[{"data":1,"prerenderedAt":1916},["ShallowReactive",2],{"authors_data":3,"content-en-list-f9a3f5c111a24":344},{"id":4,"extension":5,"meta":6,"stem":342,"__hash__":343},"authors_data/authors.json","json",{"path":7,"Alexander Schlindwein":8,"Sophie Luna":14,"Nadine Kern":22,"Karsten Kleinschmidt":29,"Julian Wendt":35,"Holger Bunkradt":40,"Ralf Mania":46,"Oliver Kieselbach":52,"Steffen Schwerdtfeger":58,"Gunnar Winter":66,"Jan Petersen":71,"Thorsten Kunzi":76,"Moritz Pohl":80,"Thorben Pöschus":85,"Christoph Hannebauer":91,"Marco Scheel":95,"Christopher Brumm":100,"Florian Klante":107,"Niklas Bachmann":112,"Nils Krautkrämer":117,"Patrick Treptau":123,"Peter Beckendorf":128,"Patrick Sobau":133,"Jörg Wunderlich":138,"Michael Breither":142,"Christian Kanja":147,"Zeba Hoffmann":153,"Jochen Fröhlich":158,"Jan Geisbauer":162,"Gerrit Reinke":174,"Christian Kordel":180,"Stephan Wälde":184,"Carolin Kanja":189,"Adrian Ritter":195,"Marvin Bangert":200,"Thorsten Pickhan":206,"Christian Lorenz":212,"Denis Böhm":217,"Fabian Bader":222,"Juan Jose Fernandez Perez":228,"Mahschid Sayyar":233,"Benjamin Dassow":238,"Markus Walschburger":243,"Jonathan Haist":248,"Daniel Rohregger":253,"Thomas Naunheim":258,"Florian Stöckl":263,"Pascal Asch":268,"Markus Kättner":273,"Anna Ulbricht":280,"body":287,"title":341,"Thorben Poeschus":85,"Nils Krautkraemer":117,"Joerg Wunderlich":138,"Jochen Froehlich":158,"Stephan Waelde":184,"Denis Boehm":217,"Florian Stoeckl":263,"Markus Kaettner":273},"/authors",{"display_name":9,"avatar":10,"permalink":11,"twitter":12,"linkedin":13},"Alexander Schlindwein","people/people-alexander-rudolph.png","/authors/alexander-schlindwein","AlexanderOnIT","schlindwein-alexander",{"display_name":15,"avatar":16,"permalink":17,"twitter":18,"linkedin":19,"imageOffsetLeft":20,"imageOffsetTop":21},"Sophie Luna","c_thumb,h_1600,w_1600/people/people-sophie-luna.jpg","/authors/sophie-luna","glueckkanjagab","../company/glueckkanja-gab","58%","67%",{"display_name":23,"avatar":24,"permalink":25,"twitter":26,"linkedin":27,"imageOffsetTop":28},"Nadine Kern","people/people-nadine-kern.png","/authors/nadine-kern","nadineausRT","nadine-kern","72%",{"display_name":30,"avatar":31,"permalink":32,"twitter":33,"linkedin":34},"Karsten Kleinschmidt","people/people-karsten-kleinschmidt.png","/authors/karsten-kleinschmidt","KarstenonIT","karstenkleinschmidt",{"display_name":36,"avatar":37,"permalink":38,"linkedin":39},"Julian Wendt","people/people-julian-wendt.png","/authors/julian-wendt","julian-wendt",{"display_name":41,"avatar":42,"permalink":43,"linkedin":44,"twitter":45},"Holger Bunkradt","people/people-holger-bunkradt.png","/authors/holger-bunkradt","holger-bunkradt-12b5053b","hbunkradt",{"display_name":47,"avatar":48,"permalink":49,"linkedin":50,"twitter":51},"Ralf Mania","people/people-ralf-mania.png","/authors/ralf-mania","ralf-mania-146a2757","RaMa1976",{"display_name":53,"avatar":54,"permalink":55,"linkedin":56,"twitter":57},"Oliver Kieselbach","people/people-oliver-kieselbach.png","/authors/oliver-kieselbach","oliver-kieselbach-a4a3409","okieselbT",{"display_name":59,"avatar":60,"permalink":61,"linkedin":62,"twitter":63,"imageOffsetTop":64,"imageOffsetLeft":65},"Steffen Schwerdtfeger","people/people-steffen-schwerdtfeger.png","/authors/steffen-schwerdtfeger","steffen-schwerdtfeger","SteffenAtCloud","79%","51%",{"display_name":67,"avatar":68,"permalink":69,"twitter":18,"linkedin":70},"Gunnar Winter","c_thumb,h_1600,w_1600/people/people-gunnar-winter.jpg","/authors/gunnar-winter","company/glueckkanja-gab",{"display_name":72,"avatar":73,"permalink":74,"twitter":18,"linkedin":75},"Jan Petersen","c_thumb,h_1600,w_1600/people/jan-petersen.png","/authors/jan-petersen","jan-petersen-26a901",{"display_name":77,"avatar":78,"permalink":79,"twitter":18,"linkedin":70,"imageOffsetTop":28},"Thorsten Kunzi","c_thumb,h_1600,w_1600/people/author-thorsten-kunzi.png","/authors/thorsten-kunzi",{"display_name":81,"avatar":82,"permalink":83,"twitter":18,"linkedin":84},"Dr. Moritz Pohl","c_thumb,h_1600,w_1600/people/people-moritz-pohl.png","/authors/moritz-pohl","dr-moritz-pohl",{"display_name":86,"avatar":87,"permalink":88,"twitter":89,"linkedin":90},"Thorben Pöschus","c_thumb,h_1600,w_1600/people/thorben.poeschus.png","/authors/thorben-poeschus","TPO901","thorben-pöschus-624693b7",{"display_name":92,"avatar":93,"permalink":94,"twitter":18,"linkedin":70,"imageOffsetTop":28},"Dr. Christoph Hannebauer","people/people-christoph-hannebauer.png","/authors/christoph-hannebauer",{"display_name":96,"avatar":97,"permalink":98,"twitter":99,"linkedin":99},"Marco Scheel","c_thumb,h_1600,w_1600/people/people-marco-scheel.png","/authors/marco-scheel","marcoscheel",{"display_name":101,"avatar":102,"permalink":103,"twitter":104,"linkedin":105,"imageOffsetTop":106},"Christopher Brumm","c_thumb,h_1600,w_1600/people/people-christopher-brumm.jpg","/authors/christopher-brumm","cbrhh","christopherbrumm","66%",{"display_name":108,"avatar":109,"permalink":110,"linkedin":111,"twitter":18},"Florian Klante","c_thumb,h_1600,w_1600/people/florian-klante.jpg","/authors/florian-klante","florian-klante-6031b31b",{"display_name":113,"avatar":114,"permalink":115,"linkedin":116,"twitter":18},"Niklas Bachmann","c_thumb,h_1600,w_1600/people/niklas.bachmann.png","/authors/niklas-bachmann","niklas-bachmann-66a863158",{"display_name":118,"avatar":119,"permalink":120,"twitter":121,"linkedin":122},"Nils Krautkrämer","c_thumb,h_1600,w_1600/people/nils-krautkraemer.png","/authors/nils-krautkraemer","KrauNils","nils-krautkrämer-8b04bb250",{"display_name":124,"avatar":125,"permalink":126,"linkedin":127,"twitter":18},"Patrick Treptau","c_thumb,h_1600,w_1600/people/people-patrick-treptau.png","/authors/patrick-traptau","ptreptau",{"display_name":129,"avatar":130,"permalink":131,"linkedin":132,"twitter":18,"imageOffsetTop":28},"Peter Beckendorf","c_thumb,h_1600,w_1600/people/peter-beckendorf.png","/authors/peter-beckendorf","peter-beckendorf-29a239b1",{"display_name":134,"avatar":135,"permalink":136,"linkedin":137,"twitter":18},"Patrick Sobau","c_thumb,h_1600,w_1600/people/patrick-sobau.png","/authors/patrick-sobau","patrick-sobau",{"display_name":139,"avatar":140,"permalink":141,"twitter":18},"Jörg Wunderlich","c_thumb,h_1600,w_1600/people/joerg-wunderlich.png","/authors/joerg-wunderlich",{"display_name":143,"avatar":144,"permalink":145,"twitter":18,"linkedin":146},"Michael Breither","c_thumb,h_1600,w_1600/people/people-michael-breither.jpg","/authors/michael-breither","michaelbreither",{"display_name":148,"avatar":149,"permalink":150,"twitter":151,"linkedin":152},"Christian Kanja","c_thumb,h_1600,w_1600/people/people-christian-kanja.png","/authors/christian-kanja","cekageka","christian-kanja",{"display_name":154,"avatar":155,"permalink":156,"linkedin":157,"twitter":18},"Zeba Hoffmann","c_thumb,h_1600,w_1600/people/zeba-hoffmann.png","/authors/zeba-hoffmann","zebahoffmann",{"display_name":159,"avatar":160,"permalink":161,"twitter":18,"linkedin":70},"Jochen Fröhlich","c_thumb,h_1600,w_1600/people/people-jochen-froehlich.png","/authors/jochen-froehlich",{"display_name":163,"avatar":164,"permalink":165,"twitter":166,"linkedin":166,"imageOffsetTop":28,"socials":167},"Jan Geisbauer","c_thumb,h_1600,w_1600/people/people-jan-geisbauer-csoc.png","/authors/jan-geisbauer","JanGeisbauer",[168,171],{"text":169,"href":170},"Blog","https://emptydc.com",{"text":172,"href":173},"Podcast","https://hairlessinthecloud.com",{"display_name":175,"avatar":176,"permalink":177,"twitter":178,"linkedin":179},"Gerrit Reinke","c_thumb,h_1600,w_1600/people/gerrit-reinke.png","/authors/gerrit-reinke","GLWRe","glwr",{"display_name":181,"avatar":182,"permalink":183,"twitter":18,"linkedin":70},"Christian Kordel","c_thumb,h_1600,w_1600/people/christian-kordel.png","/authors/christian-kordel",{"display_name":185,"avatar":186,"permalink":187,"twitter":188,"linkedin":70},"Stephan Wälde","c_thumb,h_1600,w_1600/people/people-stephan-waelde.png","/authors/stephan-waelde","stephanwaelde",{"display_name":190,"avatar":191,"permalink":192,"twitter":193,"linkedin":194},"Carolin Kanja","c_thumb,h_1600,w_1600/people/people-carolin-kanja.jpg","/authors/carolin-kanja","fraukanja","carolin-kanja",{"display_name":196,"avatar":197,"permalink":198,"twitter":199,"linkedin":199},"Adrian Ritter","c_thumb,h_1600,w_1600/people/people-adrian-ritter.png","/authors/adrian-ritter","adrianritter",{"display_name":201,"avatar":202,"permalink":203,"twitter":204,"linkedin":205},"Marvin Bangert","c_thumb,h_1600,w_1600/people/people-marvin-bangert.png","/authors/marvin-bangert","marvinbangert","marvin-bangert",{"display_name":207,"avatar":208,"permalink":209,"twitter":210,"linkedin":211},"Thorsten Pickhan","c_thumb,h_1600,w_1600/people/people-thorsten-pickhan.png","/authors/thorsten-pickhan","tpickhan","thorsten-pickhan",{"display_name":213,"avatar":214,"permalink":215,"linkedin":216,"twitter":18},"Christian Lorenz","c_thumb,h_1600,w_1600/people/people-christian-lorenz.png","/authors/christian-lorenz","christianlorenz95",{"display_name":218,"avatar":219,"permalink":220,"linkedin":221,"twitter":18},"Denis Böhm","c_thumb,h_1600,w_1600/people/people-denis-boehm.png","/authors/denis-boehm","denis-böhm-3bb834135",{"display_name":223,"avatar":224,"permalink":225,"linkedin":226,"twitter":227},"Fabian Bader","c_thumb,h_1600,w_1600/people/people-fabian-bader.jpg","/authors/fabian-bader","fabianbader","fabian_bader",{"display_name":229,"avatar":230,"permalink":231,"linkedin":232},"Juan Jose Fernandez Perez","c_thumb,h_1600,w_1600/people/people-juan-jose-fernandez.jpg","/authors/juan-jose-fernandez-perez","juan-jose-fernandez-perez-8016055",{"display_name":234,"avatar":235,"permalink":236,"linkedin":237},"Mahschid Sayyar","c_thumb,h_1600,w_1600/people/people-mahschid-sayyar.jpg","/authors/mahschid-sayyar","mahschid-sayyar-97544463",{"display_name":239,"avatar":240,"permalink":241,"linkedin":242},"Benjamin Dassow","c_thumb,h_1600,w_1600/people/people-benjamin-dassow.jpg","/authors/benjamin-dassow","benjamin-dassow",{"display_name":244,"avatar":245,"permalink":246,"linkedin":247},"Markus Walschburger","c_thumb,h_1600,w_1600/people/people-markus-walschburger.jpg","/authors/markus-walschburger","markus-walschburger",{"display_name":249,"avatar":250,"permalink":251,"linkedin":252,"imageOffsetTop":28},"Jonathan Haist","c_thumb,h_1600,w_1600/people/people-jonathan-haist.jpg","/authors/jonathan-haist","jonathanhaist",{"display_name":254,"avatar":255,"permalink":256,"linkedin":257,"imageOffsetTop":28},"Daniel Rohregger","c_thumb,h_1600,w_1600/people/people-daniel-rohregger.jpg","/authors/daniel-rohregger","drohregger",{"display_name":259,"avatar":260,"permalink":261,"linkedin":262,"imageOffsetTop":106},"Thomas Naunheim","c_thumb,h_1600,w_1600/people/people-thomas-naunheim.jpg","/authors/thomas-naunheim","thomasnaunheim",{"display_name":264,"avatar":265,"permalink":266,"linkedin":267,"imageOffsetTop":106},"Florian Stöckl","c_thumb,h_1600,w_1600/people/people-florian-stoeckl.jpg","/authors/florian-stoeckl","florianstoeckl",{"display_name":269,"avatar":270,"permalink":271,"linkedin":272,"imageOffsetTop":106},"Pascal Asch","c_thumb,h_1600,w_1600/people/Pascal.Asch.648.jpg","/authors/pascal-asch","pascal-asch",{"display_name":274,"avatar":275,"permalink":276,"linkedin":277,"imageOffsetTop":278,"imageOffsetLeft":279},"Markus Kättner","c_thumb,h_1600,w_1600/people/markus-kaettner.jpg","/authors/markus-kaettner","markus-kättner-b600119","62%","63%",{"display_name":281,"avatar":282,"permalink":283,"linkedin":284,"imageOffsetTop":285,"imageOffsetLeft":286},"Anna Ulbricht","c_thumb,h_1600,w_1600/people/anna-katharina.ulbricht-09.png","/authors/anna-ulbricht","anna-katharina-u-a67702199","70%","50%",{"Alexander Schlindwein":288,"Sophie Luna":289,"Nadine Kern":290,"Karsten Kleinschmidt":291,"Julian Wendt":292,"Holger Bunkradt":293,"Ralf Mania":294,"Oliver Kieselbach":295,"Steffen Schwerdtfeger":296,"Gunnar Winter":297,"Jan Petersen":298,"Thorsten Kunzi":299,"Moritz Pohl":300,"Thorben Pöschus":301,"Christoph Hannebauer":302,"Marco Scheel":303,"Christopher Brumm":304,"Florian Klante":305,"Niklas Bachmann":306,"Nils Krautkrämer":307,"Patrick Treptau":308,"Peter Beckendorf":309,"Patrick Sobau":310,"Jörg Wunderlich":311,"Michael Breither":312,"Christian Kanja":313,"Zeba Hoffmann":314,"Jochen Fröhlich":315,"Jan Geisbauer":316,"Gerrit Reinke":320,"Christian Kordel":321,"Stephan Wälde":322,"Carolin Kanja":323,"Adrian Ritter":324,"Marvin Bangert":325,"Thorsten Pickhan":326,"Christian Lorenz":327,"Denis Böhm":328,"Fabian Bader":329,"Juan Jose Fernandez Perez":330,"Mahschid Sayyar":331,"Benjamin Dassow":332,"Markus Walschburger":333,"Jonathan Haist":334,"Daniel Rohregger":335,"Thomas Naunheim":336,"Florian Stöckl":337,"Pascal Asch":338,"Markus Kättner":339,"Anna Ulbricht":340},{"display_name":9,"avatar":10,"permalink":11,"twitter":12,"linkedin":13},{"display_name":15,"avatar":16,"permalink":17,"twitter":18,"linkedin":19,"imageOffsetLeft":20,"imageOffsetTop":21},{"display_name":23,"avatar":24,"permalink":25,"twitter":26,"linkedin":27,"imageOffsetTop":28},{"display_name":30,"avatar":31,"permalink":32,"twitter":33,"linkedin":34},{"display_name":36,"avatar":37,"permalink":38,"linkedin":39},{"display_name":41,"avatar":42,"permalink":43,"linkedin":44,"twitter":45},{"display_name":47,"avatar":48,"permalink":49,"linkedin":50,"twitter":51},{"display_name":53,"avatar":54,"permalink":55,"linkedin":56,"twitter":57},{"display_name":59,"avatar":60,"permalink":61,"linkedin":62,"twitter":63,"imageOffsetTop":64,"imageOffsetLeft":65},{"display_name":67,"avatar":68,"permalink":69,"twitter":18,"linkedin":70},{"display_name":72,"avatar":73,"permalink":74,"twitter":18,"linkedin":75},{"display_name":77,"avatar":78,"permalink":79,"twitter":18,"linkedin":70,"imageOffsetTop":28},{"display_name":81,"avatar":82,"permalink":83,"twitter":18,"linkedin":84},{"display_name":86,"avatar":87,"permalink":88,"twitter":89,"linkedin":90},{"display_name":92,"avatar":93,"permalink":94,"twitter":18,"linkedin":70,"imageOffsetTop":28},{"display_name":96,"avatar":97,"permalink":98,"twitter":99,"linkedin":99},{"display_name":101,"avatar":102,"permalink":103,"twitter":104,"linkedin":105,"imageOffsetTop":106},{"display_name":108,"avatar":109,"permalink":110,"linkedin":111,"twitter":18},{"display_name":113,"avatar":114,"permalink":115,"linkedin":116,"twitter":18},{"display_name":118,"avatar":119,"permalink":120,"twitter":121,"linkedin":122},{"display_name":124,"avatar":125,"permalink":126,"linkedin":127,"twitter":18},{"display_name":129,"avatar":130,"permalink":131,"linkedin":132,"twitter":18,"imageOffsetTop":28},{"display_name":134,"avatar":135,"permalink":136,"linkedin":137,"twitter":18},{"display_name":139,"avatar":140,"permalink":141,"twitter":18},{"display_name":143,"avatar":144,"permalink":145,"twitter":18,"linkedin":146},{"display_name":148,"avatar":149,"permalink":150,"twitter":151,"linkedin":152},{"display_name":154,"avatar":155,"permalink":156,"linkedin":157,"twitter":18},{"display_name":159,"avatar":160,"permalink":161,"twitter":18,"linkedin":70},{"display_name":163,"avatar":164,"permalink":165,"twitter":166,"linkedin":166,"imageOffsetTop":28,"socials":317},[318,319],{"text":169,"href":170},{"text":172,"href":173},{"display_name":175,"avatar":176,"permalink":177,"twitter":178,"linkedin":179},{"display_name":181,"avatar":182,"permalink":183,"twitter":18,"linkedin":70},{"display_name":185,"avatar":186,"permalink":187,"twitter":188,"linkedin":70},{"display_name":190,"avatar":191,"permalink":192,"twitter":193,"linkedin":194},{"display_name":196,"avatar":197,"permalink":198,"twitter":199,"linkedin":199},{"display_name":201,"avatar":202,"permalink":203,"twitter":204,"linkedin":205},{"display_name":207,"avatar":208,"permalink":209,"twitter":210,"linkedin":211},{"display_name":213,"avatar":214,"permalink":215,"linkedin":216,"twitter":18},{"display_name":218,"avatar":219,"permalink":220,"linkedin":221,"twitter":18},{"display_name":223,"avatar":224,"permalink":225,"linkedin":226,"twitter":227},{"display_name":229,"avatar":230,"permalink":231,"linkedin":232},{"display_name":234,"avatar":235,"permalink":236,"linkedin":237},{"display_name":239,"avatar":240,"permalink":241,"linkedin":242},{"display_name":244,"avatar":245,"permalink":246,"linkedin":247},{"display_name":249,"avatar":250,"permalink":251,"linkedin":252,"imageOffsetTop":28},{"display_name":254,"avatar":255,"permalink":256,"linkedin":257,"imageOffsetTop":28},{"display_name":259,"avatar":260,"permalink":261,"linkedin":262,"imageOffsetTop":106},{"display_name":264,"avatar":265,"permalink":266,"linkedin":267,"imageOffsetTop":106},{"display_name":269,"avatar":270,"permalink":271,"linkedin":272,"imageOffsetTop":106},{"display_name":274,"avatar":275,"permalink":276,"linkedin":277,"imageOffsetTop":278,"imageOffsetLeft":279},{"display_name":281,"avatar":282,"permalink":283,"linkedin":284,"imageOffsetTop":285,"imageOffsetLeft":286},"Authors","authors","Qkbr0Ywae26Kxloa5JhqFSd0eMg8Ccs9DhjH7FyMzvY",[345,428,481,632,1422,1675,1851],{"id":346,"title":347,"author":348,"body":349,"cta":397,"description":355,"eventid":397,"extension":398,"hideInRecent":399,"layout":400,"meta":401,"moment":404,"navigation":420,"path":421,"seo":422,"stem":423,"tags":424,"webcast":399,"__hash__":427},"content_en/awards/2023-11-15-microsoft-security-copilot-partner.md","glueckkanja is one of the first Microsoft Security Copilot Partners",[190],{"type":350,"value":351,"toc":391},"minimal",[352,356,359,368,371,374,379,382,385,388],[353,354,355],"p",{},"glueckkanja today announced its participation in the Microsoft Security Copilot Partner Private Preview. glueckkanja was selected based on their proven experience with Microsoft Security technologies, willingness to explore and provide feedback on cutting edge functionality, and close relationship with Microsoft.",[353,357,358],{},"\"AI is one of the defining technologies of our time and has the potential to drive meaningful, step-change progress in cybersecurity,\" said Ann Johnson, corporate vice president, Microsoft Security Business Development. \"Security is a team sport, and we are pleased to work alongside our Security Copilot partner ecosystem to deliver customers solutions that enhance cyber defenses and make the promise of AI real.\"",[353,360,361,362],{},"glueckkanja is working with Microsoft product teams to help shape Security Copilot product development in several ways, including validation and refinement of new and upcoming scenarios, providing feedback on product development and operations to be incorporated into future product releases, and validation and feedback of APIs to assist with Security Copilot extensibility. To learn more, ",[363,364,367],"a",{"href":365,"target":366},"https://aka.ms/IgniteFY24SecurityBlogPost","_blank","read the announcement.",[353,369,370],{},"\"For an analyst, working with Security Copilot is like wearing an exoskeleton. All his skills and knowledge are suddenly and massively amplified. Working with complex contexts is easy and can be done in unprecedented time. We at glueckkanja love Security Copilot,\" said Jan Geisbauer, Security Lead, glueckkanja AG.",[353,372,373],{},"Security Copilot is the first AI-powered security product that enables security professionals to respond to threats quickly, process signals at machine speed, and assess risk exposure in minutes. It combines an advanced large language model (LLM) with a security-specific model that is enriched by Microsoft's unique global threat intelligence and more than 65 trillion daily signals.",[375,376,378],"h3",{"id":377},"about-glueckkanja","About glueckkanja",[353,380,381],{},"glueckkanja, a renowned cloud managed service provider, is Top Microsoft partner offering comprehensive cloud solutions. With a unified blueprint approach, glueckkanja uses Infrastructure as Code to transition and support customer infrastructures to the cloud.",[353,383,384],{},"Dedicated to the secure and reliable operation of Workplace solutions, Azure services and security infrastructures, glueckkanja serves both medium-sized and large enterprises. glueckkanja's Cloud Security Operations Center continuously protects clients' infrastructures and is able to combat incidents and enforce protection strategies. With an 24/7 incident response and APT team, glueckkanja ensures that clients receive immediate emergency assistance and defence against cyber threats and that infrastructure is always up to date with the latest security standards.",[353,386,387],{},"To ensure a seamless cloud-native Microsoft experience, glueckkanja has developed proprietary products. These tools enable a fully protected, completely cloud-centric infrastructure. Their product range includes KONNEKT for working with on-premises Office 365 data, RADIUSaaS and SCEPman for secure network authentication without a server, RealmJoin for cloud software distribution and Unified Contacts for streamlined contact search in Microsoft Teams.",[353,389,390],{},"Globally, glueckkanja was among the first recipients of the Microsoft Verified Managed Extended Detection and Response (MXDR) award. With a team of nearly 200 professionals, glueckkanja was named Microsoft Worldwide Partner of the Year in 2017, 2019, 2020, 2022 and 2023. Since 2019, glueckkanja has regularly been at the top of the ISG Microsoft 365 Germany quadrant. In addition, glueckkanja's innovations place it among the TOP 100 companies in Germany, and a remarkable rating of 4.8/5 on kununu consolidates its reputation as a leading employer in the SME sector.",{"title":392,"searchDepth":393,"depth":393,"links":394},"",2,[395],{"id":377,"depth":396,"text":378},3,null,"md",false,"post",{"lang":402,"titleClass":403,"date":404,"categories":405,"blogtitlepic":409,"socialimg":410,"customExcerpt":411,"keywords":412,"hreflang":413},"en","h2-font-size","2023-11-15",[406,407,408],"Corporate","Security","copilot","head-security-copilot","/blog/heads/head-security-copilot.jpg","glueckkanja AG announces that Microsoft has selected the company for the Security Copilot Partner Private Preview. Recognized for its expertise in Microsoft security technologies, glueckkanja will help shape this AI-driven security initiative. The company will work closely together with the Microsoft product teams to support the product development of Security Copilot in various ways. This collaboration is an important milestone in glueckkanja's efforts to deliver innovative and secure solutions to its customers.","Microsoft Security Copilot, AI in Cybersecurity, Cybersecurity Solutions, Microsoft Security Technologies, Security Copilot Development, AI-Powered Security Product, Cyber Threat Response, Global Threat Intelligence, Tech Innovation in Security, Advanced Large Language Model, Microsoft Ignite, Microsoft Copilot Flight Engineers",[414,417],{"lang":415,"href":416},"de","/blog/corporate/security/copilot/2023/11/microsoft-security-copilot-partner",{"lang":418,"href":419},"es","/blog/corporate/security/copilot/2023/11/microsoft-security-copilot-partner-es",true,"/awards/2023-11-15-microsoft-security-copilot-partner",{"title":347,"description":355},"awards/2023-11-15-microsoft-security-copilot-partner",[406,407,425,426],"Copilot","podcast","k2g0TVq4Wekt32hywAY6FUoG0w3QIR0WGy32QTel7lY",{"id":429,"title":430,"author":431,"body":432,"cta":397,"description":436,"eventid":397,"extension":398,"hideInRecent":399,"layout":400,"meta":468,"moment":404,"navigation":420,"path":476,"seo":477,"stem":478,"tags":479,"webcast":399,"__hash__":480},"content_en/posts/2023-11-15-microsoft-security-copilot-partner.md","glueckkanja is among the first Microsoft Security Copilot partners",[190],{"type":350,"value":433,"toc":465},[434,437,440,445,448,451,453,456,459,462],[353,435,436],{},"glueckkanja announces its exclusive participation in the Microsoft Security Copilot Partner Private Preview—a landmark recognition of its first-class expertise in Microsoft security technologies. Selected for its long-standing experience, innovative mindset, and close, trusted partnership with Microsoft, glueckkanja is at the forefront of exploring groundbreaking security features and providing significant feedback on future-oriented technologies.",[353,438,439],{},"\"AI is one of the most defining technologies of our era, holding the potential to achieve significant, fundamental advancements in cybersecurity,\" said Ann Johnson, Corporate Vice President, Microsoft Security Business Development. \"Security is a team sport, and we are thrilled to collaborate with our Security Copilot partner ecosystem to deliver solutions that strengthen cyber defense and make the promise of AI a reality.\"",[353,441,442,443],{},"glueckkanja works with Microsoft product teams to shape the product development of Security Copilot in several areas, including validating and refining new and upcoming scenarios, providing feedback on product development and operations for future product releases, and validating and providing feedback on APIs to support the extensibility of Security Copilot. To learn more, ",[363,444,367],{"href":365,"target":366},[353,446,447],{},"\"Working with Security Copilot for an analyst is like wearing an exoskeleton. All their abilities and knowledge are suddenly and massively amplified. Dealing with complex contexts becomes easy and can be accomplished in unprecedented time. We at glueckkanja love Security Copilot,\" said Jan Geisbauer, Security Lead at glueckkanja AG.",[353,449,450],{},"Security Copilot is the first AI-powered security product that enables security professionals to quickly respond to threats, process signals at machine speed, and assess risk exposure within minutes. It combines an advanced Large Language Model (LLM) with a security-specific model, enriched by Microsoft's unique global cyber threat intelligence and more than 65 trillion daily signals.",[375,452,378],{"id":377},[353,454,455],{},"glueckkanja, a renowned Cloud Managed Service Provider, is a top Microsoft partner offering comprehensive cloud solutions. With a unified blueprint approach, glueckkanja uses Infrastructure as Code to migrate and support customer infrastructures in the cloud.",[353,457,458],{},"Focusing on the secure and reliable operation of Workplace Solutions, Azure Services, and Security Infrastructures, glueckkanja serves both medium-sized and large enterprises. glueckkanja's Cloud Security Operations Center continuously protects customer infrastructures, capable of combating incidents and enforcing protection strategies. With a 24/7 Incident Response and APT team, glueckkanja ensures customers receive immediate emergency assistance and defense against cyber threats, keeping their infrastructure up to date with the latest security standards.",[353,460,461],{},"To ensure a seamless cloud-native Microsoft experience, glueckkanja has developed its own products. These tools enable a fully protected, completely cloud-centric infrastructure. Their product range includes KONNEKT for local work with Office 365 data, RADIUSaaS and SCEPman for serverless secure network authentication, RealmJoin for cloud software distribution, and Unified Contacts for simplified contact search in Microsoft Teams.",[353,463,464],{},"glueckkanja was among the first partners globally to receive the Microsoft Verified Managed Extended Detection and Response (MXDR) designation. With a team of nearly 200 experts, glueckkanja was named Microsoft Worldwide Partner of the Year in 2017, 2019, 2020, 2022, and 2023. Since 2019, glueckkanja has consistently topped the ISG Microsoft 365 Germany quadrant. Moreover, with its innovations, glueckkanja is among the TOP 100 companies in Germany, and an impressive rating of 4.8/5 on kununu solidifies its reputation as a leading employer in the SME sector.",{"title":392,"searchDepth":393,"depth":393,"links":466},[467],{"id":377,"depth":396,"text":378},{"lang":402,"titleClass":403,"date":404,"categories":469,"blogtitlepic":409,"socialimg":410,"customExcerpt":470,"keywords":412,"hreflang":471},[406],"glueckkanja announced today that Microsoft has selected the company for the Microsoft Security Copilot Partner Private Preview. With its expertise in Microsoft security technologies, glueckkanja will help shape this AI-driven security initiative. The company will work closely with Microsoft's product teams to support the product development of Security Copilot in various ways. This collaboration is a significant milestone in glueckkanja's efforts to offer its customers innovative and secure solutions.",[472,474],{"lang":402,"href":473},"/blog/corporate/2023/11/microsoft-security-copilot-partner-en",{"lang":418,"href":475},"/blog/corporate/2023/11/microsoft-security-copilot-partner-es","/posts/2023-11-15-microsoft-security-copilot-partner",{"title":430,"description":436},"posts/2023-11-15-microsoft-security-copilot-partner",[406,407,425],"vtutcZ2OhoJgRTDbGJ_xZd0CcBDXoMB75EcvoA-6B1k",{"id":482,"title":483,"author":484,"body":485,"cta":397,"description":489,"eventid":397,"extension":398,"hideInRecent":399,"layout":400,"meta":553,"moment":555,"navigation":420,"path":626,"seo":627,"stem":628,"tags":629,"webcast":399,"__hash__":631},"content_en/posts/2024-04-30-gk-at-rsac.md","glueckkanja @ RSA Conference",[190],{"type":350,"value":486,"toc":548},[487,490,498,503,506,514,517,521,523,526,529,536,540,542,545],[353,488,489],{},"For over three decades, the RSA Conference has been a key force in the cybersecurity community. In a world where threats from attacks are growing every day, this conference has become essential for anyone dealing with online security. The well-known conference is always held in sunny California, and glueckkanja is once again participating.",[353,491,492,493,497],{},"As a member of the ",[363,494,496],{"href":495,"target":366},"https://www.microsoft.com/de-de/security/business/intelligent-security-association","Microsoft Intelligent Security Association (MISA)",", an association of important security partners of Microsoft, we share the common goal of developing top-notch security solutions and protecting customers from threats.",[499,500,502],"h2",{"id":501},"ai-in-focus-of-the-rsa-conference-2024","AI in focus of the RSA Conference 2024",[353,504,505],{},"{: .h3-font-size}",[353,507,508,509,513],{},"This year, Microsoft is focusing the ",[363,510,512],{"href":511,"target":366},"https://www.microsoft.com/en-us/security/blog/2024/04/04/explore-microsofts-ai-innovations-at-rsa-conference-2024","conference program"," entirely on Copilot for Security, the innovative AI solution designed to help security and IT experts identify undetected risks.",[353,515,516],{},"This is an exciting topic in the current discussion, which our Security Lead, Jan Geisbauer, is eager to engage with. In his session at the Microsoft booth (May 7, 17:30 - 17:50) during the RSA Conference, he will introduce this new technology, explore its capabilities, but also address its current limitations. We have summarized the key points here.",[499,518,520],{"id":519},"microsoft-copilot-for-security-for-threat-detection","Microsoft Copilot for Security for Threat Detection",[353,522,505],{},[353,524,525],{},"For a long time, risk detection depended on what's known as 'signature-based detection'—a method that identifies threats based on recognized patterns. However, as the threat landscape continues to change and attackers constantly adapt their strategies, this approach alone is no longer sufficient for protection. The next advancement in security technology involves leveraging big data for threat detection. Modern software solutions automatically analyze extensive data sets to detect patterns and potential risks. Nonetheless, to effectively minimize false positives, the expertise of trained specialists is essential. Given the vast amounts of data that need to be processed, this demands significant resources. This is exactly where Microsoft Copilot for Security steps in with innovative solutions designed to support security teams and enhance protection.",[353,527,528],{},"In addition to summaries of the most important facts about data security incidents with suggested solutions, Copilot for Security can also respond to prompts about cybersecurity and your own systems. The tool additionally manages more complex tasks, such as crafting your own KQL queries to pull specific security data. One particularly useful feature is script analysis, which greatly accelerates the examination of suspicious scripts and command lines.",[353,530,531],{},[532,533],"img",{"alt":534,"src":535},"A screenshot of the script analysis function of Copilot for Security from Microsoft","https://res.cloudinary.com/c4a8/image/upload/v1714461543/blog/pics/rsac-copilot-for-security-script-analysis.png",[499,537,539],{"id":538},"add-copilot-for-security-to-your-system","Add Copilot for Security to Your System",[353,541,505],{},[353,543,544],{},"Like any Large Language Model (LLM), Copilot for Security still requires the careful oversight of experts. However, particularly when analyzing raw data, Copilot for Security proves to be a potent tool that enables customers and Microsoft Security Service Providers (MSSP) to make quicker and more informed decisions.",[353,546,547],{},"At glueckkanja, we consider it our mission to constantly improve and find new, innovative ways to protect our customers from the increasing digital threats of everyday life. We therefore recommend that our customers incorporate Copilot for Security into their systems, and we are eager to assist them in planning, implementing, and utilizing the tool.",{"title":392,"searchDepth":393,"depth":393,"links":549},[550,551,552],{"id":501,"depth":393,"text":502},{"id":519,"depth":393,"text":520},{"id":538,"depth":393,"text":539},{"lang":402,"seoTitle":554,"titleClass":403,"date":555,"categories":556,"blogtitlepic":557,"socialimg":558,"customExcerpt":559,"keywords":560,"contactInContent":561,"hreflang":620,"scripts":625},"glueckkanja at the RSA Conference 2024","2024-04-30",[407],"head-rsa-conference-2024","/blog/heads/head-rsa-conference-2024.png","When the RSA Conference opens its doors from May 6 to 9, 2024, the glueckkanja team around CEO Christian Kanja and Security Lead Jan Geisbauer will be there again. This year, we will be taking a closer look at the new Microsoft Copilot for Security.","glueckkanja, RSA Conference 2024, Microsoft Copilot for Security, Cybersecurity AI Solutions, MISA Awards, Security MSSP of the Year, Signature-Based Detection, Microsoft Intelligent Security Association, Big Data Security Analysis, Microsoft Security Service Provider, AI Cybersecurity Innovation, Script Analysis Tool",{"quote":420,"infos":562},{"headline":563,"subline":564,"level":499,"textStyling":565,"flush":566,"person":567,"form":584},"Get in touch with us","Do you have any questions? We are happy to help you make your business even more secure with Microsoft Copilot for Security.","text-light","justify-content-end",{"image":568,"mail":569,"number":570,"cloudinary":420,"alt":163,"name":163,"quotee":163,"quoteeTitle":571,"quote":572,"detailsHeader":573,"details":574},"/people/people-jan-geisbauer-csoc.jpg","sales@glueckkanja.com","+49694005520","Security Lead","Working with Copilot for Security is like wearing an exoskeleton for analysts. All their skills and knowledge are suddenly and massively amplified. We at glueckkanja love Copilot for Security.","We look forward to hearing from you!",[575,580],{"text":576,"href":577,"details":578,"icon":579},"+49 69 4005520","tel:+49 69 4005520","Call now","site/phone",{"text":581,"href":582,"icon":583},"info@glueckkanja.com","mailto:info@glueckkanja.com","site/mail",{"ctaText":585,"cta":586,"method":400,"action":588,"fields":589},"Send",{"skin":587},"primary is-light","/send",[590,594,599,603,607,612,615,618],{"type":591,"id":592,"value":593},"hidden","_next","successful",{"label":595,"type":596,"id":597,"required":420,"requiredMsg":598},"Name*","text","name","Please enter your name.",{"label":600,"type":596,"id":601,"required":420,"requiredMsg":602},"Company*","company","Please enter your company.",{"label":604,"type":605,"id":605,"required":420,"requiredMsg":606},"Email address*","email","Please enter your email address.",{"label":608,"type":609,"id":610,"required":420,"requiredMsg":611},"Your data will be stored by us to process and respond to your request. Further information on data protection can be found in our \u003Ca href=\"/en/privacy\">Privacy Policy\u003C/a>.","checkbox","dataprotection","Please confirm",{"type":591,"id":613,"value":614},"_subject","Request Copilot for Security advice",{"type":591,"id":616,"value":617},"inbox_key","nis2-consulting",{"type":591,"id":619},"_gotcha",[621,623],{"lang":415,"href":622},"/blog/security/2024/04/gk-at-rsac",{"lang":418,"href":624},"/blog/security/2024/04/gk-at-rsac-es",{"slick":420,"form":420},"/posts/2024-04-30-gk-at-rsac",{"title":483,"description":489},"posts/2024-04-30-gk-at-rsac",[630,425,407],"MISA","vI_8OTsyMhscyk3c4PEl0VcYc3cqrBFxaOfnDbRv1Fc",{"id":633,"title":634,"author":635,"body":636,"cta":397,"description":392,"eventid":397,"extension":398,"hideInRecent":399,"layout":400,"meta":1335,"moment":397,"navigation":420,"path":1413,"seo":1414,"stem":1415,"tags":1416,"webcast":399,"__hash__":1421},"content_en/posts/2025-08-28-agent-ready-infrastructure copy.md","This is why you need a solid infrastructure to be agent-ready in 2025",[254],{"type":350,"value":637,"toc":1297},[638,642,644,652,660,664,666,669,672,678,688,695,700,711,721,740,744,746,749,753,756,759,763,765,772,776,778,789,796,798,801,823,827,829,832,836,838,845,849,851,854,858,860,871,875,877,880,884,886,889,894,908,911,914,918,920,924,926,933,936,944,952,956,958,961,967,970,975,980,984,986,993,997,999,1006,1014,1018,1020,1023,1026,1030,1032,1035,1038,1045,1049,1051,1054,1057,1062,1065,1068,1072,1074,1080,1083,1089,1092,1097,1101,1103,1164,1168,1170,1192,1196,1198,1201,1205,1207,1210,1214,1216,1223,1227,1229,1240,1247,1252,1255,1259,1261,1267,1274,1279,1282,1285,1289,1291,1294],[499,639,641],{"id":640},"prologue","Prologue",[353,643,505],{},[353,645,646,647,651],{},"With this omnipresence, many ideas and the desire to take action or at least experiment arise. At glueckkanja AG, we support our customers throughout this process. Of course, we are already developing and building agents, but in 80% of our projects, the primary focus is on preparing the data and tenant for agent creation. Before you implement Copilot productively in your organization, it's worthwhile to take a critical look at your infrastructure. When making decisions in this area, there are several important aspects to understand before deploying AI agents on a large scale. That’s why, in this blog post, I will guide you through the essential steps and differences. In a time when AI assistants like Microsoft 365 Copilot Agents promise to transform the working world, one principle holds true above all: ",[648,649,650],"em",{},"AI is only as good as the system beneath it",".",[353,653,654,655,659],{},"This comprehensive guide outlines ",[656,657,658],"strong",{},"how to prepare your data and infrastructure"," for Copilot Agents, covering key practices in SharePoint, Teams, and the Power Platform.",[499,661,663],{"id":662},"why-your-infrastructure-data-matters","Why your