
Based on 700+ tenant audits, EPC Group has identified the 5 reasons most organizations fail Copilot readiness — and the 10-question self-assessment to evaluate your own.
Quick Answer: Most Microsoft 365 tenants are not ready for Copilot because they were designed for human access patterns, not AI-assisted search. Over 5-15 years of operation, tenants accumulate overshared permissions, unlabeled documents, stale guest accounts, and insufficient DLP policies. These issues were manageable when data discovery required manual browsing. Copilot eliminates that friction, making every permission gap and governance failure instantly exploitable. Based on EPC Group's 700+ tenant audits, 80% of organizations have at least 3 of the 5 critical readiness gaps that create data exposure risk when Copilot is enabled.
EPC Group has audited Microsoft 365 tenants for 29 years — first for SharePoint governance, then for cloud migration readiness, and now for Copilot security. The patterns we see are remarkably consistent across industries, tenant sizes, and geographic regions. The 80% figure is not an estimate — it is derived from actual assessment data across 700+ engagements.
The good news: every readiness gap has a known fix. The bad news: most organizations do not know they have the gaps until after Copilot surfaces sensitive data to the wrong people. This guide presents the 5 most common reasons tenants fail readiness, a 10-question self-assessment checklist, and the path from “not ready” to “Copilot-secure” in 10-12 weeks.
If you want the definitive answer for your specific tenant, start with EPC Group's 47-Point Copilot & M365 Security Review — a 2-week assessment that evaluates 47 specific security checkpoints and delivers a prioritized remediation roadmap.
SharePoint sites and OneDrive folders with overly broad access — "Everyone except external users" permissions, broken inheritance creating permission mazes, and Teams channels with membership far exceeding the audience for the content they contain.
Average enterprise tenant: 2,400 SharePoint sites. Average with overshared permissions: 340 sites (14%). Average containing sensitive data with overshared access: 67 sites. That is 67 sites where Copilot can surface sensitive financial, HR, legal, or strategic content to any employee who asks.
SharePoint permission audit using PowerShell or ShareGate. Remove "Everyone" and "Everyone except external users" from all sites with sensitive content. Review and repair broken inheritance. Right-size Teams channel membership.
Sensitivity labels are configured in the Purview portal but not applied to actual content. Auto-labeling is either not deployed or limited in scope. Mandatory labeling is not enabled. Legacy content is completely unlabeled.
Average label enforcement rate across EPC Group audits: 12%. That means 88% of documents in the typical tenant have no sensitivity label. These documents have no label-based encryption, no label-based DLP protection, and no label-based access restrictions. Copilot treats them all as general-access content.
Deploy service-side auto-labeling for SharePoint and OneDrive. Enable mandatory labeling to prevent new unlabeled content. Run retroactive labeling campaigns for high-value legacy content. Target: 80%+ label coverage before Copilot deployment.
Existing DLP policies cover traditional scenarios (email attachments, SharePoint downloads) but do not address Copilot-specific risks: content aggregation from multiple sensitivity levels, Copilot-generated documents inheriting no label, and meeting summaries containing sensitive discussion points.
An executive asks Copilot to draft a quarterly review. Copilot pulls financial data (Confidential), HR data (Confidential-HR), and strategy notes (Highly Confidential) into a single Word document. The document has no sensitivity label. The executive shares it in a Teams chat with 15 people, 5 of whom do not have Highly Confidential clearance. Existing DLP policies catch none of this.
Extend DLP policies to cover Copilot-generated content in all M365 applications. Configure DLP rules that detect cross-classification aggregation. Enable mandatory sensitivity labeling for all new documents to catch Copilot-generated content. Monitor Copilot usage logs for queries spanning multiple sensitivity levels.
No Conditional Access policies governing Copilot access from unmanaged devices or untrusted locations. No MFA requirement for M365 apps. Stale guest accounts with residual permissions. No device compliance requirements for Copilot-enabled applications.
An employee's password is compromised in a phishing attack. Without MFA, the attacker logs into M365 from a personal device in another country. Using Copilot, they query "show me financial forecasts," "summarize executive compensation," and "what are the acquisition targets." In 10 minutes, they extract more sensitive data than a traditional attack would yield in days.
Deploy the 5 essential Conditional Access policies: compliant device, block unmanaged, MFA, location-based restrictions, and session controls. Clean up stale guest accounts. Implement quarterly access reviews for all external and privileged accounts.
No Teams meeting recording policies differentiating sensitive from standard meetings. No Copilot usage monitoring or audit logging. No data classification program for legacy content. No Copilot-specific incident response procedures.
