Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Linus Torvalds Says AI Bug Reports Have Made Linux Security
May 18, 2026
Malicious npm Packages Steal SSH, Cloud & Crypto Four Keys
May 18, 2026
CISA Warns: Microsoft Exchange Vulnerability Exploited
May 18, 2026
Home/CyberSecurity News/Microsoft Teams: New Option to Flag Malicious Messages
CyberSecurity News

Microsoft Teams: New Option to Flag Malicious Messages

Microsoft is significantly expanding threat detection capabilities within Microsoft Teams by enabling Defender for Office 365 Plan 1 users to directly report suspicious messages. This update, tracked...

Sarah simpson
Sarah simpson
February 10, 2026 2 Min Read
5 0

Microsoft is significantly expanding threat detection capabilities within Microsoft Teams by enabling Defender for Office 365 Plan 1 users to directly report suspicious messages.

This update, tracked under Roadmap ID 531760, marks a shift in Microsoft’s security strategy by democratizing threat intelligence gathering, a feature previously reserved only for higher-tier Plan 2 subscribers.

According to an update released on February 9, 2026, this rollout addresses the growing necessity to secure collaboration platforms as aggressively as email environments.

With the lines between internal communication and external threats blurring, empowering end-users to act as the first line of defense has become a critical component of a robust security posture.

Previously, the ability to report messages within Teams, whether in direct chats, channels, or meeting logs, was exclusive to organizations with Defender for Office 365 Plan 2. This left Plan 1 environments relying solely on automated backend protections without the benefit of real-time user feedback.

The new update unifies this experience. Once the rollout is complete in late March 2026, Plan 1 users will be able to tag messages in two distinct categories:

  • Security Risk: For content suspected of being phishing, malware, or spam.
  • Not a Security Risk: For legitimate messages that were incorrectly flagged by automated filters (false positives).

These user-generated signals are vital for security operations centers (SOCs). They provide immediate visibility into potential breaches and help train Microsoft’s detection algorithms to better recognize nuance in conversational attacks, such as business email compromise (BEC) attempts launched via chat.

While this feature enhances security, it requires administrative action to function. Microsoft has emphasized that the reporting capability is an opt-in feature. It respects the existing “User-reported” settings within the organization’s configuration.

To prepare for the mid-March launch, security administrators should navigate to the Microsoft Defender portal. By enabling the “User reported” settings, the toggles for Teams reporting will automatically activate.

Reports submitted by users will subsequently flow into the “User reported” page in the Defender portal or to a specific mailbox configured by the IT team, allowing for centralized triage and investigation.

This move arrives at a time when attackers are increasingly pivoting away from traditional email phishing toward collaboration tools. Platforms like Teams are often viewed as “trusted spaces” by employees, making them susceptible to social engineering attacks.

By integrating user feedback directly into the Defender detection loop, organizations can respond faster to campaigns that bypass automated filters.

Security teams are advised to update their internal documentation and communicate these changes to staff, ensuring employees know how and when to flag suspicious activity when the feature goes live next month.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachMalwarephishingSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Threat Actor Leaks WormGPT Database: Cybercrime AI

Next Post

Fancy Bear Exploits Microsoft Zero-Day for Back Hackers Exploiting

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Windows ‘MiniPlasma’ Zero-Day Grants SYSTEM Access
May 18, 2026
Critical WordPress Plugin Flaw Allows Authentication Bypass Attacks
May 18, 2026
Fast16 Malware Sabotaged Nuclear Weapons Simulation Data
May 18, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us