18-November-2025 Below you will find a collection of news published yesterday. This news consists of Microsoft’s Roadmap when it is updated it will be below with items. Then there will be a section with the message center, if there is anything new there, this will be automatically included. And it contains a piece from blogs that I follow myself and would like to share with you. If I miss something in the blogs that do have an RSS feed, please let me know.
This entire post was automated via Microsoft Flow
have fun reading!
The blogs of this day are:
Office 365 Roadmap Updated: 2025-11-18
Additions : 2
Updates : 4
More Details At: www.roadmapwatch.com
| New Features | Current Status | |||
|---|---|---|---|---|
| Excel: Python in Excel | In Development | |||
| Outlook: Enriching profile cards with custom, organization-specific properties | In Development | |||
| Updated Features | Current Status | Update Type | ||
| Microsoft Defender for Office 365: ZAP Teams protection capabilities to Defender for Office Plan 1 | In Development | Status, Title, Description | ||
| Microsoft Copilot (Microsoft 365): Agent Mode in Word for Enhanced document editing | Rolling Out | Status | ||
| Microsoft Viva: Multilingual Support in Copilot for Viva Glint | Launched | Status | ||
| Microsoft Copilot (Microsoft 365): Microsoft 365 Copilot – your AI assistant in the GCCH environment | In Development | Description |
Items from the MessageCenter in Microsoft 365
| (Updated) Microsoft Teams Integration with Microsoft Defender for Office Tenant Allow/Block List for blocking domainsCategory:Microsoft Teams Microsoft Defender XDRNummer:MC1133508Status:stayInformed | Updated November 17, 2025: We have updated the timeline. Thank you for your patience. Introduction We’re introducing a new integration between Microsoft Teams and Microsoft Defender for Office 365 that enables security admins to manage blocked external domains in Teams using the Tenant Allow/Block List (TABL) in the Microsoft Defender portal. This feature enhances security by allowing organizations to centrally manage domain blocks across Microsoft 365 services. This capability is available to customers with Microsoft Defender for Office 365 Plan 1 or Plan 2 and Microsoft Teams. This message is associated with Microsoft 365 Roadmap ID 492985. When this will happen Targeted Release: We will begin rolling out late August 2025 and expect to complete by early September 2025. General Availability (Worldwide): We will begin rolling out early January 2026 (previously late September 2025) and expect to complete by end of January 2026 (previously early October 2025). How this affects your organization Security admins, with permission from Teams admins, will be able to:
View and manage blocked domains for Teams in the Microsoft Defender portal: This change does not affect existing federation configurations or domain blocks set in the Teams admin center.
What you can do to prepare To enable this feature –
Enable security team access to manage blocked domains in the Teams admin center: Compliance considerations
| ||||||||||||
| (Updated) Microsoft Purview | Insider Risk Management – Personal email triggersCategory:Microsoft PurviewNummer:MC1147381Status:stayInformed | Updated September 9, 2025: We have updated the timeline. Thank you for your patience. [Introduction] To enhance detection capabilities in Insider Risk Management (IRM), we’re adding two new email indicators as triggers for data exfiltration activities. These indicators help identify potential data leaks when users send business-sensitive attachments to personal or public email domains. This update supports stronger data protection and aligns with customer feedback requesting broader coverage of email-based risks. This message is associated with Microsoft 365 Roadmap ID 496149. [When this will happen:]General Availability (Worldwide, GCC, GCC High, GCC DoD): Rollout will begin in early December 2025 (previously early September) and is expected to complete by late December 2025 (previously late September). [How this affects your organization:]
No compliance considerations identified, review as appropriate for your organization. | ||||||||||||
| (Updated) Microsoft Teams: User reporting for incorrectly identified security concernsCategory:Microsoft Teams Microsoft Defender XDRNummer:MC1147984Status:stayInformed | Updated November 17, 2025: The rollout of “Report incorrect security detection in Microsoft teams is expected to finish by the end of November 2025 for General Availability (Worldwide). The previously announced update to make “Report incorrect security detections” settings in Messaging settings in Teams admin center On by default has been postponed to early 2026. A separate communication will be issued detailing the roll out schedule for the default-on change in advance. Introduction Microsoft Teams now enables users to report messages they believe were incorrectly flagged as security threats in chats and channels. This capability is available to organizations with Microsoft Defender for Office 365 Plan 2 or Microsoft