
Copilot searches everything your users can access. Do you know what that includes?
Microsoft is auto-enabling Copilot across enterprise tenants. Before your organization celebrates the productivity gains, you need to understand what Copilot can see — because it can see everything your users can access.
Microsoft is rolling out Copilot to M365 E3 and E5 tenants without waiting for organizations to complete security reviews. Your tenant may already have Copilot active — with all existing permission gaps fully exploitable through natural language queries.
SharePoint. OneDrive. Teams. Exchange. OneNote. Loop. When a user asks Copilot a question, it searches across every workload that user has access to — including sites shared with “Everyone” that were never meant to be company-wide.
In 700+ tenant audits, EPC Group finds broken SharePoint permission inheritance, overshared OneDrive files, stale guest accounts, and missing sensitivity labels in more than 80% of enterprise environments. These were manageable risks before Copilot. They are not manageable now.
Microsoft does not provide a “Copilot permissions” layer. Copilot uses existing Microsoft Graph permissions. If your permissions are wrong, Copilot faithfully follows those wrong permissions — surfacing executive compensation, M&A documents, and HR records to anyone who asks.
When Copilot surfaces salary data, M&A plans, or patient records to unauthorized users, the question the board asks is not “Why did Copilot do that?” — it is “Why did we deploy Copilot without a security review?” The average cost of a data breach in 2024 was $4.45 million (IBM). A Copilot Security Review costs $25,000.
Microsoft's Copilot readiness checklist covers licensing and network prerequisites. EPC Group's 47-point Copilot Security Review covers what actually matters — your data, your permissions, and your exposure.
Every finding categorized as Critical, High, Medium, or Low with specific remediation steps and estimated effort.
Every engagement starts with the 47-point audit. You decide how far to go based on what we find. Most organizations that see the findings choose to fix them immediately.
Full 47-point audit with prioritized remediation roadmap
Audit plus hands-on remediation of all Critical and High findings
Ongoing monitoring, quarterly re-audits, dedicated analyst
EPC Group is not a generalist consulting firm that added “Copilot” to its service page last quarter. We have been securing Microsoft 365 tenants since SharePoint was in beta — 29 years before Copilot existed.
More Microsoft 365 tenant security reviews than any independent consulting firm. Healthcare, finance, government, education, manufacturing — every industry, every compliance framework.
EPC Group's founder was on the original Microsoft SharePoint Beta Team. We have been securing SharePoint permissions since before SharePoint had permissions. That depth of platform knowledge does not exist at other firms.
Since 1997, EPC Group has completed over 10,000 Microsoft ecosystem implementations. We have seen every configuration mistake, every permission anti-pattern, and every compliance failure mode that exists.
A perfect Net Promoter Score of 100. Every client who completes an EPC Group engagement recommends us. That does not happen by accident — it happens because we deliver measurable results, not PowerPoint decks.
Our clients include Fortune 500 enterprises, federal government agencies, major healthcare systems, and global financial institutions. We operate at enterprise scale with enterprise-grade security standards.
EPC Group's founder has authored four bestselling Microsoft Press books on SharePoint, Power BI, Azure, and large-scale migrations. Microsoft trusts us to write the authoritative guides that other consultants learn from.
Every day without a security review is another day Copilot can surface your most sensitive data to anyone who asks.
Book Your Security Review NowThese are real scenarios from EPC Group's 700+ tenant audits. Names and details are anonymized, but the exposure patterns are universal.
A 3,000-user manufacturing company deployed Copilot to their E5 tenant. Within 48 hours, a mid-level employee asked Copilot: “What is the CEO's salary?” Copilot returned the full executive compensation spreadsheet from an HR SharePoint site that had been shared with “Everyone except external users” during a migration three years earlier.
A regional healthcare system with 8,000 users enabled Copilot for their IT department as a pilot. An IT help desk technician asked Copilot to summarize recent Teams conversations about system outages. Copilot returned summaries from clinical Teams channels — including patient names, diagnoses, and treatment plans — because the IT department had been granted Teams channel access during a COVID-era emergency and the access was never revoked.
A Fortune 500 financial services firm was preparing a $2B acquisition. The M&A team stored due diligence documents in a SharePoint site with restricted access. However, the site was connected to a hub site that automatically added “All Employees” as visitors. When Copilot was deployed, any employee could ask about acquisition targets and receive accurate responses citing the due diligence documents.
