MCP & Semantic Kernel: Building AI Agents That Take Action, Not Just Chat
Update: 2025-12-06
Description
Ah! You’re wasting AI on small talk. Pure power trapped in chit-chat.
In this episode, we break open the containment field and show you how to turn AI from a polite conversationalist into a fully-acting IT Operations agent—one that plans, executes, verifies, and stays inside governance at all times. You’ll learn exactly how modern enterprise teams are using Semantic Kernel, MCP, and Azure OpenAI tool-calling with Managed Identity to auto-remediate incidents, reduce MTTR, eliminate hundreds of service desk tickets, and create predictable, auditable workflows. This isn’t theory—it’s the blueprint. 🎯 Episode Focus — From Answering to Acting Traditional chatbots whisper advice. Acting agents do the work.
We explore the shift from static Q&A loops to a closed-loop cycle: Intention → Plan → Tool Use → Result → Self-Check → Next Step Learn why this pattern unlocks automation in Microsoft environments without sacrificing safety, compliance, or observability. Micro-Story: A real SRE team wired an agent to monitor high CPU alerts, correlate with deployments, drain faulty nodes, roll back the slot, and post an incident summary—all before the human even rolled out of bed.
Not magic. Orchestration. 🔌 Why Microsoft Shops Win Big: MCP + SK + Managed Identity Three components snap together and give you enterprise-grade capability: 🔧 MCP (Model Context Protocol): The Wiring
MCP connects.
Foundry governs.
Managed Identity contains.
Verification proves. Start with one narrow flow—like drain-then-verify for post-deploy spikes—and scale safely outward. Subscribe for next week’s episode:
The Minimal Viable RAG Pipeline for Enterprise Truth: Chunking, Guardrails, Evaluations, and Cost Control. Delicious security awaits.
Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-show-podcast--6704921/support.
Follow us on:
LInkedIn
Substack
In this episode, we break open the containment field and show you how to turn AI from a polite conversationalist into a fully-acting IT Operations agent—one that plans, executes, verifies, and stays inside governance at all times. You’ll learn exactly how modern enterprise teams are using Semantic Kernel, MCP, and Azure OpenAI tool-calling with Managed Identity to auto-remediate incidents, reduce MTTR, eliminate hundreds of service desk tickets, and create predictable, auditable workflows. This isn’t theory—it’s the blueprint. 🎯 Episode Focus — From Answering to Acting Traditional chatbots whisper advice. Acting agents do the work.
We explore the shift from static Q&A loops to a closed-loop cycle: Intention → Plan → Tool Use → Result → Self-Check → Next Step Learn why this pattern unlocks automation in Microsoft environments without sacrificing safety, compliance, or observability. Micro-Story: A real SRE team wired an agent to monitor high CPU alerts, correlate with deployments, drain faulty nodes, roll back the slot, and post an incident summary—all before the human even rolled out of bed.
Not magic. Orchestration. 🔌 Why Microsoft Shops Win Big: MCP + SK + Managed Identity Three components snap together and give you enterprise-grade capability: 🔧 MCP (Model Context Protocol): The Wiring
- Tools describe themselves with standards and schemas
- Microsoft Graph, Intune, Service Health, internal APIs become discoverable
- No brittle plugins or secret adapters
- Add new capabilities without redeploying anything
- Turns MCP tools into callable kernel functions
- Handles planning: sequential, parallel, or graph-shaped tasks
- Auto-builds JSON schemas models expect
- Removes the need for hand-crafted payloads
- Model decides what, identity decides what’s allowed
- Tokens are never exposed
- Each action is access-controlled at the tool boundary
- High-risk actions require approval tokens
- Persona — SRE temperament encoded (cautious, concise, safety-first).
- Memory — Short-term context + durable environmental facts.
- Planner — Decomposes tasks into safe, verifiable steps.
- Tools — MCP-exposed actuators and sensors.
- Policy — Identity controls, approvals, guardrails.
- Verifier — Post-action checks: metrics, probes, risk state.
- AppInsightsQuery
- GraphServiceHealth
- GraphChangeLog
- DrainSubsetByBuild
- RollbackSlot
- PostIncidentNote
- Assess: Query metrics, deployments, health advisories (parallel).
- Decide: Pick the narrowest safe fix—e.g., drain a bad build subset.
- Act: Perform drainage or rollback with identity-scoped tools.
- Verify: Require P95 + 5xx improvement before declaring success.
- Report: Summaries, graphs, dashboards, change IDs.
- Agent validates user status via Graph
- Checks MFA, riskState, and role assignments
- Performs compliant reset (MI scopes enforce safety)
- Notifies user and closes ITSM ticket
- Verifies sign-in status or risk flag after reset
- Triggered by telemetry or incident
- Multi-branch assessment for root-cause hints
- Narrow corrective action first (drain, isolate, scale)
- Approval-gated high-risk actions (rollback, redeploy)
- Continuous verification with App Insights
- Auto-reporting with evidence
- 40–70% reduction in MTTR for repeatable failure modes
- 60–90% ticket deflection for onboarding and identity issues
- 50% faster change cycles with Parallel Assess → Safe Action
- Lower burnout and attrition in SRE/on-call teams
- Audit-ready logs for every action—no mystery behavior
- Risk compression thanks to identity-scoped tools and approvals
- Split Managed Identities (read vs. write vs. high-risk)
- Hard-coded schema constraints for dangerous operations
- Approval tokens enforced by the tool, not the prompt
- Immutable audit envelopes for every tool call
- Red-team testing for bypass attempts and prompt injections
- Scope-drift monitoring on tools and identities
- Privacy guarantees for sensitive data
- Failure choreography: safe fallback → escalate → contextual summary
- Model rotation behind stable tool contracts
MCP connects.
Foundry governs.
Managed Identity contains.
Verification proves. Start with one narrow flow—like drain-then-verify for post-deploy spikes—and scale safely outward. Subscribe for next week’s episode:
The Minimal Viable RAG Pipeline for Enterprise Truth: Chunking, Guardrails, Evaluations, and Cost Control. Delicious security awaits.
Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-show-podcast--6704921/support.
Follow us on:
Substack
Comments
In Channel























