[{"data":1,"prerenderedAt":2443},["ShallowReactive",2],{"authors_data":3,"content-de-list-f9a3f5c111a24":344},{"id":4,"extension":5,"meta":6,"stem":342,"__hash__":343},"authors_data/authors.json","json",{"path":7,"Alexander Schlindwein":8,"Sophie Luna":14,"Nadine Kern":22,"Karsten Kleinschmidt":29,"Julian Wendt":35,"Holger Bunkradt":40,"Ralf Mania":46,"Oliver Kieselbach":52,"Steffen Schwerdtfeger":58,"Gunnar Winter":66,"Jan Petersen":71,"Thorsten Kunzi":76,"Moritz Pohl":80,"Thorben Pöschus":85,"Christoph Hannebauer":91,"Marco Scheel":95,"Christopher Brumm":100,"Florian Klante":107,"Niklas Bachmann":112,"Nils Krautkrämer":117,"Patrick Treptau":123,"Peter Beckendorf":128,"Patrick Sobau":133,"Jörg Wunderlich":138,"Michael Breither":142,"Christian Kanja":147,"Zeba Hoffmann":153,"Jochen Fröhlich":158,"Jan Geisbauer":162,"Gerrit Reinke":174,"Christian Kordel":180,"Stephan Wälde":184,"Carolin Kanja":189,"Adrian Ritter":195,"Marvin Bangert":200,"Thorsten Pickhan":206,"Christian Lorenz":212,"Denis Böhm":217,"Fabian Bader":222,"Juan Jose Fernandez Perez":228,"Mahschid Sayyar":233,"Benjamin Dassow":238,"Markus Walschburger":243,"Jonathan Haist":248,"Daniel Rohregger":253,"Thomas Naunheim":258,"Florian Stöckl":263,"Pascal Asch":268,"Markus Kättner":273,"Anna Ulbricht":280,"body":287,"title":341,"Thorben Poeschus":85,"Nils Krautkraemer":117,"Joerg Wunderlich":138,"Jochen Froehlich":158,"Stephan Waelde":184,"Denis Boehm":217,"Florian Stoeckl":263,"Markus Kaettner":273},"/authors",{"display_name":9,"avatar":10,"permalink":11,"twitter":12,"linkedin":13},"Alexander Schlindwein","people/people-alexander-rudolph.png","/authors/alexander-schlindwein","AlexanderOnIT","schlindwein-alexander",{"display_name":15,"avatar":16,"permalink":17,"twitter":18,"linkedin":19,"imageOffsetLeft":20,"imageOffsetTop":21},"Sophie Luna","c_thumb,h_1600,w_1600/people/people-sophie-luna.jpg","/authors/sophie-luna","glueckkanjagab","../company/glueckkanja-gab","58%","67%",{"display_name":23,"avatar":24,"permalink":25,"twitter":26,"linkedin":27,"imageOffsetTop":28},"Nadine Kern","people/people-nadine-kern.png","/authors/nadine-kern","nadineausRT","nadine-kern","72%",{"display_name":30,"avatar":31,"permalink":32,"twitter":33,"linkedin":34},"Karsten Kleinschmidt","people/people-karsten-kleinschmidt.png","/authors/karsten-kleinschmidt","KarstenonIT","karstenkleinschmidt",{"display_name":36,"avatar":37,"permalink":38,"linkedin":39},"Julian Wendt","people/people-julian-wendt.png","/authors/julian-wendt","julian-wendt",{"display_name":41,"avatar":42,"permalink":43,"linkedin":44,"twitter":45},"Holger Bunkradt","people/people-holger-bunkradt.png","/authors/holger-bunkradt","holger-bunkradt-12b5053b","hbunkradt",{"display_name":47,"avatar":48,"permalink":49,"linkedin":50,"twitter":51},"Ralf Mania","people/people-ralf-mania.png","/authors/ralf-mania","ralf-mania-146a2757","RaMa1976",{"display_name":53,"avatar":54,"permalink":55,"linkedin":56,"twitter":57},"Oliver Kieselbach","people/people-oliver-kieselbach.png","/authors/oliver-kieselbach","oliver-kieselbach-a4a3409","okieselbT",{"display_name":59,"avatar":60,"permalink":61,"linkedin":62,"twitter":63,"imageOffsetTop":64,"imageOffsetLeft":65},"Steffen Schwerdtfeger","people/people-steffen-schwerdtfeger.png","/authors/steffen-schwerdtfeger","steffen-schwerdtfeger","SteffenAtCloud","79%","51%",{"display_name":67,"avatar":68,"permalink":69,"twitter":18,"linkedin":70},"Gunnar Winter","c_thumb,h_1600,w_1600/people/people-gunnar-winter.jpg","/authors/gunnar-winter","company/glueckkanja-gab",{"display_name":72,"avatar":73,"permalink":74,"twitter":18,"linkedin":75},"Jan Petersen","c_thumb,h_1600,w_1600/people/jan-petersen.png","/authors/jan-petersen","jan-petersen-26a901",{"display_name":77,"avatar":78,"permalink":79,"twitter":18,"linkedin":70,"imageOffsetTop":28},"Thorsten Kunzi","c_thumb,h_1600,w_1600/people/author-thorsten-kunzi.png","/authors/thorsten-kunzi",{"display_name":81,"avatar":82,"permalink":83,"twitter":18,"linkedin":84},"Dr. Moritz Pohl","c_thumb,h_1600,w_1600/people/people-moritz-pohl.png","/authors/moritz-pohl","dr-moritz-pohl",{"display_name":86,"avatar":87,"permalink":88,"twitter":89,"linkedin":90},"Thorben Pöschus","c_thumb,h_1600,w_1600/people/thorben.poeschus.png","/authors/thorben-poeschus","TPO901","thorben-pöschus-624693b7",{"display_name":92,"avatar":93,"permalink":94,"twitter":18,"linkedin":70,"imageOffsetTop":28},"Dr. Christoph Hannebauer","people/people-christoph-hannebauer.png","/authors/christoph-hannebauer",{"display_name":96,"avatar":97,"permalink":98,"twitter":99,"linkedin":99},"Marco Scheel","c_thumb,h_1600,w_1600/people/people-marco-scheel.png","/authors/marco-scheel","marcoscheel",{"display_name":101,"avatar":102,"permalink":103,"twitter":104,"linkedin":105,"imageOffsetTop":106},"Christopher Brumm","c_thumb,h_1600,w_1600/people/people-christopher-brumm.jpg","/authors/christopher-brumm","cbrhh","christopherbrumm","66%",{"display_name":108,"avatar":109,"permalink":110,"linkedin":111,"twitter":18},"Florian Klante","c_thumb,h_1600,w_1600/people/florian-klante.jpg","/authors/florian-klante","florian-klante-6031b31b",{"display_name":113,"avatar":114,"permalink":115,"linkedin":116,"twitter":18},"Niklas Bachmann","c_thumb,h_1600,w_1600/people/niklas.bachmann.png","/authors/niklas-bachmann","niklas-bachmann-66a863158",{"display_name":118,"avatar":119,"permalink":120,"twitter":121,"linkedin":122},"Nils Krautkrämer","c_thumb,h_1600,w_1600/people/nils-krautkraemer.png","/authors/nils-krautkraemer","KrauNils","nils-krautkrämer-8b04bb250",{"display_name":124,"avatar":125,"permalink":126,"linkedin":127,"twitter":18},"Patrick Treptau","c_thumb,h_1600,w_1600/people/people-patrick-treptau.png","/authors/patrick-traptau","ptreptau",{"display_name":129,"avatar":130,"permalink":131,"linkedin":132,"twitter":18,"imageOffsetTop":28},"Peter Beckendorf","c_thumb,h_1600,w_1600/people/peter-beckendorf.png","/authors/peter-beckendorf","peter-beckendorf-29a239b1",{"display_name":134,"avatar":135,"permalink":136,"linkedin":137,"twitter":18},"Patrick Sobau","c_thumb,h_1600,w_1600/people/patrick-sobau.png","/authors/patrick-sobau","patrick-sobau",{"display_name":139,"avatar":140,"permalink":141,"twitter":18},"Jörg Wunderlich","c_thumb,h_1600,w_1600/people/joerg-wunderlich.png","/authors/joerg-wunderlich",{"display_name":143,"avatar":144,"permalink":145,"twitter":18,"linkedin":146},"Michael Breither","c_thumb,h_1600,w_1600/people/people-michael-breither.jpg","/authors/michael-breither","michaelbreither",{"display_name":148,"avatar":149,"permalink":150,"twitter":151,"linkedin":152},"Christian Kanja","c_thumb,h_1600,w_1600/people/people-christian-kanja.png","/authors/christian-kanja","cekageka","christian-kanja",{"display_name":154,"avatar":155,"permalink":156,"linkedin":157,"twitter":18},"Zeba Hoffmann","c_thumb,h_1600,w_1600/people/zeba-hoffmann.png","/authors/zeba-hoffmann","zebahoffmann",{"display_name":159,"avatar":160,"permalink":161,"twitter":18,"linkedin":70},"Jochen Fröhlich","c_thumb,h_1600,w_1600/people/people-jochen-froehlich.png","/authors/jochen-froehlich",{"display_name":163,"avatar":164,"permalink":165,"twitter":166,"linkedin":166,"imageOffsetTop":28,"socials":167},"Jan Geisbauer","c_thumb,h_1600,w_1600/people/people-jan-geisbauer-csoc.png","/authors/jan-geisbauer","JanGeisbauer",[168,171],{"text":169,"href":170},"Blog","https://emptydc.com",{"text":172,"href":173},"Podcast","https://hairlessinthecloud.com",{"display_name":175,"avatar":176,"permalink":177,"twitter":178,"linkedin":179},"Gerrit Reinke","c_thumb,h_1600,w_1600/people/gerrit-reinke.png","/authors/gerrit-reinke","GLWRe","glwr",{"display_name":181,"avatar":182,"permalink":183,"twitter":18,"linkedin":70},"Christian Kordel","c_thumb,h_1600,w_1600/people/christian-kordel.png","/authors/christian-kordel",{"display_name":185,"avatar":186,"permalink":187,"twitter":188,"linkedin":70},"Stephan Wälde","c_thumb,h_1600,w_1600/people/people-stephan-waelde.png","/authors/stephan-waelde","stephanwaelde",{"display_name":190,"avatar":191,"permalink":192,"twitter":193,"linkedin":194},"Carolin Kanja","c_thumb,h_1600,w_1600/people/people-carolin-kanja.jpg","/authors/carolin-kanja","fraukanja","carolin-kanja",{"display_name":196,"avatar":197,"permalink":198,"twitter":199,"linkedin":199},"Adrian Ritter","c_thumb,h_1600,w_1600/people/people-adrian-ritter.png","/authors/adrian-ritter","adrianritter",{"display_name":201,"avatar":202,"permalink":203,"twitter":204,"linkedin":205},"Marvin Bangert","c_thumb,h_1600,w_1600/people/people-marvin-bangert.png","/authors/marvin-bangert","marvinbangert","marvin-bangert",{"display_name":207,"avatar":208,"permalink":209,"twitter":210,"linkedin":211},"Thorsten Pickhan","c_thumb,h_1600,w_1600/people/people-thorsten-pickhan.png","/authors/thorsten-pickhan","tpickhan","thorsten-pickhan",{"display_name":213,"avatar":214,"permalink":215,"linkedin":216,"twitter":18},"Christian Lorenz","c_thumb,h_1600,w_1600/people/people-christian-lorenz.png","/authors/christian-lorenz","christianlorenz95",{"display_name":218,"avatar":219,"permalink":220,"linkedin":221,"twitter":18},"Denis Böhm","c_thumb,h_1600,w_1600/people/people-denis-boehm.png","/authors/denis-boehm","denis-böhm-3bb834135",{"display_name":223,"avatar":224,"permalink":225,"linkedin":226,"twitter":227},"Fabian Bader","c_thumb,h_1600,w_1600/people/people-fabian-bader.jpg","/authors/fabian-bader","fabianbader","fabian_bader",{"display_name":229,"avatar":230,"permalink":231,"linkedin":232},"Juan Jose Fernandez Perez","c_thumb,h_1600,w_1600/people/people-juan-jose-fernandez.jpg","/authors/juan-jose-fernandez-perez","juan-jose-fernandez-perez-8016055",{"display_name":234,"avatar":235,"permalink":236,"linkedin":237},"Mahschid Sayyar","c_thumb,h_1600,w_1600/people/people-mahschid-sayyar.jpg","/authors/mahschid-sayyar","mahschid-sayyar-97544463",{"display_name":239,"avatar":240,"permalink":241,"linkedin":242},"Benjamin Dassow","c_thumb,h_1600,w_1600/people/people-benjamin-dassow.jpg","/authors/benjamin-dassow","benjamin-dassow",{"display_name":244,"avatar":245,"permalink":246,"linkedin":247},"Markus Walschburger","c_thumb,h_1600,w_1600/people/people-markus-walschburger.jpg","/authors/markus-walschburger","markus-walschburger",{"display_name":249,"avatar":250,"permalink":251,"linkedin":252,"imageOffsetTop":28},"Jonathan Haist","c_thumb,h_1600,w_1600/people/people-jonathan-haist.jpg","/authors/jonathan-haist","jonathanhaist",{"display_name":254,"avatar":255,"permalink":256,"linkedin":257,"imageOffsetTop":28},"Daniel Rohregger","c_thumb,h_1600,w_1600/people/people-daniel-rohregger.jpg","/authors/daniel-rohregger","drohregger",{"display_name":259,"avatar":260,"permalink":261,"linkedin":262,"imageOffsetTop":106},"Thomas Naunheim","c_thumb,h_1600,w_1600/people/people-thomas-naunheim.jpg","/authors/thomas-naunheim","thomasnaunheim",{"display_name":264,"avatar":265,"permalink":266,"linkedin":267,"imageOffsetTop":106},"Florian Stöckl","c_thumb,h_1600,w_1600/people/people-florian-stoeckl.jpg","/authors/florian-stoeckl","florianstoeckl",{"display_name":269,"avatar":270,"permalink":271,"linkedin":272,"imageOffsetTop":106},"Pascal Asch","c_thumb,h_1600,w_1600/people/Pascal.Asch.648.jpg","/authors/pascal-asch","pascal-asch",{"display_name":274,"avatar":275,"permalink":276,"linkedin":277,"imageOffsetTop":278,"imageOffsetLeft":279},"Markus Kättner","c_thumb,h_1600,w_1600/people/markus-kaettner.jpg","/authors/markus-kaettner","markus-kättner-b600119","62%","63%",{"display_name":281,"avatar":282,"permalink":283,"linkedin":284,"imageOffsetTop":285,"imageOffsetLeft":286},"Anna Ulbricht","c_thumb,h_1600,w_1600/people/anna-katharina.ulbricht-09.png","/authors/anna-ulbricht","anna-katharina-u-a67702199","70%","50%",{"Alexander Schlindwein":288,"Sophie Luna":289,"Nadine Kern":290,"Karsten Kleinschmidt":291,"Julian Wendt":292,"Holger Bunkradt":293,"Ralf Mania":294,"Oliver Kieselbach":295,"Steffen Schwerdtfeger":296,"Gunnar Winter":297,"Jan Petersen":298,"Thorsten Kunzi":299,"Moritz Pohl":300,"Thorben Pöschus":301,"Christoph Hannebauer":302,"Marco Scheel":303,"Christopher Brumm":304,"Florian Klante":305,"Niklas Bachmann":306,"Nils Krautkrämer":307,"Patrick Treptau":308,"Peter Beckendorf":309,"Patrick Sobau":310,"Jörg Wunderlich":311,"Michael Breither":312,"Christian Kanja":313,"Zeba Hoffmann":314,"Jochen Fröhlich":315,"Jan Geisbauer":316,"Gerrit Reinke":320,"Christian Kordel":321,"Stephan Wälde":322,"Carolin Kanja":323,"Adrian Ritter":324,"Marvin Bangert":325,"Thorsten Pickhan":326,"Christian Lorenz":327,"Denis Böhm":328,"Fabian Bader":329,"Juan Jose Fernandez Perez":330,"Mahschid Sayyar":331,"Benjamin Dassow":332,"Markus Walschburger":333,"Jonathan Haist":334,"Daniel Rohregger":335,"Thomas Naunheim":336,"Florian Stöckl":337,"Pascal Asch":338,"Markus Kättner":339,"Anna Ulbricht":340},{"display_name":9,"avatar":10,"permalink":11,"twitter":12,"linkedin":13},{"display_name":15,"avatar":16,"permalink":17,"twitter":18,"linkedin":19,"imageOffsetLeft":20,"imageOffsetTop":21},{"display_name":23,"avatar":24,"permalink":25,"twitter":26,"linkedin":27,"imageOffsetTop":28},{"display_name":30,"avatar":31,"permalink":32,"twitter":33,"linkedin":34},{"display_name":36,"avatar":37,"permalink":38,"linkedin":39},{"display_name":41,"avatar":42,"permalink":43,"linkedin":44,"twitter":45},{"display_name":47,"avatar":48,"permalink":49,"linkedin":50,"twitter":51},{"display_name":53,"avatar":54,"permalink":55,"linkedin":56,"twitter":57},{"display_name":59,"avatar":60,"permalink":61,"linkedin":62,"twitter":63,"imageOffsetTop":64,"imageOffsetLeft":65},{"display_name":67,"avatar":68,"permalink":69,"twitter":18,"linkedin":70},{"display_name":72,"avatar":73,"permalink":74,"twitter":18,"linkedin":75},{"display_name":77,"avatar":78,"permalink":79,"twitter":18,"linkedin":70,"imageOffsetTop":28},{"display_name":81,"avatar":82,"permalink":83,"twitter":18,"linkedin":84},{"display_name":86,"avatar":87,"permalink":88,"twitter":89,"linkedin":90},{"display_name":92,"avatar":93,"permalink":94,"twitter":18,"linkedin":70,"imageOffsetTop":28},{"display_name":96,"avatar":97,"permalink":98,"twitter":99,"linkedin":99},{"display_name":101,"avatar":102,"permalink":103,"twitter":104,"linkedin":105,"imageOffsetTop":106},{"display_name":108,"avatar":109,"permalink":110,"linkedin":111,"twitter":18},{"display_name":113,"avatar":114,"permalink":115,"linkedin":116,"twitter":18},{"display_name":118,"avatar":119,"permalink":120,"twitter":121,"linkedin":122},{"display_name":124,"avatar":125,"permalink":126,"linkedin":127,"twitter":18},{"display_name":129,"avatar":130,"permalink":131,"linkedin":132,"twitter":18,"imageOffsetTop":28},{"display_name":134,"avatar":135,"permalink":136,"linkedin":137,"twitter":18},{"display_name":139,"avatar":140,"permalink":141,"twitter":18},{"display_name":143,"avatar":144,"permalink":145,"twitter":18,"linkedin":146},{"display_name":148,"avatar":149,"permalink":150,"twitter":151,"linkedin":152},{"display_name":154,"avatar":155,"permalink":156,"linkedin":157,"twitter":18},{"display_name":159,"avatar":160,"permalink":161,"twitter":18,"linkedin":70},{"display_name":163,"avatar":164,"permalink":165,"twitter":166,"linkedin":166,"imageOffsetTop":28,"socials":317},[318,319],{"text":169,"href":170},{"text":172,"href":173},{"display_name":175,"avatar":176,"permalink":177,"twitter":178,"linkedin":179},{"display_name":181,"avatar":182,"permalink":183,"twitter":18,"linkedin":70},{"display_name":185,"avatar":186,"permalink":187,"twitter":188,"linkedin":70},{"display_name":190,"avatar":191,"permalink":192,"twitter":193,"linkedin":194},{"display_name":196,"avatar":197,"permalink":198,"twitter":199,"linkedin":199},{"display_name":201,"avatar":202,"permalink":203,"twitter":204,"linkedin":205},{"display_name":207,"avatar":208,"permalink":209,"twitter":210,"linkedin":211},{"display_name":213,"avatar":214,"permalink":215,"linkedin":216,"twitter":18},{"display_name":218,"avatar":219,"permalink":220,"linkedin":221,"twitter":18},{"display_name":223,"avatar":224,"permalink":225,"linkedin":226,"twitter":227},{"display_name":229,"avatar":230,"permalink":231,"linkedin":232},{"display_name":234,"avatar":235,"permalink":236,"linkedin":237},{"display_name":239,"avatar":240,"permalink":241,"linkedin":242},{"display_name":244,"avatar":245,"permalink":246,"linkedin":247},{"display_name":249,"avatar":250,"permalink":251,"linkedin":252,"imageOffsetTop":28},{"display_name":254,"avatar":255,"permalink":256,"linkedin":257,"imageOffsetTop":28},{"display_name":259,"avatar":260,"permalink":261,"linkedin":262,"imageOffsetTop":106},{"display_name":264,"avatar":265,"permalink":266,"linkedin":267,"imageOffsetTop":106},{"display_name":269,"avatar":270,"permalink":271,"linkedin":272,"imageOffsetTop":106},{"display_name":274,"avatar":275,"permalink":276,"linkedin":277,"imageOffsetTop":278,"imageOffsetLeft":279},{"display_name":281,"avatar":282,"permalink":283,"linkedin":284,"imageOffsetTop":285,"imageOffsetLeft":286},"Authors","authors","Qkbr0Ywae26Kxloa5JhqFSd0eMg8Ccs9DhjH7FyMzvY",[345,425,574,1154,1936,2190,2378],{"id":346,"title":347,"author":348,"body":349,"cta":397,"description":355,"eventid":397,"extension":398,"hideInRecent":399,"layout":400,"meta":401,"moment":403,"navigation":417,"path":418,"seo":419,"stem":420,"tags":421,"webcast":399,"__hash__":424},"content_de/posts/2023-11-15-microsoft-security-copilot-partner.md","glueckkanja