Category
planForChange
Severity
normal
Major change
False
Last modified
2025-12-19 23:41:17
Summary source
Azure OpenAI (gpt-4.1)
Action by (Graph)
—
Action by (AI)
2026-01-12 00:00:00
Services
Microsoft Teams
Tags
Feature update, Admin impact
Master tags
Security
Roadmap IDs
One-line summary
Starting January 12, 2026, Teams will enable weaponizable file and malicious URL protection, plus reporting, by default for tenants using default messaging safety settings.
Similar updates
More like thisMC1148540 (Updated) New file protection in Teams chat and channels blocks unsafe content
Updated November 17, 2025: The rollout of Weaponizable file type protection in Microsoft Teams is expected to finish before the end of November 2025 for General Availability (Worldwide). The previously announced update to make Weaponizable file protection setting in Messaging settings ON by default has been postponed to early 2026. Introduction.
MC1148539 (Updated) Microsoft Teams: Malicious URL Protection for Teams Chat and Channels
(Updated) Microsoft Teams: Malicious URL Protection for Teams Chat and Channels Malicious URL Protection in Teams rolls out globally in Nov 2025, warning users about unsafe links; feature defaults ON at GA, with admin override possible. ...RL Protection in Microsoft Teams is expected to finish before the end of November 2025 forIntroduction.
MC1147984 (Updated) Microsoft Teams: User reporting for incorrectly identified security concerns
(Updated) Microsoft Teams: User reporting for incorrectly identified security concerns Teams users can now report messages incorrectly flagged as security threats; feature rolls out GA by end of Nov 2025 and is on by default, with admin controls in Teams and Defender portals. The previously announced update to make “Report incorrect security.
MC1187837 Microsoft Defender for Office 365 Zero-hour auto-purge (ZAP) Teams protection capabilities to Defender for Office Plan 1
Microsoft Defender for Office 365 Zero-hour auto-purge (ZAP) Teams protection capabilities to Defender for Office Plan 1 Starting January 6, 2026, Zero-hour auto-purge (ZAP) will be enabled by default for Teams in Defender for Office 365 Plan 1, automatically quarantining malicious messages. ...January 6, 2026 , Zero-hour auto-purge (ZAP) —a.
MC772556 (Updated) Microsoft Teams: Shorter meeting URLs
(Updated) Microsoft Teams: Shorter meeting URLs Teams meeting URLs will be shortened and made more secure; new links will expire after 60 days (scheduled) or 8 hours (Meet Now). Maintaining a high security level is essential to protect sensitive ... This adjustment is designed to enhance the security of Teams meeting links, thereby better.
MC1085133 (Updated) Microsoft Teams: Rule-based enablement of Microsoft 365 third-party apps in the Teams admin center
(Updated) Microsoft Teams: Rule-based enablement of Microsoft 365 third-party apps in the Teams admin center Admins can soon manage Microsoft 365 certified SaaS app availability in Teams via new org-wide settings, with enhanced controls for security and customization. Updated December 3, 2025: We have updated the timeline. This feature will now.
Details
Summary
Starting January 12, 2026, Microsoft Teams will enable messaging safety features by default, including weaponizable file type protection, malicious URL protection, and reporting incorrect detections. Existing custom settings remain unchanged. Admins should review and adjust settings before this date and inform helpdesk staff accordingly.
Body (from Message Center)
[Introduction]
We’re improving messaging security in Microsoft Teams by enabling key safety protections by default. This update helps safeguard users from malicious content and provides options to report incorrect detections, reducing risk and improving collaboration security.
[When this will happen:]
Starting January 12, 2026, as announced in MC1148540, MC1148539, and MC1147984.
[How this affects your organization:]
Who is affected:
- Tenants that have not previously modified messaging safety settings and are still using the default configuration.
What will happen:
- The following settings in Teams admin center Messaging Settings will be turned ON by default:
- Weaponizable file type protection
- Malicious URL protection
- Report incorrect security detections
- End users may:
- See warning labels on messages containing malicious URLs.
- Have the option to report false positives.
- Experience blocked messages if they contain weaponizable file types.
- If you have already customized and saved these settings, your preferences will remain unchanged.
[What you can do to prepare:]
- Review current values for these settings in Teams admin center > Messaging > Messaging settings > Messaging safety.
- If you do not want the new defaults to apply, adjust settings and click Save before January 12, 2026.
- Communicate this change to helpdesk staff and update internal documentation if necessary.
Learn more
- Weaponizable File Protection in Microsoft Teams
- Malicious URL Protection in Microsoft Teams
- User experience in Teams – Report Not a Security Concern
[Compliance considerations:]
No compliance considerations identified, review as appropriate for your organization.
Raw JSON (for debugging)
Expand/collapse the full payload below.
Show/hide raw
{
"snapshot_item": {
"action_required_by": null,
"ai_action_required_by": "2026-01-12T00:00:00Z",
"ai_actions": [
"Review Teams messaging safety settings",
"Adjust and save settings if custom defaults are desired",
"Inform helpdesk and update documentation"
],
"ai_master_tags": [
"Security"
],
"ai_model": "gpt-4.1",
"ai_summary": "Starting January 12, 2026, Teams will enable weaponizable file and malicious URL protection, plus reporting, by default for tenants using default messaging safety settings.",
"ai_topics": [
"Teams"
],
"category": "planForChange",
"details_map": {
"Summary": "Starting January 12, 2026, Microsoft Teams will enable messaging safety features by default, including weaponizable file type protection, malicious URL protection, and reporting incorrect detections. Existing custom settings remain unchanged. Admins should review and adjust settings before this date and inform helpdesk staff accordingly."
},
"id": "MC1200576",
"importance": 4,
"is_major_change": false,
"last_modified": "2025-12-19T23:41:17Z",
"ms_products": [
"Teams"
],
"platforms": null,
"roadmap_ids": [],
"services": [
"Microsoft Teams"
],
"severity": "normal",
"tags": [
"Feature update",
"Admin impact"
],
"title": "Teams admin center: Messaging safety defaults changing to \"On\" by default"
}
}