Control 2.10: Patch Management and System Updates — Portal Walkthrough
Portal-based configuration guidance for Control 2.10: Patch Management and System Updates.
Audience: Power Platform Admins, AI Administrators, and AI Governance Leads in US financial services organizations.
Prerequisites
Before starting, confirm:
- Roles:
- Power Platform Admin — required to set release channels and create environments in PPAC
- AI Administrator — required to track Microsoft 365 Copilot and Copilot Studio service updates and manage Copilot feature settings
- Entra Global Reader or Microsoft 365 Service Support Admin — required to read Message Center; an Entra Global Admin or AI Administrator can also delegate read access via the Service Communications API
- Reader on the target Azure subscription(s) — required to view Service Health; Monitoring Contributor required to create alert rules and Azure Monitor action groups
- Licensing: Managed Environments enabled on every Zone 2 / Zone 3 environment (release channel selection requires Managed Environments for full enforcement)
- Identity: A change-intake distribution list (or Teams channel) routed to the AI Governance Lead and the Power Platform Admin
- Source-control / evidence store: A SharePoint document library or Dataverse table designated for patch evidence, ideally with retention lock per Control 1.7
- Sovereign cloud: If the tenant is GCC, GCC High, or DoD, identify the correct admin endpoints up front (commercial admin URLs will not work) — see the PowerShell Setup playbook for the canonical endpoint table
Implementation caveat: Microsoft owns the platform release cadence. The configuration below governs awareness, validation, and response — not suppression of vendor-driven changes.
Overview
This walkthrough configures, in order:
- Microsoft 365 Message Center subscriptions and routing
- Azure Service Health alert rules with Azure Monitor action groups
- Power Platform release channels per environment (Monthly vs. Semi-annual)
- A validation environment that mirrors production
- Maintenance windows aligned to the two annual release waves
- The patch evidence library and templates
Part 1: Configure Microsoft 365 Message Center
The Message Center is the authoritative source for Microsoft 365 platform changes that affect AI agents. Posts are tagged by service and may carry an Action required by date.
Subscribe to email digests
- Open the Microsoft 365 Admin Center.
- Select Health > Message center.
- Select Preferences (gear icon, top right of the Message Center page).
- On the Email tab:
- Add the change-intake distribution list (recommended) and individual recipients (Power Platform Admin, AI Administrator, AI Governance Lead).
- Check Send me a weekly digest and Send me emails for major updates and Message center posts that I am tagged in.
- Under Choose services, restrict to the relevant services for your AI estate. Typical FSI selection:
- Microsoft Copilot
- Microsoft Copilot Studio
- Power Platform
- Power Automate
- Power Apps
- Microsoft Dataverse
- SharePoint Online (if used as a knowledge source)
- Microsoft Purview
- Save.
Apply the FSI tag taxonomy
Tags drive routing and evidence retention. Apply at minimum:
| Tag | Purpose | Owner |
|---|---|---|
FSI-Agent-Impact |
Post may affect agent behavior or runtime | AI Administrator |
FSI-Connector-Change |
Connector deprecation, new connector, auth change | Power Platform Admin |
FSI-Action-Required |
Post has an "Action required by" date | AI Governance Lead |
FSI-Awaiting-Assessment |
Triaged but not yet impact-assessed | AI Governance Lead |
FSI-Closed |
Assessment complete; outcome recorded in change log | AI Governance Lead |
To apply: open a Message Center post → Tag → add tags → Save.
Note (April 2026): Tag taxonomy is per-tenant and per-user. To enforce a tenant-wide taxonomy, automate tagging with the Message Center Monitor solution and treat the manual tag set as a fallback only.
Part 2: Configure Azure Service Health Alerts
Service Health surfaces live service incidents and planned maintenance. Use it to detect runtime disruption (not feature changes — those come through Message Center).
- Open the Azure Portal.
- Search for Service Health and open it.
- Select Health alerts > + Add service health alert.
- Configure:
- Subscription: select the subscription(s) hosting your Power Platform / Azure dependencies.
