Copilot Studio and Microsoft Foundry vnet Integration
Overview
Microsoft Foundry lets you deploy all the Azure resources required to build generative AI solutions, including the Agent service, in a private network.

Further more, Microsoft Power Platform also supports vnet integration, which enables, for example, agents built in Copilot Studio to integrate with resources in the vnet where Foundry resources are placed behind private endpoints.

There are, however, a few limitations that may not be obvious until you try.
Supported scenarios
- ✅ Copilot Studio can access AI Search as a knowledge source. No need to open firewall when setting up the connection in Copilot Studio.
- ✅ Other Copilot Studio supported Azure services with vnet integration.
- ✅ End-to-end network isolation with Foundry Agent Service network injection in Foundry Classic only (as of Dec 2025).
Unsupported scenarios
- ❌ If the Foundry agent service is behind a private endpoint, adding a Foundry agent to a Copilot Studio agent does not work.
- ❌ If AI Search is behind a private endpoint, adding AI Search as a tool to a Copilot Studio agent does not work.
How to set it up
It is quite complex to set up a fully isolated Foundry network environment and integrate it with Copilot Studio.
- Set up isolated network for Foundry.
- Set up virtual network for Power Platform
In this step, you set up a second vnet in the Power Platform paired region as your Foundry region.
So if your Power Platform environment is in
unitedstates, your Foundry resources are inwestus, the second vnet should be ineastus. - Since Power Platform can cross regions, in your second vnet, you must also set up the same private endpoints as the primary Foundry vnet, and associate DNS with these private endpoints. In other words, the private endpoint subnets and the Power Platform subnets in both vnets should look same, and private DNS zones must be attached to both.
- If anything goes wrong, there’s limited observability in the admin portal of Power Platform. Sometimes, it shows everything succeeded even though they didn’t. If things don’t work, it’s critical to use the troubleshooting tools.
- If you changed either vnets or DNS or the Power Platform enterprise network policy, use additional Powershell Subnet Injection tools to remove and re-attach enterprise policies.