Skip to main content
🦉
Message CenterMicrosoft 365 Updates
HomePermissionsTenant FinderPortfolio
🦉
M365 Message Centerby Cengiz YILMAZ

Track the latest updates, features, and announcements for Microsoft 365 services. Comprehensive archive of service updates and important changes.

Quick Links

HomePermissionsTenant FinderPortfolio

Connect

© 2026 M365 Message Center. Created with ❤️ by Cengiz YILMAZ

Data sourced from Microsoft 365 Message Center • Not affiliated with Microsoft

  1. Home
  2. /
  3. MC1133508

Microsoft Teams Integration with Microsoft Defender for Office Tenant Allow/Block List for blocking domains

Informational

Message ID

MC1133508
View in Admin Center

Roadmap ID

492985
View in Roadmap

Services

Microsoft Teams
Microsoft Defender XDR

Affected Platforms

Web

Summary

Microsoft Teams now integrates with Microsoft Defender for Office 365 Tenant Allow/Block List, enabling security admins to centrally manage blocked external domains in Teams. This feature, available with Defender Plan 1 or 2, blocks communications from specified domains, supports audit logging, and requires Teams admin enabling.

Details

Updated December 16, 2025: We have updated the timeline. Thank you for your patience.

Introduction

We're introducing a new integration between Microsoft Teams and Microsoft Defender for Office 365 that enables security admins to manage blocked external domains in Teams using the Tenant Allow/Block List (TABL) in the Microsoft Defender portal. This feature enhances security by allowing organizations to centrally manage domain blocks across Microsoft 365 services.

This capability is available to customers with Microsoft Defender for Office 365 Plan 1 or Plan 2 and Microsoft Teams.

This message is associated with Microsoft 365 Roadmap ID 492985.

When this will happen

Targeted Release: We will begin rolling out late August 2025 and expect to complete by early September 2025.

General Availability (Worldwide): This is now generally available.

How this affects your organization

Security admins, with permission from Teams admins, will be able to:

  • Add, delete, and view blocked external domains in Microsoft Teams using the Microsoft Defender portal.
  • Prevent incoming communications (chats, channels, meetings, and calls) from blocked domains.
  • Automatically delete existing communications from users in blocked domains.
  • Track actions taken to block domains in audit logs, supporting compliance monitoring and reporting.

View and manage blocked domains for Teams in the Microsoft Defender portal:

 admin settings

This change does not affect existing federation configurations or domain blocks set in the Teams admin center.

  • Entry limit: Up to 4,000 blocked domains can be configured for Teams.
  • Client impact: Applies to all Teams clients and the Defender XDR web portal.

What you can do to prepare

To enable this feature - 

  • Ensure that external access in the Teams admin center is set to either:
    • Block only specific external domains, or
    • Allow all external domains
  • Teams admins must enable the setting “Allow my security team to manage blocked domains” in the Teams admin center. This setting is off by default.

Enable security team access to manage blocked domains in the Teams admin center:

 admin settings

Learn more: Block domains in Microsoft Teams using the Tenant Allow/Block List | Microsoft Defender for Office 365 | Microsoft Defender | Microsoft Learn

Compliance considerations

Does the change modify how admins can monitor, report on, or demonstrate compliance activities such as Purview or admin reporting?Both Microsoft Teams and the Defender portal generate audit logs for actions taken on blocked domains. These logs can be accessed via Microsoft Purview or Defender audit capabilities.
Does the change provide a new way of communicating between users, tenants, or subscriptions? Security admins can now block external domains in Microsoft Teams using the Tenant Allow/Block List, which affects cross-tenant communications across chats, channels, meetings, and calls.
Does the change include an admin control, and can it be controlled through Entra ID group membership?Teams admins must enable the toggle “Allow my security team to manage blocked domains” in the Teams admin center to grant access. This control can be managed through Entra ID group membership.

Timeline

📅
Published
Aug 11, 2025
Message published to Message Center
✏️
Updated
Dec 16, 2025
Message content updated
🏁
End Date
Jan 30, 2026
Message timeline ends

Tags

#Updated message#New feature#User impact#Admin impact

Category

📖Stay Informed

Related Messages

Similar updates

MC1147984

Microsoft Teams: User reporting for incorrectly identified security concerns

Sep 4, 2025
MC1223828

Microsoft Teams: Report a suspicious call

Jan 29, 2026
MC1219788

Microsoft Defender for Office 365: Enable users to report suspicious Teams messages in Plan 1

Jan 21, 2026
MC1200058

Microsoft Defender for Office 365: Admins can block external users in Microsoft Teams from Defender Portal

Dec 19, 2025
MC1140178

Microsoft Teams: Prevent screen capture (Premium feature)

Aug 22, 2025