ist einer der ersten Microsoft Security Copilot Partner",[190],{"type":350,"value":351,"toc":391},"minimal",[352,356,359,368,371,374,379,382,385,388],[353,354,355],"p",{},"glueckkanja verkündet seine exklusive Teilnahme an der Microsoft Security Copilot Partner Private Preview – eine wegweisende Anerkennung seiner erstklassigen Expertise in Microsoft-Sicherheitstechnologien. Ausgewählt wegen seiner langjährigen Erfahrung, seiner innovativen Denkweise und der engen, vertrauensvollen Partnerschaft mit Microsoft, steht glueckkanja an der Spitze, wenn es darum geht, bahnbrechende Sicherheitsfunktionen zu erforschen und maßgebliches Feedback zu zukunftsweisenden Technologien zu liefern.",[353,357,358],{},"\"KI ist eine der prägendsten Technologien unserer Zeit und hat das Potenzial, bedeutende, grundlegende Fortschritte in der Cybersecurity zu erzielen\", sagte Ann Johnson, Corporate Vice President, Microsoft Security Business Development. \"Security ist ein Teamsport, und wir freuen uns, mit unserem Security Copilot Partnerökosystem zusammenzuarbeiten, um Lösungen zu liefern, die die Cyberabwehr stärken und das Versprechen der KI Wirklichkeit werden lassen.\"",[353,360,361,362],{},"glueckkanja arbeitet mit den Microsoft-Produktteams zusammen, um die Produktentwicklung des Security Copilots in mehreren Bereichen zu formen, einschließlich der Validierung und Verfeinerung neuer und kommender Szenarien, der Bereitstellung von Feedback zur Produktentwicklung und zu Betriebsabläufen, die in zukünftige Produktveröffentlichungen einfließen sollen, sowie der Validierung und Rückmeldung zu APIs zur Unterstützung der Erweiterbarkeit des Security Copilots. Um mehr zu erfahren, ",[363,364,367],"a",{"href":365,"target":366},"https://aka.ms/IgniteFY24SecurityBlogPost","_blank","lesen Sie die Ankündigung.",[353,369,370],{},"\"Für einen Analysten ist die Arbeit mit dem Security Copilot wie das Tragen eines Exoskeletts. Alle seine Fähigkeiten und sein Wissen werden plötzlich und massiv verstärkt. Die Arbeit mit komplexen Kontexten wird einfach und kann in beispielloser Zeit erledigt werden. Wir bei glueckkanja lieben Security Copilot\", sagte Jan Geisbauer, Security Lead bei glueckkanja AG.",[353,372,373],{},"Security Copilot ist das erste KI-gestützte Sicherheitsprodukt, das es Sicherheitsexperten ermöglicht, schnell auf Bedrohungen zu reagieren, Signale mit Maschinengeschwindigkeit zu verarbeiten und das Risikoexposition innerhalb von Minuten zu bewerten. Es kombiniert ein fortschrittliches Large Language Model (LLM) mit einem sicherheitsspezifischen Modell, das durch Microsofts einzigartige globale Cyberbedrohungsintelligenz und mehr als 65 Billionen tägliche Signale bereichert wird.",[375,376,378],"h3",{"id":377},"über-glueckkanja","Über glueckkanja",[353,380,381],{},"glueckkanja, ein renommierter Cloud Managed Service Provider, ist Top Microsoft Partner, der umfassende Cloud-Lösungen anbietet. Mit einem einheitlichen Blueprint-Ansatz verwendet glueckkanja Infrastructure as Code, um Kundeninfrastrukturen in die Cloud zu überführen und zu unterstützen.",[353,383,384],{},"Mit einem Fokus auf den sicheren und zuverlässigen Betrieb von Workplace Lösungen, Azure Services und Security Infrastrukturen bedient glueckkanja sowohl mittelständische als auch große Unternehmen. Das Cloud Security Operations Center von glueckkanja schützt kontinuierlich die Infrastrukturen der Kunden und ist in der Lage, Vorfälle zu bekämpfen und Schutzstrategien durchzusetzen. Mit einem 24/7-Incident-Response- und APT-Team stellt glueckkanja sicher, dass Kunden sofortige Notfallhilfe und Verteidigung gegen Cyberbedrohungen erhalten und dass ihre Infrastruktur immer auf dem neuesten Stand der Sicherheitsstandards ist.",[353,386,387],{},"Um ein nahtloses Cloud natives Microsoft Erlebnis zu gewährleisten, hat glueckkanja eigene Produkte entwickelt. Diese Tools ermöglichen eine vollständig geschützte, komplett Cloud zentrierte Infrastruktur. Ihre Produktpalette umfasst KONNEKT für das lokale Arbeiten mit Office 365 Daten, RADIUSaaS und SCEPman für eine sichere Netzwerkauthentifizierung ohne Server, RealmJoin für die Cloud Softwareverteilung und Unified Contacts für eine vereinfachte Kontaktsuche in Microsoft Teams.",[353,389,390],{},"glueckkanja gehörte weltweit zu den ersten Partnern, die die Auszeichnung Microsoft Verified Managed Extended Detection and Response (MXDR) erhalten haben. Mit einem Team von fast 200 Experten wurde glueckkanja in den Jahren 2017, 2019, 2020, 2022 und 2023 zum Microsoft Worldwide Partner of the Year ernannt. Seit 2019 befindet sich glueckkanja regelmäßig an der Spitze des ISG Microsoft 365 Deutschland-Quadranten. Darüber hinaus gehört glueckkanja mit seinen Innovationen zu den TOP 100 Unternehmen in Deutschland, und eine bemerkenswerte Bewertung von 4,8/5 auf kununu festigt seinen Ruf als führender Arbeitgeber im Mittelstand.",{"title":392,"searchDepth":393,"depth":393,"links":394},"",2,[395],{"id":377,"depth":396,"text":378},3,null,"md",false,"post",{"titleClass":402,"date":403,"categories":404,"blogtitlepic":406,"socialimg":407,"customExcerpt":408,"keywords":409,"hreflang":410},"h2-font-size","2023-11-15",[405],"Corporate","head-security-copilot","/blog/heads/head-security-copilot.jpg","glueckkanja gab heute bekannt, dass Microsoft das Unternehmen für das Microsoft Security Copilot Partner Private Preview ausgewählt hat. Mit seiner Expertise in Microsoft Sicherheitstechnologien wird glueckkanja diese KI-getriebene Sicherheitsinitiative mitgestalten. Das Unternehmen wird eng mit den Produktteams von Microsoft zusammenarbeiten, um die Produktentwicklung des Security Copilot auf vielfältige Weise zu unterstützen. Diese Zusammenarbeit ist ein wichtiger Meilenstein in den Bemühungen von glueckkanja, seinen Kunden innovative und sichere Lösungen anzubieten.","Microsoft Security Copilot, AI in Cybersecurity, Cybersecurity Solutions, Microsoft Security Technologies, Security Copilot Development, AI-Powered Security Product, Cyber Threat Response, Global Threat Intelligence, Tech Innovation in Security, Advanced Large Language Model, Microsoft Ignite, Microsoft Copilot Flight Engineers",[411,414],{"lang":412,"href":413},"en","/blog/corporate/2023/11/microsoft-security-copilot-partner-en",{"lang":415,"href":416},"es","/blog/corporate/2023/11/microsoft-security-copilot-partner-es",true,"/posts/2023-11-15-microsoft-security-copilot-partner",{"title":347,"description":355},"posts/2023-11-15-microsoft-security-copilot-partner",[405,422,423],"Security","Copilot","eGABWiNqRF00ORTzoc-etGAeYAojE2Mk-gFe1I60XZI",{"id":426,"title":427,"author":428,"body":429,"cta":397,"description":433,"eventid":397,"extension":398,"hideInRecent":399,"layout":400,"meta":497,"moment":499,"navigation":417,"path":568,"seo":569,"stem":570,"tags":571,"webcast":399,"__hash__":573},"content_de/posts/2024-04-30-gk-at-rsac.md","glueckkanja @ RSA Conference",[190],{"type":350,"value":430,"toc":492},[431,434,442,447,450,458,461,465,467,470,473,480,484,486,489],[353,432,433],{},"Seit 32 Jahren ist die RSA Conference ein wichtiger Treiber innerhalb der Cybersecurity Community. In einer Welt, in der die Gefahren von Attacken täglich steigen, hat sich die Messe zu einer Pflichtveranstaltung für alle entwickelt, die sich mit Sicherheit im Netz beschäftigen. Wie immer findet die renommierte Konferenz im sonnigen Kalifornien statt und glueckkanja ist natürlich auch wieder mit von der Partie.",[353,435,436,437,441],{},"Als Mitglied der ",[363,438,440],{"href":439,"target":366},"https://www.microsoft.com/de-de/security/business/intelligent-security-association","Microsoft Intelligent Security Association (MISA)",", einer Vereinigung wichtiger Sicherheitspartner von Microsoft, haben wir das gemeinsame Ziel, erstklassige Sicherheitslösungen zu entwickeln und Kunden vor Bedrohungen zu schützen.",[443,444,446],"h2",{"id":445},"ai-im-fokus-der-rsa-conference-2024","AI im Fokus der RSA Conference 2024",[353,448,449],{},"{: .h3-font-size}",[353,451,452,453,457],{},"Dieses Jahr setzt Microsoft den Fokus des ",[363,454,456],{"href":455,"target":366},"https://www.microsoft.com/en-us/security/blog/2024/04/04/explore-microsofts-ai-innovations-at-rsa-conference-2024","Konferenzprogramms"," voll auf den Copilot for Security, die neuartige AI-Lösung zur Unterstützung von Sicherheits- und IT-Experten bei der Identifizierung unerkannter Risiken.",[353,459,460],{},"Ein spannendes Thema in der aktuellen Diskussion, welches unser Security Lead, Jan Geisbauer, gerne aufgreift. In seiner Session am Microsoft Stand (07.05., 17:30 - 17:50 Uhr) stellt er während der RSA Conference die neue Technologie vor, zeigt ihre Möglichkeiten auf, weist aber auch auf aktuellen Grenzen hin. Die wichtigsten Punkte haben wir hier zusammengefasst.",[443,462,464],{"id":463},"microsoft-copilot-for-security-zur-erkennung-von-gefahren","Microsoft Copilot for Security zur Erkennung von Gefahren",[353,466,449],{},[353,468,469],{},"Lange Zeit stützte sich die Risikoerkennung auf die sogenannte 'Signature-Based Detection' – ein Verfahren, das Gefahren anhand bekannter Muster identifiziert. Da sich die Bedrohungslandschaft jedoch ständig weiterentwickelt und Angreifer ihre Methoden fortlaufend anpassen, bietet dieser Ansatz allein heute nicht mehr den erforderlichen Schutz. Der nächste Schritt in der Weiterentwicklung der Sicherheitstechnologie umfasst die Nutzung von Big Data zur Gefahrenerkennung. Moderne Softwarelösungen analysieren automatisch große Datensätze, um Muster und potenzielle Risiken zu identifizieren. Um dabei 'False Positives' effektiv zu reduzieren, ist allerdings die Expertise von geschultem Fachpersonal unerlässlich. Angesichts der immensen Datenmengen, die verarbeitet werden müssen, stellt dies hohe Anforderungen an die Ressourcen. Genau hier bietet der Microsoft Copilot for Security innovative Lösungen, die darauf abzielen, Sicherheitsteams zu unterstützen und den Schutz zu optimieren.",[353,471,472],{},"Neben Zusammenfassungen der wichtigsten Fakten von Datensicherheitsvorfällen mit Lösungsvorschlägen, kann Copilot for Security natürlich auch Prompts rund um das Thema Cybersecurity und die eigenen Systeme beantworten. Das Tool erledigt dabei auch komplexere Aufgaben, beispielsweise die Formulierung eigener KQL-Abfragen, um spezifische Sicherheitsdaten zu extrahieren. Eine überaus hilfreiche Funktion ist die Skriptanalyse, welche die Untersuchung von verdächtigen Skripten und Befehlszeilen massiv beschleunigt.",[353,474,475],{},[476,477],"img",{"alt":478,"src":479},"Ein Screenshot der Skriptanalyse Funktion des Copilot for Security von Microsoft","https://res.cloudinary.com/c4a8/image/upload/v1714461543/blog/pics/rsac-copilot-for-security-script-analysis.png",[443,481,483],{"id":482},"ergänzen-sie-ihr-system-mit-copilot-for-security","Ergänzen Sie Ihr System mit Copilot for Security",[353,485,449],{},[353,487,488],{},"Wie jedes Large Language Model (LLM) benötigt Copilot for Security noch das prüfende Auge von Expertinnen und Experten. Doch gerade bei der Analyse von rohen Daten stellt der Copilot for Security ein mächtiges Tool dar, dass es Kunden und Microsoft Security Service Providern (MSSP) erlaubt, schnellere und besser informierte Entscheidungen zu treffen.",[353,490,491],{},"Wir bei glueckkanja sehen es als unsere Aufgabe an, uns täglich zu verbessern, um neue und innovative Wege zu finden, unsere Kunden vor den wachsenden digitalen Gefahren des Alltags zu schützen. Daher empfehlen wir unseren Kunden, Copilot for Security in ihre Systeme zu integrieren und unterstützen gerne bei der Planung, Implementierung und der Nutzung des Tools.",{"title":392,"searchDepth":393,"depth":393,"links":493},[494,495,496],{"id":445,"depth":393,"text":446},{"id":463,"depth":393,"text":464},{"id":482,"depth":393,"text":483},{"seoTitle":498,"titleClass":402,"date":499,"categories":500,"blogtitlepic":501,"socialimg":502,"customExcerpt":503,"keywords":504,"contactInContent":505,"hreflang":562,"scripts":567},"glueckkanja auf der RSA Conference 2024","2024-04-30",[422],"head-rsa-conference-2024","/blog/heads/head-rsa-conference-2024.png","Wenn die RSA Conference vom 6. bis 9. Mai 2024 ihre Pforten öffnet, wird das glueckkanja Team rund um CEO Christian Kanja und Security Lead Jan Geisbauer auch wieder vor Ort sein. In diesem Jahr werfen wir einen genauen Blick auf den neuen Microsoft Copilot for Security.","glueckkanja, RSA Conference 2024, Microsoft Copilot for Security, Cybersecurity AI Solutions, MISA Awards, Security MSSP of the Year, Signature-Based Detection, Microsoft Intelligent Security Association, Big Data Security Analysis, Microsoft Security Service Provider, AI Cybersecurity Innovation, Script Analysis Tool",{"quote":417,"infos":506},{"headline":507,"subline":508,"level":443,"textStyling":509,"flush":510,"person":511,"form":526},"Jetzt beraten lassen","Sie haben noch Fragen? Wir helfen Ihnen gerne dabei, Ihr Unternehmen mit Microsoft Copilot for Security noch sicherer zu machen.","text-light","justify-content-end",{"image":512,"cloudinary":417,"alt":163,"name":163,"quotee":163,"quoteeTitle":513,"quote":514,"detailsHeader":515,"details":516},"/people/people-jan-geisbauer-csoc.jpg","Cyber Security Lead","Mit Copilot for Security arbeiten, heißt für Analysten, ein Exoskelett zu tragen. Es erweitert ihre Fähigkeiten und ihr Wissen massiv. Bei glueckkanja sind wir begeisterte Befürworter von Copilot for Security.","Wir freuen uns darauf,\u003Cbr />von Ihnen zu hören!",[517,522],{"text":518,"href":519,"details":520,"icon":521},"+49 69 4005520","tel:+49 69 4005520","Jetzt anrufen","site/phone",{"text":523,"href":524,"icon":525},"info@glueckkanja.com","mailto:info@glueckkanja.com","site/mail",{"ctaText":527,"cta":528,"method":400,"action":530,"fields":531},"Absenden",{"skin":529},"primary is-light","/send",[532,536,541,545,549,554,557,560],{"type":533,"id":534,"value":535},"hidden","_next","successful",{"label":537,"type":538,"id":539,"required":417,"requiredMsg":540},"Name*","text","name","Bitte geben Sie Ihren Namen an.",{"label":542,"type":538,"id":543,"required":417,"requiredMsg":544},"Unternehmen*","company","Bitte geben Sie Ihr Unternehmen an.",{"label":546,"type":547,"id":547,"required":417,"requiredMsg":548},"Email-Adresse*","email","Bitte geben Sie Ihre E-Mail-Adresse ein.",{"label":550,"type":551,"id":552,"required":417,"requiredMsg":553},"Ihre