Defender XDR. It empowers users to provide feedback on false positives, helping improve detection accuracy and strengthen organizational security. This feature will be available across Microsoft Teams on Android, Desktop (Windows), iOS, Mac, and Web platforms, ensuring broad accessibility for users regardless of device. This feature is associated with Microsoft 365 Roadmap ID 501202. When this will happen Targeted Release (Worldwide): Begins in early September 2025; expected completion by mid-September 2025. General Availability (Worldwide): Begins in early November 2025; expected completion by end of November 2025 (previously mid-November). How this affects your organization Users will be able to report messages they believe contain URLs that were incorrectly flagged as malicious:
What you can do to prepare To enable this feature and ensure reported messages appear in the User reported tab in Submissions:
Both settings must be turned on for full functionality. Learn more: [Updated documentation to be made available on Microsoft Learn in the second week of September 2025.] Compliance considerations
| ||||||||||||
| (Updated) Microsoft Teams: Malicious URL Protection for Teams Chat and ChannelsCategory:Microsoft TeamsNummer:MC1148539Status:preventOrFixIssue | Updated November 17, 2025: The rollout of Malicious URL Protection in Microsoft Teams is expected to finish before the end of November 2025 for General Availability (Worldwide). The previously announced update to make Malicious URL protection setting in Messaging settings ON by default has been postponed to early 2026. A separate communication will be issued detailing the roll out schedule for the default-on change in advance.
Introduction Microsoft Teams is introducing enhanced protection against phishing attacks by detecting and warning users about malicious URLs shared in Teams chats and channels. This feature helps users make safer decisions before clicking potentially harmful links. This message applies to Teams for Windows desktop, Teams for Mac desktop, Teams for the web, and Teams for iOS/Android. This message is associated with Roadmap ID 499893. When this will happen
How this affects your organization When a malicious link is detected, Teams will automatically display a warning to both the sender and recipient. This helps reduce the risk of phishing attacks.
Targeted release vs. General Availability behavior:
What you can do to prepare During Public Preview, administrators must manually enable the feature:
This setting is also available via No action is required once the feature reaches General Availability, as it will be turned on by default. Learn more: Malicious URL Protection in Microsoft Teams Compliance considerations
Reminder: General Availability begins November 3 and complete by end of November. At GA, “Scan messages for unsafe URLs” will default to ON as previously mentioned, and link protection will apply if any participant in a conversation has it enabled. To use a different setting, go to Teams admin center → Messaging settings → Scan messages for unsafe URLs, select your preference, and click Save before GA. Note: Simply viewing the page without saving will not override the default, but settings already saved during Targeted Release will persist. | ||||||||||||
| (Updated) New file protection in Teams chat and channels blocks unsafe contentCategory:Microsoft TeamsNummer:MC1148540Status:preventOrFixIssue | Updated November 17, 2025: The rollout of Weaponizable file type protection in Microsoft Teams is expected to finish before the end of November 2025 for General Availability (Worldwide). The previously announced update to make Weaponizable file protection setting in Messaging settings ON by default has been postponed to early 2026. A separate communication will be issued detailing the roll out schedule for the default-on change in advance. Introduction Microsoft Teams is introducing a new protection feature that blocks messages containing weaponizable file types—such as executables—in chats and channels. This helps reduce the risk of malware and file-based attacks by preventing unsafe content from being shared. This message applies to Teams for Windows desktop, Teams for Mac desktop, Teams for the web, and Teams for iOS/Android. This message is associated with Roadmap ID 499892. When this will happen General Availability begins November 3 and will complete by end of November. At GA, “Scan messages for file types that are not allowed” will default to ON, and protection will apply if any participant in a conversation has it enabled. To use a different setting, go to Teams admin center → Messaging settings → Scan messages for file types that are not allowed, select your preference, and click Save before GA. Note: Simply viewing the page without saving will not override the default, but settings already saved during Targeted Release will persist.
How this affects your organization Once enabled, Teams will automatically block messages that include weaponizable file types. This applies to both internal and external conversations.
