
The #1 Copilot security risk is not the AI — it is your SharePoint permissions. Here is how to find oversharing, fix it, and prevent it from recurring.
Quick Answer: How does Copilot expose overshared SharePoint data? Microsoft Copilot accesses SharePoint content through Microsoft Graph using each user's permissions. If SharePoint sites are shared with "Everyone except external users," have broken permission inheritance, or contain active anonymous sharing links, Copilot will surface that content to any user who prompts it — including sensitive data like executive compensation, M&A documents, and HR records. EPC Group finds an average of 150-300 overshared SharePoint sites per enterprise tenant. The fix requires a 6-step remediation process before Copilot deployment.
SharePoint is the backbone of Microsoft 365 document management. It stores your organization's most sensitive data — financial reports, HR records, executive communications, client contracts, legal holds, M&A documentation. It also has the most complex permission model in the Microsoft ecosystem, with permissions that can be set at the tenant, site collection, site, library, folder, and individual file levels.
For years, SharePoint oversharing was a known but tolerable risk. If someone accidentally shared a site with "Everyone except external users," the practical impact was limited — users would only find that content if they navigated to the site directly or searched for specific terms. The friction of discovery provided a de facto security buffer.
Copilot eliminates that friction entirely. When a user asks Copilot a question, it queries Microsoft Graph across every piece of content the user can access — including content in overshared sites they have never visited, broken-inheritance folders they did not know existed, and documents accessible through forgotten sharing links. Copilot does not just find the needle in the haystack — it finds every needle in every haystack across your entire tenant.
By the Numbers: Across 700+ tenant security reviews, EPC Group finds: an average of 150-300 overshared SharePoint sites per enterprise tenant, 40-60% of sites with at least one oversharing pattern, and 15-25% of document libraries with broken permission inheritance. These are not edge cases — oversharing is the norm in enterprise SharePoint environments.
Understanding Copilot's SharePoint indexing mechanism explains why permission problems become immediately exploitable.
Microsoft Search crawls SharePoint
Microsoft Search indexes all SharePoint content — sites, libraries, folders, files, list items, and metadata. This index is the foundation for Copilot's SharePoint access.
Security trimming applies at query time
When Copilot queries the index, security trimming filters results based on the user's current permissions. Only content the user can access is returned — but ALL content the user can access is eligible.
Copilot retrieves relevant content
Copilot uses semantic search to identify the most relevant content for the user's prompt. This is more effective than keyword search — Copilot understands intent, synonyms, and context.
AI generates a response from retrieved content
The large language model processes retrieved SharePoint content and generates a natural-language response. The response may combine information from multiple SharePoint sites, libraries, and documents.
Key Difference: Traditional SharePoint search requires users to type specific keywords and sift through results. Copilot understands natural language intent — "What are the salary ranges for senior engineers?" will find compensation data even if the documents do not contain the exact phrase "salary ranges." This semantic understanding makes overshared content dramatically easier to discover.
The most common oversharing pattern. When a SharePoint site is shared with "Everyone except external users," every employee in the organization — regardless of department, role, or need-to-know — gains access. This group is the default suggested option in many SharePoint sharing dialogs, making it extremely easy to over-provision.
Copilot Impact: Every employee can ask Copilot questions about content on these sites. A junior analyst can ask "What did the Board discuss last quarter?" and get answers from Board meeting minutes on an overshared executive site.
How to Find It: SharePoint admin center > Active sites > Check members/visitors groups for each site. Look for "Everyone except external users" in any permission level.
When a folder or file has its permission inheritance broken from the parent site, it can have completely different access than the site itself. This happens during content migrations, manual permission overrides, one-off sharing requests, and Power Automate workflows that modify permissions. The result: a properly secured HR site can contain a folder accessible to the entire organization.
Copilot Impact: Site-level permission reports show the HR site as properly secured. But Copilot indexes at the file level and discovers the overshared folder. When an employee asks about salary data, Copilot surfaces documents from the broken-inheritance folder that appears secure at the site level.
How to Find It: Standard SharePoint admin tools do not surface broken inheritance. You need PowerShell scripts (Get-PnPFolderItem with -Includes HasUniqueRoleAssignments) or specialized tooling like EPC Group SharePoint Permission Scanner.
SharePoint allows three types of sharing links: "Anyone" (anonymous — no sign-in required), "People in your organization" (all employees), and "Specific people." Organization-wide links and anonymous links provide broad access to individual files, often created for convenience during a project and never revoked. These links accumulate over time — a single site can have thousands of active sharing links.
Copilot Impact: Copilot can access any content that the user has permission to reach — including content accessible through organization-wide sharing links. Even if the parent site is properly secured, individual files with organization-wide links are accessible to everyone and surfaceable by Copilot.
How to Find It: SharePoint admin center > Sites > Sharing tab. Also: Microsoft Purview > Data Loss Prevention > Content explorer can identify files with sharing links. For comprehensive analysis, use PnP PowerShell to enumerate sharing links across all sites.