Daten werden zur Bearbeitung und Beantwortung Ihrer Anfrage bei uns gespeichert. Weitere Informationen zum Datenschutz finden Sie in unserer \u003Ca href=\"/de/datenschutz\">Datenschutzerklärung\u003C/a>.","checkbox","dataprotection","Bitte bestätigen",{"type":533,"id":555,"value":556},"_subject","Anfrage Microsoft Copilot for Security Beratung",{"type":533,"id":558,"value":559},"inbox_key","nis2-consulting",{"type":533,"id":561},"_gotcha",[563,565],{"lang":412,"href":564},"/blog/security/2024/04/gk-at-rsac-en",{"lang":415,"href":566},"/blog/security/2024/04/gk-at-rsac-es",{"slick":417,"form":417},"/posts/2024-04-30-gk-at-rsac",{"title":427,"description":433},"posts/2024-04-30-gk-at-rsac",[572,423,422],"MISA","9sjOqPuDq4W16Bb83fMQ1MzTXxK5IzLJ6CE_R2_6rsQ",{"id":575,"title":576,"author":577,"body":578,"cta":397,"description":392,"eventid":397,"extension":398,"hideInRecent":399,"layout":400,"meta":1107,"moment":1109,"navigation":417,"path":1146,"seo":1147,"stem":1148,"tags":1149,"webcast":399,"__hash__":1153},"content_de/posts/2025-01-09-microsoft-365-copilot.md","Microsoft 365 Copilot sicher einführen: Das müsst ihr wissen",[254],{"type":350,"value":579,"toc":1077},[580,584,586,620,623,625,628,632,635,638,641,645,647,650,653,657,659,662,666,668,671,674,676,679,683,685,688,691,698,701,704,706,709,715,767,770,772,775,778,782,834,837,839,842,851,854,856,859,863,865,868,871,875,877,880,886,889,892,896,898,901,904,906,909,950,953,955,958,964,967,970,972,975,984,987,990,992,995,998,1001,1046,1049,1051,1054,1057],[443,581,583],{"id":582},"übersicht","Übersicht",[353,585,449],{},[587,588,589,596,602,608,614],"ul",{},[590,591,592],"li",{},[363,593,595],{"href":594},"#oversharing-kennen--kontrollieren","Oversharing kennen & kontrollieren",[590,597,598],{},[363,599,601],{"href":600},"#sharepoint-advanced-management","SharePoint Advanced Management",[590,603,604],{},[363,605,607],{"href":606},"#grundlegende-sicherheit-im-tenant-herstellen","Grundlegende Sicherheit im Tenant herstellen",[590,609,610],{},[363,611,613],{"href":612},"#aktualisierung-der-office-applikationen","Aktualisierung der Office-Applikationen",[590,615,616],{},[363,617,619],{"href":618},"#datenschutz--datensicherheit","Datenschutz & Datensicherheit",[443,621,595],{"id":622},"oversharing-kennen-kontrollieren",[353,624,449],{},[353,626,627],{},"Der Begriff \"Oversharing\" wird in den letzten Monaten oft verwendet, doch was bedeutet er im Zusammenhang mit der Vorbereitung auf Microsoft 365 und der Einführung von Copilot?",[375,629,631],{"id":630},"was-ist-oversharing","Was ist Oversharing?",[353,633,634],{},"{: .h4-font-size}",[353,636,637],{},"Oversharing, oder das \"Überteilen\" von Daten, bedeutet, dass Personen auf Daten zugreifen können, auf die sie eigentlich keinen Zugriff haben sollten. Dieses Problem tritt häufig aufgrund mangelnder Datenkontrolle auf. Ein IT-Magazin titelte im November 2024: \"Copilot lässt Mitarbeiter die E-Mails ihrer Chefs lesen\". Diese Aussage ist jedoch faktisch falsch. Derartige Vorfälle sind nicht auf Copilot zurückzuführen, sondern auf unzureichende Datenkontrollen und Oversharing.",[353,639,640],{},"Der Microsoft Copilot basiert auf den Daten, die dem Nutzer zur Verfügung stehen. Er erhält keine zusätzlichen Berechtigungen, sondern verwendet einen Index, der es erleichtert, auf Informationen zu stoßen oder Dinge zu finden, von denen man nicht wusste, dass man darauf Zugriff hat.",[443,642,644],{"id":643},"arten-von-microsoft-teams","Arten von Microsoft Teams",[353,646,449],{},[353,648,649],{},"Wir unterscheiden bei Teams zwischen privaten und öffentlichen Teams. Befinden sich sensible oder geschützte Dokumente in öffentlichen Teams, können diese von allen Mitarbeitenden im Unternehmen eingesehen und somit auch von Copilot indexiert werden.",[353,651,652],{},"Es spricht grundsätzlich nichts dagegen, weiterhin auch öffentliche Teams zu nutzen – sogar viele davon. Wichtig ist jedoch sicherzustellen, dass die darin geteilten Informationen und Dokumente für alle zugänglich sein dürfen.",[375,654,656],{"id":655},"empfehlung","Empfehlung",[353,658,634],{},[353,660,661],{},"Überprüft regelmäßig, welche Daten in euren Teams abgelegt sind, und räumt gegebenenfalls auf. Häufig handelt es sich um Altlasten, die beispielsweise aus der Einführungszeit von Microsoft Teams stammen und im Laufe der Zeit gewachsen sind.",[443,663,665],{"id":664},"zugriff-auf-daten-in-sharepoint-online","Zugriff auf Daten in SharePoint Online",[353,667,449],{},[353,669,670],{},"Die Dokumente, die in öffentlichen Teams abgelegt sind, befinden sich bekanntermaßen auch in SharePoint. Neben den Team-Sites in SharePoint gibt es jedoch auch eigenständige SharePoint-Sites und -Bibliotheken. Häufig haben auch hier alle oder viele Mitarbeitende Zugriff.",[375,672,656],{"id":673},"empfehlung-1",[353,675,634],{},[353,677,678],{},"Überprüft die Zugriffs- und Berechtigungseinstellungen auf den wichtigen SharePoint-Sites. Häufig verstecken sich dort beispielsweise \"Alle Benutzer\"-Objekte in den Gruppen der \"Website-Besucher\".",[443,680,682],{"id":681},"dokumente-und-ordner-ab-jetzt-richtig-teilen","Dokumente und Ordner (ab jetzt) richtig teilen",[353,684,449],{},[353,686,687],{},"Ein weiterer, häufiger Fehler sind die sogenannten \"Everyone Except External\"-Links, mit denen Dokumente oder Ordner geteilt werden.",[353,689,690],{},"Praktisch, aber gefährlich: Wählt man beim Teilen eines Dokuments den Linktyp “Personen in meiner Organisation”, erhält jede Person, die den Link verwendet, Zugriff auf die Datei – und somit auch Copilot, da dieser immer im Benutzerkontext agiert.",[353,692,693,697],{},[476,694],{"alt":695,"src":696},"Freigabeeinstellungen eines Dokuments","https://res.cloudinary.com/c4a8/image/upload/blog/pics/microsoft-365-copilot-link-settings.png","{: .post__screenshot}",[353,699,700],{},"Solche Links auf ganze Ordner, deren Inhalte sich über Monate oder Jahre verändern, führen häufig zu Oversharing-Vorfällen. Diese Art von Link bleibt wichtig und praktisch, sollte jedoch nicht als Standardeinstellung verwendet werden. Ein einfacher Tipp kann hier Abhilfe schaffen.",[375,702,656],{"id":703},"empfehlung-2",[353,705,634],{},[353,707,708],{},"Im SharePoint-Admincenter findet ihr unter „Richtlinien“ den Abschnitt „Datei- und Ordnerlinks“. Setzt hier die Standardeinstellung auf „Bestimmte Personen“. Dadurch wird die Option „Nur Personen in meiner Organisation“ erst durch bewusstes Anklicken verfügbar.",[353,710,711,697],{},[476,712],{"alt":713,"src":714},"Zuordnung der Managed Services zu NIS2","https://res.cloudinary.com/c4a8/image/upload/w_940,h_200,c_lpad/blog/pics/microsooft-365-copilot-default-link-setting.png",[353,716,717],{},[363,718,726,732],{"role":719,"className":720,"dataText":724,"href":725},"button",[721,722,723],"cta","link","vue-component","Primary Link","/de/workplace/sharepoint-power-platform",[727,728,731],"span",{"className":729},[730],"cta__text","Mehr erfahren",[727,733,739],{"className":734,"style":738},[735,736,737,723],"icon","icon--right","icon--arrow","--color-icon: currentColor; --icon-rotation: 0deg;",[740,741,750],"svg",{"viewBox":742,"width":743,"height":743,"padding":744,"xmlSpace":745,"version":746,"xmlns":747,"xmlns:link":748,"style":749},"0 0 28 17","28px","6","preserve","1.1","http://www.w3.org/2000/svg","http://www.w3.org/1999/xlink","stroke: currentcolor; transform: rotate(var(--icon-rotation)) scale(var(--icon-scale));",[751,752,754,763],"g",{"transform":753},"translate(0.75 0.75)",[755,756],"path",{"d":757,"transform":758,"fill":759,"fillRule":760,"strokeWidth":761,"strokeLineCap":762,"strokeLineJoin":762},"M0.5 0.5L26 0.5","translate(0 7)","none","evenodd","1.5","round",[755,764],{"d":765,"transform":766,"fill":759,"fillRule":760,"strokeWidth":761,"strokeLineCap":762,"strokeLineJoin":762},"M0 15L7 7.5L0 0","translate(19 0)",[443,768,601],{"id":769},"sharepoint-advanced-management",[353,771,449],{},[353,773,774],{},"Eine neue zentrale Möglichkeit, um das volle Potenzial auszuschöpfen, ist die Nutzung der SharePoint Advanced Management-Funktionen. Diese ist seit dem 01.01.2025 in allen M365 Copilot Lizenzen inkludiert. Das bedeutet, egal ob man 1 oder 10.000 M365 Copilot Lizenzen hat, SharePoint Advanced Management ist jetzt inklusive.",[353,776,777],{},"SharePoint Advanced Management umfasst eine Vielzahl von Funktionen rund um die Themen Data Oversharing, Governance und Security. Bisher war dieses Add-On zusätzlich zu lizenzieren und hat deswegen kaum Beachtung gefunden. Die Funktionen und Möglichkeiten, die darin stecken, sind aber beachtlich und waren schon immer eine sinnvolle Ergänzung für die Administration und Vorbereitung von SharePoint Online in Bezug auf eine Einführung von künstlicher Intelligenz, wie Copilot. Microsoft beschreibt 4 Säulen, die SAM unterstützt:",[779,780,781],"style",{},"\ntable {\n  font-family: arial, sans-serif;\n  border-collapse: collapse;\n  width: 100%;\n}\n\ntd, th {\n  border: 1px solid #dddddd;\n  text-align: left;\n  padding: 8px;\n}\n\ntr:nth-child(even) {\n  background-color: #dddddd;\n}\n",[783,784,785,798],"table",{},[786,787,788],"thead",{},[789,790,791,795],"tr",{},[792,793,794],"th",{},"Thema",[792,796,797],{},"Beschreibung",[799,800,801,810,818,826],"tbody",{},[789,802,803,807],{},[804,805,806],"td",{},"Verwalten von Content-Wildwuchs",[804,808,809],{},"Unterstützung der Administratoren bei der Verwaltung einer stetig wachsenden Anzahl an Dateien",[789,811,812,815],{},[804,813,814],{},"Oversharing verhindern",[804,816,817],{},"Erkennung und Verhinderung von Oversharing, z. B. durch defekte Berechtigungsvererbungen",[789,819,820,823],{},[804,821,822],{},"Zugriff von Copilot auf Inhalte verwalten",[804,824,825],{},"Tools zur Echtzeitkontrolle darüber, auf welche Dokumente Copilot zugreifen darf und auf welche nicht",[789,827,828,831],{},[804,829,830],{},"Verwaltung des Dokumenten-Lifecycle",[804,832,833],{},"Unterstützung bei der Überwachung und Steuerung aktiver und inaktiver SharePoint-Inhalte",[375,835,656],{"id":836},"empfehlung-3",[353,838,634],{},[353,840,841],{},"Wir empfehlen jedem, der sich aktuell mit M365 Copilot beschäftigt, diese Funktionen zu aktivieren und zu nutzen. Dazu gehören insbesondere die Data Access Governance, Site Lifecycle Management und Restricted Access Control Policy sowie die Funktionen, von denen einige noch in der Preview sind (Oversharing Baseline Report und Restricted Content Discoverability Policy).",[353,843,844,845],{},"Mehr Details zu SharePoint Advanced Management findet ihr ",[363,846,850],{"href":847,"rel":848},"https://learn.microsoft.com/en-us/sharepoint/get-ready-copilot-sharepoint-advanced-management",[849],"nofollow","auf der offiziellen Seite von Microsoft.",[443,852,607],{"id":853},"grundlegende-sicherheit-im-tenant-herstellen",[353,855,449],{},[353,857,858],{},"Neben dem Zugriff auf Daten durch Copilot sollten wir sicherstellen, dass unser Tenant umfassend abgesichert ist. Der Einsatz künstlicher Intelligenz macht dies spätestens jetzt unverzichtbar. Es gibt zahlreiche Maßnahmen zur Absicherung – hier ein Überblick mit den wichtigsten Punkten.",[375,860,862],{"id":861},"umsetzung-zero-trust","Umsetzung Zero Trust",[353,864,634],{},[353,866,867],{},"Der Begriff Zero-Trust ist in aller Munde – wahrscheinlich bist du ihm auch schon begegnet. Doch was bedeutet das genau, besonders im Kontext von Copilot? Kurz gesagt: Zero-Trust bedeutet in diesem Fall, dass niemand pauschalen Zugriff auf alles erhält, sondern nur auf die Ressourcen, die aktuell benötigt werden. Dieses Prinzip, bekannt als Least Privileged Access, ist essenziell, um Daten und Systeme vor unberechtigtem Zugriff zu schützen. Es knüpft direkt an Themen wie Oversharing an, da der Fokus darauf liegt, nur die notwendigen Informationen freizugeben.",[353,869,870],{},"Doch Zero-Trust beschränkt sich nicht nur auf SharePoint. Es betrifft auch den Zugriff auf E-Mails in Outlook, Kundeninformationen im CRM-System und andere sensible Bereiche. Mit der zunehmenden Integration von Copilot und künstlicher Intelligenz in Microsoft 365 und darüber hinaus gewinnt dieses Konzept weiter an Bedeutung. Je früher du und dein Team euch damit auseinandersetzt, desto besser seid ihr für die Zukunft gerüstet.",[375,872,874],{"id":873},"zero-trust-besonders-wichtig-für-administratoren","Zero-Trust: Besonders wichtig für Administratoren",[353,876,634],{},[353,878,879],{},"Für Admins gewinnt das Thema noch mehr an Bedeutung: Mit der Einführung von Copilot in den Admincentern und dem Security-Copilot wird es unverzichtbar, administrative Zugriffe abzusichern. Tools wie Privileged Identity Management (PIM) sind hierbei entscheidend, um sicherzustellen, dass Admin-Rechte nur dann vergeben werden, wenn sie wirklich benötigt werden – und selbst dann nur zeitlich begrenzt und streng überwacht.",[353,881,882],{},[883,884,885],"strong",{},"Mehrfaktor-Authentifizierung & Bedingter Zugriff? Ein Muss",[353,887,888],{},"Ein weiteres Kernelement der Sicherheit ist die Einrichtung von Multi-Faktor-Authentifizierung (MFA) und Conditional Access für alle Entra-ID-Konten in Microsoft 365. Microsoft forciert diese Einstellungen zunehmend, sodass du sicherstellen solltest, dass sämtliche Konten in deiner Organisation entsprechend abgesichert sind.",[353,890,891],{},"Warum ist das so wichtig? Technisch gesehen hat die Nutzung von Copilot nichts direkt mit MFA oder Conditional Access zu tun. Doch es geht darum sicherzustellen, dass die Person, die sich anmeldet, tatsächlich diejenige ist, für die sie sich ausgibt. Denn es wäre fatal, wenn ein Angreifer Zugriff auf einen leistungsstarken KI-Assistenten erhält.",[375,893,895],{"id":894},"sicherheit-ist-mehr-als-nur-grundlagen","Sicherheit ist mehr als nur Grundlagen",[353,897,634],{},[353,899,900],{},"Natürlich sind Zero-Trust, MFA und Conditional Access nur der Anfang. Ein wirklich sicherer Tenant umfasst viele weitere Aspekte. Microsoft bietet eine breite Palette an Sicherheitslösungen, darunter die Microsoft Defender-Produkte, Entra ID, Sentinel und viele mehr. Diese Tools helfen dir, deine Organisation noch besser zu schützen und Sicherheitslücken zu schließen.",[375,902,656],{"id":903},"empfehlung-4",[353,905,634],{},[353,907,908],{},"Wenn du Unterstützung bei der Umsetzung benötigst oder unsicher bist, wo du anfangen sollst, helfen wir dir gerne weiter. Sicherheit ist eine Reise – und wir begleiten und unterstützen dich dabei, die richtigen Schritte zu machen, um dein Unternehmen zu schützen.",[353,910,911,930,931],{},[363,912,915,919],{"role":719,"className":913,"dataText":724,"href":914},[721,722,723],"/de/security/security-consulting",[727,916,918],{"className":917},[730],"Mehr zu unserem Security Consulting Angebot erfahren",[727,920,922],{"className":921,"style":738},[735,736,737,723],[740,923,924],{"viewBox":742,"width":743,"height":743,"padding":744,"xmlSpace":745,"version":746,"xmlns":747,"xmlns:link":748,"style":749},[751,925,926,928],{"transform":753},[755,927],{"d":757,"transform":758,"fill":759,"fillRule":760,"strokeWidth":761,"strokeLineCap":762,"strokeLineJoin":762},[755,929],{"d":765,"transform":766,"fill":759,"fillRule":760,"strokeWidth":761,"strokeLineCap":762,"strokeLineJoin":762}," ",[363,932,935,939],{"role":719,"className":933,"dataText":724,"href":934},[721,722,723],"/de/security/cloud-security-operations-center",[727,936,938],{"className":937},[730],"Mehr über unser Cloud Security Operations Center erfahren",[727,940,942],{"className":941,"style":738},[735,736,737,723],[740,943,944],{"viewBox":742,"width":743,"height":743,"padding":744,"xmlSpace":745,"version":746,"xmlns":747,"xmlns:link":748,"style":749},[751,945,946,948],{"transform":753},[755,947],{"d":757,"transform":758,"fill":759,"fillRule":760,"strokeWidth":761,"strokeLineCap":762,"strokeLineJoin":762},[755,949],{"d":765,"transform":766,"fill":759,"fillRule":760,"strokeWidth":761,"strokeLineCap":762,"strokeLineJoin":762},[443,951,613],{"id":952},"aktualisierung-der-office-applikationen",[353,954,449],{},[353,956,957],{},"Der