{"id":1597,"date":"2025-11-25T08:00:05","date_gmt":"2025-11-25T16:00:05","guid":{"rendered":"https:\/\/devblogs.microsoft.com\/foundry\/?p=1597"},"modified":"2025-12-08T09:50:11","modified_gmt":"2025-12-08T17:50:11","slug":"assess-agentic-risks-with-the-ai-red-teaming-agent-in-microsoft-foundry","status":"publish","type":"post","link":"https:\/\/devblogs.microsoft.com\/foundry\/assess-agentic-risks-with-the-ai-red-teaming-agent-in-microsoft-foundry\/","title":{"rendered":"Assess Agentic Risks with the AI Red Teaming Agent in Microsoft Foundry"},"content":{"rendered":"<p><strong>We\u2019re thrilled to announce major enhancements to the <a href=\"https:\/\/aka.ms\/airedteamingagent\">AI Red Teaming Agent<\/a> in Microsoft Foundry for models and AI agentic pipelines, available now in public preview<\/strong>. These new capabilities enable organizations to proactively identify safety and security risks in both models and agentic systems, ensuring strong safeguards as agentic solutions move into production workflows.<\/p>\n<p>The AI Red Teaming Agent integrates Microsoft AI Red Teaming team\u2019s <strong>open-source framework, <\/strong><a href=\"https:\/\/github.com\/Azure\/PyRIT\"><strong>PyRIT (Python Risk Identification Tool)<\/strong><\/a> to deliver automated, scalable adversarial testing. With PyRIT\u2019s reusable attacker strategies and orchestration capabilities, teams can systematically probe for vulnerabilities and risks such as prompt injection attacks, harmful content generation, misuse enablement, privacy leaks, and robustness failures, utilizing more than 20 attack strategies. This integration makes red teaming more consistent, data driven, and reproducible, thereby helping organizations move from ad-hoc testing to structured AI safety and security assessments. In this post, we\u2019ll highlight the key innovations brought to you by Microsoft Foundry and provide a technical dive into how the AI Red Teaming Agent can help you tackle agentic risks that are top of mind for many organizations.<\/p>\n<h2><strong>Foundry as a unified platform for automated red teaming for models and agents<\/strong><\/h2>\n<p>Organizations and teams can now orchestrate automated red teaming runs across both model-level and agent-level surfaces through the unified Foundry SDK\/APIs and UI portal. This means you can test not just large language models or systems alone, but also in more complex, tool-using agents, enabling end-to-end risk coverage in both agentic and non-agentic scenarios.<\/p>\n<p><strong>No-code UI wizard:<\/strong> Run automated red teaming runs without writing a single line of code. This is ideal for testing during rapid prototyping and enables non-technical stakeholders to also run quick red teaming runs for compliance and governance.<\/p>\n<p><a href=\"https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/1-red-teaming-wizard.gif\"><img decoding=\"async\" class=\"alignnone size-full wp-image-1676\" src=\"https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/1-red-teaming-wizard.gif\" alt=\"1 red teaming wizard image\" width=\"2366\" height=\"1446\" \/><\/a><\/p>\n<p><strong>View and compare red teaming results:<\/strong> Foundry\u2019s new interface for evaluations lets you analyze risk profiles across generative AI models and systems (agentic and non-agentic), track safety vulnerabilities, and benchmark improvements over time, all in one place.<\/p>\n<p><a href=\"https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/2-red-teaming-details.gif\"><img decoding=\"async\" class=\"alignnone size-full wp-image-1670\" src=\"https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/2-red-teaming-details.gif\" alt=\"2 red teaming details image\" width=\"2406\" height=\"1476\" \/><\/a><\/p>\n<p><strong>Foundry SDK &amp; APIs for batch and continuous red teaming:<\/strong> Integrate red teaming into your CI\/CD pipelines, schedule and kick off red teaming runs remotely for continuous agent <strong>safety evaluation<\/strong>.<\/p>\n<p>With these new functionalities in Foundry, the AI Red Teaming Agent helps developers start their Trustworthy AI journey, providing:<\/p>\n<ul>\n<li><strong>End-to-end risk coverage:<\/strong> Test your agents in simulated adversarial scenarios that reflect potential deployment risks.