Control 3.8: Copilot Hub and Governance Dashboard - Verification & Testing
This playbook provides verification and testing procedures for Control 3.8.
Verification Steps
1. M365 Admin Center Access
- Navigate to Copilot section
- Verify all five navigation items accessible
- Confirm Settings tabs load correctly
2. Agents Section Access
- Navigate to Agents section
- Verify Overview metrics display
- Confirm Registry shows all agents
3. PPAC Copilot Access
- Navigate to PPAC Copilot section
- Verify Settings page loads
- Confirm Copilot Studio dashboard accessible
4. Settings Configuration
- Verify FSI-recommended settings applied
- Confirm web search disabled
- Check external AI providers blocked
Compliance Checklist
| Item | Required For | Status |
|---|---|---|
| Copilot settings documented | Audit evidence | |
| Web search disabled | FINRA 4511 compliance | |
| External AI providers blocked | Data governance | |
| Agent approval workflow configured | Risk management | |
| Usage reports exported monthly | FINRA 4511 | |
| MCP Servers reviewed | Security |
Test Cases
Test Case FAC-01: Admin Exclusion Group Correctly Removes Copilot Access
Objective: Verify Admin Exclusion Group correctly removes Microsoft 365 Copilot access for excluded users
Prerequisites:
- Admin Exclusion Group created with name CopilotForM365AdminExclude
- Test user has M365 Copilot license assigned
- Test user is NOT currently in Admin Exclusion Group
Steps:
- Baseline verification:
- Sign in as test user
- Navigate to Microsoft Teams or Outlook
- Verify Copilot Chat is accessible and functional
-
Document current access state
-
Add user to Admin Exclusion Group:
- As administrator, navigate to Microsoft Entra admin center > Groups
- Open
CopilotForM365AdminExcludegroup - Add test user to group membership
-
Document timestamp of addition
-
Wait for propagation:
- Wait 24 hours for group membership change to propagate
-
Note: Propagation can take up to 24 hours per Microsoft documentation
-
Verify exclusion:
- Sign in as test user (force new authentication session)
- Navigate to Microsoft Teams > Copilot Chat
- Attempt to access Copilot features
-
Document behavior (access denied, features not visible, error message)
-
Verify license assignment unchanged:
- As administrator, verify test user still has M365 Copilot license assigned
-
Confirm exclusion is behavioral (group-based), not license-based
-
Remove from exclusion group and verify restoration:
- Remove test user from Admin Exclusion Group
- Wait 24 hours for propagation
- Sign in as test user and verify Copilot access restored
Expected Result: - User in Admin Exclusion Group cannot access Copilot features despite having valid license - Copilot Chat not visible in Teams/Outlook, or displays "not available" message - After removal from group (and propagation), access is restored
Evidence to Collect: - Screenshot of test user with Copilot access before exclusion - Screenshot of Admin Exclusion Group membership showing test user - Screenshot of test user without Copilot access after exclusion - Entra ID audit log entry showing group membership change - Timestamp documentation for 24-hour propagation verification
Regulatory Mapping: FINRA 3110 (supervisory restrictions), SOX 404 (IT access controls)
Test Case FAC-02: Deployment Group Limits Copilot Availability to Specified User Population
Objective: Verify Deployment Group correctly limits Copilot availability to users in approved deployment phase
Prerequisites:
- Deployment group created (e.g., Copilot-Pilot-IT-Compliance)
- Two test users with M365 Copilot licenses:
- Test User A: Member of deployment group
- Test User B: NOT member of deployment group (but has license)
Steps:
- Create deployment group:
- As administrator, create deployment group in M365 Admin Center > Copilot > Settings
- Add Test User A to deployment group
- Verify Test User B is NOT in deployment group
-
Document group configuration
-
Configure Copilot for deployment group only:
- In M365 Admin Center, configure Copilot to be available only to deployment group members
-
Save settings and document timestamp
-
Wait for propagation:
-
Wait 8 hours for settings to propagate across tenant
-
Test User A (in deployment group):
- Sign in as Test User A
- Navigate to Teams > Copilot Chat
- Verify Copilot features are accessible and functional
-
Document successful access
-
Test User B (NOT in deployment group):
- Sign in as Test User B
- Navigate to Teams > Copilot Chat
- Verify Copilot features are NOT accessible
-
Document denial behavior (features hidden, error message, etc.)
