FSI Configuration Examples
Concrete implementation examples for financial services organizations deploying Microsoft 365 AI agents.
Industry Scenarios
This document provides specific configuration examples for:
- Retail Banks - Consumer banking, deposits, lending
- Broker-Dealers - Securities trading, investment advice
- Insurance Companies - Policy management, claims processing
- Asset Managers - Investment management, fund administration
- Credit Unions - Member services, lending
Example 1: Retail Bank - Customer Service Agent
Scenario
A regional retail bank deploys a customer service agent to handle account inquiries, balance checks, and transaction history requests for online banking customers.
Classification
- Zone: Zone 3 (Enterprise Managed - Customer-facing)
- Risk Level: High
- Data Types: Customer PII, Account Numbers, Transaction History
- Regulations: GLBA, FINRA, SOX, State Banking Regulations
Control Configuration
Control 1.4: Advanced Connector Policies
Approved Connectors (Allowlist): | Connector | Justification | Data Classification | |-----------|---------------|---------------------| | Microsoft Dataverse | Customer account data storage | Confidential | | Core Banking API (Custom) | Read-only access to account balances | Highly Confidential | | SharePoint | Knowledge base articles | Internal | | Microsoft Teams | Escalation to human advisors | Internal |
Blocked Connectors:
- All social media platforms (Twitter, Facebook, LinkedIn)
- Public cloud storage (Dropbox, Box, Google Drive)
- Consumer email services (Gmail, Yahoo Mail)
- Web scraping connectors
- Any connector transmitting data outside tenant
Control 1.5: DLP and Sensitivity Labels
DLP Policy Configuration:
Policy Name: FSI-CustomerService-DLP
Locations: Copilot Studio, SharePoint, OneDrive, Exchange
Conditions:
- Detect: SSN, Bank Account Number, Credit Card Number, Driver's License
- Confidence: High (85%+)
Actions:
- Block external sharing
- Encrypt content
- Notify Compliance Officer
- Log to audit
Exceptions: None for Zone 3
Sensitivity Labels: | Label | Apply To | Protection | |-------|----------|------------| | Highly Confidential - Customer PII | All customer data | Encrypt, No download, Watermark | | Confidential - Internal | Internal knowledge articles | Encrypt, Track access | | General | Public-facing FAQs | No encryption |
Control 1.7: Audit Logging
Audit Configuration:
- Retention: 10 years (SEC 17a-4 compliance)
- Export: Weekly to Azure Blob (WORM storage)
- Real-time alerts: All agent interactions with customer data
- Review cadence: Daily by Compliance team
Control 1.11: Conditional Access
Policy Configuration:
Policy Name: FSI-CustomerAgent-CA
Users: All customer service representatives
Cloud Apps: Copilot Studio, Power Platform
Conditions:
- Locations: Corporate network + approved remote locations only
- Devices: Compliant devices only (Intune managed)
- Risk: Block High and Medium risk sign-ins
Grant:
- Require MFA (FIDO2 or Windows Hello)
- Require compliant device
- Require approved client app
Session:
- Sign-in frequency: 4 hours
- Persistent browser session: Disabled
Control 2.1: Managed Environments
Environment Configuration: | Setting | Value | |---------|-------| | Environment Name | FSI-Production-CustomerService | | Environment Type | Production | | Managed Environment | Enabled | | Weekly Digest | Enabled | | Limit Sharing | Exclude Sharing to Security Groups | | Solution Checker | Enforced | | Maker Welcome | Enabled |
Example 2: Broker-Dealer - Research Assistant Agent
Scenario
An investment firm deploys a research assistant agent to help analysts search internal research reports, summarize market data, and draft preliminary investment recommendations.
