Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft to Launch New Secure Default Settings for Exchange and Teams APIs

Microsoft to Launch New Secure Default Settings for Exchange and Teams APIs

Posted on October 2, 2025October 2, 2025 By CWS

Microsoft is updating its safety insurance policies to require administrator consent for brand new third-party functions in search of entry to Alternate and Groups content material.

These “Safe by Default” adjustments, set to roll out from late October to late November 2025, purpose to boost tenant safety by giving directors larger management over information entry.

This replace is a key part of the Microsoft Safe Future Initiative (SFI), which prioritizes safety by default throughout Microsoft’s product ecosystem. The adjustments align with business greatest practices by hardening the safety posture of Microsoft 365 tenants.

This transfer follows an identical safety enhancement carried out for SharePoint and OneDrive, which blocked legacy protocols and mandated admin consent for third-party apps accessing recordsdata.

By extending this method to Alternate and Groups, Microsoft continues its effort to systematically consider and enhance default safety settings, making certain that buyer information is protected against unauthorized entry. The adjustments will probably be utilized with out requiring any extra licensing.

How the Adjustments Have an effect on App Entry

The core of this replace entails modifying the Microsoft-managed default consent coverage. For organizations utilizing this coverage, any new third-party software requesting permissions to entry Alternate and Groups information by way of Microsoft Graph, Alternate Net Providers (EWS), Alternate ActiveSync (EAS), POP3, and IMAP4 would require express approval from an administrator.

You will need to observe that this transformation won’t affect functions which have already been granted consent by customers; these apps will proceed to perform with out interruption for these current customers.

Nonetheless, if a brand new person makes an attempt to authorize an app or an current app requests new permissions, it should set off the admin consent requirement. Organizations which have already configured customized person consent insurance policies won’t be affected by this replace.

To make sure a clean transition, Microsoft advises directors to take a number of preparatory steps. Admins ought to start by assessing their present surroundings and reviewing the permissions of current third-party functions that entry Alternate mail, calendars, contacts, and Groups chat or assembly information.

It’s extremely beneficial to configure the admin consent workflow, which permits customers to formally request approval for an software. With out this workflow, customers could have no mechanism to request entry.

For vital functions which are already trusted, directors can create granular app entry insurance policies upfront to stop any service interruptions.

Lastly, speaking these upcoming adjustments to IT groups, app house owners, and safety personnel, in addition to updating inner onboarding documentation, will probably be essential for managing the brand new course of successfully.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:APIs, Default, Exchange, Launch, Microsoft, Secure, settings, Teams

Post navigation

Previous Post: Top 10 Best Digital Risk Protection (DRP) Platforms in 2025
Next Post: Top 10 Best Brand Protection Solutions For Enterprises in 2025

Related Posts

New Salty 2FA PhaaS platform Attacking Microsoft 365 Users to Steal Login Credentials New Salty 2FA PhaaS platform Attacking Microsoft 365 Users to Steal Login Credentials Cyber Security News
Autonomous Bot Exploits GitHub Actions in Major Cyber Attack Autonomous Bot Exploits GitHub Actions in Major Cyber Attack Cyber Security News
BlueNoroff Hackers Weaponize Zoom App to Attack System Using Infostealer Malware BlueNoroff Hackers Weaponize Zoom App to Attack System Using Infostealer Malware Cyber Security News
Researchers Detailed Techniques to Detect Outlook NotDoor Backdoor Malware Researchers Detailed Techniques to Detect Outlook NotDoor Backdoor Malware Cyber Security News
Nippon Steel Solutions 0-Day Network Vulnerability Exposes Users’ Personal Information Nippon Steel Solutions 0-Day Network Vulnerability Exposes Users’ Personal Information Cyber Security News
Critical Vulnerability in Paloalto Cortex XDR Broker Critical Vulnerability in Paloalto Cortex XDR Broker Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark