Future of Enterprise Connectivity

Mirko PetersPodcasts1 hour ago25 Views


1
00:00:00,000 –> 00:00:04,320
Most enterprises talk about connectivity like it’s plumbing, connect system A to system B,

2
00:00:04,320 –> 00:00:06,120
add a connector, call it transformation.

3
00:00:06,120 –> 00:00:07,360
That assumption feels safe.

4
00:00:07,360 –> 00:00:10,800
It’s also why the same organizations keep replatforming every three years.

5
00:00:10,800 –> 00:00:12,960
Here’s the promise, this is not a demo tour.

6
00:00:12,960 –> 00:00:15,840
It’s a set of executive mental models you can reuse.

7
00:00:15,840 –> 00:00:20,120
Why logic apps is the execution spine, why copilot studio is the intent interface,

8
00:00:20,120 –> 00:00:23,400
and why MCP matters even when connectors already exist?

9
00:00:23,400 –> 00:00:24,920
Keep one question in mind.

10
00:00:24,920 –> 00:00:27,200
What problem are we actually solving?

11
00:00:27,200 –> 00:00:28,920
The foundational misunderstanding.

12
00:00:28,920 –> 00:00:30,600
Integration isn’t the problem.

13
00:00:30,600 –> 00:00:32,320
This is the uncomfortable truth.

14
00:00:32,320 –> 00:00:35,280
Enterprises don’t fail because systems can’t connect.

15
00:00:35,280 –> 00:00:37,880
They fail because intent can’t survive handoffs.

16
00:00:37,880 –> 00:00:40,320
The average organization already has connectivity.

17
00:00:40,320 –> 00:00:45,360
It has APIs, it has connectors, it has ETL, it has integration platforms.

18
00:00:45,360 –> 00:00:49,520
And yet the business still experiences the same outcomes, delays, rework, audit panic,

19
00:00:49,520 –> 00:00:53,240
and a constant feeling that automation should be easier than this.

20
00:00:53,240 –> 00:00:55,160
That’s not a tooling gap, that’s an intent gap.

21
00:00:55,160 –> 00:00:59,120
Every time a process crosses a boundary, team boundary, system boundary, vendor boundary,

22
00:00:59,120 –> 00:00:59,960
you lose context.

23
00:00:59,960 –> 00:01:01,760
And when you lose context, people improvise.

24
00:01:01,760 –> 00:01:06,120
They open tickets, they add exceptions, they make a spreadsheet, they ask for temporary access.

25
00:01:06,120 –> 00:01:11,880
They build a side flow just for this one case, those are not edge cases, those are entropy generators.

26
00:01:11,880 –> 00:01:16,600
Most organizations describe this as automation backlog.

27
00:01:16,600 –> 00:01:18,160
Architecturally, it’s something else.

28
00:01:18,160 –> 00:01:22,200
You are using humans as message buses and you are using tickets as state machines.

29
00:01:22,200 –> 00:01:26,280
The hiring manager fills in a form, HR copies it into another system, I’d get the tickets,

30
00:01:26,280 –> 00:01:29,360
someone in identity makes an account, someone else assigns groups.

31
00:01:29,360 –> 00:01:32,840
Payroll needs a different attribute, facilities needs a badge request.

32
00:01:32,840 –> 00:01:36,120
The manager sends a team’s message, can we expedite?

33
00:01:36,120 –> 00:01:38,920
And the actual state of the onboarding exists nowhere.

34
00:01:38,920 –> 00:01:42,600
It exists in fragments, half in the HR system, half in the ticketing system, half in email

35
00:01:42,600 –> 00:01:47,560
threads, and the final truth is whoever you can find on Slack at 9pm, that’s what integration

36
00:01:47,560 –> 00:01:48,840
looks like in practice.

37
00:01:48,840 –> 00:01:52,680
And here’s the trap, when leadership says we need better integration, they usually mean

38
00:01:52,680 –> 00:01:55,120
we need the humans to stop doing this.

39
00:01:55,120 –> 00:01:59,280
But the humans are doing it because the system does not preserve intent across steps, it

40
00:01:59,280 –> 00:02:03,480
preserves transactions, not decisions.

41
00:02:03,480 –> 00:02:08,720
Automation in most enterprises is treated as a set of isolated scripts, when x happens

42
00:02:08,720 –> 00:02:12,160
do why the coordination is what the enterprise actually needs.

43
00:02:12,160 –> 00:02:16,920
When x happens, what are we trying to achieve, under which constraints, and with what proof?

44
00:02:16,920 –> 00:02:20,920
This is why AI changes the story, and also why AI makes everything worse if you treat

45
00:02:20,920 –> 00:02:22,160
it like a UI feature.

46
00:02:22,160 –> 00:02:25,760
If you bolt a chatbot onto a broken handoff, you haven’t eliminated the handoff.

47
00:02:25,760 –> 00:02:27,800
You’ve made it non-deterministic.

48
00:02:27,800 –> 00:02:31,920
Now the system doesn’t just lose intent between teams, it can lose intent mid-sentence.

49
00:02:31,920 –> 00:02:37,080
You ask for provision access for the new hire, and the model guesses what access means.

50
00:02:37,080 –> 00:02:39,480
It guesses which system is the source of truth.

51
00:02:39,480 –> 00:02:42,400
It guesses which group naming convention matters.

52
00:02:42,400 –> 00:02:47,080
It guesses whether a finance analyst implies SAP roles or just a distribution list, and when

53
00:02:47,080 –> 00:02:51,160
it guesses wrong, the enterprise pays for it in the only currency that matters.

54
00:02:51,160 –> 00:02:52,960
Incident reviews and audit findings.

55
00:02:52,960 –> 00:02:55,120
So the foundational misunderstanding is this.

56
00:02:55,120 –> 00:03:00,160
AI isn’t a smarter form, it’s not a friendly UI for the same integration spaghetti.

57
00:03:00,160 –> 00:03:04,920
Architecturally you are building a distributed decision engine, that distinction matters.

58
00:03:04,920 –> 00:03:09,400
A decision engine needs two things if you wanted to scale, without turning into conditional

59
00:03:09,400 –> 00:03:10,400
chaos.

60
00:03:10,400 –> 00:03:12,080
Constraints and traceability.

61
00:03:12,080 –> 00:03:12,920
Constraints.

62
00:03:12,920 –> 00:03:16,880
What actions are allowed, what data can move, what pathways are legitimate.

63
00:03:16,880 –> 00:03:20,560
Traceability, what happened, who triggered it, what was decided, what tools were called,

64
00:03:20,560 –> 00:03:22,520
what was written, and where the evidence lives.

65
00:03:22,520 –> 00:03:24,560
Now connect that back to the real world.

66
00:03:24,560 –> 00:03:26,320
Executives don’t wake up worried about connectors.

67
00:03:26,320 –> 00:03:29,640
They wake up worried about, why did we grant that access?

68
00:03:29,640 –> 00:03:31,280
Why did finance get the wrong number?

69
00:03:31,280 –> 00:03:34,000
Why did the integration break during quarter close?

70
00:03:34,000 –> 00:03:36,720
Why did this take three weeks when it should take three hours?

71
00:03:36,720 –> 00:03:38,160
Those are intent failures.

72
00:03:38,160 –> 00:03:39,560
And they compound over time.

73
00:03:39,560 –> 00:03:43,560
Because every workaround becomes precedent, every exception becomes a pattern, every temporary

74
00:03:43,560 –> 00:03:46,240
bypass becomes a dependency.

75
00:03:46,240 –> 00:03:50,320
Eventually policy exists in PowerPoint, but execution exists in whatever the last person

76
00:03:50,320 –> 00:03:51,600
did under pressure.

77
00:03:51,600 –> 00:03:55,760
The solution isn’t more integration, the solution is an architecture where intent can be

78
00:03:55,760 –> 00:04:00,160
expressed, interpreted, and executed without being reinvented at every hop.

79
00:04:00,160 –> 00:04:02,240
That’s the spine for the rest of this episode.

80
00:04:02,240 –> 00:04:05,320
Copilot Studio is where intent shows up in human language.

81
00:04:05,320 –> 00:04:09,720
Logic Apps is where execution becomes deterministic, auditable, and boring on purpose.

82
00:04:09,720 –> 00:04:14,040
And MCP is the contract that stops the model from improvising when it reaches for the enterprise.

83
00:04:14,040 –> 00:04:18,240
Now we can define MCP in terms that executives can actually reuse.

84
00:04:18,240 –> 00:04:21,640
MCP in plain terms, a contract between reasoning and doing.

85
00:04:21,640 –> 00:04:26,480
Okay, so basically, MCP model context protocol is a way to stop your AI from freelancing

86
00:04:26,480 –> 00:04:28,280
inside your enterprise.

87
00:04:28,280 –> 00:04:30,040
Kentware defines it cleanly.

88
00:04:30,040 –> 00:04:34,680
It is an open protocol that enables seamless integration between large language model applications

89
00:04:34,680 –> 00:04:36,880
or agents and tools and data.

90
00:04:36,880 –> 00:04:39,800
That sounds abstract until you translate it into what it prevents.

91
00:04:39,800 –> 00:04:42,920
MCP is not an API replacement, but it’s not yet another connector.

92
00:04:42,920 –> 00:04:46,920
It’s not a new integration platform you buy because you’re tired of the old integration

93
00:04:46,920 –> 00:04:47,920
platform you bought.

94
00:04:47,920 –> 00:04:51,040
MCP is a tool contract, a contract between reasoning and doing.

95
00:04:51,040 –> 00:04:52,960
The reasoning side is the model.

96
00:04:52,960 –> 00:04:57,680
Non-deterministic, context-driven, good at language, good at picking an approach.

97
00:04:57,680 –> 00:05:02,160
The doing side is the enterprise, deterministic systems of record, compliance boundaries,

98
00:05:02,160 –> 00:05:06,800
limit, business rules, and the minor detail that finance will notice if you write the

99
00:05:06,800 –> 00:05:08,000
wrong thing.

100
00:05:08,000 –> 00:05:11,880
Without a contract model’s guess, the guess which endpoint matters, the guess which parameters

101
00:05:11,880 –> 00:05:16,240
are required, the guess what create record means, the guess which account you meant, and

102
00:05:16,240 –> 00:05:17,400
you can’t govern guessing.

103
00:05:17,400 –> 00:05:19,160
You can only apologize for it later.

104
00:05:19,160 –> 00:05:24,440
With MCP, you give the model a catalog of tools with explicit names, schemers and descriptions.

105
00:05:24,440 –> 00:05:26,280
The model doesn’t need to invent a pathway.

106
00:05:26,280 –> 00:05:28,440
It chooses from approved pathways.

107
00:05:28,440 –> 00:05:33,320
It’s the real shift from the model can call anything to the model can only call what you

108
00:05:33,320 –> 00:05:34,320
published.

109
00:05:34,320 –> 00:05:36,160
Here’s what most people miss.

110
00:05:36,160 –> 00:05:37,400
Enterprises already have connectors.

111
00:05:37,400 –> 00:05:39,800
Logic apps has one four hundred plus connectors.

112
00:05:39,800 –> 00:05:41,040
Power Platform has connectors.

113
00:05:41,040 –> 00:05:42,520
Copilot Studio has connectors.

114
00:05:42,520 –> 00:05:44,160
So why care about MCP at all?

115
00:05:44,160 –> 00:05:45,840
Because connectors are not governance.

116
00:05:45,840 –> 00:05:47,240
Connectors are plumbing.

117
00:05:47,240 –> 00:05:49,600
At scale, connectors become connectors, brawl.

118
00:05:49,600 –> 00:05:53,880
Thousands of small, slightly different integrations built by different teams with different

119
00:05:53,880 –> 00:05:58,840
naming, different fields, different error handling and different security assumptions.

120
00:05:58,840 –> 00:06:03,600
It works until it doesn’t and then you discover your business process is implemented as folklore.

121
00:06:03,600 –> 00:06:08,760
MCP is an attempt to standardize the shape of tool usage for models the same way APIs standardize

122
00:06:08,760 –> 00:06:12,640
the shape of system to system calls, but it’s more specific than APIs.

123
00:06:12,640 –> 00:06:18,160
APIs are designed for developers who already know what they’re doing and want maximum flexibility.

124
00:06:18,160 –> 00:06:21,680
MCP tools are designed for models that need constraints to be safe and cheap.

125
00:06:21,680 –> 00:06:26,680
That’s why MCP tools are typically task focused, not here’s a generic crud interface to your

126
00:06:26,680 –> 00:06:28,400
entire CRM.

127
00:06:28,400 –> 00:06:33,440
More like create a contact in Salesforce with these five fields or list incidents in service

128
00:06:33,440 –> 00:06:37,800
now with these filters or update an opportunity stage with these allowed values.

129
00:06:37,800 –> 00:06:42,160
You are narrowing the surface area on purpose because the models job isn’t to explore your

130
00:06:42,160 –> 00:06:43,440
entire schema.

131
00:06:43,440 –> 00:06:46,920
The models job is to execute the business intent you allow.

132
00:06:46,920 –> 00:06:49,600
This is also why MCP shows up now, not five years ago.

133
00:06:49,600 –> 00:06:53,000
The world move to multi agent reality and multi platform reality.

134
00:06:53,000 –> 00:06:55,480
You will have co pilot studio in parts of the org.

135
00:06:55,480 –> 00:06:57,240
You will have foundry in parts of the org.

136
00:06:57,240 –> 00:06:59,520
You will have GitHub co pilot in engineering.

