Skip to main content
🦉
Message CenterMicrosoft 365 Updates
HomePermissionsTenant FinderPortfolio
🦉
M365 Message Centerby Cengiz YILMAZ

Track the latest updates, features, and announcements for Microsoft 365 services. Comprehensive archive of service updates and important changes.

Quick Links

HomePermissionsTenant FinderPortfolio

Connect

© 2026 M365 Message Center. Created with ❤ by Cengiz YILMAZ

Data sourced from Microsoft 365 Message Center • Not affiliated with Microsoft

  1. Home
  2. /
  3. MC1239187

Defender for Office 365 URL click alerts now include Microsoft Teams

Plan for Change
Major Change

Message ID

MC1239187
View in Admin Center

Roadmap ID

557549
View in Roadmap

Services

Microsoft Defender XDR

Affected Platforms

AndroidDesktopiOSMacWeb

Summary

Microsoft Defender for Office 365 URL click alerts will now include Microsoft Teams, enabling detection of malicious link clicks in Teams messages. This feature, rolling out from February to May 2026, enhances alert visibility and investigation in the Defender portal for licensed organizations, with no user workflow changes.

Details

Introduction

We’re extending Microsoft Defender for Office 365 (MDO) URL click alerting to Microsoft Teams, giving security teams greater visibility into potentially malicious activity beyond email. By surfacing alerts when users click malicious or suspicious links in Teams messages, organizations can detect threats earlier, investigate faster, and respond more effectively—all from the Microsoft Defender portal.

This message is associated with Microsoft Roadmap ID 557549.

When this will happen:

  • Public Preview (Worldwide): We will begin rolling out late February 2026 and expect to complete by early March 2026.
  • General Availability (Worldwide): We will begin rolling out early March 2026 and expect to complete by mid-March 2026.
  • General Availability (GCC, GCCH, DoD): We will begin rolling out early May 2026 and expect to complete by late May 2026.

How this affects your organization:

Who is affected:

  • Organizations licensed for Microsoft Defender for Office 365 Plan 2
  • Organizations licensed for Microsoft 365 E5
  • Security admins and SOC teams monitoring alerts in the Microsoft Defender portal
  • Users who send or receive Microsoft Teams messages containing URLs

What will happen:

  • Two existing MDO alerts will now also trigger for Microsoft Teams URL clicks, in addition to email:
    • A user clicked through to a potentially malicious URL
    • A potentially malicious URL click was detected
  • Alerts will appear on the Defender alerts page alongside existing alerts.
  • Alerts will include the associated Teams message as evidence, providing richer investigation context.
  • Teams signals will be included in incident correlation, helping connect related activity across email and Teams.
  • Incident pages will surface Teams message data directly, reducing the need to switch investigation contexts.
  • Automated investigation and response (AIR) will not be supported for the Teams URL click alerts.
  • The feature is enabled by default for eligible tenants.
  • No changes are made to user workflows.

What you can do to prepare:

  • No action is required. The feature is automatically enabled for eligible tenants.
  • Review alert workflows and incident response playbooks.
  • Inform SOC and helpdesk teams about Teams-based alerting.

Learn more:

Alert policies in the Microsoft Defender portal | Microsoft Learn (will be updated before rollout)

Compliance considerations:

Question Explanation
Does the change alter how existing customer data is processed, stored, or accessed? Microsoft Teams message data is accessed and surfaced as evidence within Microsoft Defender for Office 365 alerts and incidents when users click malicious or suspicious URLs.
Does the change alter how admins can monitor, report on, or demonstrate compliance activities? Security admins gain additional alerting and investigation signals related to Microsoft Teams URL clicks within the Microsoft Defender portal, enhancing monitoring and incident correlation.

Timeline

Published
Feb 26, 2026
Message published to Message Center
Updated
Feb 26, 2026
Message content updated
End Date
Jul 1, 2026
Message timeline ends

Tags

#New feature#User impact#Admin impact

Category

Plan for Change

Related Messages

Similar updates

MC1245219●

Microsoft Defender for iOS: End of support for iOS 16 devices

Mar 5, 2026
MC1234542●

Retirement of “Suspected identity theft (pass-the-ticket)” classic alert

Feb 18, 2026
MC1187837●

Microsoft Defender for Office 365 Zero-hour auto-purge (ZAP) Teams protection capabilities to Defender for Office Plan 1

Nov 18, 2025
MC1013453●

Upcoming Changes for M365 Copilot Chat with Link Safety

Feb 21, 2025
MC1219788

Microsoft Defender for Office 365: Enable users to report suspicious Teams messages in Plan 1

Jan 21, 2026