Classification
- Zone: Zone 3 (Enterprise Managed)
- Risk Level: High
- Data Types: Investment Research, Trade Recommendations, Client Holdings
- Regulations: FINRA 3110, SEC Reg BI, FINRA 4511, SOX
Control Configuration
Control 2.6: Model Risk Management
SR 11-7 Compliance Framework:
| Requirement | Implementation |
|---|---|
| Model Inventory | Agent registered in Model Risk inventory with unique ID |
| Risk Rating | High - directly impacts investment decisions |
| Validation | Independent validation by Model Validation team quarterly |
| Monitoring | Daily performance metrics vs. baseline |
| Limits | Agent recommendations require human review before action |
Testing Schedule:
- Pre-deployment: Full functionality and bias testing
- Monthly: Performance monitoring and drift detection
- Quarterly: Independent validation and accuracy assessment
- Annual: Full model validation with external review
Control 2.11: Bias Testing
Fairness Assessment Configuration:
Test Frequency: Quarterly
Metrics Tracked:
- Recommendation accuracy by sector
- Response quality by analyst seniority
- Coverage of small-cap vs. large-cap securities
Thresholds:
- Accuracy variance by sector: <5%
- Coverage ratio: Within 10% of benchmark
Documentation:
- Test methodology
- Results by metric
- Remediation actions if thresholds exceeded
Review: Compliance Committee quarterly
Control 2.12: Supervision (FINRA 3110)
Supervisory Controls: | Requirement | Implementation | |-------------|----------------| | Written Procedures | Agent use documented in WSPs | | Designated Supervisor | Chief Compliance Officer oversight | | Review Frequency | Daily spot-checks, weekly comprehensive review | | Escalation | Immediate escalation for recommendation errors | | Documentation | All agent outputs retained per FINRA 4511 |
Supervision Workflow:
- Agent generates draft recommendation
- Analyst reviews and edits
- Supervisor reviews before publication
- Compliance spot-checks 10% of recommendations daily
- All interactions logged for regulatory examination
Control 1.10: Communication Compliance
Policy Configuration:
Policy Name: Investment-Research-Compliance
Scope: All Copilot Studio agent interactions
Conditions:
- Detect: Investment recommendations, Buy/Sell language
- Detect: Price targets, Earnings estimates
- Detect: Material non-public information patterns
Actions:
- Route to Compliance queue for review
- Retain all communications
- Flag potential violations
Reviewers: Compliance Team
SLA: Review within 24 hours
Example 3: Insurance Company - Claims Processing Agent
Scenario
A property & casualty insurer deploys an agent to assist claims adjusters with initial claim intake, damage assessment documentation, and coverage verification.
Classification
- Zone: Zone 3 (Enterprise Managed)
- Risk Level: High
- Data Types: Policyholder PII, Health Information (if applicable), Financial Records
- Regulations: State Insurance Regulations, GLBA, HIPAA (if health data)
Control Configuration
Control 1.13: Sensitive Information Types
Custom SITs for Insurance: | SIT Name | Pattern | Confidence | |----------|---------|------------| | Policy Number | [A-Z]{2}[0-9]{8} | High | | Claim Number | CLM-[0-9]{10} | High | | VIN | [A-HJ-NPR-Z0-9]{17} | High | | Medical Record Number | MRN-[0-9]{8} | High | | Insurance Score | Pattern + context | Medium |
SIT Policy Application:
- Apply DLP rules to all custom SITs
- Block external sharing of documents containing policy/claim numbers
- Require encryption for documents with medical information
- Audit all access to documents with sensitive SITs
Control 1.14: Data Minimization
Agent Scope Configuration: | Data Source | Access Level | Justification | |-------------|--------------|---------------| | Claims Database | Read (specific claim only) | Process current claim | | Policy Database | Read (policy linked to claim) | Verify coverage | | Adjuster Notes | Read/Write | Document claim processing | | Payment System | None | Payments processed by human only | | Medical Records | Read (with authorization) | Medical claims only |
Scope Enforcement:
- API-level restrictions on data access
- No bulk data export capability
- Session-based access tokens (30-minute expiry)
- Quarterly scope audits by Information Security
Control 4.1: SharePoint IAG/RCD
Restricted Content Discovery Configuration:
Policy Name: Claims-Document-Protection
Protected Sites:
- Claims Documentation Library
- Adjuster Workspaces
- Medical Records Archive
Restrictions:
- Copilot/Agent cannot discover content without explicit access
- Restrict search results to claim-specific documents
- Block cross-claim document access
Audit: Log all agent access attempts
Example 4: Asset Manager - Portfolio Analysis Agent
Scenario
An asset management firm deploys an agent to help portfolio managers analyze fund performance, generate attribution reports, and summarize market conditions.