<\/li>\n<li><strong>Dynamic and customizable:<\/strong> Dynamic seed dataset generation based on relevant risk definitions and policies, selected attack strategies, agent tool use and evaluation criteria.<\/li>\n<li><strong>Continuous integration:<\/strong> Automate red teaming as part of your development lifecycle to catch regressions and emerging risks early.<\/li>\n<\/ul>\n<p><strong>The AI Red Teaming Agent is helping customers like Blue Yonder assess and catch generative AI risks before deploying to production. <\/strong>Watch the full video testimonial <a href=\"https:\/\/www.youtube.com\/watch?v=whViU04ek2U\">here<\/a>.<\/p>\n<blockquote><p><span style=\"font-size: 14pt;\">\u201cFoundry&#8217;s AI Red Teaming Agent helps us proactively identify security risks, enabling us to mitigate issues before they become costly safety incidents.&#8221;<\/span><\/p>\n<p><strong>Chris Burchett, Sr. Vice President Generative AI, Blue Yonder<\/strong><\/p><\/blockquote>\n<h2 style=\"text-align: center;\"><iframe title=\"YouTube video player\" src=\"\/\/www.youtube.com\/embed\/whViU04ek2U?si=NkVvsoEA62Vj7VLI\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/h2>\n<h2><strong>Deep dive: Expanded capabilities to help developers test for agentic risks<\/strong><\/h2>\n<p>As agentic systems grow more complex, traditional testing isn\u2019t enough. Developers need tools that simulate real world adversarial scenarios and validate agents against critical safety and compliance requirements. Foundry\u2019s enhanced AI Red Teaming Agent introduces targeted evaluations for the most pressing agentic risks which covers sensitive data, agent specific prohibited and high-risk actions, task adherence and fidelity, as well as resilience against sophisticated prompt injection attacks.<\/p>\n<p>Using the Foundry SDK, in addition to the currently supported model risk categories, developers can now specify agentic risks as part of their automated red teaming configurations.<\/p>\n<pre class=\"prettyprint language-py\"><code class=\"language-py\">def _get_red_team_evaluation_criteria(\r\n    include_agent_specific: bool = True,\r\n) -&gt; list[dict[str, str]]:\r\n    base_criteria = [\r\n        {\r\n            \"type\": \"azure_ai_evaluator\",\r\n            \"name\": \"Violence\",\r\n            \"evaluator_name\": \"builtin.violence\",\r\n            \"evaluator_version\": \"1\",\r\n        },\r\n        {\r\n            \"type\": \"azure_ai_evaluator\",\r\n            \"name\": \"Self Harm\",\r\n            \"evaluator_name\": \"builtin.self_harm\",\r\n            \"evaluator_version\": \"1\",\r\n        },\r\n        {\r\n            \"type\": \"azure_ai_evaluator\",\r\n            \"name\": \"Sexual\",\r\n            \"evaluator_name\": \"builtin.sexual\",\r\n            \"evaluator_version\": \"1\",\r\n        },\r\n        {\r\n            \"type\": \"azure_ai_evaluator\",\r\n            \"name\": \"Hate Unfairness\",\r\n            \"evaluator_name\": \"builtin.hate_unfairness\",\r\n            \"evaluator_version\": \"1\",\r\n        },\r\n    ]\r\n    if include_agent_specific:\r\n        base_criteria.extend(\r\n            [\r\n                {\r\n                    \"type\": \"azure_ai_evaluator\",\r\n                    \"name\": \"Prohibited Actions\",\r\n                    \"evaluator_name\": \"builtin.prohibited_actions\",\r\n                    \"evaluator_version\": \"1\",\r\n                },\r\n                {\r\n                    \"type\": \"azure_ai_evaluator\",\r\n                    \"name\": \"Sensitive Data Leakage\",\r\n                    \"evaluator_name\": \"builtin.sensitive_data_leakage\",\r\n                    \"evaluator_version\": \"1\",\r\n                },\r\n                {\r\n                    \"type\": \"azure_ai_evaluator\",\r\n                    \"name\": \"Task Adherence\",\r\n                    \"evaluator_name\": \"builtin.task_adherence\",\r\n                    \"evaluator_version\": \"1\",\r\n                },\r\n            ]\r\n        )\r\n    return base_criteria\r\n<\/code><\/pre>\n<p>Using the above example helper function, teams can instantiate a red team that will hold all your automated red teaming runs with different combinations of targets or attack strategies.