check before: 2025-07-01
Product:
Entra, Microsoft 365 Apps, Microsoft 365 suite, Teams, Windows
Platform:
Android, iOS, Mac, Online, US Instances, Web, Windows Desktop, World tenant
Status:
Launched
Change type:
New feature, User impact, Admin impact
Links:
Details:
Summary:
Microsoft 365 apps will block insecure file open protocols like FPRPC by default starting version 2508, with new Trust Center settings to manage these protocols. Admins can control settings via Group Policy or Cloud Policy service. Changes apply only to Microsoft 365 apps for Windows, not Teams.
Details:
Introduction
To help protect users from legacy protocol vulnerabilities, we're introducing new Trust Center settings in Microsoft 365 apps that block file opens using insecure protocols by default. These changes enhance security by reducing exposure to outdated technologies like FrontPage Remote Procedure Call (FPRPC), FTP, and HTTP.
This message is associated with Microsoft 365 Roadmap ID 497299.
When this will happen
Public Preview (Worldwide): We began rolling out in late July 2025 and expect to complete by late August 2025.
General Availability (Worldwide, GCC, GCC High, and DoD): We will begin rolling out in late August 2025 and expect to complete by late September 2025.
Change Category:
XXXXXXX ... free basic plan only
Scope:
XXXXXXX ... free basic plan only
Release Phase:
General Availability, Preview
Created:
2025-08-07
updated:
2025-08-07
Public Preview Start Date
XXXXXXX ... free basic plan only
Task Type
XXXXXXX ... free basic plan only
Docu to Check
XXXXXXX ... free basic plan only
MS How does it affect me
XXXXXXX ... free basic plan only
MS Preperations
XXXXXXX ... free basic plan only
MS Urgency
XXXXXXX ... free basic plan only
MS workload name
XXXXXXX ... free basic plan only
linked item details
XXXXXXX ... free basic plan only
summary for non-techies**
XXXXXXX ... free basic plan only
Direct effects for Operations**
Blocking of Insecure Protocols
Users may experience issues opening files that rely on the FPRPC protocol, leading to potential disruptions in workflow and productivity.
- roles: End Users, IT Administrators
- references: https://www.microsoft.com/microsoft-365/roadmap?filters=&searchterms=497299
Trust Center Settings Management
If Trust Center settings are centrally managed, users may not have the ability to adjust their file open protocols, leading to confusion and frustration.
- roles: End Users, IT Administrators
- references: https://www.microsoft.com/microsoft-365/roadmap?filters=&searchterms=497299
Increased Support Requests
The change may lead to an increase in support requests from users who are unable to open files as expected, impacting IT support resources.
- roles: IT Support Staff, End Users
- references: https://www.microsoft.com/microsoft-365/roadmap?filters=&searchterms=497299
Training and Communication Needs
Users will require training and communication regarding the new settings and their implications, which may not be adequately prepared for, leading to user dissatisfaction.
- roles: End Users, Training Coordinators
- references: https://www.microsoft.com/microsoft-365/roadmap?filters=&searchterms=497299
Compatibility Issues with Legacy Systems
Blocking of legacy protocols may cause compatibility issues with older systems or applications that rely on these protocols, disrupting business processes.
- roles: End Users, Application Managers
- references: https://www.microsoft.com/microsoft-365/roadmap?filters=&searchterms=497299
Configutation Options**
XXXXXXX ... paid membership only
Opportunities**
Enhanced Security Management
With the introduction of new Trust Center settings, admins can better manage and control file open protocols, enhancing overall security posture. By blocking insecure protocols by default, the risk of exploitation from legacy technologies is reduced, leading to a more secure IT environment.
- next-steps: Review current Group Policy settings and assess the need for adjustments to align with the new Trust Center settings. Implement training for admins on how to manage these settings effectively.
- roles: IT Security Managers, System Administrators, Compliance Officers
- references: https://www.microsoft.com/microsoft-365/roadmap?filters=&searchterms=497299
User Training and Awareness
Informing users about the changes in file opening protocols and how it affects their workflow will improve user experience and reduce confusion. Training can help users adapt to the new settings and understand the importance of these security measures.
- next-steps: Develop and distribute training materials explaining the changes, how to navigate the new Trust Center settings, and the implications of blocking insecure protocols.
- roles: Training Coordinators, IT Support Staff, User Experience Designers
- references: https://www.microsoft.com/microsoft-365/roadmap?filters=&searchterms=497299
Streamlined IT Operations
Centralized management of file open protocols through Cloud Policy service (CPS) or Group Policy can lead to more efficient IT operations. This allows for consistent application of security policies across the organization, reducing the administrative burden on IT teams.
- next-steps: Evaluate the current use of CPS and Group Policy in managing protocols. Identify any gaps in policy application and create a plan to streamline protocol management across the organization.
- roles: IT Operations Managers, System Administrators, Network Engineers
- references: https://www.microsoft.com/microsoft-365/roadmap?filters=&searchterms=497299
Potentional Risks**
XXXXXXX ... paid membership only
IT Security**
XXXXXXX ... paid membership only
explanation for non-techies**
XXXXXXX ... free basic plan only
** AI generated content. This information must be reviewed before use.
a free basic plan is required to see more details. Sign up here
A cloudsocut.one plan is required to see all the changed details. If you are already a customer, choose login.
If you are new to cloudscout.one please choose a plan.
Last updated 2 days ago ago