MC1097272 – (Updated) Microsoft 365 Upcoming Secure by Default Settings Changes (archived)

OneDrive for Business logo

check before: 2025-07-15

Product:

Entra, Microsoft 365 Apps, OneDrive, SharePoint

Platform:

Online, Web, World tenant

Status:

Change type:

Admin impact, Feature update, Updated message, User impact

Links:

Details:

Summary:
Microsoft 365 will update default settings to enhance security by blocking legacy authentication protocols and requiring admin consent for third-party app access. Changes start mid-July 2025 and complete by August 2025. Organizations should assess configurations, notify stakeholders, update documentation, and configure the Admin Consent workflow.

Details:
Updated July 18, 2025: We have updated the content. Thank you for your patience.
As part of the Microsoft Secure Future Initiative (SFI) and in alignment with the "Secure by Default" principle, we are updating default settings in Microsoft 365 to help you meet the minimum security benchmark and harden your tenant's security posture. These changes target legacy authentication protocols and app access permissions that may expose organizations to unnecessary risk.
This is the first step in a broader effort to evaluate and evolve Microsoft 365 defaults through the lens of security best practices.
[When this will happen:]
These changes will begin rolling out in mid-July 2025 and are expected to complete by August 2025.

Change Category:
XXXXXXX ... free basic plan only

Scope:
XXXXXXX ... free basic plan only

Release Phase:

Created:
2025-06-18

updated:
2025-07-19

Task Type

XXXXXXX ... free basic plan only

Docu to Check

XXXXXXX ... free basic plan only

MS How does it affect me

XXXXXXX ... free basic plan only

MS Preperations

XXXXXXX ... free basic plan only

MS Urgency

XXXXXXX ... free basic plan only

MS workload name

XXXXXXX ... free basic plan only

summary for non-techies**

XXXXXXX ... free basic plan only

Direct effects for Operations**

Blocking Legacy Authentication Protocols
Blocking legacy authentication protocols like RPS may prevent users from accessing SharePoint and OneDrive, leading to disruptions in workflows that rely on these services.
   - roles: End Users, IT Administrators
   - references: https://aka.ms/entra-app-access, https://learn.microsoft.com/en-us/entra/identity/enterprise-apps/manage-app-consent-policies

Blocking FPRPC Protocol
Blocking the FPRPC protocol will prevent users from opening Office files using outdated methods, potentially disrupting access for users who rely on these legacy protocols.
   - roles: End Users, Content Creators
   - references: https://go.microsoft.com/fwlink/p/?linkid=2324509, https://learn.microsoft.com/en-us/powershell/module/sharepoint-online/set-spotenant?view=sharepoint-ps#-legacybrowserauthprotocolsenabled

Admin Consent Requirement for Third-Party Apps
Requiring admin consent for third-party apps may slow down access to necessary tools for users, as they will need to wait for admin approval before using these applications.
   - roles: End Users, IT Administrators
   - references: https://learn.microsoft.com/en-us/entra/identity/enterprise-apps/configure-admin-consent-workflow, https://learn.microsoft.com/en-us/entra/identity/enterprise-apps/manage-app-consent-policies

User Experience Disruption
Changes in authentication methods may lead to confusion among users who are accustomed to legacy methods, resulting in a negative user experience and potential productivity loss.
   - roles: End Users, Support Staff
   - references: https://go.microsoft.com/fwlink/p/?linkid=2324703, https://learn.microsoft.com/en-us/entra/identity/enterprise-apps/manage-app-consent-policies

Documentation and Training Needs
The need to update internal documentation and train staff on new processes may lead to temporary inefficiencies and knowledge gaps during the transition period.
   - roles: IT Administrators, Training Coordinators
   - references: https://learn.microsoft.com/en-us/entra/identity/enterprise-apps/configure-admin-consent-workflow, https://learn.microsoft.com/en-us/powershell/module/microsoft.online.sharepoint.powershell/set-spotenant?view=sharepoint-ps#-legacybrowserauthprotocolsenabled

