|
| 1 | +--- |
| 2 | +title: Manage generative AI apps for your organization |
| 3 | +f1.keywords: NOCSH |
| 4 | +ms.author: deniseb |
| 5 | +author: denisebmsft |
| 6 | +manager: dansimp |
| 7 | +ms.reviewer: |
| 8 | +ms.date: 10/29/2025 |
| 9 | +ms.update-cycle: 180-days |
| 10 | +audience: Admin |
| 11 | +ms.topic: article |
| 12 | +ms.service: microsoft-365-copilot |
| 13 | +ms.localizationpriority: medium |
| 14 | +ms.collection: |
| 15 | +- m365copilot |
| 16 | +- trust-pod |
| 17 | +- magic-ai-copilot |
| 18 | +description: Learn how to discover, monitor, and manage the generative AI apps your organization uses. |
| 19 | +appliesto: |
| 20 | +- ✅ Microsoft 365 Copilot |
| 21 | +--- |
| 22 | + |
| 23 | +# Manage generative AI apps for your organization |
| 24 | + |
| 25 | +As people embrace and incorporate [generative AI apps](/ai/playbook/technology-guidance/generative-ai/), such as Microsoft 365 Copilot and non-Microsoft AI apps into daily work, it's important for your organization's security team to be able to manage those apps. Microsoft applies a multi-layered, defense-in-depth strategy to secure Microsoft 365 Copilot at every level (see [What Microsoft does to secure Microsoft 365 Copilot](microsoft-365-copilot-ai-security.md#what-microsoft-does-to-secure-microsoft-365-copilot)). |
| 26 | + |
| 27 | +But what about non-Microsoft AI apps? |
| 28 | + |
| 29 | +Using capabilities in [Data Security Posture Management (DSPM) for AI](/purview/dspm-for-ai?tabs=m365) (part of Microsoft Purview) and/or [Microsoft Defender for Cloud Apps](/defender-cloud-apps/what-is-defender-for-cloud-apps) (part of Microsoft Defender), your security team can empower people in your organization to use generative AI apps more securely, including both Microsoft and non-Microsoft AI apps. |
| 30 | + |
| 31 | +This article describes how to: |
| 32 | + |
| 33 | +- [Use DSPM for AI to discover and manage AI app usage](#use-dspm-for-ai-to-discover-and-manage-ai-app-usage); and |
| 34 | +- [Use Defender for Cloud Apps to discover, monitor, or block generative AI apps](#use-defender-for-cloud-apps-to-discover-monitor-or-block-generative-ai-apps) |
| 35 | + |
| 36 | +Discovering, monitoring, and managing AI apps is essential to prevent data leaks, maintain compliance, enforce governance, and uphold trust in enterprise AI adoption. This article describes how to perform these tasks using DSPM for AI and Defender for Cloud Apps. |
| 37 | + |
| 38 | +## Before you begin |
| 39 | + |
| 40 | +- **Make sure you have appropriate permissions assigned** to perform the tasks in this article. |
| 41 | + - See [Microsoft Purview permissions](/purview/purview-permissions#microsoft-purview-permissions) |
| 42 | + - See [Microsoft 365 and Microsoft Entra roles with access to Defender for Cloud Apps](/defender-cloud-apps/manage-admins#microsoft-365-and-microsoft-entra-roles-with-access-to-defender-for-cloud-apps) |
| 43 | + |
| 44 | +- **To use DSPM for AI, configure Purview**. Select one or more of the [Microsoft Purview deployment models](/purview/deploymentmodels/depmod-overview), which include: |
| 45 | + - [Secure by default](/purview/deploymentmodels/depmod-securebydefault-intro) |
| 46 | + - [Purview Data Security Posture Management](https://aka.ms/DSPMBlueprintPDF) |
| 47 | + |
| 48 | +- **To use Defender for Cloud Apps, [set up Microsoft Defender XDR](/defender-xdr/pilot-deploy-overview)**, including these components: |
| 49 | + - [Microsoft Defender for Cloud Apps](/defender-xdr/pilot-deploy-defender-cloud-apps) for discovering, monitoring, and blocking specific AI applications |
| 50 | + - [Microsoft Defender for Endpoint](/defender-xdr/pilot-deploy-defender-endpoint) for preventing unsanctioned AI apps from running on onboarded devices |
| 51 | + |
| 52 | +## Use DSPM for AI to discover and manage AI app usage |
| 53 | + |
| 54 | +DSPM for AI provides your security and compliance team to discover AI activity, protect data in AI prompts, and govern data handling. [Learn more about DSPM for AI](/purview/dspm-for-ai?tabs=m365). |
| 55 | + |
| 56 | +1. **Create or activate Purview policies**. DSPM for AI includes default policies that you can activate. See [One-click policies from Data Security Posture Management for AI](/purview/dspm-for-ai-considerations#one-click-policies-from-data-security-posture-management-for-ai). |
| 57 | + |
| 58 | +2. **After your policies are deployed, you can view generative AI events in the activity explorer and in audit logs**. Examples of such events include: |
| 59 | + |
| 60 | + - User interactions with a generative AI site |
| 61 | + - Data Loss Prevention (DLP) rules matched during user interactions with a generative AI site |
| 62 | + - Sensitive information types were found in user interactions with a generative AI site |
| 63 | + |
| 64 | + For more information, see [Activity explorer events](/purview/dspm-for-ai-considerations#activity-explorer-events) and [Audit logs for Copilot and AI applications](/purview/audit-copilot). |
| 65 | + |