137
00:06:59,520 –> 00:07:03,760
You will have third party agents showing up anyway and every one of those will want to use

138
00:07:03,760 –> 00:07:04,760
tools.

139
00:07:04,760 –> 00:07:08,680
MCP is vendor agnostic pressure relief, a standard shape for tools so you can build

140
00:07:08,680 –> 00:07:11,960
once published ones and reuse across agent surfaces.

141
00:07:11,960 –> 00:07:14,720
And here’s the consequence executives should care about.

142
00:07:14,720 –> 00:07:19,320
MCP reduces the amount of bespoke glue you have to govern, not because it removes complexity

143
00:07:19,320 –> 00:07:23,920
because it concentrates complexity into deliberate, reviewable, auditable tool definitions.

144
00:07:23,920 –> 00:07:26,880
If you remember nothing else from this section, remember this.

145
00:07:26,880 –> 00:07:29,240
MCP doesn’t make the model smarter.

146
00:07:29,240 –> 00:07:33,480
It makes the model less creative in the places where creativity is a liability.

147
00:07:33,480 –> 00:07:34,480
Logic apps.

148
00:07:34,480 –> 00:07:37,040
What it is architecturally, not what marketing says.

149
00:07:37,040 –> 00:07:40,560
Logic apps is usually introduced as low code workflow automation.

150
00:07:40,560 –> 00:07:41,880
That description is not wrong.

151
00:07:41,880 –> 00:07:45,200
It’s just incomplete in the way that gets organizations hurt.

152
00:07:45,200 –> 00:07:47,560
Architecturally, logic apps is not an automation toy.

153
00:07:47,560 –> 00:07:52,640
It is an execution runtime with a connector fabric and an observability plane glued to

154
00:07:52,640 –> 00:07:53,640
it.

155
00:07:53,640 –> 00:07:57,720
That combination matters because the moment you introduce AI reasoning, the only sane move

156
00:07:57,720 –> 00:08:01,720
is to make execution boring, deterministic and reviewable.

157
00:08:01,720 –> 00:08:04,080
Kentwear points out the awkward reality.

158
00:08:04,080 –> 00:08:06,520
Logic apps has been around almost 10 years.

159
00:08:06,520 –> 00:08:07,840
It launched in 2016.

160
00:08:07,840 –> 00:08:08,840
That’s not trivia.

161
00:08:08,840 –> 00:08:12,560
It means enterprises have already been running business critical integrations on it long

162
00:08:12,560 –> 00:08:15,000
before anyone started saying, “agentic.”

163
00:08:15,000 –> 00:08:16,200
The muscle is there.

164
00:08:16,200 –> 00:08:21,640
It triggers, connectors, retries, compensation patterns, run history and the miserable lessons

165
00:08:21,640 –> 00:08:25,560
that show up after the first time an integration fails during quarter close.

166
00:08:25,560 –> 00:08:27,400
So what is it in system terms?

167
00:08:27,400 –> 00:08:31,120
Logic apps is a workflow runtime that can accept a trigger, perform a sequence of calls

168
00:08:31,120 –> 00:08:34,000
and then persist an auditable record of what happened.

169
00:08:34,000 –> 00:08:38,480
It’s the thing that turns, we should update three systems when this event happens into

170
00:08:38,480 –> 00:08:41,600
an artifact you can trace, rerun and prove.

171
00:08:41,600 –> 00:08:43,760
And the connector part is the other half of the story.

172
00:08:43,760 –> 00:08:46,000
Logic apps has a large connector library.

173
00:08:46,000 –> 00:08:48,680
It calls out 1,400 plus.

174
00:08:48,680 –> 00:08:52,120
That means an organization doesn’t start from a blank sheet every time it needs to touch

175
00:08:52,120 –> 00:08:58,640
service now, SAP, Salesforce, Teams, Dataverse, SQL or some random SAS someone bought with

176
00:08:58,640 –> 00:08:59,720
a credit card.

177
00:08:59,720 –> 00:09:00,720
But here’s the shift.

178
00:09:00,720 –> 00:09:04,440
In an MCP world, connectors are not the endpoint, they’re raw material.

179
00:09:04,440 –> 00:09:08,400
Logic apps becomes the place where you wrap raw connector actions into governed tools and

180
00:09:08,400 –> 00:09:09,400
workflows.

181
00:09:09,400 –> 00:09:10,400
You decide what is exposed.

182
00:09:10,400 –> 00:09:11,760
You decide what is hidden.

183
00:09:11,760 –> 00:09:13,320
You decide what inputs matter.

184
00:09:13,320 –> 00:09:14,960
You decide what outputs return.

185
00:09:14,960 –> 00:09:17,080
And you do it once in a way that can be reused.

186
00:09:17,080 –> 00:09:19,760
Now deployment models, most people gloss over this.

187
00:09:19,760 –> 00:09:22,320
Don’t logic apps has three deployment models.

188
00:09:22,320 –> 00:09:24,960
Consumption, standard and hybrid, that is not a feature list.

189
00:09:24,960 –> 00:09:26,760
It is a control plane decision.

190
00:09:26,760 –> 00:09:28,760
Consumption is multi-tenant, it’s convenient.

191
00:09:28,760 –> 00:09:33,120
It’s also by design not where you go when you need tight network boundaries and predictable

192
00:09:33,120 –> 00:09:34,600
execution at scale.

193
00:09:34,600 –> 00:09:35,600
Standard is single tenant.

194
00:09:35,600 –> 00:09:39,560
Can’t describe that as single tenancy dedicated compute, dedicated storage, networking.

195
00:09:39,560 –> 00:09:40,560
That’s the key.

196
00:09:40,560 –> 00:09:44,920
In standard, the workflow runs inside compute you control with networking you can shape.

197
00:09:44,920 –> 00:09:48,760
And with identity primitives that don’t require you to play the where did this secret get

198
00:09:48,760 –> 00:09:50,680
copied game.

199
00:09:50,680 –> 00:09:54,520
Hybrid is the extension of that idea when you need to bring the runtime closer to your

200
00:09:54,520 –> 00:09:55,720
environment.

201
00:09:55,720 –> 00:10:00,880
Arc connected Kubernetes, semi connected execution, data staying local with telemetry sinking

202
00:10:00,880 –> 00:10:01,880
back.

203
00:10:01,880 –> 00:10:04,720
That’s for the parts of the enterprise that still live in reality.

204
00:10:04,720 –> 00:10:09,000
Factories, regulated networks, awkward latency and the unspoken requirement that cloud

205
00:10:09,000 –> 00:10:11,600
outage cannot equal business outage.

206
00:10:11,600 –> 00:10:14,280
So why does any of this matter for co-pilot and MCP?

207
00:10:14,280 –> 00:10:18,360
Because the execution plane needs properties, the reasoning plane will never have.

208
00:10:18,360 –> 00:10:22,520
Deterministic behavior, predictable retries, clear failure modes and a run history that

209
00:10:22,520 –> 00:10:24,320
can serve as evidence.

210
00:10:24,320 –> 00:10:25,880
Logic apps gives you that by default.

211
00:10:25,880 –> 00:10:29,840
It’s not glamorous, it’s not conversational, it does not pretend to be intelligent.

212
00:10:29,840 –> 00:10:30,840
Good.

213
00:10:30,840 –> 00:10:34,480
In the AI era, the most valuable system is the one that refuses to improvise.

214
00:10:34,480 –> 00:10:39,000
And that’s why logic apps become the practical MCP factory inside Microsoft Estates.

215
00:10:39,000 –> 00:10:41,840
It can take your enterprise’s messy reality.

216
00:10:41,840 –> 00:10:45,640
It can take your business, networks, identities, throttling retries and package it into tools

217
00:10:45,640 –> 00:10:50,960
that are safe enough for a model to use without turning every request into a new experiment.

218
00:10:50,960 –> 00:10:55,560
Now we can place co-pilot studio correctly, not as the thing that integrates everything.

219
00:10:55,560 –> 00:10:59,400
As the thing that decides what should happen, then hands execution to something that can

220
00:10:59,400 –> 00:11:00,880
be held accountable.

221
00:11:00,880 –> 00:11:04,640
Co-pilot studio, the intent interface, not the integration layer.

222
00:11:04,640 –> 00:11:08,320
Co-pilot studio is where most leaders want to start because it looks like the business.

223
00:11:08,320 –> 00:11:09,840
A person asks a question.

224
00:11:09,840 –> 00:11:11,960
The system answers, it feels like progress.

225
00:11:11,960 –> 00:11:15,720
But the moment you confuse that interface for the integration layer, you’ve quietly

226
00:11:15,720 –> 00:11:17,640
rebuild the same old problem.

227
00:11:17,640 –> 00:11:21,560
You’ve put business intent inside a surface that can’t own the enterprise’s execution

228
00:11:21,560 –> 00:11:22,560
debt.

229
00:11:22,560 –> 00:11:24,320
That distinction matters.

230
00:11:24,320 –> 00:11:29,520
Co-pilot studio is excellent at three things, conversation, decision framing and tool selection.

231
00:11:29,520 –> 00:11:33,160
Conversation means it can pull context out of humans without forcing them through a form

232
00:11:33,160 –> 00:11:34,160
they hate.

233
00:11:34,160 –> 00:11:37,400
Hiring managers don’t want to know which attribute maps to which HR field.

234
00:11:37,400 –> 00:11:42,520
They want to say start date is the 15th, remote needs contractor access and yes finance systems.

235
00:11:42,520 –> 00:11:44,480
Co-pilot studio can extract that cleanly.

236
00:11:44,480 –> 00:11:49,160
Decision framing means it can take fuzzy requests and turn them into a structured intent.

237
00:11:49,160 –> 00:11:50,960
What is the user trying to achieve?

238
00:11:50,960 –> 00:11:52,360
What constraints are implied?

239
00:11:52,360 –> 00:11:53,840
What information is missing?

240
00:11:53,840 –> 00:11:54,840
What needs approval?

241
00:11:54,840 –> 00:11:56,360
That is not integration.

242
00:11:56,360 –> 00:11:57,840
That’s interpretation.

243
00:11:57,840 –> 00:12:01,480
Tool selection means it can choose the next action from a defined set of tools based

244
00:12:01,480 –> 00:12:03,080
on descriptions and schemas.

245
00:12:03,080 –> 00:12:06,080
And that’s where it becomes dangerous if your tools are a mess because the model will

246
00:12:06,080 –> 00:12:08,520
still choose even if the choices are ambiguous.

247
00:12:08,520 –> 00:12:11,040
Here’s the foundational mistake organizations make.

248
00:12:11,040 –> 00:12:15,440
They assume co-pilot studio should just connect to systems of record directly because it

249
00:12:15,440 –> 00:12:16,440
can.

250
00:12:16,440 –> 00:12:17,440
It can.

251
00:12:17,440 –> 00:12:18,440
It shouldn’t.

252
00:12:18,440 –> 00:12:22,040
When co-pilot studio calls a connector directly, you’ve embedded execution inside the reasoning

253
00:12:22,040 –> 00:12:23,040
plane.

254
00:12:23,040 –> 00:12:26,920
You’ve made the model responsible for error handling, retries, compensations and the

255
00:12:26,920 –> 00:12:31,600
kinds of boring transactional guarantees that humans expect and systems rarely provide.

256
00:12:31,600 –> 00:12:33,160
That is not an AI problem.

257
00:12:33,160 –> 00:12:34,440
That is an architecture problem.

258
00:12:34,440 –> 00:12:37,680
Now to be fair, the tools landscape inside co-pilot studio is getting broader and more

259
00:12:37,680 –> 00:12:38,680
capable.

260
00:12:38,680 –> 00:12:39,680
You can use prompts.

261
00:12:39,680 –> 00:12:40,680
You can use connectors.

262
00:12:40,680 –> 00:12:41,680
You can use agent flows.

263
00:12:41,680 –> 00:12:45,360
You can use computer use for UI automation when the API story is terrible.

264
00:12:45,360 –> 00:12:46,360
And now you can use MCP.

265
00:12:46,360 –> 00:12:49,680
But each of those tools exists on a spectrum of governance.

266
00:12:49,680 –> 00:12:51,680
Prompts are flexible, but they’re not evidence.

267
00:12:51,680 –> 00:12:54,000
Connectors are convenient, but they’re not a control plane.

268
00:12:54,000 –> 00:12:58,360
Agent flows can be structured, but they still need an execution spine behind them if you

269
00:12:58,360 –> 00:13:00,800
want consistent enterprise behavior.

270
00:13:00,800 –> 00:13:04,240
Computer use is powerful, but it is literally automation through screens.

271
00:13:04,240 –> 00:13:08,160
That is the opposite of stable, and MCP is the one that forces you to stop pretending

272
00:13:08,160 –> 00:13:10,600
the model can safely improvise.

273
00:13:10,600 –> 00:13:12,760
This is why Kent’s question lands.

274
00:13:12,760 –> 00:13:14,720
Co-pilot studio has connectivity.

275
00:13:14,720 –> 00:13:17,080
So why do I care about MCP server?

276
00:13:17,080 –> 00:13:20,720
Because the enterprise doesn’t care that a single agent can do a thing once.

277
00:13:20,720 –> 00:13:24,840
The enterprise cares that the next 10 agents don’t each invent their own way to do the same

278
00:13:24,840 –> 00:13:25,840
thing.

279
00:13:25,840 –> 00:13:30,200
MCP servers are how you make connectivity reusable, reviewable and portable across agent

280
00:13:30,200 –> 00:13:31,200
platforms.

