*For this entry exists the more relevant or more recent entry MC1150984

check before: 2025-09-01

Product:

Defender, Entra, Microsoft 365 admin center, Teams, Windows

Platform:

Android, iOS, Mac, Online, Web, Windows Desktop, World tenant

Status:

Feature Rollout Status Not Supported

Change type:

Admin impact, New feature, Updated message, User impact

Details:

Summary:
Microsoft Teams will complete rollout of Malicious URL Protection by November 2025, warning users about harmful links in chats and channels. The feature will be off by default during Targeted Release and on by default at General Availability. Admins can enable or configure it via Teams Admin Center or PowerShell.

Details:
Updated November 17, 2025: The rollout of Malicious URL Protection in Microsoft Teams is expected to finish before the end of November 2025 for General Availability (Worldwide). The previously announced update to make Malicious URL protection setting in Messaging settings ON by default has been postponed to early 2026. A separate communication will be issued detailing the roll out schedule for the default-on change in advance.

Thank you for your patience.
Introduction
Microsoft Teams is introducing enhanced protection against phishing attacks by detecting and warning users about malicious URLs shared in Teams chats and channels. This feature helps users make safer decisions before clicking potentially harmful links. This message applies to Teams for Windows desktop, Teams for Mac desktop, Teams for the web, and Teams for iOS/Android.
This message is associated with Roadmap ID 499893.
When this will happen
Targeted Release (Worldwide): Rollout begins early September 2025 and is expected to complete by mid-September 2025.
General Availability (Worldwide): Rollout begins early November 2025 and is expected to complete by end of November 2025 (previously mid-November).

Change Category:
XXXXXXX ... free basic plan only

Scope:
XXXXXXX ... free basic plan only

Release Phase:
Standard Release

Created:
2025-09-06

updated:
2025-11-18

Task Type

XXXXXXX ... free basic plan only

Docu to Check

XXXXXXX ... free basic plan only

MS How does it affect me

XXXXXXX ... free basic plan only

MS Preperations

XXXXXXX ... free basic plan only

MS Urgency

XXXXXXX ... free basic plan only

MS workload name

XXXXXXX ... free basic plan only

linked item details

XXXXXXX ... free basic plan only

Pictures

XXXXXXX ... free basic plan only

summary for non-techies**

XXXXXXX ... free basic plan only

Direct effects for Operations**

Please, look at the most relevant linked item for details

explanation for non-techies**

XXXXXXX ... free basic plan only

** AI generated content. This information must be reviewed before use.

a free basic plan is required to see more details. Sign up here


A cloudsocut.one plan is required to see all the changed details. If you are already a customer, choose login.
If you are new to cloudscout.one please choose a plan.



change history

DatePropertyoldnew
2025-11-18MC MessagesUpdated October 30, 2025: We have added a reminder message to the bottom of this post. Thank you for your patience.
Introduction
Microsoft Teams is introducing enhanced protection against phishing attacks by detecting and warning users about malicious URLs shared in Teams chats and channels. This feature helps users make safer decisions before clicking potentially harmful links. This message applies to Teams for Windows desktop, Teams for Mac desktop, Teams for the web, and Teams for iOS/Android.
This message is associated with Roadmap ID 499893.
When this will happen
Targeted Release (Worldwide): Rollout begins early September 2025 and is expected to complete by mid-September 2025.
General Availability (Worldwide): Rollout begins early November 2025 and is expected to complete by mid-November 2025.
Updated November 17, 2025: The rollout of Malicious URL Protection in Microsoft Teams is expected to finish before the end of November 2025 for General Availability (Worldwide). The previously announced update to make Malicious URL protection setting in Messaging settings ON by default has been postponed to early 2026. A separate communication will be issued detailing the roll out schedule for the default-on change in advance.

