Verification & Testing: Control 1.28 - Policy-Based Agent Publishing Restrictions
Last Updated: April 2026
Test Environment: Pre-production / dedicated test environments per zone
Estimated Time: 45–60 minutes for the full test pass
Overview
This playbook defines test cases that confirm policy-based publishing restrictions are operational across Zone 1, Zone 2, and Zone 3. Tests focus on what the platform actually enforces (DLP at runtime and publish time, channel allowlisting, audit capture) and what the organization enforces around the platform (approval gates via Power Automate or Pipelines, change-control documentation).
Hedged outcome language: Each test case lists expected behavior given current platform behavior as of April 2026. The Copilot Studio publish dialog wording, severity icons, and finding categories evolve; treat the in-product messages as authoritative if they diverge from the wording below.
Prerequisites
- DLP policies configured and assigned per Step 2 of the Portal Walkthrough
- One test environment per zone (Zone 1, Zone 2, Zone 3) — or at least one production-equivalent test environment for the highest zone in scope
- A non-admin Copilot Studio Agent Author account for tests that exercise approval gates (admins can bypass surrounding workflow)
- Power Platform Admin account for the approver-side tests
- Microsoft Purview Audit confirmed enabled with sufficient retention
Test Case 1 — DLP Blocks Publish When the Agent Uses a Blocked Connector
Objective: Confirm that the platform-level DLP enforcement prevents publish when the agent's connector usage conflicts with the assigned DLP policy.
Steps:
- In a Zone 3 test environment, create a new agent named
T1-DLP-Violation. - Add a topic that uses the HTTP connector (assumed Blocked in Zone 3 per the recommended baseline).
- Save the agent and click Publish.
Expected:
- The Copilot Studio pre-publish dialog surfaces a DLP-related finding identifying the HTTP connector.
- The publish action does not complete; the agent remains in its prior state (or
Draftif never published).
Evidence:
- Screenshot of the pre-publish finding with the connector identified.
- Export of the assigned DLP policy showing HTTP as Blocked.
Test Case 2 — DLP-Compliant Agent Publishes Cleanly
Objective: Confirm that an agent using only allowed connectors publishes through the platform check.
Steps:
- In the same Zone 3 test environment, create
T2-DLP-Compliantusing only SharePoint (read-only) and Dataverse (approved tables). - Click Publish and observe the pre-publish dialog.
Expected:
- No DLP findings are surfaced.
- The publish completes (or is routed into your approval workflow if Test Case 4 is wired up).
- A bot create/update event appears in the Purview audit log within 30–60 minutes.
Test Case 3 — Channel Restrictions Are Enforced
Objective: Confirm that public channels disabled for the environment cannot be enabled by the author.
Steps:
- In a Zone 2 test environment, open a compliant agent and go to Settings → Channels.
- Attempt to enable Facebook or Telegram.
Expected:
- The channel is not available, or the agent fails to publish with the channel enabled.
- Authenticated channels (Microsoft Teams, authenticated web channel) remain available.
Hedge: Whether the public channel is hidden, disabled, or only blocked at publish time depends on the current Copilot Studio build and the DLP/connector configuration. The verifiable outcome is that the agent cannot reach end users via the prohibited channel.
Test Case 4 — Approval Gate Triggers (Power Automate Implementation)
Objective: Confirm that the surrounding approval flow runs when an agent is created or updated in a Zone 2+ environment.
Steps:
- As a non-admin Agent Author, publish a compliant agent in the Zone 2 environment.
- Switch to the approver account and check the Approvals app in Microsoft Teams (or email).
Expected:
- An approval request appears for the approver, naming the agent, environment, and submitter.
- Approving the request writes a row to the
Publish Approval LogDataverse table (or chosen audit sink) with approver UPN, timestamp, and decision. - Rejecting the request writes the rejection record and notifies the author.
Important: A Power Automate approval flow does not technically block the publish action itself. This test confirms that the approval is captured. To confirm the platform-side restriction (the author should not be able to publish at all without approval), pair this test with Test Case 7 below.
Test Case 5 — Multi-Stage Approval (Zone 3, Power Automate or Pipelines)
Objective: Confirm that Zone 3 agents require both Power Platform Admin and Compliance Officer approval (or the equivalent two-stage pipeline gate).
Steps:
- Submit a Zone 3 agent for publish (via Power Automate flow) or queue a deployment from Test → Production in Power Platform Pipelines.
- Approve at stage 1 (Power Platform Admin); confirm the request advances to stage 2.
- Approve at stage 2 (Compliance Officer); confirm the publish/deployment completes.
- Repeat with a rejection at stage 2 to confirm the deployment is halted.
Expected:
- Stage 1 approval is required before stage 2 is reachable.
- Rejection at either stage halts deployment and records the decision.
- Both approval records appear in the audit log.
Test Case 6 — Solution Promotion via Power Platform Pipelines (Zone 3)
Objective: Confirm that Zone 3 agents are deployed via the pipeline rather than published directly into production.
Steps:
- In the Zone 3 development environment, package the agent into a solution.
- Submit the deployment from Dev → Test via the pipeline.
- After test sign-off, submit Test → Production with the configured pre-deployment approval.
Expected:
- The agent reaches production only via solution import, not via direct publish.
- The pipeline run history shows each stage, approver, and timestamp.
- Direct publish in the production environment is prevented because the production-environment Dataverse role for non-pipeline service principals lacks
prvCreateBot/prvWriteBot(configured per Control 1.1).
Hedge: Power Platform Pipelines does not, by itself, prevent a sufficiently privileged user from publishing in place. The technical prevention comes from the role design in Control 1.1; this test confirms the pipeline path is the supported path.
Test Case 7 — Update Blocked When DLP Policy Tightens (February 2025 Behavior)
Objective: Confirm the Microsoft platform behavior that published agents whose connector usage no longer aligns with the assigned DLP policy are blocked from update operations until the violation is resolved.
Steps:
- Publish a compliant agent in a test environment (e.g., agent uses SharePoint, currently Business).
- Modify the DLP policy assigned to that environment to move SharePoint to Blocked.
- Make a small edit to the agent and click Publish to update.
Expected:
- The pre-publish dialog identifies the SharePoint connector as a violation.
- The update is blocked.
- The previously published version of the agent remains in place until the violation is resolved (either by editing the agent or by reverting the DLP policy).
Evidence:
- Screenshots showing the pre-change publish, the DLP change, and the post-change blocked update.
Test Case 8 — Audit Capture in Microsoft Purview
Objective: Confirm that publish-related events reach Purview with sufficient detail for evidence.
Steps:
- Perform a successful publish, a blocked publish, and a DLP policy change in test environments.
- In Purview → Audit, search the previous 24 hours filtered to PowerPlatformAdmin and Dataverse workloads.
Expected:
- Bot create/update events are present with actor UPN, environment, and bot identifier.
- DLP policy create/update events are present with actor UPN and policy ID.
- Power Automate approval action events (when used) include the approver UPN and decision.
- Retention on these events meets your firm's requirement (commonly 7 years for FINRA 4511 / SEC 17a-4 alignment).
Test Case 9 — Inventory Script Produces Auditable Evidence
Objective: Confirm Script 4 from the PowerShell Setup produces a CSV plus SHA-256 hash usable as evidence.
Steps:
- Run
Audit-AgentPublishInventory.ps1against the test tenant. - Open the produced CSV and the manifest file.
Expected:
- CSV lists the agents discovered with environment, publish status, last modified time, and creator UPN.
- Manifest file contains
<csvPath>\tSHA256:<hash>entries for each export. - Recomputing
Get-FileHash -Algorithm SHA256on the CSV yields the same hash.
Compliance Verification Checklist
After all tests:
- DLP policies enforce connector restrictions per zone (Test 1, 2, 7).
- Channel restrictions are operational for Zone 2+ (Test 3).
- An approval gate exists for Zone 2+ environments (Test 4).
- A multi-stage approval gate exists for Zone 3 (Test 5).
- Solution promotion is the supported path to production for Zone 3 (Test 6).
- Published agents whose connector usage drifts out of compliance are blocked from update (Test 7).
- Purview captures publish, DLP, and approval events with required retention (Test 8).
- Inventory automation produces hashed evidence files (Test 9).
Evidence Package
Compile the following for the control evidence file:
- DLP configuration: Export of each zone's DLP policy and the list of environments assigned to each.
- Pre-publish enforcement: Screenshots from Tests 1, 2, 3, and 7.
- Approval workflow: Power Automate flow definition (or pipeline definition) plus a sample approval record from Tests 4 and 5.
- Pipeline run: Pipeline run history export from Test 6.
- Audit: Purview audit export covering the test window (CSV).
- PowerShell evidence: Inventory CSV and SHA-256 manifest from Test 9.
Ongoing Monitoring
| Cadence | Activity |
|---|---|
| Weekly | Run the inventory script (Script 4); review newly published agents and DLP-blocked update attempts in Purview. |
| Monthly | Review approval workflow metrics (volume, approval rate, mean time to approve). |
| Quarterly | Audit DLP policy effectiveness; review connector classifications against business and regulatory changes. |
| Annually | Re-baseline zone-to-policy mappings; review evidence retention against current FINRA / SEC / GLBA / OCC / Fed SR 11-7 expectations. |
Attestation Statement Template
## Control 1.28 Attestation - Policy-Based Agent Publishing Restrictions
**Organization:** [Organization Name]
**Control Owner:** [Name / Role]
**Date:** [Date]
I attest that, as of the date above:
1. DLP policies are configured and assigned per zone:
- Zone 1 environments: [Count]
- Zone 2 environments: [Count]
- Zone 3 environments: [Count]
2. Pre-publish DLP enforcement is operational (Test Cases 1, 2, 7 passed): [Yes / No]
3. Channel restrictions are operational for Zone 2+ (Test Case 3): [Yes / No]
4. Approval gates are operational:
- Zone 2 single-stage (Test 4): [Yes / No]
- Zone 3 multi-stage (Test 5): [Yes / No]
5. Zone 3 production deployments use Power Platform Pipelines or ALM Accelerator (Test 6): [Yes / No]
6. Microsoft Purview audit captures publish, DLP, and approval events with [N]-year retention (Test 8): [Yes / No]
7. Inventory automation produces hashed evidence files (Test 9): [Yes / No]
**Signature:** ______________________
**Date:** __________________________
Back to Control 1.28 | Portal Walkthrough | PowerShell Setup | Troubleshooting
Updated: April 2026 | Version: v1.4.0 | UI Verification Status: Current