Microsoft 365 Copilot Oversharing: The Pre-Deployment SharePoint Audit Every Canadian SMB Must Run in 2026
Download PDF (13 KB) PDF version. Print or share with your team.
Written by Mike Pearlstein, CISSP, CEO of Fusion Computing Limited. Helping Canadian businesses build and manage secure IT infrastructure since 2012 across the GTA plus the Hamilton region plus Metro Vancouver. AI-assisted research and drafting; all claims verified and edited by a human practitioner before publication.

When a Canadian SMB licenses Microsoft 365 Copilot, the riskiest beat is not the launch announcement to staff. It is the first time an employee asks Copilot for last quarter’s salary review, the upcoming acquisition deck, or the HR investigation file.
Copilot does not break permissions. It does what the underlying API already permits, which means every one of those documents surfaces if a SharePoint location was ever shared too widely.
Fusion Computing has run Copilot pre-flight audits as a Microsoft Solutions Partner for Modern Work, and the same handful of SharePoint mistakes show up in roughly every Canadian tenant we touch. This guide names them, sets the compliance stakes under PIPEDA, Quebec Law 25, and Bill C-8, and gives a 5-phase audit framework you can run in 30 days.
Key Takeaways
- Copilot inherits each person’s SharePoint privileges; nothing else acts as a gate.
- “Everyone except external users” legacy group-shares are the most common Copilot oversharing trigger Fusion Computing observes in Canadian SMBs.
- Quebec Law 25 requires a fresh privacy impact assessment when Copilot is added as a new AI use case, even on an already-cleared Microsoft 365 environment.
- SharePoint Advanced Management is bundled with any paid Copilot license at no extra cost as of Microsoft Ignite 2025.
- A realistic pre-Copilot remediation timeline for a 50-seat Canadian tenant is 40 to 60 IT-hours over 30 calendar days.
What is Microsoft 365 Copilot oversharing?
Microsoft 365 Copilot oversharing is the situation where a generative AI prompt surfaces a document the requester technically had access to but should never have been able to find. The mechanism is direct.
Copilot uses the Microsoft Graph API to query content the prompting user can already access, and the API honours each individual’s SharePoint plus OneDrive plus Teams entitlements. Nothing in that chain audits whether the original sharing was intentional. If a folder was once shared with “Everyone except external users” for a now-forgotten project, Copilot treats that location as fair game.
The shift Copilot creates is not new risk. The data exposure was already in the environment. What changes is discovery friction. Before Copilot, a person would have needed to know exactly which site, which folder, and which filename to look for. After Copilot, that same employee types “summarise the latest executive comp review” and the model returns whatever exists, wherever it sits.
The platform documents this directly in its Copilot data protection architecture: Copilot respects existing identity claims and granted privileges and retrieves files via Microsoft Graph using the requesting account’s identity. Permission inheritance is the rails. Oversharing is what happens when those rails were laid down five years ago by someone who has long since left.
Why this is a Canadian SMB problem, not just a US enterprise one
Three Canadian regulatory frameworks make this a board-level concern for any organisation handling personal information. According to IBM’s 2024 Cost of a Data Breach report, the average Canadian incident now costs CA$6.98 million. PIPEDA places ultimate responsibility on the data collector, Law 25 in Québec demands a fresh PIA when Copilot is added, and Bill C-8 layers in incident-reporting timelines for designated operators.
The Office of the Privacy Commissioner of Canada has been clear that the technology is not the accountable party; the business deploying it is. If Copilot surfaces an HR investigation file to the wrong manager, the disclosure analysis falls on the SMB, not on the vendor.
Quebec Law 25 raises the bar further. Any communication of personal information outside the province requires a privacy impact assessment, and a global PIA covering Microsoft 365 does not extend to a new integrated AI use case bolted onto the tenant later. Adding Copilot counts as a new AI deployment.
Canadian SMBs with even one Québec-resident customer or employee have to redo the PIA with Copilot specifically scoped, and document the cross-border transfer review. Most do not realise this until a vendor questionnaire or a customer audit forces the question.
the Critical Cyber Systems Protection Act (which replaced its predecessor) layers in incident-reporting timelines for designated operators. Even smaller shops outside the directly named sectors are seeing it referenced in cyber insurance applications and in vendor flow-down clauses from larger Canadian customers.
Fusion Computing has flagged the Law 25 PIA gap on three live Copilot engagements in the last 90 days. In every case the customer assumed the original Microsoft 365 PIA covered them. It did not.
Book a Copilot readiness review and find every overshared site before you deploy →
The 5-Phase Pre-Copilot SharePoint Audit Framework
Fusion Computing structures every pre-Copilot SharePoint audit around a five-phase sequence: Inventory, Classify, Triage, Remediate, Lock. The phases are deliberately ordered so no SMB spends remediation effort on data that did not warrant it.
