Microsoft has enabled a new option for administrators to uninstall the IA-driven assistant Copilot from business devices managed after the April 2026 patches. The configuration, called RemoveMicrosoftCopilotApp, is already available as Policy CSP and as a Group Policy object for environments using Microsoft Intune or System Center Configuration Manager (SCCM), and aims to offer a non-disruptive way to remove the app in mass of IT-controlled equipment. Microsoft announced as part of the notes of the monthly update.
It is important to understand the limitations of this policy: only applies to Windows 11 25H2, only when both Microsoft 365 Copilot and the Microsoft Copilot app are installed, provided that the user has not installed the app on his own and the app has not been run on the last 28 days. The policy is also restricted to the customer's Enterprise, Professional and Education editions. Microsoft details the configuration in its technical documentation for MDM and GPO administrators, including the CSP route and Group Policy key: Policy CSP - WindowsAI RemoveMicrosoftCopilotApp.

To enable it centrally you can apply via Intune or SCCM or by using the group policy editor using the route indicated by Microsoft (/ User / Vendor / MSFT / Policy / Config / WindowsAI / RemoveMicrosoftCopilotApp or / Device / Vendor / MSFT / Policy / Config / WindowsAI / RemoveMicrosoftCopilotApp). Uninstallation is reversible by the user that you can reinstall Copilot if you want, so IT equipment must complement the policy with controls that prevent unauthorized reinstallations if that is the organizational intention.
The launch takes place in a context of adjustment by Microsoft: the company paused the forced installation of Microsoft 365 Copilot on machines with Office and cancelled plans to integrate Copilot into notifications, Settings and File Explorer, as part of a movement to reduce what some call "block IA" in the operating system. Windows Central reported on these changes and on the reassessment of the integration strategy.

From a security and compliance perspective, the possibility of uninstalling Copilot is welcome, but does not solve all risks. The IA functions can increase the data filtration surface and problems have already been reported in which attendees based on Microsoft 365 Copilot summarized confidential emails by drawing DLP protections, which underlines the need for additional controls beyond the mere removal of the app. Therefore, organizations should consider policy as a further lever within a broader IA governance and data protection programme.
I recommend that IT teams follow these practical steps before deploying the policy massively: check that endpoints are in Windows 11 25H2 and that meet the policy conditions; test the uninstallation in a pilot group; monitor reinstallation attempts and record use metrics to assess impact on productivity; strengthen DLP policies and review them against flows in which IA tools can summarize or exfilter content; and, if required, apply additional restrictions using AppLocker, Microsoft Store policies or installation controls in Intune to avoid unwanted reinstallations.
In strategic terms, this measure shows that large suppliers are reacting to the mix of technical, regulatory and user experience concerns that generate the IA functions integrated into the operating systems. It is a useful option but not a complete solution: the effective governance of corporate IA requires technical policies, audit processes and user training to mitigate operational and data exposure risks.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...