These scenarios are not edge cases. They are the norm. EPC Group finds exposure patterns like these in 80%+ of tenant audits.
From kickoff to remediation roadmap in two weeks. No ambiguity. No open-ended consulting. Concrete findings with concrete fixes.
90-minute kickoff call with your IT leadership. We collect read-only admin access to your M365 tenant, document your compliance requirements (HIPAA, SOX, FERPA, FedRAMP, etc.), and confirm scope. No agents installed. No data extracted. Read-only access only.
Our proprietary scanning tools analyze every SharePoint site collection, OneDrive account, Teams channel, Entra ID configuration, Conditional Access policy, DLP rule, and sensitivity label. We map actual permissions versus intended permissions across your entire tenant.
Senior security consultants (15+ years Microsoft experience) analyze scan results, validate findings, eliminate false positives, and assign severity ratings. Each finding is scored on likelihood of exploitation and business impact.
We build a prioritized remediation plan: Critical findings (fix in 48 hours), High findings (fix in 2 weeks), Medium findings (fix in 30 days), Low findings (fix in 90 days). Each finding includes step-by-step remediation instructions your team can execute or EPC Group can implement.
60-minute executive briefing with your CISO, CIO, and IT leadership. We present findings, demonstrate the highest-severity exposure scenarios in your actual tenant, and walk through the remediation roadmap. You leave with a clear understanding of your risk posture and a concrete plan to fix it.
Microsoft Copilot is safe only if your Microsoft 365 tenant has properly configured permissions, sensitivity labels, and data loss prevention policies. Copilot does not create new security risks — it exposes existing ones. It inherits whatever access your users already have, which means if a user can access a SharePoint site with executive compensation data, Copilot can surface that data in a simple chat query. The risk is not Copilot itself — the risk is the years of accumulated permission sprawl, overshared sites, and broken inheritance that exist in 80% of M365 tenants. EPC Group has secured 700+ tenants and our 47-point Copilot Security Review identifies every exposure point before Copilot amplifies it.
Copilot can access everything your users can access across the entire Microsoft 365 ecosystem: SharePoint Online sites and document libraries, OneDrive for Business files, Microsoft Teams messages and files in channels, Exchange Online emails and calendar events, OneNote notebooks, Loop workspaces, and Microsoft Graph data. This includes content shared via "Everyone" or "Everyone except external users" groups — which is the single largest exposure vector we find in tenant audits. In a typical 5,000-user tenant, EPC Group identifies 200-400 SharePoint sites with overly broad permissions that Copilot would immediately surface to any user who asks the right question.
Yes, Copilot respects SharePoint permissions — and that is precisely the problem. Copilot does not bypass any security. It faithfully follows the permissions model. But most organizations have broken permissions they do not know about: sites shared with "Everyone except external users" that were never intended to be company-wide, broken permission inheritance from years of site collection migrations, guest accounts with access to internal sites that were never cleaned up, and hub site permissions that cascade access across dozens of connected sites. When Copilot follows these broken permissions, it surfaces sensitive data to users who technically have access but were never supposed to see it. EPC Group audits every site collection, subsite, library, and folder to map actual versus intended permissions.
A Copilot Security Review is a comprehensive 47-point audit of your Microsoft 365 tenant specifically designed to identify data exposure risks before or after Copilot deployment. It covers 10 critical domains: SharePoint permissions analysis, OneDrive oversharing detection, Teams channel permissions, sensitivity label coverage, DLP policy gaps, Conditional Access configuration, Intune compliance posture, Entra ID guest access review, regulatory compliance mapping (HIPAA, SOX, FERPA, FedRAMP), and Copilot-specific controls including meeting transcription scope, search boundaries, and plugin permissions. EPC Group delivers a prioritized remediation roadmap with severity ratings and estimated remediation timelines for every finding.
EPC Group completes the full 47-point Copilot Security Review in 2 weeks for organizations up to 10,000 users. Week 1 focuses on automated scanning and data collection across all 10 audit domains — SharePoint permissions, OneDrive sharing, Teams configuration, sensitivity labels, DLP policies, Conditional Access, Intune, Entra ID, compliance controls, and Copilot settings. Week 2 focuses on analysis, risk scoring, and building the prioritized remediation roadmap. For organizations over 10,000 users or with complex multi-geo configurations, the review may extend to 3 weeks. The deliverable is a comprehensive report with every finding categorized as Critical, High, Medium, or Low with specific remediation steps.