Phase 1, Inventory. Run the SharePoint Advanced Management Data Access Governance reports against the tenant. SAM ships with any paid Copilot license at no additional cost as of Microsoft Ignite 2025, so most Canadian SMBs already own the tooling without realising it. The output is a baseline list of overshared sites plus anonymous links plus broken-inheritance folders.
Phase 2, Classify. Apply Microsoft Purview sensitivity labels to data the SMB cares about most: HR, finance, regulated client data, M&A documents, board materials. The labels are what later allow Purview to enforce data-loss prevention against Copilot prompts and outputs.
Phase 3, Triage. Score each overshared site against a two-axis matrix: data sensitivity (low to highly-controlled) crossed with audience reach (small team to entire tenant). The top-right quadrant, sensitive data shared tenant-wide, is where Fusion Computing tells customers to start. The bottom-left, low-sensitivity content shared with a small project team, can wait.
Phase 4, Remediate. Break inheritance on the high-priority sites, expire active anonymous sharing links, replace “Everyone except external users” group-shares with named security groups, and remove dormant guest accounts. SAM’s site access reviews and restricted SharePoint search both come into play here.
Phase 5, Lock. Set tenant-wide policies that prevent the patterns from recurring: default link type, anonymous link expiration, conditional access for SharePoint, and Restricted SharePoint Search for Copilot until the audit completes. Schedule the DAG report on a recurring cadence so drift is caught quickly.
Each phase has a measurable exit criterion, which keeps the audit from drifting into open-ended cleanup. Most 50-user Canadian tenants Fusion Computing has audited finish all five phases inside four working weeks.
The 7 oversharing patterns we see most often in Canadian SMBs
The same handful of misconfigurations appear in roughly every Canadian SMB tenant Fusion Computing audits. None of them are malicious. All of them turn into Copilot exposure. According to EPC Group’s 2026 oversharing research, roughly 16 percent of business-critical data sits in an overshared posture across an average tenant, with hundreds of overshared sites per environment. The patterns we see in Canadian SMBs match.
Pattern 1, the “Everyone except external users” legacy group-share. SharePoint default behaviour from older tenant builds. The most common standalone oversharing trigger Fusion Computing observes in Canadian SMBs.
Pattern 2, broken inheritance from one-off “share with my manager” clicks. A user shares a single document, SharePoint quietly breaks inheritance on the parent folder, and every subsequent file in that folder inherits the manual permission set instead of the original site policy.
Pattern 3, anonymous sharing links that never expired. Set in 2021 for a customer review, the link is still live in 2026, still indexed by Graph, and still surfaced to anyone who can reach the document.
Pattern 4, an executive’s OneDrive synced to a shared SharePoint library with everyone-read permissions. The library was built for cross-team transparency. Nobody noticed when the executive started saving 1:1 notes there.
Pattern 5, HR or payroll documents stored in a Teams channel that pre-dates a re-org. The channel still has former cross-functional members. Copilot has no way to know the membership is stale.
Pattern 6, M&A or strategic-planning files in a private channel with stale membership. One departed deal team member who retained access becomes a tenant-scope Copilot risk.
Pattern 7, acquired-company tenant migrations that imported permissions verbatim. The acquiring SMB inherits years of inherited misconfiguration in one merge weekend, and the cleanup is rarely scoped into the integration plan.
“We’d been talking about AI for months but couldn’t figure out where to start without creating a security problem. Fusion ran the assessment, gave us a clear plan, and had Copilot deployed in two weeks. Our month-end reporting went from two full days to four hours.”
SAM vs Purview vs Defender for Cloud Apps: the Copilot governance decision matrix
Three Microsoft tools cover Copilot governance, and Canadian SMBs routinely overpay or under-deploy because the tools’ jobs blur together. Fusion Computing applies a simple split: SAM controls site-level access and reporting, Purview controls data-level sensitivity and DLP, and Defender for Cloud Apps controls behavioural anomaly detection.
SharePoint Advanced Management. Bundled with any paid Copilot license per Microsoft Learn licensing guidance. Standalone cost is US$3 per user per month. The right starting tool for nearly every Canadian SMB. SAM gives DAG reports, restricted SharePoint search, sharing-link policies, and site lifecycle management.
“Fusion gave us a CISSP-led security review in three weeks flat. We’d been quoted twelve weeks by two larger MSPs. They found a domain-admin gap our previous provider missed for two years.”
Operations Director, 85-employee Toronto law firm (client name on file)
Microsoft Purview. Sensitivity labels, DLP for Copilot prompts and outputs alongside retention policies plus audit logs. Licensing usually comes through Microsoft 365 E5 or as Purview add-ons. Most 20- to 200-employee Canadian SMBs need Purview Foundation labels at minimum to make Copilot DLP work.
