Published Sep 5, 2025
Microsoft Teams will block messages containing unsafe, weaponizable file types in chats and channels starting November 3, 2025. This protection, enabled by default at General Availability, notifies senders and recipients when messages are blocked. Admins can configure settings via the Teams Admin Center or PowerShell.
Updated October 30, 2025: We have updated the content. Thank you for your patience.
Introduction
Microsoft Teams is introducing a new protection feature that blocks messages containing weaponizable file types—such as executables—in chats and channels. This helps reduce the risk of malware and file-based attacks by preventing unsafe content from being shared. This message applies to Teams for Windows desktop, Teams for Mac desktop, Teams for the web, and Teams for iOS/Android.
This message is associated with Roadmap ID 499892.
When this will happen
General Availability begins November 3 and will take 2-3 weeks to complete. At GA, "Scan messages for file types that are not allowed" will default to ON, and protection will apply if any participant in a conversation has it enabled.
To use a different setting, go to Teams admin center → Messaging settings → Scan messages for file types that are not allowed, select your preference, and click Save before GA.
Note: Simply viewing the page without saving will not override the default, but settings already saved during Targeted Release will persist.
How this affects your organization
Once enabled, Teams will automatically block messages that include weaponizable file types. This applies to both internal and external conversations.
Targeted release vs. General Availability behavior:
What you can do to prepare
Admins can enable this protection in the Teams Admin Center:
Alternatively, use PowerShell with the -FileTypeCheck parameter.
Once enabled, all users in your tenant will begin seeing file protection applied in their messages.
Blocked file types include:
ace, ani, apk, app, appx, arj, bat, cab, cmd, com, deb, dex, dll, docm, elf, exe, hta, img, iso, jar, jnlp, kext, lha, lib, library, lnk, lzh, macho, msc, msi, msix, msp, mst, pif, ppa, ppam, reg, rev, scf, scr, sct, sys, uif, vb, vbe, vbs, vxd, wsc, wsf, wsh, xll, xz, z
Learn more:
Compliance considerations
| Compliance Area | Explanation |
|---|---|
| Does the change modify how users can access, export, delete, or correct their personal data within Microsoft 365 services? | Blocked messages are not delivered, which may affect access to the original message content. Recipients of messages with disallowed file types will not receive the message or its attachments. |