-
Verify license assignments:
- Confirm both Test User A and Test User B have identical M365 Copilot license assignments
- Verify difference in access is deployment group membership, not licensing
Expected Result: - Test User A (in deployment group): Copilot access granted - Test User B (not in deployment group): Copilot access denied despite valid license - Deployment group configuration enforces phased rollout control
Evidence to Collect: - Deployment group membership list showing Test User A included, Test User B excluded - Screenshot of Test User A successfully accessing Copilot - Screenshot of Test User B denied access to Copilot - License assignment report showing both users have M365 Copilot licenses - M365 Admin Center settings showing deployment group configuration
Regulatory Mapping: SOX 404 (documented IT controls)
Test Case FAC-03: Web Search Disabled Users Cannot Access Web-Grounded Copilot Responses
Objective: Verify web search control prevents Copilot from accessing external web data when disabled
Prerequisites: - M365 Admin Center access to Copilot > Settings > Data access - Test user with M365 Copilot access - Web search control set to "Enabled" initially (baseline)
Steps:
- Baseline test with web search enabled:
- As administrator, verify web search is enabled (M365 Admin > Copilot > Settings > Data access)
- Sign in as test user
- In Copilot Chat, ask a question that requires external web data (e.g., "What are the latest news headlines today?")
- Document Copilot response — should include web-grounded content or indicate web search used
-
Sign out
-
Disable web search:
- As administrator, navigate to M365 Admin Center > Copilot > Settings > Data access
- Set "Web search for M365 Copilot" to "Disabled"
-
Save settings and document timestamp
-
Wait for propagation:
- Wait 8 hours for setting to propagate across tenant
-
Note: Microsoft documentation indicates up to 8 hours for Copilot settings propagation
-
Test with web search disabled:
- Sign in as test user (force new session)
- In Copilot Chat, ask the same question requiring external web data
- Document Copilot response — should indicate web search not available, or limit response to organizational data only
-
Verify no web-grounded content in response
-
Verify organizational data still accessible:
- Ask Copilot a question that can be answered from organizational data (e.g., "Summarize my recent emails")
- Verify Copilot can still access and respond using organizational Microsoft 365 data
- Confirm only web search is disabled, not all Copilot functionality
Expected Result: - With web search enabled: Copilot provides web-grounded responses - With web search disabled: Copilot does NOT access external web data, limits responses to organizational data - Organizational data access remains functional when web search disabled
Evidence to Collect: - Screenshot of M365 Admin Center showing web search enabled (baseline) - Screenshot of Copilot response with web-grounded content (baseline) - Screenshot of M365 Admin Center showing web search disabled - Screenshot of Copilot response WITHOUT web content (web search disabled) - Screenshot of Copilot successfully using organizational data (web search disabled) - Timestamp documentation for 8-hour propagation verification
Regulatory Mapping: GLBA 501(b) (prevent external data leakage), FINRA (MNPI protection)
Test Case 4: Agent Access Restrictions
Objective: Verify restricted agent access prevents third-party agent discovery
Steps:
- Configure agent access to organizational agents only
- Wait for propagation
- Attempt to discover third-party agents
- Verify only organizational agents available
Expected Result: Third-party agents not discoverable
Test Case 5: AI Administrator Role Permissions
Objective: Verify AI Administrator can configure Copilot settings without Global Admin
Steps:
- Assign AI Administrator role to test user
- Sign in as AI Administrator
- Navigate to M365 Admin > Copilot > Settings
- Modify Copilot settings (User Access, Data Access, Actions)
- Verify settings changes applied successfully
Expected Result: Settings changes applied successfully without Global Admin
Test Case 6: Agent Approval Workflow
Objective: Verify agents require approval
Steps:
- Configure agent approval requirement
- Publish test agent
- Verify agent appears in Requests tab
- Approve agent
- Verify agent available
Expected Result: Agents require approval before availability
Test Case 7: MCP Server Blocking
Objective: Verify blocked servers are inaccessible
Steps:
- Block a test MCP Server
- Attempt to use blocked capability
- Verify capability unavailable
Expected Result: Blocked servers cannot be used
Evidence Collection
For audits, collect:
AI Feature Access Control Evidence: - Admin Exclusion Group membership list (export monthly) - Deployment group configuration and user assignments per phase - Web search control settings documentation (enabled/disabled per zone) - Agent access control settings (allowed agent types per zone) - Copilot Chat pinning configuration per department/role - Evidence of 24-hour propagation validation for exclusion groups - Evidence of 8-hour propagation validation for settings changes
General Copilot Governance Evidence: - Copilot settings configuration export (M365 Admin Center > Copilot > Settings) - Feature access control settings documentation (all four tabs: User access, Data access, Actions, Other) - Agent registry export (M365 Admin Center > Agents > All agents) - Usage reports (monthly) — Copilot Chat Active Users, Assisted Hours, Satisfaction Rate - Audit log of configuration changes (Entra ID > Audit logs, filter for Copilot-related events) - MCP Server availability list (M365 Admin Center > Agents > Tools) - AI Administrator role assignment documentation - Compliance Officer approval records for Admin Exclusion Group membership changes
Next Steps
- Portal Walkthrough - Manual configuration
- PowerShell Setup - Automation scripts
- Troubleshooting - Common issues
SSPM Configuration Verification
Security Posture Assessment Test Cases
The following test cases validate configuration points flagged by security posture assessments. Each test maps to a specific setting in the Configuration Hardening Baseline.
