跳到主要內容

Configure Copilot Studio Data Policies for Agent Capabilities

Implementation Effort: Medium – Requires cross-team alignment between security, platform engineering, and agent makers to classify Copilot Studio connectors and configure environment-scoped data policies in the Power Platform admin center.
User Impact: Medium – Agent makers will be blocked from using capabilities the organization has not approved, and existing agents that violate new policies will fail at publish or runtime.

Overview

Copilot Studio agents can use knowledge sources, outbound HTTP calls, skills, event triggers, and publishing channels — all governed through platform connectors. By default, every connector is available to every maker. Data policies in the Power Platform admin center let administrators classify each connector as Business, Non-business, or Blocked, restricting what agents can be built to do before they ever reach the publishing approval workflow.

This is the upstream constraint that complements the downstream publishing gate. The publishing approval workflow in the Microsoft 365 admin center relies on human reviewers to catch misuse of capabilities — data policies enforce those restrictions automatically at the platform level. A blocked connector is unavailable to the maker entirely; there is nothing for a reviewer to catch. Since early 2025, enforcement is mandatory for all tenants — agents that violate policies are blocked at publish time.

This task supports Use least privilege access by ensuring makers can only use connectors the organization has explicitly approved. It supports Verify explicitly by enforcing classification decisions at the platform level rather than relying on human review alone. It supports Assume breach by reducing the capabilities available to a compromised maker account — a threat actor cannot build agents with blocked connectors, limiting data exfiltration vectors through unapproved channels, endpoints, or knowledge sources. Without these policies configured, the organization depends entirely on administrative review to catch every unauthorized capability an agent might use.

Reference