The Governance Problem Nobody Tells You About Before You Sign
Microsoft's Copilot sales process emphasises what Copilot can do. What it rarely surfaces with equal clarity is what Copilot exposes — specifically, the data that users already have access to but have never been able to surface at scale, until now. Copilot does not create new permissions. It amplifies existing ones. If your Microsoft 365 estate has oversharing at rest — broadly-permissioned SharePoint sites, loosely-scoped Teams channels, documents shared with "Everyone" — Copilot will find that data and present it in response to user queries.
Our assessment across 500+ enterprise engagements shows that approximately 68% of organisations deploying Copilot discover material oversharing exposures during pre-deployment audit. Roughly a third of those organisations had active Copilot contracts before they discovered the problem. Understanding Copilot governance is not a compliance checkbox — it is a commercial prerequisite, and increasingly a negotiation variable.
This article covers the full governance architecture for enterprise Copilot deployments: oversharing mechanics, sensitivity label requirements, DLP gaps, tenant configuration controls, the Purview integration model, data residency considerations, and how to sequence your governance build alongside (not after) commercial negotiations.
The Oversharing Problem: Mechanics and Scale
Oversharing in Microsoft 365 is endemic. It accumulates over years of organic file sharing, project site creation, Teams deployments, and SharePoint permission drift. Most organisations have never had a tool that makes the problem visible at scale — until Copilot. The critical issue is that Copilot respects Microsoft 365 permissions, not organisational intent. If a user has been granted access to a document — even by accident, even via a deeply nested SharePoint group permission inherited from an old project — Copilot will include that document in scope when answering that user's queries.
Common oversharing patterns we identify in pre-deployment audits include "Everyone" and "Everyone except external users" group permissions on SharePoint sites containing HR, finance, legal, or executive content; broadly-shared Teams channels that accumulated sensitive documents over time; SharePoint sites with "open" access not tied to security groups; file-level "Anyone with the link" shares that were never revoked; and M&A data rooms or project sites that were not decommissioned or access-revoked at project close.
A payroll administrator querying Copilot for "Q3 headcount figures" will receive results drawn from every document they can access — including strategic planning documents shared with Finance broadly, organisational charts in HR SharePoint sites, and any executive presentations where their account is listed as a viewer. Copilot does not distinguish between "data you should use" and "data you technically can see."
Quantifying Your Oversharing Exposure
Microsoft provides the SharePoint Advanced Management (SAM) module — included in M365 E5 or purchasable as a £3/user/month add-on — which gives data access governance tooling specifically designed to address oversharing before Copilot deployment. Key capabilities include site access reviews (automated identification of broadly-permissioned sites), oversharing scope reports, and restricted SharePoint Search (which can limit Copilot to designated sites only during the remediation period).
Before deploying Copilot broadly, run a data access governance (DAG) report from the SharePoint Admin Centre. Filter for sites with "Everyone" or "Everyone except external users" permissions. Cross-reference against the content classification of those sites — any site containing HR, finance, legal, executive, or regulated content with broad permissions is a priority remediation target. The industry benchmark for completing a thorough oversharing remediation in a 5,000–10,000 seat organisation is 8–14 weeks. Plan for it.
Sensitivity Labels: Your First Control Layer
Microsoft Purview Information Protection sensitivity labels are the foundational control mechanism for Copilot governance. Labels define what Copilot can and cannot include in responses, how data is handled in transit, and what protections persist when AI-generated outputs are saved or shared. Without a deployed labelling taxonomy, you are operating Copilot without your most powerful governance control.
The core requirement is a deployed and enforced labelling taxonomy — not just a policy that exists in the Admin Centre, but labels that are actively applied to content across your SharePoint, OneDrive, Exchange, and Teams estate. Label coverage rates in pre-Copilot organisations are typically low: our baseline assessments find that 60–75% of documents in typical M365 estates are unlabelled or carry default "General" labels that confer no meaningful access restriction.