281
00:13:31,200 –> 00:13:35,800
But the tool contract once, publish it and then co-pilot studio foundry VS code and whatever

282
00:13:35,800 –> 00:13:38,880
else shows up next can consume the same governed capabilities.

283
00:13:38,880 –> 00:13:42,280
It’s also how you prevent connector sprawl from becoming agents sprawl.

284
00:13:42,280 –> 00:13:46,760
If every team can attach connectors directly to their agent, your security model will drift.

285
00:13:46,760 –> 00:13:48,160
Your data movement will drift.

286
00:13:48,160 –> 00:13:49,480
Your approval logic will drift.

287
00:13:49,480 –> 00:13:50,880
Not because people are reckless.

288
00:13:50,880 –> 00:13:53,680
Because entropy always wins when enforcement is optional.

289
00:13:53,680 –> 00:13:55,520
So co-pilot studio’s role is specific.

290
00:13:55,520 –> 00:13:57,000
It is the intent interface.

291
00:13:57,000 –> 00:13:58,640
It is where humans express what they want.

292
00:13:58,640 –> 00:14:01,360
It is where the system asks the right follow-up questions.

293
00:14:01,360 –> 00:14:05,120
It is where reasoning happens and then it hands off to an execution layer that doesn’t

294
00:14:05,120 –> 00:14:06,120
negotiate.

295
00:14:06,120 –> 00:14:08,880
That handoff is not a minor implementation detail.

296
00:14:08,880 –> 00:14:11,360
It’s the architecture.

297
00:14:11,360 –> 00:14:15,360
Co-pilot studio without an execution spine becomes a high end demo machine.

298
00:14:15,360 –> 00:14:16,760
Impressive in a meeting.

299
00:14:16,760 –> 00:14:18,840
Unpredictable in production.

300
00:14:18,840 –> 00:14:23,960
Co-pilot studio with a governed execution layer becomes a scalable operating model.

301
00:14:23,960 –> 00:14:29,400
In addition, decisions, constraint actions and traceability you can defend in an audit.

302
00:14:29,400 –> 00:14:32,440
Now we can introduce the executive mental model that makes this click.

303
00:14:32,440 –> 00:14:33,440
Two planes.

304
00:14:33,440 –> 00:14:34,720
Two jobs.

305
00:14:34,720 –> 00:14:38,080
And a hard boundary between decide and do.

306
00:14:38,080 –> 00:14:39,440
The two plane model.

307
00:14:39,440 –> 00:14:41,680
Reasoning plane versus execution plane.

308
00:14:41,680 –> 00:14:44,560
Here’s what most organizations miss until the first incident review.

309
00:14:44,560 –> 00:14:46,920
AI doesn’t automate workflows.

310
00:14:46,920 –> 00:14:50,800
AI changes where decisions get made and once decisions move control either follows

311
00:14:50,800 –> 00:14:53,360
by design or it evaporates by accident.

312
00:14:53,360 –> 00:14:55,240
So the executive mental model is this.

313
00:14:55,240 –> 00:14:56,240
Two planes.

314
00:14:56,240 –> 00:14:57,800
A reasoning plane and an execution plane.

315
00:14:57,800 –> 00:14:59,520
The reasoning plane is co-pilot studio.

316
00:14:59,520 –> 00:15:00,520
It’s conversational.

317
00:15:00,520 –> 00:15:01,520
It’s adaptive.

318
00:15:01,520 –> 00:15:02,520
It’s probabilistic by nature.

319
00:15:02,520 –> 00:15:04,840
It’s good at interpreting messy human intent.

320
00:15:04,840 –> 00:15:07,920
Asking for missing context and deciding which option fits the moment.

321
00:15:07,920 –> 00:15:09,200
But it is not deterministic.

322
00:15:09,200 –> 00:15:10,600
It will never be deterministic.

323
00:15:10,600 –> 00:15:11,600
That’s not a bug.

324
00:15:11,600 –> 00:15:12,600
That’s what makes it useful.

325
00:15:12,600 –> 00:15:14,360
The execution plane is logic apps.

326
00:15:14,360 –> 00:15:15,360
It’s transactional.

327
00:15:15,360 –> 00:15:16,360
It’s auditable.

328
00:15:16,360 –> 00:15:17,360
It’s designed to be boring.

329
00:15:17,360 –> 00:15:20,920
It takes a decision and turns it into a series of controlled actions against systems

330
00:15:20,920 –> 00:15:25,480
of record with retries, compensations and a run history that can survive and audit.

331
00:15:25,480 –> 00:15:27,080
It is deterministic on purpose.

332
00:15:27,080 –> 00:15:29,680
That distinction matters.

333
00:15:29,680 –> 00:15:33,000
Because if you blend the planes, you get conditional chaos.

334
00:15:33,000 –> 00:15:38,240
A system where outcomes vary based on phrasing, context drift, tool ambiguity or a model update

335
00:15:38,240 –> 00:15:39,600
you didn’t schedule.

336
00:15:39,600 –> 00:15:43,400
In the two plane model, each plane has a job it can actually do well.

337
00:15:43,400 –> 00:15:46,520
In the reasoning plane, the job is interpret intent.

338
00:15:46,520 –> 00:15:48,040
What is the user really asking for?

339
00:15:48,040 –> 00:15:49,520
What policy constraints apply?

340
00:15:49,520 –> 00:15:50,880
What approvals are needed?

341
00:15:50,880 –> 00:15:52,640
What information is missing?

342
00:15:52,640 –> 00:15:54,880
And critically, what tool should be called next?

343
00:15:54,880 –> 00:15:58,320
In the execution plane, the job is enforce intent.

344
00:15:58,320 –> 00:16:00,320
Make the call the same way every time.

345
00:16:00,320 –> 00:16:02,560
Validate inputs.

346
00:16:02,560 –> 00:16:04,400
Handle failures predictably.

347
00:16:04,400 –> 00:16:07,440
Write to the right system in the right order with the right identity.

348
00:16:07,440 –> 00:16:10,080
Capture the evidence.

349
00:16:10,080 –> 00:16:14,200
Now connect this to the line that should be written on a whiteboard in every AI transformation

350
00:16:14,200 –> 00:16:15,760
steering committee.

351
00:16:15,760 –> 00:16:17,640
Copilot decides what should happen.

352
00:16:17,640 –> 00:16:20,440
Logic apps ensures it happens within your compliance boundaries.

353
00:16:20,440 –> 00:16:24,440
If copilot makes a decision that violates policy, the execution plane should refuse.

354
00:16:24,440 –> 00:16:28,280
If copilot makes a decision without required data, the execution plane should force the missing

355
00:16:28,280 –> 00:16:29,280
fields.

356
00:16:29,280 –> 00:16:33,520
If copilot makes a decision that triggers a risky operation, the execution plane should

357
00:16:33,520 –> 00:16:36,120
require an approval pathway or an escalation.

358
00:16:36,120 –> 00:16:41,360
This is where MCP becomes more than a protocol and starts acting like the seam between planes.

359
00:16:41,360 –> 00:16:45,640
MCP is how the reasoning plane asks the execution plane to do something without improvising

360
00:16:45,640 –> 00:16:46,720
the mechanics.

361
00:16:46,720 –> 00:16:48,080
The tool name is fixed.

362
00:16:48,080 –> 00:16:49,240
The schema is fixed.

363
00:16:49,240 –> 00:16:50,600
The inputs are explicit.

364
00:16:50,600 –> 00:16:51,880
The outputs are structured.

365
00:16:51,880 –> 00:16:52,880
The model stops guessing.

366
00:16:52,880 –> 00:16:53,960
It starts selecting.

367
00:16:53,960 –> 00:16:57,720
And that changes everything about blast radius because the most dangerous idea in enterprise

368
00:16:57,720 –> 00:17:01,320
AI is AI inside every workflow.

369
00:17:01,320 –> 00:17:02,320
That sounds modern.

370
00:17:02,320 –> 00:17:06,960
It’s also how you end up with non-deterministic rights to your systems of record scattered across

371
00:17:06,960 –> 00:17:11,120
dozens of agents, each with slightly different prompts, slightly different tools and slightly

372
00:17:11,120 –> 00:17:12,960
different security assumptions.

373
00:17:12,960 –> 00:17:15,320
In other words, policy drift at machine speed.

374
00:17:15,320 –> 00:17:17,520
The two plane model reduces that risk by design.

375
00:17:17,520 –> 00:17:19,400
You don’t let reasoning leak into execution.

376
00:17:19,400 –> 00:17:22,000
You don’t let execution logic get rebuilt in every agent.

377
00:17:22,000 –> 00:17:26,600
You centralize execution into an orchestration layer that is observable, governable and repeatable.

378
00:17:26,600 –> 00:17:31,080
Then you let AI do what it’s actually good at, understanding humans and choosing among

379
00:17:31,080 –> 00:17:32,520
constrained options.

380
00:17:32,520 –> 00:17:34,560
This also scales organizationally.

381
00:17:34,560 –> 00:17:38,600
Agent builders can focus on intents, conversations and decision quality.

382
00:17:38,600 –> 00:17:43,480
Workflow owners can focus on integration, integrity, idempotency and data contracts.

383
00:17:43,480 –> 00:17:46,360
Operators can focus on run, history, failures and evidence.

384
00:17:46,360 –> 00:17:48,360
That row separation is not bureaucracy.

385
00:17:48,360 –> 00:17:52,280
It’s how you stop privilege sprawl and tool sprawl from becoming permanent.

386
00:17:52,280 –> 00:17:57,000
And if you’re listening for the payoff, this is why MCP matters even when connectors exist.

387
00:17:57,000 –> 00:18:01,560
Connectors let you call systems MCP, paired with an execution plane, let you call systems

388
00:18:01,560 –> 00:18:02,560
safely.

389
00:18:02,560 –> 00:18:06,360
That’s the difference between it works in a demo and it survives quarter close.

390
00:18:06,360 –> 00:18:11,280
Now that the model is clear, we can narrate what this actually looks like end to end.

391
00:18:11,280 –> 00:18:16,040
Event, reasoning, orchestration and an audit trail that doesn’t rely on someone’s memory.

392
00:18:16,040 –> 00:18:17,720
Walkthrough narrated.

393
00:18:17,720 –> 00:18:21,040
Event, reasoning, orchestration, audit trail.

394
00:18:21,040 –> 00:18:25,000
Here’s the narrated version of what actually happens when this architecture is working end

395
00:18:25,000 –> 00:18:27,040
to end without screens.

396
00:18:27,040 –> 00:18:30,000
Start with a real signal, not a user click the button demo signal.

397
00:18:30,000 –> 00:18:34,600
A real enterprise event, a new hire is approved in the HR system and invoiced lands in a shared

398
00:18:34,600 –> 00:18:35,600
mailbox.

399
00:18:35,600 –> 00:18:38,320
A servitoo ticket gets created in your ITSM platform.

400
00:18:38,320 –> 00:18:43,040
A pricing update is published from SAP, something changes and now the enterprise has to respond.

401
00:18:43,040 –> 00:18:45,920
That event is the trigger and the first discipline is this.

402
00:18:45,920 –> 00:18:49,240
Don’t let the trigger become the workflow, a trigger is just a fact.

403
00:18:49,240 –> 00:18:51,000
It says something happened.

404
00:18:51,000 –> 00:18:55,040
The reasoning plane is where the system decides what that fact means in business terms.

405
00:18:55,040 –> 00:18:59,520
So Copilot Studio takes the event, plus whatever context is allowed to see, and it does

406
00:18:59,520 –> 00:19:04,080
the part humans usually do in chat messages and half filled tickets, interpretation.

407
00:19:04,080 –> 00:19:08,240
For HR onboarding, it looks at the hire request and immediately starts asking the questions

408
00:19:08,240 –> 00:19:09,920
that always get asked too late.

409
00:19:09,920 –> 00:19:15,040
Roll, location, start date, manager, equipment needs, standard access versus special access,

410
00:19:15,040 –> 00:19:18,600
contractor versus employee and whether any approvals are missing.

411
00:19:18,600 –> 00:19:23,440
For invoice exceptions, it does the thing, accounts payable teams hate doing manually.

412
00:19:23,440 –> 00:19:24,800
Why was this rejected?

413
00:19:24,800 –> 00:19:29,240
It reads the rejection reason, asks for missing context, normalizes vendor names and figures

414
00:19:29,240 –> 00:19:34,160
out whether this is a mismatch, a missing PO, a limit breach or an approval gap.

415
00:19:34,160 –> 00:19:37,360
For IT service automation, it identifies the intent.

416
00:19:37,360 –> 00:19:42,080
Password reset, device compliance, VPN access, mailbox permissions, whatever your tier catalog

417
00:19:42,080 –> 00:19:43,600
actually contains.

418
00:19:43,600 –> 00:19:46,520
And it checks whether this is within policy or needs escalation.

419
00:19:46,520 –> 00:19:47,520
Now here’s the key.

420
00:19:47,520 –> 00:19:51,720
Copilot Studio is not calling random connectors because it can.

421
00:19:51,720 –> 00:19:57,160
It is selecting tools, MCP tools, tools with names and schemers that were designed in advance.

422
00:19:57,160 –> 00:20:01,880
This is where the system stops being a chatbot and starts behaving like a constrained operator.

423
00:20:01,880 –> 00:20:06,280
The agent sees a tool catalog and chooses a tool based on description and required inputs.

424
00:20:06,280 –> 00:20:07,600
It’s not inventing an endpoint.

425
00:20:07,600 –> 00:20:09,320
It’s not guessing at field names.