Targeted release vs. General Availability behavior:
What you can do to prepare Admins can enable this protection in the Teams Admin Center:
Alternatively, use PowerShell with the Once enabled, all users in your tenant will begin seeing file protection applied in their messages. Blocked file types include:
Learn more: Compliance considerations
| ||||||||||||
| (Updated) New policy setting to require explicit consent for recording and transcription in Teams 1:1 callsCategory:Microsoft TeamsNummer:MC1163766Status:planForChange | Updated November 17, 2025: We have updated the timeline. Thank you for your patience. [Introduction] To enhance transparency and user control, Microsoft Teams is expanding the Explicit Recording Consent feature to include 1:1 Teams calls. This update ensures that participants must provide explicit consent before their media (audio, video, and content sharing) is included in any recording or transcription initiated by another user. This change supports privacy compliance and aligns with customer feedback requesting more granular consent controls. This message is associated with Roadmap ID 503295. [When this will happen:]
Who is affected:
What will happen:
PowerShell commands: Set-CsTeamsCallingPolicy -Identity Global -ExplicitRecordingConsent "Enabled" Set-CsTeamsCallingPolicy -Identity Global -ExplicitRecordingConsent "Disabled" Learn more: Set-CsTeamsCallingPolicy documentation [Compliance considerations:]
| ||||||||||||
| (Updated) Microsoft Custom engine agents: Introducing file upload supportCategory:Microsoft Copilot (Microsoft 365)Nummer:MC1179162Status:stayInformed | Updated November 17, 2025: We have updated the timeline. Thank you for your patience. Custom engine agents (CEA) are specialized agentic solutions that can be built using any large language model (LLM), toolchain, or orchestration framework, and are tailored to specific domain or tenant workflows. These agents can be created using either Microsoft Copilot Studio or the Agents Toolkit. File upload support is already available in Microsoft 365 Copilot Business Chat. We’re now extending this capability to Custom engine agents, enabling users to upload files stored locally or in OneDrive directly to agents. Once uploaded, agents can access the file for a short duration and respond to user queries based on its contents. This update aligns with customer feedback requesting more flexible input options for agent interactions. [When this will happen:] General Availability (Worldwide): Rollout will begin in mid-December 2025 (previously early November) and is expected to complete by late December 2025 (previously late November). [How this affects your organization:]
[What you can do to prepare:]
Learn more: Custom engine agents for Microsoft 365 overview | Microsoft Learn [Compliance considerations:]
| ||||||||||||
| (Update)Microsoft Purview DLP and Edge for Business: Inline data security controls for more unmanaged GenAI apps in EdgeCategory:Microsoft PurviewNummer:MC1182684Status:stayInformed | Updated November 17, 2025: We have updated the timeline. Thank you for your patience. [Introduction:] We are expanding inline protections for uploads in Microsoft Edge for Business to cover more unmanaged consumer generative AI (GenAI) apps. With this update, admins can apply Microsoft Purview collection policies and Purview Data Loss Prevention (DLP) policies to detect and prevent sensitive data sharing in the Edge browser when users interact with these additional unmanaged app locations. Inline protections are built directly into Edge for Business and work for users on Intune-managed Windows devices. This enhancement complements existing capabilities, giving organizations greater flexibility to enforce data security controls across a broader set of GenAI apps. This message is associated with Microsoft 365 Roadmap ID 518643. [When this will happen:]
[How this affects your organization:] Who is affected:
[What you can do to prepare:] No action is required to enable this feature. To learn more or update your policies, review the following resources:
[Compliance considerations:]
| ||||||||||||
| (Updated) Microsoft Purview DLP and Edge for Business: Inline data protection for file uploads to unmanaged GenAI appsCategory:Microsoft PurviewNummer:MC1183007Status:stayInformed | Updated November 17, 2025: We have updated the timeline. Thank you for your patience. [Introduction:] We are introducing inline file upload protection for Microsoft Edge for Business to help prevent data leakage when users upload files to consumer generative AI (GenAI) apps in the browser. This complements the existing text upload protections available today for unmanaged GenAI apps and can be layered with Endpoint DLP protections. With this update, admins can detect and enforce inline protections on file uploads in Edge for Business. Policies can target file-specific conditions such as file size, file type, and sensitive information types, enabling organizations to audit or block activities for users on Intune-managed Windows devices. This message is associated with Microsoft 365 Roadmap ID 518642. [When this will happen:]
[How this affects your organization:]
[What you can do to prepare:]
Learn more:
[Compliance considerations:]
| ||||||||||||