| Label Tier | Copilot Behaviour | Licensing Requirement | Remediation Priority |
|---|---|---|---|
| Public / General | Included freely in responses; no output restrictions | E3 (basic labelling) | Low — ensure accurate classification |
| Internal | Included in responses for authenticated tenant users | E3 (basic labelling) | Medium — verify scope is correct |
| Confidential | Included only if user has explicit access; output may carry label | E5 / Purview P2 for encryption enforcement | High — encryption should be enabled |
| Highly Confidential | Excluded from Copilot scope if encryption blocks access; label propagates to AI output | E5 / Purview P2 required | Critical — must be correctly deployed before Copilot goes live |
The important nuance is that sensitivity labels only govern Copilot access to content when encryption is enforced. A label applied without Rights Management Service (RMS) encryption is a classification marker, not an access barrier. Copilot will still surface content labelled "Confidential" if the user has SharePoint permissions to the underlying document and no encryption is protecting it. This is the gap most organisations discover too late: they have labels deployed but have not enabled encryption, and assume their labelling deployment confers protection it does not.
DLP Policy Gaps in a Copilot Context
Data Loss Prevention (DLP) policies in Microsoft Purview were originally designed to prevent sensitive information from leaving your organisation via email, Teams messages, and file shares. In the Copilot context, DLP operates differently — and most organisations discover their existing DLP policies have significant gaps when AI-generated outputs are in scope.
DLP policies in M365 Copilot apply at the output level: they can detect sensitive information types in Copilot responses within Teams, Word, Excel, and other Copilot surfaces, and prevent that content from being copied, forwarded, or saved to unsecured locations. However, there are important limitations. DLP cannot prevent Copilot from processing sensitive data in the first place — it can only intercept outputs. The processing restriction mechanism is sensitivity label encryption, not DLP. Many organisations conflate the two and incorrectly believe DLP policies provide upstream protection.
DLP Policy Updates Required for Copilot
Your existing DLP policies were likely written for human actors performing deliberate sharing actions. Copilot changes the threat model: a user can inadvertently prompt Copilot to surface and summarise sensitive content that was not originally discoverable through manual browsing. Policies need to be extended to cover AI-generated output scenarios, including Copilot responses in Teams Chat (a common gap since Teams DLP scopes are often narrower than SharePoint/Exchange DLP), Copilot in Loop components and Whiteboard (often excluded from legacy DLP policy scopes), and Copilot-generated meeting summaries in Teams Premium (a separate policy scope).
Run a DLP policy coverage audit specifically against Copilot workloads before deployment. Map each Copilot surface (Teams Chat, Word, Excel, PowerPoint, OneNote, Outlook, Loop, Whiteboard, Microsoft 365 Chat) against your existing DLP policy scopes. Any gap is a residual risk exposure that should be documented, risk-rated, and remediated or accepted formally before you sign a broad Copilot deployment commitment.
Tenant Configuration Controls
Beyond sensitivity labels and DLP, Microsoft provides a set of tenant-level controls that govern which users can access Copilot, what data sources it can reference, and what outputs it can produce. Understanding these controls — and configuring them before deployment — is the difference between a governed rollout and an uncontrolled one.
Copilot Pages and Web Search
By default, Microsoft 365 Copilot includes web search capability — Copilot can draw on Bing search results when answering user queries. For most enterprises, this requires explicit governance consideration. Web search results in Copilot responses may include commercially sensitive competitive intelligence queries being answered with public-web data that gets included in internal documents, regulatory concerns about data leaving the tenant boundary for web search processing, and data sovereignty questions in regulated industries. The web search capability can be disabled at the tenant level via the Microsoft 365 Admin Centre (Settings → Search & intelligence → Configurations) and at the group policy level for specific user populations. For most financial services, healthcare, government, and legal sector deployments, disabling tenant-wide web search and enabling it selectively is the appropriate default posture.
Restricted SharePoint Search
Restricted SharePoint Search (RSS) is a transitional governance tool that limits Copilot's SharePoint data scope to a defined set of approved sites during the oversharing remediation period. It acts as a containment mechanism — Copilot can only reference designated sites until your broader data remediation is complete. RSS is configured via the SharePoint Admin Centre and should be part of every phased Copilot deployment. The limitation: RSS is a temporary measure, not a permanent governance architecture. It reduces functionality during the transition period and should be progressively relaxed as site-by-site access governance reviews are completed.
Microsoft 365 Groups and Teams Governance
Copilot in Teams references meeting recordings, transcripts, chat histories, and shared files across all Teams channels a user has access to. If your Teams governance is loose — channels created without ownership governance, teams that were never archived at project end, guests with lingering access — Copilot will surface that data. Pre-deployment, run a Teams governance audit: identify inactive teams (no activity in 90+ days), verify guest access is intentional and scoped, and ensure team owners are active and accountable. Microsoft Teams Admin Centre provides activity reports, and the Teams governance toolkit in SharePoint Advanced Management provides additional controls.
Purview Integration: The Complete Governance Stack
Microsoft Purview is the governance, compliance, and data security platform that underpins enterprise Copilot deployment. For organisations with E5 or Purview P2 licensing, the full integration capability includes sensitivity labels with RMS encryption, DLP policy across all Copilot surfaces, communication compliance for Copilot interactions (for regulated industries), audit logs for Copilot prompts and responses (crucial for compliance and incident response), eDiscovery extension to Copilot interaction history, and Insider Risk Management integration for AI-related data exfiltration signals.
The Copilot audit trail deserves particular attention. When Purview audit logging is enabled for Copilot, every Copilot prompt and response is logged in the Unified Audit Log — searchable, exportable, and preserved per your audit log retention policies. This is a legal and compliance capability that most organisations deploying Copilot for the first time do not configure before go-live. It should be a Day 0 configuration item, not a retrospective addition.
| Purview Capability | Copilot Governance Function | Licensing | Priority |
|---|---|---|---|
| Information Protection (MIP) | Sensitivity label enforcement on Copilot outputs; label inheritance | E5 / Purview P2 | Pre-deployment — critical |
| Data Loss Prevention | Sensitive information type detection in AI outputs; policy enforcement | E5 / Purview P1+ | Pre-deployment — critical |
| Audit (Premium) | Full prompt and response audit logging; retention up to 10 years | E5 / Purview P2 | Day 0 — configure before go-live |
| Communication Compliance | Regulatory monitoring of Copilot interactions (FSI, healthcare, legal) | E5 / Purview P2 | Pre-deployment for regulated industries |
| eDiscovery (Premium) | Copilot interaction history in legal hold and discovery scope | E5 / Purview P2 | Configure with legal team input |
| Insider Risk Management | AI-related data exfiltration signal detection | E5 / Purview P2 | Post-deployment — 30-60 day lag for baseline |
Data Residency and EU Data Boundary
For European enterprises, data residency is frequently the single largest governance concern blocking Copilot deployment. Microsoft processes Copilot prompts and responses through its AI infrastructure — and the question of where that processing occurs, and where data is transiently held, is a GDPR and regulatory compliance question that requires explicit answers before sign-off.
Microsoft's EU Data Boundary (EUDB) commitment covers M365 Copilot for customers in the EU and EFTA regions: prompts, responses, and any associated data processing are committed to remain within the EU Data Boundary. This is a meaningful commitment but has specific conditions. The tenant must be provisioned in an EU geography, the EU Data Boundary must be explicitly enabled, and certain supplementary services (including some Teams AI features and optional Bing search integration) may process data outside the boundary unless separately configured. A pre-deployment data residency review — validating that your tenant geography, EU Data Boundary enablement, and optional service configurations are correctly set — is a compliance requirement, not an optional governance exercise, for any EU-based enterprise.
Data residency concerns are also a commercial negotiation lever. If Microsoft's EU Data Boundary commitments are insufficient for your regulatory requirements — and for some financial services and government customers, they genuinely may be — this is a reason to defer deployment, reduce initial seat commitment, or negotiate contractual data processing commitments (DPAs, SCCs) before signing. Use regulatory requirements as a delay mechanism when pricing conditions are unfavourable.
Building Your Governance Framework: A Sequenced Approach
The mistake most organisations make is treating governance as a post-contract deployment task. By the time contracts are signed, there is commercial and executive pressure to deploy quickly. Governance remediations that would have taken 8–12 weeks before commercial pressure are compressed into 3–4 weeks of rushed, incomplete remediation. The correct sequence places governance work before broad commercial commitment.
