Safeguarding Sensitive Data in Microsoft 365 Copilot with Purview DLP (GA Release)

The challenge with sensitive data and access to Copilot Microsoft 365 Copilot empowers users with AI-driven assistance across Microsoft 365 apps, but it also raises concerns about accidental oversharing of sensitive information. In response, Microsoft has extended its Purview Data Loss Prevention (DLP) capabilities to Microsoft 365 Copilot, allowing organizations to enforce information protection policies within AI workflows. The DLP for Microsoft 365 Copilot has been in preview for some time, but Microsoft has now announced it is released for GA (General Availability). Among some of the interesting features are new features like alerting and policy simulation. Key details:  Rollout Timeline: As of June 2025, the rollout has begun. It should be completed worldwide by late July 2025. Scope: Initially, DLP for Copilot was available for Copilot Chat scenarios. By the time of GA this is expanding to Copilot in core Office apps (Word, Excel, PowerPoint) as well. Ensuring that DLP prote...

Meeting policies in Teams have been updated in the Teams Admin Center

Microsoft released a lot of cool features last week, an I am sure I will comment them as the get closer to General Availability. But in this post, I will focus on some of the features that has surfaced GA just recently, and discuss if there are things the organization could or should look into.

Meeting Policy Settings
Already back in May, the option to create meetings where "only me" could bypass the lobby became available. But the organization wide setting is still set to "allow all to bypass". This is still true, but now there is a meeting policy which organizations can deploy to control this for all. 
To control this, look for the "Automatically admit people" in the teams admin portal. Select what best matches your security policy, but make sure to communicate this to the users as they probably are used to the allow all.
You can also control who gets to be a presenter through the same policy now. This is nice if you want to avoid guests to take control unless explicitly granted. My suggestion is to allow user override in most cases.