Configutation Options**

XXXXXXX ... paid membership only

Opportunities**

Enhanced Security Awareness Training
With the implementation of secure by default settings, there is an opportunity to enhance security awareness training for employees. This can help users understand the importance of avoiding legacy authentication and the risks associated with third-party app access, fostering a security-first culture.
   - next-steps: Develop a training program that focuses on the new security settings, emphasizing the importance of secure practices and how to request admin consent for third-party apps.
   - roles: IT Security Team, HR Training Department, All Employees
   - references: https://www.csoonline.com/article/3537933/why-security-awareness-training-is-more-important-than-ever.html, https://www.sans.org/security-awareness-training/

Streamlined Admin Consent Workflow
By configuring the Admin Consent workflow effectively, organizations can streamline the process for users requesting access to third-party applications, improving user experience while maintaining security protocols.
   - next-steps: Implement the admin consent workflow as outlined in the Microsoft documentation, and ensure it is communicated clearly to users on how to request app access.
   - roles: IT Administrators, Application Owners, Security Teams
   - references: https://learn.microsoft.com/en-us/entra/identity/enterprise-apps/configure-admin-consent-workflow, https://www.microsoft.com/en-us/security/blog/2020/09/29/understanding-the-admin-consent-workflow-in-azure-active-directory/

Regular Security Audits and Compliance Checks
The changes to Microsoft 365 settings provide a good opportunity to implement regular security audits and compliance checks to ensure that the organization adheres to the new security protocols and identifies any vulnerabilities.
   - next-steps: Establish a schedule for conducting security audits and compliance checks focusing on the new settings, and assign responsibilities to relevant team members.
   - roles: Compliance Officers, IT Security Team, IT Administrators
   - references: https://www.csoonline.com/article/3537933/the-importance-of-security-audits.html, https://www.nist.gov/cyberframework

Potentional Risks**

XXXXXXX ... paid membership only

IT Security**

XXXXXXX ... paid membership only

explanation for non-techies**

XXXXXXX ... free basic plan only

** AI generated content. This information must be reviewed before use.

a free basic plan is required to see more details. Sign up here


A cloudsocut.one plan is required to see all the changed details. If you are already a customer, choose login.
If you are new to cloudscout.one please choose a plan.