426
00:20:09,320 –> 00:20:10,920
It’s selecting from what you published.

427
00:20:10,920 –> 00:20:14,680
Yes, the descriptions matter because they become decision inputs for the model.

428
00:20:14,680 –> 00:20:19,560
When Ken said MCP enables seamless integration between large language model applications or

429
00:20:19,560 –> 00:20:23,120
agents and tools and data, that’s what seamless really means.

430
00:20:23,120 –> 00:20:25,760
The model gets a clean menu instead of a junk drawer.

431
00:20:25,760 –> 00:20:29,760
So Copilot Studio chooses the tool, fills in the schema and hands off the request to the

432
00:20:29,760 –> 00:20:30,760
execution plane.

433
00:20:30,760 –> 00:20:32,160
Now logic apps takes over.

434
00:20:32,160 –> 00:20:35,440
This is where the enterprise stops debating what should happen and starts doing what is

435
00:20:35,440 –> 00:20:36,600
allowed to happen.

436
00:20:36,600 –> 00:20:38,600
Logic apps executes connector calls.

437
00:20:38,600 –> 00:20:43,400
But it does it with boring features that matter in production, retries, timeouts, compensating

438
00:20:43,400 –> 00:20:45,720
actions and controlled sequencing.

439
00:20:45,720 –> 00:20:48,320
If a downstream system throttles it retries in the right way.

440
00:20:48,320 –> 00:20:53,800
If a step fails after partial success, it compensates or it roots to a human approval path.

441
00:20:53,800 –> 00:20:57,960
If a call needs enrichment, look up the manager’s ID, map the vendor number, translate a location

442
00:20:57,960 –> 00:20:58,960
code.

443
00:20:58,960 –> 00:21:00,720
Logic apps does it deterministically.

444
00:21:00,720 –> 00:21:03,280
And this is why logic apps is the execution spine.

445
00:21:03,280 –> 00:21:04,760
It doesn’t just call APIs.

446
00:21:04,760 –> 00:21:06,320
It owns the workflow reality.

447
00:21:06,320 –> 00:21:07,720
The enterprise depends on.

448
00:21:07,720 –> 00:21:12,320
Now the part executives should care about even more than the automation is the evidence trail.

449
00:21:12,320 –> 00:21:14,680
Because enterprises don’t get punished for automating.

450
00:21:14,680 –> 00:21:16,960
They get punished for not being able to prove what happened.

451
00:21:16,960 –> 00:21:18,440
Logic apps gives you run history.

452
00:21:18,440 –> 00:21:22,600
And when you run MCP tools through it, you get a full chain, the trigger event, the parameters

453
00:21:22,600 –> 00:21:27,360
passed, the connector calls made, the responses received and the final output.

454
00:21:27,360 –> 00:21:33,480
Kent described it as full traceability, inputs outputs, what the user said, what the agent

455
00:21:33,480 –> 00:21:34,680
responded.

456
00:21:34,680 –> 00:21:36,160
We’ve got a very complete picture.

457
00:21:36,160 –> 00:21:37,440
That is not a nice to have.

458
00:21:37,440 –> 00:21:41,240
It is the difference between an automation you can scale and an automation you quietly turn

459
00:21:41,240 –> 00:21:43,200
off after the first compliance review.

460
00:21:43,200 –> 00:21:44,720
The output is simple.

461
00:21:44,720 –> 00:21:49,480
Systems update, tickets close, records reconcile, access provisions, approvals route and

462
00:21:49,480 –> 00:21:51,800
humans only touch the weird cases.

463
00:21:51,800 –> 00:21:53,120
But the real product isn’t the update.

464
00:21:53,120 –> 00:21:56,280
The real product is that the enterprise can replay the truth.

465
00:21:56,280 –> 00:21:58,200
When someone asks, who approved this?

466
00:21:58,200 –> 00:21:59,200
You don’t search teams.

467
00:21:59,200 –> 00:22:00,200
You pull the run.

468
00:22:00,200 –> 00:22:02,160
When someone asks, why did the agent do that?

469
00:22:02,160 –> 00:22:03,160
You don’t blame the model.

470
00:22:03,160 –> 00:22:06,200
You show the tool call and the policy boundary at hit.

471
00:22:06,200 –> 00:22:08,680
And once you have that, you’re not building automations anymore.

472
00:22:08,680 –> 00:22:10,880
You’re building a govern decision and execution pipeline.

473
00:22:10,880 –> 00:22:14,440
Now we can talk about the part that determines whether the scales or collapses.

474
00:22:14,440 –> 00:22:15,760
Tool design.

475
00:22:15,760 –> 00:22:19,080
Tool design is governance, avoiding conditional chaos.

476
00:22:19,080 –> 00:22:23,920
This is where most agentec enterprise conversations collapse into a polite disaster.

477
00:22:23,920 –> 00:22:24,920
Tool design.

478
00:22:24,920 –> 00:22:27,880
Not model selection, not prompt tuning, not which chat surface you picked.

479
00:22:27,880 –> 00:22:28,880
Tool design.

480
00:22:28,880 –> 00:22:30,800
Because once a model has tools, it will use them.

481
00:22:30,800 –> 00:22:34,520
And if the tools are vague, overlapping or overpowered, you’ve created conditional

482
00:22:34,520 –> 00:22:38,600
chaos with a friendly UI, can set the line that should permanently ruin the idea of just

483
00:22:38,600 –> 00:22:40,200
expose the connector.

484
00:22:40,200 –> 00:22:42,240
Create record, create record of what?

485
00:22:42,240 –> 00:22:44,080
That question isn’t pedantic.

486
00:22:44,080 –> 00:22:47,200
It’s the entire governance problem in one sentence.

487
00:22:47,200 –> 00:22:51,480
In an enterprise connector, create record usually means create anything in a system that

488
00:22:51,480 –> 00:22:54,320
contains hundreds of entities and thousands of fields.

489
00:22:54,320 –> 00:22:57,240
Humans can handle that because humans carry context and caution.

490
00:22:57,240 –> 00:22:58,240
Models don’t.

491
00:22:58,240 –> 00:23:02,560
Models optimize for completing the task and they will happily fill in blanks with guesses

492
00:23:02,560 –> 00:23:03,920
that look plausible.

493
00:23:03,920 –> 00:23:06,080
For the first rule of MCP Tool design is simple.

494
00:23:06,080 –> 00:23:07,320
Generic tools don’t scale.

495
00:23:07,320 –> 00:23:09,040
They scale ambiguity.

496
00:23:09,040 –> 00:23:12,880
An ambiguity is expensive, in tokens, in retries, in wrong rights.

497
00:23:12,880 –> 00:23:17,480
And in the time you’ll spend explaining to audit why an AI wrote something to somewhere,

498
00:23:17,480 –> 00:23:19,000
because the tool allowed it.

499
00:23:19,000 –> 00:23:22,760
The counter-intuitive part is that governance isn’t a policy document.

500
00:23:22,760 –> 00:23:23,760
Governance is what you expose.

501
00:23:23,760 –> 00:23:27,920
And if you expose a tool that can write to ten tables, you’ve already lost the argument

502
00:23:27,920 –> 00:23:29,880
that you control the system.

503
00:23:29,880 –> 00:23:31,440
Control is not what you intended.

504
00:23:31,440 –> 00:23:32,760
Control is what the interface permits.

505
00:23:32,760 –> 00:23:38,360
So you design tools, like you designed guardrails, narrow surface area, clear intent, constrained

506
00:23:38,360 –> 00:23:41,080
inputs, predictable outputs.

507
00:23:41,080 –> 00:23:44,600
And the output constraints matter more than most people think because tool responses become

508
00:23:44,600 –> 00:23:45,920
model context.

509
00:23:45,920 –> 00:23:49,920
If you return the entire record payload every time you’re not being thorough, you’re burning

510
00:23:49,920 –> 00:23:53,320
tokens and feeding the model noise it will treat as relevant.

511
00:23:53,320 –> 00:23:59,000
The simple version is your tool schema is your policy boundary, now practical consequences.

512
00:23:59,000 –> 00:24:04,240
If you build an MCP tool called update opportunity, and it accepts any field in the opportunity

513
00:24:04,240 –> 00:24:08,960
object, the model will eventually update the wrong field, not because it’s malicious,

514
00:24:08,960 –> 00:24:11,880
because it is trying to be helpful in a schema it can’t fully reason about.

515
00:24:11,880 –> 00:24:16,160
But if you build advanced opportunity stage with allowed values required IDs and a constrained

516
00:24:16,160 –> 00:24:20,800
output that returns the new stage timestamp and a correlation ID, you’ve done something

517
00:24:20,800 –> 00:24:25,880
different, you’ve turned a risky right into a controlled action, that distinction matters.

518
00:24:25,880 –> 00:24:28,960
And this is where logic apps becomes more than an execution engine.

519
00:24:28,960 –> 00:24:32,640
It becomes a tool compiler, you take raw connectors and you wrap them into tools that match

520
00:24:32,640 –> 00:24:38,640
business verbs, not platform verbs, provision day one access, create incident with severity,

521
00:24:38,640 –> 00:24:43,480
validate invoice against PO, sync pricing changes with ID and potency, those aren’t connector

522
00:24:43,480 –> 00:24:46,000
operations, they’re governed capabilities.

523
00:24:46,000 –> 00:24:50,520
Now the part everyone underestimates tool descriptions, tool descriptions are not documentation,

524
00:24:50,520 –> 00:24:51,600
they’re decision inputs.

525
00:24:51,600 –> 00:24:56,600
A model doesn’t read your wiki, it reads the tool catalog description and schema, that’s

526
00:24:56,600 –> 00:24:59,480
what it uses to decide whether a tool fits the situation.

527
00:24:59,480 –> 00:25:02,960
If the description is generic, the model selection is probabilistic, if the description is

528
00:25:02,960 –> 00:25:05,720
precise, the model selection becomes constrained.

529
00:25:05,720 –> 00:25:10,040
So you write descriptions like you’re writing for a deterministic system, because you are.

530
00:25:10,040 –> 00:25:15,280
This tool creates a Salesforce contact with last name, email and account ID, use it only

531
00:25:15,280 –> 00:25:19,880
when a human confirms the contact should be created, that is governance.

532
00:25:19,880 –> 00:25:25,280
And the moment you do that consistently, something else happens, you reduce tool collisions.

533
00:25:25,280 –> 00:25:29,680
You reduce duplicate tools across teams, you reduce the temptation for every agent builder

534
00:25:29,680 –> 00:25:33,640
to invent their own slightly different version of the same capability, because they don’t

535
00:25:33,640 –> 00:25:34,640
need to.

536
00:25:34,640 –> 00:25:37,200
This is also where you kill entropy generators early.

537
00:25:37,200 –> 00:25:41,280
Policy exceptions thrive in ambiguity, side channels thrive when the official path is

538
00:25:41,280 –> 00:25:43,440
harder than the unofficial one.

539
00:25:43,440 –> 00:25:47,560
Shadow integrations appear when the blessed tool can’t answer the real question.

540
00:25:47,560 –> 00:25:51,720
Well designed tools remove those escape hatches, not by telling people to behave, by making

541
00:25:51,720 –> 00:25:53,560
the correct path the easiest path.

542
00:25:53,560 –> 00:25:55,800
Now tie this back to governance as an enabler.

543
00:25:55,800 –> 00:25:59,720
A tool catalog that’s curated and constrained is what allows you to move faster without losing

544
00:25:59,720 –> 00:26:00,720
control.

545
00:26:00,720 –> 00:26:04,600
It’s how you let teams build agents quickly without granting them raw access to systems

546
00:26:04,600 –> 00:26:05,600
of record.

547
00:26:05,600 –> 00:26:09,720
It’s how you let co-pilot studio do things without turning every action into a bespoke

548
00:26:09,720 –> 00:26:10,720
security review.

549
00:26:10,720 –> 00:26:13,720
You don’t govern agent behavior by reviewing every conversation.

550
00:26:13,720 –> 00:26:16,000
You govern it by designing what actions are possible.

551
00:26:16,000 –> 00:26:17,000
That’s why MCP matters.

552
00:26:17,000 –> 00:26:18,320
It’s not just a protocol.

553
00:26:18,320 –> 00:26:21,560
It’s a forcing function that makes tool design the unit of governance.

554
00:26:21,560 –> 00:26:26,200
And once tool design is governance, you stop arguing about whether AI is safe.

555
00:26:26,200 –> 00:26:27,840
You start proving it.

556
00:26:27,840 –> 00:26:30,680
Scenario one, HR onboarding across systems.

557
00:26:30,680 –> 00:26:34,520
HR onboarding is the universal enterprise mess because it looks simple until you try to

558
00:26:34,520 –> 00:26:35,840
do it consistently.

559
00:26:35,840 –> 00:26:37,080
A person is hired.

560
00:26:37,080 –> 00:26:38,080
They need an identity.

561
00:26:38,080 –> 00:26:39,080
They need a mailbox.

562
00:26:39,080 –> 00:26:40,080
They need access.

563
00:26:40,080 –> 00:26:41,080
They need a device.

564
00:26:41,080 –> 00:26:42,080
They need payroll.

565
00:26:42,080 –> 00:26:45,520
They need just one exception because the new hire is remote or a contractor or joining

566
00:26:45,520 –> 00:26:48,960
finance or starting tomorrow or all of the above.

567
00:26:48,960 –> 00:26:54,120
And every one of those needs lives in a different system owned by a different team with a different

568
00:26:54,120 –> 00:26:55,880
definition of done.

