Skip to main content

Lab 4 — Microsoft Copilot Readiness

Lab 4⏱ 10 min🏢 Enterprise Tenant · Read-Only👤 Alex
Microsoft Copilot Readiness
Before Dataparity enables Microsoft Copilot for its workforce, Alex needs to answer one critical question: how much sensitive content is already broadly shared across Microsoft 365? Copilot doesn't create new permissions — it inherits existing access. This lab surfaces the exposure before it becomes a problem.
🔍
Alex — Security Analyst
Enterprise Tenant (Read-Only) — Observation Mode
You are Alex. Dataparity is planning to roll out Microsoft Copilot company-wide. Your job is to assess the data access posture in Microsoft 365 before that deployment happens — and flag anything that needs remediation first.

🎯Understand where sensitive content exists across Microsoft 365 and how existing sharing permissions could increase risk before enabling Microsoft Copilot.

1. Review the Microsoft Copilot Readiness Dashboard

Analytics → SaaS Workflows → Microsoft Copilot Readiness Assessment

Navigating to the Microsoft Copilot Readiness Assessment
Analytics → SaaS Workflows → Microsoft Copilot Readiness Assessment navigation path.

This is a read-only exercise. Review the data exposure posture only — do not modify any settings.

Review the summary tiles at the top of the page. Focus on:

  • Total No. of Sensitive Assets
  • Sensitive Assets Exposed Org-Wide
  • Sensitive Assets Exposed with Specific Users
Copilot Readiness summary tiles showing sensitive asset counts
Summary tiles — total sensitive assets, org-wide exposure count, and exposure to specific users.
💡 Facilitator Notes

Reinforce that Copilot does not create new permissions — it inherits existing access. If sensitive content is already broadly shared, Copilot can surface it immediately.

Review the Assets Exposure section. Observe the exposure categories:

  • Assets Exposed Org-Wide
  • Assets Exposed Using External Link
  • Sensitive Assets Exposed with > 1000 Users
Assets Exposure section showing exposure categories
Assets Exposure section — breakdown by org-wide, external link, and broad user exposure.
💡 Key Insight

This is the key readiness signal. The broader the sharing, the greater the chance Copilot can retrieve and summarize sensitive content for unintended users.

2. Review All Exposed Sensitive Assets

🎯Identify which specific files are exposed and understand what remediation actions may be needed before enabling Copilot.

In the Assets Exposure section, click View All.

View All button in the Assets Exposure section
Assets Exposure section — click View All to see the full list of exposed sensitive assets.

Review the list of exposed sensitive assets. Focus on:

FieldWhat to look for
Asset NameRecognizable sensitive filenames (payroll, financial, HR)
OwnerWho is responsible for this file
TenantOneDrive vs. SharePoint
Internal CollaboratorsHow many internal users have access
External CollaboratorsAny external sharing
ExposureOrg-Wide / External Link / Limited
DLP ClassificationWhat sensitive data type was detected
💡 Facilitator Notes

Ask attendees which file they would investigate first based on filename, exposure level, and data classification. This mirrors a real analyst triage decision.

Select one or more assets and review the available remediation options. Example action: Apply MPIP label.

💡 Key Insight

Readiness is not just about visibility. It is about reducing exposure before Copilot is deployed.

Navigate back to the dashboard by clicking Microsoft Copilot Readiness Assessment in the breadcrumb.

Breadcrumb navigation back to the Copilot Readiness dashboard
Breadcrumb — click Microsoft Copilot Readiness Assessment to return to the main dashboard.

3. Investigate Top Risk Assets

🎯Determine which sensitive data types represent the highest potential risk if Copilot is enabled.

In the Top Risk Assets widget, click the data type with the highest count (for example, Credit Card).

Top Risk Assets widget showing sensitive data types by count
Top Risk Assets widget — click the highest-count data type to drill into the associated files.

Review the assets associated with that sensitive data category. Identify:

  • Where the files are stored (OneDrive or SharePoint)
  • Who owns the files
  • How the files are shared
  • Whether they are exposed Org-Wide, via External Link, or to a limited set of users
Risk asset detail view showing file ownership and sharing posture
Risk asset detail — file location, owner, sharing posture, and exposure classification.
💡 Key Insight

This moves security teams from high-level visibility into actionable investigation — not just "how many sensitive files exist" but "which specific files, owned by whom, shared how."

4. Review Top Owners of Exposed Sensitive Data

🎯Identify which users own the largest amount of broadly exposed sensitive content.

Review the Top Owners widget. Focus on the Org-Wide tab first. Observe which users are associated with the most exposed sensitive assets and consider whether the sharing pattern looks intentional, excessive, or risky.

💡 Facilitator Notes

Emphasize that owner-based visibility helps security teams drive remediation conversations with the right users — not a broad "everyone needs to fix their sharing" message, but a targeted "these five owners account for 80% of the exposure."

5. Validate Copilot Readiness Risk

🎯Connect sensitive data exposure to Copilot deployment risk.

Return to the dashboard and summarize the findings:

QuestionYour finding
How many sensitive assets were discovered?
How many are exposed org-wide?
Are any exposed through external links?
Which data types appear most often?
Which owners are associated with the highest risk?

Discuss why this matters before enabling Microsoft Copilot:

  • Copilot can index and retrieve content based on the user's existing access
  • Broad sharing increases the chance of unintended data exposure
  • Sensitive content should be reviewed and remediated before AI rollout
💬 Discussion
  • If Copilot inherits existing permissions, what happens when sensitive files are shared org-wide?
  • Which is the bigger risk in your environment: org-wide sharing or external links?
  • Should every sensitive asset be relabeled, or should the first focus be on reducing broad access?
  • What remediation steps should be completed before enabling Copilot for end users?
💡 Key Insight

Copilot readiness starts with data access hygiene.

Microsoft Copilot will only be as secure as the permissions and sharing posture that already exist in Microsoft 365. Before deploying Copilot, security teams should identify sensitive content, understand how it is shared, and reduce unnecessary exposure.

💡 Facilitator Notes

This lab closes Module 1 — Visibility. The payoff line: "We can now see every app (Lab 1), every SaaS posture gap (Lab 2), every sensitive file at rest (Lab 3), and every AI readiness risk (Lab 4). Module 2 is about what we do about it."

If the Dataparity payroll file (Dataparity_Q2_2025_Payroll_Report.docx) appeared in the exposed assets list during Lab 3 or this lab, use it as the thread that connects to Labs 6 and 9.

🎓
Lab Assistant
Zenith Live 2026 · Dataparity
Lab 4 — Copilot Readiness
Browse all topics