Skip to main content
šŸ¦‰
Message CenterMicrosoft 365 Updates
HomePermissionsTenant FinderM365 ReportPortfolio
šŸ¦‰
M365 Message Centerby Cengiz YILMAZ

Track the latest updates, features, and announcements for Microsoft 365 services. Comprehensive archive of service updates and important changes.

Quick Links

HomePermissionsTenant FinderM365 ReportPortfolio

Connect

Ā© 2026 M365 Message Center. Created with ā¤ by Cengiz YILMAZ

Data sourced from Microsoft 365 Message Center • Not affiliated with Microsoft

  1. Home
  2. /
  3. MC1266905

Microsoft Secure Score: New recommendation for Microsoft Defender for Endpoint

Informational

Message ID

MC1266905
View in Admin Center

Services

Microsoft Defender XDR

Summary

Microsoft Secure Score will add a new recommendation to block outbound traffic from mshta.exe in Microsoft Defender for Endpoint, starting public preview in late March 2026. This reduces risk from attacks using mshta.exe, requires admin action to enable, and impacts compliance monitoring and data access.

Details

Introduction

To help organizations strengthen endpoint security and reduce exposure to common attack techniques, we’re introducing a new Microsoft Secure Score recommendation in Microsoft Defender for Endpoint (MDE). This recommendation focuses on blocking outbound traffic from mshta.exe, a legitimate Windows binary that is frequently abused by attackers to execute malicious scripts. Implementing this recommendation helps reduce risk from living-off-the-land binary (LOLBIN) attacks and improves your overall security posture.

When this will happen

  • Public Preview:Ā Rollout begins lateĀ March 2026 and is expected to complete by early April 2026.
  • General Availability (Worldwide):Ā Rollout begins late March 2026 and is expected to complete by late May 2026.

How this affects your organization

Who is affected

Admins managing Microsoft Defender for Endpoint and Microsoft Secure Score.

What will happen

  • A new Secure Score recommendation titled ā€œBlock outbound traffic from mshta.exeā€ will appear in Microsoft Secure Score for tenants enrolled in Public Preview:Ā 

    user settings

  • Secure Score points will reflect whether this recommendation is implemented.
  • The recommendation is not enabled by default and requires admin action to implement.
  • There is no direct user experience change unless your organization enforces the configuration.

Why this matters

  • mshta.exe is commonly abused by attackers to download and execute malicious payloads from remote sources.
  • Blocking outbound traffic from this binary reduces attack surface and aligns with modern endpoint hardening best practices.

What you can do to prepare

  • Review the new recommendation in Microsoft Secure Score once available.
  • Evaluate potential line of business or scripting dependencies before enforcement.
  • Implement the recommended configuration to improve your organization’s security posture.
  • Communicate these changes to your security and endpoint management teams.

Learn more: Microsoft Secure Score | Microsoft Defender XDR | Microsoft Defender | Microsoft Learn

Compliance considerations

QuestionAnswer
Does the change alter how existing customer data is processed, stored, or accessed? Yes. Blocking outbound traffic from mshta.exe may prevent certain scripts or applications from accessing external resources.
Does the change alter how admins can monitor, report on, or demonstrate compliance activities? Yes. Microsoft Secure Score will reflect the implementation status of the new recommendation.
Does the change include an admin control, and can it be controlled through Entra ID group membership? Yes. Admins must explicitly implement the recommendation in Microsoft Defender for Endpoint.

Timeline

Published
Mar 31, 2026
Message published to Message Center
Updated
Mar 31, 2026
Message content updated
End Date
Apr 30, 2026
Message timeline ends

Tags

#New feature#User impact#Admin impact

Category

Stay Informed

Related Messages

Similar updates

MC1261596

Notice: Security Copilot will be included as part of your Microsoft 365 E5 plan soon

Mar 25, 2026
MC1219788

Microsoft Defender for Office 365: Enable users to report suspicious Teams messages in Plan 1

Jan 21, 2026
MC1223828

Microsoft Teams: Report a suspicious call

Jan 29, 2026
MC1239187ā—

Defender for Office 365 URL click alerts now include Microsoft Teams

Feb 26, 2026
MC1133508

Microsoft Teams Integration with Microsoft Defender for Office Tenant Allow/Block List for blocking domains

Aug 11, 2025