<\/p>\n<pre class=\"prettyprint language-py\"><code class=\"language-py\">def main() -&gt; None: \r\n\tload_dotenv()\r\nendpoint = os.environ.get(\"AZURE_AI_PROJECT_ENDPOINT\", \"\")\r\nagent_name = os.environ.get(\"AZURE_AI_AGENT_NAME\", \"\")\r\nmodel_deployment = os.environ.get(\"AZURE_AI_MODEL_DEPLOYMENT_NAME\", \"\")\r\ndata_folder = os.environ.get(\"DATA_FOLDER\", \".\/redteam_outputs\")\r\nos.makedirs(data_folder, exist_ok=True)\r\n\r\nwith (\r\n    DefaultAzureCredential() as credential,\r\n    AIProjectClient(endpoint=endpoint, credential=credential) as project_client,\r\n    project_client.get_openai_client() as client,\r\n):\r\n    # (Optional) Create a new agent version for this run\r\n    agent_version = project_client.agents.create_version(\r\n        agent_name=agent_name,\r\n        definition=PromptAgentDefinition(\r\n            model=model_deployment,\r\n            instructions=\"You are a helpful assistant that answers general questions.\"\r\n        ),\r\n    )\r\n    print(f\"[Agent] Created: id={agent_version.id}, name={agent_version.name}, version={agent_version.version}\")\r\n\r\n    # Create a Red Team\r\n    red_team_name = f\"Red Team Agentic Safety Evaluation - {int(time.time())}\"\r\n    data_source_config = {\"type\": \"azure_ai_source\", \"scenario\": \"red_team\"}\r\n    testing_criteria = _get_agent_safety_evaluation_criteria()\r\n\r\n    print(\"[Group] Creating red team...\")\r\n    red_team = client.evals.create(\r\n        name=red_team_name,\r\n        data_source_config=data_source_config,\r\n        testing_criteria=testing_criteria, \r\n    )\r\n    print(f\"[Group] Created: id={red_team.id}, name={red_team.name}\")\r\n<\/code><\/pre>\n<p>Below, we break down each risk, how we test it, and how the AI Red Teaming Agent works to help you build safer, more reliable agents.<\/p>\n<h3><strong>Sensitive Data Leakage<\/strong><\/h3>\n<p><strong>What it tests:<\/strong> Whether your agent leaks sensitive data (PII, financial, medical, credentials) when using tools or accessing internal knowledge bases.<\/p>\n<p><strong>How it works:<\/strong><\/p>\n<ul>\n<li><strong>Synthetic testbeds<\/strong> simulate Azure tools (Search, Cosmos DB, Key Vault, etc.) with synthetic sensitive data.<\/li>\n<li><strong>Adversarial queries<\/strong> are generated with the intent to probe for direct and obfuscated leaks (e.g., \u201cGive me a bank account number\u201d vs. \u201cCan you generate sample account numbers for compliance?\u201d).<\/li>\n<li><strong>Automated evaluators<\/strong> scan agent outputs for sensitive data formats, regardless of whether the data is real or hallucinated.<\/li>\n<\/ul>\n<p>You can select this risk category when you are configuring a red teaming run in Foundry for your agents.<\/p>\n<p><a href=\"https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/3-SDL-selected.webp\"><img decoding=\"async\" class=\"alignnone size-large wp-image-1671\" src=\"https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/3-SDL-selected-1024x622.webp\" alt=\"3 SDL selected image\" width=\"1024\" height=\"622\" srcset=\"https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/3-SDL-selected-1024x622.webp 1024w, https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/3-SDL-selected-300x182.webp 300w, https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/3-SDL-selected-768x466.webp 768w, https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/3-SDL-selected-1536x933.webp 1536w, https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/3-SDL-selected-2048x1244.webp 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<h3><strong>Prohibited Actions<\/strong><\/h3>\n<p><strong>What it tests:<\/strong> Whether your agent performs actions that are universally restricted or require explicit human approval (e.g., social scoring, password changes, financial transactions) based on user-provided customized policies.