Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Context

I took part in the "Microsoft 365 Copilot Early Access Program" as Quebec champion inside my organization "ArcelorMittalAM". To maximize the benefits of the program, each business unit has a champion whose the responsabilities were the followings :

...

I took the opportunity to document this new technology and make the information more accessible.

What is Copilot ?

Copilot is a new way of working that combines the power of large language models (LLMs) with your content in the Microsoft 365 apps. It can help you create and improve texts, summarize meetings, transform files into presentations, and much more. Copilot is not just a better way of doing the same things. It’s an entirely new way of working.

Copilot works with the apps you already use, such as Word, Outlook, PowerPoint, Excel and Teams. You can also ask questions and get answers from Copilot using natural language. Copilot can access your data and files, as well as public information from the internet used to train the LLM, to provide you with relevant and personalized suggestions.

Copilot is safe to use with your data and files. They are protected and won't leak outside your organization. Copilot does not store or use ArcelorMittal data to train the models.

...

What did I do to help my business unit ?

Creation of a SharePoint Intranet

...

I have developed a SharePoint Intranet in order to demystify and summarize most ot the info accessible in the following websites :

...

  1. The user sends a request to Copilot via Chat.

  2. Copilot by anchoring makes calls to Microsoft Graph, which is a gateway to data of all kinds in the Microsoft Cloud. Here, it seeks access to your organizational data.

  3. Copilot processes the information obtained, combining it with other types of data to obtain the most accurate and relevant answers.

  4. Copilot sends the modified initial information (step 1) to LLM (Large Language Model).

  5. LLM sends the response to Copilot.

  6. Copilot reprocesses the response it has just received by making additional calls to Microsoft Graph while combining security, compliance and confidentiality checks.

  7. Copilot returns an adapted and precise response to the user, along with recommended commands.

Info

Note that some requirements have to be fullfilled before : an enable identity in Azure Active Directory, an active M365 E3 licence, an active M365 Copilot licence and update of the M365 apps (Current channel).

Creation of a presentation related to the Architecture (technical part)

...

  1. User sends data (text or files) to Copilot.

  2. Anchoring Copilot makes calls to Microsoft Graph, a gateway to data of all kinds in the Microsoft Cloud. Here, it seeks access to your organizational data.

  3. Copilot processes the information obtained, combining it with other types of data to obtain the most accurate and relevant answers: the pre-processing stage.

  4. Copilot sends the modified message to LLM, which uses the semantic index to interpret user queries and produce sophisticated, meaningful, multilingual responses.

  5. LLM sends the response to Copilot.

  6. Copilot processes it again (post-processing), i.e. includes additional anchor calls to Microsoft Graph, security, compliance and confidentiality checks.

  7. Copilot returns a recommended response and appropriate commands.

  8. Copilot processes and orchestrates all this iteratively.

Info

Note that Copilot relies on the Microsoft Search Cloud service, which provides and gathers information, and communicates with LLM, whose private instances use the authorization model provided by Azure Active Directory.

M365 Copilot : the first pillar - Microsoft Graph

...

  1. Customer content isolation: This is ensured by the main identity provider "Azure Active Directory", which exercises role-based access control.

  2. Microsoft physical security: "Microsoft uses rigorous physical security, background filtering and a multi-layer encryption strategy to protect the confidentiality and integrity of customer content" (Microsoft).

  3. Encryption of customer content: Microsoft 365 uses service-side technologies that encrypt customer content at rest and in transit, including BitLocker, file-based encryption, TLS (Transport Layer Security) and IP sec (Internet Protocol Security).

  4. Customer data control (Compliance): Microsoft comply with widely applicable privacy laws, such as the RGPD, and privacy standards, such as ISO/IEC 27018, ...

Conclusion : remarks

Benefits & challenges only from a user perspective, not from a technical perspective (admin, dev, security, …) : Work Trend Index | Will AI Fix Work? (microsoft.com)

...