Recap from Ignite’s General Session regarding Copilot and Copilot Studio
Copilot Actions, https://aka.ms/copilotactions, are similar to Outlook rules but for AI, functioning as “scheduled tasks” for Copilot. It allows automation of everyday tasks with simple prompts that can be set up in advance. For example, a manager with a distributed team working in several time zones can create an action to summarize all the emails received after working hours. These emails can then be prioritized based on relevance, such as customer-related issues or high-priority listings, ready for when the manager signs in the following day.
The capability to create custom Copilot Agents in SharePoint was announced a few months ago and is now generally available (GA). Microsoft also announced some upcoming out-of-the-box agents. The Interpreter Agent in Teams will provide real-time speech-to-speech interpretation during meetings and can simulate the user’s speaking voice. This feature is set to enter Public Preview in early 2025. The Employee Self-Service Agent, which can assist with common policy questions to support HR and IT, is currently in private preview and can be customized with Copilot Studio. The Facilitator Agent, which can take real-time editable notes in Teams meetings and chats, is in public preview. The Project Manager Agent, capable of automating plan creation and task completion in Microsoft Planner, is also in public preview. More out-of-the-box agents are expected to be released in the coming months.
Chris Hinch
Microsoft Practice Director
Microsoft Purview: A Brief Overview
Microsoft Purview is a comprehensive data governance platform that empowers organizations to discover, classify, and manage their data across various sources. It provides insights into data lineage, data cataloging, and data governance, ensuring compliance and...
Understanding Passwordless Authentication with Passkeys
Today, people, data, and devices are everywhere, and the threat landscape is growing at an unprecedented pace, making the use of traditional passwords insufficient. As cyberthreats evolve, passwords have emerged as the weakest link in our defense against unauthorized...
6 Essential Strategies for Effective Endpoint Protection
In today's mobile world, endpoint protection is more important than ever. With the rise of remote work and the increasing sophistication of cyberattacks, it's crucial for businesses to have a strong defense against malware and other threats. But what exactly is...