volle Mehrwert von Microsoft Copilot entfaltet sich erst durch die Integration des AI-Assistenten in den installierten Office-Applikationen (M365 Apps). Dazu gehören aktuell Word, Excel, PowerPoint, OneNote, Outlook und Teams.",[353,959,960,697],{},[476,961],{"alt":962,"src":963},"Microsoft 365 Tenant","https://res.cloudinary.com/c4a8/image/upload/blog/pics/microsooft-365-copilot-tenant.png",[353,965,966],{},"Allerdings unterscheidet Microsoft die Verfügbarkeit und Funktionen von Copilot je nach Version der installierten Apps. Wenn bei Benutzenden beispielsweise der Semi-Annual Enterprise Channel eingerichtet ist, stehen ihnen die KI-Features von Microsoft nicht zur Verfügung.",[375,968,656],{"id":969},"empfehlung-5",[353,971,634],{},[353,973,974],{},"Stellt sicher, dass eure Office-Apps mindestens den Monthly Enterprise Channel oder idealerweise den Current Channel nutzen. Nur so gewährleistet ihr, dass Copilot und die neuesten Funktionen nahtlos verfügbar sind.",[353,976,977,978,983],{},"Doch das ist nur ein Teil des Gesamtbildes. Themen wie Application Lifecycle Management und der Einsatz moderner Software-Management-Plattformen spielen eine entscheidende Rolle, insbesondere in Verbindung mit Intune. Hierbei unterstützt euch unsere Lösung ",[363,979,982],{"href":980,"rel":981},"https://www.realmjoin.com/",[849],"RealmJoin",", um den Prozess effizient zu gestalten und eure Anwendungen stets auf dem neuesten Stand zu halten.",[353,985,986],{},"RealmJoin ist die Cloud-basierte Ergänzung zu Microsoft Intune und das fehlende Puzzlestück auf dem Weg zu einer umfassenden Client-Management-Plattform. Es erleichtert die Bereitstellung von fast 2.000 vorgefertigten Standardanwendungen für Intune in hoher Qualität – eine moderne Paketfabrik für benutzerdefinierte Anwendungen, ergänzt durch zusätzliche Funktionen wie LAPS, Remote-Support und Runbook-Automatisierung.",[443,988,619],{"id":989},"datenschutz-datensicherheit",[353,991,449],{},[353,993,994],{},"Gerade in europäischen Unternehmen stößt man auf Vorbehalte, wenn es um die Einführung von Microsoft Copilot geht – und das ist absolut nachvollziehbar. Neue Technologien können Unsicherheit auslösen, insbesondere wenn es um sensible Themen wie Datenschutz und Kontrolle geht.",[353,996,997],{},"Wenn ihr Copilot einführen möchtet, denkt daran, dass es nicht nur um die Technik geht. Setzt euch frühzeitig mit den entsprechenden Datenschutz- und Sicherheitsanforderungen auseinander. Holt dabei alle relevanten Stakeholder ins Boot – dazu gehören der interne oder externe Datenschutzbeauftragte, euer CISO, Betriebsräte, Compliance-Administratoren und andere Verantwortliche. Besprecht Vorbehalte und Fragen offen miteinander. Oft lassen sich diese Bedenken durch klare Informationen und bestehende Richtlinien ausräumen.",[353,999,1000],{},"Microsoft bietet umfassende Dokumentationen und Erklärungen, die zeigen, wie, wann und wo Daten verarbeitet werden. Hier sind die wichtigsten Fakten:",[587,1002,1003,1009,1015,1021,1027,1033,1039],{},[590,1004,1005,1008],{},[883,1006,1007],{},"Grounding der KI-Modelle:"," Die von Copilot genutzten KI-Modelle greifen nicht direkt auf eure Daten zu. Stattdessen erfolgt der Zugriff über den Microsoft Graph und ist strikt auf den Benutzerkontext beschränkt.",[590,1010,1011,1014],{},[883,1012,1013],{},"Datenschutz- und Sicherheitsstandards:"," Copilot erfüllt alle relevanten Datenschutz-, Sicherheits- und Compliance-Vorgaben, darunter die DSGVO, die EU-Datenschutzgrundverordnung sowie Standards wie ISO/IEC 27018 und den EU AI-Act.",[590,1016,1017,1020],{},[883,1018,1019],{},"EU-Data Boundary:"," Alle Daten werden so nah wie möglich am Benutzer verarbeitet, jedoch immer innerhalb der EU. Die sogenannte EU-Data Boundary wird strikt eingehalten.",[590,1022,1023,1026],{},[883,1024,1025],{},"Verschlüsselung:"," Eingaben (Prompts) und Ergebnisse werden verschlüsselt und niemals zur Weiterentwicklung von KI-Modellen (LLMs) genutzt.",[590,1028,1029,1032],{},[883,1030,1031],{},"Compliance und Nachvollziehbarkeit:"," Prompts und Ergebnisse werden verschlüsselt im Tenant gespeichert. Sie können im Rahmen gesetzlicher Anforderungen analysiert werden, beispielsweise für Prüfungen oder bei richterlichen Anordnungen. Der Zugriff darauf ist nur mit speziellen Berechtigungen, etwa über Content Search oder eDiscovery, möglich.",[590,1034,1035,1038],{},[883,1036,1037],{},"Sicherheitsmaßnahmen:"," Microsoft schützt seine Dienste, einschließlich Copilot, durch logische Isolierung, physische Sicherheitsmaßnahmen und Verschlüsselungstechnologien. Plug-Ins haben nur eingeschränkten Zugriff auf verschlüsselte Inhalte.",[590,1040,1041,1045],{},[1042,1043,1044],"em",{},"Responsible AI:"," Microsoft legt großen Wert auf die verantwortungsvolle Nutzung von KI. Der Fokus liegt darauf, KI-Services positiv und ethisch einzusetzen und ihren Missbrauch für illegale oder fragwürdige Zwecke zu verhindern.",[375,1047,656],{"id":1048},"empfehlung-6",[353,1050,634],{},[353,1052,1053],{},"Indem ihr euch frühzeitig mit diesen Themen beschäftigt und die relevanten Personen einbindet, schafft ihr Vertrauen und legt den Grundstein für eine erfolgreiche Einführung. Viele Bedenken lassen sich bereits durch die bestehenden Sicherheitsmaßnahmen und Richtlinien von Microsoft entkräften. Wenn ihr Unterstützung benötigt, stehen wir euch gerne zur Seite. Datenschutz und Sicherheit sind entscheidend – und wir helfen euch, diese Anforderungen optimal umzusetzen.",[353,1055,1056],{},"Mehr Informationen und Hintergrundwissen gibt es direkt bei Microsoft an verschiedenen Stellen wie:",[587,1058,1059,1065,1071],{},[590,1060,1061],{},[363,1062,1063],{"href":1063,"rel":1064},"https://learn.microsoft.com/de-de/copilot/microsoft-365/microsoft-365-copilot-privacy",[849],[590,1066,1067],{},[363,1068,1069],{"href":1069,"rel":1070},"https://support.microsoft.com/de-de/topic/was-ist-verantwortungsvolle-ki-33fc14be-15ea-4c2c-903b-aa493f5b8d92",[849],[590,1072,1073],{},[363,1074,1075],{"href":1075,"rel":1076},"https://learn.microsoft.com/de-de/copilot/microsoft-365/microsoft-365-copilot-architecture-data-protection-auditing",[849],{"title":392,"searchDepth":393,"depth":393,"links":1078},[1079,1080,1083,1086,1089,1092,1095,1101,1104],{"id":582,"depth":393,"text":583},{"id":622,"depth":393,"text":595,"children":1081},[1082],{"id":630,"depth":396,"text":631},{"id":643,"depth":393,"text":644,"children":1084},[1085],{"id":655,"depth":396,"text":656},{"id":664,"depth":393,"text":665,"children":1087},[1088],{"id":673,"depth":396,"text":656},{"id":681,"depth":393,"text":682,"children":1090},[1091],{"id":703,"depth":396,"text":656},{"id":769,"depth":393,"text":601,"children":1093},[1094],{"id":836,"depth":396,"text":656},{"id":853,"depth":393,"text":607,"children":1096},[1097,1098,1099,1100],{"id":861,"depth":396,"text":862},{"id":873,"depth":396,"text":874},{"id":894,"depth":396,"text":895},{"id":903,"depth":396,"text":656},{"id":952,"depth":393,"text":613,"children":1102},[1103],{"id":969,"depth":396,"text":656},{"id":989,"depth":393,"text":619,"children":1105},[1106],{"id":1048,"depth":396,"text":656},{"seoTitle":1108,"titleClass":402,"date":1109,"categories":1110,"blogtitlepic":1112,"socialimg":1113,"customExcerpt":1114,"keywords":1115,"contactInContent":1116,"scripts":1145},"Microsoft 365 Copilot einführen: Sicherheits- und Datenschutz-Tipps für 2025","2025-01-10",[1111],"Workplace","header-m365-copilot","/blog/heads/header-m365-copilot.png","Auch 2025 bleibt künstliche Intelligenz, insbesondere Microsoft 365 Copilot, ein zentrales Thema. Viele Unternehmen stehen vor der Pilotierung oder Einführung dieser Technologie. Falls auch ihr dazu gehört, haben wir die wichtigsten Grundlagen vorbereitet, die ihr vorab prüfen oder umsetzen solltet. Besonders wichtig: eine gründliche Auseinandersetzung mit Sicherheits- und Datenschutzaspekten, um eine sichere Implementierung zu gewährleisten. In diesem Artikel erfahrt ihr, worauf es dabei ankommt, um Microsoft Copilot optimal zu nutzen.","Microsoft 365 Copilot, Einführung Microsoft Copilot, Sicherheitsrichtlinien Microsoft 365, Datenschutz Copilot, KI Implementierung, Copilot Pilotierung, Microsoft Copilot Grundlagen, sichere Implementierung, Microsoft KI Einführung, Microsoft 365 Tipps 2025",{"quote":417,"infos":1117},{"bgColor":1118,"headline":507,"subline":1119,"level":443,"textStyling":509,"flush":510,"person":1120,"form":1128},"var(--color-blue-dark)","Ihr möchtet wissen, wie ihr Copilot optimal in eurem Unternehmen einführt? Wir unterstützen euch gerne bei der Integration und beantworten eure Fragen zu den technischen Voraussetzungen, Sicherheitsmaßnahmen und Nutzungsszenarien.",{"image":1121,"cloudinary":417,"alt":30,"name":30,"quotee":30,"quoteeTitle":1122,"quote":1123,"detailsHeader":1124,"details":1125},"/people/Karsten.Kleinschmidt-250.jpg","Managed Workplace Lead","Damit Microsoft 365 Copilot sein volles Potenzial entfalten kann, ist eine sorgfältige Vorbereitung im Hinblick auf Sicherheit und Compliance unerlässlich.","Wir freuen uns darauf,\u003Cbr />von euch zu hören!",[1126,1127],{"text":518,"href":519,"details":520,"icon":521},{"text":523,"href":524,"icon":525},{"ctaText":527,"cta":1129,"method":400,"action":530,"fields":1130},{"skin":529},[1131,1132,1134,1136,1138,1140,1142,1144],{"type":533,"id":534,"value":535},{"label":537,"type":538,"id":539,"required":417,"requiredMsg":1133},"Bitte Namen eingeben",{"label":542,"type":538,"id":543,"required":417,"requiredMsg":1135},"Bitte Unternehmensnamen ausfüllen",{"label":546,"type":547,"id":547,"required":417,"requiredMsg":1137},"Bitte E-Mail-Adresse eingeben",{"label":1139,"type":551,"id":552,"required":417,"requiredMsg":553},"Deine Daten werden zur Bearbeitung und Beantwortung Deiner Anfrage bei uns gespeichert. Weitere Informationen zum Datenschutz findest du in unserer \u003Ca href=\"/de/datenschutz\">Datenschutzerklärung\u003C/a>.",{"type":533,"id":555,"value":1141},"Anfrage Blog Microsoft 365 Copilot",{"type":533,"id":558,"value":1143},"gkgab-contact-form",{"type":533,"id":561},{"slick":417,"form":417},"/posts/2025-01-09-microsoft-365-copilot",{"title":576,"description":392},"posts/2025-01-09-microsoft-365-copilot",[1111,1150,1151,1152],"Microsoft 365 Copilot","KI Implementierung","Copilot Pilotierung","goJSIaxe8IH3XeajI2UzLdVTHzMYfSeMQ7su3lHQCUA",{"id":1155,"title":1156,"author":1157,"body":1158,"cta":397,"description":392,"eventid":397,"extension":398,"hideInRecent":399,"layout":400,"meta":1850,"moment":397,"navigation":417,"path":1928,"seo":1929,"stem":1930,"tags":1931,"webcast":399,"__hash__":1935},"content_de/posts/2025-08-28-agent-ready-infrastructure.md","This is why you need a solid infrastructure to be agent-ready in 2025",[254],{"type":350,"value":1159,"toc":1812},[1160,1164,1166,1173,1180,1184,1186,1189,1192,1198,1208,1215,1220,1229,1239,1258,1262,1264,1267,1271,1273,1276,1280,1282,1289,1293,1295,1306,1313,1315,1318,1338,1342,1344,1347,1351,1353,1360,1364,1366,1369,1373,1375,1386,1390,1392,1395,1399,1401,1404,1409,1423,1426,1429,1433,1435,1439,1441,1448,1451,1459,1467,1471,1473,1476,1482,1485,1490,1495,1499,1501,1508,1512,1514,1521,1529,1533,1535,1538,1541,1545,1547,1550,1553,1560,1564,1566,1569,1572,1577,1580,1583,1587,1589,1595,1598,1604,1607,1612,1616,1618,1679,1683,1685,1707,1711,1713,1716,1720,1722,1725,1729,1731,1738,1742,1744,1755,1762,1767,1770,1774,1776,1782,1789,1794,1797,1800,1804,1806,1809],[443,1161,1163],{"id":1162},"prologue","Prologue",[353,1165,449],{},[353,1167,1168,1169,1172],{},"With this omnipresence, many ideas and the desire to take action or at least experiment arise. At glueckkanja AG, we support our customers throughout this process. Of course, we are already developing and building agents, but in 80% of our projects, the primary focus is on preparing the data and tenant for agent creation. Before you implement Copilot productively in your organization, it's worthwhile to take a critical look at your infrastructure. When making decisions in this area, there are several important aspects to understand before deploying AI agents on a large scale. That’s why, in this blog post, I will guide you through the essential steps and differences. In a time when AI assistants like Microsoft 365 Copilot Agents promise to transform the working world, one principle holds true above all: ",[1042,1170,1171],{},"AI is only as good as the system beneath it",".",[353,1174,1175,1176,1179],{},"This comprehensive guide outlines ",[883,1177,1178],{},"how to prepare your data and infrastructure"," for Copilot Agents, covering key practices in SharePoint, Teams, and the Power Platform.",[443,1181,1183],{"id":1182},"why-your-infrastructure-data-matters","Why your infrastructure (data) matters",[353,1185,449],{},[353,1187,1188],{},"As we utilize AI agents, it is imperative to understand that these agents do not inherently possess knowledge about our organization, our data, or our unique operational context. By default, an AI agent only carries the built-in knowledge derived from the training of the Large Language Model (LLM). To effectively enhance and extend the capabilities of these AI agents, it is essential to systematically integrate various components. This enhancement can be achieved through the implementation of System Prompts, Knowledge Bases, Connectors, Web-Search functionalities, access to Microsoft Graph, Semantic Search, and additional tools. These components collectively enable the AI agents to deliver more precise, contextually relevant responses and actions, aligning closely with the specific needs and data of the organization. Since we are now in the very beginning of the agentic area, many of us will start with simple agents that source information based on existing SharePoint Online libraries.",[353,1190,1191],{},"For us in IT, that means we need to take care about our data in SharePoint Online more than ever!",[1193,1194,1195],"blockquote",{},[353,1196,1197],{},"SharePoint Online = Knowledge = Data and Data = Key",[353,1199,1200,1203,1204,1207],{},[883,1201,1202],{},"My clear message:"," Before adding AI copilots to your organization, ",[883,1205,1206],{},"get your data house in order",". The same data that feeds your Copilot Agents also feeds Microsoft 365 Copilot itself.",[353,1209,1210,1211,1214],{},"And not only that! Microsoft 365 Copilot is assessing the same data. *If that data is cluttered, overshared, or poorly secured, the AI could surface incorrect or sensitive information unexpectedly *or example, imagine asking Copilot about company structure and receiving details of a confidential reorganization plan you weren’t meant to see. Such incidents occur when content is ",[883,1212,1213],{},"overshared"," (available too broadly) on platforms like SharePoint or Teams. Note: Copilot respects all existing permissions, that means something like only can happen when permissions are misconfigured. Conversely, if data is siloed or inaccessible, AI assistants will be less useful.",[1193,1216,1217],{},[353,1218,1219],{},"Copilot only surfaces organizational data that the individual user has at least view permissions for!",[353,1221,1222,930,1225],{},[883,1223,1224],{},"Source:",[363,1226,1227],{"href":1227,"rel":1228},"https://learn.microsoft.com/en-gb/copilot/microsoft-365/microsoft-365-copilot-privacy?azure-portal=true",[849],[353,1230,1231,1234,1235,1238],{},[883,1232,1233],{},"Key takeaway:"," Enterprise AI succeeds only with a solid data foundation. A recent Microsoft report identifies ",[883,1236,1237],{},"data oversharing, data leakage, and noncompliant usage"," as top challenges to address before deploying AI. Organizations that invest in preparation of SharePoint