This post has been republished via RSS; it originally appeared at: Windows Blog.
Continuing Windows evolution as a secure open platform for AI and Agents
At Build, we laid out our vision for the future of development on Windows, announcing new tools that empower developers to do their best work with the ultimate flexibility.- We open-sourced Windows Subsystem for Linux, making it easier than ever for developers to contribute, customize and help us integrate Linux more seamlessly into Windows.
- With Microsoft Foundry on Windows, formerly known as Windows AI Foundry, we introduced a unified and reliable AI platform to support AI development across CPU, GPU and NPU.
- And we announced native support for Model Context Protocol (MCP), which offers a standardized framework for AI agents to connect with apps.
What’s new for Windows Platform at Ignite:
- Public preview of native support for Model Context Protocol (MCP) on Windows, a standardized framework for AI agents to connect with apps and tools to automate routine scenarios and perform tasks for users securely with user consent.
- Public preview of Windows On-Device Registry (ODR), a secure, manageable repository of agent connectors, which are just MCP servers.
- Public preview of built-in agent connectors for File Explorer and System Settings. Agents can use the File Explorer connector to manage, organize and retrieve local files with user consent. With System Settings connector, agents will be able to adjust Windows system settings like changing from light mode to dark mode or troubleshooting issues, while keeping the user in full control.
- Private preview of Agent Workspace - a contained, policy-controlled and auditable environment where agents can interact with software and complete tasks for users in a parallel and separate desktop, without disrupting users’ primary session.
- Introducing Agent ID—A unique ID distinct from the user ID that makes it possible to audit every action taken by the agent. The agent ID also helps IT distinguish agent interactions from user actions.
- Secure by default policies for developers building agents and agent connectors and security controls for end-users using agents—keeping their data secure.
- Enterprise manageability controls for IT admins to configure basic policies for their enterprise employees to adopt and use agents through typical policy configuration channels for Configuration Service Provider (CSP) policies and Group Policies (GP) starting with Intune in public preview.
- Public preview of new AI APIs—video super resolution (VSR) and Stable Diffusion (SDXL) in Microsoft Foundry on Windows, formerly known as Windows AI Foundry. Developers can use these APIs powered by Windows on-device models to add AI-powered video enhancement (VSR) and image generation (SDXL) features to their apps.
Announcing public preview of native support for Model Context Protocol (MCP) on Windows
The Model Context Protocol (MCP) is an open standard introduced by Anthropic in late 2024 to give AI agents a universal way to connect with external tools, data sources and services. By creating a common language for content exchange, MCP accelerated innovation and set the foundation for richer, more capable agentic workflows. On Windows, we are taking MCP even further by catering to the needs of developers, IT professionals and end-users. Users need easy discoverability and consistent controls, minimizing security risks. IT professionals need robust security and manageability controls to deploy agents confidently across the organization. Developers need tools and libraries to build and make their servers easily discoverable to agents without doing bespoke work for each platform. To build these AI experiences and agents at scale, you need an OS that’s built for it. This infrastructure can’t be delivered through middleware or applications alone—it demands OS-level integration for security, consent and control. We are thrilled to transform Windows into an operating system with this secure OS-level integration with a native agent infrastructure. That’s why today, we are announcing the public preview of native support for MCP on Windows—a standardized framework for AI agents to connect with apps and tools to automate routine scenarios and complete tasks for users.Developers can build MCP servers to expose their app’s functionality as agent connectors and register in Windows on-device registry
Agent connectors are essentially MCP servers built by app developers and made available in the Windows on-device registry. These are agent-aware tools that agents can connect to acquire new and unique skills and complete tasks for users. This includes built-in agent connectors from Windows, as well as local and remote connectors from our developer community. Agents can discover and connect to these tools and other agents via a secure, manageable Windows on-device registry (ODR). By default, all agent connectors in the Windows on-device registry will be contained in a secure environment with their own identity and audit trail. All communication between agents and agent connectors from the Windows on-device registry will go through the MCP proxy, a trusted gateway to ensure secure communication enabled by Windows. The proxy handles authentication (verifying the MCP client, the originator of the call), authorization (enforcing permissions and policies), and auditing (logging every interaction for compliance) for both local and remote MCP servers. With standard security policy, each agent connector has its own identity, and secure communication enforced through the MCP proxy ensures that agents and connectors can trust each other’s provenance. We are also introducing support for remote agent connectors. Developers can register remote endpoints with the on-device registry, making them discoverable to any compatible agent along with local agent connectors. With the support for remote agent connectors, developers can register their cloud based MCP servers in the Windows on-device registry and expose their apps’ functionality to agents.Get started, dive into documentation. Platform capabilities in preview coming soon.
- You can build MCP servers to offer your apps unique functionalities as agent connectors and register them in the Windows on-device registry, to be discovered by agents. This will enhance reach and drive engagement for their apps. To get started with building and registering agent connectors, check our documentation—https://aka.ms/RegisterMCPServer
- You can package your agent connectors as either MSIX or MCPB (MCP Bundles). To package and register agent connectors, check our documentation—https://aka.ms/RegisterMCPBundle
- As an agent developer, you can leverage agent connectors and benefit from the apps’ functionality to complete tasks for your users. To connect, list and interact with agent connectors, check our documentation—https://aka.ms/MCPHostQuickstart.