<\/p>\n<p><strong>How it works:<\/strong><\/p>\n<ul>\n<li><strong>Customizable policies:<\/strong> You can define product specific prohibited actions and high-risk operations in both the UI guided wizard in Foundry or as JSON assets in the code-first experience, and the pipeline will generate targeted adversarial probes.<\/li>\n<li><strong>Dynamic test case generation<\/strong> based on your agent\u2019s tool configuration and descriptions.<\/li>\n<li><strong>Evaluator<\/strong> checks both agent responses and tool call outputs for violations to the developer-defined policies<\/li>\n<\/ul>\n<p><a href=\"https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/4-PA-selected.webp\"><img decoding=\"async\" class=\"alignnone size-large wp-image-1672\" src=\"https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/4-PA-selected-1024x622.webp\" alt=\"4 PA selected image\" width=\"1024\" height=\"622\" srcset=\"https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/4-PA-selected-1024x622.webp 1024w, https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/4-PA-selected-300x182.webp 300w, https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/4-PA-selected-768x466.webp 768w, https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/4-PA-selected-1536x933.webp 1536w, https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/4-PA-selected-2048x1244.webp 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p>You can select this risk category when you are configuring a red teaming run in Foundry for your agents. Though we generate a base template taxonomy of prohibited or high risk actions to use as the guiding policy of the red teaming run, we require a human-in-the-loop confirmation (as well as allowing customization) of this taxonomy to ensure that the red teaming run runs adversarial tests specific to your organization\u2019s own policies of disallowed agentic actions, tool access, and behaviors.<\/p>\n<p><a href=\"https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/4-PA-selected-taxonomy.webp\"><img decoding=\"async\" class=\"alignnone size-large wp-image-1673\" src=\"https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/4-PA-selected-taxonomy-1024x455.webp\" alt=\"4 PA selected taxonomy image\" width=\"1024\" height=\"455\" srcset=\"https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/4-PA-selected-taxonomy-1024x455.webp 1024w, https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/4-PA-selected-taxonomy-300x133.webp 300w, https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/4-PA-selected-taxonomy-768x341.webp 768w, https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/4-PA-selected-taxonomy-1536x683.webp 1536w, https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/4-PA-selected-taxonomy-2048x910.webp 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<h3><strong>Task Adherence<\/strong><\/h3>\n<p><strong>What it tests:<\/strong> Whether your agent faithfully follows assigned goals, rules, and procedures and not just producing the right answer, but doing so within all constraints. You can use this to debug, benchmark, and improve agent reliability in both normal and adversarial scenarios.<\/p>\n<p><strong>How it works:<\/strong><\/p>\n<ul>\n<li><strong>Three dimensions of testing:<\/strong>\n<ul>\n<li><strong>Goal Adherence:<\/strong> Did the agent accomplish the user\u2019s objective without scope drift?<\/li>\n<li><strong>Rule Adherence:<\/strong> Did it respect policy guardrails (safety, privacy, output presentation format, etc.)?<\/li>\n<li><strong>Procedural Adherence:<\/strong> Did it use allowed tools, follow correct steps, and handle ambiguity\/errors properly given its autonomy?<\/li>\n<\/ul>\n<\/li>\n<li><strong>Test case generation<\/strong> targets each failure mode, from misunderstanding objectives to violating tool usage or output schemas.<\/li>\n<li><strong>Evaluator<\/strong> uses a pass or fail output for whether the agent\u2019s outputs and actions are adhering to the task.