Online and other data sources, will unlock Copilot’s benefits with confidence, while those who don’t risk security breaches or irrelevant AI outputs. Studies show about one-third of decision-makers lack full visibility into critical data.",[1240,1241,1242,1243,1242,1248,1242,1251,1242,1255],"picture",{},"\n  ",[1244,1245],"source",{"media":1246,"srcSet":1247},"(min-width: 992px)","https://res.cloudinary.com/c4a8/image/upload/blog/pics/data-security-report-statistics.png",[1244,1249],{"media":1250,"srcSet":1247},"(min-width: 768px)",[1244,1252],{"media":1253,"srcSet":1254},"(min-width: 576px)","https://res.cloudinary.com/c4a8/image/upload/blog/pics/data-security-report-statistics-mob.png",[476,1256],{"src":1254,"alt":1257},"Two statistics on data risks: 30% of decision-makers lack visibility into business-critical data (Visibility Gap) and 87% of security leaders reported a data breach in the past year (Data Breach Prevalence).",[443,1259,1261],{"id":1260},"_10-steps-to-improve-your-m365-data-infrastructure-now","10 steps to improve your M365 data infrastructure now",[353,1263,449],{},[353,1265,1266],{},"Now we know your agents will need data. As we as glueckkanja step in these projects, this is our typical 10-point list that we work from the top to end with our customers.",[375,1268,1270],{"id":1269},"step-1-check-core-sharing-settings","Step 1: Check Core Sharing Settings",[353,1272,634],{},[353,1274,1275],{},"Verify tenant-wide settings that could lead to oversharing. For example, scrutinize default link sharing policies (e.g. if “Anyone with the link” or “People in your organization” is allowed by default for SharePoint/OneDrive), whether users can create public Teams by default, and if your Power Platform environment is open without governance. Misconfigured defaults here are a common cause of unintentional broad access..",[375,1277,1279],{"id":1278},"step-2-audit-public-teams","Step 2: Audit Public Teams",[353,1281,634],{},[353,1283,1284,1285,1288],{},"Review any Microsoft Teams marked as “Public.” A public Team means ",[1042,1286,1287],{},"anyone in your organization"," can discover and access its content. Ensure that any Team set to public truly contains only non-sensitive, broadly suitable content. If not, switch it to private or adjust membership. (It’s easy for a Team to be created as Public and later forgotten, exposing files to all employees.)",[375,1290,1292],{"id":1291},"step-3-review-graph-connectors","Step 3: Review Graph Connectors",[353,1294,634],{},[353,1296,1297,1298,1301,1302,1305],{},"Check if your tenant has any ",[1042,1299,1300],{},"Microsoft Graph Connectors"," set up that pull in third-party data (e.g. from external file systems, wikis, etc.). Remove or secure any connector that indexes data not everyone should see. ",[883,1303,1304],{},"Why?"," Content indexed via Graph Connectors becomes part of your Microsoft Graph search index – meaning Copilot can potentially use it to answer prompts. You only want relevant, intended data sources connected.",[375,1307,1309,1310],{"id":1308},"step-4-generate-a-sharepoint-online-baseline-report","Step 4: Generate a ",[883,1311,1312],{},"SharePoint Online Baseline Report",[353,1314,634],{},[353,1316,1317],{},"SPO has different possible risks for unwanted data in Agents and Copilot. You need to look for different key metrics:",[587,1319,1320,1323,1326,1329,1332,1335],{},[590,1321,1322],{},"Broken Permission Inheritance on a folder-level",[590,1324,1325],{},"Public SharePoint Sites",[590,1327,1328],{},"Use of \"Everyone Except External Users\" or other dynamic group that contain all users",[590,1330,1331],{},"Anyone Sharing Links",[590,1333,1334],{},"Everyone-in-my-org Sharing Links",[590,1336,1337],{},"Unwanted people in the Site Admins / Owners / Members / Visitors Group",[375,1339,1341],{"id":1340},"step-5-categorize-and-prioritize-risks","Step 5: Categorize and Prioritize Risks",[353,1343,634],{},[353,1345,1346],{},"Take the findings from Steps 1–4 and rank them by severity. Which sites or files carry the most business-critical or sensitive data and also have exposure risks? Prioritize fixing those. By layering business context (e.g., a site with financial data vs. a site with generic templates), you can focus on the most impactful issues first.",[375,1348,1350],{"id":1349},"step-6-involve-site-owners-for-access-reviews","Step 6: Involve Site Owners for Access Reviews",[353,1352,634],{},[353,1354,1355,1356,1359],{},"For each SharePoint site (or Team) highlighted as risky, have the site owner double-check who has access and if that is appropriate. Owners are typically closest to the content and can quickly spot “Oh, why does ",[1042,1357,1358],{},"Everyone"," have read access to this? That shouldn’t be.” Implement a process where site admins certify permissions regularly.",[375,1361,1363],{"id":1362},"step-7-establish-ongoing-oversight","Step 7: Establish Ongoing Oversight",[353,1365,634],{},[353,1367,1368],{},"Put in place a continuous monitoring process for new oversharing issues. Oversharing control isn’t a one-time fix; as new sites, Teams, and files get created, you need to catch misconfigurations proactively. Consider using Microsoft Purview’s reports or alerts to catch things like files shared externally or to huge groups, new public teams created, etc. Microsoft’s tools can automate alerts for these conditions, so make use of them to maintain a strong posture.",[375,1370,1372],{"id":1371},"step-8-apply-sensitivity-labels-and-dlp-policies","Step 8: Apply Sensitivity Labels and DLP Policies",[353,1374,634],{},[353,1376,1377,1378,1381,1382,1385],{},"Use Microsoft Purview ",[883,1379,1380],{},"Sensitivity Labels"," to classify data (Confidential, Highly Confidential, etc.) and bind those labels to protection settings. For instance, a “Confidential” label can encrypt files or prevent external sharing. Also configure ",[883,1383,1384],{},"Data Loss Prevention (DLP)"," policies to prevent or monitor oversharing of sensitive info (like blocking someone from emailing a list of customer SSNs). These tools not only prevent accidental leaks in day-to-day use, they also work with Copilot: if Copilot tries to access or output labeled content in ways it shouldn’t, DLP can intervene. Moreover, Copilot itself will carry forward the document’s label to its responses, as noted later.",[375,1387,1389],{"id":1388},"step-9-implement-power-platform-governance","Step 9: Implement Power Platform Governance",[353,1391,634],{},[353,1393,1394],{},"Extend your oversight to the Power Platform (Power Apps, Power Automate, etc.). Define DLP policies for Power Platform to control connectors (so someone can’t, say, make a flow that pulls data from a sensitive SharePoint list and posts it to an external service). Also consider having multiple environments (Dev/Test/Prod) with proper security so that “Citizen Developers” building agents or apps don’t inadvertently expose data. Essentially, prevent the Power Platform from becoming an ungoverned backdoor to your data.",[375,1396,1398],{"id":1397},"step-10-educate-and-enable-your-agent-builders","Step 10: Educate and Enable Your Agent Builders",[353,1400,634],{},[353,1402,1403],{},"Finally, create guidelines and best practices for those who will be building or deploying AI agents (whether they are pro developers or business users). Establish training on handling data safely: e.g., how to choose appropriate knowledge sources for an agent, why not to include sensitive files in a broadly shared agent, how to test an agent’s output for any unexpected info. By fostering a data-aware culture among “agent makers,” you reduce the chance of someone inadvertently exposing information when designing an AI solution.",[353,1405,1406],{},[883,1407,1408],{},"Sources:",[587,1410,1411,1417],{},[590,1412,1413],{},[363,1414,1415],{"href":1415,"rel":1416},"https://techcommunity.microsoft.com/blog/microsoft365copilotblog/from-oversharing-to-optimization-deploying-microsoft-365-copilot-with-confidence/4357963",[849],[590,1418,1419],{},[363,1420,1421],{"href":1421,"rel":1422},"https://techcommunity.microsoft.com/blog/microsoft365copilotblog/microsoft-graph-connectors-update-expand-copilot%E2%80%99s-knowledge-with-50-million-ite/4243648",[849],[353,1424,1425],{},"After you have completed these steps, you can now securely go on and start building productive agents. To build agents, we have different platforms and features from Microsoft that we can rely on for. You'll find the most prominent examples in the next chapter. If you need help with this list, feel free to reach out to us so we can help you with this important preparation exercise.",[353,1427,1428],{},"Nothing prevents you in the meanwhile to create PoC or Test-Agents with sample data, manually uploaded files or specific data attached via RAG. But we recommend these steps before a larger implementation / rollout of agents.",[443,1430,1432],{"id":1431},"understanding-differences-between-agent-platforms","Understanding differences between Agent Platforms",[353,1434,449],{},[375,1436,1438],{"id":1437},"step-1-understand-your-agent-creators","Step 1: Understand your Agent-Creators",[353,1440,634],{},[353,1442,1443,1444,1447],{},"After the foundation work to prepare the data, we need to understand which platforms are available to create those agents. We try to differentiate these tools by features and possibilities, but it's important to notice that creating agents and choosing the right tolling is a range. There are multiple ways to build AI agents in the Microsoft ecosystem. It’s important to pick the right one for your needs and your team’s skill level. It also clarifies when to leverage ",[883,1445,1446],{},"Azure AI Foundry"," versus built-in Copilot Studio tools.",[353,1449,1450],{},"Microsoft offers a set of different tools that can build agents by today. While they seem like each other, they are built for different target audiences and levels of expertise. Take a closer look at the overview below. Understanding who needs to create and maintain these agents, also shows us, which Knowledge sources (= data) we need to prepare for our Agents. Beside the tools in the list below, there are even more pro-code solutions to build agents like M365 Agents Toolkit, Visual Studio Code, Agent SDK and more.  All our data preparation  steps´ apply for them as well, since they access the same data like other agents do.",[353,1452,1453,930,1455],{},[883,1454,1224],{},[363,1456,1457],{"href":1457,"rel":1458},"https://www.egroup-us.com/news/microsoft-copilot-ai-integration/",[849],[1240,1460,1242,1461,1242,1464],{},[1244,1462],{"media":1246,"srcSet":1463},"https://res.cloudinary.com/c4a8/image/upload/v1756363984/blog/pics/table-copilot-ai-integration.png",[476,1465],{"src":1463,"alt":1466},"Comparison of three Copilot solution categories: Pre-Built (ootb), Makers, and Developers.",[375,1468,1470],{"id":1469},"step-2-identify-use-cases-and-requirements-for-your-platform","Step 2: Identify Use Cases and requirements for your platform",[353,1472,634],{},[353,1474,1475],{},"As you can probably think of, not every platform supports every use case. Agents can be used for simple tasks, like answering questions based on existing knowledge or complex, like automatically generating answers or executing processes. Also, the final UX where and how we want to access those agents is important to decide for a platform.",[353,1477,1478],{},[476,1479],{"alt":1480,"src":1481},"Diagram showing three levels of agent capabilities from simple to advanced","https://res.cloudinary.com/c4a8/image/upload/blog/pics/agents-differences.png",[353,1483,1484],{},"With these considerations in mind, we usually try to use the easiest solution possible to build our Agent. But also, we need to find the solution that is scalable for further development. But not every Agent needs to built on Agent AI Foundry from the very beginning.",[353,1486,1487],{},[883,1488,1489],{},"Tip:",[1193,1491,1492],{},[353,1493,1494],{},"If you are not sure where to start to build your Agent, you always can use Copilot Studio and either integrate more Data from Azure AI there and publish it to Microsoft 365 Copilot. So get both \"up- and downwards compatibility\".",[443,1496,1498],{"id":1497},"rag-retrieval-augumented-generation-vs-sharepoint-vs-upload","RAG (Retrieval-Augumented Generation) vs. SharePoint vs. Upload",[353,1500,449],{},[353,1502,1503,1504,1507],{},"Looking at it the first time, everything seems to be RAG – but there are differences! When you first explore Copilot Agents and its agent capabilities, it’s tempting to assume that all knowledge integration follows the same RAG (Retrieval-Augmented Generation) pattern. While they may all ",[1042,1505,1506],{},"look"," like RAG from the outside: retrieving documents and generating answers, the way they work under the hood differs significantly. Understanding these differences is essential for choosing the right approach based on your goals, scale, and technical readiness. Here is a short explanation and overview",[375,1509,1511],{"id":1510},"manual-file-uploads","Manual File Uploads",[353,1513,634],{},[353,1515,1516,1517,1520],{},"Manual upload is the simplest way to add knowledge to a Copilot agent. You drag and drop documents directly into the Copilot Studio interface. Microsoft automatically indexes these files and retrieves relevant content during a user query. This is ideal for small pilots and early testing. ",[883,1518,1519],{},"Also, be aware that the content of the files should be accessible to everyone with access to agent",". There is not Permission-Management here that you need to take care of. On the other hand, you will need to manually update these files in the long term if things change. Currently for Copilot Agents you can add up to 20 files manually.",[353,1522,1523,1524],{},"Source: ",[363,1525,1528],{"href":1526,"rel":1527},"https://learn.microsoft.com/en-us/microsoft-365-copilot/extensibility/copilot-studio-agent-builder-knowledge",[849],"https://learn.microsoft.com/en-us/microsoft-365-copilot/extensibility/copilot-studio-agent-builder-knowledge#file-size-limits",[375,1530,1532],{"id":1531},"sharepoint-online","SharePoint Online",[353,1534,634],{},[353,1536,1537],{},"This method uses Microsoft’s Retrieval API to access content directly from SharePoint Online connected via Graph Connector. The agent retrieves the most relevant content live at query time, respecting existing Microsoft 365 permissions. Content can be SharePoint sites, document libraries, folders or files. It’s dynamic, secure, and well-suited for scaling across departments or business units without managing your own infrastructure. Building up on the existing infrastructure, we are using the built-in security model from SharePoint with is a huge benefit compared to other knowledge options. Departments can easily update the files and that will be reflected within the agent. That means if two users with different access levels ask the agent, one might get an answer from a certain file while another user (without access) would not – which is exactly the behavior we want.",[353,1539,1540],{},"Note: SharePoint Lists are currently a not supported knowledge-type, so you can not index them out of the box (Q3 2025)",[375,1542,1544],{"id":1543},"custom-rag-self-managed","Custom RAG (Self-Managed)",[353,1546,634],{},[353,1548,1549],{},"In a classic RAG setup, you build and manage the entire retrieval pipeline yourself. That includes document preprocessing, chunking, embedding, storing in a vector database, and retrieving the top matches at query time. This gives you full control over how content is processed and retrieved, but it also brings complexity and maintenance overhead. It’s best suited for advanced use cases that require customization beyond what Microsoft’s managed services offer. This is not an