LayerX: Enterprise Browser Security
  • Πλατφόρμα
  • Χρήση περιπτώσεων

    Ασφάλεια Χρήσης Τεχνητής Νοημοσύνης

    Ανακάλυψη Τεχνητής Νοημοσύνης

    Ανακαλύψτε και εφαρμόστε κιγκλιδώματα ασφαλείας σε όλες τις εφαρμογές τεχνητής νοημοσύνης 

    Τεχνητή Νοημοσύνη DLP

    Αποτρέψτε τη διαρροή ευαίσθητων δεδομένων σε εργαλεία τεχνητής νοημοσύνης

    Έλεγχος πρόσβασης με τεχνητή νοημοσύνη

    Περιορισμός της πρόσβασης των χρηστών σε μη εγκεκριμένα εργαλεία ή λογαριασμούς τεχνητής νοημοσύνης

    Πρόληψη κατάχρησης τεχνητής νοημοσύνης

    Προστασία από άμεση έγχυση, παραβιάσεις συμμόρφωσης και άλλα

    Προγράμματα περιήγησης AI

    Προστατέψτε τα προγράμματα περιήγησης τεχνητής νοημοσύνης από επιθέσεις και εκμετάλλευση

    Ασφάλεια προγράμματος περιήγησης για επιχειρήσεις

    Web/SaaS DLP

    Απειλή Αποτροπή διαρροής δεδομένων σε όλα τα διαδικτυακά κανάλια

    Απομακρυσμένη πρόσβαση/BYOD

    Ασφαλής απομακρυσμένη πρόσβαση SaaS από εργολάβους και BYOD

    Προστασία ταυτότητας

    Ανακαλύψτε και ασφαλίστε εταιρικές και προσωπικές ταυτότητες SaaS

    ασφαλής περιήγηση

    Εντοπισμός και αποκλεισμός επικίνδυνων επεκτάσεων προγράμματος περιήγησης σε οποιοδήποτε πρόγραμμα περιήγησης

    Shadow SaaS/SaaS Security

    Ανακαλύψτε το «σκιώδες» SaaS και επιβάλετε ελέγχους ασφαλείας SaaS

    Προστασία από κακόβουλες επεκτάσεις προγράμματος περιήγησης

    Εντοπισμός και αποκλεισμός επικίνδυνων επεκτάσεων προγράμματος περιήγησης σε οποιοδήποτε πρόγραμμα περιήγησης

    Έκθεση ασφάλειας LayerX Enterprise GenAI 2025

    Η Έκθεση Ασφάλειας του LayerX Enterprise GenAI 2025 προσφέρει μοναδικές πληροφορίες σχετικά με τους κινδύνους ασφάλειας GenAI σε οργανισμούς.

    Κατεβάστε το Δωρεάν Τώρα
  • Συνεργάτες

    Συνεργάτες

    Συνεργάτες

    Επισκόπηση προγράμματος συνεργατών

    Συνεργάτες Τεχνολογίας

    Εξερευνήστε τις ενσωματώσεις LayerX

     

    εικονίδιο Google
    Συνεργασία LayerX + Google
  • Σχετικά με εμάς

    Σχετικά με εμάς

    Σχετικά με εμάς

    Αποστολή και ηγεσία του LayerX

    Γραφείο συντάξεως εφημερίδας

    Λάβετε ενημερώσεις σχετικά με το LayerX

    Εκδηλώσεις

    Μάθετε σε ποιες εκδηλώσεις συμμετέχουμε

     

    Καριέρα

    Υποβάλετε αίτηση για ανοιχτές θέσεις

    Επικοινωνήστε μαζί μας

    Υποβάλετε το ερώτημά σας

    Έκθεση ασφάλειας LayerX Enterprise GenAI 2025

    Η Έκθεση Ασφάλειας του LayerX Enterprise GenAI 2025 προσφέρει μοναδικές πληροφορίες σχετικά με τους κινδύνους ασφάλειας GenAI σε οργανισμούς.

