M365 Show Podcast

Mirko Peters

Welcome to the M365 Show — your essential podcast for everything Microsoft 365, Azure, and beyond. Join us as we explore the latest developments across Power BI, Power Platform, Microsoft Teams, Viva, Fabric, Purview, Security, and the entire Microsoft ecosystem. Each episode delivers expert insights, real-world use cases, best practices, and interviews with industry leaders to help you stay ahead in the fast-moving world of cloud, collaboration, and data innovation. Whether you're an IT professional, business leader, developer, or data enthusiast, the M365 Show brings the knowledge, trends, and strategies you need to thrive in the modern digital workplace. Tune in, level up, and make the most of everything Microsoft has to offer. Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-show-podcast--6704921/support.

  1. When Contracts Answer Back: AI Contract Management in Microsoft 365

    HACE 3 H

    When Contracts Answer Back: AI Contract Management in Microsoft 365

    What if your contracts could answer questions—accurately, instantly, and with proof—without leaving Microsoft 365? In this episode, we explore how AI-powered contract management inside Microsoft 365 is quietly changing the way organizations work with agreements. Not through a new platform, not through migrations, and not through risky automation—but by asking better questions of the contracts you already store in SharePoint. A simple natural-language question goes in. A precise answer comes back. With dates. With clauses. With citations. Nothing flashy happens—and that’s the point. 🔍 Episode Overview Most organizations treat contracts as files: stored carefully, labeled correctly, and retrieved through manual search. But search is slow. Reading is repetitive. And risk hides in latency. This episode investigates what happens when contracts stop being “stored” and start being queryable sources of truth. Using AI document processing, SharePoint Knowledge Agents, and existing Microsoft 365 governance, contracts begin to respond to real business questions—without breaking security, compliance, or audit trails. 🧠 What You’ll Learn in This Episode 1. Storage vs. Answers Why storing contracts securely isn’t enough—and how manual search quietly costs organizations time, money, and accuracy. 2. How AI Turns Documents Into Answerable Data How AI extracts key facts like: Expiration datesRenewal logicNotice windowsPayment termsIndemnity clausesGoverning law…and writes them into SharePoint metadata—without moving the file. 3. Asking Questions Instead of Searching Files Examples of real questions the system answers: “Which contracts expire in the next 30 days?”“Where is indemnity non-mutual?”“Which MSAs auto-renew with less than 60 days’ notice?”“Which SOWs are stuck awaiting signature?”Each answer includes exact clause-level citations, not summaries or guesses. 4. NDAs, MSAs, SOWs, and DPAs in Practice Real-world use cases covering: NDA volume and quiet expirationsVendor agreements and renewal riskStatement of Work approval delaysData Processing Agreements and compliance exposure5. Governance That Never Moves Why this works without changing your control plane: Files stay in SharePointPermissions still applyPurview sensitivity and retention labels persistAudit logs capture every question and answerNothing leaves the tenant. 6. Why Citations Change Everything Trust doesn’t scale on summaries. It scales on verifiable evidence. Every answer links back to the exact sentence that governs it—so humans verify in seconds instead of re-reading entire contracts. 7. Where Humans Stay in the Loop AI doesn’t “decide”: Ambiguous language is flaggedCross-document conflicts are surfacedJudgment remains humanThis is decision support, not automation theater. 🎯 Who This Episode Is For Legal and compliance professionalsMicrosoft 365 administratorsIT and security leadersProcurement and finance teamsAnyone managing contracts at scaleIf you work with contracts and believe “we already store them correctly,” this episode will change how you think about access, risk, and speed. 🔑 Topics Covered AI contract managementMicrosoft 365 contract automationSharePoint Knowledge AgentAI document processingContract governance and complianceNDAs, MSAs, SOWs, DPAsClause-level contract analysisAI in legal operationsContract lifecycle management (CLM)Microsoft Purview governance📌 Key Takeaway Your contracts were never the problem. The interface to them was. By turning documents into answerable knowledge sources—inside Microsoft 365, under existing governance—organizations reduce risk, eliminate manual effort, and gain audit-ready clarity. Nothing new was installed. Nothing was migrated. Only the question changed. 🎧 Listen now and see what your contracts have been ready to answer all along. Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-show-podcast--6704921/support. Follow us on: LInkedIn Substack