| Generate Word, Excel, and PowerPoint documents from agents built from Copilot Studio lite in Microsoft 365 CopilotCategory:Microsoft Copilot (Microsoft 365)Nummer:MC1186365Status:stayInformed | [Introduction] Starting November 17, 2025, agents created in Copilot Studio lite within Microsoft 365 Copilot will be able to generate Word, Excel, and PowerPoint content. This capability is part of the “Generate documents, charts, and code” skillset (formerly known as Code Interpreter), designed to help users complete common tasks more efficiently. These skills were first introduced in Microsoft 365 Copilot in October and are now extending to agents—bringing the same powerful creation tools into custom workflows. This message is associated with Roadmap ID 506753. [When this will happen:] General Availability (Worldwide): Rollout begins mid-November 2025 and is expected to complete by early December 2025. [How this will affect your organization:] Who is affected:
What will happen:
[What you can do to prepare:]
[Compliance considerations:] No compliance considerations identified, review as appropriate for your organization. | ||||||||||||
| Windows Office Hours: November 20, 2025Category:WindowsNummer:MC1187243Status:stayInformed | If you are an IT admin with questions about managing and updating Windows, we want to help. Every third Thursday of the month, we host a live chat-based event on the Tech Community called Windows Office Hours. Members of the Windows, Microsoft Intune, Windows Autopilot, Windows Autopatch, and Windows 365 engineering teams will be standing by to answer your questions. We also have experts from FastTrack, the Customer Acceleration Team, and Microsoft public sector teams. Want to attend the November 20 session of Office Hours? Add it to your calendar and select Attend on the event page to let us know you’re coming. There is no video or live meeting component. Simply visit the event page, log in to the Tech Community, and leave your questions in the Comments section. You can also bookmark https://aka.ms/Windows/OfficeHours for upcoming dates (and the ability to add this event to your calendar). We look forward to helping you. | ||||||||||||
| Dataverse – Dataverse Model Context Protocol (MCP) Server general availabilityCategory:Microsoft DataverseNummer:MC1187276Status:stayInformed | We are announcing the general availability of Dataverse Model Context Protocol (MCP) Server. The Dataverse MCP Server has been available in preview since May 2025 and will reach general availability to all regions on December 15, 2025. How does this affect me? With this release we are introducing advanced governance capabilities and new productivity tools for the Dataverse MCP Server integrated with Microsoft Copilot Studio, Visual Studio Code, and Claude Desktop. Additionally, new billing policies will apply for the Dataverse MCP Server as it reaches general availability. Key Updates:
This message is for awareness, and no action is required. We recommend reviewing these updates and adjusting your configurations to ensure continued access and compliance with the new governance model. For more information, please review the blog post Dataverse MCP Server: A Game Changer for AI-Driven Workflows. | ||||||||||||
| New update to address issue affecting organizations with Windows 10 devices enrolled on Extended Security Updates (ESU) Category:WindowsNummer:MC1187343Status:preventOrFixIssue | Microsoft has identified an issue where some Windows 10, version 22H2 devices enrolled in Extended Security Updates (ESU) for commercial customers might fail to install the November 2025 security update (KB5068781) with error 0x800f0922 (CBS_E_INSTALLERS_FAILED). This issue is isolated to devices whose Windows OS licenses were activated via Windows subscription activation through the Microsoft 365 admin center. The organizations affected by this issue can resolve it by installing KB5072653: Extended Security Updates (ESU) Licensing Preparation Package for Windows 10, which was released on November 17, 2025. Once you install this preparation package (KB5072653), you will be able to deploy the November 2025 security update (KB5068781). Note: A new Scan Cab including metadata for KB5072653 will be available in the near future for organizations that utilize cab files for compliance update checks. We will update this announcement once the new Scan Cab is available. | ||||||||||||
| Dynamics 365 Contact Center – Resolve issues autonomously with Customer Intent AgentCategory:Dynamics 365 AppsNummer:MC1187356Status:stayInformed | We are announcing the ability to enable fully autonomous, real-time, multichannel customer support by leveraging the Customer Intent Agent’s advanced AI capabilities in Dynamics 365 Contact Center. This feature will reach general availability on November 30, 2025. How does this affect me? Customer Intent Agent is part of the autonomous service agent suite and uses a consumption-based billing model on top of your base license for Dynamics 365 Contact Center. When enabled, Customer Intent Agent analyzes your existing support conversations and cases to automatically build an intent library. After the agent discovers intents, you can create a Customer Intent Agent in Copilot Studio. It uses your intent library to ask follow-up questions, provide knowledge articles, or take actions to resolve customer issues. What action do I need to take? This message is for awareness, and no action is required. If you would like more information on this feature, please visit Resolve issues autonomously with Customer Intent Agent. |