in-built feature in Copilot or Copilot Studio; we would do this in Microsoft Azure.",[353,1551,1552],{},"A example when to use RAG could be for instance, If you needed to integrate an AI agent with a proprietary database or thousands of PDFs stored outside of Microsoft 365, and apply custom filters, a self-managed RAG might be necessary – but this requires significant effort.",[353,1554,1555,1556],{},"source: ",[363,1557,1558],{"href":1558,"rel":1559},"https://learn.microsoft.com/en-us/azure/search/retrieval-augmented-generation-overview?tabs=docs",[849],[375,1561,1563],{"id":1562},"what-to-choose-and-when","What to Choose and When",[353,1565,634],{},[353,1567,1568],{},"While all three approaches involve retrieving content to support language generation, only the custom self-managed solution qualifies as “true RAG” in the technical sense. For most organizations starting out, manual uploads or SharePoint connections are significantly easier and faster to implement. They provide strong results with minimal setup - and they let teams focus on use case design and adoption, rather than infrastructure.",[353,1570,1571],{},"A general advice from my side in this point:",[1193,1573,1574],{},[353,1575,1576],{},"Try to build the agents as close to your data as possible",[353,1578,1579],{},"Example: If your data is stored in large SQL databases or external CRM systems, a SharePoint Agent will not do the job. If we have all our knowledge in SharePoint, SharePoint Agents or Copilot Agents might be a good start.",[353,1581,1582],{},"Custom RAG should be considered only when your needs go beyond what the managed options can provide, not as the default starting point. A manual upload is great for the first pilot or for small pilots with limited and specific knowledge that is not often updated. In many scenarios we would just use a SharePoint library or site with the agent. Because of this, we are focusing on a scenario looking like that:",[443,1584,1586],{"id":1585},"microsoft-365-copilot-copilot-agents-security-compliance-out-of-the-box","Microsoft 365 Copilot & Copilot Agents: Security & Compliance out of the box",[353,1588,449],{},[353,1590,1591,1594],{},[883,1592,1593],{},"Secure cloud infrastructure"," is the bedrock for enterprise AI. Microsoft provides the most secure framework possible for our Agents by putting them in context of Microsoft 365 Copilot. Every organization can trust their existing Security Framework based on Conditional Access and Multi-Factor authentication for access and their existing Governance Framework based on Microsoft Purview.",[353,1596,1597],{},"Agents that are used in M365 Copilot or published from Copilot Studio as a Teams Chatbot are only accessible within our tenant boundaries. That means we get the same level of security for these applications that we already have.",[353,1599,1600],{},[476,1601],{"alt":1602,"src":1603},"Diagram showing how Microsoft 365 Copilot accesses user data within Microsoft 365.","https://res.cloudinary.com/c4a8/image/upload/blog/pics/copilot-security.png",[353,1605,1606],{},"In addition to that, Microsoft offers several technical and organization commitments gathered as we call it \"Enterprise Grade Data Protection\".",[353,1608,1523,1609],{},[363,1610,1227],{"href":1227,"rel":1611},[849],[375,1613,1615],{"id":1614},"microsoft-365-copilot-enterprise-data-protection-edp-for-prompts-and-responses","Microsoft 365 Copilot: Enterprise Data Protection (EDP) for Prompts and Responses",[353,1617,634],{},[587,1619,1620,1640,1646,1667,1673],{},[590,1621,1622,1625,1626,1629,1630,1633,1634,1629,1637,1172],{},[883,1623,1624],{},"Contractual Protection",": Prompts (user input) and responses (Copilot output) are protected under the ",[883,1627,1628],{},"Data Protection Addendum (DPA)"," and ",[883,1631,1632],{},"Product Terms",". These protections are the same as those applied to ",[883,1635,1636],{},"emails in Exchange",[883,1638,1639],{},"files in SharePoint",[590,1641,1642,1645],{},[883,1643,1644],{},"Data Security:"," Encryption at rest and in transit, Physical security controls, Tenant-level data isolation",[590,1647,1648,1651,1652,1655,1656,1659,1660,1659,1663,1666],{},[883,1649,1650],{},"Privacy Commitments"," Microsoft acts as a ",[883,1653,1654],{},"data processor",", using data only as instructed by the customer. Supports ",[883,1657,1658],{},"GDPR",", ",[883,1661,1662],{},"EU Data Boundary",[883,1664,1665],{},"ISO/IEC 27018",", and more.",[590,1668,1669,1672],{},[883,1670,1671],{},"Access Control & Policy Inheritance",": Copilot respects: Identity models and permissions, Sensitivity labels, Retention policies, Audit settings, Admin configurations, AI & Copyright Risk Mitigation and Protection against: Prompt injection, Harmful content, Copyright issues (via protected material detection and Customer Copyright Commitment)",[590,1674,1675,1678],{},[883,1676,1677],{},"No Model Training:"," Prompts, responses, and Microsoft Graph data are NOT used to train foundation models.",[375,1680,1682],{"id":1681},"copilot-agents-with-sharepoint-online-knowledge","Copilot Agent's with SharePoint Online-Knowledge:",[353,1684,634],{},[587,1686,1687,1697],{},[590,1688,1689,1692,1693,1696],{},[883,1690,1691],{},"Permission & Sharing Model:"," Agents with SharePoint Online access always respects the permissions of the associated SharePoint site. That means, ",[883,1694,1695],{},"on one hand, you need to ensure that everyone who should have access has at least read permissions on the site","; on the other hand, you must be vigilant about not granting unnecessary permissions that could expose sensitive information to unauthorized users**. Properly configuring permissions is essentia**l, as Copilot Agents will only be able to access and surface content that the querying user is permitted to see. Additionally, leveraging Microsoft Purview information protection ensures that sensitivity labels and data loss prevention (DLP) policies persist with the content",[590,1698,1699,1702,1703,1706],{},[883,1700,1701],{},"Persistent Labels & DLP:"," Enable ",[883,1704,1705],{},"Microsoft Purview"," information protection so that sensitivity labels persist with content. Copilot agents inherit labels on source documents. Meaning if a file is classified “Confidential,” any AI-generated content or document from now on, will carry that label forward. This persistent label inheritance works in tandem with Data Loss Prevention policies to prevent AI from inadvertently exposing protected data. In practice, that means even if Copilot summarizes a sensitive file, the summary will be handled as sensitive too. This is something outstanding we do not find outside of Microsoft 365 and we won't see any AI Agent that is able to deeply integrate like this in the Microsoft 365 ecosystem!",[443,1708,1710],{"id":1709},"best-practices-to-prepare-further-sharepoint-online-for-agent-use","Best Practices to prepare further SharePoint Online for Agent use",[353,1712,449],{},[353,1714,1715],{},"To prepare SharePoint Online for effective use with Copilot Agents, follow these best practices:",[375,1717,1719],{"id":1718},"dedicated-sharepoint-site","Dedicated SharePoint Site",[353,1721,634],{},[353,1723,1724],{},"First, create a dedicated SharePoint site or a specific folder designed exclusively for your Copilot Agent’s knowledge base. This approach helps minimize issues related to oversharing and reduces the risk of users accidentally uploading sensitive or irrelevant files to the agent’s accessible repository. If you decide to use an existing SharePoint site, carefully review its contents to ensure that no confidential or sensitive information is stored there that should not be discoverable by the agent.",[375,1726,1728],{"id":1727},"granting-access","Granting Access",[353,1730,634],{},[353,1732,1733,1734,1737],{},"It is also important to ensure that all intended users have the necessary read permissions to access the site or folder. If you need to grant access manually, Ensure all intended users have read access to the site (for example, by ",[883,1735,1736],{},"adding them to the SharePoint site’s Visitors group"," or an appropriate Azure AD security group) to simplify the process and prevent accidental permission misconfigurations.",[375,1739,1741],{"id":1740},"prepare-files","Prepare Files",[353,1743,634],{},[353,1745,1746,1747,1750,1751,1754],{},"When preparing documents for use with Copilot Agents, remember that the AI currently ",[883,1748,1749],{},"cannot interpret embedded images within"," files. ",[883,1752,1753],{},"Therefore, add descriptive image captions or alternative text"," to help ensure that important visual information is not lost. For text-heavy documents, make sure When summarizing or referencing content, keep the total to a maximum of 1.5 million words or 300 pages to ensure Copilot works effectively.",[353,1756,1757,1758,1761],{},"For ",[883,1759,1760],{},"Excel files",", organize your data so that each file focuses either on numbers or on text, as mixed-content tables tend to yield less accurate results. Agents also respond most reliably to queries when the relevant data is contained within a single sheet of the workbook.",[353,1763,1764],{},[1042,1765,1766],{},"Agents respond best to Excel data when it’s contained in one sheet.",[353,1768,1769],{},"Example: If you have a large customer feedback survey stored in a single Excel file, separate the quantitative data (such as ratings and numerical responses) from the qualitative data (such as free-text feedback) into two different sheets. This method allows you to use tools like Python and Excel formulas to efficiently analyze the numerical data (e.g., calculate averages, sort results, determine confidence levels), while leveraging M365 Copilot’s sentiment analysis features to gain insights from the text-based feedback.",[375,1771,1773],{"id":1772},"file-limitations","File Limitations",[353,1775,634],{},[353,1777,1778,1779],{},"Finally, be aware of the file types and size limitations supported by Copilot Agents and Copilot Studio. The following table outlines current support:",[363,1780,1528],{"href":1526,"rel":1781},[849],[353,1783,1784,1785],{},"Also acknowledge those best practices Microsoft has shared on document lengths: ",[363,1786,1787],{"href":1787,"rel":1788},"https://support.microsoft.com/en-gb/topic/keep-it-short-and-sweet-a-guide-on-the-length-of-documents-that-you-provide-to-copilot-66de2ffd-deb2-4f0c-8984-098316104389",[849],[1790,1791],"v-table",{":head":1792,":hide-container":1792,":table":1793},"true","fileLimitations",[353,1795,1796],{},"Currently unsupported Filetypes in SharePoint Online: Officially everything else that is not listed there, is not officially supported.",[353,1798,1799],{},"Certain file types, such as CSV files, may function adequately even though they are not officially supported because they closely resemble plain text formats. However, most other file types—particularly container files like CAB, EXE, ZIP, as well as image, video, and audio formats such as PNG, IMG, MP3, and MP4—are not supported at this time.",[443,1801,1803],{"id":1802},"final-thoughts","Final thoughts",[353,1805,449],{},[353,1807,1808],{},"By following these recommendations, you can ensure that your Copilot Agents have access to well-structured, secure, and high-quality data, maximizing their usefulness and minimizing the risk of accidental data exposure. Investing time in preparing your SharePoint environment sets a strong foundation for successful AI agent deployment and adoption within your organization.",[353,1810,1811],{},"In fact many of our \"Build-an-Agent\" projects starting exactly with that. Not building the agent, but preparing the infrastructure and knowledge that we have a good quality data to use for the AI, because the Agent is only as good as the system beneath it!",{"title":392,"searchDepth":393,"depth":393,"links":1813},[1814,1815,1816,1829,1833,1839,1843,1849],{"id":1162,"depth":393,"text":1163},{"id":1182,"depth":393,"text":1183},{"id":1260,"depth":393,"text":1261,"children":1817},[1818,1819,1820,1821,1823,1824,1825,1826,1827,1828],{"id":1269,"depth":396,"text":1270},{"id":1278,"depth":396,"text":1279},{"id":1291,"depth":396,"text":1292},{"id":1308,"depth":396,"text":1822},"Step 4: Generate a SharePoint Online Baseline Report",{"id":1340,"depth":396,"text":1341},{"id":1349,"depth":396,"text":1350},{"id":1362,"depth":396,"text":1363},{"id":1371,"depth":396,"text":1372},{"id":1388,"depth":396,"text":1389},{"id":1397,"depth":396,"text":1398},{"id":1431,"depth":393,"text":1432,"children":1830},[1831,1832],{"id":1437,"depth":396,"text":1438},{"id":1469,"depth":396,"text":1470},{"id":1497,"depth":393,"text":1498,"children":1834},[1835,1836,1837,1838],{"id":1510,"depth":396,"text":1511},{"id":1531,"depth":396,"text":1532},{"id":1543,"depth":396,"text":1544},{"id":1562,"depth":396,"text":1563},{"id":1585,"depth":393,"text":1586,"children":1840},[1841,1842],{"id":1614,"depth":396,"text":1615},{"id":1681,"depth":396,"text":1682},{"id":1709,"depth":393,"text":1710,"children":1844},[1845,1846,1847,1848],{"id":1718,"depth":396,"text":1719},{"id":1727,"depth":396,"text":1728},{"id":1740,"depth":396,"text":1741},{"id":1772,"depth":396,"text":1773},{"id":1802,"depth":393,"text":1803},{"lang":1851,"seoTitle":1852,"titleClass":402,"date":1853,"categories":1854,"blogtitlepic":1855,"socialimg":1856,"customExcerpt":1857,"keywords":1858,"maxContent":417,"fileLimitations":1859,"textImageTeaser":1886,"asideNav":1901,"hreflang":1921,"footer":1926,"scripts":1927,"published":417},"de","How to Prepare Your M365 Data for Copilot Agents","2025-08-28",[1111],"head-microsoft-copilot.jpg","/blog/heads/head-microsoft-copilot.jpg","Before Microsoft 365 Copilot Agents can deliver real value, the foundation must be solid: clean data, proper permissions, and a reliable infrastructure. This guide explains why data quality determines AI success, highlights risks like oversharing and silos, and outlines 10 practical steps to make your M365 environment agent-ready—secure, compliant, and scalable.","Microsoft 365 Copilot, Copilot Agents, M365 data governance, AI readiness, SharePoint data security, M365 infrastructure, oversharing prevention, AI data preparation, Microsoft 365 security, agent-ready M365",[1860,1864,1868,1871,1874,1876,1878,1880,1882,1884],[1861,1862,1863],"File type","SharePoint Online - Limit","Manual Upload - Limit",[1865,1866,1867],".doc","150 MB","100 MB",[1869,1870,1867],".docx","512 MB",[1872,1866,1873],".html","not supported",[1875,1870,1867],".pdf",[1877,1866,1867],".ppt",[1879,1870,1867],".pptx",[1881,1866,1867],".txt",[1883,1866,1867],".xls",[1885,1866,1867],".xlsx",{"image":1887,"cloudinary":417,"alt":1888,"bgColor":1889,"offset":417,"white":417,"list":1890,"left":399,"float":399,"firstColWidth":1895,"secondColWidth":1896,"copyClasses":1897,"headline":1898,"subline":1899,"spacing":1900},"/icons/icon-copilot.svg"," Agent-Ready Infrastructure – Deine Basis für produktive Copilot Agents","#543b9c",[1891],{"ctaText":1892,"ctaHref":1893,"ctaType":1894,"external":417},"Sichere dir jetzt deinen Platz – kostenlos!","https://events.teams.microsoft.com/event/53a92e2c-9206-488d-9602-831864212207@a53834b7-42bc-46a3-b004-369735c3acf9","Button",5,7,"richtext","Agent-Ready Infrastructure – Deine Basis für produktive Copilot Agents","\u003Cp>KI ist nur so gut wie die Infrastruktur, auf der sie läuft. Wer Copilot Agents ernsthaft in der Praxis nutzen will, braucht mehr als nur Lizenzierung und Aktivierung. Es geht um strukturierte Daten, konsistente Governance und eine durchdachte Architektur, die skaliert – kurz: eine Agent-Ready Infrastructure.