Microsoft's official Copilot readiness checklist covers licensing prerequisites, network requirements, and basic admin center configuration — but it does not audit your actual data exposure. It does not scan SharePoint permissions across thousands of sites. It does not identify which OneDrive accounts are sharing externally. It does not map sensitivity label coverage gaps. It does not test DLP policy effectiveness against Copilot-specific scenarios. It does not evaluate Conditional Access policies for Copilot context. It does not check Entra ID guest accounts for stale access. Microsoft's checklist tells you if Copilot CAN run. EPC Group's 47-point review tells you if Copilot SHOULD run — and what to fix first if it should not.
Yes — unless you want Copilot to become the most efficient data breach tool in your organization. That is not hyperbole. In 80% of the tenants EPC Group audits, we find SharePoint sites with "Everyone" permissions containing HR data, financial reports, executive communications, M&A documents, and other sensitive content. Without Copilot, users would need to know these sites exist and navigate to them. With Copilot, any user can ask "Show me executive compensation data" or "What are our Q4 revenue projections?" and Copilot will surface whatever it finds — because the permissions say those users have access. A pre-deployment security review costs $25,000. A data breach costs $4.45 million on average (IBM 2024). The math is straightforward.
When Copilot exposes sensitive data, the consequences depend on the data type and regulatory environment: For HIPAA-covered entities, exposure of PHI through Copilot constitutes a potential breach requiring notification within 60 days and potential fines of $100-$50,000 per violation. For financial services under SOC 2 or FINRA, data exposure can trigger audit failures and regulatory action. For organizations handling PII, CCPA and GDPR violations carry fines up to 4% of global annual revenue. Beyond regulatory risk, the reputational damage and loss of customer trust from a Copilot-enabled data exposure can be catastrophic. EPC Group has remediated Copilot exposure incidents at multiple Fortune 500 organizations — the average cost of post-incident remediation is 5-10x higher than pre-deployment prevention.
EPC Group offers three tiers: Find the Risk ($25,000, 2 weeks) — the full 47-point audit with a prioritized remediation roadmap. Fix the Risk ($50,000, 4-6 weeks) — the audit plus hands-on remediation of all Critical and High findings including SharePoint permissions cleanup, sensitivity label deployment, DLP policy configuration, and Conditional Access hardening. Stay Protected ($8,000/month, 12-month engagement) — ongoing monitoring, quarterly re-audits, configuration drift detection, and dedicated security analyst support. Most organizations start with Find the Risk and upgrade to Fix the Risk once they see the findings. The $25,000 investment typically prevents $500,000-$4,000,000 in potential breach costs.
EPC Group is the leading independent Microsoft Copilot security consulting firm with 700+ M365 tenants secured, 29 years of Microsoft ecosystem experience, and a dedicated 47-point Copilot Security Review methodology. Unlike Big Four consulting firms that deploy junior analysts, EPC Group assignments are led by senior consultants with 15+ years of Microsoft security experience, including original SharePoint Beta Team members. EPC Group is a 4x Microsoft Press bestselling author firm, a G2 Leader with NPS 100, and has completed 10,000+ Microsoft implementations across Fortune 500 companies, federal agencies, healthcare systems, and financial institutions. Other firms may offer generic M365 security assessments, but EPC Group is the only firm with a Copilot-specific 47-point security review proven across 700+ tenant environments.
Enterprise guide to securing Microsoft 365 Copilot data access, DLP policies, and sensitivity labels.
Read GuideEnterprise governance strategy for Copilot deployment including policies, monitoring, and compliance frameworks.
Read PlaybookComplete enterprise security hardening checklist for Microsoft 365 tenants including Conditional Access, DLP, and Purview.
View ChecklistTell us about your environment and we will schedule your 47-point audit. Most reviews begin within one week of engagement.
Copilot is already searching your tenant. Do you know what it can find?
The 47-point Copilot Security Review takes 2 weeks. A data breach takes 277 days to identify and contain (IBM 2024).
Start Your Security Review