A healthcare organization records clinical case conferences in a Teams channel accessible to 200 staff. Board meetings use the same default recording policy as daily standups. When Copilot is enabled, any employee can ask about patient discussions, executive decisions, or legal strategy from meeting transcripts — all discoverable via Copilot with zero additional security controls.
Create tiered meeting policies (Standard, Sensitive, Highly Sensitive). Deploy Copilot usage monitoring and alerting. Establish a data classification program for legacy content. Develop Copilot-specific incident response procedures including data exposure notification protocols.
Answer these 10 questions honestly. If you answer “No” or “Don't know” to 3 or more, your tenant is not ready for Copilot. If you answer “No” to 5 or more, deploying Copilot creates significant data exposure risk.
Can you report the exact number of SharePoint sites with "Everyone" or "Everyone except external users" access?
Red flag answer: No / Don't know
What percentage of your documents have sensitivity labels applied?
Red flag answer: Below 50% or unknown
Do you have Conditional Access policies requiring compliant devices for all M365 apps?
Red flag answer: No
Do you require MFA for all M365 application access (not just admin accounts)?
Red flag answer: No
Have you audited guest accounts in the last 90 days?
Red flag answer: No
Do you have separate Teams meeting policies for board, legal, and HR meetings?
Red flag answer: No
Are DLP policies configured to cover Copilot-generated content?
Red flag answer: No / Don't know
Can you identify all SharePoint sites with broken permission inheritance?
Red flag answer: No / Don't know
Is auto-labeling deployed for SharePoint and OneDrive (not just Exchange)?
Red flag answer: No
Do you have Copilot usage monitoring and alerting configured?
Red flag answer: No
$50K-$250K per incident
Incident response, legal review, notification, and remediation. HIPAA fines: up to $50K per violation. SOC 2 audit failures can cost $100K+ in re-certification.
$30K-$100K waste
Disabling Copilot tenant-wide wastes license investment ($30/user/month), disrupts productive users, and requires re-deployment after remediation. Average rollback duration: 8-12 weeks.
Incalculable
Internal data exposure erodes employee trust in IT. "Copilot showed me my manager's salary" becomes organizational folklore. Future technology deployments face resistance and skepticism.
The ROI of Readiness: EPC Group's 47-Point Assessment costs $15,000. The average data exposure incident costs $50,000-$250,000. The assessment pays for itself if it prevents a single incident — and it typically identifies 15-25 issues across the 47 checkpoints. The question is not whether your tenant has gaps. The question is whether you discover them before or after Copilot does.
The 47-Point Assessment is a structured 2-week engagement that evaluates your tenant's Copilot readiness across 6 security domains. Every checkpoint receives a Pass/Fail/Partial rating with specific remediation steps and effort estimates.
8 checkpoints
MFA, Conditional Access, PIM, risk policies, break-glass, guest access, stale accounts, admin roles
7 checkpoints
SPF, DKIM, DMARC, anti-phishing, safe attachments, safe links, mail flow rules
9 checkpoints
Sensitivity labels, auto-labeling, DLP, information barriers, retention, eDiscovery, encryption
7 checkpoints
Device compliance, app protection, updates, BitLocker, Defender, attack surface reduction
8 checkpoints
Audit logging, compliance score, insider risk, communication compliance, records, lifecycle
8 checkpoints
Permission analysis, data exposure modeling, meeting policies, Copilot DLP, usage monitoring
Most Microsoft 365 tenants are not ready for Copilot because they were built for human access patterns, not AI-assisted search. Over 5-15 years of operation, tenants accumulate overshared SharePoint sites, broken permission inheritance, unlabeled documents, inactive guest accounts, and insufficient DLP policies. These issues were manageable when data exposure required a user to know where to look and manually browse to the content. Copilot eliminates this friction — it can search, summarize, and aggregate content across the entire tenant in seconds. The security model that was "good enough" for manual access is fundamentally insufficient for AI-assisted access. Based on EPC Group's 700+ tenant audits, 80% of organizations have at least 3 of the 5 critical readiness gaps.
The 5 most common reasons are: 1) Overshared permissions — SharePoint sites, OneDrive folders, and Teams channels with broad access that gives Copilot reach into sensitive content. 2) Sensitivity labels not enforced — labels are configured but fewer than 15% of documents have labels applied, leaving 85% of content unprotected. 3) DLP gaps for Copilot — existing DLP policies do not cover Copilot-generated content or cross-source data aggregation. 4) Identity and access issues — no Conditional Access policies governing Copilot access, stale guest accounts, no device compliance requirements. 5) Governance gaps — no meeting recording policies, no Copilot usage monitoring, no data classification for legacy content. Each gap independently creates data exposure risk. Combined, they make Copilot deployment a security incident waiting to happen.
