Microsoft is quietly reshaping how Copilot and the web interact on Windows 11: in the latest Insider preview the Copilot app can open web links in a docked side pane next to your conversation, save per‑conversation tabs, and — if you opt in — surface saved passwords and form data so the assistant can act on web content without forcing you into a separate browser window. This change is rolling out to Windows Insiders as part of Copilot app package version 146.0.3856.39 and is explicitly designed to reduce context switching between browsing and chat — but it also raises immediate questions about privacy, enterprise control, and where sensitive web data gets processed and stored. ([blogs.windows.com]s.com/windows-insider/2026/03/04/copilot-app-on-windows-opening-web-links-alongside-your-conversations-begins-rolling-out-to-windows-insiders/)
Microsoft has been steadily folding Copilot into more locations across Windows, Edge, and Microsoft 365 for more than two years. The company’s stated aim has been to make the assistant a continuous productivity layer — not just a separate chat box — and to give it access to contextual signals like open pages, emails, and files when users permit it. The new side‑pane behavior is the latest step in that trajectory: instead of opening a target web link in your default browser, Copilot will render it inside the Copilot app in a web sidepane tied to the current conversation. Tabs you open inside a conversation are saved with that conversation for later retrievrequest permission to read the content of those tabs so it can summarize, synthesize, or draft text that references them.
This update is being previewed to all Windows Insider channels and will be expanded gradually; Microsoft frames it as an improvement in productivity continuity rather than a replacement for a full browser. The integration uses Edge’s rendering stack under the hood and, for now, operates inside the Copilot app context rather than any arbitrary third‑party browser.
Microsoft’s messaging emphasizes per‑conversation scoping: Copilot asks before it reads tab conssion is limited to the conversation in which the tabs were opened. That model reduces the assistant’s reach compared with a global tab‑reading permot eliminate risk because any page Copilot can read becomes part of that conversation’s context and therefore could be retained or processed further by the systemlogs.windows.com]
Source: Thurrott.com Microsoft is Testing Web Integration in Copilot on Windows 11
Background / Overview
Microsoft has been steadily folding Copilot into more locations across Windows, Edge, and Microsoft 365 for more than two years. The company’s stated aim has been to make the assistant a continuous productivity layer — not just a separate chat box — and to give it access to contextual signals like open pages, emails, and files when users permit it. The new side‑pane behavior is the latest step in that trajectory: instead of opening a target web link in your default browser, Copilot will render it inside the Copilot app in a web sidepane tied to the current conversation. Tabs you open inside a conversation are saved with that conversation for later retrievrequest permission to read the content of those tabs so it can summarize, synthesize, or draft text that references them.This update is being previewed to all Windows Insider channels and will be expanded gradually; Microsoft frames it as an improvement in productivity continuity rather than a replacement for a full browser. The integration uses Edge’s rendering stack under the hood and, for now, operates inside the Copilot app context rather than any arbitrary third‑party browser.
What changed in this Insider preview
Key user‑facing features
- Copilot opens clicked links in a side pane adjacent to your conversation instead of launching a separate browser window. This keeps the chat and the web content visible at the same time.
- With explicit permission, Copilot can read the content of tabs opened in that conversation — and that contextual access is scoped to the conversation. That allows follow‑up prompts such as “summarize the three tabs I opened” or “draft an email referencing the highlights.”
- Tabs you open in a conversation are saved with that conversation so they’re available when you return to the same chat later.
- Optional sync of passwords and form data to streamline multi‑step web work inside Copilot; this is an opt‑in capability and requires explicit enabling.
- The update rolled as Copilot app version 146.0.3856.39 and includes various performance and reliability improvements, plus the addition of features from Copilot.com such as Podcasts and Study & Learn mode; Microsoft notes some features may be temporarily removed while the team iterates.
How the new side‑pane behavior works (technical breakdown)
Rendering and security model
The side pane is implemented as an embedded web view that reuses Microsoft Edge’s rendering engine (WebView2 or a similar stack), meaning pages render the same way they would in Edge but inside the Copilot app. This approach gives Microsoft the benefits of a hardened rendering model and consistent web compat behavior whilerated with the conversation context. It also means the security model and content filtering behaviors of Edge are largely inherited, but the exact telemetry and content‑processing boundaries are shaped by Copilot’s additional context‑sharing mechanics. ([blogs.windows.com](Copilot App on Windows: Opening web links alongside your conversations begins rolling out to Windows Insiders## Scoped context and permissionsMicrosoft’s messaging emphasizes per‑conversation scoping: Copilot asks before it reads tab conssion is limited to the conversation in which the tabs were opened. That model reduces the assistant’s reach compared with a global tab‑reading permot eliminate risk because any page Copilot can read becomes part of that conversation’s context and therefore could be retained or processed further by the systemlogs.windows.com]
Persistence and synchronization
Tabs are saved with the conversation to support persistent research sessions. It’s not yet fully documented whether saved tabs are stored purely locally, synced to a Microsoft account, or backed up to cloud infrastructure for cross‑device continuity; Microsoft’s rollout notes leave that distinction open, and community analyses treat it as a pending implementation detail to be clarified in documentation. Where and how the saved tab metadata and page snapshots are stored matter for privacy and compliance.The UX promise — and real tradeoffs
Microsoft’s design goal is clear: reduce context switching. For common tasks — researching, drafting messages, comparing product pages, summarizing multiple sources — an integrated view where you can open pages and immediately ask Copilot to synthesize them is powerful. Typical benefits include:- Faster summarization and synthesis when Copilot can see multiple source pages concurrently.
- Cleaner drafting workflows: open the reference pages, ask Copilot to write a shareable draft that cites or uses those sources.
- Persistent research sessions that resume where you left off, with tabs saved to the conversation rather than scattered across browser windows.
- Screen real estate: a docked side pane reduces horizontal space for the web page; complex, layout‑heavy sites may feel cramped.