569
00:26:55,880 –> 00:26:57,600
So here’s the strategic framing.

570
00:26:57,600 –> 00:26:59,360
onboarding isn’t an integration problem.

571
00:26:59,360 –> 00:27:03,760
It’s a coordination problem with security consequences because the moment onboarding becomes

572
00:27:03,760 –> 00:27:06,720
a ticket relay race, two things always happen.

573
00:27:06,720 –> 00:27:07,720
First you lose time.

574
00:27:07,720 –> 00:27:09,800
Day one readiness turns into day three readiness.

575
00:27:09,800 –> 00:27:10,800
Then day seven readiness.

576
00:27:10,800 –> 00:27:13,840
Then they’ll be fine with shared access for now.

577
00:27:13,840 –> 00:27:15,120
Second you lose control.

578
00:27:15,120 –> 00:27:19,720
The access becomes normal access manual overrides become permanent pathways and nobody can prove

579
00:27:19,720 –> 00:27:23,880
why a given person got a given entitlement because the decision lived in an email and the

580
00:27:23,880 –> 00:27:25,760
execution happened in four different places.

581
00:27:25,760 –> 00:27:28,640
Now drop co pilot studio and logic apps into that reality.

582
00:27:28,640 –> 00:27:30,560
The intent interface is co pilot studio.

583
00:27:30,560 –> 00:27:34,840
The hiring manager doesn’t need to know what entry attribute maps to what downstream system.

584
00:27:34,840 –> 00:27:37,120
They need to communicate intent in human terms.

585
00:27:37,120 –> 00:27:42,920
Roll location start date manager department employment type and whether standard access applies

586
00:27:42,920 –> 00:27:45,080
or special access is required.

587
00:27:45,080 –> 00:27:47,520
And co pilot studio’s job is not to guess the answer.

588
00:27:47,520 –> 00:27:51,240
It’s to interrogate the request until the request becomes executable.

589
00:27:51,240 –> 00:27:53,280
This is where you reduce entropy early.

590
00:27:53,280 –> 00:27:56,320
The agent asks the questions humans usually ask too late.

591
00:27:56,320 –> 00:27:59,840
It confirms whether the person is employee or contractor, whether they need privileged

592
00:27:59,840 –> 00:28:04,520
access, whether they handle regulated data, whether they require SIP rolls, whether they

593
00:28:04,520 –> 00:28:09,640
need a device shipped and whether approvals exist for any non-standard entitlements.

594
00:28:09,640 –> 00:28:11,280
Then the handoff happens.

595
00:28:11,280 –> 00:28:15,560
The pilot selects a tool not a connector a tool with a name that encodes your governance

596
00:28:15,560 –> 00:28:21,640
intent like start on boarding for new hire or provision day one access.

597
00:28:21,640 –> 00:28:25,960
And this is where mcp matters the model isn’t improvising a sequence of connector calls.

598
00:28:25,960 –> 00:28:29,160
It is calling a published capability with a schema you defined.

599
00:28:29,160 –> 00:28:33,760
The request goes into logic apps and logic apps does the boring work that you actually want

600
00:28:33,760 –> 00:28:34,760
boring.

601
00:28:34,760 –> 00:28:38,520
It creates the identity using managed identity not shared credentials.

602
00:28:38,520 –> 00:28:42,600
It assigns baseline groups using explicit mappings, not whatever the model thinks.

603
00:28:42,600 –> 00:28:46,800
It provisions the mailbox, triggers device enrollment tasks, creates payroll records

604
00:28:46,800 –> 00:28:49,160
and opens or updates the ITSM ticket.

605
00:28:49,160 –> 00:28:52,880
So the operational teams see a single authoritative state.

606
00:28:52,880 –> 00:28:54,960
If something fails, it doesn’t apologize.

607
00:28:54,960 –> 00:28:57,920
It retries, it compensates, it escalates.

608
00:28:57,920 –> 00:28:59,600
This is the part executives miss.

609
00:28:59,600 –> 00:29:01,160
You aren’t automating on boarding.

610
00:29:01,160 –> 00:29:04,520
You’re automating the control plane for on boarding because the workflow becomes the

611
00:29:04,520 –> 00:29:09,320
place where you enforce what done means and you can enforce separation of duties by design.

612
00:29:09,320 –> 00:29:13,400
Agent builders can define the conversational experience and the intent model.

613
00:29:13,400 –> 00:29:16,480
Workflow owners control the execution layer.

614
00:29:16,480 –> 00:29:22,600
Which systems are touched in what order, with what identity and what evidence is recorded.

615
00:29:22,600 –> 00:29:27,000
Operators monitor runs and failures without needing access to redesign tools.

616
00:29:27,000 –> 00:29:31,440
That RBX split matters because on boarding is where privileged sprawl starts.

617
00:29:31,440 –> 00:29:34,080
Now take the scenario everyone has.

618
00:29:34,080 –> 00:29:35,080
Special access.

619
00:29:35,080 –> 00:29:38,880
A manager says they’ll need finance reporting access on day one.

620
00:29:38,880 –> 00:29:43,080
In the old model that becomes a side channel, a team’s message to someone who can do it real

621
00:29:43,080 –> 00:29:44,080
quick.

622
00:29:44,080 –> 00:29:47,920
In this model, Copilot collects the justification and roots it into the workflow.

623
00:29:47,920 –> 00:29:49,920
Logic apps enforces the policy boundary.

624
00:29:49,920 –> 00:29:54,080
Either it requires an approval step or it queues it for a privileged workflow or it

625
00:29:54,080 –> 00:29:59,520
refuses unless the request meets conditions you defined, same request, different outcome.

626
00:29:59,520 –> 00:30:03,600
Not because the AI is smarter, because the system is constrained and the audit story becomes

627
00:30:03,600 –> 00:30:04,600
clean.

628
00:30:04,600 –> 00:30:07,040
If someone asks why did this person receive that access?

629
00:30:07,040 –> 00:30:09,240
You don’t reconstruct the narrative from five systems.

630
00:30:09,240 –> 00:30:10,320
You open the run history.

631
00:30:10,320 –> 00:30:14,480
You see who asked what was asked, what approvals were captured, what tools were called, what

632
00:30:14,480 –> 00:30:17,800
groups were assigned and what downstream updates were made.

633
00:30:17,800 –> 00:30:21,520
That is the actual value of enterprise connectivity in an AI era.

634
00:30:21,520 –> 00:30:24,600
Not faster clicks, but fewer, untracked decisions.

635
00:30:24,600 –> 00:30:27,080
And the business outcome is easy to say without hype.

636
00:30:27,080 –> 00:30:32,440
Fewer manual handoffs, faster day one readiness, fewer access mistakes and a measurable reduction

637
00:30:32,440 –> 00:30:34,600
in the hidden labor of coordination.

638
00:30:34,600 –> 00:30:39,040
Now that the pattern is clear, the next scenario makes the same point from a different angle.

639
00:30:39,040 –> 00:30:40,280
Invoices aren’t hard.

640
00:30:40,280 –> 00:30:41,280
Exceptions are.

641
00:30:41,280 –> 00:30:42,280
Scenario 2.

642
00:30:42,280 –> 00:30:44,080
Invoice processing and exception handling.

643
00:30:44,080 –> 00:30:47,080
Invoice automation is always sold as a paper to ERP story.

644
00:30:47,080 –> 00:30:51,240
Scan the PDF, extract the fields, match the PO, post the invoice, done.

645
00:30:51,240 –> 00:30:52,480
That’s the brochure version.

646
00:30:52,480 –> 00:30:54,800
In reality, invoices aren’t hard.

647
00:30:54,800 –> 00:30:57,120
Expansions are endless and they are usually undocumented.

648
00:30:57,120 –> 00:31:00,200
The vendor name doesn’t match what procurement entered three years ago.

649
00:31:00,200 –> 00:31:03,040
The PO is missing, but we always pay this vendor.

650
00:31:03,040 –> 00:31:06,400
The amounts don’t line up because someone changed pricing after the PO.

651
00:31:06,400 –> 00:31:08,680
The approval threshold got exceeded by $12.

652
00:31:08,680 –> 00:31:12,360
The cost center is wrong, the invoice got emailed to the wrong mailbox.

653
00:31:12,360 –> 00:31:14,960
The line items are structured like a ransom note.

654
00:31:14,960 –> 00:31:19,520
And every business unit has its own definition of urgent, so the enterprise cost isn’t invoice

655
00:31:19,520 –> 00:31:20,520
processing.

656
00:31:20,520 –> 00:31:22,040
It’s human exception triage.

657
00:31:22,040 –> 00:31:25,320
And that triage is almost always done in the worst possible place.

658
00:31:25,320 –> 00:31:30,080
Email threads and comments inside whatever ERP screen someone happens to know.

659
00:31:30,080 –> 00:31:31,880
Here’s the architectural reframing.

660
00:31:31,880 –> 00:31:35,240
Invoice exceptions are a coordination problem with money attached.

661
00:31:35,240 –> 00:31:36,240
That means two things.

662
00:31:36,240 –> 00:31:40,480
First, you need a reasoning surface that can collect context without forcing AP to become

663
00:31:40,480 –> 00:31:41,480
a detective.

664
00:31:41,480 –> 00:31:46,800
Second, you need an execution layer that refuses to just post it when policy says otherwise.

665
00:31:46,800 –> 00:31:51,800
This is where co-pilot studio earns its place, not by automating finance.

666
00:31:51,800 –> 00:31:56,160
By handling the conversation nobody wants to have manually, 50 times a day.

667
00:31:56,160 –> 00:32:00,160
When an invoice fails validation, the agent can answer the only question people actually

668
00:32:00,160 –> 00:32:02,400
ask, why was this rejected?

669
00:32:02,400 –> 00:32:06,040
And it can do the follow-up work that humans usually do via back and forth.

670
00:32:06,040 –> 00:32:07,800
Which PO should this map to?

671
00:32:07,800 –> 00:32:09,080
Is this a duplicate?

672
00:32:09,080 –> 00:32:10,800
Who owns this cost center?

673
00:32:10,800 –> 00:32:12,720
Do you want to split the amount?

674
00:32:12,720 –> 00:32:15,920
Is this a legitimate exception and if so, who can approve it?

675
00:32:15,920 –> 00:32:19,240
That matters because it pulls intent out of the business in plain language.

676
00:32:19,240 –> 00:32:22,280
And then the system has to stop being polite and start being strict.

677
00:32:22,280 –> 00:32:25,240
This is where logic apps become the execution spine again.

678
00:32:25,240 –> 00:32:27,840
The model can reason across messy inputs.

679
00:32:27,840 –> 00:32:31,160
But the workflow decides what can move where.

680
00:32:31,160 –> 00:32:35,960
Logic apps enforces validations, vendor match, PO match, limits and approval routing.

681
00:32:35,960 –> 00:32:38,560
It does the ordering that keeps finance sane.

682
00:32:38,560 –> 00:32:40,160
Enrich invoice data.

683
00:32:40,160 –> 00:32:44,680
Check against authoritative systems, root to approvals if thresholds trip, then right back to the

684
00:32:44,680 –> 00:32:49,880
ERP only when the conditions are satisfied. And it does it with audit grade behavior, deterministic

685
00:32:49,880 –> 00:32:53,480
steps, retries where retries make sense and a recorded run history.

686
00:32:53,480 –> 00:32:56,800
Now at the part most AI demos skip because it’s not as fun.

687
00:32:56,800 –> 00:32:57,800
DLP.

688
00:32:57,800 –> 00:32:59,400
In finance, DLP isn’t a slide.

689
00:32:59,400 –> 00:33:02,920
It’s the difference between, we can deploy this and security shut it down.

690
00:33:02,920 –> 00:33:04,280
The practical model is simple.

691
00:33:04,280 –> 00:33:06,280
AI can reason across information.

692
00:33:06,280 –> 00:33:09,640
Workflows decide what information is allowed to move between systems.

693
00:33:09,640 –> 00:33:13,600
So you can let co-pilot studio interpret an exception, summarize what’s missing and ask

694
00:33:13,600 –> 00:33:15,360
the user for clarification.

695
00:33:15,360 –> 00:33:19,600
Without granting it direct, unconstrained access to write into your system of record, because

696
00:33:19,600 –> 00:33:22,080
authenticated does not mean authorized.

697
00:33:22,080 –> 00:33:25,600
And even authorized does not mean safe to execute without guardrails.

698
00:33:25,600 –> 00:33:28,320
Now in MCP terms, this becomes a tool story.

699
00:33:28,320 –> 00:33:32,720
You don’t expose a generic, create invoice tool with a hundred fields and vague meanings.

700
00:33:32,720 –> 00:33:36,080
You expose an invoice exception resolution tool set.

701
00:33:36,080 –> 00:33:40,880
Validate invoice against PO, retrieve vendor master details, request approval for exception

702
00:33:40,880 –> 00:33:45,840
type X, post invoice with correlation ID, and return a structured result that contains

703
00:33:45,840 –> 00:33:48,560
what happened and what evidence was created.

704
00:33:48,560 –> 00:33:52,880
The model doesn’t freehand an ERP transaction, it selects from approved actions.

705
00:33:52,880 –> 00:33:56,080
And the best part is the outcome that executives actually care about.

706
00:33:56,080 –> 00:33:58,920
Humans only touch exceptions, not the happy path.

707
00:33:58,920 –> 00:34:03,360
Happy path invoices post automatically with boring reliability.

