Portal Walkthrough: Control 1.14 - Data Minimization and Agent Scope Control
Last Updated: January 2026 Portal: Power Platform Admin Center, Copilot Studio, Microsoft Purview Estimated Time: 2-4 hours initial setup, ongoing maintenance
Prerequisites
- Power Platform Admin or Environment Admin role
- SharePoint Admin access for site permissions
- Purview Compliance Admin for audit alerts
- Agent inventory completed (Control 1.2)
Step-by-Step Configuration
Step 1: Create Agent Data Access Inventory
Document all data sources accessed by each agent:
- Open Power Platform Admin Center
- Navigate to Environments > Select environment
- Select Resources > Copilot Studio agents
- For each agent, document:
| Agent Name | Data Source | Data Type | Classification | Justification |
|---|---|---|---|---|
| [Agent] | SharePoint | Documents | Confidential | [Business need] |
| [Agent] | Dataverse | Customer records | Restricted | [Business need] |
Step 2: Configure Connector Restrictions
- Navigate to Policies > Data policies
- Create or edit DLP policy for the environment
- Classify connectors:
- Business - Approved data sources
- Non-business - Personal/consumer services
-
Blocked - Prohibited connectors
-
Apply connector restrictions:
Business: SharePoint, Dataverse, SQL Server Non-business: Twitter, Facebook Blocked: Dropbox, Google Drive (consumer)
Step 3: Scope Knowledge Sources
- Open Copilot Studio
- Select agent > Knowledge
- Review each knowledge source:
- Verify scope is specific folder, not entire site
- Remove unnecessary sources
- Document justification for each source
Best Practice:
✅ Good: /sites/HR/Policies/Benefits
❌ Bad: /sites/HR (entire site)
Step 4: Create Agent Access SharePoint Groups
- Open SharePoint Admin Center
- Navigate to the site used as knowledge source
- Create dedicated group:
SG-AgentAccess-[AgentName] - Assign minimum permissions (typically Read)
- Add agent service account to group
Step 5: Configure Scope Change Alerts
- Open Microsoft Purview
- Navigate to Audit > Audit log search
- Create alert policy:
- Name: "Agent Scope Change Alert"
- Activity: ConnectorAdded, KnowledgeSourceAdded
- Users: Agent service accounts
- Notification: AI Governance Lead
Configuration by Governance Level
| Setting | Baseline (Zone 1) | Recommended (Zone 2) | Regulated (Zone 3) |
|---|---|---|---|
| Access Review | Annual | Quarterly | Monthly |
| DLP Policy | Standard | Enhanced | Strict allowlist |
| Scope Changes | Self-service | Manager approval | CISO approval |
| Monitoring | Periodic audit | Alert on changes | Real-time |
| Documentation | Basic inventory | Full justification | Formal approval chain |
FSI Example Configuration
Agent: Investment Advisory Bot
Environment: FSI-Production-Zone3
Data Sources:
- Source: SharePoint - /sites/InvestmentResearch/Approved
Classification: Confidential
Justification: Market research for client recommendations
Approved By: Investment Committee
Review Date: 2026-04-01
- Source: Dataverse - CustomerProfiles (read-only)
Classification: Restricted
Justification: Customer suitability assessment
Approved By: CISO
Review Date: 2026-04-01
Connector Policy:
Allowed: SharePoint, Dataverse
Blocked: All others
Access Review:
Frequency: Monthly
Reviewer: Investment Operations Manager
Escalation: CISO
Validation
After completing these steps, verify:
- Agent data access inventory is complete and documented
- Connector restrictions are applied via DLP policy
- Knowledge sources are scoped to specific folders
- Agent access groups have minimum permissions
- Scope change alerts are configured and tested
Back to Control 1.14 | PowerShell Setup | Verification Testing | Troubleshooting