- Services: add at minimum:
- Power Platform (resource provider
Microsoft.PowerPlatform) - Power Apps (
Microsoft.PowerApps) - Power Automate (
Microsoft.Flow) - Microsoft 365 Apps (if applicable)
- Azure Key Vault (if any agent retrieves secrets from a Key Vault)
- Application Insights / Log Analytics (if used for agent telemetry)
- Power Platform (resource provider
- Regions: the regions hosting your environments (US East/Central/West for most US FSI tenants; sovereign-cloud customers select GCC/GCC High regions).
- Event type: Service issue, Planned maintenance, Health advisory, Security advisory.
- Under Actions, attach an Azure Monitor action group:
- If none exists, select Create action group.
- Name it (e.g.,
ag-fsi-platform-ops). - Add an Email action for the operations distribution list.
- For Zone 3, add a Webhook or Logic App action that opens an incident ticket in your ITSM.
- Avoid relying on SMS as the sole notification channel — carrier delivery is best-effort and not audit-defensible. Use email or webhook to a logged channel.
- Name the alert (e.g.,
alert-fsi-pp-service-health) and save.
FSI Note: Document the action group composition in your incident-response runbook. Per FFIEC IT Handbook expectations, alerting paths must be testable and have a documented owner.
See Microsoft Learn: Configure Service Health alerts for current screens.
Part 3: Set Release Channels per Environment
Power Platform offers two release channels at the environment level. The "Early Access" opt-in concept used in earlier waves has been replaced by the Monthly channel.
| Channel | Cadence | FSI Use |
|---|---|---|
| Monthly channel | Features ship monthly; closer to Microsoft's internal release cadence | Validation environments, Zone 1 sandboxes, breaking-change rehearsal |
| Semi-annual channel (default) | Aligned to the two annual release waves (April / October) | Zone 2 / Zone 3 production environments |
Set the channel
- Open Power Platform Admin Center.
- Select Environments and pick the target environment.
- Select Settings (top toolbar) > Product > Behavior.
- Under Release channel, select the appropriate channel:
- Monthly channel for the validation environment.
- Semi-annual channel for production.
- Select Save.
Note (April 2026): The Behavior page also exposes feature toggles that may be channel-gated. Review the page after each wave update to confirm new toggles are set per your governance policy.
Apply by zone
| Zone | Validation environment channel | Production environment channel |
|---|---|---|
| Zone 1 | Not required (use a personal sandbox if desired) | Monthly or Semi-annual at owner discretion |
| Zone 2 | Monthly (mirrors prod config) | Semi-annual |
| Zone 3 | Monthly (mirrors prod config; mandatory) | Semi-annual (mandatory; no exceptions without CAB approval) |
See Microsoft Learn: Power Platform release channels.
Part 4: Establish a Validation Environment
The validation environment exists to surface platform-driven regressions before production users see them.
- In PPAC, select Environments > + New.
- Configure:
- Name:
FSI-Update-Validation(or your tenant convention). - Type: Sandbox (sandboxes can be reset; production cannot).
- Region: the same region as your production agents.
- Add Dataverse: Yes if production agents use Dataverse-backed knowledge sources or topics; otherwise No.
- Managed Environment: Enable.
- Name:
- After creation, open the environment and apply Part 3 to set the channel to Monthly.
- Deploy a managed solution copy of each Zone 2/3 production agent into the validation environment using your pipeline (see Control 2.3).
- Document any out-of-solution dependencies (knowledge sources by URL, tenant-level connectors, custom connectors) — these must be reproduced manually because they are not part of the solution boundary.
- Author a baseline regression test suite for each agent (covered in the Verification & Testing playbook).
