Brand Logo
  • Home
  • Articles
  • Free Stuff
    • Get Your Free Copilot Agent Roadmap 🆕
    • Get Your Free Copilot Tips Guide
    • Free JSON Formatting Mini-Guide
    • Code Samples
  • SharePoint and Copilot Training
  • About
    • Coaching
  • Home
  • Articles
  • Free Stuff
  • SharePoint and Copilot Training
  • About

Microsoft Agent 365: The Features Nobody Is Talking About (But Should Be)

Posted on 3 hours ago

When most people hear Microsoft Agent 365, they immediately think governance. They think security dashboards, compliance policies, and IT administration. And look – that stuff matters. No argument there.

But here is the thing: governance is not why developers and end users are going to get excited about Agent 365. It is not the feature that makes people stop mid-sentence and say, “Wait – it can actually do that?”

That reaction comes from somewhere else entirely. It comes from the capabilities sitting just beneath the surface that Microsoft has barely talked about in public – the ones that completely change how agents are built, deployed, and used in your organization.
In this article, I want to skip the checkbox tour of admin settings and focus on the stuff that actually matters from a practical standpoint. By the time you finish reading, you will have a clear understanding of:
  • What MCP server interoperability really means for your agent stack
  • How agentic authentication is changing the way agents access data
  • Why agent instancing is the most exciting shift in how we think about agents
  • And why pro code is currently the only way to unlock the full power of Microsoft Agent 365

The Part Microsoft Keeps Talking About (And Why It Is Not the Whole Story)

Microsoft Agent 365 is positioned as the control plane for AI agents – a way to empower your organization to confidently deploy, govern, and manage all your agents at scale, regardless of where those agents are built or acquired.

That is the pitch. And during Microsoft Ignite, and in most of the blog content that followed, that is almost all anyone talked about. Agent registries. Security policies. The M365 admin center. Central dashboards.

You get a complete view of all agents being used in your organization, including agents with agent ID, agents you register yourself, and shadow agents. You can control access, prevent agent compromise with risk-based conditional access policies, and monitor agent behavior and performance in real time.
Again – that is all genuinely useful. But it paints an incomplete picture, because the real power of Agent 365 is not in how you manage agents. It is in what agents can actually do when built with it.

MCP Servers and Interoperability – Your Plug-and-Play Toolkit

One of the first things worth understanding about Agent 365 is how it handles tooling through Model Context Protocol (MCP) servers.

The Tooling module helps developers discover, configure, and integrate MCP servers into AI agent workflows. MCP servers expose external capabilities as tools that AI agents can invoke.

What this means in plain English: instead of building every capability your agent needs from scratch, you can plug in pre-built MCP servers and unlock a ton of functionality with little to no configuration required.

The Agent 365 Tooling integration follows a clear workflow: you configure MCP servers using the Agent 365 CLI to discover and add them, a CLI-generated manifest captures the server configurations, a Global Administrator grants OAuth2 permissions to the agent blueprint, and from there you integrate the tools into your code and invoke them during agent execution.

But here is the piece that does not get enough attention – you are not limited to Microsoft’s catalog of MCP servers. You can bring your own. That means you end up with one master list of every MCP server in your organization – Microsoft-provided and custom-built – all managed through the same central dashboard inside the M365 admin center.

Think about what that means operationally. No more maintaining a separate list for native tools and another for your custom integrations. One place. Total visibility.
And access does not automatically mean everyone gets everything. Administrators still have to grant users access to specific MCP servers, which keeps things organized and secure inside the Microsoft 365 admin center dashboard. That said, MCP server interoperability, while powerful, is not even the feature that excites me most about Agent 365. What really changes the game is how authentication and identity now work.

How Authentication Used to Work – And Why It Was Limiting

To understand agentic authentication, you first need to understand what came before it.

For a long time, when you interacted with an agent in Microsoft 365 – whether it was retrieving SharePoint files, pulling from a database, or doing anything that touched your organization’s data – it used your credentials to do it. Log in as Steve Corey, and the agent fetches exactly what Steve Corey has access to. Nothing more, nothing less.

This approach is called On-Behalf-Of (OBO) authentication. In the OBO flow, the agent receives a user’s delegated token and exchanges it to perform actions as if the user is performing them. The agent operates with the user’s permissions and context, which is ideal for scenarios where the agent needs to access resources with user-specific permissions.

That is solid security. And OBO is not going away – it is still very much supported and appropriate for a lot of use cases. But it has an inherent ceiling. The agent can only ever be as capable as the user running it.

Agentic Authentication – Agents That Have Their Own Identity

This is where things start to get genuinely interesting… Microsoft Agent 365 supports two authentication flows for agents, powered by Microsoft Entra Agent ID. The first is agent identity authentication, which enables an agent to act with its own identity – authenticating using its own credentials, operating independently with its own assigned permissions, and functioning entirely separately from any user. This flow is ideal for autonomous agent operations that do not require user context.

