Microsoft Secure Score will add a new recommendation to block outbound traffic from mshta.exe in Microsoft Defender for Endpoint, starting public preview in late March 2026. This reduces risk from attacks using mshta.exe, requires admin action to enable, and impacts compliance monitoring and data access.
Introduction
To help organizations strengthen endpoint security and reduce exposure to common attack techniques, we’re introducing a new Microsoft Secure Score recommendation in Microsoft Defender for Endpoint (MDE). This recommendation focuses on blocking outbound traffic from mshta.exe, a legitimate Windows binary that is frequently abused by attackers to execute malicious scripts. Implementing this recommendation helps reduce risk from living-off-the-land binary (LOLBIN) attacks and improves your overall security posture.
When this will happen
How this affects your organization
Who is affected
Admins managing Microsoft Defender for Endpoint and Microsoft Secure Score.
What will happen

Why this matters
What you can do to prepare
Learn more: Microsoft Secure Score | Microsoft Defender XDR | Microsoft Defender | Microsoft Learn
Compliance considerations
| Question | Answer |
|---|---|
| Does the change alter how existing customer data is processed, stored, or accessed? | Yes. Blocking outbound traffic from mshta.exe may prevent certain scripts or applications from accessing external resources. |
| Does the change alter how admins can monitor, report on, or demonstrate compliance activities? | Yes. Microsoft Secure Score will reflect the implementation status of the new recommendation. |
| Does the change include an admin control, and can it be controlled through Entra ID group membership? | Yes. Admins must explicitly implement the recommendation in Microsoft Defender for Endpoint. |