メインコンテンツへスキップ

Update Copilot Studio connectors to route through Global Secure Access

Implementation Effort: Medium – Requires identifying all existing Copilot Studio custom connectors and editing each one to apply the Global Secure Access routing configuration; new connectors inherit routing automatically.
User Impact: Low – Connector updates are transparent to end users; agent behavior is unchanged aside from network path.

Overview

Enabling Global Secure Access for Copilot Studio agents configures the environment, but existing custom connectors do not automatically pick up the new routing — they must be individually edited and saved. Until this is done, those connectors continue to send outbound traffic directly to the internet, bypassing every network security policy the organization has configured. This creates an inconsistent security posture where some agent traffic is inspected and some is not, and the unrouted connectors represent exactly the kind of implicit trust gap that Zero Trust is designed to eliminate.

The scope of this task depends on the number of existing Copilot Studio environments and custom connectors in use. Each connector must be opened, reviewed, and saved to apply the Global Secure Access routing. This is also an opportunity to audit the connector inventory: identify connectors that are no longer in use, connectors that access high-risk external endpoints, and connectors whose permissions should be reviewed. New connectors created after Global Secure Access is enabled inherit the routing configuration automatically and do not require manual intervention.

This supports Verify explicitly by ensuring that every connector's outbound traffic — not just new ones — is routed through the Security Service Edge where it can be authenticated, inspected, and logged. It supports Assume breach by closing the gap where legacy connectors bypass network security controls, ensuring that a compromised agent cannot exfiltrate data through an unmonitored network path. Without updating existing connectors, the organization's network security posture for agent traffic is only partially enforced, and the unrouted connectors become the path of least resistance for threat actors targeting agent infrastructure.

Reference