Part 5: Define Maintenance Windows by Wave
The Power Platform release cadence centers on two annual waves:
- Wave 1 — preview from January, general availability rolling from April through September
- Wave 2 — preview from July, general availability rolling from October through March
Recommended FSI window pattern
| Zone | Window pattern | Notes |
|---|---|---|
| Zone 1 | Anytime, with notification 24h before known wave dates | Owners self-manage; document on a SharePoint calendar |
| Zone 2 | Monthly maintenance window aligned to Patch Tuesday week, off-hours | Document approver and rollback path per change |
| Zone 3 | Two annual major windows aligned to wave GA, plus monthly micro-windows for Message Center "Action required" items; CAB approval required | Communicate windows 30 days in advance to business stakeholders; align with Control 2.4 |
Document and publish the calendar
- Create a SharePoint calendar list named
FSI Platform Maintenance. - For each window, capture:
- Window start / end (with time zone)
- In-scope environments and agents
- Change ticket reference
- Rollback decision time
- Approver
- Restrict edit access to Power Platform Admin and AI Governance Lead; grant read to all agent owners and business stakeholders.
Part 6: Set Up the Patch Evidence Library
The evidence library is what an examiner will request under SEC 17a-4 / FINRA 4511 record-retention rules.
- Create a SharePoint document library named
FSI-Patch-Evidence. -
Add columns:
Column Type Notes Message ID Single line e.g., MC123456from Message CenterService Choice Power Platform, Copilot Studio, M365 Copilot, etc. Category Choice Plan for change, Prevent or fix issues, Stay informed Action Required By Date Microsoft-set deadline (if any) Impact Assessment Multi-line Owner: AI Governance Lead Validation Result Choice Pass / Fail / N/A Validation Evidence Link Hyperlink Link to test run output Deployment Date Date Production deployment timestamp Rollback Plan Multi-line Required for Zone 3 Approver Person Required for Zone 2/3 SHA-256 (evidence) Single line Required for Zone 3 Status Choice Open / Validated / Deployed / Rolled back / Closed -
Apply a retention label with retention duration per your firm's record policy (typically 6 years for FSI under FINRA 4511 / SEC 17a-4(b)(4); consult your records-retention schedule).
- Enable versioning and disallow item deletion via library permissions.
- Optional (Zone 3): mirror entries to Microsoft Sentinel via a Logic App for cross-control SIEM correlation.
Configuration by Governance Level
| Setting | Baseline (Zone 1) | Recommended (Zone 2) | Regulated (Zone 3) |
|---|---|---|---|
| Message Center subscription | Personal | Distribution list | Distribution list + automated polling |
| Service Health alerts | Optional | Required, email | Required, email + ITSM webhook |
| Release channel — validation env | N/A | Monthly | Monthly |
| Release channel — production env | Default | Semi-annual | Semi-annual |
| Validation environment | Optional | Required | Required, mirrors prod managed solutions |
| Maintenance window cadence | Ad hoc | Monthly | Two wave windows + monthly micro-windows |
| Evidence retention | Best-effort | CSV export per change | SHA-256-hashed JSON + manifest, retention-locked |
| CAB approval | N/A | For breaking changes | For all production deployments |
Validation
After completing the configuration, confirm:
- Message Center email digest received by the change-intake distribution list within 7 days
- At least one Message Center post tagged with the FSI taxonomy
- Test Service Health alert fires (use a Microsoft-published service health drill, or a test alert via PowerShell — see Verification & Testing)
- Validation environment shows Monthly under Settings > Product > Behavior; production shows Semi-annual
- Validation environment has a managed solution copy of at least one production agent
-
FSI Platform Maintenancecalendar contains the next two upcoming windows -
FSI-Patch-Evidencelibrary exists with all required columns and a retention label applied - One end-to-end dry run executed (Message Center post → impact assessment → validation environment test → evidence captured → ticket closed)
Expected Result: Platform changes are received, triaged, validated in a Monthly-channel sandbox, deployed under approval to Semi-annual production, and recorded in a retention-locked evidence library with hash-integrity proofs.
Related Playbooks
- PowerShell Setup — Pinned-module, sovereign-aware automation for Message Center polling, evidence emission, and validation runs
- Verification & Testing — Test cases, rollback drill, evidence collection
- Troubleshooting — Common issues with Message Center, release channels, and Service Health alerts
Updated: April 2026 | Version: v1.4.0