Nóta
Aðgangur að þessari síðu krefst heimildar. Þú getur prófað aðskrá þig inn eða breyta skráasöfnum.
Aðgangur að þessari síðu krefst heimildar. Þú getur prófað að breyta skráasöfnum.
Important
You need to be part of the Frontier preview program to get early access to Microsoft Agent 365. Frontier connects you directly with Microsoft’s latest AI innovations. Frontier previews are subject to the existing preview terms of your customer agreements. As these features are still in development, their availability and capabilities may change over time.
Learn about the Microsoft Agent 365 capabilities that Microsoft Entra provides for agent identity.
Agent registry and management
Microsoft Entra Agent ID consolidates all agents into a single registry. You can build a complete inventory of all the agents in your organization and manage them in the Microsoft 365 admin center. The agent registry helps you:
- Manage lifecycle: Govern agents from creation through runtime and deactivation. Assign sponsors and managers for continuous monitoring.
- IT-defined guardrails: Define who can create, onboard, and manage agents. Define standard security policies using agent identity blueprints to accelerate rollout with predefined guardrails.
Observability and compliance
Provide role-specific observability over agents and their actions. Stay compliant and audit ready with detailed logging and reporting capabilities. Gain visibility into performance, quality, and speed and effectiveness of an agent to complete the given task.
- Role-specific observability: Provide role-specific observability over agents and their actions to the right people with the right view of agent fleet and prioritized metrics for each individual role.
- System primitives: Get consistent cross-functional agent oversight with system primitives like a single-agent registry, unified traceability schema, consistent logging, agent blueprints, policy templates, and shared signals.
Access and data security
Protect resources with conditional access and enforce least-privilege access. As agents create and use data in their workflows, safeguard sensitive data from oversharing and prevent leaks and risky agent behavior.
- Conditional access: Enforce real-time, intelligent access decisions based on agent context, access conditions you define, and the resource they're trying to access.
- Access governance: Enforce least-privilege access by only giving agents access rights to the apps and resources they need to complete their tasks.
Posture and threat protection
Protect agents from threats with a defense-in-depth approach. Block risky agents, filter out malicious traffic, and respond to attacks fast.
Runtime defense: Use AI-powered intelligence to block prompt injection attacks and prevent data exfiltration in real-time.