Skip to content

Commit 2c634e2

Browse files
Merge pull request #29377 from MicrosoftDocs/main
[AutoPublish] main to live - 09/05 13:30 PDT | 09/06 02:00 IST
2 parents c0d4d6a + 5efe404 commit 2c634e2

8 files changed

Lines changed: 92 additions & 2 deletions

microsoft-365/admin/manage/manage-shared-agents.md

Lines changed: 25 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ f1.keywords:
55
ms.author: erikre
66
author: ErikRe
77
manager: dansimp
8-
ms.date: 08/13/2025
8+
ms.date: 09/04/2025
99
ms.update-cycle: 180-days
1010
audience: Admin
1111
ms.topic: concept-article
@@ -79,9 +79,32 @@ If you need to restore access to a previously blocked agent, you can unblock it
7979

8080
After the agent is unblocked, it’ll be restored to the most recent availability and deployment state.
8181

82+
## Ownerless shared agent management
83+
84+
Shared agents may become ownerless when the user who created them is deleted from the organization.
85+
86+
To help administrators manage these scenarios, the Microsoft 365 Admin Center now enables you to identify and manage ownerless shared agents. The dashboard displays the total count of such agents, a one-click filter to quickly isolate them, and real-time updates reflecting user deletions, enabling administrators to efficiently review and address ownership gaps by blocking or deleting affected agents.
87+
88+
:::image type="content" source="../../media/agents/ownerless-shared-agents.png" alt-text="Screenshot showing ownerless shared agents." lightbox="../../media/agents/unblock.png":::
89+
90+
### Key features
91+
92+
- Ownerless agent count: Administrators can now view the total number of agents without a valid owner directly from the dashboard. For example, the dashboard shows 20 ownerless agents indicating that these agents were created by users who have since left the organization.
93+
94+
- One-Click Filter: Clicking the dashboard pane instantly filters the agent inventory to display only shared agents missing an owner. This feature allows for quick triage and action.
95+
96+
- Real-Time Updates: The ownerless agent count is automatically updated when a user is hard deleted from the organization. This feature ensures that the dashboard reflects the current state without requiring manual refreshes.
97+
98+
### Steps to view and manage ownerless shared agents
99+
100+
1. In the admin center, go to **Copilot** > **Agents**.
101+
2. Locate the **Missing an Owner** tab.
102+
3. Select the tab to filter **Agent inventory**.
103+
4. Review the list of ownerless agents and take appropriate actions such as blocking or deleting the agent.
104+
82105
## Export to Excel
83106

84-
You can export the list of shared agents to an Excel file. This is essential for detailed analysis and reporting.
107+
You can export the list of shared agents to an Excel file. This feature is essential for detailed analysis and reporting.
85108

86109
> [!NOTE]
87110
> If the export process reaches one minute, only the data up to that point will be included in the exported file.
471 KB
Loading
73.4 KB
Loading
142 KB
Loading
56.1 KB
Loading
69.2 KB
Loading

microsoft-365/services/TOC.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -80,3 +80,8 @@ items:
8080

8181
- name: Microsoft 365 Backup
8282
href: ../backup/backup-overview.md
83+
84+
- name: Troubleshooting
85+
items:
86+
- name: RequestDisallowedByPolicy
87+
href: error-request-disallowed-by-policy.md
Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
---
2+
title: RequestDisallowedByPolicy
3+
ms.author: chucked
4+
author: chuckedmonson
5+
manager: jtremper
6+
ms.reviewer: ivchenya
7+
ms.date: 09/05/2025
8+
audience: admin
9+
ms.topic: install-set-up-deploy
10+
ms.service: microsoft-365-business
11+
ms.subservice:
12+
search.appverid:
13+
ms.collection:
14+
ms.localizationpriority: medium
15+
description: Learn how to fix the RequestDisallowedByPolicy error when creating resources in Azure.
16+
---
17+
18+
# RequestDisallowedByPolicy
19+
20+
This article describes how to fix the **RequestDisallowedByPolicy** error when creating resources in Azure.
21+
22+
If you’re seeing the error code **RequestDisallowedByPolicy**, it means that the creation of a resource was blocked by an Azure policy assigned in your environment. This often occurs when certain resource types aren't explicitly allowed under a policy—such as the GM Resource Standards policy.
23+
24+
## What’s causing the issue?
25+
26+
Your organization has applied a policy, typically called "Allowed resource types"—to control which Azure resources can be created. If you're trying to deploy a resource type that's not listed in this policy, Azure blocks the request and show this error.
27+
28+
## How to resolve it
29+
30+
To fix this, you need to update the policy assignment to include the resource types you're trying to deploy (for example, for document processing for Microsoft 365 scenarios).
31+
32+
### Step-by-step instructions
33+
34+
1. Sign in to the [Azure portal](https://portal.azure.com/).
35+
36+
2. In the top search bar, type *Policy* and select it.
37+
38+
3. In the Policy blade, select **Assignments** from the left navigation.
39+
40+
4. Locate the policy assignment with the name "Allowed resource types" (usually tied to the GM Resource Standards initiative).
41+
42+
5. Select the policy, and then select **Edit assignment**.
43+
44+
6. Under **Parameters**, add the resource types you want to allow:
45+
- Microsoft.Syntex/accounts
46+
- Microsoft.Syntex/documentProcessors
47+
48+
7. Select **Save** to apply the changes.
49+
50+
8. Try creating the resource again.
51+
52+
Need visual help?
53+
54+
Check out the following screenshots for each step in the Azure portal to guide you through the process.
55+
56+
![Screenshot showing the Assign policy page in the Azure portal.](../media/services/azure-assign-policy.png)
57+
58+
![Screenshot showing the Policy Assignments page in the Azure portal.](../media/services/azure-assign-policy.png)
59+
60+
![Screenshot showing the Allowed resource types page in the Azure portal.](../media/services/azure-assign-policy.png)
61+
62+
![Screenshot showing the Assign policy page for a specific policy in the Azure portal.](../media/services/azure-assign-policy-full-page.png)

0 commit comments

Comments
 (0)