Advancing AEC and Project-based Teams with Panzura Nexus
AEC Firms Have Decades of Project Data in Panzura CloudFS That Microsoft 365 Copilot Cannot See — Panzura Nexus Bridges the Gap Maintaining Files,...
Panzura
Our enterprise data success framework allows enterprises to build extraordinary hybrid cloud file and data systems.
![]()
Platforms
Complementary file and data platforms that deliver complete visibility, control, resilience, and immediacy to organizations worldwide.
Solutions
From data resilience to global file delivery, we solve the toughest and most important data problems facing organizations globally.
Resources
Find insights, news, whitepapers, webinars, and solutions in our resource center.
Company
We bring command and control, resiliency, and immediacy to the world’s unstructured data. We make it visible, safeguard it against damage, and deliver it instantly to people, workloads, and processes, no matter where they are.
8 min read
David Barley
:
Apr 29, 2026
Table of Contents
Most Microsoft Graph Connectors Stop at Gen 3, Where Permission Drift is Measured in Hours or Days. Panzura Nexus Operates at Gen 4 — Pushing Live ACL Updates to Microsoft Graph in Real Time.
Key Takeaways:
Retrieval Augmented Generation (RAG) has become the default pattern for putting enterprise data in front of large language models. What’s less visible is how much the underlying architecture has been quietly evolving. RAG two short years ago is not the same thing as RAG in 2026. Enterprises still building on the 2023 version are going to hit a wall.
In fact, they’re probably already hitting it because “naive” RAG is missing almost everything you need to deploy AI responsibly at scale. This is a tour of four generations of RAG architecture, the limits of each, and where Panzura Nexus — our purpose-built bridge between Panzura CloudFS and Microsoft 365 Copilot — fits.
Table 1. Four Generations of RAG Architecture
|
Generation
|
Architecture
|
Permissions
|
Freshness
|
Panzura Nexus Position
|
|---|---|---|---|---|
|
Gen 1 — Naive RAG
|
Chunk documents, embed as vectors, retrieve by similarity
|
None
|
Static corpus
|
Not used — insufficient for enterprise file data
|
|
Gen 2 — Hybrid Retrieval
|
Semantic + keyword search with reranking
|
None
|
Scheduled crawl
|
Not used — insufficient for enterprise file data
|
|
Gen 3 — Permission-Aware RAG
|
Hybrid retrieval with ACLs applied at query time
|
Cached from source
|
Scheduled crawl (hours to days)
|
Partial — most Graph connectors stop here
|
|
Gen 4 — Event-Driven, Permission-Aware RAG
|
Live ACL enforcement, event-driven ingestion
|
Live from source
|
Near real-time (seconds)
|
Where Panzura Nexus operates
|
|
Gen 5 — Agentic RAG
|
Multi-step workflows over governed retrieval
|
Inherits from Gen 4
|
Inherits from Gen 4
|
Foundation layer for Microsoft Copilot Studio agents on CloudFS data
|
← Swipe to see more →
Gen 1 is the tutorial version. Documents are chunked into passages, embedded as vectors, and retrieved by similarity at query time. It works beautifully for a demo and reasonably well for knowledge bases where every user can see every document, but it falls apart the moment any enterprise requirement enters the picture — permissions, freshness, provenance, auditability.
Most of the RAG in production today is some variant of Gen 1, and most of the angst about AI hallucinations is the predictable consequence of deploying Gen 1 against a problem that needs Gen 3 or Gen 4.
Stanford researchers testing general-purpose LLMs without RAG found hallucination rates of 58-82% on legal queries in 2024, a rate that drops dramatically when proper RAG architecture with permission enforcement is implemented. Panzura Nexus doesn’t operate at this generation because enterprise file data on CloudFS is never the right fit for a permission-free, static-corpus model.
Gen 2 improved retrieval quality by combining semantic embedding search with keyword retrieval, adding reranking models, and tuning chunk sizes and overlap parameters. Recall and precision both improved. But architecturally Gen 2 is still the same shape as Gen 1, with no identity model, change detection, or governance. It delivers better answers to the wrong question.