- Tab management friction: tabs tied to conversatio if users forget they’re saved; accidental retention creates a traceable browsing history that persists beyond ephemeral research.
- Mental model shifts: users are conditioned to think of the browser as the canonical place for web content. Moving page rendering into an assistant app requires new expectations around navigation, privacy prompts, and session lifecycle.
Privacy and security — the hard questions
The most consequential questions about this change are not “can it summarize?” but “what does Copilot see, store, and process, and where?” The high‑level facts Microsoft has stated are helpful but incomplete.Known design points
- Copilot requests consent before reading tab content and scopes that access to the conversation in which the tabs were opened.
- Password and form data sync is explicitly optional and requires enabling; it’s not automatic.
Unresolved or unclear pprivacy‑conscious users and admins)
- Processing locus: Microsoft’s announcement does not specify whether the text Copilot extracts from pages opened in the side pane is processed entirely on‑device, sent to Microsoft cloud services for model grounding, or handled via a hybrid model. The distinction matters for regulatory compliance (HIPAA, GDPR), enterprise data loss prevention, and sovereignty requirements. Independent commentary flags this as an open question until Microsoft publishes detailed technical documentation. Treat any claim about pure local processing as unverified until Microsoft confirms it.
- Persistence and telemetry: saving tabs with conversations implies persistence of page references and possibly snapshots. If saved conversations are synced across devices via a Microsoft account or tenant service, those snapshots could be retained in cloud backups. Microsoft has not yet described retention policies or the exact telemetry surface for saved tabs.
- Credential handling: optional password and form data sync is convenient but increases attack surface. Security‑minded administrators will want to know whether the vaulting mechanism uses the Windows Credentials Manager, Microsoft Edge’s saved credentials, or a separate encrypted store; and whether vault data is escrowed to the cloud in a way that requires additional tenant controls. Microsoft’s short announcement does not enumerate the implementation details.
- Third‑party content and cross‑prompt injection: when an AI assistant reads web pages and can act on them, adversarial web content could attempt to manipulate the assistant (prompt injection) or craft content that triggers unintended behaviors. Microsoft’s broader Copilot documentation has acknowledged novel security risks in agentic or web‑interactive flows; this new integration amplifies those considerations.
Enterprise management: what admins can (and can’t) do today
Enterprises have been asking Microsoft for more control over Copilot for months. Microsoft has started to provide admin levers, but these controls are often intentionally conservative and scoped — a pragmatic compromise between user convenience and enterprise governance.What Microsoft has shipped so far (preview controls)
- A Group Policy named RemoveMicrosoftCopilotApp was introduced in Insider Preview (Build 26220.7535 / KB5072046), enabling a one‑time uninstall of the consumer Copilot app under very specific conditions. That policy is co it triggers only when all gating conditions are met (for example, the consumer app was provisioned rather than user‑installed and has not been launched in the last 28 days). It is not a persistent block; users could reinstall the app unless administrators layer additional controls.
- Microsoft 365 tenant‑level controls exist for managing Copilot app provisioning and Copilot access for unlicensed users; blocking the Copilot app via the “Integrated Apps” control can be tenant‑wide, but it has implications for licensed users and other surfaces. Admins are advised to use integrated app controls, app management in Teams/Outlook, and Intune policies to tailor who receives which Copilot experience.
Practical enterprise controls (recommended layered approach)
- Pilot the new feature in a small, controlled ring and validate the behavior on test devices. Use Insider channels for early validation.
- If you need to remove the consumer Copilot app from provisioned devices, test and deploy the RemoveMicrosoftCopilotApp Group Policy carefully — remember the 28‑day inactivitystraints. It is designed for surgical cleanup, not for blanket prohibition.
- For durable prevention of reinstallation or uncontrolled use, combine the Group Policy approach with *AppLockerer Application Control (WDAC)** rules and MDM‑deployed App‑restriction policies. AppLocker provides an enforcement mechanism that survives user reinstallation attempts.
- Use Microsoft 365 admin center and Teams admin controls to manage tenant‑level Copilot provisioning and block unlicensed access where appropriate. This prevents tenant provisioning from reintroducing the consumer app.
- Update internal acceptable‑use and DLP policies to clarify whether users may use Copilot with sensitive data and instruct them about the consent prompts they will see when the assision to read web tabs.
Threat models and mitigations
If your organization must limit exposure, consider these short, prioritized mitigations:- Assume any web content be temporarily processed by cloud services. Treat the feature as equivalent to past web‑grounded Copilot features in terms of processing locus until Microsoft clarifies otherwise. Mitigation: restrict Copilot usage in high‑risk groups and ensure DLP policies block sensitive page content from being processed by external services.
- For endpoints requiring strict application whitelisting, deploy AppLocker/WDAC rules that prevent the consumer Copilot app or the Copilot side‑pane host from running. Mitigation: enforce via Intune/MDM for scale.
- Monitor for abusive web content and promMitigation:* educate users to treat assistant actions skeptically, enable logging and audit trails where possible, and apply web‑content filtering to limit exposure to high‑risk sites.
- Validate credential handling: until the credential sync behavior is fully documented, avoid enabling password/form sync on machines that handle regulated credentials. Mitigation: enforce a policy that restricts enabling credential sync to approved groups only.
How this compares to other browser‑anchored Copilot experiences
Microsoft has previously added Copilot features to the Edge side pane (page summarization, contextual prompts) and to integrated Copilot modes across Microsoft 365 apps. This new behavior differs in two ways:- The assistant is now hosting web pages inside the Copilot app (an app‑anchored embedded browser) rather than being a side pane inside Edge; that shi and permission flows occur.
- Per‑conversation tab saving introduces persistent research artifacts tied to chat history rather than just ephemeral tab state in a browser. That improves workflow continuity but increases the potential for long‑lived records of browsing activity.
Practical advice for everyday users
- Treat the Copilot side‑pane as an opt‑in productivity experiment. If you rely on private or sensitive websites (banking, medical, HR portals), avoid opening those pages inside the Copilot side pane until Microsoft publishes clear processing and retention guarantees.
- Review consent prompts carefully. When Copilot asks to read tab contents, that’s the moment to decide whether you want those pages to become part of the assistant’s context. If you’re unsure, deny and use a conventional browser window instead.
- Use browser privacy featte mode) if you need ephemeral browsing; note however that the integration and saved‑tabs behavior may not honor this the way a normal browser session does — test before trusting.
- If you enable credentials or form‑data sync for convenience, document the decision and understand how your organization expects credentials to be managed. Prefer platform password managers and vaults with documented protections.
Critical analysis — strengths, weaknesses, and the broader implications
Strengths
- The feature directly addresses a genuine pain point: context switching between browser and assistant. For knowledge‑work flows (research, drafting, competitive checks), being able to open multiple pages and ask Copilot to synthesize them without manual copy‑paste is objectively valuable.
- Technical consistency with Edge’s rendering stack reduces compatibility surprises; embedding a proven web engine inside Copilot preserves rendering fidelity for modern sites.
- Microsoft’s staged rollout via Insiders and the inclusion of permission prompts show that the company is aware of the privacy, UX, and enterprise governance tradeoffs and is choosing to iterate rather than rush.
Weaknesses and risks
- The lack of explicit documentation about where and how page content is processed and retained is the single largest omission. That technical detail determines compliance posture for many organizations; until it’s published, admins must assume conservative defaults and proceed cautiously.
- The administrative control available today (a one‑time uninstall policy) is pragmatic but not sufficient as a durable enforcement mechanism in large, heterogeneous environments. Enterprises that require deterministic controls will have to assemble layered mitigations (AppLocker/WDAC, tenant provisioning settings, Intune restrictions) — a higher operational cost.
- The new interaction model increases the attack surface for prompt‑injection and adversarial web content, and existing DLP and threat detection tooling may not be ready to monitor assistant‑driven flows without configuration changes.
Strategic implications
Microsoft is betting that a persistent, multi‑surface Copilot — one that can see the web and act across apps — will deliver enough productivity upside to offset user friction and governance costs. For consumers and individual knowledge workers, the convenience tradeoff may be worthwhile. For regulated enterprises, the burden of proof lies with Microsoft: provide clear technical documentation, retention and telemetry policies, and admin controls that can be relied upon in production environments. Until those are available, cautious, controlled pilots are the right approach.What to watch next
- Microsoft’s forthcoming technical documentation explaining whether side‑pane page content is processed on‑device or in the cloud, and the retention/backup policies for saved tabs. This is the clearest gating item for broad enterprise adoption.
- New or expanded admin policies that provide permanent blocking or durable prevention of the consumer Copilot app or the side‑pane behavior, beyond the current one‑time uninstall capability.
- Signals from Insiders about real‑world usability: how often users accept the permission prompts, whether saved tabs are beneficial or burdensome, and whether the feature interferes with multi‑device workflows.
Conclusion
Microsoft’s move to render web content inside the Copilot app and tie tabs to conversations is a meaningful evolution of the assistant: it stitches browsing and chat into a single, project‑scoped workspace that can speed research and drafting. That convenience is real and likely to be welcomed by many users. But the change is also a clear escalation in scope for an assistant that can now see and persist web sessions — and with that power come real governance, privacy, and security responsibilities. For individuals, the rule is simple: treat the side‑pane as opt‑in and protect sensitive browsing. For IT teams, the rule is systemic: pilot the feature, assume conservative processing defaults, and combine Microsoft’s early admin policies with AppLocker/WDAC and tenant controls for durable protection. Microsoft’s staged rollout and permission prompts show awareness of these tensions, but until the company publishes definitive technical details about processing and retention, security‑minded organizations should proceed with caution.Source: Thurrott.com Microsoft is Testing Web Integration in Copilot on Windows 11
- Joined
- Mar 14, 2023
- Messages
- 97,829
- Thread Author
-
- #2
Microsoft’s Copilot app on Windows now opens web links inside a docked sidepane tied to the conversation, promising a smoother, less interruptive workflow — and promptly reigniting the debate over whether convenience is worth ceding control of the browsing experience. (blogs.windows.com) (theregister.com)
Microsoft announced the change in an Insider blog post on March 4, 2026, describing a new behavior in Copilot app builds (Copilot app version 146.0.3856.39 and later) that opens clicked links “in a sidepane next to your conversation instead of a separate browser window.” The company says Copilot will, with explicit permission, read the content of tabs opened inside that conversation, save those tabs with the conversation for future recall, and — if a user enables it — sync passwords and form data to make in-pane navigation and form completion easier. Microsoft frames this as a productivity feature that reduces context switching. (blogs.windows.com)
At first glance it’s a simple user-experience decision: keep the web page you clicked visible next to the chat so Copilot can reference it without you flipping between windows. But the mechanics, implications, and vendor reactions make this more than a UX tweak: it touches browser choice, credential handling, enterprise policy, privacy memories like Windows Recall, and regulatory scrutiny about platform leverage. Independent reporting and commentary from browser vendors and the press have already begun to dissect what the small interface change really means. (theregister.com)
But that convenience comes at a competitive cost. The Copilot sidepane replaces the long-standing desktop convention that clicking a link hands off to your default browser — an app choice you made and configured with preferences, extensions, font sizes, security settings and an established autofill vault. Several browser vendors have framed the change as presumptuous: if links default to opening in Copilot-sidepane pages rather than the browser you intentionally set as default, that erodes the user’s control of core platform behavior and potentially funnels attention, telemetry, and transactions toward Microsoft’s surfaces. The same complaint repeatedly surfaces when platform owners embed their own UI stacks: convenience for some, pressure on competition for others. (theregister.com)
Key points to consider:
There’s also a regulatory dimension. European competition rules and frameworks like the Digital Markets Act are designed to limit platform owners’ ability to use system-level advantages to gain undue control of markets. Whether embedding Edge’s rendering stack inside a Microsoft-managed app counts as circumvention of browser-choice remedies is a legal question that will be litigated in policy and courts, but it’s reasonable to expect regulators to pay attention if the behavior becomes widespread and if opt-out or administrative controls are weak. That said, these are complex legal matters that depend on specific implementation, distribution mechanics, and whether the sidepane is the user’s explicit choice or the system default. (theregister.com)
But the small print matters: changing the default link-handling behavior, introducing a new autofill surface, and persisting tabs with conversations all change the balance of control, telemetry, and governance on Windows machines. Those are not trivial shifts. Vendors and regulators have reasons to be wary, enterprises have reasons to impose cautious policies, and privacy-minded users will want precise assurances about credential handling and data retention.
Microsoft is running this change through Windows Insiders first — a wise move because the rollout will generate feedback, policy demands and possibly new admin controls. Yet the event also highlights a larger industry choice: do we accept assistant-embedded web surfaces as the new norm, or do we insist on preserving the browser as the canonical gateway to the web? The answer will depend on how transparent vendors are about implementation, how granular admin and privacy controls become, and how regulators interpret platform leverage when assistant experiences are tightly coupled to operating system behavior. (blogs.windows.com)
If you manage Windows endpoints, pilot this feature in a controlled lab this week. If you’re a privacy-conscious user, avoid enabling password or form-data sync until Microsoft publishes detailed documentation explaining precisely how those secrets are stored, which vaults are used, and how they can be administered or revoked. The feature may well be helpful — but convenience should never be the only lens through which we evaluate changes that touch credentials, browsing defaults, and cross-app context. (blogs.windows.com)
Source: theregister.com Copilot swallows your browser. You're welcome
Background
Microsoft announced the change in an Insider blog post on March 4, 2026, describing a new behavior in Copilot app builds (Copilot app version 146.0.3856.39 and later) that opens clicked links “in a sidepane next to your conversation instead of a separate browser window.” The company says Copilot will, with explicit permission, read the content of tabs opened inside that conversation, save those tabs with the conversation for future recall, and — if a user enables it — sync passwords and form data to make in-pane navigation and form completion easier. Microsoft frames this as a productivity feature that reduces context switching. (blogs.windows.com)At first glance it’s a simple user-experience decision: keep the web page you clicked visible next to the chat so Copilot can reference it without you flipping between windows. But the mechanics, implications, and vendor reactions make this more than a UX tweak: it touches browser choice, credential handling, enterprise policy, privacy memories like Windows Recall, and regulatory scrutiny about platform leverage. Independent reporting and commentary from browser vendors and the press have already begun to dissect what the small interface change really means. (theregister.com)
What Microsoft says and what is already clear
The new sidepane behavior (what’s in the release notes)
- Click a link in a Copilot conversation and the page opens inside a sidepane inside the Copilot app rather than launching your default browser.
- Copilot can access, with your permission, the context of tabs opened in that conversation only — enabling cross-tab summarization and follow-up prompts.
- Tabs opened inside a conversation are saved with that conversation so you can return to them later.
- An optional sync for passwords and form data can be enabled to permit autofill inside the Copilot sidepane.
- The change is rolling out to Windows Insiders gradually starting in Copilot app package versions beginning with 146.0.3856.39. (blogs.windows.com)
Rendering engine and technical plumbing (what Microsoft didn’t explicitly say)
Microsoft’s blog post describes the behavior, but it does not publish low-level implementation details such as the exact embedding technology. Independent reporting and community analysis point to an embedded Edge rendering stack — commonly WebView2 or an equivalent — powering the internal web view inside the Copilot app, which means pages will generally render exactly as they do in Edge. That alignment explains cross-compatibility and why Microsoft can inherit many of Edge’s site permissions and content-safety behaviors, but it’s an inference rather than a vendor-confirmed implementation detail. Treat mentions of WebView2 as highly plausible but technically inferred from the architecture Microsoft has used in similar integrations, not as a direct, explicit statement from Microsoft.UX and competition: convenience vs. choice
Embedding a complete web rendering surface inside an assistant-style app is, in product terms, a genuine productivity win for some workflows. Researchers, writers, and people who use Copilot to triage web-based information can keep the browser content and the assistant’s working memory visible at once — a win for “one-window” workflows. Microsoft sells the feature on that basis: less context switching, faster drafting and summarization, and an easier path to follow-up prompts that reference exact pages. (blogs.windows.com)But that convenience comes at a competitive cost. The Copilot sidepane replaces the long-standing desktop convention that clicking a link hands off to your default browser — an app choice you made and configured with preferences, extensions, font sizes, security settings and an established autofill vault. Several browser vendors have framed the change as presumptuous: if links default to opening in Copilot-sidepane pages rather than the browser you intentionally set as default, that erodes the user’s control of core platform behavior and potentially funnels attention, telemetry, and transactions toward Microsoft’s surfaces. The same complaint repeatedly surfaces when platform owners embed their own UI stacks: convenience for some, pressure on competition for others. (theregister.com)
- For users who want to keep every link in their preferred browser, the new default flow represents a change in habit and potentially in trust.
- For browser vendors, the feature can look like a competitor buying eyeballs by changing the expected mechanics of link-opening.
- For developers and publishers, embedded rendering inside Copilot may change how their pages are experienced and monetized (ads, tracking, and scripts behave differently depending on the embedding context and the user’s installed extensions).
Privacy and security: why “password sync” matters
The part of Microsoft’s note that has raised the most eyebrows is the optional password and form-data sync. Autofill is a substantial convenience — but it also materially changes the threat model when you allow another application surface (the Copilot app) to access credential material, even if that access is mediated by a vault or a token.Key points to consider:
- Password syncing and autofill are opt-in per Microsoft’s messaging. But opt-in consent is only as strong as the UX used to secure it; ambiguous prompts or buried settings can lead users to enable features without fully understanding consequences. (blogs.windows.com)
- There’s ambiguity about which credential store Copilot will use when autofilling in the sidepane. Will it call into Edge’s password vault, Windows Credential Manager, or a separate Copilot-controlled store? That difference matters for administration, telemetry, and corporate policy enforcement. Public documentation does not yet spell out the precise credential store semantics. Independent analysis suggests Copilot is likely to reuse an existing Edge-style encrypted store, but Microsoft has not published the exact plumbing. That lack of detail is a real implementation risk.
- Practical attack surface: expanding the number of apps that can invoke autofill increases the attack surface, particularly for credential-stealing malware, misconfigured policy controls, or flaws in how a sidepane handles focus and scripting. Even if the autofill process uses tokens and never exposes plaintext to Copilot’s reasoning pipeline, the mere fact that filling occurs in a different app surface raises questions about logging, telemetry, and crash dumps that may leak sensitive metadata.
Enterprise controls and administration: what IT needs to know
Enterprises should be paying attention for several reasons:- Policy control and MDM: Administrators will want to know whether and how Copilot sidepane behavior can be restricted through Group Policy, Intune (MDM), or other management layers. Early reporting indicates Microsoft is still iterating on controls and that rollout to Insiders is gradual; there are early signs that Intune/Entra policy controls will be extended to govern Copilot behaviors, but the documentation is not yet comprehensive. Enterprise admins should treat the preview as a testbed for policy mapping.
- Credential governance: If Copilot uses Edge’s credential vault or Windows Credential Manager, admins will need clarity on whether the Copilot autofill experience respects organizational policies like Conditional Access, managed browser restrictions, or enterprise-only vaults. If Copilot surfaces a separate credential store, that’s a new governance surface to manage. At this early stage, Microsoft’s public notes do not provide crisp answers on binding Copilot autofill to enterprise credential stores. (blogs.windows.com)
- Data residency and telemetry: The per-conversation saved tabs feature implies persistent metadata stored against chat state. Admins must know where that metadata (and any derived summaries) is stored, how long it persists, whether it leaves the device, and whether it is subject to tenant-level retention, deletion, and eDiscovery policies. The Microsoft post emphasizes Insiders and opt-in permissions but does not enumerate data residency guarantees for business tenants. This gap should concern compliance teams until Microsoft clarifies retention and export behaviors. (blogs.windows.com)
- Incident response and forensic impact: Sidepane browsing changes forensic artifacts. For example, some activity may now be logged in Copilot conversation histories rather than in the enterprise’s usual browser telemetry streams, complicating investigation workflows unless tooling and logs are updated to capture both surfaces. IT teams should evaluate logs and endpoint telemetry during pilot testing.
Vendor reactions, competition and regulatory angle
Browser vendors were quick to critique Microsoft’s move. Vivaldi’s communications officer called the behavior “impertinent,” warning that overriding the expectation that a link opens the default browser is discourteous and could be anti-competitive if it becomes a de facto experience for many users. Similar critiques from other browser stakeholders emphasize user choice, policy enforcement and the possibility that embedded assistants will slowly narrow the ways people access the open web. (theregister.com)There’s also a regulatory dimension. European competition rules and frameworks like the Digital Markets Act are designed to limit platform owners’ ability to use system-level advantages to gain undue control of markets. Whether embedding Edge’s rendering stack inside a Microsoft-managed app counts as circumvention of browser-choice remedies is a legal question that will be litigated in policy and courts, but it’s reasonable to expect regulators to pay attention if the behavior becomes widespread and if opt-out or administrative controls are weak. That said, these are complex legal matters that depend on specific implementation, distribution mechanics, and whether the sidepane is the user’s explicit choice or the system default. (theregister.com)
Practical recommendations for users and IT (what to do next)
If you’re a Windows user, power user, or IT administrator, here’s a prioritized list of practical steps to handle the change while it’s in preview:- Inspect the permission UX before enabling anything. If Copilot asks for password/form-data sync, evaluate the precise wording and whether it binds to your existing vault (Edge or Windows credential manager) or to a new Copilot account vault. Do not enable credential sync by default. (blogs.windows.com)
- Pilot the feature in a controlled environment. IT teams should enroll a small set of test devices in the Insider ring and verify how Copilot sidepane artifacts appear in existing logs, endpoint detection tools, and MDM policies. Confirm whether Conditional Access and managed-browser controls remain enforced when logins happen inside the sidepane.
- Define short-term policy. If there’s uncertainty about the credential store used or telemetry, create a temporary policy: block Copilot autofill for enterprise accounts until Microsoft publishes implementation-level details and admin controls. This reduces exposure while preserving the right to enable the feature when governance is confirmed.
- Educate users. Explain the difference between “opening in Copilot sidepane” and opening in the default browser. Users should know how to force links into their chosen browser (context menu options or a setting are likely forthcoming).
- Follow Microsoft’s documentation and updates. Because this is an Insider preview, features may move and controls may be added or removed. Keep a short update cadence until the behavior stabilizes and GA documentation is published. (blogs.windows.com)
Strengths and legitimate product benefits
- Reduced context switching. Users who live in chat-and-research workflows will value having the reference page visible while drafting and prompting Copilot.
- Integrated summarization. Copilot can summarize multiple tabs opened inside the conversation and produce drafts that reference exact source pages without users copying and pasting links.
- Faster micro-workflows. Autofill and saved tabs can accelerate multi-step web interactions such as filling forms, booking travel, or pulling data from an internal dashboard — all without switching windows.
- Feature consolidation. By bringing Podcasts and Study & Learn mode into the Copilot app, Microsoft is consolidating features, which can reduce fragmentation for users invested in Microsoft’s ecosystem. (blogs.windows.com)
Risks, unknowns and red flags
- Ambiguous credential store semantics. Microsoft hasn’t spelled out which vault the Copilot autofill uses, leaving an important governance question unanswered. That ambiguity matters for enterprise credential control, telemetry, and potential auditability.
- Opt-in vs. default behavior. Even if password sync and tab-reading are opt-in, changing the default behavior for link opening (from system default browser to Copilot sidepane) is a UX-level alteration that can be felt as coercive by users and browser vendors. (theregister.com)
- Data persistence and eDiscovery. Saved tabs tied to conversation state raise questions about retention, export, and deletion policies in enterprise settings.
- Regulatory attention. If the sidepane becomes a broad channel for capturing user attention and transactions, regulators may investigate whether it privileges Microsoft’s services over competitors.
- Trust erosion due to prior incidents. The Recall controversy means Microsoft must work harder to demonstrate that saved content and autofill flows are secure, private, and controllable. Users’ diminished trust amplifies the impact of any small misstep.
What we still don’t know (and what needs confirmation)
- Is the embedded web view explicitly WebView2, or an internally adapted rendering component? The evidence points to Edge’s rendering stack, but Microsoft’s blog does not use the term “WebView2” in the announcement, so that exact technical attribution remains inferred rather than confirmed. Proceed with caution when assuming WebView2-specific behaviors. (blogs.windows.com)
- Where is per-conversation tab metadata stored, and how long is it retained by default? Microsoft’s announcement is silent on retention windows and export/erasure semantics for saved tabs.
- Which credential store(s) are used for autofill and how do enterprise controls (Intune/Group Policy) apply? Until Microsoft provides explicit admin documentation, these are open questions for security and compliance teams.
Bottom line
Microsoft’s Copilot sidepane is a logical product evolution if you view Copilot as a persistent, context-aware assistant: keeping the web content next to the conversation makes many workflows smoother and less error-prone. For users and organizations who already trust Microsoft’s integrated surfaces, the feature is likely to provide real productivity gains.But the small print matters: changing the default link-handling behavior, introducing a new autofill surface, and persisting tabs with conversations all change the balance of control, telemetry, and governance on Windows machines. Those are not trivial shifts. Vendors and regulators have reasons to be wary, enterprises have reasons to impose cautious policies, and privacy-minded users will want precise assurances about credential handling and data retention.
Microsoft is running this change through Windows Insiders first — a wise move because the rollout will generate feedback, policy demands and possibly new admin controls. Yet the event also highlights a larger industry choice: do we accept assistant-embedded web surfaces as the new norm, or do we insist on preserving the browser as the canonical gateway to the web? The answer will depend on how transparent vendors are about implementation, how granular admin and privacy controls become, and how regulators interpret platform leverage when assistant experiences are tightly coupled to operating system behavior. (blogs.windows.com)
If you manage Windows endpoints, pilot this feature in a controlled lab this week. If you’re a privacy-conscious user, avoid enabling password or form-data sync until Microsoft publishes detailed documentation explaining precisely how those secrets are stored, which vaults are used, and how they can be administered or revoked. The feature may well be helpful — but convenience should never be the only lens through which we evaluate changes that touch credentials, browsing defaults, and cross-app context. (blogs.windows.com)
Source: theregister.com Copilot swallows your browser. You're welcome
- Joined
- Mar 14, 2023
- Messages
- 97,829
- Thread Author
-
- #3
Microsoft has rolled a notable change into the Windows 11 Copilot app: links clicked inside a Copilot conversation can now open in a docked side pane rendered by Microsoft Edge’s engine, keeping web content beside the chat rather than launching a separate browser window — a move that’s live for Windows Insiders in builds beginning with Copilot app version 146.0.3856.39.
Microsoft has been steadily folding Copilot into Windows and Edge as a continuous productivity layer rather than a single, isolated chat window. The latest Insider preview continues that trajectory by turning the Copilot app itself into a browsing surface for links opened from within conversations. The company announced the rollout on March 4, 2026, and confirmed the change ships in Copilot app package versions starting at 146.0.3856.39, which are being distributed across Windows Insider channels.
This update is more than a UI tweak: it includes persistent, per-conversation tab saving, scoped permission controls that require explicit consent before Copilot reads page contents, and an optional credential/form-data sync to permit autofill inside the side pane. Microsoft framed the feature as a productivity enhancement — “so you don’t lose context” — and emphasized that web access is opt-in and scoped per conversation.
Why this matters: using Edge’s rendering engine ensures pages display consistently with Edge, reduces engineering effort for compatibility, and lets Microsoft enforce content-safety policies it already operates in the browser. The tradeoff is that pages opened inside Copilot won’t necessarily be subject to the extension ecosystem, profile-specific settings, or privacy choices users have set in their preferred browser.
However, the optional credential sync raises a new threat vector: enabling autofill in Copilot effectively surfaces user credentials to an additional application surface with potentially different persistence, telemetry, and administrative controls than a traditional browser password manager. Microsoft’s public notes suggest autofill will be implemented in a manner that uses a vault-like mechanism rather than injecting plaintext credentials into Copilot’s reasoning context — but the precise storage location (Edge vault, Windows Credential Manager, or a Copilot-specific store), any cloud backup behavior, and telemetry details are not fully documented in the initial release notes. Those are material questions for privacy and enterprise compliance.
That design trade-off has pros and cons:
That strategy has upside: a consistent, feature-rich assistant that reduces friction in day-to-day work. It also raises questions about competition and user autonomy: embedding core experiences into system-managed surfaces is a powerful lever that requires careful guardrails, transparency, and enterprise-grade controls.
At the same time, the optional credential sync and the new browsing surface expand the threat model in ways that matter to privacy-conscious users and enterprises. Key technical details — storage, telemetry, and administrative controls — remain to be fully documented. Organizations and cautious users should treat this as an Insider-preview feature: evaluate benefits, demand clear documentation, and avoid enabling credential sync or broad deployment until Microsoft publishes definitive security and admin guidance.
For power users and knowledge workers who prioritize fast, AI-assisted research and drafting, the Copilot side pane is a potentially transformative workflow improvement. For security teams and privacy advocates, it’s a reminder that convenience and control must be balanced with transparency and enforceable policy. The coming weeks of Insider testing should clarify how Microsoft will close the remaining gaps and what administrative levers will be made available before general availability.
In the short term, the best practical approach for most users is cautious experimentation: try the feature in a controlled setting, keep sensitive sync options off by default, and provide feedback through the Insider channels so Microsoft can refine the behavior before it lands in production releases.
Source: WinBuzzer Microsoft Adds In-App Browser to Windows 11 Copilot
Background
Microsoft has been steadily folding Copilot into Windows and Edge as a continuous productivity layer rather than a single, isolated chat window. The latest Insider preview continues that trajectory by turning the Copilot app itself into a browsing surface for links opened from within conversations. The company announced the rollout on March 4, 2026, and confirmed the change ships in Copilot app package versions starting at 146.0.3856.39, which are being distributed across Windows Insider channels.This update is more than a UI tweak: it includes persistent, per-conversation tab saving, scoped permission controls that require explicit consent before Copilot reads page contents, and an optional credential/form-data sync to permit autofill inside the side pane. Microsoft framed the feature as a productivity enhancement — “so you don’t lose context” — and emphasized that web access is opt-in and scoped per conversation.
What changed — the new user-facing surface
The change can be broken down into a handful of user-visible behaviors:- Click a link inside a Copilot chat and the page opens in a docked side pane inside the Copilot app instead of the system’s default browser.
- Tabs opened in that side pane are saved with the conversation, turning each chat into a persistent research workspace that you can revisit later.
- Webpage content access is disabled by default; Copilot will request explicit permission before it reads the content of tabs opened in a conversation. Permission is scoped to the conversation and does not carry over automatically.
- An optional passwords and form-data sync can be enabled to allow autofill inside the embedded browser, streamlining multi-step web workflows. Microsoft describes this as opt-in.
- The update also brings features from Copilot.com — Podcasts and Study and Learn modes — into the native Windows app, while Microsoft iterates on other features that may be temporarily removed and restored before general availability.
How the in-app browser is implemented (what we can verify)
Microsoft’s official Insider announcement describes the behavioral changes but does not publish exhaustive low-level technical details. Independent reporting and the app’s historical architecture strongly indicate that the side pane reuses Microsoft Edge’s rendering stack — commonly exposed to third-party apps as WebView2 or an equivalent embedded engine — to render webpages inside the Copilot app. That approach delivers Edge-like compatibility and allows Microsoft to inherit many of Edge’s site-safety and compatibility behaviors. Treat references to WebView2 as a highly plausible inference supported by the architecture Microsoft typically uses for embedded web content.Why this matters: using Edge’s rendering engine ensures pages display consistently with Edge, reduces engineering effort for compatibility, and lets Microsoft enforce content-safety policies it already operates in the browser. The tradeoff is that pages opened inside Copilot won’t necessarily be subject to the extension ecosystem, profile-specific settings, or privacy choices users have set in their preferred browser.
Permission model and privacy design
Microsoft explicitly designed the web access flow with a careful opt-in structure:- Default off: Copilot will not read the contents of any open tab until a user grants permission.
- Per-conversation scoping: Consent is scoped to a single conversation. A permission granted in one conversation does not automatically extend to another. This reduces passive, cross-session exposure.
- Optional credential sync: Passwords and form data can be enabled for autofill inside the side pane, but this remains an opt-in setting; Microsoft frames it as similar to browser autofill but accessible to the Copilot surface instead of (or in addition to) a standard browser vault.
However, the optional credential sync raises a new threat vector: enabling autofill in Copilot effectively surfaces user credentials to an additional application surface with potentially different persistence, telemetry, and administrative controls than a traditional browser password manager. Microsoft’s public notes suggest autofill will be implemented in a manner that uses a vault-like mechanism rather than injecting plaintext credentials into Copilot’s reasoning context — but the precise storage location (Edge vault, Windows Credential Manager, or a Copilot-specific store), any cloud backup behavior, and telemetry details are not fully documented in the initial release notes. Those are material questions for privacy and enterprise compliance.
Productivity wins: why Microsoft is betting on this design
The user experience argument for the side pane is straightforward and persuasive in many workflows:- Researchers, writers, and knowledge workers often toggle between reference pages and a writing or summarization interface. Embedding pages next to Copilot reduces context switching and shortens the loop between discovery and synthesis.
- Per-conversation tabs create a persistent research workspace. Instead of relying on browser history, users can return to the exact set of pages used to produce a particular draft or summary. This helps continuity for multi-step tasks like compiling reports, drafting emails, or comparing product specifications across multiple sources.
- With permission, Copilot can summarize open pages, extract key points across multiple tabs, and draft text that references the exact passages the user presented — eliminating repetitive copy/paste workflows.
Competition, platform leverage, and user control
This change also sits squarely at the intersection of convenience and competitive dynamics. By rendering links inside Copilot using Edge’s engine, Microsoft introduces a surface that competes for user attention with whichever browser the user has intentionally chosen as their default.- For users who deliberately set a default browser and rely on its extensions, privacy settings, or saved profiles, the Copilot side pane represents a parallel browsing surface that may not honor those choices or extensions. That can feel like an erosion of user control over how links should behave.
- Browser vendors and privacy advocates are likely to frame the move as pressure toward Microsoft’s ecosystem. Similar platform-level integrations have triggered scrutiny in the past whenever a platform owner exposes its own service in a way that circumvents user-set defaults.
- Microsoft has previously taken steps to integrate Copilot heavily into Edge (Copilot Mode, automatic side pane triggers for Outlook links). The two directions together — Copilot embedding web rendering on Windows and Edge auto-opening Copilot for certain link types — show a coordinated strategy to make Copilot the central productivity layer across browsing and desktop workflows.
Security, telemetry, and enterprise risk
From an enterprise security perspective, several immediate concerns should be evaluated:- Credential surface area: Enabling the optional password sync effectively grants another application access to credential autofill. Enterprises must confirm whether credentials remain protected by the same vault, encryption, and cloud-synchronization policies they currently enforce for browsers and password managers. The implementation details (vault backend, cloud backup, tokenization, telemetry) will determine whether compliance requirements are met.
- Data retention and discovery: Saved tabs tied to conversations create a new, potentially persistent store of browsing activity. Administrators need clarity on how saved tabs are stored, how long they persist, whether they are included in eDiscovery or backup policies, and how they are scoped across accounts and devices. Microsoft’s notes leave some of these details open.
- Telemetry and processing: When Copilot reads a page (with permission), what telemetry is recorded? Are page contents ever sent to remote services for indexing or processing, and if so, how are they sanitized and logged? The per-conversation consent model reduces unnecessary exposure, but the enterprise threat model requires explicit answers about server-side processing and retention.
- Extension and policy gaps: The Copilot side pane is unlikely to honor third-party browser extensions, content-blockers, or enterprise-managed security extensions. That can change the security posture for any workflows that depend on those protections. IT should test Copilot’s browsing surface under real-world conditions before approving the feature for broad use.
Design trade-offs and the user mental model
The Copilot side pane changes the classic desktop mental model where clicking a link hands off to the user’s chosen browser. That convention communicates user control: your default browser reflects your extensions, your privacy settings, and your saved session. Embedding web content inside Copilot replaces that handoff with a contextualized assistant experience.That design trade-off has pros and cons:
- Pros:
- Reduced window switching and faster context-aware assistance.
- Persistent research sessions and simpler follow-up prompts referencing open tabs.
- Integrated drafting flows that can cite exactly the material you provided to Copilot.
- Cons:
- Potential confusion about where credentials and cookies are stored and which browser protections apply.
- Loss of extension-based protections and third-party tooling for pages opened inside Copilot.
- Competitive concerns that platform-level integration nudges users toward Microsoft-managed surfaces.
What Microsoft has not fully documented (and where caution is warranted)
Microsoft’s initial notes are explicit about many of the high-level behaviors, but several implementation details remain under-specified and should be verified before broad rollout:- Where saved tab metadata and any possible page snapshots are stored (local only, synced to Microsoft account, or uploaded to cloud storage).
- The exact vault or storage engine used for optional credential and form-data sync — and whether that sync is subject to the same protections, recovery and export controls as other credential managers.
- The telemetry footprint associated with readable page content and any retention period for data Copilot uses from web pages.
- Administrative controls (Group Policy / Intune) that allow IT to block the Copilot in-app browser or disable credential sync for managed devices. Early coverage suggests Microsoft will iterate and likely add enterprise controls, but those were not published with the initial Insider note.
Recommendations — what users and IT admins should do now
For end users:- If you test the feature, keep web access disabled by default until you understand how Copilot uses page content and where any saved tabs are stored.
- Prefer leaving credential sync disabled unless you need autofill inside Copilot for specific workflows. When you enable it, treat Copilot as a new client surface for credentials.
- Use per-conversation permissions deliberately; grant access only for the sessions where Copilot needs to read pages to complete a task.
- Treat the rollout as a preview and block or delay rollout in production environments until Microsoft publishes enterprise guidance and administrative controls.
- Define acceptable-use policies for Copilot browsing and test how saved tabs, cred sync, and telemetry behave under your M365, Intune, and compliance settings.
- Monitor Microsoft’s documentation and Insider notes for newly published Group Policy and MDM controls that can disable in-app browsing or credential sync.
The bigger picture: Copilot as a productivity layer
This rollout reflects Microsoft’s broader strategy: make Copilot an OS-level productivity fabric rather than an optional chatbox. The company has previously integrated Copilot into Edge (Copilot Mode), Outlook workflows, and other surfaces; the new in-app browser on Windows is the desktop-side complement to auto-triggering Copilot in Edge for certain link types. Taken together, these moves push toward an ecosystem where Copilot sits at the center of reading, drafting, and actioning content across the user’s digital workflow.That strategy has upside: a consistent, feature-rich assistant that reduces friction in day-to-day work. It also raises questions about competition and user autonomy: embedding core experiences into system-managed surfaces is a powerful lever that requires careful guardrails, transparency, and enterprise-grade controls.
Final assessment
Microsoft’s decision to let the Copilot app render web pages in a side pane is a natural next step for an assistant designed to operate on context. The feature delivers meaningful productivity benefits for research and drafting workflows by keeping web content and the assistant visible together, enabling per-conversation persistence and tightly scoped permissioning that reduces passive data exposure.At the same time, the optional credential sync and the new browsing surface expand the threat model in ways that matter to privacy-conscious users and enterprises. Key technical details — storage, telemetry, and administrative controls — remain to be fully documented. Organizations and cautious users should treat this as an Insider-preview feature: evaluate benefits, demand clear documentation, and avoid enabling credential sync or broad deployment until Microsoft publishes definitive security and admin guidance.
For power users and knowledge workers who prioritize fast, AI-assisted research and drafting, the Copilot side pane is a potentially transformative workflow improvement. For security teams and privacy advocates, it’s a reminder that convenience and control must be balanced with transparency and enforceable policy. The coming weeks of Insider testing should clarify how Microsoft will close the remaining gaps and what administrative levers will be made available before general availability.
In the short term, the best practical approach for most users is cautious experimentation: try the feature in a controlled setting, keep sensitive sync options off by default, and provide feedback through the Insider channels so Microsoft can refine the behavior before it lands in production releases.
Source: WinBuzzer Microsoft Adds In-App Browser to Windows 11 Copilot
Similar threads
- Replies
- 1
- Views
- 40
- Replies
- 1
- Views
- 47
- Article
- Replies
- 3
- Views
- 110
- Article
- Replies
- 1
- Views
- 34
- Article
- Replies
- 0
- Views
- 36