An integrated threat protection solution designed to detect, investigate, and respond to cyber threats across Microsoft 365 services.
Hello Pascal,
Thanks for your post in Microsoft Q&A.
Deploying Copilot in a complex environment like yours requires a clear understanding of its security and compliance framework.
Microsoft 365 Copilot operates entirely within the security and compliance boundary of your Microsoft 365 tenant, and it always respects the permissions of the individual user who is making the request.
- Data Residency
Microsoft processes all Copilot interactions—from the prompt to the returned data—within your specified geographic data residency boundary.
- For example, if your tenant's data is required to reside in the EU, the LLM processing and data grounding will also occur within the EU data center network. The data does not leave your compliance boundary for processing.
- For your hybrid environment, any on-premises data must be indexed by Microsoft Search (via a hybrid connector) for Copilot to be aware of it. The residency of that cloud-based search index will then adhere to your tenant's data location policies.
- Context-Aware Responses:
In a multi-tenant setup like a holding company with separate business units in different tenants, Copilot is strictly scoped to one tenant at a time.
- It cannot simultaneously query data from Tenant A and Tenant B for a single response. A user's prompt and the subsequent data grounding happen entirely within the context of the tenant they are currently signed into.
- In a guest scenario, if a user from Tenant A is a guest in Tenant B, they must actively switch their context (e.g., using the tenant switcher in Teams) to operate in Tenant B. Only then could Copilot access data in Tenant B, and it would still be limited to only the information they have been granted guest permissions to see.
This design effectively prevents data from one business unit's tenant from being included in a response generated for a user working within another tenant, maintaining your compliance boundaries.
- Security and Compliance (Your Core Control)
Copilot does not have its own special permissions. It uses the Microsoft Graph API to find and retrieve user data (emails, files, chats) to "ground" its responses. The Graph API will only return data that the logged-in user already has permission to access.
- The Analogy: If a user cannot find a specific file using SharePoint search because they don't have access, Copilot cannot find or use that file either.
- Your Controls: The controls you have are the robust security tools you already use in Microsoft 365. Copilot inherits and honors all of them, including:
- SharePoint site and library permissions.
- User access rights and group memberships.
- Microsoft Purview Information Protection sensitivity labels. A file labeled "Confidential - Internal Only" will not be surfaced for a user who is external or not part of the intended group.
In summary, the security model for Copilot is not about learning a new set of tools but about ensuring your existing Microsoft 365 permissions and compliance policies are well-configured. If your data is secured correctly, Copilot will follow those rules implicitly.
You can read this article for more reference: Copilot for Microsoft 365: Architecture and Key Concepts
Please let me know if it helps.
Best regards,
Alex | Microsoft Q&A Specialist
------------------------------------------------------------------------------------------------------------
If the answer is helpful, please click "Accept Answer" and kindly upvote it. If you have extra questions about this answer, please click "Comment".
Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.