In this episode of M365.fm, Mirko Peters explains why your SharePoint agents aren’t “haunted” — they’re over‑scoped, over‑permitted, and under‑protected. You’ll learn how agents actually see data through Microsoft Graph and ACLs, why grounding does not equal security, and how broken inheritance, weak DLP, and loose labels turn one well‑meaning agent into a data‑leak amplifier.
WHAT YOU WILL LEARN
- How SharePoint agents really work: persona (identity + permissions) plus retrieval filters over SharePoint via Microsoft Graph
- Why grounding filters relevance but never shrinks what the identity is legally allowed to access
- How overscoped knowledge sources (site roots, hubs, recursive folders) quietly pull in HR, Legal, and sensitive side libraries
- Why permission inheritance and “Everyone/All Employees” groups become silent escalation paths for agents
- How to scope knowledge sources like a lawyer: library‑level only, shallow folder depth, metadata filters, and explicit exclusion of drafts and working trees
- How to harden permissions by breaking inheritance on the right libraries, replacing broad groups with role‑based security groups, and defining clear tiers (Confidential, Internal, Public‑internal)
- How to pair sensitivity labels with Purview DLP so some labels are agent‑allowed and others are always blocked, even if users can view the files
- How to design approval gates for agents, using service identities, Pay‑As‑You‑Go/licensing, and data policies as real guardrails
- How to monitor, audit, and safely roll back when an agent or policy misstep exposes the wrong content
THE CORE INSIGHT
Your SharePoint agent didn’t leak because AI is spooky; it leaked because your permissions, scope, and DLP told it that leak was allowed. Agents read Graph, not intentions. Permissions gate first, retrieval filters decide where to look, and labels + DLP decide what is allowed to be processed — if you don’t configure all three, you’re relying on luck. The fix is a control‑plane mindset: narrow agents with precise scopes, hardened permissions on sensitive libraries, labels that actually drive DLP behavior, and an approval and monitoring process that treats agents as high‑risk service identities, not toys.
WHO THIS EPISODE IS FOR
This episode is essential for Microsoft 365 admins, SharePoint architects, security engineers, and Copilot/agent owners who must stop AI‑driven data leaks before they become incidents. If your agents are grounded on “the whole site,” inheritance is still default everywhere, or DLP only logs instead of blocking, this conversation gives you a concrete governance pack you can start rolling out today.
ABOUT THE HOST
Mirko Peters is a Microsoft 365 consultant and digital workplace architect focused on building secure, agent‑ready environments on the Microsoft cloud. Through M365.fm, Mirko shares practical governance patterns, incident stories, and control‑plane designs that help IT pros keep Copilot and SharePoint agents powerful for users — and boring for auditors.
Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-fm-modern-work-security-and-productivity-with-microsoft-365–6704921/support.