Check your Copilot settings after this confidential email bug

Date:

Share:



Microsoft has warned that a Microsoft 365 Copilot issue led Copilot Chat to generate summaries from confidential emails that should have been blocked by sensitivity labels and data loss prevention controls. It detected the problem on January 21, and tied it to the Copilot “work tab” chat experience.

If your workplace relies on labels and DLP to keep sensitive mail from being processed, the immediate question is simple. Did the fix reach your tenant, and does Copilot still pull from the wrong places.

A DLP bypass in the work tab

First spotted by BleepingComputer, Microsoft says an internal code error caused Copilot “work tab” chat to pick up items from Sent Items and Drafts, then summarize them even when a sensitivity label and a DLP policy were configured.

Those folders are also where sensitive material tends to live. Drafts can hold negotiations, early numbers, or language you never intended to send. Sent Items can include the final wording that went to a customer, partner, or regulator. A summary that includes restricted text makes it easier for information to travel inside everyday chat.

For admins, the key point is that this isn’t about someone copy pasting an email into Copilot.

What Microsoft still isn’t saying

Microsoft began deploying a fix in early February and says it’s monitoring to confirm the change works. But it hasn’t shared two details security teams will care about, how many tenants were affected, and how far back the behavior went before it was detected on January 21.

Without a clear window, it’s hard to choose between a narrow review and a broader one.

What you should do next

Admins should test whether Copilot “work tab” chat can still summarize labeled emails from those mail folders in your environment. Write down what you observe, and keep it with audit notes in case your security team needs to document impact later. Be thorough.

For everyone else, treat Copilot summaries as something to verify, not something to trust by default, until your IT team confirms the updated behavior. If you handle regulated or contract bound information, flag this now so the controls can be checked instead of assumed.



Source link

━ more like this

Trump warns Tehran bases at Diego Garcia and Fairford ready for action – London Business News | Londonlovesbusiness.com

The United States is reportedly preparing to launch military strikes on Iran within days, as President Donald Trump ramps up pressure following failed...

Grab this Elevation Lab 10-year extended battery case for AirTag for only $16

If you're an iPhone user who likes to keep tabs on where your stuff is, you can't go far wrong with an AirTag....

A complete guide to managing your rental property successfully – London Business News | Londonlovesbusiness.com

Managing a rental property can be both financially rewarding and operationally demanding. While many landlords enter the market with the goal of generating...

Google Maps tests hiding reviews and images unless you sign in

Google Maps has quietly begun treating signed-out users differently. It gives them the directions but hides all the other useful information, including photos,...

Enterprise-grade video production: Why Seedance 2.0 is the game-changer – London Business News | Londonlovesbusiness.com

Enterprise organisations face a unique set of challenges when it comes to video content production. Large corporations need to produce video content at...
spot_img