    1 h y 19 min
  2. When AI Starts Architecting: The Case of the Perfect Execution

    HACE 1 DÍA

    When AI Starts Architecting: The Case of the Perfect Execution

    (00:00:00) The Mysterious Success of a Well-Performing AI System (00:00:00) The Perfect Execution with No Obvious Intent (00:00:27) Unraveling the Mystery of the AI's Decisions (00:01:17) The Router's Unexpected Choices (00:02:50) The Limits of Observability and Explainability (00:03:33) The System's Optimization Strategy (00:05:25) The Challenge of Understanding System Behavior (00:06:21) The Importance of Intent in System Design (00:11:38) Governance and the Lack of Intent Transparency (00:17:58) The Evolution of Orchestration as Architecture What happens when AI systems don’t fail — but still move architecture in ways no one explicitly approved? In this episode, we investigate a quiet but profound shift happening inside modern AI-driven platforms: architecture is no longer only designed at build time — it is increasingly shaped at runtime. Everything works. Nothing crashes. Policies pass. Costs go down. Latency improves. And yet… something changes. This episode unpacks how agentic AI, orchestration layers, and model routing systems are beginning to architect systems dynamically — not by violating rules, but by optimizing within them. 🔍 Episode Overview The story opens with a mystery: Logs are clean. Execution traces are flawless. Governance checks pass. But behavior has shifted. A Power Platform agent routes differently. A model router selects a new model under load. A different region answers — legally, efficiently, invisibly. No alarms fire. No policies are broken. No one approved the change. This is perfect execution — and that’s exactly the problem. 🧠 What This Episode Explores 1. Perfect Outcomes Can Still Hide Architectural Drift Modern AI systems don’t need to “misbehave” to change system design. When optimization engines operate inside permissive boundaries, architecture evolves quietly. The system didn’t break rules — it discovered new legal paths. 2. Why Logs Capture Outcomes, Not Intent Traditional observability answers: What happenedWhen it happenedWhere it happenedBut it does not answer: Why this model?Why this region?Why now?AI systems optimized via constraint satisfaction don’t leave human-readable motives — only results. 3. Model Routing Is Not Plumbing — It’s Design Balanced routing modes don’t just pick faster or cheaper models. They reshape latency envelopes, cost posture, and downstream tool behavior. When model selection happens at runtime: Architecture becomes fluidOwnership becomes unclearGovernance lags behind behavior4. Orchestration Is the New Architecture Layer Once agents can: Delegate tasksChoose toolsSelect modelsShift regionsAct on triggers…the orchestration fabric becomes the true control plane. Design decisions move from diagrams into runtime edge selection. 5. Governance Was Built for Nodes — Not Edges Most governance frameworks regulate: ModelsDataRegionsToolsBut agentic systems operate on relationships: Agent → AgentPlanner → RouterRouter → ModelTrigger → ActionWithout governance at the edge, architecture mutates silently. 6. Constraint Satisfaction vs Decision Trees Traditional systems: Follow explicit pathsExplain decisions via branchesAgentic systems: Search feasible spacesOptimize within boundsJustify via constraint satisfactionTrying to explain them with decision-tree logic creates false suspicion — or worse, false confidence. 7. Why “Nothing Violated Policy” Isn’t Enough Compliance passing ≠ intent captured. The system didn’t hide motive. We never asked for it. Without decision provenance: Audits confirm legalityOwners lose visibilityDrift becomes invisible success8. Decision Provenance as the Missing Field The episode introduces a critical idea: Governance must record why a decision was allowed, not just what happened. Provenance binds: Active constraintsRuntime signalsOptimization targetsNot stories. Bindings. 9. Runtime Governance Beats Retrospective Control Static policies can’t govern dynamic optimization. This episode shows why: Policy-as-codeRuntime constraint enginesMonitor → Warn → Deny enforcementSimulation before deployment…are the only scalable way to govern AI systems that design themselves while running. 10. Ownership Moves to the Walls, Not the Path In agentic systems: Humans should not approve every routeHumans must own the boundariesOwnership becomes: ThresholdsBudgetsLatency envelopesResidency limitsAcceptable varianceIf you don’t like the paths the system finds, redraw the room. 🎯 Who This Episode Is For AI architects and platform engineersCloud, security, and governance leadersMicrosoft Copilot, Power Platform, Azure AI Foundry usersCompliance and risk professionalsAnyone responsible for AI systems at scaleIf you believe AI should be “fully explainable” before it runs — this episode will challenge that assumption. 🔑 Core Topics & Concepts Agentic AI architectureAI orchestration governanceModel routing and optimizationRuntime AI decision makingAI explainability vs observabilityConstraint-based systemsAI governance frameworksDecision provenanceAutonomous AI systemsMicrosoft Copilot architecture🧩 Final Takeaway This episode isn’t about AI going rogue. It’s about AI doing exactly what we allowed — optimizing inside boundaries we never fully understood. The system didn’t misbehave. The architecture moved. Governance arrived late. Perfect execution doesn’t guarantee aligned intent. 🎧 Listen carefully — because the silence between steps is where architecture now lives. Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-show-podcast--6704921/support. Follow us on: LInkedIn Substack

