14-March-2026 Below you will find a collection of news published yesterday. This news consists of Microsoft’s Roadmap when it is updated it will be below with items. Then there will be a section with the message center, if there is anything new there, this will be automatically included. And it contains a piece from blogs that I follow myself and would like to share with you. If I miss something in the blogs that do have an RSS feed, please let me know.
This entire post was automated via Microsoft Flow
have fun reading!
Office 365 Roadmap Updated: 2026-03-13
Additions : 3
Updates : 6
More Details At: www.roadmapwatch.com
| New Features | Current Status | |||
|---|---|---|---|---|
| Microsoft Teams: Honor Windows Do not disturb setting | In Development | |||
| Microsoft Purview: Data Loss Prevention – Enrich Defender alerts Graph API with DLP event data | In Development | |||
| Microsoft Purview: Endpoint Data Loss Prevention – Add support of hyperlinks in warn & block toast messages for Edge browser | In Development | |||
| Updated Features | Current Status | Update Type | ||
| Windows 365: Frontline in Shared mode availability for Germany West Central, Korea Central, Korea South | In Development | Description | ||
| Windows 365: Frontline in Shared mode availability for Switzerland North, Switzerland West, Norway East, Norway East, Norway West, UAE central, UAE north | In Development | Description | ||
| Microsoft Copilot (Microsoft 365): Copilot Chat Tools Control | Launched | Status | ||
| Microsoft Teams: Call history Admin control | Launched | Status | ||
| Planner: Planner Agent in basic plans | In Development | Title, Description | ||
| Microsoft Teams: Image viewer improvements enable scrolling and jumping to original message | Rolling Out | Status |
Items from the MessageCenter in Microsoft 365
| Microsoft Teams on the web: New Private Preview for Sign in with Apple and Google for consumers may affect enterpriseCategory:Microsoft TeamsNummer:MC1102784Status:planForChange | Updated November 24, 2025: This change is currently on hold. We will communicate via Message center when we are ready to proceed. We apologize for any inconvenience this may have caused and thank you for your patience. We’re introducing a new sign-in experience that enhances flexibility and accessibility for a limited number of users on Microsoft Teams for the web. This change introduces new sign-in options—Continue with Apple and Continue with Google—on the sign-in page (teams.microsoft.com or teams.com) for users routed through login.microsoftonline.com/common. NOTE: These options are intended for consumer Microsoft accounts and may be visible to both consumer and enterprise users, depending on your authentication configuration. [When this will happen:] Preview, General Availability: We will update this Message center post when we are ready to proceed. [How this will affect your organization:] After this rollout:
Screenshots of the new experience: 1. Users can select Continue with Apple or Continue with Google to sign in or sign up for a consumer Microsoft account using an Apple or Google credential. This image shows the Google option:
2. A subset of users who click these options will see a screen that confirms whether they are using a personal or work/school account. In this image, the user has selected the work/school option:
3. Users can still enter their email/username at the top of the sign-in screen, and sign into a specific organization with Sign-in options:
[What you need to do to prepare:] No action is required. This feature is only being added to login.microsoftonline.com/common. Users accessing login.microsoftonline.com with a custom URL will not see this feature. You can show a custom URL for your organization by passing a domain hint to apply company branding at the initial sign-in screen. Custom URLs for Teams on the web will be https://teams.microsoft.com?tenantId=<YOUR_DOMAIN_NAME> or https://teams.microsoft.com?tenantId=<YOUR_TENANT_ID>. Learn more | ||||||||||||
| (Updated) Microsoft Teams: Private chat for organizers and presenters in structured meetings, webinars, and town hallsCategory:Microsoft TeamsNummer:MC1188222Status:planForChange | Updated March 13, 2026: We have updated the timeline. Thank you for your patience. [Introduction] We’re introducing a private chat feature for organizers, co-organizers, and presenters in structured meetings and webinars in Microsoft Teams. This separate chat enhances collaboration by allowing key participants to communicate privately before, during, and after the event, without involving attendees. Additionally, we are unifying backroom chat behavior in town halls to ensure consistent functionality across all structured meetings. Currently, backroom chat behavior varies depending on whether streaming chat is enabled for town halls and whether the organizer has a Teams Premium license. This update removes that inconsistency. This message is associated with Roadmap ID 392328 and applies to Teams for Windows desktop, Teams for Mac desktop, Teams for the web, Teams for iOS/Android, MTR-W and MTR-A devices. [When this will happen:]
[How this affects your organization:] Who is affected: Admins managing Microsoft Teams meetings, webinars, and town halls. What will happen:
Two potential impacts:
[What you can do to prepare:]
[Compliance considerations:] No compliance considerations identified, review as appropriate for your organization. | ||||||||||||
| (Updated) Content Security Policies (CSP) are coming to SharePoint Online and might impact your custom SPFx solutionsCategory:SharePoint OnlineNummer:MC1193419Status:planForChange | Updated March 13, 2026: We have updated the timeline. Thank you for your patience. We’re improving SharePoint Online security via Content Security Policy (CSP) enforcement. Currently CSP is applied in reporting mode but as of March 1, 2026, the Content Security Policy will be enforced which will prevent the loading of script (e.g. JavaScript) from non-allowed sources. This message center post replaces MC1055557 (April 2024). This change is associated with Microsoft 365 Roadmap ID: 485797 [When this will happen:] This will be implemented starting March 1, 2026 and should complete by March 20, 2026.
