Microsoft will soon begin to activate an additional layer of fraud protection in Teams calls aimed at reducing the attempts to subside marks: those trickery in which an unknown person impersonates as a bank, an administration or a supplier to obtain data or money. The company has announced that this new function, baptized as Brand Impersonation Protection, will start to reach the launch ring directed in mid-February and will be activated by default for users.
In practice, the tool analyzes incoming VoIP calls from external contacts with which there has been no prior interaction and seeks signals that indicate a possible imitation of a known brand. When you detect a high risk, the system shows a warning before the call is served, so that the person can decide whether to accept, block or end the communication. Microsoft also warns that, if suspicious signals persist, such warnings can be kept visible during the call.

The aim is to stop social engineering techniques that exploit trust in legitimate companies or institutions to manipulate victims. This type of fraud is often based on the appearance of a so-called "official" to request passwords, verification codes or transfers. When warning the user in the first external contact, the function aims to cut the attack before it takes effect.
Microsoft describes the novelty in the Microsoft 365 message center, where it explains that this protection strengthens the identification of the caller and the security of the tenant against external contacts that have not interacted before with the organization. You can consult the official statement at the Microsoft management center 365.
Although protection is enabled without the need for administrative intervention, Microsoft recommends preparing support teams and internal responders for questions that may arise: when users start seeing "high risk" messages in their calls, they usually contact the helpdesk to confirm whether it is a false positive or a real threat. Updating internal documentation and user-care guides will avoid confusion and allow a quick response.
Brand Impersonation Protection comes at a time when Microsoft is by default expanding other barriers against malicious content in Teams. At the beginning of the year the platform activated automatic mechanisms to detect malicious URL, block file types that can be used as vectors and facilitate reporting of false positives. In addition, the company works on warnings for suspicious traffic managers from external domains as part of a major strategy to protect cloud collaboration. More details about Teams' vision and plans were collected on the official blog following the presentation on Enterprise Connect, where Microsoft also recalled that its service exceeds hundreds of millions of users per month; you can read that entry in the Microsoft Tech Community.
From the technical and operational point of view, this function extends the already existing multi-layer approach against suplantations and phishing: do not supply URLs' mail and filtering solutions, but it acts in the domain of voice and calls, a vector that scammers increasingly exploit. If you want to deepen how Microsoft addresses spoofing and phishing as a whole, official documentation on anti-supplanting measures is a good starting point: Microsoft documentation on anti-spoofing.

For managers and security officials, the practical recommendation is twofold: on the one hand, inform users about what to expect when these warnings appear and how to react; on the other, monitor the first days of deployment to detect relevant false positive or call patterns that require additional adjustment or analysis. Since the protection is applied in "first contact," teams must review verification processes and external communication protocols so that legitimate interactions with partners or customers are not unnecessarily interrupted.
On the horizon, we know that threats are rapidly evolving and that phone-supplanting attacks combined with social engineering can be very harmful. The incorporation of such alerts into Teams' user experience shows how collaborative platforms are moving classic security controls to the unified communication environment. The key now will be the education of the user and the tuning of the signals he considers "suspicious," to avoid both real risk and excessive warning fatigue.
If you manage Teams environments, you should review Microsoft notes at the management center and plan a short internal communication to prepare employees and support. The combination of automatic technology and human consciousness is the best defense against those who try to take advantage of corporate confidence in seemingly legitimate calls.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...