Agents are multiplying. Some just answer questions; others act on behalf of users, pulling data and triggering workflows without direct oversight. If you're not governing them now, you're accepting risk you haven't measured and costs you haven't approved. This session arms IT administrators with the controls that matter: boundaries on connectors and data access, tenant-wide sharing restrictions, identity assignment and lifecycle management, and detection policies for risky or sensitive interactions. We'll also cover orphaned agents, billing models, and how to build audit trails that survive scrutiny. Expect demos, real scenarios, and configurations you can apply immediately.
I am a technology evangelist helping companies to design, implement and secure Microsoft 365. As Microsoft MVP, I also travel the world to speak at events, conferences, and user groups to talk about technology and to make sure people do not make the same expensive mistakes that I made.