Share via


Manage Viva Glint Copilot access in Microsoft 365 admin center

Important

  • To unify AI governance across Microsoft 365, Viva Glint Copilot access management is moving to Microsoft’s enterprise AI governance platform. This change provides a more consistent and centralized Copilot management experience across Microsoft 365.
  • Beginning in March 2026 and completing by the end of April 2026, Copilot access management for Viva Glint will migrate to the Microsoft 365 admin center, which will become the single point of control for Copilot enablement across all Viva apps. As part of this change, Copilot access controls currently available in the Viva Glint admin UI—such as per survey program and per user role settings—will be retired.
  • For additional context on this change, see the Microsoft 365 Roadmap.

Overview

This document describes how to enable and manage Microsoft 365 Copilot in Viva Glint using Viva Feature Access Management (VFAM) within Microsoft 365 admin center, including how access is configured, evaluated, and kept up to date over time. It is intended for administrators responsible for tenant‑level Copilot enablement and Viva Glint access governance.

What this document covers

  • User access
  • User prerequisites
  • Microsoft 365 admin center access control
  • Dynamic Entra groups
  • Feature enable scenarios
  • Policy precedence and conflict resolution
  • FAQs

How user access is determined

Copilot access in Viva Glint isn’t set by manually adding users to a list. Instead, Viva Glint evaluates access automatically using Microsoft Entra ID users and the groups they belong to in Entra.

  • VFAM policies can be scoped to:
    • All users
    • Individual users
    • Microsoft Entra security groups, Microsoft 365 groups, or distribution groups
  • When policies are scoped to dynamic Entra groups, user access automatically updates as:
    • Employees join or leave the organization
    • User attributes change and group membership is recalculated
  • No manual updates to VFAM policies are required when group membership changes, which helps reduce administrative overhead and keeps Copilot access aligned with organizational structure and governance needs

Prerequisites

Copilot in Viva Glint is enabled in the Microsoft 365 admin center. This feature can be managed by:

For more information on Microsoft 365 admin center roles, see Viva Glint and Microsoft 365 admin center access by role

Relationship to Viva Glint user roles

In addition to Microsoft 365 Copilot enablement, users must meet Viva Glint user role prerequisites to access specific Copilot features.

Dynamic Entra groups

Dynamic groups automatically add or remove users based on defined user attributes, and group membership is recalculated by the Entra service when those attributes change.

When a VFAM policy is scoped to a dynamic Entra group, policy scope changes automatically as group membership changes, because VFAM relies on the group membership provided by Entra ID.

Dynamic Entra groups are particularly useful for targeting Copilot access to specific organizational cohorts without manual list maintenance. Common scenarios include:

  • Role-based access: Create groups for HR Business Partners, senior leaders, or managers in specific departments based on job title or department attributes
  • Regional rollouts: Target employees by office location or country/region to enable phased deployments
  • Pilot groups: Combine multiple attributes (e.g., "managers in Marketing with 5+ direct reports") for controlled testing

Creating Entra groups for Copilot policies

If your organization doesn't already have Entra groups matching your Copilot rollout needs (e.g., a group for all HRBPs), you can create new dynamic Entra groups in the Microsoft Entra admin center based on user attributes such as job title, department, or manager status.

You only need to create Entra groups for users who require different Copilot access than your organization-wide default. You do not need to recreate all existing Viva Glint user roles as Entra groups.

Relationship to Viva Glint user roles

Microsoft Entra groups and Viva Glint user roles serve different purposes and are managed separately:

  • Entra groups control which users can access Copilot in Viva Glint (enablement)
  • Viva Glint user roles control what data users can see and which reports they can access (permissions)

Note

VFAM policies only affect Copilot feature enablement. They do not replace or modify existing Viva Glint user role permissions, data access, or other configurations within Viva Glint.

For more information on creating and managing dynamic groups in Microsoft Entra, see Create or update a dynamic group in Microsoft Entra ID

Control access in the Microsoft 365 admin center

Microsoft 365 global admins, Viva Glint Tenant Admins, and AI Admins can control the availability of Copilot in Viva Glint with VFAM

To manage access for Viva Glint Copilot in the Microsoft 365 admin center:

  1. Go to the Microsoft 365 admin center.

  2. Select Settings in the menu on the left and select Viva.

  3. Select Viva Glint and choose Manage settings for Microsoft Copilot in Viva Glint. The Manage Microsoft Copilot in Viva Glint pane appears.

    Manage Microsoft Copilot in Viva Glint pane in the Microsoft 365 admin center.

There are three common scenarios for managing access to Copilot in Viva Glint:

  • Scenario 1: Enable for all Viva Glint users (default configuration)
  • Scenario 2: Disable at tenant level and enable only for specific people and groups
  • Scenario 3: Enable at tenant level and disable for specific people and groups

Scenario 1: Enable for all Viva Glint users (default configuration)

When to use this scenario

Use this scenario when:

  • You want all users with appropriate Viva Glint user role permissions to access Copilot features
  • You do not need to restrict access based on user groups

Steps

  1. Go to the Microsoft 365 admin center.

  2. Select Settings > Viva.

  3. Select Viva Glint and choose Manage settings for Microsoft Copilot in Viva Glint.

  4. In the Manage Microsoft Copilot in Viva Glint pane, select Manage in the Org-wide setting section.

  5. Choose On.

  6. Select Save.

    Note

    When the organization-wide setting is On and no custom policies exist, all users who meet the Viva Glint user role prerequisites can access Copilot features.