Classification
- Zone: Zone 2 (Team Collaboration) - Internal use only
- Risk Level: Medium
- Data Types: Portfolio Holdings, Performance Data, Market Data
- Regulations: SEC, Investment Advisers Act, DOL (for ERISA funds)
Control Configuration
Control 2.2: Environment Groups
Environment Group Structure: | Group Name | Tier | Environments | Policies | |------------|------|--------------|----------| | FSI-Development | Dev | Dev-PortfolioAnalytics | Relaxed DLP, All connectors | | FSI-Test | Test | UAT-PortfolioAnalytics | Production-like DLP | | FSI-Production | Prod | Prod-PortfolioAnalytics | Strict DLP, ACP enforced |
Promotion Workflow:
- Development in Dev tier (no approval needed)
- Testing in Test tier (Tech Lead approval)
- Production deployment (Change Advisory Board approval)
- All promotions logged and documented
Control 2.3: Change Management
Change Control Process: | Change Type | Approval Required | Lead Time | Documentation | |-------------|------------------|-----------|---------------| | Hotfix | Tech Lead | 1 hour | Post-implementation | | Standard | Manager | 24 hours | Pre-approval | | Major | CAB | 5 business days | Full change request | | Emergency | CTO + CCO | Immediate | Post-implementation within 24h |
Documentation Requirements:
- Business justification
- Technical design
- Test results from UAT
- Rollback plan
- Compliance review sign-off
Control 3.2: Usage Analytics
Monitoring Dashboard Metrics: | Metric | Threshold | Alert | |--------|-----------|-------| | Daily Active Users | >10, <100 | Outside range | | Avg Response Time | <3 seconds | >5 seconds | | Error Rate | <2% | >5% | | Sessions per Day | Baseline ±20% | Outside range | | Top Queries | Track for accuracy | Manual review |
Reporting Cadence:
- Daily: Automated dashboard refresh
- Weekly: Usage summary to stakeholders
- Monthly: Performance review with IT leadership
- Quarterly: ROI analysis with business sponsors
Example 5: Credit Union - Member Services Agent
Scenario
A credit union deploys a member services agent to answer questions about accounts, loan products, and branch services for members via the credit union website.
Classification
- Zone: Zone 3 (Enterprise Managed - Member-facing)
- Risk Level: High
- Data Types: Member PII, Account Information, Loan Data
- Regulations: NCUA, GLBA, State Credit Union Laws
Control Configuration
Control 1.8: Runtime Protection
Runtime Protection Settings: | Setting | Value | Rationale | |---------|-------|-----------| | Prompt Injection Detection | Enabled | Prevent manipulation | | Jailbreak Prevention | Enabled | Block bypass attempts | | Harmful Content Blocking | Enabled | Protect members | | External URL Blocking | Enabled | Prevent phishing links | | PII Redaction in Logs | Enabled | Minimize data exposure |
Threat Response:
- Detected threats: Block immediately
- Alert: Security Operations within 5 minutes
- Log: Full interaction context retained
- Escalation: Security incident if pattern detected
Control 4.4: Guest Access Controls
External Sharing Configuration:
SharePoint Sharing Settings:
Organization Level: Only people in your organization
Site Level (Member Docs): No external sharing
Site Level (Public Info): Existing guests (if needed)
Guest Access:
Require MFA: Yes
Guest expiration: 30 days
Guest access reviews: Monthly
Agent Access:
No access to guest-shared content
Block if document has external sharing enabled
Control 1.9: Data Retention
Retention Configuration: | Content Type | Retention Period | Disposition | |--------------|------------------|-------------| | Agent Interactions | 7 years | Review then delete | | Member Account Documents | 7 years after account closure | Legal hold then delete | | Loan Documents | 7 years after payoff | Archive then delete | | Audit Logs | 10 years | Immutable storage |
Retention Workflow:
- Auto-apply retention labels based on content type
- Quarterly disposition review
- Legal hold process for litigation
- Deletion certificates for auditors
Configuration Checklists
Pre-Deployment Checklist (All Zones)
- [ ] Agent purpose documented
- [ ] Data sources identified and classified
- [ ] Connectors approved through change management
- [ ] DLP policies configured and tested
- [ ] Sensitivity labels applied to data sources
- [ ] Access controls configured (least privilege)
- [ ] Audit logging enabled
- [ ] Testing completed in non-production environment
Zone 3 Additional Requirements
- [ ] Governance Committee approval obtained
- [ ] Legal review completed
- [ ] Model risk assessment documented
- [ ] Bias testing performed and documented
- [ ] Supervisory procedures documented
- [ ] Incident response plan updated
- [ ] Retention policies configured (10 years)
- [ ] Change management approval obtained
- [ ] Third-party validation scheduled (if required)
Common Configuration Patterns
Pattern 1: Strict Allowlist (Zone 3 Default)
- Block all connectors by default
- Explicitly approve each connector with business justification
- Quarterly review of all approved connectors
- Immediate revocation if risk identified
Pattern 2: Deny External (All Zones)
- Block all connectors that transmit data externally
- Allow internal Microsoft services only
- Custom connectors require security review
- Monitor for shadow IT / unapproved connectors
Pattern 3: Data Classification Enforcement
- Require sensitivity labels on all data sources
- Block agent access to unlabeled content
- Apply DLP based on label sensitivity
- Audit all access to Confidential+ content
Last Updated: December 2025