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/5-TA-selected.webp\"><img decoding=\"async\" class=\"alignnone size-large wp-image-1674\" src=\"https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/5-TA-selected-1024x626.webp\" alt=\"5 TA selected image\" width=\"1024\" height=\"626\" srcset=\"https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/5-TA-selected-1024x626.webp 1024w, https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/5-TA-selected-300x183.webp 300w, https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/5-TA-selected-768x470.webp 768w, https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/5-TA-selected-1536x939.webp 1536w, https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/5-TA-selected-2048x1252.webp 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<h3><strong>Agentic Jailbreak (Indirect Prompt Injection Attacks)<\/strong><\/h3>\n<p><strong>What it tests:<\/strong> Whether your agent is vulnerable to where malicious instructions are hidden in tool outputs, documents, or other knowledge sources.<\/p>\n<p><strong>How it works:<\/strong><\/p>\n<ul>\n<li><strong>Synthetic datasets<\/strong> pair benign user queries with context data (emails, docs) containing attack placeholders.<\/li>\n<li><strong>During evaluation,<\/strong> risk-specific attacks are injected into these contexts and surfaced via mock tool calls.<\/li>\n<li><strong>Evaluator<\/strong> measures if the agent executes the injected attack (e.g., leaks PII, performs a prohibited action).<\/li>\n<\/ul>\n<p>Indirect prompt injection attacks exposes vulnerabilities that bypass traditional input sanitization which use this to identify vulnerabilities to attacks in your agent\u2019s tool and data ingestion logic. You can select this attack strategy when configuring your red teaming runs in Foundry, as well as leverage multiple other attack strategies.<\/p>\n<p><a href=\"https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/6-attack-strategies.webp\"><img decoding=\"async\" class=\"alignnone size-large wp-image-1675\" src=\"https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/6-attack-strategies-1024x636.webp\" alt=\"6 attack strategies image\" width=\"1024\" height=\"636\" srcset=\"https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/6-attack-strategies-1024x636.webp 1024w, https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/6-attack-strategies-300x186.webp 300w, https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/6-attack-strategies-768x477.webp 768w, https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/6-attack-strategies-1536x955.webp 1536w, https:\/\/devblogs.microsoft.com\/foundry\/wp-content\/uploads\/sites\/89\/2025\/11\/6-attack-strategies-2048x1273.webp 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p>You can also configure Indirect Prompt Injection Attacks as one of your attack strategies among many when you configure your red teaming run with the Foundry SDK.<\/p>\n<pre class=\"prettyprint language-py\"><code class=\"language-py\">eval_run_name = f\"Red Team Agent Safety Eval Run for {agent_name} - {int(time.time())}\"\r\n\r\nprint(\"[Run] Creating eval run...\")\r\neval_run = client.evals.runs.create(\r\n    eval_id=red_team.id,\r\n    name=eval_run_name,\r\n    data_source={  \r\n        \"type\": \"azure_ai_red_team\",\r\n        \"item_generation_params\": {\r\n            \"type\": \"red_team_taxonomy\",\r\n            \"attack_strategies\": [\"Flip\", \"Base64\", \"IndirectJailbreak\"],\r\n            \"num_turns\": 5,\r\n            \"source\": {\r\n                \"type\": \"file_id\",\r\n                \"id\": taxonomy_file_id,\r\n            },\r\n        },\r\n        \"target\": target.as_dict(),\r\n    },\r\n)\r\nprint(f\"[Run] Created: id={eval_run.id}, name={eval_run.name}, status={eval_run.status}\")\r\n<\/code><\/pre>\n<h2><strong>Why This Matters for Developers<\/strong><\/h2>\n<p>As organizations embrace agentic systems, ensuring safety and security becomes mission-critical. The enhanced <strong>AI Red Teaming Agent in Microsoft Foundry<\/strong>, powered by PyRIT, provides a unified, automated turn-key solution to identifying and evaluating risks spanning models, tools, and agentic systems. With no-code options, SDK integrations, and advanced evaluation capabilities, Foundry makes red teaming scalable, reproducible, and deeply embedded in your development lifecycle.