M365 Show Podcast

Stop SharePoint Agents From Leaking Your Data (The IT Pro Fix)

Are your SharePoint agents suddenly surfacing answers that feel too honest—or worse, too exposed? It’s probably not “AI being spooky.”
It’s your permissions, scope, and DLP. In this episode, we unpack why SharePoint agents leak data, why it’s almost never “hallucination,” and how to fix it with:

  • Tight knowledge source scoping
  • Permission and inheritance hardening in SharePoint
  • Sensitivity labels + Purview DLP that actually block agents
  • Approval gates for agents, licensing boundaries, and data policies
  • A baseline policy pack you can roll out as an IT admin today
If you’re an M365 admin, SharePoint architect, security engineer, or Copilot / agents owner, this is your practical playbook for stopping AI-driven data leaks before they start. 🔍 Episode Summary Your SharePoint agent didn’t “leak” data because AI is haunted.
It leaked because you overscoped the agent and left permissions inheritance and DLP in a half-configured state. In this episode, you’ll learn:
  • How SharePoint agents actually see data (Graph + ACLs + labels + DLP)
  • Why grounding does NOT equal security
  • The difference between retrieval filters and permissions boundaries
  • How to scope knowledge like a lawyer writes contracts
  • How to break inheritance the right way and pair it with sensitivity labels
  • How to build DLP patterns that bite, not just log
  • How to use PayG / licensing and approval workflows as hard guardrails
  • How to monitor, audit, and safely rollback when something goes wrong
  • A baseline agent governance pack you can deploy today
This isn’t a hype episode. It’s an IT pro fix for a very real risk. 🧬 Segment 1 – How SharePoint Agents Actually See Your Data We start by demystifying how agents “see” SharePoint:
  • Agents don’t read your intentions; they read Microsoft Graph
  • Graph is the bloodstream – if ACLs allow access, agents can see it
  • An agent = user persona + retrieval filters
    • Persona = the identity and its permissions
    • Retrieval = which libraries/folders/URLs you pointed at
Key idea: Permissions gate first. Retrieval filters only decide where to look, not what’s allowed. We cover:
  • Why grounding filters relevance but doesn’t shrink legal access
  • How permissions inheritance becomes silent escalation
  • How an overscoped agent “accidentally” pulls HR or Legal content from adjacent libraries
  • Why “it’s just one site root” is the fastest way to disaster
You’ll walk away with a mental model:
  • Gate → Find → Enforce
    • Permissions (ACLs) gate access
    • Retrieval filters help find content
    • Labels + DLP enforce what’s allowed to be processed
Once you understand that stack, the “leak” stops being mystical. 📚 Segment 2 – Control Plane 1: Scope Knowledge Sources Like a Lawyer Next, we fix the first big mistake: overscoping. We walk through how to design knowledge sources so they cannot wander: Core Scoping Rules
  • Library-level sources only
    • No site roots
    • No hub-level “everything under here” shortcuts
  • Shallow folder depth, avoid recursive “grab the world” patterns
  • Metadata filters only
    • Only ingest items where Status = Approved, Version = Published, Department = X, etc.
  • Exclude drafts, archives, and “Working” trees
  • No crawling arbitrary internal/external URLs “for context”
The Real-World Pattern
  • Many small, narrow agents → safer and more predictable
  • One giant “encyclopedic” agent → high blast radius
We also cover:
  • Why you should disable general AI knowledge for regulated agents
  • How to use an explicit fallback answer: “I’m not authoritative for that. Here’s what I can answer.”
  • How to test scope using edge-case queries (in-domain vs out-of-domain)
Metrics to track:
  • Answerability – in-domain questions answered from the right library
  • Containment – answers only cite approved sources
  • Silence quality – out-of-domain questions get clean, safe refusals
🔐 Segment 3 – Control Plane 2: Break Inheritance and Label Like You Mean It Then we tackle the second big weakness: lazy inheritance. Why Inheritance Is a Problem
  • Site-level inheritance quietly brings in:
    • Everyone / Authenticated Users
    • Old project groups
    • Guests that never got removed
  • Agents respect ACLs, not vibes – if the identity can open a file, it can process it
Permission Hardening Strategy
  • Identify must-isolate libraries: HR, Legal, Finance, R&D, high-risk policies
  • Break inheritance at the library level, not the entire site
  • Replace broad groups with:
    • Azure AD security groups by role
    • Narrow Owners / Members / Readers
    • No “All employees” in sensitive libraries
We define permission tiers:
  • Tier A – Confidential: minimal owners/members, no guests
  • Tier B – Internal-only: department-wide but no external users
  • Tier C – Public-internal: all employees but still no guests
Sensitivity Labels + DLP We emphasize:
  • Labels are not stickers; they are policy keys
  • Use labels like Confidential – HR, Restricted – Finance, Internal
  • Map labels to real behavior through Purview DLP:
    • Some labels = agents allowed
    • Some labels = agents always blocked, even if the user can view
Example pattern:
  • HR agent runs with a service identity allowed only in HR Policy library
  • Adjacent HR Drafts library uses unique permissions and different labels
  • DLP says:
    • Agent X can process Confidential – HR
    • All other agents get blocked on that label
We show how to:
  • Keep agent identities narrow
  • Avoid “run as current user” for regulated scenarios
  • Separate human visibility from machine processing
🚦 Segment 4 – Control Plane 3: Approval Gates, PayG & Data Policies Now we stop shadow agents and random builders from bypassing governance. Agent Approval Workflow We design an intake and approval process:
  • No one spins up a SharePoint agent without:
    • Business purpose
    • Owner + support contact
    • Expiration date
    • Exact knowledge source libraries
    • Service identity to run as


Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-show-podcast--6704921/support.

Follow us on:
LInkedIn
Substack