You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Real-time protection during agent runtime for Microsoft Copilot Studio AI agents (Preview)
3
+
description: Learn how to enable and manage real-time runtime protection for Microsoft Copilot Studio AI agents using Microsoft Defender.
4
+
ms.date: 08/12/2025
5
+
ms.topic: how-to
6
+
ms.service: defender-for-cloud-apps
7
+
ms.reviewer: gayasalomon
8
+
#customer-intent: As a security administrator, I want my Copilot Studio AI agents to be protected against suspicious or harmful actions during runtime so that I can reduce security risks to my organization.
9
+
---
10
+
11
+
# Real-time protection during agent runtime for Microsoft Copilot Studio AI agents (Preview)
12
+
13
+
14
+
## Overview
15
+
16
+
As AI agents become increasingly accessible through low-code/no‑code (LCNC) platforms like Microsoft Copilot Studio, organizations face new types of security risks at scale. These platforms empower non‑technical users to build and deploy custom agents without centralized security review or controls in place. Attackers can attempt to manipulate these agents by injecting malicious prompts, triggering unintended tool executions, or exploiting data sources to escalate privileges or exfiltrate data.
17
+
18
+
## Capabilities
19
+
20
+
Real-time protection during agent runtime in Microsoft Defender reduces these risks by inspecting user messages before the agent runs any actions.
21
+
22
+
If Microsoft Defender determines that a prompt is suspicious:
23
+
24
+
- The tool invocation is blocked before it runs.
25
+
- The user gets notified that their message was blocked.
26
+
- An informative alert is created and appears in the Microsoft Defender portal under XDR Incidents and Alerts.
27
+
28
+
29
+
This capability adds another security layer on top of Microsoft Copilot Studio, helping ensure AI agents remain resilient against evolving threats.
30
+
31
+
> [!NOTE]
32
+
> Real-time protection during agent runtime currently supports only AI agents created with Microsoft Copilot Studio custom engine.
33
+
34
+
35
+
## Prerequisites
36
+
37
+
Before enabling real-time agent protection during runtime, make sure:
38
+
39
+
- You have a valid Microsoft Defender for Cloud Apps license (included in Microsoft 365 E5 Security).
40
+
41
+
- You have Security Administrator privileges in the Microsoft Defender portal.
42
+
43
+
44
+
> [!NOTE]
45
+
> The onboarding process for real-time protection during agent runtime involves configuration in Power Platform and collaboration with other administrators.
46
+
47
+
48
+
## Turn on real-time protection during agent runtime
49
+
50
+
The following steps describe the Security Administrator’s required actions to enable real-time protection during agent runtime.
51
+
52
+
1.**Sign in to the [Microsoft Defender portal](https://security.microsoft.com)**:
53
+
1. Navigate to **System > Settings > Cloud Apps > Copilot Studio AI Agents**.
54
+
1. Check the Microsoft 365 App Connector status:
55
+
-**If the connector is already connected:** Continue to step 5.
56
+
-**If the connector isn’t connected:**
57
+
- Under **Microsoft 365 connector**, select **Connect** or **Edit**.
58
+
- Select **Microsoft Entra ID Management events** and **Microsoft 365 activities**.
59
+
- Select **Connect Microsoft 365**
60
+
61
+
> [!IMPORTANT]
62
+
> If the Microsoft 365 connector isn’t properly connected, real-time agent protection during runtime continues to block suspicious activity on the AI agent. Alerts and incidents related to these actions won't show in the Microsoft Defender portal.
63
+
64
+
1. Make sure to collaborate with the following administrators:
65
+
66
+
- The **Microsoft Entra Administrator** needs to create [a Microsoft Entra ID application](/microsoft-copilot-studio/external-security-provider?branch=main&branchFallbackFrom=pr-en-us-1020#step-1-configure-microsoft-entra-application) and configure a Federated Identity Credential (FIC) using the URL provided in the Microsoft Defender portal. For more information, see: [Authorize the Microsoft Entra application with your provider of choice](/microsoft-copilot-studio/external-security-provider?branch=main&branchFallbackFrom=pr-en-us-1020#authorize-the-microsoft-entra-application-with-your-provider-of-choice).
