What and Who
To enhance the security and integrity of Microsoft Teams meetings, we are introducing a new feature that validates Teams meeting join URLs. This update helps ensure that meeting links are not altered or rewritten by security products in ways that could render them unusable or flagged as malicious.
Rollout Schedule
- Worldwide: September 30, 2025
- GCC, GCC High, DoD: November 30, 2025
Impact on Your Organization
- Who is affected:
- Organizations using security products that inspect or rewrite URLs, and users who join Microsoft Teams meetings via meeting links.
- What will happen:
- Microsoft Teams will validate join URLs to ensure they have not been modified.
- If a join URL is rewritten or altered by a security product, it may be marked as malicious.
- Users may be prevented from joining meetings if URLs are not in their original format.
- This feature is enabled by default and does not require admin configuration.
Action Required/Recommendations
- Ensure that your security products do not rewrite Microsoft Teams meeting join URLs.
- Whitelist Microsoft Teams join URLs in your security software.
- Review your organization’s URL rewriting or inspection policies before the rollout date.
- Communicate this change to your helpdesk and security teams.
Compliance Considerations
No compliance considerations identified, review as appropriate for your organization.
Source: Microsoft
Latest Posts
- Amazon RDS for PostgreSQL supports minor versions 17.6, 16.10, 15.14, 14.19, and 13.22
- Noise suppression for dial-in participants in Teams audio conferences [MC1135397]
- Microsoft Teams | Manage voice and face recognition for rooms (MTR-W/MTRA) via device settings [MC1135396]
- Reporting labels retirement in Teams admin center [MC1135399]
Good to know Microsoft is addressing the problem of broken meeting links due to URL rewriting. We’ve run into this before with email security tools, so this validation feature should reduce a lot of user frustration.
It would be nice it the post included the teams join URLs.
This validation change is overdue—we’ve seen a 300% spike in phishing via fake ‘rescheduled meeting’ links. For hybrid teams, ensure your Conditional Access policies now explicitly block legacy meeting IDs. Microsoft’s docs miss one critical detail: EDU tenants must also update SharePoint SafeLinks policies to scan in-meeting file shares. Rolling this out ASAP