change history

DatePropertyoldnew
2025-07-19MC MessagesAs part of the Microsoft Secure Future Initiative (SFI) and in alignment with the "Secure by Default" principle, we are updating default settings in Microsoft 365 to help you meet the minimum security benchmark and harden your tenant's security posture. These changes target legacy authentication protocols and app access permissions that may expose organizations to unnecessary risk.
This is the first step in a broader effort to evaluate and evolve Microsoft 365 defaults through the lens of security best practices.
[When this will happen:]
These changes will begin rolling out in mid-July 2025 and are expected to complete by August 2025.
Updated July 18, 2025: We have updated the content. Thank you for your patience.
As part of the Microsoft Secure Future Initiative (SFI) and in alignment with the "Secure by Default" principle, we are updating default settings in Microsoft 365 to help you meet the minimum security benchmark and harden your tenant's security posture. These changes target legacy authentication protocols and app access permissions that may expose organizations to unnecessary risk.
This is the first step in a broader effort to evaluate and evolve Microsoft 365 defaults through the lens of security best practices.
[When this will happen:]
These changes will begin rolling out in mid-July 2025 and are expected to complete by August 2025.
2025-07-19MC TitleMicrosoft 365 Upcoming Secure by Default Settings Changes(Updated) Microsoft 365 Upcoming Secure by Default Settings Changes
2025-07-19MC Last Updated06/18/2025 21:08:092025-07-18T20:30:25Z
2025-07-19MC MessageTagNamesFeature update, User impact, Admin impactUpdated message, Feature update, User impact, Admin impact
2025-07-19MC prepareWe recommend the following actions:
Assess current configurations: As applicable, identify current configurations for RPS or FPRPC protocols.
Notify stakeholders: Inform IT admins, app owners, and security teams about the upcoming changes.
Update documentation: Ensure internal guidance reflects the new defaults and admin consent process.
Configure Admin Consent workflow: If third party apps access is applicable for your organization, learn how to set up the workflow: Configuring admin consent workflow.
Additional considerations
Does the change alter how existing customer data is processed, stored, or accessed? Yes - it blocks access to content via legacy authentication protocols.
https://aka.ms/entra-app-access
https://go.microsoft.com/fwlink/p/?linkid=2324508
https://go.microsoft.com/fwlink/p/?linkid=2324509
https://go.microsoft.com/fwlink/p/?linkid=2324703
https://learn.microsoft.com/en-us/entra/identity/enterprise-apps/configure-admin-consent-workflow
https://learn.microsoft.com/en-us/entra/identity/enterprise-apps/manage-app-consent-policies
https://learn.microsoft.com/en-us/powershell/module/sharepoint-online/set-spotenant?view=sharepoint-ps#-legacybrowserauthprotocolsenabled
https://learn.microsoft.com/powershell/module/sharepoint-online/set-spotenant?view=sharepoint-ps
We recommend the following actions:
Assess current configurations: As applicable, identify current configurations for RPS or FPRPC protocols.
Notify stakeholders: Inform IT admins, app owners, and security teams about the upcoming changes.
Update documentation: Ensure internal guidance reflects the new defaults and admin consent process.
Configure Admin Consent workflow: If third party apps access is applicable for your organization, learn how to set up the workflow: Configuring admin consent workflow.
Additional considerations
Does the change alter how existing customer data is processed, stored, or accessed? Yes - it blocks access to content via legacy authentication protocols.
https://aka.ms/entra-app-access
https://go.microsoft.com/fwlink/p/?linkid=2324509
https://go.microsoft.com/fwlink/p/?linkid=2324703
https://learn.microsoft.com/en-us/entra/identity/enterprise-apps/configure-admin-consent-workflow
https://learn.microsoft.com/en-us/entra/identity/enterprise-apps/manage-app-consent-policies
https://learn.microsoft.com/en-us/powershell/module/microsoft.online.sharepoint.powershell/set-spotenant?view=sharepoint-ps#-legacybrowserauthprotocolsenabled
https://learn.microsoft.com/en-us/powershell/module/sharepoint-online/set-spotenant?view=sharepoint-ps#-legacybrowserauthprotocolsenabled
https://learn.microsoft.com/powershell/module/sharepoint-online/set-spotenant?view=sharepoint-ps
2025-06-19MC prepareWe recommend the following actions:
Assess current configurations: As applicable, identify current configurations for RPS or FPRPC protocols and review third-party apps that access SharePoint and OneDrive content.
Notify stakeholders: Inform IT admins, app owners, and security teams about the upcoming changes.
Update documentation: Ensure internal guidance reflects the new defaults and admin consent process.
Configure Admin Consent workflow: If third party apps access is applicable for your organization, learn how to set up the workflow: Configuring admin consent workflow.
Additional considerations
Does the change alter how existing customer data is processed, stored, or accessed? Yes - it blocks access to content via legacy authentication protocols.
https://aka.ms/AppConsentLearn
https://aka.ms/entra-app-access
https://go.microsoft.com/fwlink/p/?linkid=2324508
https://go.microsoft.com/fwlink/p/?linkid=2324509
https://go.microsoft.com/fwlink/p/?linkid=2324703
https://learn.microsoft.com/en-us/defender-endpoint/web-content-filtering
https://learn.microsoft.com/en-us/entra/identity/enterprise-apps/configure-admin-consent-workflow
https://learn.microsoft.com/en-us/entra/identity/enterprise-apps/manage-app-consent-policies
https://learn.microsoft.com/powershell/module/sharepoint-online/set-spotenant?view=sharepoint-ps
We recommend the following actions:
Assess current configurations: As applicable, identify current configurations for RPS or FPRPC protocols.
Notify stakeholders: Inform IT admins, app owners, and security teams about the upcoming changes.
Update documentation: Ensure internal guidance reflects the new defaults and admin consent process.
Configure Admin Consent workflow: If third party apps access is applicable for your organization, learn how to set up the workflow: Configuring admin consent workflow.
Additional considerations
Does the change alter how existing customer data is processed, stored, or accessed? Yes - it blocks access to content via legacy authentication protocols.
https://aka.ms/entra-app-access
https://go.microsoft.com/fwlink/p/?linkid=2324508
https://go.microsoft.com/fwlink/p/?linkid=2324509
https://go.microsoft.com/fwlink/p/?linkid=2324703
https://learn.microsoft.com/en-us/entra/identity/enterprise-apps/configure-admin-consent-workflow
https://learn.microsoft.com/en-us/entra/identity/enterprise-apps/manage-app-consent-policies
https://learn.microsoft.com/en-us/powershell/module/sharepoint-online/set-spotenant?view=sharepoint-ps#-legacybrowserauthprotocolsenabled
https://learn.microsoft.com/powershell/module/sharepoint-online/set-spotenant?view=sharepoint-ps
2025-06-19MC How AffectThe following settings will be updated:
SettingsImpact
Block legacy browser authentication to SharePoint and OneDrive using RPS (Relying Party Suite)Legacy authentication protocols like RPS (Relying Party Suite) are vulnerable to brute-force and phishing attacks due to non-modern authentication. Blocking this prevents applications that are using outdated methods from accessing SharePoint and OneDrive via browser. To use PowerShell to block legacy browser authentication, see Set-SPOTenant.
Block FPRPC (FrontPage Remote Procedure Call) protocol for Office file opensFrontPage Remote Procedure Call (FPRPC) is a legacy protocol used for remote web page authoring. While no longer widely used, Legacy protocols such as FPRPC can be more susceptible to compromise and blocking FPRPC helps reduce exposure to vulnerabilities. With this change, FPRPC will be blocked for opening files, preventing the use of this non-modern protocol in Microsoft 365 clients. To learn how to block the FPRPC protocol, see turn on web content filtering.
Require admin consent for third-party apps accessing files and sitesUsers allowing third-party apps to access file and site content can lead to overexposure of an organization's content. Requiring admins to consent to this access can help reduce overexposure. With this change, Microsoft managed App Consent Policies will be enabled, and users will be unable to consent to third party applications accessing their files and sites by default. Instead, they can request administrators to consent on their behalf. To configure admin consent, follow instructions here: configuring the Admin Consent workflow. Customers who have already blocked user consent or applied custom user consent settings will not be affected by this change.
Admins can also configure granular app access policies, such as limiting user access to the application for specific users or groups. Learn more here.


