Start with one realistic scenario.
SECURE AGENT SIMULATOR
Design a Microsoft agent. See the real security tradeoffs before rollout.
A guided way to test risk before agent design decisions become production decisions.
Chapter 1
What are you building?
Pick one realistic scenario to begin.
Current state
Select one of the four examples above to turn the simulator into a guided review.
Chapter 1
Shape the exposure.
Start with reach and action capability.
Selected use case
Choose a use case to begin.
Your scenario appears here so the next decisions stay grounded in a real context.
Current state
Complete these two decisions and the next card will appear automatically.
How much access does it get?
Pick the likely permission model.What is it allowed to do?
Decide how active the agent becomes.Chapter 1
Finish the early blast radius.
Now define the data sensitivity and connector spread.
Selected use case
Choose a use case to begin.
Your scenario appears here so the next decisions stay grounded in a real context.
Current state
Complete these last two exposure questions and the simulator will move into guardrails.
How sensitive is the data?
Estimate the exposure if the agent overshares.How many systems does it connect to?
Think about connector spread and boundaries.