| Test ID | Configuration Point | Expected Result | Portal Path | Evidence |
|---|---|---|---|---|
| SSPM-3.8-01 | AI Prompts toggle | Disabled at tenant level | PPAC > Settings > Power Platform Settings | Screenshot |
| SSPM-3.8-02 | Generative Actions toggle | Disabled at tenant level | PPAC > Settings > Power Platform Settings | Screenshot |
| SSPM-3.8-03 | File Analysis Models | Disabled | PPAC > Settings > Power Platform Settings | Screenshot |
| SSPM-3.8-04 | Model Knowledge | Disabled | PPAC > Settings > Power Platform Settings | Screenshot |
| SSPM-3.8-05 | Semantic Search with AI | Disabled | PPAC > Settings > Power Platform Settings | Screenshot |
| SSPM-3.8-06 | Move Data Across Regions | Disabled | PPAC > Settings > Power Platform Settings | Screenshot |
| SSPM-3.8-07 | Bing Search | Disabled | PPAC > Settings > Power Platform Settings | Screenshot |
| SSPM-3.8-08 | Transcript access | Restricted to compliance roles | M365 Admin > Copilot > Settings | Screenshot |
| SSPM-3.8-09 | DLP for publishing | DLP policy enforcement active | PPAC > Policies > Data policies | Screenshot |
Test Procedures
SSPM-3.8-01: AI Prompts Toggle
- Navigate to PPAC > Settings > Power Platform Settings
- Locate "AI Prompts" toggle
- Verify toggle is set to Disabled at the tenant level
- Pass criteria: AI Prompts toggle is off — makers cannot create AI prompt actions
- Evidence: Screenshot showing Power Platform Settings page with AI Prompts toggle state
SSPM-3.8-02: Generative Actions Toggle
- Navigate to PPAC > Settings > Power Platform Settings
- Locate "Generative Actions" toggle
- Verify toggle is set to Disabled at the tenant level
- Pass criteria: Generative Actions toggle is off — generative AI actions are not available to makers
- Evidence: Screenshot showing Power Platform Settings page with Generative Actions toggle state
SSPM-3.8-03: File Analysis Models
- Navigate to PPAC > Settings > Power Platform Settings
- Locate "File Analysis Models" toggle
- Verify toggle is set to Disabled
- Pass criteria: File Analysis Models is disabled — no automated file analysis via AI
- Evidence: Screenshot showing toggle state
SSPM-3.8-04: Model Knowledge
- Navigate to PPAC > Settings > Power Platform Settings
- Locate "Model Knowledge" toggle
- Verify toggle is set to Disabled
- Pass criteria: Model Knowledge is disabled — agents cannot access general model knowledge
- Evidence: Screenshot showing toggle state
SSPM-3.8-05: Semantic Search with AI
- Navigate to PPAC > Settings > Power Platform Settings
- Locate "Semantic Search with AI" toggle
- Verify toggle is set to Disabled
- Pass criteria: Semantic Search with AI is disabled — AI-powered search is not active
- Evidence: Screenshot showing toggle state
SSPM-3.8-06: Move Data Across Regions
- Navigate to PPAC > Settings > Power Platform Settings
- Locate "Move Data Across Regions" toggle
- Verify toggle is set to Disabled
- Pass criteria: Cross-region data movement is disabled — data stays within the configured region
- Evidence: Screenshot showing toggle state
SSPM-3.8-07: Bing Search
- Navigate to PPAC > Settings > Power Platform Settings
- Locate "Bing Search" toggle
- Verify toggle is set to Disabled
- Pass criteria: Bing Search is disabled — agents cannot query external web data via Bing
- Evidence: Screenshot showing toggle state
SSPM-3.8-08: Transcript Access
- Navigate to M365 Admin Center > Copilot > Settings
- Review transcript access configuration
- Verify transcript access is restricted to compliance roles only (not all users or all admins)
- Pass criteria: Only designated compliance roles can access agent interaction transcripts
- Evidence: Screenshot showing transcript access control settings with role assignments
SSPM-3.8-09: DLP for Publishing
- Navigate to PPAC > Policies > Data policies
- Verify at least one DLP policy is active and applies to the target environments
- Verify the policy blocks or restricts high-risk connectors
- Confirm DLP enforcement is active for agent publishing (agents cannot publish if they violate DLP)
- Pass criteria: DLP policy enforcement is active and applies to all governed environments
- Evidence: Screenshot showing DLP policy list with environment assignments and connector classifications
Updated: February 2026 | Version: v1.3 | Classification: Verification Testing