    Result

    • Users with Comments Report access can use comment summarization.
    • Users with Dashboard and Reports access can use Copilot Highlights.
    • Access applies only to Recurring or Ad hoc survey programs.

Scenario 2: Disable at tenant level and enable only for specific people and groups

When to use this scenario

Use this scenario when:

  • You are piloting Copilot with a limited group before broader rollout
  • You want to grant access only to specific departments or teams (for example, HR, senior leadership)
  • Your organization requires controlled access for compliance or governance reasons

Steps

Step 1: Disable the organization-wide setting

  1. Go to the Microsoft 365 admin center.
  2. Select Settings > Viva.
  3. Select Viva Glint and choose Manage settings for Microsoft Copilot in Viva Glint.
  4. In the Manage Microsoft Copilot in Viva Glint pane that appears, select Manage in the Org-wide setting section.
  5. Choose Off.
  6. Select Save.

Step 2: Create a custom policy to enable for specific groups

  1. In the same Manage Microsoft Copilot in Viva Glint pane, select Create policy in the Custom policies for people or groups section.

  2. Enter a descriptive name in the Policy name field (e.g., "Enable Copilot for HR Team").

  3. Select On for specific people.

  4. In the Add the people or groups this policy applies to field, search for and add the Microsoft Entra security groups or individual users who should have access.

  5. Select Save.

    Create a new custom VFAM policy to enable Copilot for specific people or groups.

Tip

Create multiple custom policies if you need to enable access for different groups at different times. Each policy can target different Microsoft Entra security groups.

Result

  • Copilot in Viva Glint is disabled for all users by default
  • Only users in the specified Microsoft Entra security groups (and meeting Viva Glint user role prerequisites) can access Copilot features
  • Users not in the specified groups see no Copilot features in Viva Glint, regardless of their user role permissions

Scenario 3: Enable at tenant level and disable for specific people and groups

When to use this scenario

Use this scenario when:

  • You want to enable Copilot broadly but exclude specific regions or user groups (for example, European users pending works council approval)
  • You need to temporarily restrict access for certain departments while they complete governance reviews
  • You want to disable access for specific user groups due to data sensitivity or compliance requirements

Steps

Step 1: Enable the organization-wide setting

  1. Go to the Microsoft 365 admin center.
  2. Select Settings > Viva.
  3. Select Viva Glint and choose Manage settings for Microsoft Copilot in Viva Glint.
  4. In the Manage Microsoft Copilot in Viva Glint pane that appears, select Manage in the Org-wide setting section.
  5. Choose On.
  6. Select Save.

Step 2: Create a custom policy to disable for specific groups

  1. In the same Manage Microsoft Copilot in Viva Glint pane, select Create policy in the Custom policies for people or groups section.

  2. Enter a descriptive name in the Policy name field (e.g., "Disable Copilot for European Users").

  3. Select Off for specific people.

  4. In the Add the people or groups this policy applies to field, search for and add the Microsoft Entra security groups or individual users who should NOT have access.

  5. Select Save.

    Create a new custom VFAM policy with Copilot access set to Off for specific people or groups.

    Important

    Custom policies override the organization-wide setting. Users in groups with an "Off" policy will not have access to Copilot in Viva Glint, even if the organization-wide setting is "On".

Result

  • Copilot in Viva Glint is enabled for all users by default
  • Users in the specified Microsoft Entra security groups (designated as "Off") cannot access Copilot features, regardless of their Viva Glint user role permissions
  • All other users who meet the Viva Glint user role prerequisites can access Copilot features

Policy precedence and conflict resolution

When multiple policies exist, VFAM follows this precedence order:

  • Custom "Off" policies take highest precedence. If a user is in any group with an "Off" policy, they cannot access Copilot in Viva Glint.
  • Custom "On" policies take second precedence. If a user is in a group with an "On" policy and not in any "Off" policy group, they can access Copilot.
  • Organization-wide setting applies only to users not covered by any custom policy.

Example

  • Organization-wide setting: On
  • Custom policy 1: On for "HR Team" group
  • Custom policy 2: Off for "European Users" group

Results:

  • A user in the "European Users" group cannot access Copilot, even if they are also in the "HR Team" group ("Off" policy takes precedence)
  • A user in the "HR Team" group who is not in the "European Users" group can access Copilot
  • A user in neither group can access Copilot (organization-wide setting applies)

FAQ

Do VFAM Copilot policies automatically stay up to date as employees join or leave?

Yes. When Copilot access is controlled using Microsoft Entra users or groups through Viva Feature Access Management (VFAM), access is evaluated based on the current membership of those Entra users or groups. VFAM policies do not store a static list of users; they apply to the users who are in scope at the time the policy is evaluated.

How does VFAM determine who is in scope?

VFAM policies can be scoped to:

  • All users
  • Specific users
  • Microsoft Entra security groups, Microsoft 365 groups, or distribution groups

VFAM uses the group or user objects as defined in Microsoft Entra ID to determine who the policy applies to.

What happens when users are added or removed in Entra?

New users

  • If a user is added to an Entra group that is included in a VFAM policy, that user becomes subject to the policy once group membership is processed in Entra ID.
  • No change to the VFAM policy itself is required.

User removal or departure

  • If a user is removed from the Entra group or the user object is removed from Entra ID, that user is no longer in scope for the VFAM policy.
  • VFAM continues to evaluate scope based on the current Entra state.