708
00:34:03,360 –> 00:34:06,760
Exceptions become structured conversations with constrained outcomes, and you can measure

709
00:34:06,760 –> 00:34:12,280
it in the only ways finance trusts, reduced cycle time, fewer manual touches per invoice,

710
00:34:12,280 –> 00:34:16,360
and fewer we don’t know why this was posted moments that show up during close.

711
00:34:16,360 –> 00:34:17,880
This also changes the failure mode.

712
00:34:17,880 –> 00:34:21,120
In the old world, the failure mode is silent drift.

713
00:34:21,120 –> 00:34:24,040
Someone finds a workaround and it becomes policy by accident.

714
00:34:24,040 –> 00:34:26,160
In this world, the failure mode is explicit.

715
00:34:26,160 –> 00:34:29,080
The workflow refuses, roots, or escalates.

716
00:34:29,080 –> 00:34:32,720
And you can see it happen, which means your control environment becomes a system, not

717
00:34:32,720 –> 00:34:33,720
a story.

718
00:34:33,720 –> 00:34:37,640
In voice exception, stop consuming human attention, you get a second order benefit.

719
00:34:37,640 –> 00:34:42,400
Your AP team stops spending time, being a message bus, and start spending time on the only

720
00:34:42,400 –> 00:34:46,480
work worth human judgment, actual anomalies and actual fraud signals.

721
00:34:46,480 –> 00:34:51,400
Now if you want the scenario where this becomes even more obvious, it’s IT service automation.

722
00:34:51,400 –> 00:34:55,240
Because IT isn’t paid to be creative, it is paid to be consistent under pressure with

723
00:34:55,240 –> 00:34:56,240
receipts.

724
00:34:56,240 –> 00:34:57,240
Scenario 3.

725
00:34:57,240 –> 00:34:58,760
IT service automation.

726
00:34:58,760 –> 00:35:02,720
IT service management is where enterprise reality shows up without makeup.

727
00:35:02,720 –> 00:35:04,320
It’s a repetitive.

728
00:35:04,320 –> 00:35:06,760
Documentation is outdated the day after it’s written.

729
00:35:06,760 –> 00:35:10,200
Tribal knowledge lives in the heads of two people you can’t afford to lose.

730
00:35:10,200 –> 00:35:14,240
And the SLA clock keeps running even when the root cause is a user who swears they didn’t

731
00:35:14,240 –> 00:35:15,240
change anything.

732
00:35:15,240 –> 00:35:19,120
So yes, it is a great place to start with a genetic orchestration, not because it’s glamorous,

733
00:35:19,120 –> 00:35:22,680
because it’s measurable, painful, and full of work that should not require a human to

734
00:35:22,680 –> 00:35:24,960
interpret the same request for the thousandth time.

735
00:35:24,960 –> 00:35:27,920
But here’s the thing, most organizations get wrong when they try it.

736
00:35:27,920 –> 00:35:29,960
They aim for AI resolve’s tickets.

737
00:35:29,960 –> 00:35:30,960
That’s not the real objective.

738
00:35:30,960 –> 00:35:31,960
The real objective is.

739
00:35:31,960 –> 00:35:38,280
AI handles standard intents and the system escalates only when policy thresholds are crossed.

740
00:35:38,280 –> 00:35:41,640
Tier to tier 2 is not a human hierarchy, it’s a control boundary.

741
00:35:41,640 –> 00:35:44,600
Tier is self-service and safe automation.

742
00:35:44,600 –> 00:35:50,120
Password resets account unlocks basic access requests, known device compliance checks, standard

743
00:35:50,120 –> 00:35:55,880
VPN, troubleshooting prompts, maybe a simple, how do I request that roots to a knowledge base?

744
00:35:55,880 –> 00:35:58,600
Tier 1 is guided execution with guardrails.

745
00:35:58,600 –> 00:36:02,200
If you do this action, then verify this condition, then notify the user.

746
00:36:02,200 –> 00:36:06,400
It’s still mostly deterministic, it’s the human doing the steps because the system didn’t.

747
00:36:06,400 –> 00:36:09,800
Tier 2 is where the organization actually pays for judgment.

748
00:36:09,800 –> 00:36:14,840
Complex incidents, ambiguous symptoms, high impact outages, or anything that can create collateral

749
00:36:14,840 –> 00:36:15,840
damage.

750
00:36:15,840 –> 00:36:19,920
Agentech orchestration is about moving work down the stack without moving risk up the stack.

751
00:36:19,920 –> 00:36:21,280
So here’s the pattern.

752
00:36:21,280 –> 00:36:24,200
Copilot Studio becomes the intake and triage surface.

753
00:36:24,200 –> 00:36:28,000
It takes messy user language and turns it into a clean intent.

754
00:36:28,000 –> 00:36:34,080
Password, re-enroll device, request application access, check mailbox permissions, troubleshoot

755
00:36:34,080 –> 00:36:38,920
teams audio, whatever your top ticket categories actually are, then it does the part a ticket

756
00:36:38,920 –> 00:36:40,520
form never does well.

757
00:36:40,520 –> 00:36:42,880
It collects the missing context conversationally.

758
00:36:42,880 –> 00:36:47,200
Device name, error message, location, whether it’s a new device or a rebuild, whether the

759
00:36:47,200 –> 00:36:51,280
user is traveling, whether this is affecting one person or a whole team.

760
00:36:51,280 –> 00:36:53,360
This seems small, it’s not.

761
00:36:53,360 –> 00:36:57,360
Because IT tickets fail for the same reason invoices fail, missing context forces humans

762
00:36:57,360 –> 00:36:58,520
to improvise.

763
00:36:58,520 –> 00:37:01,440
Then Copilot selects the tool and this is where you need to be ruthless.

764
00:37:01,440 –> 00:37:04,120
IT tools are not query everything and do anything.

765
00:37:04,120 –> 00:37:07,800
That’s how you end up with an agent that can disable accounts because someone phrased

766
00:37:07,800 –> 00:37:08,800
a question badly.

767
00:37:08,800 –> 00:37:11,600
Your MCP tools here should map to safe verbs.

768
00:37:11,600 –> 00:37:17,720
Reset password for user, unlock account, create incident with severity, check device compliance,

769
00:37:17,720 –> 00:37:22,600
request software access with a profile, update ticket status, notify user.

770
00:37:22,600 –> 00:37:25,000
If you’re hearing repetition, good repetition is the point.

771
00:37:25,000 –> 00:37:29,080
A safe enterprise is mostly repeated patterns executed consistently.

772
00:37:29,080 –> 00:37:33,680
Now logic apps takes the request and executes it and this is where IT benefits from boring

773
00:37:33,680 –> 00:37:38,760
on purpose more than any other domain because IT automation isn’t just do the thing.

774
00:37:38,760 –> 00:37:43,040
It’s do the thing, then prove it worked, then record what happened.

775
00:37:43,040 –> 00:37:47,600
Logic apps can update your ITSM platform, service now, Azure DevOps, whatever your reality

776
00:37:47,600 –> 00:37:48,600
is.

777
00:37:48,600 –> 00:37:50,400
It can call graph for identity operations.

778
00:37:50,400 –> 00:37:54,280
It can integrate with endpoint tooling that can post to teams, it can send email, it can

779
00:37:54,280 –> 00:37:59,280
trigger follow-up actions and it can do it with controlled retries and clear failure parts.

780
00:37:59,280 –> 00:38:03,280
If the password reset fails due to a lockout policy, the workflow doesn’t keep guessing.

781
00:38:03,280 –> 00:38:04,520
It roots to escalation.

782
00:38:04,520 –> 00:38:08,840
If the device action fails, it captures the error, attaches it to the ticket and moves the

783
00:38:08,840 –> 00:38:10,440
case to tier two with evidence.

784
00:38:10,440 –> 00:38:11,600
This is the real win.

785
00:38:11,600 –> 00:38:14,640
You stop escalating tickets without context.

786
00:38:14,640 –> 00:38:15,760
You escalate with a record.

787
00:38:15,760 –> 00:38:20,120
Now add governance because IT is where governance either becomes real or it becomes a slide.

788
00:38:20,120 –> 00:38:25,240
You separate roles, agent designers build the conversational experience and intent rooting.

789
00:38:25,240 –> 00:38:28,160
Workflow owners build and maintain the executable pathways.

790
00:38:28,160 –> 00:38:32,600
Operators watch run history and manage failures and authentication does not equal authorization.

791
00:38:32,600 –> 00:38:36,400
The system can authenticate the agent and still restrict which tool calls are permitted

792
00:38:36,400 –> 00:38:39,440
for which scenarios, which users and which groups.

793
00:38:39,440 –> 00:38:45,040
If you let any authenticated agent call any IT tool, you just created a new tier incident

794
00:38:45,040 –> 00:38:46,040
generator.

795
00:38:46,040 –> 00:38:49,640
This is also where managed identities and least privilege stop being best practice and

796
00:38:49,640 –> 00:38:51,080
start being survival.

797
00:38:51,080 –> 00:38:55,680
No shed credentials in a workflow, no copy-paste API keys inside an agent, no temporary service

798
00:38:55,680 –> 00:38:58,720
accounts that become permanent because nobody wants to rotate them.

799
00:38:58,720 –> 00:39:01,560
Now for the part executives will actually ask for outcomes.

800
00:39:01,560 –> 00:39:06,520
In IT and HR, 20 to 40% ticket deflection is a credible range when you focus on the top

801
00:39:06,520 –> 00:39:07,760
repetitive intents.

802
00:39:07,760 –> 00:39:12,120
Not because the AI is brilliant, because the system finally stops requiring humans to coordinate

803
00:39:12,120 –> 00:39:13,120
between tools.

804
00:39:13,120 –> 00:39:15,720
And the bigger outcome is SLA protection.

805
00:39:15,720 –> 00:39:19,880
When the agent handles the standard work, humans get time back for real incidents.

806
00:39:19,880 –> 00:39:22,560
When escalations happen, they happen with context and evidence.

807
00:39:22,560 –> 00:39:26,120
When audits ask who changed what, you can answer without archaeology.

808
00:39:26,120 –> 00:39:28,800
Kentware even said it directly in the context of IT.

809
00:39:28,800 –> 00:39:31,960
IT service management always a good place to start.

810
00:39:31,960 –> 00:39:33,280
He’s not being optimistic.

811
00:39:33,280 –> 00:39:35,640
He’s describing where the economics work first.

812
00:39:35,640 –> 00:39:40,040
And once you can prove this works in IT, where metrics are unforgiving, you have a template

813
00:39:40,040 –> 00:39:41,840
you can take to every other domain.

814
00:39:41,840 –> 00:39:45,840
The same two-plane model, the same constraint tools, the same deterministic execution, the

815
00:39:45,840 –> 00:39:47,320
same traceability.

816
00:39:47,320 –> 00:39:51,120
Now the next scenario is where you find out whether your orchestration layer is real or

817
00:39:51,120 –> 00:39:52,600
just polite.

818
00:39:52,600 –> 00:39:55,760
Transactual sync across systems of record where failure isn’t annoying.

819
00:39:55,760 –> 00:39:56,760
It’s expensive.

820
00:39:56,760 –> 00:39:57,760
Snaurio 4.

821
00:39:57,760 –> 00:39:58,760
SAP.

822
00:39:58,760 –> 00:39:59,760
Dataverse.

823
00:39:59,760 –> 00:40:01,960
Lobby sync without breaking finance.

824
00:40:01,960 –> 00:40:06,200
SAP and finance adjacent systems are where just automated goes to die.

825
00:40:06,200 –> 00:40:09,560
Because the failure mode isn’t a funny demo glitch, it’s a reconciliation exercise that

826
00:40:09,560 –> 00:40:11,280
becomes someone’s full-time job.

827
00:40:11,280 –> 00:40:13,800
And here’s the pattern every enterprise recognizes.

828
00:40:13,800 –> 00:40:14,800
Pricing.

829
00:40:14,800 –> 00:40:16,000
Customer master data.

830
00:40:16,000 –> 00:40:17,400
Vendor master data.

831
00:40:17,400 –> 00:40:18,400
Product catalog.

832
00:40:18,400 –> 00:40:19,400
Cost centers.

833
00:40:19,400 –> 00:40:20,400
GL mappings.

834
00:40:20,400 –> 00:40:21,400
Pick your poison.

835
00:40:21,400 –> 00:40:24,760
The business wants a change to show up everywhere, immediately and consistently.

836
00:40:24,760 –> 00:40:26,080
But the estate is a patchwork.

837
00:40:26,080 –> 00:40:27,080
SAP.

838
00:40:27,080 –> 00:40:28,080
Dataverse.

839
00:40:28,080 –> 00:40:30,920
A few line of business apps that matter way more than they look like they should.

840
00:40:30,920 –> 00:40:34,680
And an integration layer that’s accumulated five years of temporary fixes.

841
00:40:34,680 –> 00:40:36,000
So teams try to sync.

842
00:40:36,000 –> 00:40:37,600
They build point to point calls.

843
00:40:37,600 –> 00:40:38,960
They wire up a connector.

844
00:40:38,960 –> 00:40:39,960
They do a nightly job.

845
00:40:39,960 –> 00:40:40,960
It works for a while.

846
00:40:40,960 –> 00:40:42,840
And then something fails silently.

847
00:40:42,840 –> 00:40:44,120
A request times out.

848
00:40:44,120 –> 00:40:45,960
A downstream API throttles.

849
00:40:45,960 –> 00:40:47,440
A duplicate update slips through.

850
00:40:47,440 –> 00:40:48,280
A schema changes.

851
00:40:48,280 –> 00:40:50,200
A retry replays the wrong step.

