New Copilot Updates for Outlook Scheduling, Word Agent Mode, and PowerPoint Agent Mode

Microsoft has announced Copilot enhancements across Outlook, Word, and PowerPoint that improve scheduling, document creation, and presentation building. Here is a summary of some of the features I think can come in handy. Be aware that timelines may change as deployments progress, some of these have already been pushed back a couple of months. All of the following features requires a Microsoft 365 Copilot license, and will be enabled by default for users with such a license. Automatic rescheduling of 1:1 meetings Automatic rescheduling of flexible 1:1 meetings and personal events in Outlook with Copilot, helping users resolve conflicts with minimal manual effort is coming soon. This will be in addition to the already released auto rescheduling of meeting rooms. Originally this feature was planned for mid‑November 2025 to mid‑January 2026, but is now hopefully coming between to mid‑February 2026 and the end of February 2026. A Microsoft Copilot license is required to use the capability....

Teams updates to watch: malicious link warnings, blocked risky files, and a new private backroom chat

Microsoft has announced three Teams updates the past months. Two that strengthen security and one that will improve how organizers coordinate events: Malicious URL Protection, Weaponizable file type protection and Private chat for organizers, co‑organizers, and presenters. Please note that timelines can shift, so treat the dates as guidance rather than guarantees.

Malicious URL Protection (Roadmap ID 499893)

Microsoft has announced link‑scanning in Teams chats and channels that warns senders and recipients about unsafe URLs. The feature reached general availability rollout by the end of November 2025, while the separate change to make it ON by default, originally planned as part of that release, has been postponed to early 2026. 

If you don't want to wait for it to be on by default, or feel the need to configure it, you can do so in the Teams admins center: "Teams admin center → Messaging settings → Scan messages for unsafe URLs”. Or you can mange the configuration with PowerShell as described on Microsoft Learn (Set-CsTeamsMessagingConfiguration). 

Weaponizable file type protection (Roadmap ID 499892)

In the addition to the URL Protection, Microsoft has announced a pre‑delivery block for high‑risk (“weaponizable”) file types such as .exe, .dll, .bat, and similar extension shared in Teams chats and channels. This feature also completed it's rollout to GA last month. But the "default ON" has been postponed to early 2026. At GA, the enforcement applies if any of the participant’s organization enables the setting (in preview it required all organizations in the conversation). For further reading on the topic and the full list of extensions covered, check the Microsoft Learn article. 

This feature can also be enabled in the Teams admin center under "Messaging settings → Scan messages for file types that are not allowed”. Or you can use the PowerShell cmdlet mentioned above with the "-FileTypeCheck" switch.

Private chat for organizers/co‑organizers/presenters & unified town hall backroom chat (Roadmap ID 392328)

Organizing big events often requires chats and discussions among organizaers without involving attendees. Instead of using separate channels for this, Microsoft has announced a separate private chat for organizers, co‑organizers, and presenters in structured meetings and webinars. The feature being available before, during, and after the event. Coming in February, a "unified backroom chat policy" for town halls will be available. Admins should review meeting and events policies in the Teams admin center. 

Thanks for reading—if this was helpful, please feel free to follow me on **LinkedIn** for more Copilot and Teams updates.