Microsoft Teams Enables Security Defaults on January 12
Tenants using default settings will get automatic protection against weaponizable file types and malicious URLs. Administrators who want to opt out must act before the rollout.
Starting January 12, 2026, Microsoft Teams will automatically enable three security features for organizations that haven't changed their default messaging settings. The update blocks potentially dangerous file attachments, warns users about suspicious links, and adds a way to report false positives when legitimate content gets flagged.
Organizations that previously customized their Teams messaging safety settings won't see any changes. This rollout targets tenants still running with Microsoft's original defaults.
What's Changing
The update activates three features simultaneously:
Weaponizable File Type Protection
Teams will block messages containing file types commonly used in malware attacks. When someone tries to send a dangerous attachment, the entire message—including any text—gets blocked. Senders see a notification explaining why their message was rejected and can edit to remove the problematic file.
The blocked file extensions include executables, scripts, and archive formats attackers frequently weaponize:
Executables: exe, dll, com, scr, pif, msi, msp, mst, msix, appx, app, apk, deb
Scripts: bat, cmd, vbs, vbe, vb, wsc, wsf, wsh, ps1, hta, jnlp
Archives and disk images: iso, img, cab, arj, lha, lzh, ace
Other dangerous types: lnk (shortcuts), reg (registry files), lib, library, sys, ani, elf, macho, kext, dex
The full list covers dozens of extensions security teams have flagged as common attack vectors. Most organizations won't miss these file types in legitimate business communication.
Malicious URL Detection
Links shared in Teams messages will be scanned against known phishing sites and malicious domains. When Teams detects a suspicious URL, it displays a warning label before users can click through.
This builds on Microsoft's existing Safe Links infrastructure but applies specifically to Teams chat and channel messages. The scanning happens in real-time, meaning newly identified threats get caught even in ongoing conversations.
False Positive Reporting
To prevent the security features from blocking legitimate content too aggressively, Microsoft added a feedback mechanism. Users can report when they believe a file or link was incorrectly flagged. These reports feed into Microsoft's detection algorithms to reduce future false positives.
Why Microsoft Made This Change
Teams has become a primary communication channel for many organizations, and attackers have noticed. Phishing campaigns increasingly target Teams messages because employees often trust content from colleagues more than email from external senders.
Weaponizable file attachments in Teams bypass email security controls entirely. An attacker who compromises one account can spread malware directly to that user's contacts without triggering email-based detection. Enabling these protections by default closes a gap that security-conscious organizations had to configure manually.
Who Is Affected
The January 12 rollout applies to tenants meeting both conditions:
- Using default messaging safety configuration
- Haven't previously modified settings in Teams admin center
Organizations that previously enabled, disabled, or customized any messaging safety options will see no changes. Microsoft preserves existing configurations.
What Administrators Should Do
If you want the new defaults: No action required. The features will activate automatically.
If you want to opt out: Navigate to Teams admin center > Messaging > Messaging settings > Messaging safety. Review the three options and disable any you don't want. Save your changes before January 12.
If you're unsure of your current settings: Check Teams admin center now. If the settings show as "Off" and you haven't touched them, you're running defaults and will receive the update.
Microsoft recommends administrators also prepare helpdesk staff. Users encountering blocked messages or URL warnings for the first time may need guidance on why content was flagged and how to proceed with legitimate files.
Security Team Considerations
The new defaults provide baseline protection but aren't a complete solution. Security teams should:
- Review blocked file type list - Determine if any blocked extensions are legitimately used in your organization
- Configure exceptions if needed - Add approved file types through Teams admin settings
- Monitor false positive reports - Watch for patterns indicating overly aggressive blocking
- Update user training - Explain the new warnings and what they mean
- Integrate with existing DLP - Ensure Teams protections complement your broader data loss prevention strategy
The weaponizable file blocking is particularly useful for preventing lateral movement after initial compromise. An attacker who gains access to one user's Teams account can't easily spread malware to contacts if those file types are blocked by default.
Related Coverage
This update follows Microsoft's broader push to make security features opt-out rather than opt-in. The Tycoon2FA campaign we covered recently demonstrated how attackers exploit Microsoft services—making default protections increasingly important for organizations that don't have dedicated security staff to configure optimal settings.
Related Articles
Microsoft: Tycoon2FA Phishing Exploits Email Misconfigurations
Threat actors spoof organization domains by abusing complex mail routing and weak DMARC policies. Microsoft blocked 13 million malicious emails in October alone.
Jan 7, 2026ServiceNow Acquires Armis for $7.75 Billion in Largest Security Deal of 2025
AI workflow giant expands into connected device security. Deal expected to close in late 2026 pending regulatory review.
Dec 30, 2025CISA's Pre-Ransomware Warning Program Loses Its Only Operator
David Stern, the sole employee running CISA's ransomware early warning initiative, resigned December 19 after being ordered to relocate. The program had sent 2,100+ alerts in 2024.
Dec 24, 2025Google Cloud Feature Weaponized in 9,000-Email Phishing Wave
Attackers abuse Google Cloud Application Integration to send phishing emails that bypass SPF, DKIM, and DMARC, targeting 3,200 organizations globally.
Jan 3, 2026