How Microsoft Purview DLP currently can help you protect confidential data in Copilot.

Organizations today face a difficult balancing act. Business leaders are eager to adopt tools like Microsoft Copilot to unlock productivity and innovation. Meanwhile, IT and security teams are concerned about safeguarding sensitive information, especially as AI-driven features process vast amounts of organizational data. This tension is real: enabling advanced capabilities without compromising compliance or data protection is a challenge every modern enterprise must solve. Microsoft Purview Data Loss Prevention (DLP) is a key solution to this problem. It provides mechanisms to prevent confidential data from being exposed or misused, even in scenarios involving AI. I want to highlight two features designed to help organizations in controlling what is being processed by Copilot. Blocking Documents Based on Sensitivity Labels One of the foundational features of Purview DLP is its ability to enforce policies based on Microsoft Information Protection sensitivity labels. If your organization...

Meeting policies in Teams have been updated in the Teams Admin Center

Microsoft released a lot of cool features last week, an I am sure I will comment them as the get closer to General Availability. But in this post, I will focus on some of the features that has surfaced GA just recently, and discuss if there are things the organization could or should look into.

Meeting Policy Settings
Already back in May, the option to create meetings where "only me" could bypass the lobby became available. But the organization wide setting is still set to "allow all to bypass". This is still true, but now there is a meeting policy which organizations can deploy to control this for all. 
To control this, look for the "Automatically admit people" in the teams admin portal. Select what best matches your security policy, but make sure to communicate this to the users as they probably are used to the allow all.
You can also control who gets to be a presenter through the same policy now. This is nice if you want to avoid guests to take control unless explicitly granted. My suggestion is to allow user override in most cases.