Microsoft Defender Enhances Security with URL Click Alerts for Microsoft Teams


Microsoft is expanding its threat detection capabilities by extending Microsoft Defender for Office 365 (MDO) URL click alerting into Microsoft Teams.

This critical update allows security teams to detect, investigate, and respond to potentially malicious link clicks within Teams messages, expanding threat monitoring beyond traditional email vectors.

By surfacing these alerts, organizations can identify threats earlier and prevent lateral movement.​​

Key Feature Enhancements

With this integration, two existing MDO alerts will seamlessly trigger for Teams messages:

  • A user clicked through to a potentially malicious URL.​
  • A potentially malicious URL click was detected.​

These alerts surface directly on the Microsoft Defender alerts page alongside standard email alerts.

To provide richer context, the alerts include the specific Teams message as investigation evidence, reducing the need for analysts to switch platforms.

Teams signals will also be natively included in incident correlation, automatically linking related threat activity across environments.​

According to researcher Steven Lim, this automated integration requires no workflow changes for end users but significantly boosts the efficiency of Security Operations Center (SOC) teams.

Note that Automated Investigation and Response (AIR) is not currently supported for these specific Teams alerts.​​

Affected CategoryDescription and Eligibility Requirements
Eligible LicensesOrganizations licensed for Microsoft Defender for Office 365 Plan 2 or Microsoft 365 E5 ​.
Security TeamsSecurity admins and SOC analysts monitoring alerts in the Microsoft Defender portal ​.
End UsersIndividuals sending or receiving Microsoft Teams messages containing embedded URLs ​.
System StatusThe feature is enabled by default for all eligible tenants; no manual activation is required ​.

Organizations should begin reviewing incident response playbooks to accommodate these new Teams-based signals.

The official rollout follows a structured timeline based on the organization’s tenant type.​​

Release PhaseRollout Start DateExpected Completion Date
Public Preview (Worldwide)Late February 2026Early March 2026 ​
General Availability (Worldwide)Early March 2026Mid-March 2026 ​
General Availability (GCC, GCCH, DoD)Early May 2026Late May 2026 ​

For proactive threat hunting, security teams can utilize Advanced Hunting in Microsoft Defender XDR to track these specific alerts.

Below is a sample Kusto Query Language (KQL) query to identify recent Teams-related malicious URL clicks:

textAlertEvidence
| where Timestamp > ago(1h)
| where ServiceSource == @"Microsoft Defender for Office 365"
| where EntityType == @"Url"
| where Title has "Teams"

Custom detection triggered -> Email Notification -> SecOps Teams Channel / Monitoring Email

Action Items for Security Teams

To ensure a smooth transition, security administrators should complete several preparation steps:

  • Update existing SOC documentation to include Microsoft Teams message analysis.​
  • Inform internal security analysts about the new alerting mechanism to handle potential escalations.​
  • Integrate the provided KQL query into custom detection rules to automate SecOps notifications.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link