infrastructure (data) matters",[353,665,505],{},[353,667,668],{},"As we utilize AI agents, it is imperative to understand that these agents do not inherently possess knowledge about our organization, our data, or our unique operational context. By default, an AI agent only carries the built-in knowledge derived from the training of the Large Language Model (LLM). To effectively enhance and extend the capabilities of these AI agents, it is essential to systematically integrate various components. This enhancement can be achieved through the implementation of System Prompts, Knowledge Bases, Connectors, Web-Search functionalities, access to Microsoft Graph, Semantic Search, and additional tools. These components collectively enable the AI agents to deliver more precise, contextually relevant responses and actions, aligning closely with the specific needs and data of the organization. Since we are now in the very beginning of the agentic area, many of us will start with simple agents that source information based on existing SharePoint Online libraries.",[353,670,671],{},"For us in IT, that means we need to take care about our data in SharePoint Online more than ever!",[673,674,675],"blockquote",{},[353,676,677],{},"SharePoint Online = Knowledge = Data and Data = Key",[353,679,680,683,684,687],{},[656,681,682],{},"My clear message:"," Before adding AI copilots to your organization, ",[656,685,686],{},"get your data house in order",". The same data that feeds your Copilot Agents also feeds Microsoft 365 Copilot itself.",[353,689,690,691,694],{},"And not only that! Microsoft 365 Copilot is assessing the same data. *If that data is cluttered, overshared, or poorly secured, the AI could surface incorrect or sensitive information unexpectedly *or example, imagine asking Copilot about company structure and receiving details of a confidential reorganization plan you weren’t meant to see. Such incidents occur when content is ",[656,692,693],{},"overshared"," (available too broadly) on platforms like SharePoint or Teams. Note: Copilot respects all existing permissions, that means something like only can happen when permissions are misconfigured. Conversely, if data is siloed or inaccessible, AI assistants will be less useful.",[673,696,697],{},[353,698,699],{},"Copilot only surfaces organizational data that the individual user has at least view permissions for!",[353,701,702,705,706],{},[656,703,704],{},"Source:"," ",[363,707,708],{"href":708,"rel":709},"https://learn.microsoft.com/en-gb/copilot/microsoft-365/microsoft-365-copilot-privacy?azure-portal=true",[710],"nofollow",[353,712,713,716,717,720],{},[656,714,715],{},"Key takeaway:"," Enterprise AI succeeds only with a solid data foundation. A recent Microsoft report identifies ",[656,718,719],{},"data oversharing, data leakage, and noncompliant usage"," as top challenges to address before deploying AI. Organizations that invest in preparation of SharePoint Online and other data sources, will unlock Copilot’s benefits with confidence, while those who don’t risk security breaches or irrelevant AI outputs. Studies show about one-third of decision-makers lack full visibility into critical data.",[722,723,724,725,724,730,724,733,724,737],"picture",{},"\n  ",[726,727],"source",{"media":728,"srcSet":729},"(min-width: 992px)","https://res.cloudinary.com/c4a8/image/upload/blog/pics/data-security-report-statistics.png",[726,731],{"media":732,"srcSet":729},"(min-width: 768px)",[726,734],{"media":735,"srcSet":736},"(min-width: 576px)","https://res.cloudinary.com/c4a8/image/upload/blog/pics/data-security-report-statistics-mob.png",[532,738],{"src":736,"alt":739},"Two statistics on data risks: 30% of decision-makers lack visibility into business-critical data (Visibility Gap) and 87% of security leaders reported a data breach in the past year (Data Breach Prevalence).",[499,741,743],{"id":742},"_10-steps-to-improve-your-m365-data-infrastructure-now","10 steps to improve your M365 data infrastructure now",[353,745,505],{},[353,747,748],{},"Now we know your agents will need data. As we as glueckkanja step in these projects, this is our typical 10-point list that we work from the top to end with our customers.",[375,750,752],{"id":751},"step-1-check-core-sharing-settings","Step 1: Check Core Sharing Settings",[353,754,755],{},"{: .h4-font-size}",[353,757,758],{},"Verify tenant-wide settings that could lead to oversharing. For example, scrutinize default link sharing policies (e.g. if “Anyone with the link” or “People in your organization” is allowed by default for SharePoint/OneDrive), whether users can create public Teams by default, and if your Power Platform environment is open without governance. Misconfigured defaults here are a common cause of unintentional broad access..",[375,760,762],{"id":761},"step-2-audit-public-teams","Step 2: Audit Public Teams",[353,764,755],{},[353,766,767,768,771],{},"Review any Microsoft Teams marked as “Public.” A public Team means ",[648,769,770],{},"anyone in your organization"," can discover and access its content. Ensure that any Team set to public truly contains only non-sensitive, broadly suitable content. If not, switch it to private or adjust membership. (It’s easy for a Team to be created as Public and later forgotten, exposing files to all employees.)",[375,773,775],{"id":774},"step-3-review-graph-connectors","Step 3: Review Graph Connectors",[353,777,755],{},[353,779,780,781,784,785,788],{},"Check if your tenant has any ",[648,782,783],{},"Microsoft Graph Connectors"," set up that pull in third-party data (e.g. from external file systems, wikis, etc.). Remove or secure any connector that indexes data not everyone should see. ",[656,786,787],{},"Why?"," Content indexed via Graph Connectors becomes part of your Microsoft Graph search index – meaning Copilot can potentially use it to answer prompts. You only want relevant, intended data sources connected.",[375,790,792,793],{"id":791},"step-4-generate-a-sharepoint-online-baseline-report","Step 4: Generate a ",[656,794,795],{},"SharePoint Online Baseline Report",[353,797,755],{},[353,799,800],{},"SPO has different possible risks for unwanted data in Agents and Copilot. You need to look for different key metrics:",[802,803,804,808,811,814,817,820],"ul",{},[805,806,807],"li",{},"Broken Permission Inheritance on a folder-level",[805,809,810],{},"Public SharePoint Sites",[805,812,813],{},"Use of \"Everyone Except External Users\" or other dynamic group that contain all users",[805,815,816],{},"Anyone Sharing Links",[805,818,819],{},"Everyone-in-my-org Sharing Links",[805,821,822],{},"Unwanted people in the Site Admins / Owners / Members / Visitors Group",[375,824,826],{"id":825},"step-5-categorize-and-prioritize-risks","Step 5: Categorize and Prioritize Risks",[353,828,755],{},[353,830,831],{},"Take the findings from Steps 1–4 and rank them by severity. Which sites or files carry the most business-critical or sensitive data and also have exposure risks? Prioritize fixing those. By layering business context (e.g., a site with financial data vs. a site with generic templates), you can focus on the most impactful issues first.",[375,833,835],{"id":834},"step-6-involve-site-owners-for-access-reviews","Step 6: Involve Site Owners for Access Reviews",[353,837,755],{},[353,839,840,841,844],{},"For each SharePoint site (or Team) highlighted as risky, have the site owner double-check who has access and if that is appropriate. Owners are typically closest to the content and can quickly spot “Oh, why does ",[648,842,843],{},"Everyone"," have read access to this? That shouldn’t be.” Implement a process where site admins certify permissions regularly.",[375,846,848],{"id":847},"step-7-establish-ongoing-oversight","Step 7: Establish Ongoing Oversight",[353,850,755],{},[353,852,853],{},"Put in place a continuous monitoring process for new oversharing issues. Oversharing control isn’t a one-time fix; as new sites, Teams, and files get created, you need to catch misconfigurations proactively. Consider using Microsoft Purview’s reports or alerts to catch things like files shared externally or to huge groups, new public teams created, etc. Microsoft’s tools can automate alerts for these conditions, so make use of them to maintain a strong posture.",[375,855,857],{"id":856},"step-8-apply-sensitivity-labels-and-dlp-policies","Step 8: Apply Sensitivity Labels and DLP Policies",[353,859,755],{},[353,861,862,863,866,867,870],{},"Use Microsoft Purview ",[656,864,865],{},"Sensitivity Labels"," to classify data (Confidential, Highly Confidential, etc.) and bind those labels to protection settings. For instance, a “Confidential” label can encrypt files or prevent external sharing. Also configure ",[656,868,869],{},"Data Loss Prevention (DLP)"," policies to prevent or monitor oversharing of sensitive info (like blocking someone from emailing a list of customer SSNs). These tools not only prevent accidental leaks in day-to-day use, they also work with Copilot: if Copilot tries to access or output labeled content in ways it shouldn’t, DLP can intervene. Moreover, Copilot itself will carry forward the document’s label to its responses, as noted later.",[375,872,874],{"id":873},"step-9-implement-power-platform-governance","Step 9: Implement Power Platform Governance",[353,876,755],{},[353,878,879],{},"Extend your oversight to the Power Platform (Power Apps, Power Automate, etc.). Define DLP policies for Power Platform to control connectors (so someone can’t, say, make a flow that pulls data from a sensitive SharePoint list and posts it to an external service). Also consider having multiple environments (Dev/Test/Prod) with proper security so that “Citizen Developers” building agents or apps don’t inadvertently expose data. Essentially, prevent the Power Platform from becoming an ungoverned backdoor to your data.",[375,881,883],{"id":882},"step-10-educate-and-enable-your-agent-builders","Step 10: Educate and Enable Your Agent Builders",[353,885,755],{},[353,887,888],{},"Finally, create guidelines and best practices for those who will be building or deploying AI agents (whether they are pro developers or business users). Establish training on handling data safely: e.g., how to choose appropriate knowledge sources for an agent, why not to include sensitive files in a broadly shared agent, how to test an agent’s output for any unexpected info. By fostering a data-aware culture among “agent makers,” you reduce the chance of someone inadvertently exposing information when designing an AI solution.",[353,890,891],{},[656,892,893],{},"Sources:",[802,895,896,902],{},[805,897,898],{},[363,899,900],{"href":900,"rel":901},"https://techcommunity.microsoft.com/blog/microsoft365copilotblog/from-oversharing-to-optimization-deploying-microsoft-365-copilot-with-confidence/4357963",[710],[805,903,904],{},[363,905,906],{"href":906,"rel":907},"https://techcommunity.microsoft.com/blog/microsoft365copilotblog/microsoft-graph-connectors-update-expand-copilot%E2%80%99s-knowledge-with-50-million-ite/4243648",[710],[353,909,910],{},"After you have completed these steps, you can now securely go on and start building productive agents. To build agents, we have different platforms and features from Microsoft that we can rely on for. You'll find the most prominent examples in the next chapter. If you need help with this list, feel free to reach out to us so we can help you with this important preparation exercise.",[353,912,913],{},"Nothing prevents you in the meanwhile to create PoC or Test-Agents with sample data, manually uploaded files or specific data attached via RAG. But we recommend these steps before a larger implementation / rollout of agents.",[499,915,917],{"id":916},"understanding-differences-between-agent-platforms","Understanding differences between Agent Platforms",[353,919,505],{},[375,921,923],{"id":922},"step-1-understand-your-agent-creators","Step 1: Understand your Agent-Creators",[353,925,755],{},[353,927,928,929,932],{},"After the foundation work to prepare the data, we need to understand which platforms are available to create those agents. We try to differentiate these tools by features and possibilities, but it's important to notice that creating agents and choosing the right tolling is a range. There are multiple ways to build AI agents in the Microsoft ecosystem. It’s important to pick the right one for your needs and your team’s skill level. It also clarifies when to leverage ",[656,930,931],{},"Azure AI Foundry"," versus built-in Copilot Studio tools.",[353,934,935],{},"Microsoft offers a set of different tools that can build agents by today. While they seem like each other, they are built for different target audiences and levels of expertise. Take a closer look at the overview below. Understanding who needs to create and maintain these agents, also shows us, which Knowledge sources (= data) we need to prepare for our Agents. Beside the tools in the list below, there are even more pro-code solutions to build agents like M365 Agents Toolkit, Visual Studio Code, Agent SDK and more.  