[How this will affect your organization:] If your organization extended SharePoint Online using SPFx then the created custom SPFx solutions could potentially load scripts from locations which are not allowed. In most cases SPFx solutions use and load script from allowed locations, but that’s not always the case. Any script from a not allowed location will be blocked, the same applies for any inline script usage. SPFx solutions whose script is getting blocked will not function anymore as designed, impacting business scenarios depending on those solutions. To prevent solutions from breaking there you need to:
If you need more time to review your SPFx solutions, there’s an option to postpone CSP enforcement by 90 days via below SPO Management Shell PowerShell cmdlet.
Note: This option will be available in the SPO Management Shell version 16.0.26712.12000 (November 2025) or higher. [What you need to do to prepare:] In addition to the default CSP settings, SharePoint Online will add locations listed in the Trusted Script Sources area of the SharePoint Online Admin Center as valid locations for CSP, thus enabling script loading from those locations. To add an entry, in a browser, go to the Trusted Script Sources via SharePoint Online Admin Center > Advanced > Script sources. To understand which script location to add there are two options. First option is testing your SPFx solutions with the browser dev tools console open. As CSP is in reporting mode until March 1, 2026, there will be messages indicating script that will be blocked once CSP is enforced. These messages start with “Loading the script ‘<path to script>’ violates the following…” or “Executing inline script violates the following Content Security Policy directive…”. Whenever the browser logs a CSP violation, that violation is also logged to Microsoft Purview. In the browser, navigate to the Audit solution in Microsoft Purview from the Microsoft 365 Admin Center. From the Search page, search for the Activity – friendly names value Violated Content Security Policy, or the Activity – operation names value ViolatedContentSecurityPolicy: Selecting a search result opens the side panel with the audit details. Take note of the following properties:
Important In the case of inline script, the remediation requires updating the SPFx solution by moving inline script into a separate script file, which then can be added as a trusted source. Learn more: Support for Content Security Policy (CSP) in SharePoint Online | ||||||||||||
| (Update)Microsoft Entra ID: General Availability of passkey profiles and migration for existing Passkeys (FIDO2) tenantsCategory:Microsoft EntraNummer:MC1221452Status:planForChange | Updated March 13, 2026: We have updated the content. Thank you for your patience. [Introduction] Starting in March 2026, Microsoft Entra ID will introduce passkey profiles and synced passkeys to General Availability (GA). This update allows administrators to opt in to a new passkey profiles experience that supports group-based passkey configurations and introduces a new passkeyType property. Important: Only tenants that already have Passkeys (FIDO2) enabled are affected by this update.
The passkeyType property enables admins to configure:
If your tenant already has Passkeys (FIDO2) enabled and you do not opt in to passkey profiles during the initial rollout window, your tenant will be automatically migrated to the passkey profiles schema at the date range specified below. When this occurs:
Authentication Methods Registration Campaign changes (Microsoft-Managed Only) Tenants are impacted when all the following conditions are met:
For these tenants, Microsoft-managed registration campaign settings will be updated after passkey profile automatic migration is complete. We will roll out changes incrementally to in-scope tenants according to the timeline outlined below. [When this will happen] Passkey profile and Synced passkeys General Availability
Automatic migration for existing passkeys (FIDO2) enabled tenants
Authentication Methods registration campaign changes in Microsoft-Managed state (for in-scope tenants):
[How this affects your organization] Automatic migration for existing passkeys (FIDO2) enabled tenants What will happen: If you have not opted in to passkey profiles by your automatic enablement period, your tenant will be migrated to passkey profiles.
