agents need a human in the loop. Otherwise, congratulations, you’ve built an unsupervised intern with API keys.
If your agent lives inside Microsoft 365 Copilot surfaces (Word, PowerPoint, Excel, Outlook, chat — the lot), MCP access is already covered by your M365 Copilot license. No extra MCP meter ticking in the background.
That’s the Work IQ API territory, first teased at Ignite. Per user, consumption-based, with both the data layer and the skills layer (i.e. the MCPs). Microsoft hasn’t published the price point yet — Caroline was careful with that. Watch the next few weeks.
Same answer as #6, just from the other angle. Inside M365 Copilot — bundled. Outside, in your custom agent estate — Work IQ API. There is no third path.
Yes — and this is part of the Agent 365 license itself. Patti added it as a postscript and it deserves more attention than it got: developers can submit a custom MCP server, IT approves it, and then it shows up in Copilot Studio (and other surfaces) for citizen builders to wire into their own agents. Bring-your-own-MCP, governed end-to-end. Best practice: insist on this workflow before someone curls a random MCP server from a Reddit thread.
Yes. It will show up in the registry. You’ll get observability. You can extend some protections. What you don’t get is the granular access control and policy enforcement that Entra Agent ID unlocks. The registry doesn’t discriminate at the door — but the VIP lounge has a guest list.
This was the sneaky question hidden inside the previous one. Short version: discovery and registry don’t require a per-user license for every interacting employee. Depth requires licensing. The deeper you want to go — restrict permissions, enforce runtime protections, full activity attribution — the more the per-user model matters. Important note: discovering locally-run agents on endpoints requires Defender for Endpoint as a technical dependency.
Irina’s polite-but-firm-take-two: Microsoft’s perspective is that every agent should have its own identity. Even when an agent is just executing as the user, you and your auditors will eventually want to answer the question: Did Sabine do that, or did Sabine’s agent do that? Without an agent identity, you can’t.
The recommendation: register every agent with Agent ID, then choose the access pattern (OBO or independent) consciously.
You get registry visibility and basic observability. You lose granular permissions control, conditional-access enforcement against the agent identity, and a clean audit trail separating user actions from agent actions. Functional, but not best practice.
Yes, two ways:
Registry Sync = quick visibility, light governance. Your imported agent appears as “unmanaged” in the registry (Patti showed exactly this with a Google Vertex AI agent called “support help”).
To turn it into a fully governed agent — observable, policy-enforced, the works — register it via the Agent 365 SDK. The SDK is the door from “I see you” to “I manage you.”
As of this AMA: Amazon Bedrock, Google Vertex AI, Databricks Genie, Salesforce Agent Force. Microsoft confirmed more are in flight.
Risk is layered and comes from the underlying systems already doing the work:
Agent 365 aggregates these signals and tags the agent. You then see it under “Agents at risk” in the All Agents view.
No. Blocking is optional and human-driven for most cases. Some high-risk patterns (compromised account, risky sign-in) will be auto-blocked by Entra Conditional Access — which, as Netta gently put it, is helpful when this happens at 3am while you’re asleep. But reviewing risk does not require blocking. Block, investigate, then unblock — or investigate first. Your call.
Netta’s framing here was the best line of the AMA: “What you can’t discover, you can’t monitor, and you can’t secure.”
So the order is always: discover → observe → decide → control. Not every monitored agent needs to be controlled. Shadow AI agents you’ll likely block. Sanctioned agents you’ll enable, then control access, permissions, and data scope. It’s not 1:1, and that’s the point.
Through the new Shadow AI experience, currently in early preview in Frontier. It uses Intune-managed device signals to surface unauthorised agent platforms running on endpoints. At GA: detection of OpenAI, Claude, Cursor, and a growing list. Today’s enforcement action: block. Finer-grained controls (allow with conditions, restrict to certain users, etc.) are on the roadmap and arriving over the summer.
Honest answer from Patti: the team is actively designing this right now. The mechanism for declaring “this is sanctioned, treat it differently in the UX” is not finalised. They are explicitly soliciting feedback. So if you have a strong opinion on how authorised-but-third-party AI tools should be treated in the registry — now is the moment to file it.
Yes. This was a recurring theme. Agent 365 gives admins central visibility and control over MCP tool usage across agents — first-party Microsoft tools today, with a growing surface across third-party MCPs. Combined with the dev-submission flow (#8), you get a real governed marketplace of tools rather than the wild-west MCP catalog people were quietly worrying about six months ago.
Today: manual execution. Patti showed exactly this — running the “Reassign owners for ownerless Agent Builder agents to manager” rule on demand. Scheduled / recurring rules are coming by summer 2026. This matters more than it sounds: if you’ve got tens of thousands of agents, manual-only rule runs do not scale.
A default agent template with Microsoft’s recommended baseline policies across Entra, Purview, Defender, and SharePoint. You can clone, modify, or build entirely new templates — for example, a “Custom Copilot Studio agents” template that blocks high-risk agents and applies a stricter SharePoint policy on top of the default. Templates are containers of policies, applied consistently at publish-time.
Best practice: start with the default. Resist the urge to build seventeen templates on day one. Add specialised templates only when your audit logs prove you need them.
Two routes:
Today: Graph API access for basic observability and registry data. That’s the immediate hook for MSPs to build their own multi-tenant tooling.
In flight: a multi-tenant management experience inside the M365 Admin Center, focused on registry visibility and observability across tenants. Preview later in summer 2026, GA expected late summer. Security policy management across tenants is a separately tracked piece — Patti was explicit that they are still working through it. So: visibility first, multi-tenant policy authoring later.
To dig deeper, the official starting line is aka.ms/agent365 — step-by-step guide, technical docs, the Security for AI assessment, and role-specific resource bundles for M365 admins, Defender admins, Entra admins, and Purview / SecOps folks.
Right. That’s twenty-five. Ping me if you want me to go deeper on any of them — especially Work IQ pricing, which is the conversation I expect we’ll all be having for the next three months.
PS: Ready to implement proper AI agent governance? Contact me, Ragnar Heil, for a consultation on Agent 365, SharePoint Advanced Management, Microsoft Purview (Information Protection, Data Loss Prevention Policies, DSPM for AI), Rencore Governance, EasyLife365 Collaboration, ShareGate Protect, Data&More or Agent 365 deployment strategies tailored to your organization’s needs. Find my calendar here at our HanseVision Governance Landing Page.
The post Agent 365 AMA Decoded: 25 Questions, 25 Answers, and Zero Fluff first appeared on Ragnar Heil (MVP): Empowering M365 with AI.
Original Post https://ragnarheil.de/agent-365-ama-decoded-25-questions-25-answers-and-zero-fluff/