852
00:40:50,200 –> 00:40:53,160
The sync succeeds in one system and fails in another.

853
00:40:53,160 –> 00:40:55,400
And now your systems of record disagree.

854
00:40:55,400 –> 00:40:56,920
That is not a technical annoyance.

855
00:40:56,920 –> 00:40:58,880
That is financial risk.

856
00:40:58,880 –> 00:41:01,640
And this is where the two-plane model becomes non-negotiable.

857
00:41:01,640 –> 00:41:04,640
Copilot Studio can help interpret intent here.

858
00:41:04,640 –> 00:41:06,240
And yes, there is real value in that.

859
00:41:06,240 –> 00:41:08,880
A finance user doesn’t want to file an integration request.

860
00:41:08,880 –> 00:41:13,640
They want to say, sync pricing changes for these skews or update customer credit limits

861
00:41:13,640 –> 00:41:18,560
for this region or reconcile product categories between ERP and CRM.

862
00:41:18,560 –> 00:41:24,280
Copilot can translate that into structured intent, scope, criteria, timing, approval needs,

863
00:41:24,280 –> 00:41:25,840
and which systems are involved.

864
00:41:25,840 –> 00:41:29,200
But copilot should never wing it when it comes to multi-system rights.

865
00:41:29,200 –> 00:41:31,440
Because the enterprise doesn’t need a conversational update.

866
00:41:31,440 –> 00:41:33,160
It needs transactional integrity.

867
00:41:33,160 –> 00:41:36,200
So the right pattern is copilot decides what should happen.

868
00:41:36,200 –> 00:41:38,160
Logic apps ensures it happens.

869
00:41:38,160 –> 00:41:42,240
And this is where logic apps earns its keep as the execution plane.

870
00:41:42,240 –> 00:41:46,720
The workflow encodes ordering, read source of truth, compute deltas, apply updates in a

871
00:41:46,720 –> 00:41:48,920
controlled sequence and verify results.

872
00:41:48,920 –> 00:41:51,240
It encodes idempotency.

873
00:41:51,240 –> 00:41:54,440
If the same request is replayed, you don’t double apply the change.

874
00:41:54,440 –> 00:41:57,720
It encodes retries that don’t turn into accidental duplication.

875
00:41:57,720 –> 00:42:01,560
And it encodes compensating actions for the cases where a partial success is worse than

876
00:42:01,560 –> 00:42:02,560
a full failure.

877
00:42:02,560 –> 00:42:05,120
This is the kind of boring nobody claps for in a demo.

878
00:42:05,120 –> 00:42:07,760
It is also the only kind of boring finance trusts.

879
00:42:07,760 –> 00:42:09,600
Now layer in the connectivity reality.

880
00:42:09,600 –> 00:42:12,960
A lot of these systems are not meant to be exposed to the public internet.

881
00:42:12,960 –> 00:42:15,720
They live behind networks with reasons not vibes.

882
00:42:15,720 –> 00:42:18,600
This is where logic app standard and the networking options matter.

883
00:42:18,600 –> 00:42:22,800
If you need private endpoints and vnet integration so the orchestration layer can talk to internal

884
00:42:22,800 –> 00:42:26,800
systems without punching holes through your perimeter, this is where you do it.

885
00:42:26,800 –> 00:42:29,000
Executives here, private endpoint.

886
00:42:29,000 –> 00:42:30,400
And think it’s a networking detail.

887
00:42:30,400 –> 00:42:31,400
It’s not.

888
00:42:31,400 –> 00:42:32,400
It’s a trust boundary.

889
00:42:32,400 –> 00:42:37,360
It’s the difference between we integrated SAP and we exposed SAP integration to whatever

890
00:42:37,360 –> 00:42:38,800
could hit an endpoint.

891
00:42:38,800 –> 00:42:40,400
Now bring mcp into the picture.

892
00:42:40,400 –> 00:42:43,400
In this scenario mcp is not about making SAP magical.

893
00:42:43,400 –> 00:42:47,680
It’s about packaging the governed workflow as a tool the model can call without improvisation.

894
00:42:47,680 –> 00:42:51,040
So instead of giving the model a connector and hoping it can construct a correct right

895
00:42:51,040 –> 00:42:56,680
into SAP you give it a tool like sync pricing changes backed by a logic app workflow that

896
00:42:56,680 –> 00:43:01,880
does the ugly parts validation mapping sequencing retries and evidence.

897
00:43:01,880 –> 00:43:06,040
The schema forces specificity which products which effective date which price list which

898
00:43:06,040 –> 00:43:11,400
region what approval ID if required what correlation ID should be returned for audit and the output

899
00:43:11,400 –> 00:43:16,360
is structured not chatty what changed what didn’t what failed and where the evidence lives.

900
00:43:16,360 –> 00:43:20,240
This is the part most people miss the output format is governance too.

901
00:43:20,240 –> 00:43:25,400
If you return huge payloads and raw ERP responses you’re not being transparent you’re flooding

902
00:43:25,400 –> 00:43:29,880
the reasoning plane with noise so you return the minimum needed for decisions and you store

903
00:43:29,880 –> 00:43:31,600
the rest as run history.

904
00:43:31,600 –> 00:43:33,440
Now business outcomes.

905
00:43:33,440 –> 00:43:38,160
The direct benefit is fewer integration outages and fewer systems disagree incidents but

906
00:43:38,160 –> 00:43:42,200
the bigger benefit is that change becomes safer when the enterprise can trust that cross-system

907
00:43:42,200 –> 00:43:47,000
updates are ordered, idempatent and traceable you can move faster without creating reconciliation

908
00:43:47,000 –> 00:43:48,000
debt.

909
00:43:48,000 –> 00:43:52,360
And yes reconciliation debt is a real thing you pay it later with interest during quarter

910
00:43:52,360 –> 00:43:53,360
close.

911
00:43:53,360 –> 00:43:57,640
This scenario also clarifies a strategic truth AI doesn’t remove the need for integration

912
00:43:57,640 –> 00:44:02,080
engineering it exposes whether you ever had it if your estate relies on tribal knowledge

913
00:44:02,080 –> 00:44:07,840
and side channel coordination AI will amplify the inconsistency if your estate has a deterministic

914
00:44:07,840 –> 00:44:12,840
execution layer with governed tools AI will amplify throughput without amplifying risk

915
00:44:12,840 –> 00:44:16,400
that’s the difference between agente transformation and agente chaos.

916
00:44:16,400 –> 00:44:21,320
Next there’s one scenario that turns all of this into executive language instantly compliance

917
00:44:21,320 –> 00:44:26,840
evidence collection where the output isn’t automation it’s proof scenario five compliance

918
00:44:26,840 –> 00:44:31,960
evidence collection audit sell reality compliance is where strategy stops being inspirational

919
00:44:31,960 –> 00:44:36,240
and starts being accountable most executives don’t fear automation they fear the email

920
00:44:36,240 –> 00:44:40,600
from audit that says prove it prove who approved the access prove why the change was made

921
00:44:40,600 –> 00:44:44,600
prove the control operated consistently prove the data didn’t leak prove the exception

922
00:44:44,600 –> 00:44:48,760
was justified prove it across three systems that don’t agree and two teams that remember

923
00:44:48,760 –> 00:44:53,280
it differently and that’s the ugly truth in most enterprises the work is automated but

924
00:44:53,280 –> 00:44:57,840
the evidence is manual people spend weeks collecting screenshots digging through tickets exporting

925
00:44:57,840 –> 00:45:01,840
logs and stitching together a narrative that sounds plausible enough to pass not because

926
00:45:01,840 –> 00:45:06,040
anyone wants to lie because the systems were never designed to tell the story and to end

927
00:45:06,040 –> 00:45:10,240
this is where agente orchestration gets to stop being innovation and start being an operating

928
00:45:10,240 –> 00:45:14,520
model copilot studio plays the front door here but not as the system of record as the

929
00:45:14,520 –> 00:45:19,560
interface to the evidence executives ask questions like who has access to finance reporting

930
00:45:19,560 –> 00:45:24,240
and why which invoices were posted outside policy last quarter what changed in the last

931
00:45:24,240 –> 00:45:28,880
release that impacted customer data which approvals were bypassed during the outage humans

932
00:45:28,880 –> 00:45:33,360
can answer those questions slowly in meetings with caveats copilot studio can answer them

933
00:45:33,360 –> 00:45:37,800
conversationally quickly and in a way that executives will actually use because it can translate

934
00:45:37,800 –> 00:45:42,040
vague questions into structured requests but only if the execution plane can produce

935
00:45:42,040 –> 00:45:45,920
deterministic evidence that is the constraint so the pattern looks like this copilot studio

936
00:45:45,920 –> 00:45:52,080
takes the audit style question and converts it into an evidence request scope time window systems

937
00:45:52,080 –> 00:45:57,680
involved the definition of exception and what the auditor will accept as proof then it

938
00:45:57,680 –> 00:46:02,440
selects a tool that doesn’t search everything it calls an evidence assembly capability and

939
00:46:02,440 –> 00:46:06,400
logic apps does what logic apps always does when it’s used correctly it executes a boring

940
00:46:06,400 –> 00:46:10,480
repeatable process that creates a trace you can defend pull the access assignments from

941
00:46:10,480 –> 00:46:15,160
entry pull the ticket approvals from it sm pull the workflow runs that provisioned or revoked

942
00:46:15,160 –> 00:46:19,480
access pull the finance transaction logs that show postings and reversals package it into

943
00:46:19,480 –> 00:46:23,240
an evidence bundle with correlation IDs and timestamps store it where your compliance

944
00:46:23,240 –> 00:46:28,200
team expects it return a summary to the agent that is small structured and decision ready

945
00:46:28,200 –> 00:46:32,400
and here’s the architectural payoff you’re not relying on copilot’s memory of the conversation

946
00:46:32,400 –> 00:46:37,720
to be the record you’re relying on run history can’t describe it as full traceability

947
00:46:37,720 –> 00:46:41,880
inputs outputs what the user said and what the agent responded we’ve got a very complete

948
00:46:41,880 –> 00:46:45,800
picture that matters most in audits because audits are not about what your system intended

949
00:46:45,800 –> 00:46:50,080
they’re about what your system did logic apps run history becomes an audit artifact who

950
00:46:50,080 –> 00:46:54,400
triggered the workflow what inputs were supplied what tools were called what downstream systems

951
00:46:54,400 –> 00:46:58,960
responded and what the workflow returned if your agent asked for evidence the workflow

952
00:46:58,960 –> 00:47:03,640
can provide it with the same determinism every time and once you have that something changes

953
00:47:03,640 –> 00:47:08,680
culturally audit stop being a seasonal panic they become a query that’s not a small shift

954
00:47:08,680 –> 00:47:15,120
it’s executive language reduced compliance labor fewer control failures faster response

955
00:47:15,120 –> 00:47:19,480
to audit requests and less reliance on heroics also it forces a healthier boundary between

956
00:47:19,480 –> 00:47:24,360
reasoning and execution copilot can talk it can interpret it can format the answer for a human

957
00:47:24,360 –> 00:47:28,840
but the evidence comes from a deterministic system that can be replayed inspected and monitored

958
00:47:28,840 –> 00:47:33,560
that’s what governed AI actually means not trust in the model but trust in the trail

959
00:47:33,560 –> 00:47:38,360
and if you want the most cynical accurate ROI statement for compliance it’s this the business

960
00:47:38,360 –> 00:47:42,600
value isn’t that the agent can answer auditors the business value is that the enterprise

961
00:47:42,600 –> 00:47:47,800
stops paying humans to reconstruct reality after the fact governance that enable speed guard

962
00:47:47,800 –> 00:47:52,920
rails that don’t rot governance is usually presented as a break pedal that framing is why it fails

963
00:47:52,920 –> 00:47:57,560
a break pedal is something people try to avoid they root around it they temporarily bypass it

964
00:47:57,560 –> 00:48:03,000
they build side channels then governance becomes theater a slide deck about controls that were never

965
00:48:03,000 –> 00:48:09,480
enforced by design in an agentic world governance has to be an accelerator not because leaders suddenly

966
00:48:09,480 –> 00:48:14,840
love compliance because the only way to scale AI is to make the safe path the default path

967
00:48:14,840 –> 00:48:19,000
every other option is entropy with a budget line so here’s what governance looks like when it

968
00:48:19,000 –> 00:48:23,960
actually enables speed and doesn’t rot six months after launched first role separation that matches

969
00:48:23,960 –> 00:48:28,520
how the system works you need three roles and you need them because the platform will drift without

970
00:48:28,520 –> 00:48:35,240
them agent designers build the intent interface prompts conversation flows and tool selection logic

971
00:48:35,240 –> 00:48:39,960
they should not be able to change what a provision access tool can do in production workflow owners

972
00:48:39,960 –> 00:48:46,200
build the execution plane logic apps workflows tool schemas retries compensations and the integration

973
00:48:46,200 –> 00:48:50,920
contracts they should not be writing the conversational layer operators run the estate monitoring

974
00:48:50,920 –> 00:48:55,240
incident response and evidence production they should not be editing workflows in the middle of

975
00:48:55,240 –> 00:48:59,800
an outage because someone asked nicely that’s our back as an operating model not our back as a

976
00:48:59,800 –> 00:49:04,520
checkbox and if you don’t do it you will get privileged sprawl you will get everyone is a maker

977
00:49:04,520 –> 00:49:10,360
access drift you will get production edited from a browser tab at 11 p.m second managed identity as

978
00:49:10,360 –> 00:49:15,800
the default not as a nice when we have time upgrade if an automation can run only because somebody