    Κατεβάστε το Δωρεάν Τώρα
  • Υποστηρικτικό υλικό

    Υποστηρικτικό υλικό

    Βιβλιοθήκη LayerX

    Φύλλα δεδομένων, λευκές βίβλοι, μελέτες περιπτώσεων και άλλα

    Γλωσσάριο

    Όλη η ορολογία που πρέπει να γνωρίζετε

    Βάση δεδομένων επεκτάσεων

    Extensionpedia

    Ο κόμβος επεκτάσεων προγράμματος περιήγησης

    Ιστολόγιο και Podcast

    Blog

    Τελευταίες έρευνες, τάσεις και νέα της εταιρείας

    podcasts

    Το #1 podcast για την ασφάλεια του προγράμματος περιήγησης

     

    Enterprise Browser

    Επεξήγηση των εκμεταλλεύσεων προγράμματος περιήγησης
    Secure Enterprise Browser
    Κίνδυνοι ασφαλείας επεκτάσεων προγράμματος περιήγησης και βέλτιστες πρακτικές
    Τι είναι η απομόνωση προγράμματος περιήγησης;
    ChatGPT Κίνδυνοι ασφάλειας

    AI Security

    Τι είναι ο έλεγχος χρήσης τεχνητής νοημοσύνης;
    Τι είναι η Διακυβέρνηση GenAI; Συμβουλές και βέλτιστες πρακτικές
    Τι είναι η Γενετική Ασφάλεια Τεχνητής Νοημοσύνης;
    Τι είναι η διαρροή δεδομένων ChatGPT;
    Παραβιάσεις Δεδομένων Τεχνητής Νοημοσύνης: Βασικές Αιτίες & Επιπτώσεις στον Πραγματικό Κόσμο

    LayerX εναντίον ανταγωνιστών

    LayerX vs Island Enterprise Browser
    LayerX vs Prisma Access Browser
    Επέκταση προγράμματος περιήγησης LayerX έναντι Prisma Access
    LayerX εναντίον Netskope SASE/SSE
    LayerX εναντίον Netskope One Enterprise Browser
    LayerX εναντίον Palo Alto SSE
  • Ζητήστε ένα Demo
  • Συνδέση
Home Blog Τι παραβλέπει ο Agent 365 σχετικά με την Shadow AI στο περιβάλλον σας;

Τι παραβλέπει ο Agent 365 σχετικά με την Shadow AI στο περιβάλλον σας;

Microsoft Agent 365 gives security teams a governance layer for AI agents operating inside your Microsoft 365 environment: discovery, identity controls, Intune-based blocking. What it does not cover is the browser. Every time an employee opens ChatGPT in Chrome, pastes source code into Claude from a personal account, or installs an AI extension on a device that is not Intune-enrolled, that activity happens outside Agent 365’s visibility entirely.

What is shadow AI in a Microsoft 365 environment?

Shadow AI refers to AI tools, agents, and workflows that employees use without IT awareness or formal approval. In a Microsoft 365 environment specifically, this includes unauthorized local agents like OpenClaw, consumer AI tools accessed through personal accounts, AI-connected MCP servers, third-party Copilot plugins, and AI-enabled browser extensions running across any browser employees choose to use.

The challenge is not that employees are trying to create security problems. They are trying to meet deadlines. A developer installs a local AI coding assistant. A sales rep connects a personal ChatGPT account to their workflow. A marketing manager pastes a strategy document into Gemini to get a first draft. None of these require IT approval, none get logged, and none are visible to the security team until something goes wrong.

According to LayerX’s Browser Security Report 2025, nearly 90% of AI logins in enterprise environments bypass oversight entirely, with 67% of employees accessing GenAI tools via personal accounts. That is not a visibility gap at the edge of your environment. That is the center of your environment.

What does Microsoft Agent 365 actually do to govern shadow AI?

Microsoft Agent 365 is a control plane for AI agents operating within the Microsoft 365 ecosystem. It integrates three existing Microsoft security platforms to provide agent-specific governance: Microsoft Entra handles agent identity and access control, Microsoft Purview manages data security and compliance for agent interactions, and Microsoft Defender provides threat detection and posture management.

On the shadow AI side specifically, Agent 365 includes a dedicated Shadow AI (Frontier) page in the Microsoft 365 admin center. This feature focuses on detecting and governing unapproved local AI agents. When an organization enables the detection policy for a known shadow AI agent, Agent 365 can identify which managed Windows devices have that agent installed and push a blocking policy through Intune.

