Two Major Admin Control Updates for Copilot and Agent Management

At Ignite Microsoft showcased and talked about two new admin controls for Copilot and Agents. These controls drew a significant amount of attention for their potential to simplify management and strengthen governance across Copilot experiences and AI agents. These capabilities are now emerging in preview, offering administrators early access to improved insights, expanded control surfaces, and more secure operational foundations. Copilot Overview Page Refresh in Microsoft 365 Admin Center First off is the redesigned landing page for Copilot in the Microsoft 365 Admin Center (MAC), giving admins an at-a-glance view of the Copilot journey across Chat, Agents, and M365 Copilot. This update  centralizes critical insights and success metrics, helping organizations accelerate adoption and maintain security posture. The refreshed page introduces success metrics such as Chat active users, assisted hours for licensed users, and satisfaction rate. Each Copilot pillar now includes multi‑...

Teams updates to watch: malicious link warnings, blocked risky files, and a new private backroom chat

Microsoft has announced three Teams updates the past months. Two that strengthen security and one that will improve how organizers coordinate events: Malicious URL Protection, Weaponizable file type protection and Private chat for organizers, co‑organizers, and presenters. Please note that timelines can shift, so treat the dates as guidance rather than guarantees.

Malicious URL Protection (Roadmap ID 499893)

Microsoft has announced link‑scanning in Teams chats and channels that warns senders and recipients about unsafe URLs. The feature reached general availability rollout by the end of November 2025, while the separate change to make it ON by default, originally planned as part of that release, has been postponed to early 2026. 

If you don't want to wait for it to be on by default, or feel the need to configure it, you can do so in the Teams admins center: "Teams admin center → Messaging settings → Scan messages for unsafe URLs”. Or you can mange the configuration with PowerShell as described on Microsoft Learn (Set-CsTeamsMessagingConfiguration). 

Weaponizable file type protection (Roadmap ID 499892)

In the addition to the URL Protection, Microsoft has announced a pre‑delivery block for high‑risk (“weaponizable”) file types such as .exe, .dll, .bat, and similar extension shared in Teams chats and channels. This feature also completed it's rollout to GA last month. But the "default ON" has been postponed to early 2026. At GA, the enforcement applies if any of the participant’s organization enables the setting (in preview it required all organizations in the conversation). For further reading on the topic and the full list of extensions covered, check the Microsoft Learn article. 

This feature can also be enabled in the Teams admin center under "Messaging settings → Scan messages for file types that are not allowed”. Or you can use the PowerShell cmdlet mentioned above with the "-FileTypeCheck" switch.

Private chat for organizers/co‑organizers/presenters & unified town hall backroom chat (Roadmap ID 392328)

Organizing big events often requires chats and discussions among organizaers without involving attendees. Instead of using separate channels for this, Microsoft has announced a separate private chat for organizers, co‑organizers, and presenters in structured meetings and webinars. The feature being available before, during, and after the event. Coming in February, a "unified backroom chat policy" for town halls will be available. Admins should review meeting and events policies in the Teams admin center. 

Thanks for reading—if this was helpful, please feel free to follow me on **LinkedIn** for more Copilot and Teams updates.