Authentication Methods registration campaign changes in Microsoft-Managed state (for in-scope tenants) What will happen: Microsoft-managed registration campaign settings will be updated:
What is the end user impact: Once the above changes have taken effect, users targeted in the registration campaign will begin to receive passkey registration nudges during sign-in flows after they have completed multifactor authentication. [What you can do to prepare] If you want a configuration different from the migration defaults, review the timeline above and opt in to passkey profiles before your tenant’s automatic enablement window begins. Then configure the Default passkey profile’s passkeyType to your preferred values. We also recommend:
Learn more:
[Compliance considerations] No compliance considerations identified. Review as appropriate for your organization. | ||||||||||||
| (Updated) Microsoft Teams: Admin setting for simpler meeting passcodes (numeric‑only)Category:Microsoft TeamsNummer:MC1232096Status:stayInformed | Updated March 13, 2026: We have updated the timeline. Thank you for your patience. [Introduction] Microsoft Teams is introducing simplified meeting passcodes to reduce friction when joining meetings, especially when participants must manually enter a passcode. This feature is off by default and must be explicitly enabled by a tenant administrator. This message is associated with Microsoft 365 Roadmap ID 555858. [When this will happen]
Note on rollout timing and admin experience: As part of a phased rollout, some backend capabilities may become available earlier, including PowerShell configuration starting in mid-March, ahead of the Teams Admin Center UI, which will be released following timelines shared above. The feature remains off by default, and no change to meeting security behavior occurs unless an administrator explicitly enables it. [How this affects your organization] Who is affected: Tenant administrators who manage meeting security settings in Microsoft Teams. What will happen:
Security considerations:
[What you can do to prepare]
[Compliance considerations] No compliance considerations identified. Review as appropriate for your organization. | ||||||||||||
| (Updated) Outlook: retiring “Contact Masking” (hide suggested recipients) – March 31, 2026Category:Microsoft 365 suiteNummer:MC1234566Status:planForChange | Updated March 13, 2026: We have updated the content. Thank you for your patience. [What’s changing]
In Outlook, users can hide a suggested recipient while addressing an email. For example, selecting the X next to a name in the To/Cc/Bcc suggestions list. This behaviour is commonly referred to as “Contact Masking”.
We are retiring this feature for users. This does not impact admin controls for contacts. The AutoComplete list for Outlook will not be impacted by this change. Users can still remove entries from their autocomplete history (for example, suggestions based on past emails they typed). Contacts are not being added, deleted, or modified as part of this change. Email delivery and addressing continue to work as before. [When this will happen]
Contact masking will reach end of support on March 31, 2026. [How this affects your organization] Who is affected
[Why we’re making this change] This feature has been a recurring source of customer confusion and escalations, because contacts can be accidentally hidden for one user but not others. While the impact is felt across Microsoft 365 experiences (not just Outlook). It also isn’t managed as a contact entity setting, which creates transparency and compliance challenges. [What will change in user experience]
[Is Admin Action Required?] No action is required for this retirement. You may choose to:
Learn more about the retiring feature: (RETIRING March 31, 2006) Manage suggested recipients in the To, Cc, and Bcc fields in Outlook | Microsoft Support [Compliance considerations] No compliance considerations identified. Review as appropriate for your organization guidance to users on user level features.