Thank you for your patience.
Introduction
Microsoft Teams is introducing enhanced protection against phishing attacks by detecting and warning users about malicious URLs shared in Teams chats and channels. This feature helps users make safer decisions before clicking potentially harmful links. This message applies to Teams for Windows desktop, Teams for Mac desktop, Teams for the web, and Teams for iOS/Android.
This message is associated with Roadmap ID 499893.
When this will happen
Targeted Release (Worldwide): Rollout begins early September 2025 and is expected to complete by mid-September 2025.
General Availability (Worldwide): Rollout begins early November 2025 and is expected to complete by end of November 2025 (previously mid-November).
2025-11-18MC How AffectWhen a malicious link is detected, Teams will automatically display a warning to both the sender and recipient. This helps reduce the risk of phishing attacks.
Targeted Release: Link protection is applied only when all participants in the conversation have the feature enabled.
General Availability: Link protection is enforced if at least one participant in the conversation has the feature enabled.
Targeted release vs. General Availability behavior:
Targeted release: Link protection is applied only when all organizations in the conversation have the feature enabled. This feature is off by default and requires admin activation.
General Availability: Link protection is applied if at least one participant has the feature enabled. This feature is on by default. Admin settings saved during Targeted Release will remain unchanged.
What you can do to prepare
During Public Preview, administrators must manually enable the feature:
Go to the Teams Admin Center
Navigate to Messaging Settings
Enable the setting: Scan messages for unsafe URLs

This setting is also available via Set-CsTeamsMessagingConfiguration PowerShell cmdlet -UrlReputationCheck parameter.
No action is required once the feature reaches General Availability, as it will be turned on by default.
Learn more: Malicious URL Protection in Microsoft Teams
Compliance considerations
Compliance AreaExplanation
Does the change introduce or significantly modify AI/ML or agent capabilities that interact with or provide access to customer data?URL scanning uses reputation-based detection algorithms to identify malicious links. This involves scanning user messages and performing reputation lookups against Microsoft Defender for Office's managed collection.

Does the change include an admin control that can be scoped using Entra ID group membership?Admins can enable or disable the feature via Teams Admin Center or PowerShell. However, scoping via Entra ID group membership is not supported.

Reminder:
General Availability begins November 3 and will take 2-3 weeks to complete. At GA, "Scan messages for unsafe URLs" will default to ON as previously mentioned, and link protection will apply if any participant in a conversation has it enabled.
To use a different setting, go to Teams admin center → Messaging settings → Scan messages for unsafe URLs, select your preference, and click Save before GA.


Note: Simply viewing the page without saving will not override the default, but settings already saved during Targeted Release will persist.
When a malicious link is detected, Teams will automatically display a warning to both the sender and recipient. This helps reduce the risk of phishing attacks.
Targeted Release: Link protection is applied only when all participants in the conversation have the feature enabled.
General Availability: Link protection is enforced if at least one participant in the conversation has the feature enabled.
Targeted release vs. General Availability behavior:
Targeted release: Link protection is applied only when all organizations in the conversation have the feature enabled. This feature is off by default and requires admin activation.
General Availability: Link protection is applied if at least one participant has the feature enabled. This feature is on by default. Admin settings saved during Targeted Release will remain unchanged.
What you can do to prepare
During Public Preview, administrators must manually enable the feature:
Go to the Teams Admin Center
Navigate to Messaging Settings
Enable the setting: Scan messages for unsafe URLs

This setting is also available via Set-CsTeamsMessagingConfiguration PowerShell cmdlet -UrlReputationCheck parameter.
No action is required once the feature reaches General Availability, as it will be turned on by default.
Learn more: Malicious URL Protection in Microsoft Teams
Compliance considerations
Compliance AreaExplanation
Does the change introduce or significantly modify AI/ML or agent capabilities that interact with or provide access to customer data?URL scanning uses reputation-based detection algorithms to identify malicious links. This involves scanning user messages and performing reputation lookups against Microsoft Defender for Office's managed collection.

Does the change include an admin control that can be scoped using Entra ID group membership?Admins can enable or disable the feature via Teams Admin Center or PowerShell. However, scoping via Entra ID group membership is not supported.

Reminder:
General Availability begins November 3 and complete by end of November. At GA, "Scan messages for unsafe URLs" will default to ON as previously mentioned, and link protection will apply if any participant in a conversation has it enabled.
To use a different setting, go to Teams admin center → Messaging settings → Scan messages for unsafe URLs, select your preference, and click Save before GA.