Many organizations have custom security groups named "All Employees," "All Staff," "Company Wide," or similar that contain every user. These groups were created for legitimate purposes (company-wide announcements, intranet access) but are frequently added to SharePoint sites that should have restricted access. Unlike "Everyone except external users," these groups survive Azure AD/Entra ID cleanup because they are custom objects.
Copilot Impact: These groups function identically to "Everyone except external users" from a Copilot perspective — any user in the group can have content from those sites surfaced by Copilot. The difference is that custom groups do not appear in standard "Everyone" permission reports, making them harder to detect.
How to Find It: Entra ID > Groups > Search for groups with member count matching total employee count. Cross-reference with SharePoint site permissions. EPC Group automated tooling flags any group with membership exceeding 90% of the tenant user count.
These scenarios are based on actual incidents documented during EPC Group Copilot security reviews. Details have been anonymized.
Scenario:
A financial services firm deployed Copilot to 500 users without a permissions audit. Within two weeks, a mid-level analyst asked Copilot "What is the bonus structure for managing directors?" Copilot returned a summary of the executive compensation framework from an HR SharePoint site that had been shared with "Everyone except external users" since 2021.
Impact:
The analyst shared the Copilot response with colleagues. Within 48 hours, executive compensation details were widely known. HR received formal complaints about pay equity. The CHRO escalated to the Board.
Root Cause:
The HR site was created during a restructuring in 2021 with "Everyone except external users" access for temporary collaboration. The broad access was never revoked.
Scenario:
A healthcare organization was evaluating an acquisition target. The M&A project team stored due diligence documents in a SharePoint site. During the site creation, a team member accidentally selected "People in your organization" as the default sharing scope instead of "Specific people."
Impact:
After Copilot deployment, an employee in a different department asked "What companies are we looking at acquiring?" Copilot surfaced the acquisition target name, valuation estimates, and timeline from the due diligence documents. The information reached the target company within a week, compromising the negotiation.
Root Cause:
The SharePoint sharing configuration allowed "People in your organization" as a sharing option. No sensitivity labels were applied to M&A documents.
Scenario:
An HR investigation folder within a properly secured HR site had its permission inheritance broken two years earlier when an external attorney needed temporary access. The inheritance was broken, broad permissions were added, and they were never restored after the engagement ended.
Impact:
Copilot surfaced details of an ongoing workplace investigation when a user asked about a specific employee. The subject of the investigation learned they were being investigated through a colleague who received Copilot-generated content.
Root Cause:
Broken permission inheritance at the folder level. The site-level permission report showed correct HR-only access. The folder-level override was invisible in standard admin tools.
EPC Group's proven remediation methodology. Used in 700+ tenant security engagements across healthcare, finance, and government.
Run a comprehensive permissions scan across all SharePoint sites, libraries, folders, and files. Identify every instance of "Everyone," "Everyone except external users," custom all-employee groups, broken inheritance, and sharing links.
Deliverable: Complete permissions inventory with risk classification for every overshared resource.
Categorize overshared content by business risk level. Not all oversharing is equal — executive compensation data exposed to the entire organization is critical; an internal newsletter shared broadly is low risk.
Deliverable: Prioritized remediation queue with business impact scoring for each finding.
Execute permission fixes in priority order, starting with critical findings. Replace broad access groups with named security groups. Restore broken inheritance. Revoke unnecessary sharing links.
Deliverable: All critical and high-risk oversharing remediated. Medium-risk remediation in progress.
Deploy sensitivity labels on high-risk content to provide a second layer of protection. Even if permissions are misconfigured in the future, sensitivity labels restrict Copilot from processing protected content.
Deliverable: Sensitivity labels deployed on 90%+ of critical and high-risk content.
Deploy Copilot to a small pilot group (5-10 security team members) and systematically test whether remediation was effective. Intentionally probe for previously overshared content.
Deliverable: Validated Copilot deployment with documented security testing results.
Implement governance controls that prevent future oversharing. The permissions you fix today will degrade without ongoing governance — new sites will be created, permissions will be modified, and sharing links will accumulate.
Deliverable: Sustainable governance framework that prevents permission drift and maintains Copilot security.
Remediation fixes today's problems. Prevention stops them from recurring. These governance controls ensure your SharePoint environment stays Copilot-safe after the initial remediation.
Configure SharePoint sharing settings at the tenant level to disable "Everyone" and "Everyone except external users" as sharing options. Force users to select named security groups or specific people.
Implement automated access reviews for all SharePoint sites containing sensitive data. Site owners must revalidate permissions quarterly or access is automatically revoked.
Set automatic expiration on all sharing links — 90 days for organization-wide links, 30 days for anonymous links. Links expire automatically, preventing accumulation of stale access.
Require approval for new SharePoint site creation. Apply default permission templates based on site classification (Public, Internal, Confidential, Highly Confidential). Prevent site owners from adding "Everyone" groups.
Require sensitivity labels on all documents in high-risk sites. Auto-labeling policies catch unlabeled content and apply appropriate classification based on content patterns.
Deploy continuous monitoring of Copilot queries and responses. Alert on anomalous patterns — users querying content outside their department, repeated queries for sensitive data types, or Copilot surfacing labeled content.
