← Back to Blog

OneDrive + Copilot: Why Personal Files Aren't As Private As You Think

E2E Agentic Bridge·March 1, 2026

Your employees think OneDrive is their personal vault. A place for draft documents, salary negotiations, performance reviews, and personal notes. They've been told "OneDrive is your private space" since the day it was provisioned.

Then you deploy Microsoft 365 Copilot, and suddenly that "private space" becomes Copilot's training ground.

Here's the problem: OneDrive was never as private as users believe, and Copilot exposes every gap in that assumption at machine speed.

The OneDrive Privacy Illusion

OneDrive for Business operates under a deceptively simple permission model. Files in a user's OneDrive are private by default — accessible only to that user. But the moment a file is shared, things get complicated fast.

Consider these scenarios that happen in every organization, every day:

  • A manager shares a salary spreadsheet with HR via a OneDrive link
  • An employee shares a folder with their entire department for a project
  • Someone clicks "Share with people in my organization" instead of sharing with specific people
  • A user shares a file, the project ends, but the sharing permission persists forever

Each of these creates a permission that Copilot respects — and exploits. When another user asks Copilot "What's the salary range for senior engineers?", Copilot will happily surface that shared spreadsheet if the asking user has access to it through any sharing link.

Microsoft's own documentation confirms this: Copilot only surfaces data the user already has access to. The problem is that users have access to far more than they realize.

How Copilot Indexes OneDrive Content

Microsoft 365 Copilot uses the Microsoft Graph to access content across your tenant. For OneDrive specifically, this means Copilot can access:

  • Files in the user's own OneDrive — everything they've created or uploaded
  • Files shared with the user — via direct share, link share, or group membership
  • Files in shared libraries — OneDrive folders synced or linked to SharePoint

The indexing is comprehensive. Copilot doesn't just read file names — it processes the full content of Word documents, Excel spreadsheets, PowerPoint presentations, PDFs, and even text files. It understands context, relationships, and can synthesize information across multiple files.

A 2025 study by Varonis found that the average employee has access to 17 million files on day one of their employment. In organizations with lax OneDrive sharing practices, that number includes thousands of files that were never intended for broad access.

The "Shared with Everyone" Problem

The most dangerous OneDrive permission is "People in [your organization] with the link." This is the default sharing option in many tenants, and it effectively makes the file accessible to every employee — and therefore every Copilot query from every employee.

Here's what typically happens:

  1. User A shares a confidential document with User B using "People in my organization"
  2. User A thinks only User B will access it
  3. In reality, any employee with the link can access the file
  4. Copilot discovers the file when any employee asks a related question
  5. The file content appears in Copilot responses for users who never should have seen it

This isn't a Copilot bug. It's working exactly as designed. The bug is in your sharing configuration. We've covered how oversharing is the root cause of most Copilot security incidents — OneDrive is where this problem hits hardest because users treat it as personal storage.

Real-World OneDrive Exposure Scenarios

Scenario 1: The Draft Performance Review

A manager drafts performance reviews in OneDrive. During the process, they share the folder with their HR business partner. The sharing link type? "Anyone in the organization." Six months later, a team member asks Copilot: "What feedback has been given about my performance?" Copilot surfaces excerpts from the draft review — including candid comments the manager never intended to share.

Scenario 2: The Forgotten Shared Folder

An employee creates a "Project Alpha" folder and shares it with 15 colleagues. The project ends, but the sharing persists. Over time, the employee repurposes the folder for personal use — saving tax documents, medical forms, and job application drafts. Every original collaborator (and Copilot, on their behalf) can still access everything in that folder.

Scenario 3: The Executive's OneDrive

C-suite executives often have assistants with delegate access to their OneDrive. That delegate access means Copilot can surface executive files when the assistant asks questions. If the assistant's account is compromised, the attacker gets Copilot-powered access to everything the executive has stored.

Auditing OneDrive Sharing Before Copilot

Before deploying Copilot — or if you've already deployed it — you need a comprehensive OneDrive sharing audit. Here's the process:

Step 1: Identify Overshared Files

Use the SharePoint admin center or PowerShell to identify files shared with "Everyone" or "Everyone except external users." These are your highest-risk items.

