Microsoft Mechanics Podcast
Take control of your data by discovering sensitive information across every file type and location with Microsoft Purview Information Protection. Classify your data, apply clear labels, and enforce protections that automatically adapt to human and AI interactions so you can reduce risk without slowing down workflows. Proactively monitor, assess, and respond to risk in real time. Use labeling and layered policies to stop accidental sharing, manage AI access, and maintain consistent protection across your organization. Matt McSpirit, Microsoft Mechanics expert, joins Jeremy Chapman to share how...
info_outlineMicrosoft Mechanics Podcast
Identify what data was exposed in a breach, not just where it moved, but what it contains, how sensitive it is, and the risk it creates using Microsoft Purview Data Security Investigations. Search across massive volumes of files using natural language, pinpoint the highest risk content, and connect it to user activity to see the full scope of an incident. Investigate and act in one workflow. Analyze content deeply across files, emails, and AI interactions, uncover hidden or unclassified sensitive data, and contain exposure fast. Proactively identify risks, respond to incidents with clarity,...
info_outlineMicrosoft Mechanics Podcast
Cut through alert noise and focus on the risks that matter with Agents in Microsoft Purview. Use Data Security Triage Agent to prioritize incidents, investigate user activity with full context, and uncover hidden patterns that signal real threats. Identify and act on high-risk behavior, like data exfiltration or persistent access, before it leads to data loss. Detect sensitive data across your environment using natural language with Data Security Posture Agent. Analyze content to find what’s exposed, apply protections or restrict access, and surface hidden credentials, so you can take action...
info_outlineMicrosoft Mechanics Podcast
Stay ahead of real-world threats without overwhelming your team using Microsoft Defender Experts for XDR. Offload high-severity incidents, gain full visibility into every investigation, and follow clear, guided remediation steps so you can contain attacks quickly and confidently, day or night. Extend your security operations with always-on managed detection and response and proactive threat hunting, so you can uncover hidden risks early, stop threats threats they spread, and strengthen your defenses to prevent future attacks. Maynald Savatdy, Microsoft Defender Expert, shows how to...
info_outlineMicrosoft Mechanics Podcast
Automate device and security policy management by turning written compliance requirements into Intune policies. Use natural language to draft, refine, and deploy configuration profiles, review AI-generated recommendations with confidence scores, and stay in full control before publishing to your environment. Reduce risk and manual effort by automatically evaluating admin change requests and blocking harmful scripts before deployment. Prioritize vulnerabilities from Defender, translate them into actionable Intune remediation steps, and schedule ongoing fixes. Jason Githens, Microsoft Intune...
info_outlineMicrosoft Mechanics Podcast
Stay productive without changing how you work with new Microsoft 365 Copilot and AI experiences on any Windows 11 PC. Access Copilot and agents right from the taskbar; find answers across your files, email, and meetings, and turn ideas into polished content using voice or text. AI is right there where you already work, so you can move faster, stay in your flow, and make better decisions without switching context, opening other apps or moving to the browser. And if you do have a Copilot+ PC, you can use fluid voice dictation across apps, find files with natural language search, take action on...
info_outlineMicrosoft Mechanics Podcast
Adopt a Zero Trust approach that lets you verify every access request—human, machine, or AI—before it reaches your most critical resources. As AI agents, semantic search, and automation accelerate how work gets done, you can reduce risk by explicitly validating identity, enforcing least-privilege access, and assuming breach across every step of your environment. Apply layered, continuous protection across identities, endpoints, networks, data, AI resources, applications, and infrastructure so attackers can’t exploit any weak links. Michael Madrigal, Security Product Manager, shares how...
info_outlineMicrosoft Mechanics Podcast
Control AI agents as they are created across your environment by treating them like real identities with Microsoft Entra Agent ID. See every agent in one place, understand what it can access, detect agent sprawl early, and apply least-privilege permissions using the same Microsoft Entra tools you already use for users—without introducing new governance models. Approve and scope agent access with accountability, enforce agent-specific Conditional Access in real time, automatically block risky behavior, and ensure every agent always has an owner, even as people change roles or leave. Leandro...
info_outlineMicrosoft Mechanics Podcast
Strengthen your daily security workflow, focus on real risks, act faster, and stay ahead of emerging threats with new agents in Microsoft Purview. Use the Data Security Triage Agent to cut through alert overload, eliminate false positives, and immediately understand which Insider Risk or DLP incidents need your attention. Stay in control with automated user outreach and clear, contextual reasoning behind every alert. Use the Data Security Posture Agent to uncover risks that hide behind context with natural-language queries. When issues are found, apply labels and trigger security policies...
info_outlineMicrosoft Mechanics Podcast
Bring AI agents directly into your daily workflows with Microsoft Agent 365. Agents have their own identity, email, OneDrive and Teams presence, and collaborate just like coworkers. Onboard agents, give them the policies and knowledge they need, and let them work in parallel with you to handle procurement, approvals, research, and updates using the same Microsoft 365 tools you already rely on. As your use of agents grows, keep full visibility and control. Track every action, understand their impact across your organization, govern permissions with least-privilege access, and manage all agents...
info_outlineAdopt a Zero Trust approach that lets you verify every access request—human, machine, or AI—before it reaches your most critical resources. As AI agents, semantic search, and automation accelerate how work gets done, you can reduce risk by explicitly validating identity, enforcing least-privilege access, and assuming breach across every step of your environment. Apply layered, continuous protection across identities, endpoints, networks, data, AI resources, applications, and infrastructure so attackers can’t exploit any weak links.
Michael Madrigal, Security Product Manager, shares how you can protect productivity and keep pace with an evolving threat landscape, by continuously assessing risk, securing resources at runtime, and adapting policies as conditions change.
► QUICK LINKS:
00:00 - Zero Trust for AI
01:41 - Overview of Zero Trust
02:43 - Identities
04:38 - Endpoints
04:50 - How Zero Trust applies to your network
06:51 - How Zero Trust applies to your data
07:31 - How Zero Trust applies to AI resources
08:24 - App Layer
08:31 - Infrastructure
09:49 - Security
10:23 - Wrap up
► Link References
Check out https://aka.ms/GoZeroTrust Watch our series at https://aka.ms/ZTMechanics
► Unfamiliar with Microsoft Mechanics?
As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft.
• Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries
• Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog
• Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast
► Keep getting this insider knowledge, join us on social:
• Follow us on Twitter: https://twitter.com/MSFTMechanics
• Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/
• Enjoy us on Instagram: https://www.instagram.com/msftmechanics/
• Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics