Skip to main content

Command Palette

Search for a command to run...

Microsoft now lets admins uninstall Copilot on enterprise devices

Updated
2 min read
Microsoft now lets admins uninstall Copilot on enterprise devices
P

Phong Xuan

Microsoft says IT administrators can now uninstall the AI-powered Copilot digital assistant from enterprise devices using a new policy setting, which has become broadly available after the April 2026 Patch Tuesday.

is available as a Policy CSP and Group Policy after deploying this month's Windows security updates on endpoints managed via Microsoft Intune or System Center Configuration Manager (SCCM).

This policy will only apply to Windows 11 25H2 devices where the Microsoft 365 Copilot and Microsoft Copilot are both installed, the user did not install the Microsoft Copilot app, and the Microsoft Copilot app was not launched in the last 28 days.

"The new RemoveMicrosoftCopilotApp policy setting allows you to uninstall Copilot from devices in your organization in a non-disruptive way," .

"If this policy is enabled, the Microsoft Copilot app will be uninstalled. Users can still re-install if they choose to. This setting applies to Enterprise, Professional and Education client SKUs only," .

To enable it, open the Group Policy Editor, and go to User Configuration > Administrative Templates > Windows AI > Remove Microsoft Copilot App.

As BleepingComputer previously reported, the RemoveMicrosoftCopilotApp policy to Windows Insiders in the Dev and Beta Insider channels who installed Windows 11 Insider Preview Build 26220.7535 (KB5072046).

Last month, Microsoft also on Windows devices with the Microsoft 365 desktop client apps, but has yet to explain why it paused the rollout.

The company is also reportedly introduced almost two years ago, which would have embedded the Copilot assistant into Windows 11 system notifications, the Settings app, and the File Explorer.

In February, Microsoft also revealed that a Microsoft 365 Copilot bug had been , bypassing data loss prevention (DLP) policies designed to protect sensitive information.

AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what's exploitable, proves controls hold, and closes the remediation loop.


More from this blog

F

FPT Metrodata Indonesia Cyber Security

651 posts

FPT Metrodata Indonesia (FMI) provides news, analysis & guides on cybersecurity and threat intelligence for Indonesia & Vietnam. Visit https://news.fmisec.com. FMI: https://fmisec.com