These changes are on by default and apply to all Microsoft 365 tenants. No additional licensing is required.
The following settings will be updated:
SettingsImpact
Block legacy browser authentication to SharePoint and OneDrive using RPS (Relying Party Suite)Legacy authentication protocols like RPS (Relying Party Suite) are vulnerable to brute-force and phishing attacks due to non-modern authentication. Blocking this prevents applications that are using outdated methods from accessing SharePoint and OneDrive via browser. To use PowerShell to block legacy browser authentication, see Set-SPOTenant.
Block FPRPC (FrontPage Remote Procedure Call) protocol for Office file opensFrontPage Remote Procedure Call (FPRPC) is a legacy protocol used for remote web page authoring. While no longer widely used, Legacy protocols such as FPRPC can be more susceptible to compromise and blocking FPRPC helps reduce exposure to vulnerabilities. With this change, FPRPC will be blocked for opening files, preventing the use of this non-modern protocol in Microsoft 365 clients. To learn how to block the FPRPC protocol, see turn on web content filtering.
Require admin consent for third-party apps accessing files and sitesUsers allowing third-party apps to access file and site content can lead to overexposure of an organization's content. Requiring admins to consent to this access can help reduce overexposure. With this change, Microsoft managed App Consent Policies will be enabled, and users will be unable to consent to third party applications accessing their files and sites by default. Instead, they can request administrators to consent on their behalf. To configure admin consent, follow instructions here: Configuring the Admin Consent workflow. Customers who have already blocked user consent, turned on our previously recommended consent settings, or applied custom user consent settings will not be affected by this change.
Admins can also configure granular app access policies, such as limiting user access to the application for specific users or groups. Learn more here.


These changes are on by default and apply to all Microsoft 365 tenants. No additional licensing is required.
2025-06-19MC Last Updated06/18/2025 08:14:422025-06-18T21:08:09Z
2025-06-18MC Last Updated06/18/2025 01:24:212025-06-18T08:14:42Z

Last updated 1 month ago ago

Leave a Reply

Share to MS Teams

Login to your account

Welcome Back, We Missed You!