So instead of always borrowing a user’s credentials, an agent can now have its own enterprise identity. And this is not a lightweight service account – it is a fully realized identity inside your Microsoft 365 environment.

Each agent gains its own unique, persistent enterprise identity, separate from human users or generic application registrations. This identity equips the agent with privileges, authentication, roles, and compliance capabilities similar to a human employee.

What you end up with, when you register an agent with Agent 365 (assuming you leverage ALL the features), is a three-part identity structure:
  • Agent blueprint – the template that defines the agent’s identity, permissions, and infrastructure requirements, including Microsoft Entra application registration, required Graph API scopes, and authentication configuration.
  • Agentic app instance – a specific deployment of the blueprint, with its own unique agentic app ID and service principal for authentication.
  • Agentic user – the runtime identity that actually appears in your organization.
That last one is worth focusing on. Agentic users function as full members of your Microsoft 365 organization. They are synchronized to your tenant directory, can be assigned licenses like Microsoft 365 E5 or Teams Enterprise, have their own mailbox and OneDrive storage, appear in the organizational chart and people cards, can be @mentioned in Teams and other Microsoft 365 apps, and have their own unique principal name – for example, agent@yourtenant.onmicrosoft.com.
This is not a bot account with limited permissions. This is an actual organizational identity that looks and behaves like a colleague – because in many practical ways, it is.

🔒 Sponsored by Afi — Smarter Cloud Backup & Recovery

Cloud platforms like Microsoft 365, Google Workspace, Azure, AWS, and Kubernetes are powerful — but they don’t always protect your data the way you think. Accidental deletions, ransomware, and compliance gaps can still cause serious disruptions.

That’s why I’ve partnered with Afi, a modern backup and recovery solution built for today’s multi-cloud environments. Afi offers full-fidelity restores, encrypted full-text search, version history, and even self-service recovery — so users can get their data back without waiting on IT.

Its AI-powered ransomware detection automatically triggers backups before damage is done, giving you peace of mind and keeping your business running smoothly.

Over 10,000 organizations trust Afi to protect their cloud data.

Learn more at afi.ai.

Agent Instancing – The Feature That Changes Everything

Now we get to what I believe is the single most important concept in all of Microsoft Agent 365: agent instancing.

To explain why it matters, let me contrast it with how agents have always worked.

The traditional model – what you might call “agent as an app” – works like this: an agent is deployed, someone installs it or adds it to their Teams or Copilot environment, and everyone uses that same agent like a shared application. It is always called the same thing. Everyone interacts with the same deployment. No customization at the individual user level.

Agent instancing flips this entirely.

Instead of accessing a shared agent, each user gets their own copy. Their own instance. And that instance is not just a different name for the same thing – it behaves like a user account.

Agentic users appear in the organizational chart and people cards, can be @mentioned in Teams, documents, and other Microsoft 365 apps, and have their own mailbox and OneDrive storage based on licenses assigned.

Let that sink in for a second… You can email your agent. You can @mention it in a Word document comment just like you would a teammate. It can respond. It can update that document for you. It has its own mailbox. It shows up in the org chart – reporting to you, since you created the instance.

This is what Microsoft means when they talk about “agents in the org chart.” And it is a fundamentally different way of thinking about what an agent even is.

Here is a practical example I keep coming back to: imagine a project manager agent deployed to your organization. No hardcoded data sources, no grounding pre-configured by the developer. Instead, when a human project manager spins up their own instance, they:
  1. Give it a name – something like “Website Upgrade Project” or “New HR System”
  2. Grant it access to their specific project files in SharePoint or OneDrive
  3. Interact with it via Teams or Outlook like they would a real teammate

The agent now has access to exactly the files it needs – and only those files. It is grounded on one person’s project data, not everyone’s. Every project manager in the organization gets their own customized agent. No developer configuration required for the grounding. The end user handles that themselves.

The connection between agentic instances and agentic users follows a strict parent-child pattern – each agentic instance can have at most one agentic user child, and this bidirectional relationship enables proper lifecycle management and auditing. And on the back end, only one copy of the agent is actually running. Every user is connecting through their own agent identity and their own service principal. The customization lives at the identity layer, not the infrastructure layer. You deploy once and scale to as many instances as your organization needs.
Everything is visible in the M365 admin center. Every instance, every action, every interaction – fully transparent to administrators. That is not a limitation. That is exactly the kind of governance organizations need when deploying AI at scale.

Why This Makes End Users More Valuable – Not Redundant

Here is something I want to be direct about: agent instancing is not about replacing people. It is about giving people leverage.