The Agent 365 security architecture also surfaces agent sprawl risks that emerge from over-privileged agents, misconfigured agents, and tool misuse patterns including prompt injection. These are genuine governance capabilities that address a real and growing problem in enterprise AI environments.

What are the prerequisites Agent 365 requires to detect shadow AI?

This is where security architects need to read carefully. The Agent 365 Shadow AI detection feature is not available to all Microsoft 365 customers by default. As of the current preview, it requires a Microsoft 365 E3 license minimum, enrollment in the Frontier preview program, and critically, Microsoft Intune enrollment for managed Windows devices.

That last prerequisite carries significant weight. Detection and blocking through Agent 365 currently applies only to managed Windows devices enrolled with Microsoft Intune. A user on a Mac, on a personal laptop, on a contractor device, or on any Windows device not enrolled in Intune sits entirely outside this detection boundary. Additionally, the current public preview of the Shadow AI (Frontier) feature supports detection and blocking for a single known agent: OpenClaw.

Microsoft has signaled the feature set will expand. But as it stands today, the architectural constraint is real: Agent 365’s shadow AI controls require Intune management, Windows devices, and known agent signatures to do their work.

Where does Agent 365’s shadow AI coverage stop?

Agent 365 governs AI agents at the identity and endpoint layer. It can manage what registered agents can access, enforce conditional access policies tied to agent identities, detect known shadow agents on managed endpoints, and audit agent activity flowing through Microsoft’s own security toolchain. That is a meaningful security layer.

The boundary sits at the browser session. Agent 365 has no mechanism to observe what an employee types into ChatGPT in a browser tab, what they paste into Claude or Gemini during a work session, which AI tools they access through personal accounts on managed or unmanaged devices, or what AI-enabled browser extensions are doing inside active sessions on any browser other than Edge for Business.

Microsoft Edge for Business addresses part of this gap through Purview prompt-level DLP, which can audit or block sensitive content submitted to select AI tools. But this protection applies only when employees are signed into Edge for Business with their Entra ID credentials. Switch to Chrome, Firefox, or any other browser, and the coverage stops. For organizations with BYOD policies, contractor workforces, or mixed-browser environments, this creates a structural blind spot that no combination of Agent 365 and Edge for Business can fully close on its own.

What shadow AI risks exist outside Agent 365’s detection boundary?

Three risk categories emerge consistently when organizations look at the surface Agent 365 does not cover.

The first is personal account access to sanctioned and unsanctioned AI tools. LayerX research shows that 71.6% of enterprise access to GenAI tools happens through non-corporate accounts. When an employee accesses ChatGPT, Claude, or Gemini through a personal Gmail account, that session is invisible to Agent 365, Entra, and Purview. The user may be on a fully Intune-managed device with all policies applied. The data they are moving into that AI tool is completely ungoverned at the session level.

The second is copy-paste activity. File-based DLP has existed for years. What it cannot catch is the paste. LayerX’s Browser Security Report 2025 found that 77% of employees paste data into GenAI prompts, with 50% of that paste activity including corporate data. No endpoint tool sees a paste event. No network tool sees what content was carried in it. This is the primary data exfiltration vector in modern enterprise environments, and it happens entirely inside the browser.

The third is AI access on unmanaged devices. Security architects at large enterprises know their managed device population is not their entire employee population. Contractors, part-time workers, remote employees on personal machines, and BYOD users all represent real vectors for AI data exposure. Agent 365’s Intune requirement means these users fall entirely outside its shadow AI governance model.

How do AI-enabled browser extensions create shadow AI risks Agent 365 cannot see?

AI-enabled browser extensions are one of the fastest-growing and least-understood shadow AI vectors in enterprise environments. These extensions run inside the browser session, with access to page content, text inputs, clipboard data, and in many cases cookies and identity information. They do not require IT approval, do not appear in Intune inventories, and are not covered by Agent 365’s current shadow AI detection capabilities.