Use this quick self-assessment: 1) Can you report the exact number of SharePoint sites with "Everyone" or "Everyone except external users" access? 2) What percentage of your documents have sensitivity labels applied (not just configured)? 3) Do you have Conditional Access policies requiring compliant devices and MFA for all M365 apps? 4) Have you audited guest accounts in the last 90 days? 5) Do you have separate Teams meeting policies for sensitive meetings? If you answered "no" or "I don't know" to 3 or more questions, your tenant is not ready for Copilot. EPC Group's 47-Point Assessment provides a comprehensive readiness evaluation with specific remediation steps.
The cost of premature Copilot deployment manifests in three areas: 1) Data exposure incidents — when Copilot surfaces sensitive content to unauthorized users, the organization faces incident response costs ($50,000-$250,000 per incident), legal review, and potential regulatory fines. For HIPAA violations, fines range from $100 to $50,000 per violation with an annual maximum of $1.5 million per violation category. 2) Rollback costs — organizations that deploy Copilot and discover data exposure issues often have to disable Copilot tenant-wide while they remediate, wasting the license investment and disrupting users who were productively using the tool. 3) Reputation and trust — internal data exposure incidents erode employee trust in IT and create resistance to future technology deployments. The $15,000 investment in a pre-deployment assessment is trivial compared to any of these costs.
Timeline depends on the starting state of the tenant. EPC Group's typical engagement: Week 1-2: Assessment (47-Point Security Review to identify all gaps). Week 3-4: Quick wins (fix overshared permissions, enable mandatory labeling, deploy Conditional Access policies). Week 5-8: Remediation (auto-labeling deployment, DLP policy updates, meeting policy configuration, guest access cleanup). Week 9-10: Validation (test Copilot in controlled environment with test data, verify label enforcement, validate Conditional Access policies). Week 11-12: Controlled deployment (enable Copilot for pilot group, monitor for data exposure, adjust policies). Total: 10-12 weeks for a typical enterprise tenant. Organizations with severe permission sprawl or minimal existing governance may need 16-20 weeks.
EPC Group's 2-Week Copilot & M365 Security Assessment evaluates 47 specific security checkpoints across 6 domains: Identity & Access (8 points — MFA, Conditional Access, PIM, risk policies, break-glass accounts, guest access, stale accounts, admin role review). Email Security (7 points — SPF, DKIM, DMARC, anti-phishing, safe attachments, safe links, mail flow rules). Data Protection (9 points — sensitivity labels, auto-labeling, DLP policies, information barriers, retention policies, eDiscovery readiness, encryption). Endpoint Management (7 points — device compliance, app protection, update management, BitLocker, Defender for Endpoint, attack surface reduction). Compliance & Governance (8 points — audit logging, compliance score, insider risk, communication compliance, records management, data lifecycle). Copilot & AI Readiness (8 points — permission analysis, Copilot data exposure modeling, meeting policy review, Copilot-specific DLP, usage monitoring). Deliverable: 40+ page report with Pass/Fail per checkpoint and prioritized 30/60/90 day remediation roadmap. Cost: $15,000.
Yes, but with important caveats. Copilot licenses can be assigned to specific users, and only licensed users can use Copilot features. However, Copilot still accesses content based on the licensed user's permissions — not the content creator's license status. If a Copilot-licensed user has access to broadly shared SharePoint sites, they can query all content in those sites regardless of whether the content owners have Copilot licenses. A phased deployment should: 1) Start with users who have well-governed data access (not executives with broad permissions). 2) Deploy Conditional Access policies before enabling any Copilot licenses. 3) Fix the most critical permission issues first (overshared sites with sensitive content). 4) Monitor Copilot usage logs during the pilot to identify unexpected data access patterns. 5) Expand only after the 47-point assessment identifies and remediates all critical gaps.
EPC Group performs Copilot & M365 Tenant Security Reviews for enterprises across all industries. With 700+ tenants secured and 29 years of Microsoft expertise, we identify exactly what Copilot can access that it shouldn't.
Our 47-Point Assessment takes 2 weeks. Remediation takes 10-12 weeks. The alternative — deploying Copilot unprepared — takes one incident to regret. Start with the assessment and get the full picture.