Microsoft is making a major strategic move to accelerate the adoption of AI in security operations by including its Microsoft Security Copilot with all Microsoft 365 E5 licenses. Announced in March 2026, the change means eligible organizations will receive access to the AI security assistant without a separate purchase. The rollout will begin on April 20, 2026, and will automatically provision Security Copilot to M365 E5 tenants. This initiative aims to democratize advanced security capabilities, allowing security teams of all sizes to leverage generative AI for threat investigation, incident summarization, and response orchestration across the Microsoft security stack. This bundling strategy is poised to significantly increase the tool's usage and embed AI more deeply into enterprise security workflows.
This is not a new government regulation but a significant licensing and product strategy update from a major technology vendor. The key details of the policy change are:
This change directly affects all current and future customers with Microsoft 365 E5 licenses. This includes a vast number of large enterprises across all industries globally that have adopted Microsoft's top-tier productivity and security suite. Organizations using lower-tier licenses (like E3) will still need to purchase Security Copilot as a standalone product.
While this is a product offering, it has implications for an organization's internal compliance and governance:
Microsoft begins the phased rollout of Security Copilot to M365 E5 tenants.
Expected completion date for the automatic provisioning of Security Copilot for all eligible tenants.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.