Note: Simply viewing the page without saving will not override the default, but settings already saved during Targeted Release will persist.
2025-11-18MC Last Updated10/30/2025 18:51:562025-11-17T18:10:55Z
2025-11-18MC End Time12/16/2025 09:00:002025-12-31T09:00:00Z
2025-11-18MC SummaryMicrosoft Teams will introduce malicious URL protection in chats and channels, warning users about harmful links. Rolling out from September to November 2025, it requires admin activation during preview and will be on by default at general availability. Admins can configure settings via Teams Admin Center or PowerShell.Microsoft Teams will complete rollout of Malicious URL Protection by November 2025, warning users about harmful links in chats and channels. The feature will be off by default during Targeted Release and on by default at General Availability. Admins can enable or configure it via Teams Admin Center or PowerShell.
2025-10-30MC MessagesUpdated September 9, 2025: We have updated the content. Thank you for your patience.
Introduction
Microsoft Teams is introducing enhanced protection against phishing attacks by detecting and warning users about malicious URLs shared in Teams chats and channels. This feature helps users make safer decisions before clicking potentially harmful links. This message applies to Teams for Windows desktop, Teams for Mac desktop, Teams for the web, and Teams for iOS/Android.
This message is associated with Roadmap ID 499893.
When this will happen
Targeted Release (Worldwide): Rollout begins early September 2025 and is expected to complete by mid-September 2025.
General Availability (Worldwide): Rollout begins early November 2025 and is expected to complete by mid-November 2025.
Updated October 30, 2025: We have added a reminder message to the bottom of this post. Thank you for your patience.
Introduction
Microsoft Teams is introducing enhanced protection against phishing attacks by detecting and warning users about malicious URLs shared in Teams chats and channels. This feature helps users make safer decisions before clicking potentially harmful links. This message applies to Teams for Windows desktop, Teams for Mac desktop, Teams for the web, and Teams for iOS/Android.
This message is associated with Roadmap ID 499893.
When this will happen
Targeted Release (Worldwide): Rollout begins early September 2025 and is expected to complete by mid-September 2025.
General Availability (Worldwide): Rollout begins early November 2025 and is expected to complete by mid-November 2025.
2025-10-30MC How AffectWhen a malicious link is detected, Teams will automatically display a warning to both the sender and recipient. This helps reduce the risk of phishing attacks.
Targeted Release: Link protection is applied only when all participants in the conversation have the feature enabled.
General Availability: Link protection is enforced if at least one participant in the conversation has the feature enabled.
Targeted release vs. General Availability behavior:
Targeted release: Link protection is applied only when all organizations in the conversation have the feature enabled. This feature is off by default and requires admin activation.
General Availability: Link protection is applied if at least one participant has the feature enabled. This feature is on by default. Admin settings saved during Targeted Release will remain unchanged.
What you can do to prepare
During Public Preview, administrators must manually enable the feature:
Go to the Teams Admin Center
Navigate to Messaging Settings
Enable the setting: Scan messages for unsafe URLs

This setting is also available via Set-CsTeamsMessagingConfiguration PowerShell cmdlet -UrlReputationCheck parameter.
No action is required once the feature reaches General Availability, as it will be turned on by default.
Learn more: Malicious URL Protection in Microsoft Teams
Compliance considerations
Compliance AreaExplanation
Does the change introduce or significantly modify AI/ML or agent capabilities that interact with or provide access to customer data?URL scanning uses reputation-based detection algorithms to identify malicious links. This involves scanning user messages and performing reputation lookups against Microsoft Defender for Office's managed collection.

Does the change include an admin control that can be scoped using Entra ID group membership?Admins can enable or disable the feature via Teams Admin Center or PowerShell. However, scoping via Entra ID group membership is not supported.
When a malicious link is detected, Teams will automatically display a warning to both the sender and recipient. This helps reduce the risk of phishing attacks.
Targeted Release: Link protection is applied only when all participants in the conversation have the feature enabled.
General Availability: Link protection is enforced if at least one participant in the conversation has the feature enabled.
Targeted release vs. General Availability behavior:
Targeted release: Link protection is applied only when all organizations in the conversation have the feature enabled. This feature is off by default and requires admin activation.
General Availability: Link protection is applied if at least one participant has the feature enabled. This feature is on by default. Admin settings saved during Targeted Release will remain unchanged.
What you can do to prepare
During Public Preview, administrators must manually enable the feature:
Go to the Teams Admin Center
Navigate to Messaging Settings
Enable the setting: Scan messages for unsafe URLs