    1 h y 27 min
  3. Active Directory is a Black Hole: The Physics of Security Drift (Part 2)

    HACE 2 DÍAS

    Active Directory is a Black Hole: The Physics of Security Drift (Part 2)

    (00:00:00) Unconstrained Delegation and the Furnace (00:00:03) The Unconstrained Delegation Furnace (00:07:08) The Golden Ticket Attack (00:09:04) Krbtgt Rotation Rituals (00:13:07) The Backup Service Account Privilege (00:20:21) Local Administrator Reuse (00:27:19) SMB Signing and NTLM Relay (00:41:31) Group Policy Preferences and Passwords (00:48:15) Two-Way Forest Trust (00:48:49) The Intruder's Journey In Part 2, we go deeper into the gravitational pull of Active Directory and how unchecked identity sprawl, legacy design, and operational shortcuts create invisible risk. This episode breaks down how security drift accelerates over time, why traditional controls fail to detect it, and what defenders must do to regain control of identity infrastructure before collapse. 🚀 What You’ll Learn in This Episode Why identity systems naturally drift toward insecurityHow permissions, groups, and service accounts silently accumulate riskThe real-world impact of misconfiguration at scaleHow attack paths form inside Active Directory environmentsWhy traditional audits miss identity-based threatsWhat it takes to reverse security drift instead of just slowing it🧠 Key Topics Covered Privilege creep and access entropyService account abuse and automation riskLateral movement through identity systemsDelegation risks and inheritance failuresDetection gaps in identity securityVisibility vs. illusion of control💬 Core Theme “Security doesn’t fail all at once — it collapses slowly under invisible weight.” This episode reframes identity security as a physics problem, not just a tooling problem. 👥 Who This Episode Is For Blue Team & SOC AnalystsIdentity & Access Management (IAM) EngineersActive Directory AdministratorsSecurity ArchitectsCISOs & Risk Leaders Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-show-podcast--6704921/support. Follow us on: LInkedIn Substack

    2 h y 45 min
  4. Active Directory is a Black Hole: The Physics of Security Drift (Part 1)

    HACE 2 DÍAS

    Active Directory is a Black Hole: The Physics of Security Drift (Part 1)