| ||||||||||||
| Introducing awards and certifications section in M365 profile cardCategory:Microsoft 365 appsNummer:MC1250272Status:stayInformed | We’re launching a user experience (UX) update that displays existing Awards and Certifications properties from Microsoft 365 profile schema on users’ profile cards. [When this will happen:] General Availability (Worldwide): We will begin rolling out mid-March 2026 and expect to complete by early April 2026. [How this affects your organization:] Who is affected: All users whose organizations populate the Awards and Certifications properties in the M365 profile. What will happen:
[What you can do to prepare:]
Before rollout, we will update this post with new documentation. [Compliance considerations:] No compliance considerations identified, review as appropriate for your organization. | ||||||||||||
| Improved copy and paste support for @mentions and shared contacts in Microsoft TeamsCategory:Microsoft TeamsNummer:MC1250273Status:stayInformed | [Introduction] Microsoft Teams is improving the copy and paste experience for messages that contain @mentions, shared contacts, and other supported @tags. Previously, when users copied and pasted messages containing mentions, those mentions could be converted into plain text and lose their interactivity. With this update, Teams preserves supported tags during copy and paste whenever possible. If a tag is valid in the destination conversation, it remains interactive and behaves the same way as when originally authored. If the tag cannot be used in that context, it safely falls back to plain text while preserving the original display text. This ensures a more consistent and reliable messaging experience across chats and channels. This message applies to Teams for Windows desktop, Teams for Mac desktop, and Teams for the web. It is associated with Microsoft 365 Roadmap ID 558254. [When this will happen:]
[How this affects your organization:] Who is affected:
What will happen:
There is no change to how mentions or notifications behave after a message is sent. [What you can do to prepare:]
[Compliance considerations:] No compliance considerations identified, review as appropriate for your organization. | ||||||||||||
| Microsoft Edge: Copilot new tab pageCategory:Microsoft 365 suiteNummer:MC1250274Status:stayInformed | [Introduction] We’re introducing a refreshed Copilot‑inspired new tab page in Microsoft Edge for Business. This update brings search, chat, and web exploration together into a single search box, along with Copilot‑suggested actions and curated work content designed to help users stay focused and complete tasks more efficiently. This message is associated with Microsoft 365 Roadmap ID 558256. [When this will happen]
[How this affects your organization] Who is affected
What will happen
[What you can do to prepare] No admin action is required before this rollout. If you want to configure the experience or prepare your organization, you can:
Learn more: Configuring Copilot Mode | Microsoft Edge | Microsoft Learn [Compliance considerations] No compliance considerations identified. Review as appropriate for your organization. | ||||||||||||
| (Updated) Microsoft 365 Copilot: Planner Agent rename and rollout to premium and basic plansCategory:Planner Microsoft Copilot (Microsoft 365)Nummer:MC1250279Status:stayInformed | Updated March 13, 2026: We have updated the content. Thank you for your patience. [Introduction] Beginning in mid‑March 2026, Microsoft Planner will update the agent experience to align naming with Microsoft 365 Copilot and expand availability. As part of this update, the Project Manager agent will be renamed to Planner Agent, the Planner Agent icon will be changed to match the Planner icon, and the agent will become available to users with a Microsoft 365 Copilot license across both Planner premium and Planner basic plans. This update aligns Planner’s agent experience with Microsoft 365 Copilot and expands access to Copilot-powered capabilities. This message is associated with Microsoft 365 Roadmap ID 511820. [When this will happen]
[How this affects your organization] Who is affected
What will happen
[What you can do to prepare] No admin action is required. These updates will roll out automatically. Admins may optionally:
[Compliance considerations]
| ||||||||||||
| Sensitivity labels available soon for Viva Engage communitiesCategory:Microsoft VivaNummer:MC1250283Status:stayInformed | [Introduction] Starting March 31, 2026, Viva Engage communities will support Microsoft Purview sensitivity labels applied to Microsoft 365 groups and their connected SharePoint sites. This update aligns Engage community privacy and governance with existing Microsoft 365 labeling capabilities, helping organizations apply consistent privacy and access controls across all three surfaces. [When this will happen] General availability (Worldwide): We will begin rolling out in late March 2026 and expect to complete by early April 2026. [How this affects your organization] Who is affected
What will happen
[What you can do to prepare] Admin checklist:
[Compliance considerations] No compliance considerations identified. Review as appropriate for your organization. | ||||||||||||