Gen 3 is where enterprise RAG starts to resemble something a CISO can live with. User identity enters the pipeline, every retrieval is filtered by what the querying user has access to, and documents the user can’t see in the source system don’t make it into the LLM context window.
Implementing this correctly is harder than it sounds. You need to translate the source system's access control model — NTFS ACLs, AD groups — into something the retrieval layer enforces at query time, keep that translation in sync as permissions change, and handle group memberships, inheritance, denials, and exceptions.
Most Microsoft Graph connectors stop at Gen 3. They scan on a schedule, build an index with permission metadata, and serve queries against it. Between crawls, the permission model drifts from the source. A user removed from a project team this morning might still be getting that project’s data from the AI this afternoon. In non-regulated industries this is tolerable. In regulated industries — legal, healthcare, financial services, government — it isn’t.
With enterprise spending on RAG solutions projected to grow from $1.94 billion in 2025 to $9.86 billion by 2030, security leaders recognize that permission drift in Gen 3 architectures represents both a compliance liability and a competitive disadvantage. This is the gap Panzura Nexus was built to close.
Gen 4 abandons scheduled crawls entirely and subscribes to the source system's change events — file created, modified, permission changed, deleted, each a discrete event — reacting in near real-time.
Panzura Nexus is built natively on this model. CloudFS emits audit events whenever anything happens on the file system, and Panzura Nexus subscribes to that stream continuously. When a file is created, Panzura Nexus ingests it. When it’s modified, Nexus pushes the update to Microsoft Graph in real-time; when an ACL changes in Active Directory, Nexus delivers that change to the graph in real-time. There is no next crawl, and no window during which Copilot’s view of the file system lags reality.
The architecture matters most at the permission layer. Panzura Nexus delivers live CloudFS file permissions to Microsoft Graph on every audit event, so CloudFS remains the unambiguous source of truth. Nexus maintains no shadow access control database — the file system’s permissions are the AI layer’s permissions.
Three design decisions make this work in production:
The dataflow runs strictly one direction: CloudFS → Panzura Nexus → Microsoft Graph. Copilot has no return path and cannot talk back to Panzura Nexus. Because Panzura Nexus pushes changes the moment they happen at the source, Copilot’s view of the file system never lags reality: revoke a user’s access in Active Directory this morning, and Nexus delivers that update to Microsoft Graph immediately, ensuring they cannot see that file in Copilot this afternoon — regardless of when the initial data was ingested.
Table 2. What Crawl-Based Architectures Cost — And What Panzura Nexus Prevents
|
Event Drift
|
Consequence Under Scheduled Crawl (Gen 3)
|
How Panzura Nexus Handles It (Gen 4)
|
|---|---|---|
|
Employee offboarded in Active Directory
|
AI may continue returning results to the disabled account until the next crawl completes
|
Panzura Nexus delivers the ACL change to Microsoft Graph in real-time; Copilot stops returning results to the disabled account on the next query
|
|
User removed from a project team
|
User continues to see project data through AI until the next index refresh
|
CloudFS audit event fires; Panzura Nexus pushes the ACL update to Microsoft Graph in real-time
|
|
File permissions tightened
|
AI may still surface the file to previously authorized users for hours or days
|
Panzura Nexus delivers the updated ACL to Microsoft Graph in real-time; enforced on the next Copilot query
|
|
File deleted from source system
|
Deleted content may remain retrievable via AI until the next crawl
|
Delete event triggers a real-time push to remove the file from Microsoft Graph
|
|
New restricted folder created
|
May be inadvertently indexed if policy scope is not updated before the next crawl
|
ACL change event triggers a real-time push to Microsoft Graph
|
← Swipe to see more →
The frontier is Gen 5: agentic RAG. Instead of a single retrieval at query time, Gen 5 systems execute multi-step workflows. An agent might retrieve project history, cross-reference it with compliance policy, summarize it for a specific audience, and produce a document all from one user prompt. Microsoft 365 Copilot Studio is the most visible vehicle: enterprises are building project intelligence agents, compliance review agents, knowledge management agents, proposal generation agents.