The scale of the risk is not hypothetical. LayerX’s Enterprise Browser Extension Security Report 2026 found that 1-in-6 enterprise users run at least one AI-enabled browser extension, with 73% of those extensions carrying high or critical permission scope. AI extensions are 60% more likely to have a known CVE than the average extension, 3 times more likely to have access to cookies, and nearly 6 times more likely to change or expand their permissions over time after installation.

An employee using an AI writing assistant extension has granted that extension access to everything they type in their browser. That includes drafts pasted into email, content entered into internal tools, and prompts submitted to any AI platform they use during the workday. From a security perspective, this is a live, persistent data access grant that sits entirely below Agent 365’s detection threshold.

The security team cannot govern what it cannot see, and Agent 365’s visibility does not extend to extension behavior inside browser sessions.

What does a complete shadow AI governance posture look like for Microsoft 365 environments?

A complete shadow AI governance posture for organizations running Microsoft 365 requires two distinct layers, each covering a different part of the risk surface.

The first layer is the agent identity and endpoint layer. Agent 365, Entra, Purview, and Defender operate here. This layer governs known and registered AI agents, enforces least-privilege access for agents acting within the M365 ecosystem, detects known shadow agents on managed Windows endpoints, and audits agent activity within Microsoft’s security telemetry. For organizations deeply invested in the Microsoft stack, this layer is worth deploying and maturing.

The second layer is the browser session layer. This is where human-driven AI activity happens: employees accessing ChatGPT, Claude, Perplexity, Grammarly, and Gemini in real time, across any browser they use, on any device, through any account type. The browser session layer is where copy-paste exfiltration happens, where AI extensions operate, and where personal account access bypasses every identity governance control in the first layer.

These two layers are not redundant. They address structurally different threat vectors. A security architecture that has invested in Agent 365 without a browser-level AI governance layer has strong coverage for registered agents and a largely unmonitored surface for human-driven AI activity. A governance strategy that addresses both layers covers the full shadow AI problem in a Microsoft 365 environment.

How Does LayerX Address the Browser-Level Shadow AI Gap?

Security teams running Agent 365 have strong coverage for known, registered AI agents operating through managed Windows endpoints. The surface that still needs coverage is the browser, where employees access ChatGPT, Claude, Gemini, Grammarly, and hundreds of other AI tools through personal accounts, on BYOD devices, across any browser they choose. LayerX’s Επέκταση προγράμματος περιήγησης Enterprise addresses this layer through Shadow AI Discovery and Τεχνητή Νοημοσύνη DLP: it surfaces every AI tool accessed in the browser regardless of account type or device management status, and applies real-time enforcement on prompts, pastes, and file uploads without requiring Intune enrollment or Edge for Business adoption.

Because LayerX operates at the browser session level rather than the identity or endpoint layer, it covers what Agent 365 was not designed to reach. Security teams get last-mile visibility into Χρήση Τεχνητής Νοημοσύνης across Chrome, Firefox, Edge, and any other browser in the environment, with granular controls that range from monitor-only through warn, prevent, and redact depending on data classification and policy. Together, Agent 365 and LayerX address the full shadow AI surface in a Microsoft 365 environment: one governing AI agents at the identity layer, the other governing human AI sessions at the browser layer.

Ζητήστε ένα Demo

How should security architects think about Agent 365 and browser-level AI controls together?

The most useful mental model is a coverage map rather than a product comparison. Agent 365 and browser-level AI security controls are not alternatives to each other. They address different threat surfaces at different layers of the stack.

Agent 365 owns the agent identity and lifecycle layer: registered agents, M365-integrated workflows, Copilot Studio agents, Intune-managed endpoints, and the Entra-Purview-Defender telemetry chain. It is the right tool for governing AI agents that operate within Microsoft’s ecosystem and that security teams have some prior awareness of.

Browser-level controls own the session layer: real-time activity across all browsers, personal account access, BYOD devices, AI extensions, copy-paste flows, and the long tail of consumer AI tools employees bring into the workplace without IT knowledge. This is the surface that generates the most data exposure events in practice, because it requires no formal agent deployment and no IT approval process to activate.

Security architects evaluating their shadow AI posture should ask two questions: first, can we see and govern AI agents operating within our M365 ecosystem at the identity level? Agent 365 answers that question. Second, can we see and govern AI activity happening in the browser, across all browsers, on all devices, through all account types? That second question requires a different layer of control, purpose-built for the browser session where most enterprise AI activity actually occurs.