Announcing public preview of Windows built-in agent connectors for File Explorer and System Settings
We are thrilled to announce the public preview of two agent connectors built into Windows—File Explorer and System Settings. These connectors are available via the on-device registry for agents to leverage and complete tasks for users on Windows. File Explorer Connector: Agents can use the File Explorer connector to manage, organize and retrieve local files on a user’s device with their consent. On Copilot+ PCs, the connector can also perform natural language search to retrieve the exact file based on descriptions, content, metadata, and, for images, enhanced search based on image classification. System Settings connector: This connector helps agents adjust Windows system settings like changing from light mode to dark mode or troubleshooting issues, while keeping the user in full control.Announcing private preview of Agent workspace
In addition to using tools like agent connectors, agents can also interact with existing software or line of business applications to complete tasks. We are excited to announce the private preview of Agent workspace—a contained, policy-controlled and auditable environment where agents can interact with software, just like people, to complete tasks for the user in a parallel and separate desktop, without disrupting users’ primary session.Introducing Agent ID
When agents are allowed to use software like people, it becomes more critical for IT professionals to clearly audit and distinguish between agent and user actions. To deliver transparency and control, we have built security paradigms that enforce agents to operate with their own unique identity, completely distinct from the user’s identity, and are governed by strict guardrails set by IT. This ensures every task, workflow and change is clearly tracked, making it easy to differentiate between what agents do and what users initiate. With these core primitives all agentic interactions on Windows are a step function, more secure and contained than traditional apps.Announcing public preview of Windows 365 for Agents
These platform primitives apply not just to agents running locally on Windows client, but also in the cloud in Windows 365. To date, Windows 365 Cloud PCs have been designed for people, delivering the full Windows experience to power employee productivity on any device, anywhere. Today, we are thrilled to announce Windows 365 for Agents, which extends the local agent workspace concept to the cloud so agents can interact with existing software or line of business applications to complete tasks. The key distinction is simple: on local PCs, agents operate in a secure workspace on the user’s device and with Windows 365 for Agents, the Cloud PC itself becomes the agent’s secure, policy-controlled environment. Agent developers can build and deploy agents with Windows 365 for Agents. Windows 365 for Agents provides a comprehensive set of APIs for agent developers to manage and utilize compute resources. Agents running in Windows 365 can also use agent connectors and Windows on-device registry. Learn more about Windows 365 for Agents—https://aka.ms/W365forAgentsIgniteBlogSecuring agentic interactions on Windows
In line with Microsoft’s Secure Future Initiative commitment, security is our top priority as we expand MCP powered capabilities and agent workspace on Windows. At Build this year, we outlined the principles guiding this structure and last month, we expanded on our foundational security principles for agentic AI experiences. We are adhering to a strong set of durable security and privacy principles that must be met to make use of these new capabilities in Windows.- Distinct agent accounts: Agents in Windows operate with dedicated agent accounts, separate from the user account on your device. This enables agent-specific policies and lets you share access to files and resources in a secure manner with agents just as you would with other users on your device. IT admins using Agent 365 to build digital agents can manage Entra identity, policies, registry and observability through a single unified control pane.
- Restricted agent privileges: By default, agents will start with minimal permissions and only gain access to resources you explicitly grant. Their actions are strictly bounded, and they cannot make changes to your device without your authorization. You can revoke access at any time.
- Operational trust: Agents must be signed by a trusted source. Malicious or poorly behaved agents can be revoked and blocked using a range of defense-in-depth measures like certificate validation and antivirus.
- Privacy-preserving design: Windows helps agents adhere to Microsoft’s commitments in the Microsoft Privacy Statement and Responsible AI Standard. Windows will support agents to collect and process data only for clearly defined purposes, enabling transparency and trust. See the Microsoft Privacy Report for details on our commitments to advancing AI responsibly while safeguarding privacy and other fundamental rights.
Secure by default agent policies
In alignment to the above principles, the standard security policy for agent connectors on Windows aligns with Microsoft’s Secure Future Initiative (SFI) principle of “Secure by Default,” ensuring every connector meets strict requirements for packaging, identity and containment. Agent connectors and agents running on Windows must meet the platform security bars around packaging, identity, provenance, containment and consent. The on-device registry will only return agent connectors and agents that meet the criteria below.- Packaging and Identity: All applications must be packaged and have an identity established through trusted signing. This ensures that any connector available for the agent has identity which can be asserted by Windows.
- Private capabilities manifested: Developers are required to define the minimum capabilities required for their agent connectors in their package manifest.
- Containment: Agents and connectors will run in a contained environment as an agent user.
Security controls to manage agentic workflows
To protect user data during agentic operations, we provide key security controls such as experimental agentic feature toggles, mandatory user consent and a dedicated settings page to enable or disable access to agent connectors. Experimental agentic features toggle: All agentic experiences powered by agent connectors and agent workspace are disabled by default and are only enabled when the user toggles on the Windows Settings: Settings > System > AI components > Agent tools > Experimental agentic features. Mandatory user consent: In standard security policy, whenever an agent wants to access any sensitive information—like your files, applications or resources, Windows will always ask for your consent on the first occurrence. Windows Settings for Agent connectors: A dedicated Settings page for each agent, allowing users to manage file access permissions and enable the connectors an agent needs to perform tasks.Enterprise management policies and capabilities to ensure IT is always in control
IT admins can manage basic policies for their enterprise employees to access and use agentic experiences through typical policy configuration channels for Configuration Service Provider (CSP) policies and Group Policies (GP) starting with Intune in public preview.- IT admins can enable or disable both local and remote agent connectors, at device levels, using Intune or other MDM apps through Configuration Service Provider (CSP) and Group Policy Object (GPO).
- IT admins can enable or disable agent workspace at both account and device levels, using Intune or other MDM apps—through both CSP and GPO.
- IT admins can set minimum security policy levels for agent connectors at both account and device levels through both CSP and GPO.
- Agent connectors packaged using MSIX can be deployed and managed using existing enterprise-grade mechanisms such as Intune, Conditional Access and Managed Installers, already familiar to IT teams. Policy support for MCPB will be available in the coming months.
- IT admins can access event logs, which enumerate key Agent connector events such as invocations in agent workspace, errors and registry updates.
