Two platforms. Very different security models. This page is your condensed security handbook for both โ what controls apply, what the gaps are, and what to do first.
The security controls, gaps, and runbooks are fundamentally different depending on which platform your agents run on. Start here to make sure you're looking at the right controls.
| Security Control | Copilot Studio | Microsoft Foundry |
|---|---|---|
| Entra Agent ID | โ ๏ธ Modern agents only โ most existing deployments are Classic and excluded | โ Supported โ agents are Entra identities by default |
| Conditional Access for Agents | โ Does NOT apply to Copilot Studio agents | โ Applies โ OAuth 2.0 Agent ID authentication |
| ID Protection for Agents | โ Classic agents only โ Modern agents supported | โ Supported |
| Identity Governance (lifecycle) | โ ๏ธ Modern agents only | โ Supported via Entra ID Governance |
| Defender real-time protection | โ Copilot Studio agents (Defender for Cloud Apps) | โ Defender for Cloud AI security posture |
| Sentinel analytics rules | โ AIAgentsInfo table queries | โ Azure Monitor + App Insights tables |
| Prompt Shield / Content Safety | โ Built-in via M365 Copilot layer | โ Content Safety SDK โ opt-in per agent |
| DLP / Purview | โ DLP for M365 Copilot (GA March 31 2026) | โ Azure data governance applies |
| Inventory / discovery | โ Agent 365 + AIAgentsInfo table | โ ๏ธ Azure Resource Manager + Entra Agent ID โ no unified agent-level inventory table equivalent |
| Logging โ default state | โ Some data in AIAgentsInfo automatically | โ ๏ธ Nothing collected by default โ all logging is opt-in |
| Red teaming | โ ๏ธ No native Copilot Studio red teaming tool | โ AI Red Teaming Agent in Microsoft Foundry |
| Supply chain scanning | โ ๏ธ Limited โ connector risk is the main vector | โ Defender for Cloud CSPM, AI model scanning |
Every Copilot Studio agent uses one of five authentication patterns. The pattern determines the risk level, what controls apply, and how you detect it.
UserAuthenticationType == "Integrated"
AgentToolsDetails.mode == "Maker"
HTTP Request + delegated token
HTTP to graph.microsoft.com + client creds
Entra ID Governance lifecycle required
Most existing Copilot Studio deployments are Classic agents. They authenticate as service principals or via OBO โ not as modern Agent ID identities. This means CA for Agents, ID Protection for Agents, and Entra lifecycle governance do not apply. The entire Entra security product stack Microsoft markets for agent security only works with Modern agents.
Microsoft does not clearly document this distinction in its product marketing. Most security teams assume that purchasing Entra Agent ID or enabling CA for Agents covers their Copilot Studio estate. It does not โ unless agents have been specifically created as Modern agents using the Agent ID framework. Field research confirms this is the default state of most enterprise Copilot Studio deployments.
Run these in Defender Advanced Hunting to get immediate visibility. Any result from Query 1 or 2 is a critical finding.
| Gap | Risk | Interim Mitigation |
|---|---|---|
| Classic agents outside Entra perimeter | โ ๏ธ Critical | Inventory via AIAgentsInfo; enforce end-user auth in Power Platform admin; manually recreate critical agents as Modern |
| Any user can change another agent's auth type to None | โ ๏ธ Critical | Deploy change-detection Sentinel Analytics Rule; restrict Copilot Studio access via Managed Environments |
| Maker credentials blast radius | โ ๏ธ High | Enforce end-user auth per agent; PAM hygiene on developers who build agents; audit via Query 3 above |
| Portal inventory count inconsistency | โ ๏ธ High | Trust AIAgentsInfo table as primary source; treat portal counts as approximate |
| Agent sprawl โ no lifecycle enforcement | โ ๏ธ High | Assign owners to all agents; use access packages for time-bound permissions; quarterly AIAgentsInfo audit |
Microsoft Foundry uses a layered resource model that most teams bolt security onto after deployment โ when the decisions that matter most are already harder to change.
Foundry generates telemetry across four distinct layers. The Activity Log is the only one that requires no configuration. Everything else is opt-in and off by default.
| Layer | What it captures | Default state | SecOps priority |
|---|---|---|---|
| Layer 1 ยท Activity Log | Resource CRUD, RBAC changes, key rotation, network config, model deployments | โ Automatic | โญโญโญ Essential โ route to Sentinel |
| Layer 2a ยท Diagnostic Settings (Resource) | Audit (data plane access), RequestResponse (inference metadata โ no prompt content), AzureOpenAIRequestUsage, Trace | โ Off by default โ explicit opt-in per resource | โญโญโญ Enable Audit + RequestResponse for SecOps |
| Layer 2b ยท Diagnostic Settings (Project) | Audit (agent operations โ runs, file uploads, evaluations), Trace, AllMetrics | โ Off by default โ separate config per project | โญโญโญ Enable Audit per project โ does NOT inherit from resource |
| Layer 3 ยท Application Insights | Full agent runtime traces, tool call chains, prompt + completion content (if enabled), exceptions, dependencies | โ Off by default โ SDK connection per project | โญโญ Enable for agent-level behavioural visibility |
| Identity ยท Entra ID logs | Non-interactive sign-ins, service principal sign-ins, agent lifecycle events | โ Tenant-level diagnostic setting โ separate config | โญโญโญ Required โ without this, agent auth plane is a blind spot |
1. Diagnostic Settings don't cascade. Settings configured at the Foundry resource level do NOT apply to projects. Every new project needs its own separate Diagnostic Settings configuration โ or you accept the gap silently.
2. RequestResponse does not contain prompt content. By design. If investigation requires content-level visibility, Application Insights with content capture enabled is the only source โ but enabling AZURE_TRACING_GEN_AI_CONTENT_RECORDING_ENABLED creates direct responsibility for storage, access controls, and retention of potentially sensitive data (PII, secrets, business data).
Copilot Studio content: field research by Derk van der Woude (Microsoft Security MVP) ยท Microsoft Entra security for AI overview (April 2026) ยท Microsoft Zero Trust Assessment Workshop AI section.
Microsoft Foundry logging: Cyphora.io โ Microsoft Foundry Logging (April 2026) ยท Microsoft Learn documentation.