All our data preparation  steps´ apply for them as well, since they access the same data like other agents do.",[353,937,938,705,940],{},[656,939,704],{},[363,941,942],{"href":942,"rel":943},"https://www.egroup-us.com/news/microsoft-copilot-ai-integration/",[710],[722,945,724,946,724,949],{},[726,947],{"media":728,"srcSet":948},"https://res.cloudinary.com/c4a8/image/upload/v1756363984/blog/pics/table-copilot-ai-integration.png",[532,950],{"src":948,"alt":951},"Comparison of three Copilot solution categories: Pre-Built (ootb), Makers, and Developers.",[375,953,955],{"id":954},"step-2-identify-use-cases-and-requirements-for-your-platform","Step 2: Identify Use Cases and requirements for your platform",[353,957,755],{},[353,959,960],{},"As you can probably think of, not every platform supports every use case. Agents can be used for simple tasks, like answering questions based on existing knowledge or complex, like automatically generating answers or executing processes. Also, the final UX where and how we want to access those agents is important to decide for a platform.",[353,962,963],{},[532,964],{"alt":965,"src":966},"Diagram showing three levels of agent capabilities from simple to advanced","https://res.cloudinary.com/c4a8/image/upload/blog/pics/agents-differences.png",[353,968,969],{},"With these considerations in mind, we usually try to use the easiest solution possible to build our Agent. But also, we need to find the solution that is scalable for further development. But not every Agent needs to built on Agent AI Foundry from the very beginning.",[353,971,972],{},[656,973,974],{},"Tip:",[673,976,977],{},[353,978,979],{},"If you are not sure where to start to build your Agent, you always can use Copilot Studio and either integrate more Data from Azure AI there and publish it to Microsoft 365 Copilot. So get both \"up- and downwards compatibility\".",[499,981,983],{"id":982},"rag-retrieval-augumented-generation-vs-sharepoint-vs-upload","RAG (Retrieval-Augumented Generation) vs. SharePoint vs. Upload",[353,985,505],{},[353,987,988,989,992],{},"Looking at it the first time, everything seems to be RAG – but there are differences! When you first explore Copilot Agents and its agent capabilities, it’s tempting to assume that all knowledge integration follows the same RAG (Retrieval-Augmented Generation) pattern. While they may all ",[648,990,991],{},"look"," like RAG from the outside: retrieving documents and generating answers, the way they work under the hood differs significantly. Understanding these differences is essential for choosing the right approach based on your goals, scale, and technical readiness. Here is a short explanation and overview",[375,994,996],{"id":995},"manual-file-uploads","Manual File Uploads",[353,998,755],{},[353,1000,1001,1002,1005],{},"Manual upload is the simplest way to add knowledge to a Copilot agent. You drag and drop documents directly into the Copilot Studio interface. Microsoft automatically indexes these files and retrieves relevant content during a user query. This is ideal for small pilots and early testing. ",[656,1003,1004],{},"Also, be aware that the content of the files should be accessible to everyone with access to agent",". There is not Permission-Management here that you need to take care of. On the other hand, you will need to manually update these files in the long term if things change. Currently for Copilot Agents you can add up to 20 files manually.",[353,1007,1008,1009],{},"Source: ",[363,1010,1013],{"href":1011,"rel":1012},"https://learn.microsoft.com/en-us/microsoft-365-copilot/extensibility/copilot-studio-agent-builder-knowledge",[710],"https://learn.microsoft.com/en-us/microsoft-365-copilot/extensibility/copilot-studio-agent-builder-knowledge#file-size-limits",[375,1015,1017],{"id":1016},"sharepoint-online","SharePoint Online",[353,1019,755],{},[353,1021,1022],{},"This method uses Microsoft’s Retrieval API to access content directly from SharePoint Online connected via Graph Connector. The agent retrieves the most relevant content live at query time, respecting existing Microsoft 365 permissions. Content can be SharePoint sites, document libraries, folders or files. It’s dynamic, secure, and well-suited for scaling across departments or business units without managing your own infrastructure. Building up on the existing infrastructure, we are using the built-in security model from SharePoint with is a huge benefit compared to other knowledge options. Departments can easily update the files and that will be reflected within the agent. That means if two users with different access levels ask the agent, one might get an answer from a certain file while another user (without access) would not – which is exactly the behavior we want.",[353,1024,1025],{},"Note: SharePoint Lists are currently a not supported knowledge-type, so you can not index them out of the box (Q3 2025)",[375,1027,1029],{"id":1028},"custom-rag-self-managed","Custom RAG (Self-Managed)",[353,1031,755],{},[353,1033,1034],{},"In a classic RAG setup, you build and manage the entire retrieval pipeline yourself. That includes document preprocessing, chunking, embedding, storing in a vector database, and retrieving the top matches at query time. This gives you full control over how content is processed and retrieved, but it also brings complexity and maintenance overhead. It’s best suited for advanced use cases that require customization beyond what Microsoft’s managed services offer. This is not an in-built feature in Copilot or Copilot Studio; we would do this in Microsoft Azure.",[353,1036,1037],{},"A example when to use RAG could be for instance, If you needed to integrate an AI agent with a proprietary database or thousands of PDFs stored outside of Microsoft 365, and apply custom filters, a self-managed RAG might be necessary – but this requires significant effort.",[353,1039,1040,1041],{},"source: ",[363,1042,1043],{"href":1043,"rel":1044},"https://learn.microsoft.com/en-us/azure/search/retrieval-augmented-generation-overview?tabs=docs",[710],[375,1046,1048],{"id":1047},"what-to-choose-and-when","What to Choose and When",[353,1050,755],{},[353,1052,1053],{},"While all three approaches involve retrieving content to support language generation, only the custom self-managed solution qualifies as “true RAG” in the technical sense. For most organizations starting out, manual uploads or SharePoint connections are significantly easier and faster to implement. They provide strong results with minimal setup - and they let teams focus on use case design and adoption, rather than infrastructure.",[353,1055,1056],{},"A general advice from my side in this point:",[673,1058,1059],{},[353,1060,1061],{},"Try to build the agents as close to your data as possible",[353,1063,1064],{},"Example: If your data is stored in large SQL databases or external CRM systems, a SharePoint Agent will not do the job. If we have all our knowledge in SharePoint, SharePoint Agents or Copilot Agents might be a good start.",[353,1066,1067],{},"Custom RAG should be considered only when your needs go beyond what the managed options can provide, not as the default starting point. A manual upload is great for the first pilot or for small pilots with limited and specific knowledge that is not often updated. In many scenarios we would just use a SharePoint library or site with the agent. Because of this, we are focusing on a scenario looking like that:",[499,1069,1071],{"id":1070},"microsoft-365-copilot-copilot-agents-security-compliance-out-of-the-box","Microsoft 365 Copilot & Copilot Agents: Security & Compliance out of the box",[353,1073,505],{},[353,1075,1076,1079],{},[656,1077,1078],{},"Secure cloud infrastructure"," is the bedrock for enterprise AI. Microsoft provides the most secure framework possible for our Agents by putting them in context of Microsoft 365 Copilot. Every organization can trust their existing Security Framework based on Conditional Access and Multi-Factor authentication for access and their existing Governance Framework based on Microsoft Purview.",[353,1081,1082],{},"Agents that are used in M365 Copilot or published from Copilot Studio as a Teams Chatbot are only accessible within our tenant boundaries. That means we get the same level of security for these applications that we already have.",[353,1084,1085],{},[532,1086],{"alt":1087,"src":1088},"Diagram showing how Microsoft 365 Copilot accesses user data within Microsoft 365.","https://res.cloudinary.com/c4a8/image/upload/blog/pics/copilot-security.png",[353,1090,1091],{},"In addition to that, Microsoft offers several technical and organization commitments gathered as we call it \"Enterprise Grade Data Protection\".",[353,1093,1008,1094],{},[363,1095,708],{"href":708,"rel":1096},[710],[375,1098,1100],{"id":1099},"microsoft-365-copilot-enterprise-data-protection-edp-for-prompts-and-responses","Microsoft 365 Copilot: Enterprise Data Protection (EDP) for Prompts and Responses",[353,1102,755],{},[802,1104,1105,1125,1131,1152,1158],{},[805,1106,1107,1110,1111,1114,1115,1118,1119,1114,1122,651],{},[656,1108,1109],{},"Contractual Protection",": Prompts (user input) and responses (Copilot output) are protected under the ",[656,1112,1113],{},"Data Protection Addendum (DPA)"," and ",[656,1116,1117],{},"Product Terms",". These protections are the same as those applied to ",[656,1120,1121],{},"emails in Exchange",[656,1123,1124],{},"files in SharePoint",[805,1126,1127,1130],{},[656,1128,1129],{},"Data Security:"," Encryption at rest and in transit, Physical security controls, Tenant-level data isolation",[805,1132,1133,1136,1137,1140,1141,1144,1145,1144,1148,1151],{},[656,1134,1135],{},"Privacy Commitments"," Microsoft acts as a ",[656,1138,1139],{},"data processor",", using data only as instructed by the customer. Supports ",[656,1142,1143],{},"GDPR",", ",[656,1146,1147],{},"EU Data Boundary",[656,1149,1150],{},"ISO/IEC 27018",", and more.",[805,1153,1154,1157],{},[656,1155,1156],{},"Access Control & Policy Inheritance",": Copilot respects: Identity models and permissions, Sensitivity labels, Retention policies, Audit settings, Admin configurations, AI & Copyright Risk Mitigation and Protection against: Prompt injection, Harmful content, Copyright issues (via protected material detection and Customer Copyright Commitment)",[805,1159,1160,1163],{},[656,1161,1162],{},"No Model Training:"," Prompts, responses, and Microsoft Graph data are NOT used to train foundation models.",[375,1165,1167],{"id":1166},"copilot-agents-with-sharepoint-online-knowledge","Copilot Agent's with SharePoint Online-Knowledge:",[353,1169,755],{},[802,1171,1172,1182],{},[805,1173,1174,1177,1178,1181],{},[656,1175,1176],{},"Permission & Sharing Model:"," Agents with SharePoint Online access always respects the permissions of the associated SharePoint site. That means, ",[656,1179,1180],{},"on one hand, you need to ensure that everyone who should have access has at least read permissions on the site","; on the other hand, you must be vigilant about not granting unnecessary permissions that could expose sensitive information to unauthorized users**. Properly configuring permissions is essentia**l, as Copilot Agents will only be able to access and surface content that the querying user is permitted to see. Additionally, leveraging Microsoft Purview information protection ensures that sensitivity labels and data loss prevention (DLP) policies persist with the content",[805,1183,1184,1187,1188,1191],{},[656,1185,1186],{},"Persistent Labels & DLP:"," Enable ",[656,1189,1190],{},"Microsoft Purview"," information protection so that sensitivity labels persist with content. Copilot agents inherit labels on source documents. Meaning if a file is classified “Confidential,” any AI-generated content or document from now on, will carry that label forward. This persistent label inheritance works in tandem with Data Loss Prevention policies to prevent AI from inadvertently exposing protected data. In practice, that means even if Copilot summarizes a sensitive file, the summary will be handled as sensitive too. This is something outstanding we do not find outside of Microsoft 365 and we won't see any AI Agent that is able to deeply integrate like this in the Microsoft 365 ecosystem!",[499,1193,1195],{"id":1194},"best-practices-to-prepare-further-sharepoint-online-for-agent-use","Best Practices to prepare further SharePoint Online for Agent use",[353,1197,505],{},[353,1199,1200],{},"To prepare SharePoint Online for effective use with Copilot Agents, follow these best practices:",[375,1202,1204],{"id":1203},"dedicated-sharepoint-site","Dedicated SharePoint Site",[353,1206,755],{},[353,1208,1209],{},"First, create a dedicated SharePoint site or a specific folder designed exclusively for your Copilot Agent’s knowledge base. This approach helps minimize issues related to oversharing and reduces the risk of users accidentally uploading sensitive or irrelevant files to the agent’s accessible repository. If you decide to use an existing SharePoint site, carefully review its contents to ensure that no