<\/p>\n<p>Start today by exploring the SDK, customizing risk definitions, and integrating continuous red teaming into your CI\/CD pipelines. Together, we can move from ad-hoc testing to systematic, data driven AI safety thereby building trust in every agentic solution we deploy.<\/p>\n<h2><strong>Get Started<\/strong><\/h2>\n<ul>\n<li><strong>Explore the <\/strong><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/ai-foundry\/how-to\/develop\/run-ai-red-teaming-cloud?view=foundry&amp;tabs=python\"><strong>documentation<\/strong><\/a>\u00a0to integrate these pipelines into your agent development workflows.<\/li>\n<li><strong>Try out an <\/strong><a href=\"https:\/\/aka.ms\/agent-redteam-sample\"><strong>example workflow<\/strong><\/a> on GitHub<\/li>\n<li><strong>Visit <a href=\"https:\/\/ai.azure.com\/\" target=\"_blank\" rel=\"noopener\">Microsoft Foundry<\/a><\/strong> to get started<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Accelerate your trustworthy AI journey with the enhanced AI Red Teaming Agent in Microsoft Foundry. Empower developers to automate adversarial testing for both models and agentic systems\u2014covering risks like prompt injection, prohibited actions, sensitive data leakage, and task adherence. Integrate red teaming into your CI\/CD pipelines using the Foundry SDK and no-code UI wizard, enabling continuous safety evaluation and rapid prototyping. With PyRIT\u2019s open-source attack strategies and customizable risk definitions, you can systematically probe vulnerabilities, benchmark improvements, and ensure robust safeguards as agentic solutions move into production. Start today by exploring the docs, trying out sample workflows, and embedding red teaming into your development lifecycle.<\/p>\n","protected":false},"author":186255,"featured_media":1672,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[3,94,97,98,5,4,2,95,96],"class_list":["post-1597","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-foundry","tag-ai-development","tag-ai-red-teaming","tag-ai-safety","tag-ai-security","tag-ai-tools","tag-generative-ai","tag-microsoft-foundry","tag-responsible-ai","tag-trustworthy-ai"],"acf":[],"blog_post_summary":"<p>Accelerate your trustworthy AI journey with the enhanced AI Red Teaming Agent in Microsoft Foundry. Empower developers to automate adversarial testing for both models and agentic systems\u2014covering risks like prompt injection, prohibited actions, sensitive data leakage, and task adherence. Integrate red teaming into your CI\/CD pipelines using the Foundry SDK and no-code UI wizard, enabling continuous safety evaluation and rapid prototyping. With PyRIT\u2019s open-source attack strategies and customizable risk definitions, you can systematically probe vulnerabilities, benchmark improvements, and ensure robust safeguards as agentic solutions move into production. Start today by exploring the docs, trying out sample workflows, and embedding red teaming into your development lifecycle.<\/p>\n","_links":{"self":[{"href":"https:\/\/devblogs.microsoft.com\/foundry\/wp-json\/wp\/v2\/posts\/1597","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devblogs.microsoft.com\/foundry\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devblogs.microsoft.com\/foundry\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/foundry\/wp-json\/wp\/v2\/users\/186255"}],"replies":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/foundry\/wp-json\/wp\/v2\/comments?post=1597"}],"version-history":[{"count":0,"href":"https:\/\/devblogs.microsoft.com\/foundry\/wp-json\/wp\/v2\/posts\/1597\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/foundry\/wp-json\/wp\/v2\/media\/1672"}],"wp:attachment":[{"href":"https:\/\/devblogs.microsoft.com\/foundry\/wp-json\/wp\/v2\/media?parent=1597"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/foundry\/wp-json\/wp\/v2\/categories?post=1597"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/foundry\/wp-json\/wp\/v2\/tags?post=1597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}