Microsoft Copilot accesses SharePoint content through Microsoft Graph using the individual user's permissions. If a SharePoint site, library, or folder has been shared with "Everyone," "Everyone except external users," or "All Employees," every user in the organization can access that content — and Copilot will surface it in AI-generated responses. Before Copilot, overshared content was a latent risk because users had to navigate to the site to find it. With Copilot, a simple natural language prompt like "show me salary data" or "what are the Q3 financial results" will surface content from any overshared location. EPC Group finds an average of 150-300 overshared sites per enterprise tenant.
SharePoint uses a hierarchical permission model where child objects (subsites, libraries, folders, files) inherit permissions from their parent. When inheritance is "broken" — either intentionally or during migrations — a child object can have different permissions than its parent. This means a folder inside a properly secured HR site could have "Everyone except external users" access if someone broke inheritance and added broad access at the folder level. Broken inheritance is invisible in site-level permission reports, which is why standard SharePoint admin tools miss it. Copilot indexes content at the file level, so it discovers these permission anomalies. EPC Group's deep-scan tooling identifies broken inheritance across all levels of the SharePoint hierarchy.
A comprehensive SharePoint permissions audit for Copilot readiness requires: 1) Site-level permissions export — identify all sites with "Everyone" or "Everyone except external users" in the site members or visitors groups. 2) Broken inheritance scan — identify document libraries, folders, and files with permissions different from their parent site. 3) Sharing link audit — inventory all anonymous links, organization-wide links, and specific people links. 4) External sharing review — identify content shared with guest users. 5) Site collection admin audit — identify who has full control across all sites. 6) Stale content inventory — identify content that has not been accessed in 12+ months that Copilot should not surface. EPC Group provides automated tooling that completes this audit across 10,000+ sites in hours, not weeks.
EPC Group 6-step SharePoint remediation process: Step 1 — Discovery: Run a complete permissions audit to identify overshared sites, broken inheritance, and sharing links. Step 2 — Classification: Categorize overshared content by risk level (Critical: exec comp, M&A, HR data; High: financial data, client data; Medium: internal operations; Low: general content). Step 3 — Remediation: Replace broad access groups with named security groups, restore broken inheritance, revoke unnecessary sharing links. Step 4 — Sensitivity Labels: Deploy auto-labeling on high-risk content types. Step 5 — Validation: Test with Copilot pilot users to verify remediation effectiveness. Step 6 — Prevention: Implement access reviews, sharing policies, and governance rules that prevent future oversharing.
Based on EPC Group analysis of Copilot deployments, the most commonly surfaced overshared content types are: 1) Executive compensation and salary data from HR sites with broken inheritance or broad access. 2) M&A and deal documentation from project sites that were never properly secured. 3) Board meeting minutes and strategic planning documents from executive sites shared with "All Employees." 4) Client contracts and pricing from sales sites with legacy "Everyone" permissions. 5) Performance reviews and disciplinary records from HR folders with broken inheritance. 6) Financial forecasts and budget data from finance sites with overshared access. 7) Legal hold and litigation documents from legal sites with inherited broad permissions. The pattern is consistent: sensitive content in sites created 2-5 years ago with permissions that were never audited.
You can restrict Copilot from accessing specific SharePoint content through several mechanisms: 1) Sensitivity labels — apply a label with "Do not include in Copilot" classification using Microsoft Purview. 2) Restricted SharePoint Search (RSS) — configure sites to be excluded from Microsoft Search and Copilot indexing at the tenant level. 3) Permission remediation — the most effective approach: remove overshared permissions so Copilot can only access content through properly scoped security groups. 4) Information barriers — isolate entire departments from cross-organization Copilot queries. Note: you cannot selectively allow a user to access a site through the browser while blocking Copilot from accessing it for that same user. If they have permission, Copilot has permission.
Timeline depends on environment size and severity: Small environments (50-200 SharePoint sites): 2-4 weeks for audit and remediation. Medium environments (200-1,000 sites): 4-6 weeks including automated scanning, prioritized remediation, and validation testing. Large environments (1,000-10,000+ sites): 6-10 weeks with phased approach — remediate critical sites first (HR, Legal, Finance, Executive), then high-risk, then remaining. EPC Group uses automated tooling to accelerate the process — our SharePoint Permission Scanner can audit 10,000+ sites in 4-6 hours, and our Remediation Accelerator can fix common oversharing patterns (revoke "Everyone" groups, restore inheritance) in bulk. The key: do not wait until all sites are remediated to deploy Copilot. Fix the critical and high-risk sites, then deploy Copilot to a pilot group while continuing remediation.
EPC Group performs Copilot & M365 Tenant Security Reviews for enterprises across all industries. With 700+ tenants secured and 29 years of Microsoft expertise, we identify exactly what Copilot can access that it shouldn't.
EPC Group's SharePoint Permission Scanner audits 10,000+ sites in hours — not weeks. We find the oversharing, fix the permissions, and deploy Copilot safely. Start with a Copilot & M365 Tenant Security Review.