Συχνές ερωτήσεις

Does Microsoft Agent 365 block shadow AI on all devices, or only managed ones?

Agent 365’s Shadow AI detection and blocking currently applies only to managed Windows devices enrolled with Microsoft Intune. Unmanaged devices, personal laptops, BYOD endpoints, contractor machines, and any non-Windows device fall outside Agent 365’s current shadow AI detection scope. This is a design constraint of the Intune-based enforcement model, not a configuration issue.

Can Agent 365 see what employees type into ChatGPT or other web-based AI tools?

No. Agent 365 governs AI agents at the identity and endpoint layer through Entra, Purview, and Defender. It does not have visibility into browser session activity, including prompts submitted to ChatGPT, Claude, Gemini, or other web-based AI tools. Microsoft Edge for Business can apply Purview DLP to prompts in select AI tools, but only when employees are signed in with Entra ID credentials on Edge for Business specifically. Any session on another browser falls outside this coverage.

What is the difference between shadow AI at the identity layer and shadow AI at the browser layer?

Shadow AI at the identity layer refers to AI agents and tools that have been granted access to organizational data or systems without proper IT governance, such as an unauthorized local agent with Entra permissions or a third-party Copilot plugin with excessive access rights. Shadow AI at the browser layer refers to AI activity that happens inside browser sessions without IT visibility: employees accessing ChatGPT or Gemini through personal accounts, pasting sensitive data into AI prompts, or running AI browser extensions with broad page permissions. Agent 365 addresses the identity layer. Browser-level controls are needed for the session layer.

Do I need Intune to use Agent 365 Shadow AI detection?

Yes. As of the current public preview, Agent 365 Shadow AI detection requires Microsoft Intune enrollment for managed Windows devices. Detection and blocking policies are propagated through Intune and apply only to devices within that management scope. Organizations without comprehensive Intune coverage, or those with significant BYOD or contractor device populations, should plan for additional coverage layers to address the devices and sessions outside Intune’s reach.

What AI tools does Agent 365 currently support for shadow AI governance?

As of the public preview, Agent 365’s Shadow AI (Frontier) feature supports detection and blocking for OpenClaw, an unauthorized local AI coding agent. Microsoft has indicated the supported agent list will expand over time. The broader Agent 365 platform supports governance for Microsoft-native agents including Copilot and Copilot Studio agents, as well as third-party agents registered within the M365 ecosystem. Consumer AI tools accessed through web browsers, such as ChatGPT, Claude, and Gemini, are not within Agent 365’s current governance scope.

How do security teams govern AI access on unmanaged or BYOD devices in a Microsoft 365 environment?

Agent 365 and the broader Microsoft security stack do not currently provide comprehensive AI governance for unmanaged or BYOD devices. Governing AI access on these devices requires controls that operate below the Intune enrollment requirement, specifically at the browser session level. A browser-based security layer deployed as an extension can enforce AI usage policies across any browser, on any device, regardless of whether the device is enrolled in Intune, which operating system it runs, or which account the employee uses to access AI tools.

See How LayerX Covers the Browser-Level Shadow AI Gap

If your organization is running Agent 365 and wants to understand what your current AI governance coverage map actually looks like, LayerX can show you exactly what is visible at the browser layer that Agent 365 cannot see.

Ζητήστε ένα Demo

 

Boaz Yona Δημοσιεύθηκε - 7 Μαΐου 2026

  • Μοιραστείτε το:
  • Μοιραστείτε το:
Boaz Yona

Boaz Yona

Η ολοκληρωμένη πλατφόρμα τεχνητής νοημοσύνης και ασφάλειας προγράμματος περιήγησης

Διαχείριση επέκτασης προγράμματος περιήγησης Web/SaaS DLP Προστασία ταυτότητας GenAI Security Shadow SaaS ασφαλής περιήγηση Ασφαλής πρόσβαση

Πίνακας περιεχομένων

    Αποκτήστε τα πιο πρόσφατα από το LayerX

    Σχετικοί πόροι

    CursorJacking: Κάθε χρήστης δρομέα είναι ευάλωτος σε κλοπή κλειδιού API από Rogue Extensions
    blog Post