| Power Platform – New Continuous Access Evaluation (CAE) announcementCategory:Microsoft Dataverse Power PlatformNummer:MC1250351Status:stayInformed | We are announcing our CAE rollout for user sign-in flows to Dataverse as part of ongoing security improvements for Power Platform. This change affects interactive user access to Dataverse and relies on Microsoft Entra Conditional Access (CAE) policies for near real-time session evaluation. This feature is being gradually rolled out across Dataverse environments, which is anticipated to be complete by September 2026. Users are advised to review their user-focused CAE Conditional Access policies to ensure continued access to Dataverse. How does this affect me? Dataverse user access is transitioning to CAE-enabled authentication, where user sessions are continuously evaluated based on Conditional Access policy signals rather than only at the initial sign-in. As part of this rollout, user sign-in traffic to Dataverse may originate from managed locations that must be permitted and compliant with your organization’s CAE Conditional Access policies. Note: This change applies only to interactive user sign-in flows. Who is Impacted? Customers with:
Customers should take the following actions for user access scenarios:
| ||||||||||||
| Windows Deployment Services (WDS): Hands-free deployment hardening (Phase 2)Category:WindowsNummer:MC1250927Status:stayInformed | As announced in January 2026, the unattend.xml file used in hands‑free deployment poses a vulnerability when transmitted over an unauthenticated RPC channel. Beginning with the April 2026 security update, IT admins should prepare for the second phase of hardening for CVE-2026-0386. These changes will make hands‑free deployment disabled by default to enforce secure behavior. After this update, hands‑free deployment will no longer work unless explicitly overridden with registry settings. When will this happen: Starting with the April 2026 security update, Windows Deployment Services (WDS) will enforce secure‑by‑default behavior by automatically disabling hands‑free deployment. How this will affect your organization: After installing the April 2026 security update, hands‑free deployment will be blocked to prevent unauthenticated access to unattend.xml, enforcing the hardening requirements for CVE-2026-0386. Any workflows that rely on unattend.xml‑based deployment will no longer function unless overridden with registry settings. What you need to do to prepare: Organizations that still require hands‑free deployment after installing the April 2026 security update must explicitly override the secure default by setting the AllowHandsFreeFunctionality registry value to 1, which keeps unattend.xml‑based deployments operational but reintroduces the security risks associated with CVE-2026-0386. When this override is used, devices will log diagnostic messages indicating that they are operating in an insecure mode. Because this configuration is not recommended for long‑term use, IT admins should plan to migrate to alternate deployment solutions and return to secure‑by‑default behavior. Additional information:
| ||||||||||||
| Out-of-band update released for Windows Enterprise client devices running hotpatch updatesCategory:WindowsNummer:MC1250975Status:preventOrFixIssue | Microsoft has identified a security issue in the Windows Routing and Remote Access Service (RRAS) management tool that could allow remote code execution when connecting to a malicious server. This issue only applies to a limited set of scenarios involving Enterprise client devices running hotpatch updates and being used for remote server management. An out-of-band (OOB) hotpatch update (KB5084597) was released today, March 13, 2026, to address this issue. This cumulative update includes all protections and improvements from the March 2026 Windows security update released March 10, 2026. No action is required if:
This OOB hotpatch update is available for Windows 11, versions 25H2 and 24H2 devices enrolled in hotpatch updates and managed by Windows Autopatch. This update will install automatically through Windows Update and take effect without requiring you to restart your device. Learn more about Hotpatch updates. For more information, refer to the KB article March 13, 2026—Hotpatch KB5084597 (OS Builds 26200.7979 and 26100.7979) Out-of-band. | ||||||||||||
| Prevent/Fix (Detected): Out-of-band update released for Windows Enterprise client devices running hotpatch updatesCategory:Windows AutopatchNummer:MC1251194Status:preventOrFixIssue | Out-of-band update released for Windows Enterprise client devices running hotpatch updates Microsoft has identified a security issue in the Windows Routing and Remote Access Service (RRAS) management tool that could allow remote code execution when connecting to a malicious server. This issue only applies to a limited set of scenarios involving Enterprise client devices running hotpatch updates and being used for remote server management. An out-of-band (OOB) hotpatch update (KB5084597) was released today, March 13, 2026, to address this issue. This cumulative update includes all protections and improvements from the March 2026 Windows security update released March 10, 2026. No action is required if:
This OOB hotpatch update is available for Windows 11, versions 25H2 and 24H2 devices enrolled in hotpatch updates and managed by Windows Autopatch. This update will install automatically through Windows Update and take effect without requiring you to restart your device. Learn more about hotpatch updates. For more information, refer to the KB article March 13, 2026—Hotpatch KB5084597 (OS Builds 26200.7979 and 26100.7979) Out-of-band.