Microsoft Defender for Cloud Apps. Behavioural detection for shadow IT plus unusual download volumes plus impossible-travel session anomalies. Higher security maturity tool. Fusion Computing typically does not deploy MDCA on the first Copilot rollout. It enters the conversation when the SMB hits roughly 100 seats or operates in a regulated sector.
The decision a customer needs to make first is not which tool to buy. It is which control gap is highest priority: visibility (SAM), data classification (Purview), or behavioural alerting (MDCA). Most Canadian SMBs Fusion Computing onboards land on SAM plus Purview Foundation as the Copilot governance floor, with MDCA as a 12-month roadmap item.
| Capability | SAM | Microsoft Purview | Defender for Cloud Apps |
|---|---|---|---|
| Site-level access governance + DAG reports | Primary | No | No |
| Restricted SharePoint Search for Copilot | Primary | No | No |
| Sensitivity labels + DLP for Copilot prompts and outputs | No | Primary | No |
| Audit trail + retention policies | Limited | Primary | Partial |
| Behavioural anomaly + shadow-IT detection | No | No | Primary |
| Bundled with paid Copilot license | Yes (Ignite 2025) | Add-on | Add-on |
| Right starting tool for a 20-200 employee Canadian SMB | Yes | Yes (Foundation) | Later |
A 30-day pre-Copilot remediation timeline
Fusion Computing’s pre-Copilot remediation engagements typically span four working weeks for a 50-seat Canadian tenant. According to our engagement telemetry, total realistic effort lands at 40 to 60 IT-hours over 30 calendar days. The vendor-marketing “turn it on this weekend” framing does not survive contact with a real Canadian SMB tenant where a single overshared site can cascade into a 12-hour remediation block.
Week 1, Inventory. The IT lead or MSP runs the DAG reports, exports the overshared site inventory, and pulls anonymous link reports. Effort: 8 to 12 hours of IT time. Output: a baseline list of every site that needs review.
Week 2, Classify and Triage. Sensitivity labels get applied to the regulated data classes. The triage matrix sorts the inventory across four buckets: critical down to low. IT time: 12 to 16 hours, often split between IT and a business owner who can confirm what data sits where.
Week 3, Remediate. Inheritance breaks plus group-share replacements plus anonymous link expirations plus the policy work to prevent recurrence. IT time: 16 to 24 hours, depending on how many sites scored critical or high. This is the phase where Fusion Computing engages most intensively on managed engagements.
Week 4, Lock and pilot. Tenant-wide policies are turned on, Restricted SharePoint Search stays in place for the pilot user cohort, and Copilot is enabled for five named users with monitoring active.
Total realistic effort lands at 40 to 60 IT-hours over 30 calendar days. The vendor-marketing “turn it on this weekend” framing does not survive contact with a real Canadian SMB tenant.
When to bring in a Microsoft Solutions Partner
Fusion Computing recommends bringing in a Microsoft Solutions Partner for Modern Work in four specific scenarios. According to engagement patterns we’ve seen across 2026 Canadian deployments, the most common trigger is a Copilot license already provisioned but with adoption paused while the security committee asks for proof that no executive comp data sits in a tenant-shared SharePoint folder.
Trigger 1: the tenant has more than 25 SharePoint sites and no central admin who knows the history of each one. The institutional memory cost of running the audit alone exceeds the engagement cost.
Trigger 2: a merger or acquisition or organisational restructure happened in the past 24 months. Inherited permissions and stale memberships compound quickly.
Trigger 3: regulated data lives in SharePoint. PHIPA-covered patient files for clinics, OSFI-aligned records for finance, CRA-touched documents for accounting firms. Any one of those puts the audit on a tighter regulatory clock.
Trigger 4: a Copilot license is already provisioned but adoption is paused because the security or compliance team raised concerns. This is the most common engagement Fusion Computing runs in 2026, and it usually unblocks a deployment that has been stalled for two to four months.
Canadian SMBs that fit any of those triggers can book a Copilot readiness review with Fusion Computing in Toronto, Hamilton, or Vancouver.
The bottom line
Copilot rewards the SMBs that did the SharePoint work first. The 5-phase audit, applied early, turns a stalled deployment into a clean one and keeps PIPEDA, Quebec Law 25, and Bill C-8 exposure well inside the Microsoft Solutions Partner perimeter. Run the audit. Then turn Copilot on.
Fusion Computing helps Canadian businesses with managed IT, cybersecurity, and Microsoft 365.
Law firms running Copilot on top of a document management system face a different oversharing surface, covered in NetDocuments and iManage + Copilot integration for Canadian law firms, and the related Purview legal hold and eDiscovery cost for a 12-lawyer Ontario firm walkthrough.
Frequently Asked Questions
What is Copilot oversharing?
