Welcome to part one of our guide on getting your content ready for Copilot. As Copilot becomes a powerful tool in the modern workplace, it’s more important than ever to ensure your data is well-managed, protected, and optimized for AI-driven workflows.
While many discussions focus solely on securing data with Microsoft Purview, we go further. We’ll explore how to understand, protect, and manage sensitive information, old data, and the risks of oversharing—all crucial aspects to maintaining security and efficiency in an AI-powered environment.
Big update: SharePoint Advanced Management (SAM) licenses are now included in Copilot for Microsoft 365, making them just as relevant today as when I first wrote about them. Check out this SAM overview.
Let’s dive into the first step: reviewing your tenant settings and understanding your data.
Content oversharing: Without clear access controls and protection policies, oversharing happens easily—especially since Microsoft 365 prioritizes open collaboration. Striking the right balance between accessibility and security is key.
Content sprawl: The ease of creating sites, files, and workspaces leads to an explosion of digital content, making governance a major headache for IT teams.
Content lifecycle management: Tracking inactive sites and aging content is crucial. Without proper lifecycle management, low-value, outdated files can clutter storage and expose sensitive information.
Copilot brings powerful discovery capabilities, meaning that unrestricted, unclassified sensitive files—including forgotten documents buried deep in SharePoint folders—could surface. The good news? Copilot only accesses content users already have permission to see.
Here’s a simple yet effective approach to prepping your content for Copilot:
Tenant-level configurations set the foundation for security and collaboration across Microsoft services. Here’s where to start:
Starting with the most permissive settings at the tenant level ensures flexibility, while granular restrictions can be applied at the site level when needed.
By default, SharePoint allows anonymous sharing with the “Anyone with the link” option. I highly recommend lowering this setting to “New and Existing Guests” or something that aligns with your organization’s security policies.
When restricting “Anyone with the link”, you’ll have the option to choose “People in Your Organization” or “Specific People”—both are solid choices, but the most common default is People in Your Organization.
A lesser-known fact: Each shared link generates a new access token, similar to creating a new password for every access attempt.
Once tenant-wide sharing policies are set, you can use Sensitivity Labels to enforce site-level protections, default link settings, and external collaboration rules for added security.
Before securing content, organizations need to identify their high-value data, their crown jewels, and define what “sensitive” means in their business context. Migrating content to Microsoft 365 and Azure simplifies protection under a unified security model.
Microsoft Purview provides powerful tools for discovering and classifying sensitive data, but success requires collaboration between IT and business teams.
Microsoft Purview offers two primary ways to classify content: manual labeling and automatic labeling.
Organizations can leverage Microsoft’s built-in classifiers or create custom detection models. Once classification is reliable, automatic labeling ensures protection without user intervention.
Additionally, Data Loss Prevention (DLP) in audit mode provides insights into how sensitive data moves across environments.
Content explorer visualizes sensitive data locations based on classifier detections.
Activity explorer tracks interactions with labeled content and Sensitive Information Types (SITs).
For deep searches into sensitive information, organizations can use eDiscovery Content Search in Microsoft Purview.
Insider risk management helps detect risky behavior by analyzing user activity patterns.
Oversharing of data can pose security risks, but with the right tools, organizations can monitor and control access effectively. Below are key solutions for identifying and managing overshared content in Microsoft 365 and SharePoint.
Microsoft 365 Usage Reports provide valuable insights into how services are used across an organization.
DAG reports help organizations govern access to SharePoint data by identifying sites with potential oversharing or sensitive content.
Site Access Reviews allow IT administrators to delegate data access governance reviews to site owners of overshared sites.
RAC policies provide granular access control by restricting access to SharePoint sites based on group membership.
Public Teams in Microsoft Teams allow open collaboration, but they also introduce potential security risks.
MGDC, combined with Azure Synapse and Power BI, provides big data tools for analyzing permissions and other SharePoint information.
In the next part of this guide, we’ll focus on protecting data, educating users, and maintaining a structured, secure environment.
Thanks for reading!
/Simon