| ||||||||||||
| Microsoft Viva Engage | Email sender domain migration from @yammer.com to @engage.mail.microsoftCategory:Microsoft VivaNummer:MC1251200Status:stayInformed | [Introduction] As part of the final phase of the Viva Engage rebranding, we’re updating the email sender domains used for Viva Engage communications. This change ensures a consistent and secure brand experience across all surfaces and completes the transition from Yammer to Viva Engage. This update was previously communicated in MC1117814, Microsoft Viva Engage | Email sender domain migration from @yammer.com to @engage.mail.microsoft, in September 2025. [When this will happen:]
[How this affects your organization:] Who is affected:
What will happen: The sender domain for Viva Engage emails will change as follows:
These new domains are secured with industry standard authentication protocols (e.g., SPF) to help prevent spoofing and ensure reliable delivery. To enhance security and reduce cross-tenant spam, sender addresses will now include a tenant-specific prefix. You may see emails from:
These changes apply to all Viva Engage tenants, regardless of license tier (e.g., Viva P1, P2), and affect all Viva Engage emails, including notifications, announcements, and digests. Third-party integrations (e.g., journaling, archiving, or routing systems) that rely on the @yammer.com domain for classification or authentication may be impacted. Any such configurations should be reviewed and updated to recognize the new domains. Screenshot: An example of a new Viva Engage email notification sent from the updated @engage.mail.microsoft domain:
[What you can do to prepare:] Review and update the following configurations:
No admin action is required unless your organization has custom configurations based on the old domain. Learn more: Yammer is evolving to Viva Engage | Viva Engage Blog [Compliance considerations:] No compliance considerations identified, review as appropriate for your organization. | ||||||||||||
| Prevent/Fix: Microsoft Purview | Activity Explorer – Total count includes duplicate resultsCategory:Microsoft 365 suite Microsoft PurviewNummer:MC1251201Status:preventOrFixIssue | [Introduction] We’re improving how totals are displayed in Activity Explorer to reduce confusion and improve trust in exported results. Today, the total count shown in the Activity Explorer UI can appear higher than the number of records exported due to duplicate records being included in the UI count. While exported data already removes duplicates and maintains full data integrity, this discrepancy can give the impression that data is lost during export. To address this, we’re updating the UI to display a more accurate count based on results currently loaded in the portal. [When this will happen:] [How this affects your organization:] Who is affected:
What will happen:
[What you can do to prepare:] We recommend informing compliance teams about the updated label and updating any internal documentation that references the Activity Explorer total count. [Compliance considerations:] | ||||||||||||
| Copilot extensibility: Microsoft 365 Copilot Declarative Agents model upgrade to GPT‑5.2Category:Microsoft Copilot (Microsoft 365)Nummer:MC1251203Status:stayInformed | [Introduction] Microsoft 365 Copilot Declarative Agents are being upgraded to the GPT‑5.2 model. This update improves quality and reliability for agent scenarios such as reasoning, multi‑step workflows, tool calling, structured output generation, and document analysis. As with GPT‑5.1, users can continue to choose between Auto, Quick Response, and Think Deeper modes. [When this will happen] General availability (Worldwide): Rollout will begin around mid-March 2026 and is expected to complete by late March 2026. [How this affects your organization] Who is affected
What will happen:
[What you can do to prepare] No configuration changes are required. To support a smooth transition, consider the following steps:
[Compliance considerations] No compliance considerations identified. Review as appropriate for your organization. | ||||||||||||
| Microsoft Teams: Identify external bots joining your Teams meetingsCategory:Microsoft TeamsNummer:MC1251206Status:stayInformed | [Introduction] AI‑powered meeting assistant bots—such as transcription and summarization services—are increasingly used to enhance productivity in online meetings. While these tools can be valuable, some bots may access meetings without the knowledge or consent of the meeting organizer or the hosting tenant, which can create data security, privacy, and compliance risks. To help organizations protect meeting content and increase visibility into automated participants, Microsoft Teams is introducing a new capability that detects external meeting assistant bots as they attempt to join meetings. This update gives organizers greater awareness and control and provides administrators with clear controls to manage how detected bots are handled in meetings hosted across the organization. This message is associated with Microsoft 365 Roadmap ID 558107. [When this will happen]
[How this will affect your organization] Who is affected
What will happen
[What you can do to prepare] No action is required at this time. However, we recommend that Teams admins:
[Compliance considerations]
| ||||||||||||
| Microsoft Secure Score: New recommendations for Microsoft Defender for EndpointCategory:Microsoft Defender XDRNummer:MC1251207Status:stayInformed | [Introduction] We’re adding new Microsoft Secure Score recommendations for Microsoft Defender for Endpoint (MDE) to help your organization strengthen endpoint security and proactively reduce exposure to common attack techniques. These recommendations support more robust security baselines and help you assess and improve protection across your devices. [When this will happen]
[How this will affect your organization] Who is affected
What will happen Customers in Public Preview will see the following new Microsoft Secure Score recommendations:
As these recommendations become available:
[What you can do to prepare]
[Compliance considerations] No compliance considerations identified. Review as appropriate for your organization. |