This setting is also available via Set-CsTeamsMessagingConfiguration PowerShell cmdlet -UrlReputationCheck parameter.
No action is required once the feature reaches General Availability, as it will be turned on by default.
Learn more: Malicious URL Protection in Microsoft Teams
Compliance considerations
Compliance AreaExplanation
Does the change introduce or significantly modify AI/ML or agent capabilities that interact with or provide access to customer data?URL scanning uses reputation-based detection algorithms to identify malicious links. This involves scanning user messages and performing reputation lookups against Microsoft Defender for Office's managed collection.

Does the change include an admin control that can be scoped using Entra ID group membership?Admins can enable or disable the feature via Teams Admin Center or PowerShell. However, scoping via Entra ID group membership is not supported.

Reminder:
General Availability begins November 3 and will take 2-3 weeks to complete. At GA, "Scan messages for unsafe URLs" will default to ON as previously mentioned, and link protection will apply if any participant in a conversation has it enabled.
To use a different setting, go to Teams admin center → Messaging settings → Scan messages for unsafe URLs, select your preference, and click Save before GA.


Note: Simply viewing the page without saving will not override the default, but settings already saved during Targeted Release will persist.
2025-10-30MC Last Updated09/09/2025 17:11:152025-10-30T18:51:56Z
2025-10-30MC SummaryMicrosoft Teams will roll out malicious URL protection in chats and channels starting September 2025, warning users of phishing links. The feature requires admin activation during preview and will be on by default at general availability in November 2025. It uses reputation-based scanning via Microsoft Defender.Microsoft Teams will introduce malicious URL protection in chats and channels, warning users about harmful links. Rolling out from September to November 2025, it requires admin activation during preview and will be on by default at general availability. Admins can configure settings via Teams Admin Center or PowerShell.
2025-10-16MC Feature RingStandard Release, Targeted ReleaseStandard Release
2025-09-11MC Feature RingTargeted ReleaseStandard Release, Targeted Release
2025-09-10MC preparehttps://learn.microsoft.com/microsoftteams/weaponizable-file-protection-teams
https://learn.microsoft.com/powershell/module/microsoftteams/set-csteamsmessagingconfiguration?view=teams-ps#-urlreputationcheck
https://www.microsoft.com/microsoft-365/roadmap?filters=&searchterms=499893
https://learn.microsoft.com/microsoftteams/malicious-url-protection-teams
https://learn.microsoft.com/powershell/module/microsoftteams/set-csteamsmessagingconfiguration?view=teams-ps#-urlreputationcheck
https://www.microsoft.com/microsoft-365/roadmap?filters=&searchterms=499893
2025-09-10MC MessageTagNamesNew feature, User impact, Admin impactUpdated message, New feature, User impact, Admin impact
2025-09-10MC SummaryMicrosoft Teams will introduce malicious URL protection in chats and channels, warning users about phishing links. Rolling out from September to November 2025, the feature requires admin activation during preview and will be on by default at general availability. It scans URLs using Microsoft Defender reputation data.Microsoft Teams will roll out malicious URL protection in chats and channels starting September 2025, warning users of phishing links. The feature requires admin activation during preview and will be on by default at general availability in November 2025. It uses reputation-based scanning via Microsoft Defender.
2025-09-10MC Last Updated09/06/2025 00:03:172025-09-09T17:11:15Z
2025-09-10MC MessagesIntroduction
Microsoft Teams is introducing enhanced protection against phishing attacks by detecting and warning users about malicious URLs shared in Teams chats and channels. This feature helps users make safer decisions before clicking potentially harmful links. This message applies to Teams for Windows desktop, Teams for Mac desktop, Teams for the web, and Teams for iOS/Android.
This message is associated with Roadmap ID 499893.
When this will happen
Targeted Release (Worldwide): Rollout begins early September 2025 and is expected to complete by mid-September 2025.
General Availability (Worldwide): Rollout begins early November 2025 and is expected to complete by mid-November 2025.
Updated September 9, 2025: We have updated the content. Thank you for your patience.
Introduction
Microsoft Teams is introducing enhanced protection against phishing attacks by detecting and warning users about malicious URLs shared in Teams chats and channels. This feature helps users make safer decisions before clicking potentially harmful links. This message applies to Teams for Windows desktop, Teams for Mac desktop, Teams for the web, and Teams for iOS/Android.
This message is associated with Roadmap ID 499893.
When this will happen
Targeted Release (Worldwide): Rollout begins early September 2025 and is expected to complete by mid-September 2025.
General Availability (Worldwide): Rollout begins early November 2025 and is expected to complete by mid-November 2025.
2025-09-10MC TitleMicrosoft Teams: Malicious URL Protection for Teams Chat and Channels(Updated) Microsoft Teams: Malicious URL Protection for Teams Chat and Channels
2025-09-10MC How AffectWhen a malicious link is detected, Teams will automatically display a warning to both the sender and recipient. This helps reduce the risk of phishing attacks.
Targeted Release: Link protection is applied only when all participants in the conversation have the feature enabled.
General Availability: Link protection is enforced if at least one participant in the conversation has the feature enabled.
Targeted release vs. General Availability behavior:
Targeted release: Link protection is applied only when all organizations in the conversation have the feature enabled. This feature is off by default and requires admin activation.
General Availability: Link protection is applied if at least one participant has the feature enabled. This feature is on by default. Admin settings saved during Targeted Release will remain unchanged.
What you can do to prepare
During Public Preview, administrators must manually enable the feature:
Go to the Teams Admin Center
Navigate to Messaging Settings
Enable the setting: Scan messages for unsafe URLs