| 66 | +3. **Configure DLP policies for the Microsoft Edge browser** and [block other browsers](/deployedge/microsoft-edge-management-service-customizations#block-other-browsers). This action prevents users from accessing unmanaged AI apps in unprotected browsers. For more information, see [Activate your DLP policy in Microsoft Edge](/deployedge/microsoft-edge-dlp-purview-configuration). |
| 67 | + |
| 68 | +## Use Defender for Cloud Apps to discover, monitor, or block generative AI apps |
| 69 | + |
| 70 | +With Defender for Cloud Apps, you can discover, monitor, or block generative AI applications in your organization, as described in the following sections. |
| 71 | + |
| 72 | +### Use the cloud app catalog to discover AI apps |
| 73 | + |
| 74 | +You can use the Microsoft Defender portal to see a list of AI apps your organization is using. Defender for Cloud Apps provides a catalog of apps with security and compliance risk scores. See [Cloud app discovery overview](/defender-cloud-apps/set-up-cloud-discovery). |
| 75 | + |
| 76 | +1. Go to the [Microsoft Defender portal](https://security.microsoft.com) and sign in. |
| 77 | + |
| 78 | +2. In the navigation pane, expand **Cloud apps**, and then select **Cloud app catalog**. |
| 79 | + |
| 80 | +3. In the **Category** filter, select **Generative AI**. |
| 81 | + |
| 82 | +4. Review the list of apps, along with their risk scores. Make a note of the apps you might want to monitor or block. For more information about risk scores, see [Find your cloud app and calculate risk scores](/defender-cloud-apps/risk-score). |
| 83 | + |
| 84 | +### Create a policy to monitor AI apps |
| 85 | + |
| 86 | +Make sure to review the [prerequisites](/defender-cloud-apps/governance-discovery#prerequisites). Also see [Control cloud apps with policies](/defender-cloud-apps/governance-discovery#control-cloud-apps-with-policies). |
| 87 | + |
| 88 | +Create a new [custom policy](/defender-cloud-apps/app-governance-app-policies-create#custom-policies), specifying the following settings: |
| 89 | + |
| 90 | +- For **Policy template**, choose **No template**. |
| 91 | +- For **Policy name**, type a name, like *New Generative AI Apps*. |
| 92 | +- For **Policy severity**, select the level 2 option. |
| 93 | +- Provide a description, like *Generate an alert when a new Generative AI app is used*. |
| 94 | +- In the **Apps matching all of the following** section, specify **Category equals Generative AI**. |
| 95 | +- In the **Apply to** list, select **All continuous reports**. |
| 96 | + |
| 97 | +### Create a policy to block specific AI apps |
| 98 | + |
| 99 | +Make sure to review the articles [Control cloud apps with policies](/defender-cloud-apps/governance-discovery#control-cloud-apps-with-policies) and [Create app governance policies](/defender-cloud-apps/app-governance-app-policies-create#custom-policies). |
| 100 | + |
| 101 | +1. In the [Microsoft Defender portal](https://security.microsoft.com), in the navigation pane, select **Cloud apps** > **Cloud discovery**. |
| 102 | + |
| 103 | +2. On the **Discovered apps** tab, in the **Category** filter, select **Generative AI**. |
| 104 | + |
| 105 | +3. In the list of results, select an AI app that you want to block. At the end of its row, select the three dots, and then select **Unsanctioned**. This action adds an *Unsanctioned* tag that enables you to monitor the app. |
| 106 | + |
| 107 | + > [!IMPORTANT] |
| 108 | + > When an app is marked as unsanctioned, it's automatically blocked across devices that are onboarded to Defender for Endpoint. However, your security team can specify whether to warn and educate users instead of blocking apps. See [Educate users when accessing risky apps](/defender-cloud-apps/mde-govern#educate-users-when-accessing-risky-apps). |
| 109 | +
|
| 110 | +4. In the navigation pane, select **Cloud apps** > **App governance**. |
| 111 | + |
| 112 | +5. Select the **Policies** tab, and then create a new [custom policy](/defender-cloud-apps/app-governance-app-policies-create#custom-policies), specifying the following settings: |
| 113 | + |
| 114 | + - For **Policy template**, choose **No template**. |
| 115 | + - For **Policy name**, type a name, like *Unsanctioned AI Apps*. |
| 116 | + - Provide a description, like *Block unsanctioned AI apps*. |
| 117 | + - In the **Apps matching all of the following** section, specify a condition, such as **Category equals Generative AI** and **Tag equals Unsanctioned**. |
| 118 | + - In the **Apply to** list, select **All continuous reports**. |
| 119 | + |
| 120 | +## See also |
| 121 | + |
| 122 | +- [Microsoft Purview data security and compliance protections for generative AI apps](/purview/ai-microsoft-purview) |
| 123 | +- [App governance in Microsoft Defender for Cloud Apps](/defender-cloud-apps/app-governance-manage-app-governance) |
| 124 | +- [Tech Community blog: Discover, monitor, and protect the use of Generative AI apps](https://techcommunity.microsoft.com/blog/microsoftthreatprotectionblog/discover-monitor-and-protect-the-use-of-generative-ai-apps/3999228) |
| 125 | + |
0 commit comments