What makes Panzura Nexus particularly important is that the entire Microsoft agent ecosystem grounds in the same data Panzura Nexus delivers to the Graph: Microsoft Copilot Studio for low-code business agents, the Microsoft 365 Agent Store for prebuilt marketplace agents, and Microsoft Foundry for pro-dev enterprise agents. When CloudFS data flows through Panzura Nexus, every agent you build inherits the same event-driven freshness and source-of-truth permissions that govern conversational Copilot queries. The pipeline powering today’s conversations is the foundation for tomorrow’s autonomous workflows.
The quiet truth about Gen 5 is that it is only as trustworthy as the Gen 4 foundation underneath it. An agent executing a five-step workflow over enterprise data is five times the opportunity for a permission error to leak information, so agents built on crawl-based connectors inherit the drift problem and multiply it. Agents built on Panzura Nexus inherit governed, permission-accurate retrieval at every step. Gen 5 rides on Gen 4, so if the foundation isn’t right, the agents aren’t safe.
If you’re evaluating a RAG implementation, the generation question is worth asking explicitly. Gen 1 and Gen 2 systems won’t survive an enterprise compliance review. Gen 3 systems are better but have freshness gaps that matter in regulated industries. Gen 4 is where serious enterprise AI is landing in 2026.
For CloudFS customers this isn’t academic. Panzura Nexus is the Gen 4 layer purpose-built for your file data, generally available today, with event-driven ingestion, real-time ACL delivery to Microsoft Graph, and policy-based governance out of the box.
If you’re considering Microsoft Copilot Studio agents as the next phase of your strategy, the foundation matters more than the agents themselves. Panzura Nexus is that foundation.
To learn more about the Panzura Nexus architecture, visit panzura.com/nexus or contact your Customer Success Manager.
Microsoft, Microsoft 365, Microsoft 365 Copilot, Microsoft Copilot Studio, Microsoft Azure, and Microsoft Graph are trademarks of the Microsoft group of companies. All product and company names are trademarks or registered® trademarks of their respective holders. Use of those names does not imply any affiliation with or endorsement by their owners. The opinions expressed above are solely those of Panzura LLC as of April 29, 2026, and Panzura LLC makes no commitment to update these opinions after such date.
Retrieval-Augmented Generation (RAG) connects large language models to enterprise data in real-time, retrieving relevant information from documents, policies, and knowledge bases before generating responses. This grounds AI outputs in verified sources rather than relying solely on the model's training data, reducing hallucinations and improving accuracy.
Gen 1 is naive RAG with basic vector similarity search and no permissions. Gen 2 adds hybrid retrieval and reranking. Gen 3 introduces permission-aware retrieval with cached ACLs. Gen 4 uses event-driven ingestion and live permission enforcement, eliminating permission drift between the source system and AI layer.
Gen 1 and Gen 2 RAG lack identity models and governance controls. Stanford researchers testing general-purpose LLMs without RAG found hallucination rates of 58–82% on legal queries — primarily because the models had no grounded source data to draw from. RAG with proper grounding reduces hallucinations dramatically. But for enterprise deployment, grounding alone isn’t enough: without permission enforcement and real-time data freshness, even a well-grounded RAG system can surface information users shouldn’t see.
Permission drift occurs when a RAG system’s cached permissions fall out of sync with the source system. If a user loses access to a file in Active Directory, Gen 3 RAG systems may still surface that file through AI until the next scheduled crawl completes, creating compliance risk.
David Barley is a Principal Solutions Architect at Panzura. He has over two decades of experience building HPC, AI, and large-scale data solutions for enterprises, startups, and government agencies.
AEC Firms Have Decades of Project Data in Panzura CloudFS That Microsoft 365 Copilot Cannot See — Panzura Nexus Bridges the Gap Maintaining Files,...
Most Microsoft Graph Connectors Stop at Gen 3, Where Permission Drift is Measured in Hours or Days. Panzura Nexus Operates at Gen 4 — Pushing Live...
Panzura Nexus Connects Your CloudFS File Data to Microsoft 365 Copilot Without Migrating Files, Rebuilding Permissions, or Writing Custom Connector...