This setting is also available via Set-CsTeamsMessagingConfiguration PowerShell cmdlet -UrlReputationCheck parameter.
No action is required once the feature reaches General Availability, as it will be turned on by default.
Learn more: Weaponizable File Protection in Microsoft Teams
Compliance considerations
Compliance AreaExplanation
Does the change introduce or significantly modify AI/ML or agent capabilities that interact with or provide access to customer data?URL scanning uses reputation-based detection algorithms to identify malicious links. This involves scanning user messages and performing reputation lookups against Microsoft Defender for Office's managed collection.

Does the change include an admin control that can be scoped using Entra ID group membership?Admins can enable or disable the feature via Teams Admin Center or PowerShell. However, scoping via Entra ID group membership is not supported.
When a malicious link is detected, Teams will automatically display a warning to both the sender and recipient. This helps reduce the risk of phishing attacks.
Targeted Release: Link protection is applied only when all participants in the conversation have the feature enabled.
General Availability: Link protection is enforced if at least one participant in the conversation has the feature enabled.
Targeted release vs. General Availability behavior:
Targeted release: Link protection is applied only when all organizations in the conversation have the feature enabled. This feature is off by default and requires admin activation.
General Availability: Link protection is applied if at least one participant has the feature enabled. This feature is on by default. Admin settings saved during Targeted Release will remain unchanged.
What you can do to prepare
During Public Preview, administrators must manually enable the feature:
Go to the Teams Admin Center
Navigate to Messaging Settings
Enable the setting: Scan messages for unsafe URLs

This setting is also available via Set-CsTeamsMessagingConfiguration PowerShell cmdlet -UrlReputationCheck parameter.
No action is required once the feature reaches General Availability, as it will be turned on by default.
Learn more: Malicious URL Protection in Microsoft Teams
Compliance considerations
Compliance AreaExplanation
Does the change introduce or significantly modify AI/ML or agent capabilities that interact with or provide access to customer data?URL scanning uses reputation-based detection algorithms to identify malicious links. This involves scanning user messages and performing reputation lookups against Microsoft Defender for Office's managed collection.

Does the change include an admin control that can be scoped using Entra ID group membership?Admins can enable or disable the feature via Teams Admin Center or PowerShell. However, scoping via Entra ID group membership is not supported.
2025-09-08MC Feature RingTargeted Release

Last updated 3 weeks ago ago

Leave a Reply

Share to MS Teams

Login to your account

Welcome Back, We Missed You!