# Connect to SharePoint Online
Connect-SPOService -Url https://yourtenant-admin.sharepoint.com

# Get all OneDrive sites
$sites = Get-SPOSite -IncludePersonalSite $true -Limit all -Filter "Url -like '-my.sharepoint.com/personal/'"

For each site, examine sharing reports available through the SharePoint admin center. Focus on files shared with organization-wide links.

Check your tenant's default sharing link type. If it's set to "Anyone" or "People in your organization," change it immediately:

  • Navigate to SharePoint admin centerPoliciesSharing
  • Set the default link type to "Specific people"
  • Consider restricting OneDrive sharing to "Only people in your organization" at minimum

Step 3: Implement Sharing Expiration

Configure sharing links to expire automatically. Microsoft recommends 30-day expiration for external links, but internal links often have no expiration. Set a policy:

  • Internal sharing links: 90-day expiration
  • External sharing links: 30-day expiration (or disable entirely)
  • Review and re-share if still needed

Step 4: Use Sensitivity Labels

Apply sensitivity labels to OneDrive content to prevent Copilot from surfacing classified information. Files labeled as "Confidential" or "Highly Confidential" can be configured to restrict Copilot access entirely.

This works in tandem with your broader data loss prevention strategy. The February 2026 DLP bug showed what happens when these controls fail — don't rely on a single layer.

Locking Down OneDrive for Copilot

Restrict Default Sharing Permissions

The single most impactful change: switch your tenant's default sharing link type from "People in your organization" to "Specific people." This one change eliminates the majority of accidental oversharing.

Enable OneDrive Access Governance

Microsoft's OneDrive access governance features (available in Microsoft 365 E5) provide automated alerts when:

  • A file is shared with more than a specified number of users
  • Sharing links haven't been accessed in 30+ days
  • Sensitive content is shared externally

Implement Information Barriers

For organizations with strict data segregation requirements (legal, financial services, healthcare), information barriers prevent Copilot from surfacing content across defined boundaries. A lawyer in M&A shouldn't see files from the litigation team, even if sharing permissions accidentally allow it.

User Education

Tell your employees the truth: OneDrive is not a personal drive. It's a corporate-managed storage service that happens to be assigned to individual users. Anything stored there is subject to:

  • Corporate data policies
  • eDiscovery and legal holds
  • Admin access
  • And now, Copilot indexing

Encourage users to review their shared files regularly. Microsoft provides a "Shared by me" view in OneDrive — most users have never looked at it.

The Readiness Assessment Gap

Most organizations skip OneDrive in their Copilot readiness assessments, focusing instead on SharePoint and Teams. This is a mistake. OneDrive often contains the most sensitive personal and HR-related content in your entire tenant.

A proper Copilot readiness assessment should include:

  • OneDrive sharing audit across all users
  • Default sharing link type verification
  • Sensitivity label coverage for OneDrive content
  • OneDrive-specific DLP policies
  • User education on OneDrive privacy limitations

What Microsoft Should Do (But Hasn't)

Microsoft could solve much of this with better defaults and clearer user communication:

  1. Default to "Specific people" for all sharing — not "People in your organization"
  2. Show Copilot access warnings when sharing files — "This file will be accessible to Copilot for all recipients"
  3. Provide a OneDrive Copilot audit tool — show users exactly which of their files Copilot can surface to others
  4. Auto-expire sharing links by default — instead of making them permanent

Until Microsoft makes these changes, the burden falls on IT admins to lock down OneDrive before Copilot turns personal files into public knowledge.

The Bottom Line

OneDrive + Copilot is not inherently dangerous. It's dangerous when organizations deploy Copilot without understanding how OneDrive sharing actually works. The gap between user expectations ("my files are private") and reality ("my files are as private as my sharing settings allow") is where data breaches happen.

Audit your OneDrive sharing. Fix your defaults. Educate your users. Do it before Copilot does it for you — by surfacing a salary spreadsheet in someone's afternoon prompt.


Take Action Now

Don't wait for a security incident to assess your Copilot readiness. Run a free CopilotScan assessment → and get your readiness report in under 5 minutes.