Teams updates to watch: malicious link warnings, blocked risky files, and a new private backroom chat
Malicious URL Protection (Roadmap ID 499893)
Microsoft has announced link‑scanning in Teams chats and channels that warns senders and recipients about unsafe URLs. The feature reached general availability rollout by the end of November 2025, while the separate change to make it ON by default, originally planned as part of that release, has been postponed to early 2026.
If you don't want to wait for it to be on by default, or feel the need to configure it, you can do so in the Teams admins center: "Teams admin center → Messaging settings → Scan messages for unsafe URLs”. Or you can mange the configuration with PowerShell as described on Microsoft Learn (Set-CsTeamsMessagingConfiguration).
Weaponizable file type protection (Roadmap ID 499892)
In the addition to the URL Protection, Microsoft has announced a pre‑delivery block for high‑risk (“weaponizable”) file types such as .exe, .dll, .bat, and similar extension shared in Teams chats and channels. This feature also completed it's rollout to GA last month. But the "default ON" has been postponed to early 2026. At GA, the enforcement applies if any of the participant’s organization enables the setting (in preview it required all organizations in the conversation). For further reading on the topic and the full list of extensions covered, check the Microsoft Learn article.
This feature can also be enabled in the Teams admin center under "Messaging settings → Scan messages for file types that are not allowed”. Or you can use the PowerShell cmdlet mentioned above with the "-FileTypeCheck" switch.
Private chat for organizers/co‑organizers/presenters & unified town hall backroom chat (Roadmap ID 392328)
Thanks for reading—if this was helpful, please feel free to follow me on **LinkedIn** for more Copilot and Teams updates.