67
+
68
+
- The **Power Platform Administrator** needs to enter the Application ID and URL in the Power Platform settings page. For more information see: [Enable external threat detection and protection for Copilot Studio custom agents](/microsoft-copilot-studio/external-security-provider?branch=main&branchFallbackFrom=pr-en-us-1020#authorize-the-microsoft-entra-application-with-your-provider-of-choice).
69
+
1. Enter the App ID provided by your Power Platform administrator. The Application (client) ID, uniquely identifies your application and is used in your application's code as part of validating the security tokens it receives from the Microsoft identity platform.
70
+
1. Select **Save**.
71
+
1. Copy the URL provided.
72
+
1. Share the URL with the Power Platform administrator.
73
+
74
+
:::image type="content" source="media/protect-agents-real-time/turn-on-real-time-agent-protection.png" alt-text="Screenshot that shows how to turn on Real time agent protection during runtime in the Defender portal." lightbox="media/protect-agents-real-time/turn-on-real-time-agent-protection.png":::
75
+
76
+
77
+
## Related articles
78
+
79
+
-[Quickstart: Create and deploy an agent](/microsoft-copilot-studio/fundamentals-get-started)
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/release-notes.md
+17-7Lines changed: 17 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,11 +20,21 @@ For more information on what's new with other Microsoft Defender security produc
20
20
21
21
For news about earlier releases, see [Archive of past updates for Microsoft Defender for Cloud Apps](release-note-archive.md).
22
22
23
+
24
+
## September 2025
25
+
26
+
### Real time protection during agent runtime for Microsoft Copilot Studio AI agents (Preview)
27
+
28
+
Microsoft Defender offers real-time protection during runtime for AI agents built with Microsoft Copilot Studio. This capability automatically blocks the agent’s response during runtime if a suspicious behavior like a prompt injection attack is detected, and notifies security teams with a detailed alert in the Microsoft Defender portal.
29
+
30
+
For more information, see [Real-time protection during agent runtime for Microsoft Copilot Studio AI agents (Preview)](real-time-agent-protection-during-runtime.md).
31
+
32
+
23
33
## July 2025
24
34
25
35
### App Governance available in 8 new regions
26
36
27
-
App Governance is now also available in Brazil, Sweden, Norway, Switzerland, South Africa, South Korea, Arab Emirates and Asia Pacific. For more details, see [Turn on app governance for Microsoft Defender for Cloud Apps](/defender-cloud-apps/app-governance-get-started).
37
+
App Governance is now also available in Brazil, Sweden, Norway, Switzerland, South Africa, South Korea, Arab Emirates, and Asia Pacific. For more information, see [Turn on app governance for Microsoft Defender for Cloud Apps](/defender-cloud-apps/app-governance-get-started).
28
38
29
39
### Updated network requirements for GCC and Gov customers
30
40
@@ -58,7 +68,7 @@ For more information, see:
58
68
59
69
### New Dynamic Threat Detection model
60
70
61
-
Microsoft Defender for Cloud Apps new dynamic threat detection model continuously adapts to the ever-changing SaaS apps threat landscape. This approach ensures your organization remains protected with up-to-date detection logic without the need for manual policy updates or reconfiguration. Several legacy anomaly detection policies have already been seamlessly transitioned to this adaptive model, delivering smarter and more responsive security coverage.
71
+
Microsoft Defender for Cloud Apps new dynamic threat detection model continuously adapts to the ever-changing SaaS apps threat landscape. This approach ensures your organization remains protected with up-to-date detection logic without the need for manual policy updates or reconfiguration. Several legacy anomaly detection policies have already been seamlessly transitioned to this adaptive model, delivering smarter, and more responsive security coverage.
62
72
63
73
For more information, see [Create Defender for Cloud Apps anomaly detection policies](anomaly-detection-policy.md).
64
74
@@ -68,7 +78,7 @@ For more information, see [Create Defender for Cloud Apps anomaly detection poli
The Cloud Discovery Executive Summary report has been updated with a modernized design and streamlined format. The new version reduces the report from 26 pages to 6 pages, focusing on the most relevant and actionable insights while improving readability and usability. For more details, see [How to generate a Cloud Discovery executive report](discovered-apps.md#generate-a-cloud-discovery-executive-report).
81
+
The Cloud Discovery Executive Summary report has been updated with a modernized design and streamlined format. The new version reduces the report from 26 pages to 6 pages, focusing on the most relevant and actionable insights while improving readability and usability. For more information, see [How to generate a Cloud Discovery executive report](discovered-apps.md#generate-a-cloud-discovery-executive-report).