Run DAG reports from SharePoint Admin Centre. Identify all sites with "Everyone" permissions. Export Teams activity and guest access reports. Run sensitivity label coverage report from Purview Compliance Centre. Document unlabelled or incorrectly labelled content volumes by workload. Quantify oversharing exposure by content category.
Remediate highest-risk sites first: HR, payroll, executive, legal, and finance content with broad permissions. Enable RMS encryption on Confidential and Highly Confidential labels. Enable Restricted SharePoint Search as a transitional containment measure. Decommission or archive inactive Teams. Revoke stale guest access. Update DLP policies to cover Copilot surfaces.
Configure tenant-level controls: Web search policy (off by default, selectively enabled). EU Data Boundary verification. Copilot audit logging in Purview (Day 0 requirement). Communication Compliance policies for regulated workloads. Copilot usage policies and acceptable use documentation for users.
Deploy to Tier 1 users (300–500, high governance maturity) with RSS in place. Monitor Purview audit logs for anomalous prompting patterns. Run DLP incident reports weekly. Progressively expand Copilot scope as site access reviews complete and RSS is relaxed. Move to broader deployment at week 16+ with ongoing governance cadence.
How Governance Status Affects Your Commercial Position
There is a direct and often underexploited relationship between governance readiness and commercial leverage in Copilot negotiations. Microsoft's sales cycle for Copilot assumes enterprise customers want to deploy broadly and quickly. A well-informed buyer who can demonstrate genuine governance constraints — and quantify the timeline to remediate them — has a defensible reason to request phased commitments, reduced initial seat counts, and pilot-to-production structures rather than enterprise-wide big-bang contracts.
Specific governance-based commercial positions that work in negotiation include: requesting an adoption gate clause tied to governance milestone completion (e.g., "initial 500-seat commitment converts to 5,000 seats upon completion of SAM-validated oversharing remediation"); negotiating a price cap on expansion seats at the pilot rate for 12 months post-governance sign-off; using EU Data Boundary configuration requirements as grounds for a 90-day deployment delay — and therefore a 90-day delay in when the full commercial commitment is activated; and requesting a contractual data processing addendum with specific EU Data Boundary commitments as a condition of signing.
None of these positions are adversarial. They are reasonable risk management positions that a well-advised enterprise should adopt. The question is whether you have the governance knowledge to articulate them credibly. Our Copilot readiness assessment guide covers the full 5-gate readiness framework, including the data governance gate where most deployments stall. The enterprise Copilot pilot framework shows how to structure the 90-day programme that generates the adoption data you need for production decisions.
Pre-Deployment Governance Checklist
Use this checklist before committing to broad Copilot deployment. Any item that cannot be confirmed as complete represents a residual risk or a commercial negotiation lever.
- DAG report run and oversharing sites identified and documented
- HR, Finance, Legal, and Executive content sites audited for broad permissions
- Sensitivity label taxonomy deployed with RMS encryption on Confidential and above
- Label coverage baseline established (target: 80%+ of content classified)
- DLP policies extended to cover Teams Chat, Loop, and Copilot output surfaces
- Restricted SharePoint Search enabled as transitional containment measure
- Copilot audit logging enabled in Purview Compliance Centre (Unified Audit Log)
- EU Data Boundary configuration verified (EU organisations)
- Web search policy decision documented and configured
- Teams guest access audit completed; stale access revoked
- Inactive Teams archived or decommissioned
- Communication Compliance policies configured (regulated industry requirement)
- Acceptable use policy for Copilot drafted and distributed to pilot cohort
- Incident response procedure for Copilot-related data governance incidents documented
Governance maturity is a spectrum — you will not complete every item before a pilot begins, and you should not delay indefinitely waiting for perfection. The objective is to have completed the highest-risk remediations, have monitoring in place to detect issues, and have a documented governance roadmap that demonstrates organisational seriousness. That combination — risk reduced, monitoring active, roadmap documented — is also the posture that supports the strongest commercial negotiating position.
For related topics, see our analysis of whether to wait before deploying Copilot, the M365 Copilot licensing guide covering commercial structure and pricing, and the five Copilot licensing traps enterprises fall into. For a full assessment of your EA and Copilot position, see our Copilot licensing advisory service.