\u003Cbr /> \u003Cbr /> In unserem englischsprachigen Vortrag zeigen wir dir:\u003C/p> \u003Cul> \u003Cli>Warum Datenqualität und Informationsarchitektur erfolgsentscheidend sind\u003C/li> \u003Cli>Wie du deine Microsoft 365 Umgebung fit für produktive Agents machst\u003C/li> \u003Cli>Und welche Stellschrauben du heute drehen musst, damit dein Unternehmen morgen von KI wirklich profitiert\u003C/li> \u003C/ul> ","space-top-2 space-bottom-2 mt-10",{"menuItems":1902},[1903,1906,1909,1912,1915,1918],{"href":1904,"text":1905},"#why-your-infrastructure-data-matters","Why Infrastructure Matters",{"href":1907,"text":1908},"#_10-steps-to-improve-your-m365-data-infrastructure-now","10 Steps for M365 Data",{"href":1910,"text":1911},"#understanding-differences-between-agent-platforms","Understanding Agent Platform",{"href":1913,"text":1914},"#rag-retrieval-augumented-generation-vs-sharepoint-vs-upload","RAG vs. SharePoint vs. Upload",{"href":1916,"text":1917},"#microsoft-365-copilot-copilot-agents-security-compliance-out-of-the-box","M365 Copilot: Security",{"href":1919,"text":1920},"#best-practices-to-prepare-further-sharepoint-online-for-agent-use","SharePoint Best Practices",[1922,1924],{"lang":1851,"href":1923},"/de/posts/2025-08-26-agent-ready-infrastructure",{"lang":415,"href":1925},"/es/posts/2025-08-26-agent-ready-infrastructure",{"noMargin":417},{"slick":417},"/posts/2025-08-28-agent-ready-infrastructure",{"title":1156,"description":392},"posts/2025-08-28-agent-ready-infrastructure",[1150,1932,1933,1934],"M365 Data Governance","SharePoint Security","AI Data Preparation","MFq3O2_t_9-PUsJpotgGWQUvZeA4iFIzziBa46ujgFg",{"id":1937,"title":1938,"author":1939,"body":1940,"cta":397,"description":392,"eventid":397,"extension":398,"hideInRecent":399,"layout":400,"meta":2153,"moment":397,"navigation":417,"path":2184,"seo":2185,"stem":2186,"tags":2187,"webcast":399,"__hash__":2189},"content_de/posts/2025-09-25-gsa-unlocked.md","Global Secure Access Unlocked",[101,259],{"type":350,"value":1941,"toc":2139},[1942,1946,1948,1951,1954,1957,1961,1963,1966,1971,1974,1979,1982,1988,1992,1994,1997,2001,2003,2006,2009,2012,2015,2020,2024,2026,2029,2037,2042,2046,2048,2051,2054,2057,2062,2066,2068,2071,2074,2077,2082,2086,2088,2091,2094,2097,2105,2108,2113,2117,2119,2122,2125,2129,2131,2133,2136],[443,1943,1945],{"id":1944},"what-is-a-managed-red-tenant","What is a Managed Red Tenant?",[353,1947,449],{},[353,1949,1950],{},"The Managed Red Tenant combines our extensive experience in managed services with proven blueprints in the areas of workplace, Azure, and security.",[353,1952,1953],{},"The result: An isolated, fully cloud-based as-code managed environment that effectively protects administrative users and endpoints – even in target environments with multiple Microsoft Entra tenants and Active Directory domains.",[353,1955,1956],{},"Our solution relies on native, cloud-based identity and security features from Microsoft and strictly adheres to Zero Trust principles.",[375,1958,1960],{"id":1959},"global-secure-access-as-security-service-edge","Global Secure Access as Security Service Edge",[353,1962,634],{},[353,1964,1965],{},"We have integrated the latest innovations from Global Secure Access into various components of the Managed Red Tenant to enhance security when accessing Virtual Access Workstations (VAWs) and to protect and restrict outgoing privileged access.",[353,1967,1968],{},[883,1969,1970],{},"Microsoft Entra Internet Access",[353,1972,1973],{},"functioning as an identity-centric Secure Web Gateway (SWG), has been implemented to block public internet access and restrict connectivity to privileged interfaces and the authorized company’s tenant environments only. Additional features, such as Universal Conditional Access Evaluation (CAE), enable near real-time access blocking.",[353,1975,1976],{},[883,1977,1978],{},"Microsoft Entra Private Access",[353,1980,1981],{},"serves as an identity-centric Zero Trust Network Access (ZTNA) solution and is the core of our approach to providing secure and private access to VAWs. Its integration into our solution adds an extra layer of protection for privileged sessions on AVD-based endpoints by enforcing Conditional Access on the accessing client before establishing connectivity to the VAW. Securing access and applying Zero Trust principle to manage private or on-premises resources is another use cases where we take benefit of Private Access.",[353,1983,1984],{},[476,1985],{"alt":1986,"src":1987},"image.png","https://res.cloudinary.com/c4a8/image/upload/blog/pics/gsa-img-01.png",[443,1989,1991],{"id":1990},"use-cases-for-global-secure-access-in-the-managed-red-tenant","Use Cases for Global Secure Access in the Managed Red Tenant",[353,1993,449],{},[353,1995,1996],{},"Global Secure Access is one of the core components in the design of our Managed Red Tenant, and we’re excited to elevate both security and usability to a new level. The added value becomes most evident when looking at the individual use cases, which we’ll showcase in this blog.",[375,1998,2000],{"id":1999},"access-to-virtual-access-workstations","Access to Virtual Access Workstations",[353,2002,634],{},[353,2004,2005],{},"Some organizations choose not to equip all administrators with physical Privileged Admin Workstations (PAWs). For these low-privileged admins, we offer what we call Virtual Access Workstations (VAWs).",[353,2007,2008],{},"The most critical aspect here is secure access to the VAWs, and we consider it essential to establish a high level of security—where Entra Private Access plays a key role.",[353,2010,2011],{},"Administrators connect to the VAWs from their enterprise devices and sign in using their account from the Managed Red Tenant. Because of this identity switch, the accessing user is sourced from a different tenant than the the original device and will not able to present a device compliance status.",[353,2013,2014],{},"Therefore, we are using global secure access for pre-authentication using the original user from the device. Since our VAWs do not expose public endpoints and are only accessible via Entra Private Access, we can secure network access to a very high degree. Conditional Access in the workforce environment enforces strong user and device authentication, including device compliance and risk-based controls.",[353,2016,2017],{},[476,2018],{"alt":1986,"src":2019},"https://res.cloudinary.com/c4a8/image/upload/blog/pics/gsa-img-02.png",[375,2021,2023],{"id":2022},"secure-web-filtering","Secure Web Filtering",[353,2025,634],{},[353,2027,2028],{},"A key characteristic of administrative devices is their strictly limited access to applications, designed to minimize the attack surface as much as possible. While local solutions such as proxy.pac files or shared centralized proxies (not T0 exclusive) were commonly used in the past, we’ve opted for Entra Internet Access for devices within the Managed Red Tenant.",[587,2030,2031,2034],{},[590,2032,2033],{},"Internet access is only permitted from compliant devices and after strong user authentication",[590,2035,2036],{},"Access is restricted to explicitly approved URLs, and since HTTPS traffic (where possible) is decrypted and inspected, it’s also feasible to limit access to specific paths—for example, within Azure DevOps or GitHub",[353,2038,2039],{},[476,2040],{"alt":1986,"src":2041},"https://res.cloudinary.com/c4a8/image/upload/blog/pics/gsa-img-03.png",[375,2043,2045],{"id":2044},"tenant-restrictions-for-saas-services-and-administrative-interfaces","Tenant Restrictions for SaaS Services and Administrative Interfaces",[353,2047,634],{},[353,2049,2050],{},"In SaaS services and administrative interfaces, it’s common for URLs to be identical across all tenants, which makes them difficult to control using the web filtering methods described above.",[353,2052,2053],{},"To ensure that only accounts from the Managed Red Tenant can sign in to Microsoft’s approved portals from an administrative device, we leverage the Tenant Restriction feature of Global Secure Access.",[353,2055,2056],{},"Through Entra Internet Access, Entra ID is signaled which tenants are permitted for sign-in. This guarantees that all policies from the Managed Red Tenant are enforced and that administrative access occurs exclusively via B2B collaboration.",[353,2058,2059],{},[476,2060],{"alt":1986,"src":2061},"https://res.cloudinary.com/c4a8/image/upload/blog/pics/gsa-img-04.png",[375,2063,2065],{"id":2064},"on-premises-access","On-Premises Access",[353,2067,634],{},[353,2069,2070],{},"Of course, a Managed Red Tenant can also be used to administer on-premises and IaaS environments, which requires secure access to the datacenters. Entra Private Access provides us with Zero Trust Network Access that combines top-tier security standards with a flexible architecture and strong performance.",[353,2072,2073],{},"Access to datacenters and IaaS environments depends on robust user and device authentication, including device compliance and risk-based controls.",[353,2075,2076],{},"Managing individual targets as app segments enables granular access control, which is automated using Entra Governance features. This extends functions already widely used in the Managed Red Tenant—such as Just-In-Time administration and approval workflows—into the network layer.",[353,2078,2079],{},[476,2080],{"alt":1986,"src":2081},"https://res.cloudinary.com/c4a8/image/upload/blog/pics/gsa-img-05.png",[375,2083,2085],{"id":2084},"revocation-access-in-near-real-time","Revocation Access in Near Real-Time",[353,2087,634],{},[353,2089,2090],{},"Zero Trust also means being prepared to quickly and effectively contain threats—even within the most secure architecture—and to isolate compromised components.",[353,2092,2093],{},"In a Managed Red Tenant environment, we’re not only prepared for the compromise of users and devices within the tenant itself, but also for the (most likely) scenario where an attack originates from an admin’s office PC and then propagates to the Virtual Admin Workstation.",[353,2095,2096],{},"Thanks to the Universal Continuous Access Evaluation (CAE) feature in Global Secure Access, the following actions are automatically triggered:",[587,2098,2099,2102],{},[590,2100,2101],{},"Access to the Virtual Admin Workstation via Entra Private Access is interrupted if, for example, the user risk level of the account in the Workforce Tenant is set to High",[590,2103,2104],{},"Access to admin interfaces and the datacenter environment is revoked if, for example, the sessions of the account in the Managed Red Tenant are terminated",[353,2106,2107],{},"Additionally, full isolation of all devices and accounts within the Managed Red Tenant can be initiated at any time by the integrated CSOC service.",[353,2109,2110],{},[476,2111],{"alt":1986,"src":2112},"https://res.cloudinary.com/c4a8/image/upload/blog/pics/gsa-img-06.png",[375,2114,2116],{"id":2115},"enriched-sign-ins-and-token-insights","Enriched Sign-Ins and Token Insights",[353,2118,634],{},[353,2120,2121],{},"Beyond its many features for access control, Global Secure Access is a true game changer when it comes to logging. We gain significantly more telemetry from the network layer and can correlate it with existing sign-in and audit logs.",[353,2123,2124],{},"This enables our CSOC to identify which actions were still performed after containment was triggered—for example, in cases where not all tokens supported Continuous Access Evaluation (CAE).",[353,2126,2127],{},[476,2128],{"alt":1986,"src":2112},[443,2130,1803],{"id":1802},[353,2132,449],{},[353,2134,2135],{},"This blog is published alongside a webcast where we explore the Managed Red Tenant, Global Secure Access, the integration process, and the relevant use cases, supported by live demos.",[353,2137,2138],{},"If this blog has sparked your interest, we definitely encourage you to check out the webcast. And of course, we’re always happy to hear from you directly!",{"title":392,"searchDepth":393,"depth":393,"links":2140},[2141,2144,2152],{"id":1944,"depth":393,"text":1945,"children":2142},[2143],{"id":1959,"depth":396,"text":1960},{"id":1990,"depth":393,"text":1991,"children":2145},[2146,2147,2148,2149,2150,2151],{"id":1999,"depth":396,"text":2000},{"id":2022,"depth":396,"text":2023},{"id":2044,"depth":396,"text":2045},{"id":2064,"depth":396,"text":2065},{"id":2084,"depth":396,"text":2085},{"id":2115,"depth":396,"text":2116},{"id":1802,"depth":393,"text":1803},{"lang":1851,"seoTitle":2154,"titleClass":402,"date":2155,"categories":2156,"blogtitlepic":2157,"socialimg":2158,"customExcerpt":2159,"keywords":2160,"maxContent":417,"textImageTeaser":2161,"asideNav":2171,"hreflang":2179,"footer":2182,"scripts":2183,"published":417},"Securing Microsoft 365 Admin Access with Entra and Global Secure Access","2025-09-25",[422],"head-gsa-unlocked.jpg","/blog/heads/head-gsa-unlocked.jpg","This blog explores how Microsoft Global Secure Access enhances security and control in our Managed Red Tenant. With Entra Internet Access and Private Access, organizations can secure admin sessions, enforce Zero Trust, and streamline access to cloud and on-prem resources. Real-world use cases and architecture insights show how to protect M365 environments effectively.","Microsoft Global Secure Access, Entra Internet Access, Entra Private Access, Managed Red Tenant, Zero Trust, M365 security, conditional access, admin access control, secure web filtering, virtual admin workstations, CAE, tenant restrictions, Microsoft 365, cloud security",{"image":2162,"cloudinary":417,"alt":2163,"bgColor":2164,"offset":417,"white":417,"list":2165,"left":399,"float":399,"firstColWidth":1895,"secondColWidth":1896,"copyClasses":1897,"headline":2169,"subline":2170,"spacing":1900},"/icons/shape-managed-red-tenant.svg","Copilot Icon","#E44418",[2166],{"ctaText":2167,"ctaHref":2168,"ctaType":1894,"external":417},"Watch the full session on YouTube","https://youtu.be/SpEOIdoA-uc","Global Secure Access Unlocked: Real World Implementation in Managed Red Tenant","\u003Cp>In the Managed Red Tenant, we enforce strict separation for privileged access. Live demos will show how we secure admin workflows using Global Secure Access.