Think of it this way. Right now, most knowledge workers are constrained by bandwidth – there are only so many hours in a day and only so many tasks any one person can handle. Agent instancing changes that equation. Instead of one person doing the work of one person, that person now has a team of specialized agents working beneath them, handling research, pulling data, drafting updates, and responding to routine requests.

You delegate. The agent returns results. You review and act. The value you bring to your organization does not go down – it goes up, because you are able to accomplish significantly more with the same number of hours. Grounding shifts from the developer to the end user, which means the people closest to the work are the ones configuring the agents to do that work. Less overhead for developers. More ownership for users. Better outcomes overall.

The Pro Code Reality – What Copilot Studio Cannot Do (Yet)

Here is the honest part of this conversation. If you want all of the features I have described – true agent instancing, full agentic authentication, agents that live in the org chart and have their own mailboxes – you cannot build that in Copilot Studio today.

Copilot Studio does support the concept of an agent ID. You can enable it in the Power Platform admin center. But what it gives you is a service principal in Entra, not the full agent instancing model. You will still interact with the agent as an application. You will not get your own copy. You will not get the “agent as a user” experience.

The agent instancing part of Agent 365 supports Python, JavaScript (.NET), and multiple orchestration frameworks including the Agent Framework, Semantic Kernel, LangChain, and OpenAI – giving pro code developers a wide range of tools to build with.

TypeScript, Python, and C# are where the full Agent 365 experience lives right now. The M365 Agents Toolkit is your starting point if you want to explore this. The SDK handles the heavy lifting around authentication flows, agent registration, and MCP server integration. This is not a knock on Copilot Studio – it is a fairly capable platform for a huge range of use cases. But if your organization wants to leverage the full depth of what Microsoft Agent 365 makes possible, pro code is the path today.

What to Build First

If you are trying to figure out where to start, here are a few scenarios that lend themselves particularly well to the agent instancing model:
  • Project manager agents – One deployment, one instance per project manager, each grounded on project-specific data only
  • Sales rep agents – Grounded on individual CRM records, deal histories, and customer communications
  • HR business partner agents – Personalized to each HRBP’s portfolio of employees and policies
  • Customer success agents – Configured by individual CSMs with their own account data
The pattern is the same in each case: one shared backend agent, individual instances, user-controlled grounding. Developer builds once. Users configure their own experience.

Final Thoughts

Microsoft Agent 365 is going to be talked about mostly in terms of governance for a while. That is fine – governance matters, and organizations need it. But the real story here is the shift in how agents are accessed and experienced.

Agentic authentication gives agents their own identity and their own access rights, independent of any single user. Agent instancing gives every user their own personalized copy of an agent, grounded on their data, integrated into their workflow, showing up in their org chart. That is not an incremental improvement over what we had before. That is a fundamentally different model for how humans and agents work together.

I am actively building agents using the Agent 365 framework and plan to share full developer walkthroughs – from scratch to finished agent – covering Copilot Studio Agent Builder, Copilot Studio full, and the M365 Agents Toolkit. If you want to follow along, make sure you are subscribed to the blog and to my YouTube channel.

This is still early. The Frontier preview is where most of this lives today. Agent 365 is slated for General Availability on May 1st, 2026, however. But the direction is clear, and it is worth getting familiar with now, before this becomes the default way organizations build and run their agents.

Ready to start building agents that actually work for your organization? Grab my free Copilot Agent Roadmap to get started – no fluff, just the practical steps to go from zero to a deployed agent.

Contact Me!

    Previous Post
    The Four Copilot Declarative Agent Types That Can Access SharePoint Data
    Share with your network!

    Categories

    Agent 365, Copilot Agents, Copilot and AI

    Tags

    Agent 365, Copilot, Copilot Agents, copilot studio, custom engine agent, declarative agent, Microsoft Agent 365, Microsoft Copilot

    Recent Posts

    The Four Copilot Declarative Agent Types That Can Access SharePoint Data

    11 Mar at 7:10 pm

    Intranets Need a Concierge: How Copilot Agents Help Employees Find Content

    25 Feb at 10:47 am

    Using the SharePoint Agent Access Report to Improve Copilot Governance

    11 Feb at 7:52 am

    The Power of Copilot Agents: How AI Transforms Knowledge Work in SharePoint

    28 Jan at 10:37 am

    Five Ways a Copilot Agent and SharePoint Can Transform Your Sales Team

    14 Jan at 7:04 am

    Your Copilot Agent Roadmap

    My free guide to get you started with Copilot Agents

    Book Recommendation
    Mastering Microsoft 365 and SharePoint Online: A complete guide to boosting organizational efficiency with Microsoft 365’s real-world solutions
    TikTok
    X
    LinkedIn
    YouTube
    *As an Amazon Associate I earn a commission from qualifying purchases.