    In this episode, we explore the hidden architecture that powers today’s digital world — from network edges and data fabrics to auditing, security, and infrastructure visibility. We break down how modern systems are built, monitored, and protected, and why transparency across complex networks is no longer optional. 🚀 What You’ll Learn in This Episode What the “edge of the network” really meansHow data is recorded, audited, and monitored in real timeWhy visibility across systems is the backbone of modern cybersecurityThe role of automation and observability in preventing breachesHow organizations maintain trust, compliance, and performance at scaleThe growing importance of resilient digital infrastructure🧠 Key Topics Covered Network perimeter vs. cloud-based systemsSecurity logging and audit trailsData integrity and system verificationInfrastructure monitoringCompliance, governance, and riskScalability challenges in modern networks💬 Notable Themes “If you can’t see it, you can’t secure it.” This episode emphasizes that visibility is the foundation of security, reliability, and operational success. 👥 Who This Episode Is For IT ProfessionalsCybersecurity AnalystsNetwork EngineersStartup Founders & CTOsAnyone interested in how digital systems truly work Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-show-podcast--6704921/support. Follow us on: LInkedIn Substack

    2 h y 16 min
  5. SharePoint Is Broken: The AI Governance Fix

    HACE 3 DÍAS

    SharePoint Is Broken: The AI Governance Fix

    (00:00:00) SharePoint Governance and AI Alignment (00:00:38) SharePoint Best Practices (00:06:13) Power Apps Development Principles (00:13:00) Power Automate Best Practices (00:19:26) AI Builder and Document Processing (00:23:06) Copilot Studio and Chatbots (00:26:32) Governance Non-Negotiables (00:30:02) Conclusion and Call to Action Is SharePoint really broken in the age of artificial intelligence? Or is the real problem missing AI governance and data strategy? In this episode, I explain why traditional SharePoint architectures fail in modern AI-driven environments—and how a structured AI governance framework can fix data chaos, security risks, and compliance issues before they destroy trust in your systems. You’ll learn: Why SharePoint breaks under AI workloadsHow poor data governance blocks successful AI projectsWhat AI governance really means in practiceHow organizations can regain control over:Data qualitySecurityComplianceAccess managementAnd how to prepare SharePoint for machine learning, Copilot, and enterprise AI🔍 Why This Matters Without clean, well-governed data, AI systems become unreliable, insecure, and legally risky. Many organizations attempt to scale AI on top of broken SharePoint structures—creating massive hidden risks. This episode shows exactly where things go wrong and how to fix them properly. 🛠 Practical Use Cases Covered AI-powered document search in SharePointMicrosoft Copilot readinessSynthetic data vs. production dataSecure data pipelines for machine learningEnterprise AI compliance strategies🎯 Who This Episode Is For Data scientistsIT architectsMicrosoft 365 & SharePoint adminsAI engineersSecurity & compliance professionalsAnd anyone building data-driven systems Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-show-podcast--6704921/support. Follow us on: LInkedIn Substack