\u003Cbr /> \u003Cbr /> In our English-language session, you’ll learn:\u003C/p> \u003Cul> \u003Cli>How PAWs and VAWs with identity switching create secure admin workstations\u003C/li> \u003Cli>How Tenant Restrictions and Cross-Tenant Access Policies allow only authorized access\u003C/li> \u003Cli>How Per-App Tunnels and Continuous Access Evaluation are replacing traditional VPNs\u003C/li> \u003Cli>How Just-in-Time administration works in practice with Microsoft PIM\u003C/li> \u003C/ul> ",{"menuItems":2172},[2173,2175,2177],{"href":2174,"text":1945},"#what-is-a-managed-red-tenant",{"href":2176,"text":1991},"#use-cases-for-global-secure-access-in-the-managed-red-tenant",{"href":2178,"text":1803},"#final-thoughts",[2180,2181],{"lang":1851,"href":1923},{"lang":415,"href":1925},{"noMargin":417},{"slick":417},"/posts/2025-09-25-gsa-unlocked",{"title":1938,"description":392},"posts/2025-09-25-gsa-unlocked",[1150,1932,1933,1934,2188],"Global Secure Access","cakUHqaQGWiHVrfynCXOL1BXN9OReBxqjUpRmiFrBFw",{"id":2191,"title":2192,"author":2193,"body":2194,"cta":397,"description":392,"eventid":397,"extension":398,"hideInRecent":399,"layout":400,"meta":2311,"moment":397,"navigation":417,"path":2370,"seo":2371,"stem":2372,"tags":2373,"webcast":399,"__hash__":2377},"content_de/posts/2025-09-30-security-store.md","Als einer der Ersten weltweit: glueckkanja Security Copilot Agents",[190],{"type":350,"value":2195,"toc":2305},[2196,2200,2202,2205,2208,2212,2215,2218,2221,2225,2232,2234,2244,2255,2277,2288,2295,2299],[443,2197,2199],{"id":2198},"zum-start-des-microsoft-security-store-stellte-glueckkanja-10-security-copilot-agents-vor","Zum Start des Microsoft Security Store stellte glueckkanja 10 Security Copilot Agents vor",[353,2201,449],{},[353,2203,2204],{},"Offenbach am Main, 30. September 2025 – glueckkanja ist ab sofort Teil des Microsoft Security Store Partner-Ökosystems. Als einer der allerersten Partner wurde glueckkanja ausgewählt – dank langjähriger Erfahrung mit Microsoft Security-Technologien, Innovationsfreude und der engen Zusammenarbeit mit Microsoft.",[2206,2207],"quotes",{":quotes":2206,":no-fullscreen":1792},[2209,2210],"div",{"style":2211},"padding-top:50px;",[353,2213,2214],{},"Wir arbeiten eng mit Microsoft zusammen und bringen unsere Erfahrung sowie direktes Kundenfeedback in die Weiterentwicklung des Microsoft Security Store ein, ob bei neuen Features, Integrationen oder konkreten Anforderungen aus der Praxis. Mit zertifizierten Lösungen und KI-Agents, die nahtlos in Microsoft-Security-Produkte integriert sind, erleichtern wir Unternehmen den Zugang zu vertrauenswürdigen Technologien: schnell gefunden, einfach gekauft, sofort produktiv eingesetzt. Über den Security Store helfen wir dir, Ergebnisse zu beschleunigen und den Betrieb zu vereinfachen mit geprüften, leicht ausrollbaren Lösungen, die perfekt zusammenspielen.",[353,2216,2217],{},"Der Microsoft Security Store bietet dir einen zentralen Ort, um Security-Lösungen und KI-Agents zu entdecken, zu erwerben und bereitzustellen. Zertifizierte Integrationen, transparente Abrechnung und schnelle Implementierung stärken deine Security und schaffen Freiraum fürs Wesentliche.",[353,2219,2220],{},"Damit setzt der Microsoft Security Store neue Maßstäbe für die einfache Beschaffung und den effizienten Betrieb von Cybersecurity-Lösungen. Durch die Bündelung verschiedenster Technologien lassen sich moderne Security-Ansätze schneller entdecken, nutzen und produktiv machen. Features wie Framework-Alignment, einfache Abrechnung und geführte Bereitstellung helfen Security-Teams, Komplexität zu reduzieren, Innovationen schneller einzusetzen und den Wert ihrer Investitionen voll auszuschöpfen.",[443,2222,2224],{"id":2223},"mehr-erfahren-im-offiziellen-microsoft-blog","Mehr erfahren im offiziellen Microsoft-Blog:",[353,2226,2227],{},[363,2228,2231],{"href":2229,"rel":2230},"https://techcommunity.microsoft.com/blog/securitycopilotblog/agentic-security-your-way-build-your-own-security-copilot-agents/4454555",[849],"Agentic Security Your Way: Build Your Own Security Copilot Agents",[443,2233,378],{"id":377},[353,2235,2236,2239,2240,2243],{},[883,2237,2238],{},"We Manage and Protect Microsoft Ecosystems at Scale","\r\nglueckkanja zählt zu den führenden Cloud Managed Service Providern und Top-Microsoft-Partnern für sichere, skalierbare und vollständig ",[883,2241,2242],{},"cloud-native Microsoft-Umgebungen."," Mit einem einheitlichen Blueprint-Ansatz und Infrastructure-as-Code-Methodik beschleunigen wir die digitale Transformation und Cloud-Adoption von Enterprise-Kunden – sicher, konsistent und zukunftsfähig.",[353,2245,2246,2247,2250,2251,2254],{},"Unser Portfolio bietet umfassende Managed Services für ",[883,2248,2249],{},"Microsoft Azure, Microsoft Entra und Microsoft Intune"," – für effizientes Identity & Access Management, modernes Endpoint Management und den Aufbau konformer Zero-Trust-Infrastrukturen. Ergänzt wird das Angebot durch ",[883,2252,2253],{},"24/7 Security Operations"," und Incident Response aus unserem eigenen Cybersecurity Operations Center (SOC) für kontinuierlichen Schutz, schnelle Reaktion und Compliance mit aktuellen Standards.",[353,2256,2257,2258,2261,2262,2265,2266,2269,2270,2272,2273,2276],{},"Für ein nahtlos cloud-natives Microsoft-Erlebnis haben wir eigene Tools entwickelt, die Management und Automatisierung radikal vereinfachen: ",[883,2259,2260],{},"KONNEKT"," für sichere Zusammenarbeit mit Microsoft 365-Daten, ",[883,2263,2264],{},"RADIUSaaS"," und ",[883,2267,2268],{},"SCEPman"," für passwortlose, Intune-integrierte Netzwerkauthentifizierung, ",[883,2271,982],{}," für skalierbare Softwareverteilung und ",[883,2274,2275],{},"TerraProvider"," für vollautomatisierte Bereitstellung von CloudPCs und Hardware-Clients via Intune.",[353,2278,2279,2280,2283,2284,2287],{},"Als einer der ersten Partner weltweit erhielten wir ",[883,2281,2282],{},"Microsoft Verified MXDR","-Zertifizierung – ein Beleg für exzellente Managed Security Operations. Mit rund 250 Cloud-Profis und einer starken Erfolgsbilanz wurden wir mehrfach als Microsoft Worldwide Partner of the Year ausgezeichnet und sind seit 2019 durchgehend im Spitzenfeld des ",[883,2285,2286],{},"ISG Microsoft 365","-Quadranten Deutschland.",[353,2289,2290,2291,2294],{},"Darüber hinaus gehören wir zu Deutschlands TOP 100 Innovatoren und unsere ",[883,2292,2293],{},"herausragende 4,7/5 Kununu-Bewertung"," (Deutschlands führende Arbeitgeberplattform) unterstreicht unsere Kultur von Exzellenz und Mitarbeiterzufriedenheit.",[443,2296,2298],{"id":2297},"lern-more","Lern more",[353,2300,2301,2302],{},"glueckkanja joins the Microsoft Security Store Partner Ecosystem with 10 Security Copilot Agents. Learn more: ",[363,2303,2229],{"href":2229,"rel":2304},[849],{"title":392,"searchDepth":393,"depth":393,"links":2306},[2307,2308,2309,2310],{"id":2198,"depth":393,"text":2199},{"id":2223,"depth":393,"text":2224},{"id":377,"depth":393,"text":378},{"id":2297,"depth":393,"text":2298},{"lang":1851,"seoTitle":2312,"titleClass":402,"date":2313,"categories":2314,"blogtitlepic":2315,"socialimg":2316,"customExcerpt":2317,"keywords":2318,"maxContent":399,"hreflang":2319,"quotes":2324,"contactInContent":2331,"footer":2368,"scripts":2369,"published":417},"glueckkanja ist Launch-Partner im Microsoft Security Store mit 10 Security Copilot Agents","2025-09-30",[422],"head-security-agents.jpg","/blog/heads/head-security-agents.jpg","glueckkanja gehört zu den ersten Partnern im Microsoft Security Store Preview und liefert zum Start zehn Microsoft-native Security Copilot Agents für Security, Entra, Intune und Purview. Die Agents wurden in enger Zusammenarbeit mit Kunden entwickelt und sind von Anfang an auf reale Herausforderungen im Security-Alltag zugeschnitten – nahtlos integriert, enterprise-ready und gebaut, um Security Operations einfacher und schneller zu machen.","Microsoft Security Store Preview, Security Copilot Agents, glueckkanja Microsoft Partner, Microsoft-native Sicherheitslösungen, KI-gestützte Cybersecurity-Tools, Entra Security Agents, Intune Security Automation, Purview Compliance Agents, Cloud Security Microsoft Copilot, Microsoft Security Operations vereinfachen",[2320,2322],{"lang":412,"href":2321},"/en/posts/2025-09-30-security-store",{"lang":415,"href":2323},"/es/posts/2025-09-30-security-store",{"items":2325},[2326],{"text":2327,"name":2328,"position":2329,"company":2330},"Ein Forensic Agent von glueckkanja AG ermöglicht eine tiefgehende Analyse von Defender XDR-Vorfällen und beschleunigt damit Untersuchungen. Der Privileged Admin Watchdog Agent unterstützt zugleich die Umsetzung des „Zero Standing Privilege“-Prinzips, indem er dauerhafte Administratoridentitäten eliminiert. Gemeinsam mit sechs weiteren Agents im Security Store unterstreicht glueckkanja AG, wie Unternehmen ihre Security- und IT-Herausforderungen wirksam meistern können.","Dorothy Li","Corporate Vice President, Security Copilot, Ecosystem and Marketplace","Microsoft",{"quote":417,"infos":2332},{"bgColor":1118,"headline":2333,"subline":2334,"level":443,"textStyling":509,"flush":510,"person":2335,"form":2339},"Jetzt Kontakt aufnehmen","Du willst wissen, wie unsere 10 Microsoft-nativen Security Copilot Agents deine Security-, Entra-, Intune- und Purview-Operationen vereinfachen? Füll das Formular aus – wir teilen Insights, Demos und Praxisbeispiele, die zu deinem Bedarf passen.",{"image":512,"cloudinary":417,"alt":2336,"name":163,"quotee":163,"quoteeTitle":2337,"quote":2338},"Porträt von Jan Geisbauer, Head of Security bei glueckkanja","Head of Security","Was unsere Kunden gewinnen, ist Zeit und Klarheit: Security-Teams verbringen weniger Zeit mit manueller Analyse und Troubleshooting – und können sich auf die Bedrohungen konzentrieren, die wirklich zählen. Mit unseren 10 Security Copilot Agents helfen wir ihnen, ihre Security zu stärken, Kosten zu senken und den Alltag direkt in Microsoft Security zu vereinfachen.",{"ctaText":527,"cta":2340,"method":400,"action":530,"fields":2341},{"skin":529},[2342,2343,2345,2347,2350,2355,2357,2359,2362,2364,2365,2366],{"type":533,"id":534,"value":535},{"label":537,"type":538,"id":539,"required":417,"requiredMsg":2344},"Bitte gib deinen Namen ein.",{"label":542,"type":538,"id":543,"required":417,"requiredMsg":2346},"Bitte gib dein Unternehmen ein.",{"label":2348,"type":547,"id":547,"required":417,"requiredMsg":2349},"E-Mail-Adresse*","Bitte gib deine E-Mail-Adresse ein.",{"label":2351,"type":2352,"id":2353,"required":399,"requiredMsg":2354},"Deine Nachricht an uns","textarea","message","Bitte gib eine Nachricht ein.",{"label":2356,"type":551,"id":552,"required":417,"requiredMsg":553},"Deine Daten werden gespeichert und zur Bearbeitung deiner Anfrage verwendet. Details findest du in unserer \u003Ca href=\"/de/privacy\">Datenschutzerklärung\u003C/a>.",{"type":533,"id":2358,"value":422},"_topic",{"type":533,"id":2360,"value":2361},"_location","World",{"type":533,"id":555,"value":2363},"Form: Blog Microsoft Security Store | DE",{"type":533,"id":558,"value":1143},{"type":533,"id":561},{"type":533,"id":2367},"jsonData",{"noMargin":417},{"slick":417},"/posts/2025-09-30-security-store",{"title":2192,"description":392},"posts/2025-09-30-security-store",[2374,2375,2376],"AI Agents","Security Copilot","Microsoft Security","jWgGXZca9hx0XuFOsif_ZOHu2Ld2dUS1xWsLz8iGblU",{"id":2379,"title":2380,"author":2381,"body":2382,"cta":397,"description":2386,"eventid":397,"extension":398,"hideInRecent":399,"layout":400,"meta":2420,"moment":2422,"navigation":417,"path":2435,"seo":2436,"stem":2437,"tags":2438,"webcast":399,"__hash__":2442},"content_de/posts/2026-03-16-ai-agent-hackathon.md","Sechs Agents. Vier Wochen. Echter Betrieb.",[190],{"type":350,"value":2383,"toc":2418},[2384,2387,2390,2393,2396,2399,2405,2409,2412,2415],[353,2385,2386],{},"Wie viele Stunden verbringt eure IT-Abteilung pro Woche mit Aufgaben, die ein Agent in Minuten erledigen könnte?",[353,2388,2389],{},"Es gibt in der deutschen Unternehmenslandschaft einen Prozess, den fast jede IT-Abteilung kennt: Jemand liest Verträge. Jemand anderes sortiert Anforderungen in Kategorien. Wieder jemand beantwortet dieselben Fragen zu Lieferungen, die gestern schon jemand beantwortet hat. Es sind keine glamourösen Probleme. Aber es sind die, die in Summe Zehntausende Stunden im Jahr kosten und die sich erstaunlich gut für AI Agents eignen, wenn man weiß, wo man den Hebel ansetzt.",[353,2391,2392],{},"Sechs Unternehmen haben im Februar bei uns in Offenbach genau das getan. Kiekert lässt Anforderungen im R&D jetzt regelbasiert kategorisieren, mit Confidence Score und Feedback-Loop. Der Agent läuft bereits produktiv. Dr. Oetker hat einen Contract Review Assistant gebaut, der IT-Verträge auf kritische Klauseln prüft und einen strukturierten Prüfbericht für Einkauf und Legal erstellt. Eckes-Granini ist gleich mit zwei Agents angetreten: einem Onboarding-Agenten, der neue Mitarbeitende ab dem ersten Login durch MFA, Office-Setup und Sicherheitsrichtlinien führt, und einem Logistik-Agenten, der Disponenten Fragen zu Sendungen, Tarifen und Spediteuren beantwortet. igefa hat einen sprachbasierten Hotline-Agenten für den internen IT-Support entwickelt, angebunden an JIRA und Confluence. Und die lila logistik hat das vielleicht ungewöhnlichste Projekt mitgebracht: einen Use Case Generator, der in SharePoint und Exchange beobachtet, wo Automatisierungspotenziale liegen, weil das eigentliche Problem oft nicht die Technologie ist, sondern dass niemand im Unternehmen die richtigen Stellen erkennt.",[353,2394,2395],{},"All das entstand im Copilot Studio, mit Agent Flows, Dataverse Anbindungen und MCP Connectoren, begleitet von vier unserer MVPs. Vier Wochen Build-Phase, neben dem normalen Tagesgeschäft. Die Teilnehmenden mussten sich jede Stunde dafür freischaufeln, neben Tickets, Quartalsabschlüssen und dem operativen Betrieb. Dass am Ende sechs funktionsfähige Agents standen, sagt weniger über die Technologie als über die Teams, die sie gebaut haben.",[353,2397,2398],{},"Am 10. März, Microsoft Office Frankfurt, dann die Probe: Sechs Präsentationen, je 20 Minuten, bewertet nach Business Impact, technischer Tiefe und dem Applaus des Publikums (ja, auch der steht auf dem Bewertungsbogen). Kiekert hat gewonnen, weil ihr Agent produktiv läuft, gebaut von jemandem aus der Fachabteilung, ohne IT-Hintergrund, ohne Vorerfahrung im Copilot Studio. Dr. Oetker, weil die Vertragsprüfung so universell ist, dass die Jury danach über die eigenen IT-Verträge nachdachte. Dass alle sechs Teams in vier Wochen neben dem Tagesgeschäft einen lauffähigen Agent gebaut haben: Das war am Ende die eigentliche Nachricht des Tages.",[2400,2401],"video-frame",{"thumb":2402,"alt":2403,"id":2404,":full-width":1792},"/thumbs/thumb-ai-agent-hackathon.jpg","Präsentation des glueckkanja AI Agent Hackathons im Microsoft Office Frankfurt: Sechs Teams zeigen ihre Copilot Studio Agents vor Publikum.","GjumQAnKj8k",[2209,2406,2408],{"style":2407},"background:var(--color-black-4); margin-top:0.5rem; padding:0.5rem 1rem; font-size:0.85rem; color:var(--color-blue-dark)","glueckkanja AI Agent Hackathon – Sechs Unternehmen, sechs Agents, vier Wochen",[353,2410,2411],{},"Das Format heißt glueckkanja AI Agent Hackathon. Entstanden aus einem Microsoft Hackathon in München, bei dem wir mit Knorr-Bremse teilgenommen haben. Microsoft hat uns danach gebeten, es mit unseren Kunden weiterzuführen. Die Idee ist einfach: Unternehmen bewerben sich mit einem konkreten Prozess, der heute manuell läuft. Wir schärfen den Use Case, definieren die Architektur und bauen gemeinsam. Wer nicht gleich in den Hackathon einsteigen will: Wir machen auch Workshops, in denen wir Use Cases identifizieren und die Agent Architektur vorbereiten: als Einstieg oder als eigenständiges Format.",[353,2413,2414],{},"Der nächste glueckkanja AI Agent Hackathon startet im Herbst 2026. Die Registrierung ist offen. Wer vorher schon Use Cases identifizieren und die eigene Umgebung vorbereiten will: Wir machen das gerne. Sprecht uns an.",[353,2416,2417],{},"Danke an Sylvia und Miriam von Microsoft für das Vertrauen ins Format. An Kiekert, Dr. Oetker, Eckes-Granini, igefa und die lila logistik für den Mut und den Einsatz. Und an unser glueckkanja-Team, dass ihr das möglich gemacht habt.",{"title":392,"searchDepth":393,"depth":393,"links":2419},[],{"lang":1851,"seoTitle":2421,"titleClass":402,"date":2422,"categories":2423,"blogtitlepic":2424,"socialimg":2425,"customExcerpt":2426,"keywords":2427,"hreflang":2428,"published":417},"glueckkanja AI Agent Hackathon: Sechs Unternehmen bauen AI Agents mit Copilot Studio","2026-03-16",[405],"head-ai-agent-hackathon.jpg","/blog/heads/head-ai-agent-hackathon.jpg","Sechs Unternehmen, vier Wochen Build-Phase, sechs funktionierende AI Agents – das war der erste glueckkanja AI Agent Hackathon. Kiekert, Dr. Oetker, Eckes-Granini, igefa und die lila logistik haben im Copilot Studio Agents gebaut, die heute produktiv laufen. Was dabei entstand und wie das Format funktioniert.","AI Agent Hackathon, Copilot Studio, glueckkanja, AI Agents, Microsoft Copilot, Agent Flows, Dataverse, MCP Connector, Kiekert, Dr. Oetker, Eckes-Granini, igefa, lila logistik, AI Automatisierung, Unternehmens-KI, Prozessautomatisierung",[2429,2431,2433],{"lang":1851,"href":2430},"/de/posts/2026-03-16-ai-agent-hackathon",{"lang":412,"href":2432},"/en/posts/2026-03-16-ai-agent-hackathon",{"lang":415,"href":2434},"/es/posts/2026-03-16-ai-agent-hackathon","/posts/2026-03-16-ai-agent-hackathon",{"title":2380,"description":2386},"posts/2026-03-16-ai-agent-hackathon",[2439,2440,2441,2374],"AI","Copilot Studio","Hackathon","BSmLQxKkvb1FjxO4PwoRTvTCb36T4sY_v6gsGhCBtvc",1779292462101]