    CursorJacking: Κάθε χρήστης δρομέα είναι ευάλωτος σε κλοπή κλειδιού API από Rogue Extensions

    Ο δρομέας δεν αποθηκεύει κλειδιά API σε προστατευμένο χώρο αποθήκευσης, που σημαίνει ότι οποιαδήποτε επέκταση μπορεί να έχει πρόσβαση σε αυτά. Ο δρομέας γνώριζε για αυτό το κενό ασφαλείας, αλλά δεν το διόρθωσε. Εκτελεστική Σύνοψη Οι ερευνητές ασφάλειας LayerX διαπίστωσαν ότι οποιαδήποτε επέκταση του δημοφιλούς εργαλείου ανάπτυξης τεχνητής νοημοσύνης, Cursor, μπορεί να έχει πρόσβαση στα κλειδιά API και τα διακριτικά περιόδου σύνδεσης του προγραμματιστή, οδηγώντας σε πλήρη παραβίαση των διαπιστευτηρίων, με […]

    Ρόι Παζ - 04 Απριλίου 2026 Διαβάστε περισσότερα
    Οι προγραμματιστές επεκτάσεων πωλούν τα δεδομένα τουλάχιστον 6.5 εκατομμυρίων χρηστών – και όλα είναι απολύτως νόμιμα
    blog Post

    Οι προγραμματιστές επεκτάσεων πωλούν τα δεδομένα τουλάχιστον 6.5 εκατομμυρίων χρηστών – και όλα είναι απολύτως νόμιμα

    Αυτή δεν είναι μια ιστορία για κακόβουλο λογισμικό. Κανείς δεν σας χάκαρε. Κανείς δεν έκλεψε τίποτα. Οι επεκτάσεις που χρησιμοποιείτε αυτή τη στιγμή ενδέχεται να πωλούν τα δεδομένα περιήγησής σας — και σας είπαν ότι θα το έκαναν. Βρίσκεται ακριβώς εκεί στην πολιτική απορρήτου. Σελίδα 4. Παράγραφος 7. Αυτή που κανείς δεν διαβάζει.

    Dar Kahllon & Guy Erez - 04 Απριλίου 2026 Διαβάστε περισσότερα
    StealTok: 130 χρήστες παραβιάστηκαν από κλοπή δεδομένων από βίντεο TikTok που «κατέβαζαν» βίντεο
    blog Post

    StealTok: 130 χρήστες παραβιάστηκαν από κλοπή δεδομένων από βίντεο TikTok που «κατέβαζαν» βίντεο

      Οι ερευνητές ασφαλείας της LayerX αποκάλυψαν μια καμπάνια τουλάχιστον 12 αλληλένδετων επεκτάσεων προγράμματος περιήγησης που μεταμφιέζονται σε προγράμματα λήψης βίντεο TikTok, αλλά στην πραγματικότητα παρακολουθούν τη δραστηριότητα των χρηστών και συλλέγουν δεδομένα. Οι επεκτάσεις μοιράζονται μια κοινή βάση κώδικα και είναι όλες κλώνοι ή ελαφρώς τροποποιημένες εκδόσεις η μία της άλλης, υποδεικνύοντας ότι πρόκειται για μια μακροχρόνια και επίμονη […]

    Natalie Zargarov - 04 Απριλίου 2026 Διαβάστε περισσότερα
    Λογότυπο LayerX
    • Πλατφόρμα
    • Συνεργάτες
    • Υποστηρικτικό υλικό
      • Βιβλιοθήκη LayerX
      • Blog
      • Γλωσσάριο
      • Επεξήγηση της ασφάλειας του προγράμματος περιήγησης
      • Τι είναι η απομόνωση προγράμματος περιήγησης;
      • Τι είναι τα Enterprise Browsers;
    • Εταιρεία
      • Σχετικά με εμάς
      • Καριέρα
      • Πρόγραμμα αποκάλυψης ευπάθειας
    Demo Demo

    Πνευματικά δικαιώματα © 2026 LayerX Όροι και Προϋποθέσεις Πολιτική Απορρήτου Πρόγραμμα αποκάλυψης ευπάθειας