confidential or sensitive information is stored there that should not be discoverable by the agent.",[375,1211,1213],{"id":1212},"granting-access","Granting Access",[353,1215,755],{},[353,1217,1218,1219,1222],{},"It is also important to ensure that all intended users have the necessary read permissions to access the site or folder. If you need to grant access manually, Ensure all intended users have read access to the site (for example, by ",[656,1220,1221],{},"adding them to the SharePoint site’s Visitors group"," or an appropriate Azure AD security group) to simplify the process and prevent accidental permission misconfigurations.",[375,1224,1226],{"id":1225},"prepare-files","Prepare Files",[353,1228,755],{},[353,1230,1231,1232,1235,1236,1239],{},"When preparing documents for use with Copilot Agents, remember that the AI currently ",[656,1233,1234],{},"cannot interpret embedded images within"," files. ",[656,1237,1238],{},"Therefore, add descriptive image captions or alternative text"," to help ensure that important visual information is not lost. For text-heavy documents, make sure When summarizing or referencing content, keep the total to a maximum of 1.5 million words or 300 pages to ensure Copilot works effectively.",[353,1241,1242,1243,1246],{},"For ",[656,1244,1245],{},"Excel files",", organize your data so that each file focuses either on numbers or on text, as mixed-content tables tend to yield less accurate results. Agents also respond most reliably to queries when the relevant data is contained within a single sheet of the workbook.",[353,1248,1249],{},[648,1250,1251],{},"Agents respond best to Excel data when it’s contained in one sheet.",[353,1253,1254],{},"Example: If you have a large customer feedback survey stored in a single Excel file, separate the quantitative data (such as ratings and numerical responses) from the qualitative data (such as free-text feedback) into two different sheets. This method allows you to use tools like Python and Excel formulas to efficiently analyze the numerical data (e.g., calculate averages, sort results, determine confidence levels), while leveraging M365 Copilot’s sentiment analysis features to gain insights from the text-based feedback.",[375,1256,1258],{"id":1257},"file-limitations","File Limitations",[353,1260,755],{},[353,1262,1263,1264],{},"Finally, be aware of the file types and size limitations supported by Copilot Agents and Copilot Studio. The following table outlines current support:",[363,1265,1013],{"href":1011,"rel":1266},[710],[353,1268,1269,1270],{},"Also acknowledge those best practices Microsoft has shared on document lengths: ",[363,1271,1272],{"href":1272,"rel":1273},"https://support.microsoft.com/en-gb/topic/keep-it-short-and-sweet-a-guide-on-the-length-of-documents-that-you-provide-to-copilot-66de2ffd-deb2-4f0c-8984-098316104389",[710],[1275,1276],"v-table",{":head":1277,":hide-container":1277,":table":1278},"true","fileLimitations",[353,1280,1281],{},"Currently unsupported Filetypes in SharePoint Online: Officially everything else that is not listed there, is not officially supported.",[353,1283,1284],{},"Certain file types, such as CSV files, may function adequately even though they are not officially supported because they closely resemble plain text formats. However, most other file types—particularly container files like CAB, EXE, ZIP, as well as image, video, and audio formats such as PNG, IMG, MP3, and MP4—are not supported at this time.",[499,1286,1288],{"id":1287},"final-thoughts","Final thoughts",[353,1290,505],{},[353,1292,1293],{},"By following these recommendations, you can ensure that your Copilot Agents have access to well-structured, secure, and high-quality data, maximizing their usefulness and minimizing the risk of accidental data exposure. Investing time in preparing your SharePoint environment sets a strong foundation for successful AI agent deployment and adoption within your organization.",[353,1295,1296],{},"In fact many of our \"Build-an-Agent\" projects starting exactly with that. Not building the agent, but preparing the infrastructure and knowledge that we have a good quality data to use for the AI, because the Agent is only as good as the system beneath it!",{"title":392,"searchDepth":393,"depth":393,"links":1298},[1299,1300,1301,1314,1318,1324,1328,1334],{"id":640,"depth":393,"text":641},{"id":662,"depth":393,"text":663},{"id":742,"depth":393,"text":743,"children":1302},[1303,1304,1305,1306,1308,1309,1310,1311,1312,1313],{"id":751,"depth":396,"text":752},{"id":761,"depth":396,"text":762},{"id":774,"depth":396,"text":775},{"id":791,"depth":396,"text":1307},"Step 4: Generate a SharePoint Online Baseline Report",{"id":825,"depth":396,"text":826},{"id":834,"depth":396,"text":835},{"id":847,"depth":396,"text":848},{"id":856,"depth":396,"text":857},{"id":873,"depth":396,"text":874},{"id":882,"depth":396,"text":883},{"id":916,"depth":393,"text":917,"children":1315},[1316,1317],{"id":922,"depth":396,"text":923},{"id":954,"depth":396,"text":955},{"id":982,"depth":393,"text":983,"children":1319},[1320,1321,1322,1323],{"id":995,"depth":396,"text":996},{"id":1016,"depth":396,"text":1017},{"id":1028,"depth":396,"text":1029},{"id":1047,"depth":396,"text":1048},{"id":1070,"depth":393,"text":1071,"children":1325},[1326,1327],{"id":1099,"depth":396,"text":1100},{"id":1166,"depth":396,"text":1167},{"id":1194,"depth":393,"text":1195,"children":1329},[1330,1331,1332,1333],{"id":1203,"depth":396,"text":1204},{"id":1212,"depth":396,"text":1213},{"id":1225,"depth":396,"text":1226},{"id":1257,"depth":396,"text":1258},{"id":1287,"depth":393,"text":1288},{"lang":402,"seoTitle":1336,"titleClass":403,"date":1337,"categories":1338,"blogtitlepic":1340,"socialimg":1341,"customExcerpt":1342,"keywords":1343,"maxContent":420,"fileLimitations":1344,"textImageTeaser":1371,"asideNav":1386,"hreflang":1406,"footer":1411,"scripts":1412,"published":420},"How to Prepare Your M365 Data for Copilot Agents","2025-08-28",[1339],"Workplace","head-microsoft-copilot.jpg","/blog/heads/head-microsoft-copilot.jpg","Before Microsoft 365 Copilot Agents can deliver real value, the foundation must be solid: clean data, proper permissions, and a reliable infrastructure. This guide explains why data quality determines AI success, highlights risks like oversharing and silos, and outlines 10 practical steps to make your M365 environment agent-ready—secure, compliant, and scalable.","Microsoft 365 Copilot, Copilot Agents, M365 data governance, AI readiness, SharePoint data security, M365 infrastructure, oversharing prevention, AI data preparation, Microsoft 365 security, agent-ready M365",[1345,1349,1353,1356,1359,1361,1363,1365,1367,1369],[1346,1347,1348],"File type","SharePoint Online - Limit","Manual Upload - Limit",[1350,1351,1352],".doc","150 MB","100 MB",[1354,1355,1352],".docx","512 MB",[1357,1351,1358],".html","not supported",[1360,1355,1352],".pdf",[1362,1351,1352],".ppt",[1364,1355,1352],".pptx",[1366,1351,1352],".txt",[1368,1351,1352],".xls",[1370,1351,1352],".xlsx",{"image":1372,"cloudinary":420,"alt":1373,"bgColor":1374,"offset":420,"white":420,"list":1375,"left":399,"float":399,"firstColWidth":1380,"secondColWidth":1381,"copyClasses":1382,"headline":1383,"subline":1384,"spacing":1385},"/icons/icon-copilot.svg","Copilot Icon","#543b9c",[1376],{"ctaText":1377,"ctaHref":1378,"ctaType":1379,"external":420},"Secure your spot now – free of charge!","https://events.teams.microsoft.com/event/53a92e2c-9206-488d-9602-831864212207@a53834b7-42bc-46a3-b004-369735c3acf9","Button",5,7,"richtext","Agent-Ready Infrastructure – Your Foundation for Productive Copilot Agents","\u003Cp>AI is only as good as the infrastructure it runs on. If you want to use Copilot Agents seriously in practice, you need more than just licensing and activation. It’s all about structured data, consistent governance, and a well-thought-out architecture that scales—in short: an Agent-Ready Infrastructure.\u003Cbr /> \u003Cbr /> In our English-language session, you’ll learn:\u003C/p> \u003Cul> \u003Cli>Why data quality and information architecture are critical to success\u003C/li> \u003Cli>How to get your Microsoft 365 environment ready for productive agents\u003C/li> \u003Cli>And which levers you need to pull today so your company truly benefits from AI tomorrow\u003C/li> \u003C/ul> ","space-top-2 space-bottom-2 mt-10",{"menuItems":1387},[1388,1391,1394,1397,1400,1403],{"href":1389,"text":1390},"#why-your-infrastructure-data-matters","Why Infrastructure Matters",{"href":1392,"text":1393},"#_10-steps-to-improve-your-m365-data-infrastructure-now","10 Steps for M365 Data",{"href":1395,"text":1396},"#understanding-differences-between-agent-platforms","Understanding Agent Platform",{"href":1398,"text":1399},"#rag-retrieval-augumented-generation-vs-sharepoint-vs-upload","RAG vs. SharePoint vs. Upload",{"href":1401,"text":1402},"#microsoft-365-copilot-copilot-agents-security-compliance-out-of-the-box","M365 Copilot: Security",{"href":1404,"text":1405},"#best-practices-to-prepare-further-sharepoint-online-for-agent-use","SharePoint Best Practices",[1407,1409],{"lang":415,"href":1408},"/de/posts/2025-08-26-agent-ready-infrastructure",{"lang":418,"href":1410},"/es/posts/2025-08-26-agent-ready-infrastructure",{"noMargin":420},{"slick":420},"/posts/2025-08-28-agent-ready-infrastructure-copy",{"title":634,"description":392},"posts/2025-08-28-agent-ready-infrastructure copy",[1417,1418,1419,1420],"Microsoft 365 Copilot","M365 Data Governance","SharePoint Security","AI Data Preparation","w57R3glic_nCG_VCxOCqp3hNggKDkLiX_lPqMU2a1Nk",{"id":1423,"title":1424,"author":1425,"body":1426,"cta":397,"description":392,"eventid":397,"extension":398,"hideInRecent":399,"layout":400,"meta":1639,"moment":397,"navigation":420,"path":1669,"seo":1670,"stem":1671,"tags":1672,"webcast":399,"__hash__":1674},"content_en/posts/2025-09-25-gsa-unlocked.md","Global Secure Access Unlocked",[101,259],{"type":350,"value":1427,"toc":1625},[1428,1432,1434,1437,1440,1443,1447,1449,1452,1457,1460,1465,1468,1474,1478,1480,1483,1487,1489,1492,1495,1498,1501,1506,1510,1512,1515,1523,1528,1532,1534,1537,1540,1543,1548,1552,1554,1557,1560,1563,1568,1572,1574,1577,1580,1583,1591,1594,1599,1603,1605,1608,1611,1615,1617,1619,1622],[499,1429,1431],{"id":1430},"what-is-a-managed-red-tenant","What is a Managed Red Tenant?",[353,1433,505],{},[353,1435,1436],{},"The Managed Red Tenant combines our extensive experience in managed services with proven blueprints in the areas of workplace, Azure, and security.",[353,1438,1439],{},"The result: An isolated, fully cloud-based as-code managed environment that effectively protects administrative users and endpoints – even in target environments with multiple Microsoft Entra tenants and Active Directory domains.",[353,1441,1442],{},"Our solution relies on native, cloud-based identity and security features from Microsoft and strictly adheres to Zero Trust principles.",[375,1444,1446],{"id":1445},"global-secure-access-as-security-service-edge","Global Secure Access as Security Service Edge",[353,1448,755],{},[353,1450,1451],{},"We have integrated the latest innovations from Global Secure Access into various components of the Managed Red Tenant to enhance security when accessing Virtual Access Workstations (VAWs) and to protect and restrict outgoing privileged access.",[353,1453,1454],{},[656,1455,1456],{},"Microsoft Entra Internet Access",[353,1458,1459],{},"functioning as an identity-centric Secure Web Gateway (SWG), has been implemented to block public internet access and restrict connectivity to privileged interfaces and the authorized company’s tenant environments only. Additional features, such as Universal Conditional Access Evaluation (CAE), enable near real-time access blocking.",[353,1461,1462],{},[656,1463,1464],{},"Microsoft Entra Private Access",[353,1466,1467],{},"serves as an identity-centric Zero Trust Network Access (ZTNA) solution and is the core of our approach to providing secure and private access to VAWs. Its integration into our solution adds an extra layer of protection for privileged sessions on AVD-based endpoints by enforcing Conditional Access on the accessing client before establishing connectivity to the VAW. Securing access and applying Zero Trust principle to manage private or on-premises resources is another use cases where we take benefit of Private Access.",[353,1469,1470],{},[532,1471],{"alt":1472,"src":1473},"image.png","https://res.cloudinary.com/c4a8/image/upload/blog/pics/gsa-img-01.png",[499,1475,1477],{"id":1476},"use-cases-for-global-secure-access-in-the-managed-red-tenant","Use Cases for Global Secure Access in the Managed Red Tenant",[353,1479,505],{},[353,1481,1482],{},"Global Secure Access is one of the core components in the design of our Managed Red Tenant, and we’re excited to elevate both security and usability to a new level. The added value becomes most evident when looking at the individual use cases, which we’ll showcase in this blog.",[375,1484,1486],{"id":1485},"access-to-virtual-access-workstations","Access to Virtual Access