Copilot oversharing is when Copilot surfaces a document the prompting user technically had access to but should not have been able to find. Copilot uses Microsoft Graph and inherits each user’s SharePoint, OneDrive, and Teams permissions. Permission cascades that nobody noticed for years become discoverable the moment Copilot can search across them.
Will Copilot leak my HR or payroll documents?
Copilot will surface HR or payroll documents to anyone whose existing SharePoint or OneDrive permissions already let them open those files. Copilot does not bypass permissions. The risk shows up when HR data sits in a Teams channel with stale members, a OneDrive synced to a shared library, or a folder shared with “Everyone except external users.” Pre-Copilot audits exist to catch those before launch.
How long does pre-Copilot SharePoint cleanup take for a small business?
A realistic pre-Copilot SharePoint remediation for a 50-user Canadian SMB takes 40 to 60 IT-hours over four working weeks. Week 1 inventories the tenant, week 2 classifies and triages, week 3 remediates the high-priority sites, and week 4 locks in tenant-wide policies and pilots Copilot with a small user cohort.
Do I need SharePoint Advanced Management before deploying Copilot?
Yes, in nearly every case. SharePoint Advanced Management gives the Data Access Governance reports that identify overshared sites, the policies that prevent recurrence, and the Restricted SharePoint Search that contains Copilot during the audit. Without SAM, an SMB cannot see which sites are overshared, which makes any Copilot rollout effectively blind.
Is SharePoint Advanced Management free with Copilot?
SharePoint Advanced Management ships at no additional cost with any paid Copilot license as of Ignite 2025. Tenants without Copilot can buy SAM standalone at US$3 per user per month. Most Canadian SMBs that already licensed Copilot already own SAM and have not turned the reports on.
How do SAM, Purview and Defender for Cloud Apps differ for Copilot governance?
SAM controls site-level access and SharePoint reporting. Purview controls data-level sensitivity labels and data-loss prevention against Copilot prompts and outputs. Defender for Cloud Apps controls behavioural anomaly detection across cloud usage. Most Canadian SMBs need SAM plus Purview Foundation as a Copilot governance floor; MDCA fits at higher security maturity.
Does Quebec Law 25 require a new privacy impact assessment when I add Copilot?
Yes, if your business handles personal information of any Quebec resident. Quebec Law 25 treats Copilot as a new integrated AI use case, and a sweeping privacy impact assessment that previously cleared the tenant does not automatically extend to this scenario. The assessment must scope Copilot specifically and document the cross-border transfer review.
Can I just turn Copilot on for a small group first instead of running an audit?
Pilot deployment without an audit only contains the rollout, not the data exposure. Even five pilot users can surface the entire tenant’s overshared content through their existing permissions. The right pattern is to run the audit first, then enable Copilot for a pilot cohort under Restricted SharePoint Search until the audit completes.
What is Restricted SharePoint Search and when should I use it?
Restricted SharePoint Search is a Microsoft 365 feature that limits Copilot’s SharePoint search to a curated allow-list of sites. It is the recommended interim control while a pre-Copilot audit is in progress. Once the audit completes and tenant-wide policies are in place, most SMBs lift the restriction and let Copilot search the cleaned tenant.
How do I know if my SharePoint tenant is overshared right now?
Run the Data Access Governance reports inside SharePoint Advanced Management. The reports flag sites with anonymous links, broken inheritance, “Everyone except external users” group-shares, and tenant-wide-shared content. Most Canadian SMBs Fusion Computing audits return between 40 and 200 overshared site flags on the first scan, with most resolved during a 30-day remediation.
Does Copilot oversharing apply to Business Premium without a Copilot license?
The oversharing condition exists on any environment where permissions cascade unintentionally across SharePoint plus OneDrive plus Teams. Without a Copilot license the exposure stays hidden because users have to know exactly where to look. Adding Copilot is the trigger that makes the exposure discoverable. Canadian SMBs planning a future Copilot deployment should run the audit before the license is provisioned, not after.
Will SAM let me block Copilot from specific SharePoint sites?
Yes. Restricted SharePoint Search lets administrators define a curated allow-list of sites Copilot can search, blocking everything else by default. SAM site-level access controls can also restrict Copilot from specific sites or libraries even after the audit completes. The combination is what most Canadian SMBs use during the pre-deployment audit and the first 60 days of pilot rollout.
Does Copilot oversharing apply to Microsoft 365 Business Premium without a Copilot license?
The oversharing condition exists on any Microsoft 365 tenant where SharePoint, OneDrive, or Teams permissions cascade unintentionally. Without a Copilot license the exposure stays hidden because users have to know exactly where to look. Adding Copilot is the trigger that makes the exposure discoverable. Canadian SMBs planning a future Copilot deployment should run the audit before the license is provisioned, not after.
Ready to Put AI to Work for Your Business?
Tell us about your operations and we’ll identify the highest-impact AI opportunities. Reply within one business day.