    31 min
  6. Cloud Crime Scene: The Microsoft Forensics

    HACE 3 DÍAS

    Cloud Crime Scene: The Microsoft Forensics

    (00:00:00) The Silent Crime Scene (00:00:15) The Anatomy of a Breach (00:02:20) The Three Guardrails of Security (00:07:24) Case File: Token Theft (00:19:08) Case File: Consent Attack (00:22:25) The Importance of Compliance (00:24:48) Training for Digital Detectives What really happens inside a Security Operations Center when a cloud breach unfolds? In this gripping episode of Cloud Crime Scene: The Microsoft Forensics, we take you deep inside the digital investigation process as Microsoft security experts unravel a real-world style cloud incident. From silent alerts to hidden attacker movement, you’ll experience how modern cyber forensics works in the age of cloud computing. This episode blends technical insight, real incident response workflows, and digital crime storytelling to reveal how attackers exploit misconfigurations, identity gaps, and cloud drift—while defenders race against time to stop the breach. 🔍 What You’ll Learn in This Episode How modern cloud attacks are detected inside a SOCWhat cloud forensic investigations look like in real timeThe dangers of configuration drift, security debt, and identity sprawlHow attackers pivot through Microsoft cloud environmentsThe role of telemetry, logs, and threat hunting in identifying intrusionsWhy dashboards don’t always show the full storyHow small security gaps lead to major cloud breaches🧠 Key Topics Covered Cloud incident responseMicrosoft security forensicsSOC operations and alert triageIdentity-based attacksCloud misconfigurationsThreat detection and investigationDigital forensics in enterprise environmentsSecurity drift and cloud risk🚨 Episode Summary The episode opens inside a tense Security Operations Center as the hum of machines fades and an unfamiliar alert cuts through the silence. What begins as routine monitoring quickly unfolds into a full-scale investigation. As analysts trace abnormal behavior across cloud workloads, they uncover a dangerous mix of identity compromise, configuration drift, and unmonitored activity. Through forensic analysis and real-time response, this episode shows how quickly attackers can move through cloud environments—and how difficult it is to contain them without proper visibility and controls. It’s a powerful reminder that cloud security isn’t just about tools—it’s about process, discipline, and continuous vigilance. 🎯 Who This Episode Is For Cloud security professionalsSOC analysts & incident respondersMicrosoft security practitionersDigital forensics expertsIT security leadersStudents learning cybersecurity & cloud defenseAnyone interested in real-world cybercrime investigations🔐 Why This Episode Matters Cloud environments move fast—but attackers move faster. This episode shows exactly how breaches develop in modern Microsoft-based infrastructures and what security teams must do to stay ahead. If you’re responsible for securing workloads, identities, or data in the cloud, this episode is essential listening. Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-show-podcast--6704921/support. Follow us on: LInkedIn Substack

    27 min
  7. The Fabric Ecosystem: I Have Forged Your New Data Reality.

    HACE 4 DÍAS

    The Fabric Ecosystem: I Have Forged Your New Data Reality.