979
00:49:15,800 –> 00:49:21,080
copied a client secret into a connection you have not built a system you’ve built a hostage situation

980
00:49:21,080 –> 00:49:26,600
managed identities are how you keep execution boring no secrets no shared credentials no rotated

981
00:49:26,600 –> 00:49:31,400
keys that nobody rotates it also gives you something executives care about when they eventually ask

982
00:49:31,400 –> 00:49:37,240
who had access to do that because the identity is explicit scoped and auditable third tenant

983
00:49:37,240 –> 00:49:42,200
and environment isolation that reflects reality dev test and prod aren’t best practice they are

984
00:49:42,200 –> 00:49:46,360
entropy containment agent behavior will change prompts will change tools will evolve connectors will

985
00:49:46,360 –> 00:49:51,000
get updated models will get updated if you don’t isolate environments you’ve created a single

986
00:49:51,000 –> 00:49:56,760
shared blast radius where experimentation and production share the same failure modes so you isolate

987
00:49:56,760 –> 00:50:03,000
not by duplicating intelligence but by promoting vetted artifacts tool contracts workflows policies

988
00:50:03,000 –> 00:50:08,520
build once then promote through environments with controlled change fourth network boundaries early

989
00:50:08,520 –> 00:50:13,480
not as a retrofit if you wait until after the pilot to ask should this traffic stay private

990
00:50:13,480 –> 00:50:17,880
you’ve already chosen public exposure you just haven’t admitted it logic app standard and

991
00:50:17,880 –> 00:50:23,000
private endpoints exist for a reason enterprises have systems that cannot be internet adjacent and

992
00:50:23,000 –> 00:50:27,640
when you’re feeding those systems through agente pathways you don’t get to pretend the network is

993
00:50:27,640 –> 00:50:32,760
someone else’s problem private endpoints keep internal traffic internal vnet integration keeps the

994
00:50:32,760 –> 00:50:37,480
orchestration layer on the right side of your perimeter and yes it’s slower to set up at first it’s

995
00:50:37,480 –> 00:50:42,920
faster than rebuilding everything after security says no fifth dlp as the line between reasoning

996
00:50:42,920 –> 00:50:47,560
and movement copilot studio can reason across a lot of information that’s the point but workflows

997
00:50:47,560 –> 00:50:53,480
decide what can move where so you treat dlp policies as rooting rules for data movement not as abstract

998
00:50:53,480 –> 00:50:58,280
restrictions you define which connectors can exchange which data classes you define where sensitive

999
00:50:58,280 –> 00:51:03,240
data can be written you define what can be summarized versus what can be exported this is how you stop

1000
00:51:03,240 –> 00:51:09,400
helpful from becoming x filtration finally authorization beyond authentication enterprises love

1001
00:51:09,400 –> 00:51:14,040
saying it’s protected by entra that’s only the first gate authenticated doesn’t mean authorized

1002
00:51:14,040 –> 00:51:18,600
authorize doesn’t mean least privilege least privilege doesn’t mean safe tool design so you enforce

1003
00:51:18,600 –> 00:51:24,120
authorization at the execution plane which tools can be called by which agents on behalf of which

1004
00:51:24,120 –> 00:51:29,800
uses for which scopes under which conditions and you log it as evidence not as best effort this is

1005
00:51:29,800 –> 00:51:34,680
the uncomfortable truth policy will erode wherever enforcement is optional so you make enforcement

1006
00:51:34,680 –> 00:51:40,200
structural you publish constrained tools you root execution through deterministic workflows you

1007
00:51:40,200 –> 00:51:44,920
isolate environments you remove secrets you keep the network private and you keep the run history

1008
00:51:44,920 –> 00:51:49,400
as the truth source because governance that works is not something people remember to do it’s

1009
00:51:49,400 –> 00:51:55,000
what the architecture refuses to let them avoid operating model build ones reuse everywhere most

1010
00:51:55,000 –> 00:52:00,200
enterprises don’t lose to technology they lose to duplication one team builds a sales force connector

1011
00:52:00,200 –> 00:52:04,440
solution another team builds the same thing slightly differently because they couldn’t find the

1012
00:52:04,440 –> 00:52:09,640
first one couldn’t trust it or couldn’t use it without begging for access six months later you don’t

1013
00:52:09,640 –> 00:52:13,480
have an integration strategy you have a museum of near identical artifacts and now you’re about to

1014
00:52:13,480 –> 00:52:18,520
do the same thing with agents so this section is the operating model how you stop agentic work from

1015
00:52:18,520 –> 00:52:23,480
becoming a new layer of sprawl the rule is simple build ones reuse everywhere but that only works if

1016
00:52:23,480 –> 00:52:28,200
you treat tools as products not as project outputs that means you need a catalog not a folder not a

1017
00:52:28,200 –> 00:52:34,440
team’s post not ask bob a catalog with ownership visibility and a life cycle this is why api center

1018
00:52:34,440 –> 00:52:39,080
shows up in Kent’s story as more than a wizard it’s the discoverability layer that prevents your

1019
00:52:39,080 –> 00:52:43,880
mcp servers from becoming that thing someone built in a subscription nobody monitors and he called

1020
00:52:43,880 –> 00:52:48,760
api center a central hub to stop your api sprawl that’s not marketing that’s the problem statement

1021
00:52:48,760 –> 00:52:53,480
because mcp servers without a catalog are just better hidden endpoints and hidden endpoints are

1022
00:52:53,480 –> 00:52:57,880
how governance dies now practically there are three catalog shaped paths in the Microsoft estate

1023
00:52:57,880 –> 00:53:03,560
that all converge on the same idea first api center is the enterprise catalog for api’s and mcp

1024
00:53:03,560 –> 00:53:08,280
servers it’s where you register describe and publish what exists it’s where admins can see what’s

1025
00:53:08,280 –> 00:53:12,840
out there and developers can discover what they’re allowed to reuse and yes it’s also where you can

1026
00:53:12,840 –> 00:53:18,280
start small Kent mentioned the free tier with a limit of up to 200 registered assets that’s enough

1027
00:53:18,280 –> 00:53:23,080
runway for most organizations to prove the model without turning procurement into a blocker second

1028
00:53:23,080 –> 00:53:28,040
foundry’s tools catalog this is the agent builder’s view of the same reality it’s where teams go when

1029
00:53:28,040 –> 00:53:32,680
they want to add capability fast but still through a governed pathway what matters here isn’t the

1030
00:53:32,680 –> 00:53:37,960
UI what matters is that the tool gets created as an mcp server with consistent security and packaging

1031
00:53:37,960 –> 00:53:43,720
so it becomes reusable across agents not embedded into one build third native logic apps where the actual

1032
00:53:43,720 –> 00:53:48,680
execution lives this is where the workflows exist the run history exists and the operational

1033
00:53:48,680 –> 00:53:53,560
reality gets owned the catalog is just the storefront logic apps is the factory these aren’t

1034
00:53:53,560 –> 00:53:57,800
competing approaches they’re different entry points to the same operating model and once you accept

1035
00:53:57,800 –> 00:54:03,960
that your strategy becomes less about which portal do we prefer and more about how do we enforce reuse

1036
00:54:03,960 –> 00:54:08,680
now reuse fails for predictable reasons and you can design around them the first is discoverability

1037
00:54:08,680 –> 00:54:13,000
if people can’t find the tool they rebuild it the second is trust if people can’t see how the tool

1038
00:54:13,000 –> 00:54:17,800
behaves they don’t bet their process on it the third is friction if consuming the tool requires a

1039
00:54:17,800 –> 00:54:22,680
weeks long security negotiation teams will route around it so you solve these with an enterprise posture

1040
00:54:22,680 –> 00:54:27,720
that is boring and explicit every mcp server gets an owner every tool gets a description that matches

1041
00:54:27,720 –> 00:54:32,040
business verbs not platform verbs every tool gets a schema that constraints inputs and constraints

1042
00:54:32,040 –> 00:54:37,400
outputs every tool gets versioning and change control because we updated the workflow is not an

1043
00:54:37,400 –> 00:54:42,200
acceptable release note when the workflow is now the execution plane for multiple agents

1044
00:54:42,200 –> 00:54:47,800
and every tool gets an operational contract how it’s monitored how failures route how evidence is

1045
00:54:47,800 –> 00:54:53,080
stored how changes are deployed now testing is the part everyone skips until the first outage can

1046
00:54:53,080 –> 00:54:57,800
mention the logic apps unit testing framework that is GA and the detail that matters isn’t the

1047
00:54:57,800 –> 00:55:02,840
framework itself it’s the posture you don’t treat workflows as low code art you treat them as

1048
00:55:02,840 –> 00:55:08,440
production assets testable promotable and regression safe because when your mcp server is backed by

1049
00:55:08,440 –> 00:55:13,240
a workflow a workflow changes a tool change and a tool change is now a business risk so you build

1050
00:55:13,240 –> 00:55:19,240
smoke tests in vscode you validate tool schemas you test failure paths you test timeouts you test the

1051
00:55:19,240 –> 00:55:23,640
what happens when sales force throttles scenario because that’s not hypothetical it’s Tuesday

1052
00:55:23,640 –> 00:55:29,400
if you want a single executive framing for this operating model it’s this the roi doesn’t come from

1053
00:55:29,400 –> 00:55:34,200
smarter a i it comes from fewer humans coordinating between systems and fewer teams rebuilding the

1054
00:55:34,200 –> 00:55:39,080
same governed capabilities catalogs make capabilities visible logic apps makes execution reliable

1055
00:55:39,080 –> 00:55:44,120
mcp makes those capabilities portable across agent platforms and once that’s true every new agent

1056
00:55:44,120 –> 00:55:49,480
stops being a bespoke integration project it becomes a consumer of a shared enterprise tool chain

1057
00:55:49,480 –> 00:55:55,240
executive decision checklist where this goes wrong and how to prevent it executives don’t need

1058
00:55:55,240 –> 00:55:59,800
another architecture diagram they need a checklist that predicts failure so here it is the five ways

1059
00:55:59,800 –> 00:56:04,600
this goes wrong and what prevents it mistake one treating mcp like just another connector

1060
00:56:05,720 –> 00:56:11,320
that creates tools brawl 50 overlapping tools with vague names vague schemas and nobody who can explain

1061
00:56:11,320 –> 00:56:17,000
which one is safe prevention is boring publish a small curated tool catalog backed by owned workflows

1062
00:56:17,000 –> 00:56:22,920
then enforce reuse through the catalog not tribal knowledge mistake two letting a i write directly

1063
00:56:22,920 –> 00:56:27,880
to systems of record without an execution plane that’s not automation that’s uncontrolled

1064
00:56:27,880 –> 00:56:33,320
mutation prevention is the two plane model copilot reasons logic apps executes if it can’t be traced

1065
00:56:33,320 –> 00:56:38,840
it doesn’t run mistake three skipping discoverability if people can’t find a standard tool they’ll rebuild

1066
00:56:38,840 –> 00:56:43,720
it if they can’t trust it they’ll bypass it prevention is a catalog with ownership versioning

1067
00:56:43,720 –> 00:56:48,920
and a life cycle api center foundry catalog whatever your front door is the tool has to be

1068
00:56:48,920 –> 00:56:54,040
discoverable and governable or it doesn’t exist mistake four ignoring networking and identity

1069
00:56:54,040 –> 00:56:58,840
until after the pilot that’s how pilots die in security review prevention is designing with

1070
00:56:58,840 –> 00:57:04,600
private endpoints managed identity and environment isolation from day one you don’t retrofit trust

1071
00:57:04,600 –> 00:57:11,720
boundaries you enforce them mistake five exposing generic do everything tools create record is not a

1072
00:57:11,720 –> 00:57:16,440
tool it’s an entropy generator prevention is designing tools as constrained business verbs with

1073
00:57:16,440 –> 00:57:20,600
explicit inputs and constrained outputs and that’s how you stop guessing from becoming writing now

1074
00:57:20,600 –> 00:57:28,440
the decision framework start in one domain where pain is obvious and measurement is easy i t sm or h r

1075
00:57:28,440 –> 00:57:33,880
build one mcp server backed by logic apps workflows publish it in a catalog use it from copilot studio

1076
00:57:33,880 –> 00:57:38,440
proof traceability and approval boundaries then scale by reuse not by cloning that’s how you avoid

1077
00:57:38,440 –> 00:57:45,000
conditional chaos the positive thesis the future isn’t smarter chat it’s governed execution copilot

1078
00:57:45,000 –> 00:57:50,520
studio turns intent into decisions and logic apps turns decisions into controlled auditable action

1079
00:57:50,520 –> 00:57:54,440
if you want the governance patterns that keep this from turning into tools brawl watch the next

1080
00:57:54,440 –> 00:57:59,240
next episode and subscribe because this is where Enterprise AI either scales or breaks.





Source link

0 Votes: 0 Upvotes, 0 Downvotes (0 Points)

Leave a reply

Top Headlines
    Join Us
    • X Network2.1K
    • LinkedIn3.8k
    • Bluesky0.5K
    Support The Site
    Events
    February 2026
    MTWTFSS
           1
    2 3 4 5 6 7 8
    9 10 11 12 13 14 15
    16 17 18 19 20 21 22
    23 24 25 26 27 28  
    « Jan   Mar »
    Follow
    Search
    Loading

    Signing-in 3 seconds...

    Signing-up 3 seconds...

    Discover more from 365 Community Online

    Subscribe now to keep reading and get access to the full archive.

    Continue reading