Windows Deployment Services (WDS): Hands-free deployment hardening (Phase 1)



We’ve released updates to the following update channels for Microsoft 365 Apps:

The Data Security Posture Agent, launching in public preview December 2025, uses large language models to discover sensitive data and assess risks beyond keyword analysis. Available in Microsoft Purview, it offers GenAI summaries, actionable recommendations, and requires admin setup for data security management.

Starting early February 2026, Microsoft Purview Activity Explorer will let admins preview flagged email attachments in Exchange Online directly within the portal, without downloading emails. This feature is enabled by default, requires no action, and maintains existing DLP and Information Protection policies.

Starting February 12, 2026, the tenant setting “Capacities can be designated as Fabric Copilot capacities” will be enabled by default for all tenants. Existing capacity configurations remain unchanged. Tenants can opt out before rollout by toggling the setting on then off in the Fabric admin portal.

Starting February 16, 2026, Microsoft Purview eDiscovery direct export packages will expire 14 days after creation, improving storage efficiency and security. This affects exports created after that date, not review set exports. Users should download exports within 14 days or regenerate them if expired.

The Researcher Agent in Microsoft 365 Copilot empowers users to create rich, detailed reports on any topic they choose whether from work or web content. We are introducing new output formats in the Researcher Agent that will allow users to export and consume generated reports in their preferred formats. Users will be able to export their Researcher reports to PowerPoint, PDF, Infographic or an Audio Overview. We are also updating the UX for previously existing output formats- Word and Pages.

We’re introducing the ability to save meeting invites as drafts on mobile. This feature allows users to begin composing a meeting and return to it later without sending the invite immediately—helping them stay organized and flexible when scheduling.

Admins or app owners can now safely pause an app’s access to Entra protected resources without deleting it or disrupting configuration. When deactivated, the app and its service principals globally (across tenants) can’t request new tokens and user sign ins are blocked, while existing tokens simply expire on their normal schedule. This makes it easy for admins to temporarily freeze suspicious or unused apps during investigations, bulk cleanup, or tenant hygiene work. This capability will initially be available via Microsoft Graph API.
More info: https://learn.microsoft.com/en-us/entra/identity/enterprise-apps/deactivate-application-portal