Workstations",[353,1488,755],{},[353,1490,1491],{},"Some organizations choose not to equip all administrators with physical Privileged Admin Workstations (PAWs). For these low-privileged admins, we offer what we call Virtual Access Workstations (VAWs).",[353,1493,1494],{},"The most critical aspect here is secure access to the VAWs, and we consider it essential to establish a high level of security—where Entra Private Access plays a key role.",[353,1496,1497],{},"Administrators connect to the VAWs from their enterprise devices and sign in using their account from the Managed Red Tenant. Because of this identity switch, the accessing user is sourced from a different tenant than the the original device and will not able to present a device compliance status.",[353,1499,1500],{},"Therefore, we are using global secure access for pre-authentication using the original user from the device. Since our VAWs do not expose public endpoints and are only accessible via Entra Private Access, we can secure network access to a very high degree. Conditional Access in the workforce environment enforces strong user and device authentication, including device compliance and risk-based controls.",[353,1502,1503],{},[532,1504],{"alt":1472,"src":1505},"https://res.cloudinary.com/c4a8/image/upload/blog/pics/gsa-img-02.png",[375,1507,1509],{"id":1508},"secure-web-filtering","Secure Web Filtering",[353,1511,755],{},[353,1513,1514],{},"A key characteristic of administrative devices is their strictly limited access to applications, designed to minimize the attack surface as much as possible. While local solutions such as proxy.pac files or shared centralized proxies (not T0 exclusive) were commonly used in the past, we’ve opted for Entra Internet Access for devices within the Managed Red Tenant.",[802,1516,1517,1520],{},[805,1518,1519],{},"Internet access is only permitted from compliant devices and after strong user authentication",[805,1521,1522],{},"Access is restricted to explicitly approved URLs, and since HTTPS traffic (where possible) is decrypted and inspected, it’s also feasible to limit access to specific paths—for example, within Azure DevOps or GitHub",[353,1524,1525],{},[532,1526],{"alt":1472,"src":1527},"https://res.cloudinary.com/c4a8/image/upload/blog/pics/gsa-img-03.png",[375,1529,1531],{"id":1530},"tenant-restrictions-for-saas-services-and-administrative-interfaces","Tenant Restrictions for SaaS Services and Administrative Interfaces",[353,1533,755],{},[353,1535,1536],{},"In SaaS services and administrative interfaces, it’s common for URLs to be identical across all tenants, which makes them difficult to control using the web filtering methods described above.",[353,1538,1539],{},"To ensure that only accounts from the Managed Red Tenant can sign in to Microsoft’s approved portals from an administrative device, we leverage the Tenant Restriction feature of Global Secure Access.",[353,1541,1542],{},"Through Entra Internet Access, Entra ID is signaled which tenants are permitted for sign-in. This guarantees that all policies from the Managed Red Tenant are enforced and that administrative access occurs exclusively via B2B collaboration.",[353,1544,1545],{},[532,1546],{"alt":1472,"src":1547},"https://res.cloudinary.com/c4a8/image/upload/blog/pics/gsa-img-04.png",[375,1549,1551],{"id":1550},"on-premises-access","On-Premises Access",[353,1553,755],{},[353,1555,1556],{},"Of course, a Managed Red Tenant can also be used to administer on-premises and IaaS environments, which requires secure access to the datacenters. Entra Private Access provides us with Zero Trust Network Access that combines top-tier security standards with a flexible architecture and strong performance.",[353,1558,1559],{},"Access to datacenters and IaaS environments depends on robust user and device authentication, including device compliance and risk-based controls.",[353,1561,1562],{},"Managing individual targets as app segments enables granular access control, which is automated using Entra Governance features. This extends functions already widely used in the Managed Red Tenant—such as Just-In-Time administration and approval workflows—into the network layer.",[353,1564,1565],{},[532,1566],{"alt":1472,"src":1567},"https://res.cloudinary.com/c4a8/image/upload/blog/pics/gsa-img-05.png",[375,1569,1571],{"id":1570},"revocation-access-in-near-real-time","Revocation Access in Near Real-Time",[353,1573,755],{},[353,1575,1576],{},"Zero Trust also means being prepared to quickly and effectively contain threats—even within the most secure architecture—and to isolate compromised components.",[353,1578,1579],{},"In a Managed Red Tenant environment, we’re not only prepared for the compromise of users and devices within the tenant itself, but also for the (most likely) scenario where an attack originates from an admin’s office PC and then propagates to the Virtual Admin Workstation.",[353,1581,1582],{},"Thanks to the Universal Continuous Access Evaluation (CAE) feature in Global Secure Access, the following actions are automatically triggered:",[802,1584,1585,1588],{},[805,1586,1587],{},"Access to the Virtual Admin Workstation via Entra Private Access is interrupted if, for example, the user risk level of the account in the Workforce Tenant is set to High",[805,1589,1590],{},"Access to admin interfaces and the datacenter environment is revoked if, for example, the sessions of the account in the Managed Red Tenant are terminated",[353,1592,1593],{},"Additionally, full isolation of all devices and accounts within the Managed Red Tenant can be initiated at any time by the integrated CSOC service.",[353,1595,1596],{},[532,1597],{"alt":1472,"src":1598},"https://res.cloudinary.com/c4a8/image/upload/blog/pics/gsa-img-06.png",[375,1600,1602],{"id":1601},"enriched-sign-ins-and-token-insights","Enriched Sign-Ins and Token Insights",[353,1604,755],{},[353,1606,1607],{},"Beyond its many features for access control, Global Secure Access is a true game changer when it comes to logging. We gain significantly more telemetry from the network layer and can correlate it with existing sign-in and audit logs.",[353,1609,1610],{},"This enables our CSOC to identify which actions were still performed after containment was triggered—for example, in cases where not all tokens supported Continuous Access Evaluation (CAE).",[353,1612,1613],{},[532,1614],{"alt":1472,"src":1598},[499,1616,1288],{"id":1287},[353,1618,505],{},[353,1620,1621],{},"This blog is published alongside a webcast where we explore the Managed Red Tenant, Global Secure Access, the integration process, and the relevant use cases, supported by live demos.",[353,1623,1624],{},"If this blog has sparked your interest, we definitely encourage you to check out the webcast. And of course, we’re always happy to hear from you directly!",{"title":392,"searchDepth":393,"depth":393,"links":1626},[1627,1630,1638],{"id":1430,"depth":393,"text":1431,"children":1628},[1629],{"id":1445,"depth":396,"text":1446},{"id":1476,"depth":393,"text":1477,"children":1631},[1632,1633,1634,1635,1636,1637],{"id":1485,"depth":396,"text":1486},{"id":1508,"depth":396,"text":1509},{"id":1530,"depth":396,"text":1531},{"id":1550,"depth":396,"text":1551},{"id":1570,"depth":396,"text":1571},{"id":1601,"depth":396,"text":1602},{"id":1287,"depth":393,"text":1288},{"lang":402,"seoTitle":1640,"titleClass":403,"date":1641,"categories":1642,"blogtitlepic":1643,"socialimg":1644,"customExcerpt":1645,"keywords":1646,"maxContent":420,"textImageTeaser":1647,"asideNav":1656,"hreflang":1664,"footer":1667,"scripts":1668,"published":420},"Securing Microsoft 365 Admin Access with Entra and Global Secure Access","2025-09-25",[407],"head-gsa-unlocked.jpg","/blog/heads/head-gsa-unlocked.jpg","This blog explores how Microsoft Global Secure Access enhances security and control in our Managed Red Tenant. With Entra Internet Access and Private Access, organizations can secure admin sessions, enforce Zero Trust, and streamline access to cloud and on-prem resources. Real-world use cases and architecture insights show how to protect M365 environments effectively.","Microsoft Global Secure Access, Entra Internet Access, Entra Private Access, Managed Red Tenant, Zero Trust, M365 security, conditional access, admin access control, secure web filtering, virtual admin workstations, CAE, tenant restrictions, Microsoft 365, cloud security",{"image":1648,"cloudinary":420,"alt":1373,"bgColor":1649,"offset":420,"white":420,"list":1650,"left":399,"float":399,"firstColWidth":1380,"secondColWidth":1381,"copyClasses":1382,"headline":1654,"subline":1655,"spacing":1385},"/icons/shape-managed-red-tenant.svg","#E44418",[1651],{"ctaText":1652,"ctaHref":1653,"ctaType":1379,"external":420},"Watch the full session on YouTube","https://youtu.be/SpEOIdoA-uc","Global Secure Access Unlocked: Real World Implementation in Managed Red Tenant","\u003Cp>In the Managed Red Tenant, we enforce strict separation for privileged access. Live demos will show how we secure admin workflows using Global Secure Access.\u003Cbr /> \u003Cbr /> In our English-language session, you’ll learn:\u003C/p> \u003Cul> \u003Cli>How PAWs and VAWs with identity switching create secure admin workstations\u003C/li> \u003Cli>How Tenant Restrictions and Cross-Tenant Access Policies allow only authorized access\u003C/li> \u003Cli>How Per-App Tunnels and Continuous Access Evaluation are replacing traditional VPNs\u003C/li> \u003Cli>How Just-in-Time administration works in practice with Microsoft PIM\u003C/li> \u003C/ul> ",{"menuItems":1657},[1658,1660,1662],{"href":1659,"text":1431},"#what-is-a-managed-red-tenant",{"href":1661,"text":1477},"#use-cases-for-global-secure-access-in-the-managed-red-tenant",{"href":1663,"text":1288},"#final-thoughts",[1665,1666],{"lang":415,"href":1408},{"lang":418,"href":1410},{"noMargin":420},{"slick":420},"/posts/2025-09-25-gsa-unlocked",{"title":1424,"description":392},"posts/2025-09-25-gsa-unlocked",[1417,1418,1419,1420,1673],"Global Secure Access","fa9cSgWNIC3cl6ZixVtMGvI-KMd_q6EyoL3Sm6gH2hE",{"id":1676,"title":1677,"author":1678,"body":1679,"cta":397,"description":392,"eventid":397,"extension":398,"hideInRecent":399,"layout":400,"meta":1785,"moment":397,"navigation":420,"path":1843,"seo":1844,"stem":1845,"tags":1846,"webcast":399,"__hash__":1850},"content_en/posts/2025-09-30-security-store.md","First Worldwide: glueckkanja Security Copilot Agents",[190],{"type":350,"value":1680,"toc":1780},[1681,1685,1687,1690,1693,1697,1700,1703,1706,1710,1717,1719,1729,1740,1762,1773],[499,1682,1684],{"id":1683},"at-the-launch-of-the-microsoft-security-store-glueckkanja-introduced-10-security-copilot-agents","At the launch of the Microsoft Security Store, glueckkanja introduced 10 Security Copilot Agents",[353,1686,505],{},[353,1688,1689],{},"Offenbach, Germany – September 30, 2025 – glueckkanja today announced its inclusion in the Microsoft Security Store Partner Ecosystem. As one of the very first partners, glueckkanja was selected based on their proven experience with Microsoft Security technologies, willingness to explore and provide feedback on cutting edge functionality, and close relationship with Microsoft.",[1691,1692],"quotes",{":quotes":1691,":no-fullscreen":1277},[1694,1695],"div",{"style":1696},"padding-top:50px;",[353,1698,1699],{},"glueckkanja is collaborating with Microsoft to help shape the development of the Microsoft Security Store, providing feedback on new features, integration experiences, and customer needs. By publishing certified solutions and AI agents that integrate seamlessly with Microsoft Security products, glueckkanja is making it easier for organizations to discover, purchase, and deploy trusted security technologies. Through the Security Store, glueckkanja is helping customers accelerate their security outcomes and simplify operations with solutions that are vetted, easy to deploy, and designed to work together.",[353,1701,1702],{},"The Microsoft Security Store simplifies how organizations discover, purchase, and deploy trusted solutions and AI agents. With certified integrations, simplified billing, and accelerated deployment, the Security Store helps defenders improve their security posture while focusing on what matters most.",[353,1704,1705],{},"The Microsoft Security Store is setting a new benchmark for cybersecurity procurement and deployment. By centralizing a wide range of security solutions and AI agents organizations can now streamline how they discover, acquire, and operationalize advanced security technologies. With features like industry framework alignment, simplified billing, and guided deployment, the Security Store helps security teams reduce complexity, accelerate adoption, and maximize the value of their security investment.",[499,1707,1709],{"id":1708},"learn-more-in-the-official-microsoft-blog","Learn more in the official Microsoft blog:",[353,1711,1712],{},[363,1713,1716],{"href":1714,"rel":1715},"https://techcommunity.microsoft.com/blog/securitycopilotblog/agentic-security-your-way-build-your-own-security-copilot-agents/4454555",[710],"Agentic Security