72
82
73
83
### New Applications inventory page now available in Defender XDR
74
84
@@ -87,7 +97,7 @@ To ensure continuity and access to data currently available through Microsoft De
87
97
- For Microsoft Graph Security Alerts API, see: [List alerts_v2](/graph/api/security-list-alerts_v2?view=graph-rest-1.0&tabs=http&preserve-view=true)
88
98
- To view Microsoft Defender for Cloud Apps alerts data in the Microsoft Defender XDR incidents API, see [Microsoft Defender XDR incidents APIs and the incidents resource type](/graph/api/security-list-alerts_v2?view=graph-rest-1.0&tabs=http&preserve-view=true)
89
99
90
-
For detailed guidance see:[Migrate from Defender for Cloud Apps SIEM agent to supported APIs](migrate-to-supported-api-solutions.md)
100
+
For detailed guidance, see [Migrate from Defender for Cloud Apps SIEM agent to supported APIs](migrate-to-supported-api-solutions.md).
91
101
92
102
93
103
### New and improved Cloud App Catalog page
@@ -228,7 +238,7 @@ For more information, see:
228
238
229
239
### SaaS Security initiative in Exposure Management
230
240
231
-
[Microsoft Security Exposure Management](/security-exposure-management/) offers a focused, metric-driven way of tracking exposure in specific security areas using security [initiatives](/security-exposure-management/initiatives). The "SaaS security initiative" provides a centralized location for all best practices related to SaaS security, categorized into 12 measurable metrics. These metrics are designed to assist in effectively managing and prioritizing the large number of security recommendations.
241
+
[Microsoft Security Exposure Management](/security-exposure-management/) offers a focused, metric-driven way of tracking exposure in specific security areas using security [initiatives](/security-exposure-management/initiatives). The "SaaS security initiative" provides a centralized location for all best practices related to SaaS security, categorized into 12 measurable metrics. These metrics are designed to help effectively managing and prioritizing the large number of security recommendations.
232
242
This capability is General Availability (Worldwide) - Note Microsoft Security Exposure Management data and capabilities are currently unavailable in U.S Government clouds - GCC, GCC High, and DoD
233
243
234
244
For more information, see [SaaS security initiative](saas-security-initiative.md).
@@ -421,7 +431,7 @@ For more information, see [Advanced Hunting "CloudAppEvents" Data schema](/micro
421
431
422
432
Defender for Cloud Apps now supports SaaS security posture management (SSPM) across multiple instances of the same app. For example, if you have multiple instances of Okta, you can configure Secure Score recommendations for each instance individually. Each instance shows up as a separate item on the **App Connectors** page. For example:
423
433
424
-
:::image type="content" source="media/security-saas-choose-secure-score-main-instance.png" alt-text="Screenshot of the Turnon Secure Score recommendations option." lightbox="media/classic-security-saas-choose-secure-score-main-instance.png":::
434
+
:::image type="content" source="media/security-saas-choose-secure-score-main-instance.png" alt-text="Screenshot of the Turn-on Secure Score recommendations option." lightbox="media/classic-security-saas-choose-secure-score-main-instance.png":::
425
435
426
436
For more information, see [SaaS security posture management (SSPM)](security-saas.md).
427
437
@@ -574,7 +584,7 @@ For more information, see [App governance in Microsoft Defender for Cloud Apps](
574
584
575
585
Defender for Cloud Apps now supports SaaS security posture management (SSPM) across multiple instances of the same app. For example, if you have multiple instances of AWS, you can configure Secure Score recommendations for each instance individually. Each instance shows up as a separate item on the **App Connectors** page. For example:
576
586
577
-
:::image type="content" source="media/security-saas-choose-secure-score-main-instance.png" alt-text="Screenshot of the Turnon Secure Score recommendations option." lightbox="media/classic-security-saas-choose-secure-score-main-instance.png":::
587
+
:::image type="content" source="media/security-saas-choose-secure-score-main-instance.png" alt-text="Screenshot of the Turn-on Secure Score recommendations option." lightbox="media/classic-security-saas-choose-secure-score-main-instance.png":::
578
588
579
589
For more information, see [SaaS security posture management (SSPM)](security-saas.md).
0 commit comments