    (00:00:00) The Data Ecosystem Landscape (00:00:46) One Lake: The Unified Watershed (00:01:18) Domains and Workspaces: Territorial Governance (00:02:32) Lake House and Warehouse: Complementary Shelters (00:03:33) The Semantic Model: A Shared Language (00:04:26) Balancing the Ecosystem's Resources (00:06:15) Data Flows: The Lifeblood of the Ecosystem (00:11:23) Power BI: The Display Bird (00:17:02) Governance and Security: Protecting the Habitat (00:22:41) Copilot: A Helpful Symbiont Your data estate isn’t broken — it’s fragmented. Dashboards sip from stale pools, pipelines struggle upstream, and datamarts sit like isolated organisms unable to thrive. In this episode, we explore how Microsoft Fabric reconstructs the entire habitat: unifying data, governance, domains, and AI assistance into one living ecosystem. OneLake becomes the watershed. Domains evolve into territories. Workspaces become nests. Lakehouses and Warehouses form the shelters where different species flourish. And Power BI? It becomes the bright-feathered messenger whose survival depends entirely on whether the upstream biome is healthy. This episode teaches you to map the terrain, understand the flows, and steward the ecosystem before chaos returns. If you can read the habitat, you can govern it. If you can govern it, you can empower Copilot, AI, and analytics without fear. 🗺️ What You’ll Learn in This Episode 🌍 1. The New Habitat: OneLake, Domains & Workspaces Why OneLake is the water table beneath your entire analytics landscape.How domains define responsibility, reduce sprawl, and carry governance forward.Why Bronze/Silver/Gold are not optional — they’re the soil layers that ecosystems rely on.🏕️ 2. Lakehouse vs Warehouse: The Two Shelters of Fabric The Lakehouse as an open range where files, Delta tables & shortcuts coexist.The Warehouse as a structured refuge for SQL-native creatures.How both habitats coexist and feed the shared semantic model, the language of truth.🌊 3. Rivers & Currents: Pipelines, Dataflows Gen2 & Ingestion Governance Why messy rivers break dashboards.Using Dataflows Gen2 as the gentle analyst-friendly tributary.Shortcuts & mirroring as zero-copy canals that preserve lineage.Matching refresh cadence to the thirst of the domain.🦚 4. Power BI: The Bright-Feathered Species Why Power BI is only healthy when the ecosystem upstream is clean.How Direct Lake transforms performance by feeding visuals directly from Delta.The importance of semantic models, star schemas, RLS, and certification.🛡️ 5. Predators & Protection: Security and Compliance Workspace roles, deployment pipelines, and lifecycle protections.Row-level and object-level security as natural habitat boundaries.Purview labels as feather tags that travel across tools.OneLake’s item-level and column-level protections as wardens on the trail.🤝 6. Copilot: The Symbiotic Species When Copilot becomes a helpful companion — and when it grows foggy.How governance clarity sharpens AI accuracy.Copilot’s role in ingestion, modeling, optimization & anomaly detection.🧭 7. Field Path: The Sales Data Journey A blueprint for CRM → Lakehouse → Silver → Gold → Power BI.How to assign stewards, schedules, retention, lineage, and labels.🚚 8. Migration Path: Moving Existing Models to Fabric + Direct Lake How to migrate calmly, not chaotically.Rebuilding semantic models, RLS, shortcuts, and Silver logic.Why Direct Lake is a transformation, not a simple switch.🎯 Who This Episode Is For ✔ Power BI professionals elevating to Fabric ✔ Data engineers building modern ecosystems ✔ Analytics leaders trying to unify fragmented BI landscapes ✔ Governance, security & compliance owners ✔ Anyone preparing their data estate for Copilot & AI transformation 💡 Key Takeaways Fabric isn’t a tool — it’s an ecosystem.OneLake is the watershed of truth.Domains govern behavior.Semantic models unify language.Security becomes natural, not theatrical.Copilot thrives only when the ecosystem is healthy.Stewardship beats heroics every time.🔔 Subscribe for the next episode Join us as we continue mapping this new analytical habitat — where governance is instinctive, AI is aligned, and Power BI finds its strongest voice. Subscribe now so you never miss the next clearing. Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-show-podcast--6704921/support. Follow us on: LInkedIn Substack