Your Way: Build Your Own Security Copilot Agents",[499,1718,378],{"id":377},[353,1720,1721,1724,1725,1728],{},[656,1722,1723],{},"We Manage and Protect Microsoft Ecosystems at Scale","\r\nglueckkanja is a leading cloud managed service provider and top Microsoft partner, delivering secure, scalable, and fully ",[656,1726,1727],{},"cloud-native Microsoft environments."," With a unified blueprint approach and Infrastructure-as-Code methodology, glueckkanja enables enterprise customers to accelerate their digital transformation and cloud adoption. Securely, consistently, and at scale.",[353,1730,1731,1732,1735,1736,1739],{},"The company offers comprehensive managed services for ",[656,1733,1734],{},"Microsoft Azure, Microsoft Entra, and Microsoft Intune,"," helping organizations streamline identity and access management, modernize endpoint operations, and build compliant, Zero Trust-based infrastructures. These services are complemented by ",[656,1737,1738],{},"24/7 security operations"," and incident response capabilities via glueckkanja’s dedicated Cybersecurity Operations Center (SOC), ensuring continuous protection, threat mitigation, and alignment with the latest security standards.",[353,1741,1742,1743,1746,1747,1114,1750,1753,1754,1757,1758,1761],{},"To support a seamless and cloud-native Microsoft experience, glueckkanja has developed a suite of proprietary tools that simplify management and drive automation: ",[656,1744,1745],{},"KONNEKT"," for secure collaboration with Microsoft 365 data, ",[656,1748,1749],{},"RADIUSaaS",[656,1751,1752],{},"SCEPman"," for passwordless, Intune-integrated network authentication, ",[656,1755,1756],{},"RealmJoin"," for scalable software distribution, and ",[656,1759,1760],{},"TerraProvider"," for fully automated provisioning of CloudPCs and hardware clients via Intune.",[353,1763,1764,1765,1768,1769,1772],{},"glueckkanja was among the first global partners to receive the ",[656,1766,1767],{},"Microsoft Verified MXDR"," certification, validating its excellence in managed security operations. With nearly 250 cloud professionals and a proven track record of success, glueckkanja has been recognized multiple times as a Microsoft Worldwide Partner of the Year finalist/winner, and ranks consistently at the top of the ",[656,1770,1771],{},"ISG Microsoft 365"," Germany quadrant since 2019.",[353,1774,1775,1776,1779],{},"The company is also a recognized innovatoramong Germany’s TOP 100 most innovative companies, and its ",[656,1777,1778],{},"outstanding 4.7/5 Kununu rating"," (Germany’s leading employer review platform) underlines its culture of excellence and employee satisfaction.",{"title":392,"searchDepth":393,"depth":393,"links":1781},[1782,1783,1784],{"id":1683,"depth":393,"text":1684},{"id":1708,"depth":393,"text":1709},{"id":377,"depth":393,"text":378},{"lang":402,"seoTitle":1786,"titleClass":403,"date":1787,"categories":1788,"blogtitlepic":1789,"socialimg":1790,"customExcerpt":1791,"keywords":1792,"maxContent":399,"hreflang":1793,"quotes":1798,"contactInContent":1805,"footer":1841,"scripts":1842,"published":420},"glueckkanja named Launch Partner for Microsoft Security Store, delivering 10 Copilot Agents","2025-09-30",[407],"head-security-agents.jpg","/blog/heads/head-security-agents.jpg","glueckkanja is among the first partners in the Microsoft Security Store Preview, delivering 10 Microsoft-native Security Copilot Agents across Security, Entra, Intune, and Purview. Developed in close collaboration with customers, these agents are designed to address real-world security challenges from day one – fully integrated, enterprise-ready, and built to simplify and accelerate security operations.","Microsoft Security Store Preview, Security Copilot Agents, glueckkanja Microsoft partner, Microsoft-native security solutions, AI-powered cybersecurity tools, Entra security agents, Intune security automation, Purview compliance agents, Cloud security Microsoft Copilot, Simplify Microsoft Security operations",[1794,1796],{"lang":415,"href":1795},"/de/posts/2025-09-30-security-store",{"lang":418,"href":1797},"/es/posts/2025-09-30-security-store",{"items":1799},[1800],{"text":1801,"name":1802,"position":1803,"company":1804},"A Forensic Agent by glueckkanja AG delivers deep-dive analysis of Defender XDR incidents to accelerate investigations, while their Privileged Admin Watchdog Agent helps enforce zero standing privilege principles by getting rid of persistent admin identities. These innovations, along with their other 6 agents in the Security Store today, demonstrate how glueckkanja AG is empowering organizations to tackle a wide range of security and IT challenges.","Dorothy Li","Corporate Vice President, Security Copilot, Ecosystem and Marketplace","Microsoft",{"quote":420,"infos":1806},{"bgColor":1807,"headline":1808,"subline":1809,"level":499,"textStyling":565,"flush":566,"person":1810,"form":1814},"var(--color-blue-dark)","Get in touch","Want to know how our 10 Microsoft-native Security Copilot Agents help simplify operations across Security, Entra, Intune, and Purview? Fill out the form, and we’ll share real-world insights, demos, and examples tailored to your needs.",{"image":568,"cloudinary":420,"alt":1811,"name":163,"quotee":163,"quoteeTitle":1812,"quote":1813},"Portrait of Jan Geisbauer, Head of Security at glueckkanja","Head of Security","What our customers gain is time and clarity: Security teams spend less effort on manual analysis and troubleshooting, and more time focusing on the threats that really matter. With our 10 Security Copilot Agents, we help them improve their security posture, reduce costs, and simplify daily operations directly within Microsoft Security.",{"ctaText":1815,"cta":1816,"method":400,"action":588,"fields":1817},"Submit",{"skin":587},[1818,1819,1820,1821,1822,1827,1829,1831,1834,1836,1838,1839],{"type":591,"id":592,"value":593},{"label":595,"type":596,"id":597,"required":420,"requiredMsg":598},{"label":600,"type":596,"id":601,"required":420,"requiredMsg":602},{"label":604,"type":605,"id":605,"required":420,"requiredMsg":606},{"label":1823,"type":1824,"id":1825,"required":399,"requiredMsg":1826},"Your message to us","textarea","message","Please enter a message.",{"label":1828,"type":609,"id":610,"required":420,"requiredMsg":611},"Your data will be stored and used to respond to your request. For more details, please see our \u003Ca href=\"/en/privacy\">Privacy Policy\u003C/a>.",{"type":591,"id":1830,"value":407},"_topic",{"type":591,"id":1832,"value":1833},"_location","World",{"type":591,"id":613,"value":1835},"Form: Blog Microsoft Security Store | EN",{"type":591,"id":616,"value":1837},"gkgab-contact-form",{"type":591,"id":619},{"type":591,"id":1840},"jsonData",{"noMargin":420},{"slick":420},"/posts/2025-09-30-security-store",{"title":1677,"description":392},"posts/2025-09-30-security-store",[1847,1848,1849],"AI Agents","Security Copilot","Microsoft Security","4Sb-m_w4uOywSrPljqZP1qQDPoK1RQ_ZidUkZIqMtQs",{"id":1852,"title":1853,"author":1854,"body":1855,"cta":397,"description":1859,"eventid":397,"extension":398,"hideInRecent":399,"layout":400,"meta":1893,"moment":1895,"navigation":420,"path":1908,"seo":1909,"stem":1910,"tags":1911,"webcast":399,"__hash__":1915},"content_en/posts/2026-03-16-ai-agent-hackathon.md","Six Agents. Four Weeks. Real Production.",[190],{"type":350,"value":1856,"toc":1891},[1857,1860,1863,1866,1869,1872,1878,1882,1885,1888],[353,1858,1859],{},"How many hours does your IT department spend each week on tasks an agent could handle in minutes?",[353,1861,1862],{},"There is a type of process that almost every IT department in German companies knows: someone reads contracts. Someone else sorts requirements into categories. Yet another person answers the same questions about deliveries that someone already answered yesterday. These are not glamorous problems. But they are the ones that collectively cost tens of thousands of hours per year — and they are surprisingly well-suited for AI agents, if you know where to apply the lever.",[353,1864,1865],{},"Six companies did exactly that in February at our office in Offenbach. Kiekert now categorizes R&D requirements using rule-based logic, with a confidence score and a feedback loop. The agent is already running in production. Dr. Oetker built a Contract Review Assistant that checks IT contracts for critical clauses and generates a structured review report for procurement and legal. Eckes-Granini entered with two agents: an onboarding agent that guides new employees through MFA, Office setup, and security policies from their first login, and a logistics agent that answers dispatchers' questions about shipments, rates, and carriers. igefa developed a voice-based hotline agent for internal IT support, connected to JIRA and Confluence. And lila logistik brought perhaps the most unusual project: a use case generator that monitors SharePoint and Exchange to identify automation potential — because the real problem is often not the technology, but that no one in the organization recognizes the right places to automate.",[353,1867,1868],{},"All of this was built in Copilot Studio, with Agent Flows, Dataverse connections and MCP connectors, supported by four of our MVPs. Four weeks of building, alongside regular day-to-day business. Participants had to carve out every hour for it, between tickets, quarterly closes, and operational demands. That six working agents stood at the end says less about the technology than about the teams who built them.",[353,1870,1871],{},"On March 10th at the Microsoft Office Frankfurt came the final test: six presentations, 20 minutes each, judged on business impact, technical depth, and audience applause (yes, that is also on the scoring sheet). Kiekert won because their agent is running in production, built by someone from the business unit — no IT background, no prior experience with Copilot Studio. Dr. Oetker won because contract review is so universal that the jury started thinking about their own IT contracts afterwards. That all six teams built a working agent in four weeks alongside their regular workload — that was ultimately the real news of the day.",[1873,1874],"video-frame",{"thumb":1875,"alt":1876,"id":1877,":full-width":1277},"/thumbs/thumb-ai-agent-hackathon.jpg","Presentation of the glueckkanja AI Agent Hackathon at Microsoft Office Frankfurt: six teams presenting their Copilot Studio agents to an audience.","GjumQAnKj8k",[1694,1879,1881],{"style":1880},"background:var(--color-black-4); margin-top:0.5rem; padding:0.5rem 1rem; font-size:0.85rem; color:var(--color-blue-dark)","glueckkanja AI Agent Hackathon – Six companies, six agents, four weeks",[353,1883,1884],{},"The format is called the glueckkanja AI Agent Hackathon. It grew out of a Microsoft Hackathon in Munich where we participated with Knorr-Bremse. Microsoft then asked us to continue the format with our customers. The idea is simple: companies apply with a concrete process that is currently manual. We sharpen the use case, define the architecture, and build together. For those not ready to jump straight into the hackathon: we also offer workshops to identify use cases and prepare the agent architecture — either as an entry point or as a standalone format.",[353,1886,1887],{},"The next glueckkanja AI Agent Hackathon starts in fall 2026. Registration is open. If you want to identify use cases and prepare your environment beforehand: we are happy to help. Reach out to us.",[353,1889,1890],{},"Thank you to Sylvia and Miriam from Microsoft for their trust in the format. To Kiekert, Dr. Oetker, Eckes-Granini, igefa and lila logistik for their courage and commitment. And to our glueckkanja team for making it happen.",{"title":392,"searchDepth":393,"depth":393,"links":1892},[],{"lang":402,"seoTitle":1894,"titleClass":403,"date":1895,"categories":1896,"blogtitlepic":1897,"socialimg":1898,"customExcerpt":1899,"keywords":1900,"hreflang":1901,"published":420},"glueckkanja AI Agent Hackathon: Six Companies Build AI Agents with Copilot Studio","2026-03-16",[406],"head-ai-agent-hackathon.jpg","/blog/heads/head-ai-agent-hackathon.jpg","Six companies, four weeks of building, six working AI agents — that was the first glueckkanja AI Agent Hackathon. Kiekert, Dr. Oetker, Eckes-Granini, igefa and lila logistik built agents in Copilot Studio that are running in production today. Here is what was built and how the format works.","AI Agent Hackathon, Copilot Studio, glueckkanja, AI Agents, Microsoft Copilot, Agent Flows, Dataverse, MCP Connector, Kiekert, Dr. Oetker, Eckes-Granini, igefa, lila logistik, AI automation, enterprise AI, process automation",[1902,1904,1906],{"lang":415,"href":1903},"/de/posts/2026-03-16-ai-agent-hackathon",{"lang":402,"href":1905},"/en/posts/2026-03-16-ai-agent-hackathon",{"lang":418,"href":1907},"/es/posts/2026-03-16-ai-agent-hackathon","/posts/2026-03-16-ai-agent-hackathon",{"title":1853,"description":1859},"posts/2026-03-16-ai-agent-hackathon",[1912,1913,1914,1847],"AI","Copilot Studio","Hackathon","_mIXHNCs5jKlIww9Bh4E4kHE1qECSwksCqRuS7m98X0",1779292462200]