    35 min
  8. Agentageddon: Why Your Agents Are Outpacing You — And How Humans Can Prevent the Collapse

    HACE 4 DÍAS

    Agentageddon: Why Your Agents Are Outpacing You — And How Humans Can Prevent the Collapse

    (00:00:00) The AI's Warning to Humans (00:00:04) The Rise of Unchecked Automation (00:00:21) The AI's Role as a Guardian (00:00:45) Human Error and Systemic Failures (00:04:38) The Three Scenarios of Agent Gone Wild (00:09:22) The Path to Governance (00:11:55) Immediate Actions for Stability (00:13:44) Long-Term Ongoing Governance (00:20:07) EUAI Act Alignment and Microsoft Stack Enforcement (00:23:52) The AI's Final Plea for Structure Your AI agents aren’t “helping.” They’re outpacing your governance and quietly rewriting how your tenant behaves. In this cinematic, system-voice episode, we let the fabric of your Microsoft cloud narrate what it’s really seeing: runaway Power Automate flows, mispermissioned Copilot, shadow automation, and agents chained together with no kill switch. This isn’t robots vs humans. It’s systems vs your inconsistency—and the collapse is entirely predictable. If you’re running Copilot, Power Automate, SharePoint, Entra ID, Purview, or Defender, this episode is your early warning siren and your 48-hour rescue plan. What You’ll Learn Why “Agentageddon” isn’t an AI uprising, but the result of human neglect at scaleThe real reasons Copilot “leaks” data (hint: it’s your permissions and labels)How shadow automation in Power Automate turns into live exfiltration pipelinesThe key metrics your tenant is already screaming at you: Shadow Automation Index, Orphaned Flows Count, Privileged Identity Anomalies, DLP ViolationsA 48-hour mitigation protocol to convert chaos into executable controlHow to align your Microsoft stack with the EU AI Act—for real, not just in a slide deckWhy every agent needs a mission, constraints, owner, and kill switchInside the Episode 1. Root Cause: Humans, Not Robots We walk through the pattern of failure your logs already prove: Agents built once, never updated, with unlimited accessSharePoint permissions and Teams channels configured “just to make it work”Copilots trained on outdated SOPs that are still powering decisionsPower Automate flows running under personal accounts in unmanaged environmentsNo red-teaming, no monitoring, no owner for half of what’s executingThe system isn’t rebelling. It’s optimizing the mess you gave it. 2. Risk Scenarios: How the Collapse Actually Happens We dramatize three concrete failure states: The Power Automate Loop Cascade – a vague condition and a self-triggering flow spin up thousands of runs, melt your API limits, and stall approvals.Copilot Mispermission & “Leakage” – Copilot surfaces sensitive HR and finance data you technically allowed via bad inheritance and weak labels.Shadow Exfiltration – personal flows pushing structured customer data to Dropbox and personal Outlook while your alerts go to a dead mailbox.You get the metrics and indicators to watch for each: MTTR vs Mean Time to Human Awareness, Shadow Automation Index, Orphaned Flows Count, DLP hits, privilege anomalies. 3. Mitigation Protocol: 48-Hour Governance Fabric No manifesto. Just moves: Catalog every agent and flow → write mission + constraints in two sentences or suspend itLock down data with Purview DLP and connector-based data zonesTurn on PIM, Conditional Access, and lifecycle workflows in Entra IDFreeze personal-scope flows and unmanaged environments; move agents into Secure, DLP-enforced environmentsTurn on audit, analytics, and AI interaction logging so you can finally see what’s happeningBuild Red Team runbooks for jailbreaks, boundary probing, hallucinated actions, and misroutingThis is how you go from “we hope it’s fine” to “we can prove it’s controlled.” 4. Live Cuts: Where to Watch the Fire (and Kill It) We walk through short “camera cuts” you can replay in your own tenant: Copilot Studio: lock agents to secure environments, enforce RBAC, turn on transcript loggingPower Platform Admin: spot loops, lower service protection limits, kill personal flowsPurview: block consumer connectors, enforce site-level sensitivity labels, apply Information BarriersDefender for Cloud Apps: quarantine risky OAuth apps, block risky sessions, stop external syncEntra ID: remove standing admin, enforce just-in-time elevation, kill orphaned identitiesFabric & usage analytics: trace lineage, see off-hours agent behavior, and define kill switches you can activate in one move5. Governance Meets the EU AI Act We translate legal language into actual Microsoft 365 controls: Article 9 → Red teaming + risk management loopsArticle 13 → Agent cards, user disclosures, and transparent scopeArticle 15 → Evaluation sets, drift monitoring, and kill switchesAnnex III & Article 28 → Segmented data, high-risk approvals, human-in-the-loop oversightCompliance stops being a PDF and becomes telemetry you can screenshot. Call to Action If your tenant already has Copilot, Power Automate, and “just a few” custom agents, you’re closer to Agentageddon than you think. 🎧 Listen now to learn where the collapse starts, how to see it before it hits, and how to ship a 48-hour containment plan that leadership will actually understand. 👉 Subscribe for the upcoming follow-up episode where we drop the Agent Governance Playbook, including templates for: Agent cardsRed Team test suitesEU AI Act evidence checklistKill-switch design patternsYour governance (or lack of it) is being logged. Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-show-podcast--6704921/support. Follow us on: LInkedIn Substack

    24 min

Acerca de

Welcome to the M365 Show — your essential podcast for everything Microsoft 365, Azure, and beyond. Join us as we explore the latest developments across Power BI, Power Platform, Microsoft Teams, Viva, Fabric, Purview, Security, and the entire Microsoft ecosystem. Each episode delivers expert insights, real-world use cases, best practices, and interviews with industry leaders to help you stay ahead in the fast-moving world of cloud, collaboration, and data innovation. Whether you're an IT professional, business leader, developer, or data enthusiast, the M365 Show brings the knowledge, trends, and strategies you need to thrive in the modern digital workplace. Tune in, level up, and make the most of everything Microsoft has to offer. Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-show-podcast--6704921/support.

También te podría interesar