The previous practice, in which AI note-takers and recording bots could slip into Microsoft Teams meetings almost unnoticed, ends in May 2026. With roadmap ID 558107, Microsoft is introducing a technical hurdle that prevents the unconscious admission of automated third-party participants (3P bots).
As an administrator, you must understand this update as a critical security anchor, as it returns sovereignty over the audio and data stream directly into the hands of the organizer. Previously, external bots were often displayed as ordinary guests in the lobby.
A careless click on "Allow all" was enough to grant an AI full access to the spoken word and shared content. This created significant compliance gaps, as the data processing of these bots usually takes place on servers outside of your controlled M365 tenant.
Identification: The bot is unmasked
The first line of defense is visual labeling. Microsoft is implementing a detection logic that clearly identifies 3P bots as early as the waiting area (lobby). Instead of a generic participant name, the organizer now sees an explicit marking as "Bot" or "Automated Service". This transparency is the technical necessity to strengthen human decision-making competence. The organizer no longer has to guess whether "AI-Notetaker-24" is a legitimate guest or a tool.
The end of "Allow all"
The actual lever against shadow recording is the process change during entry. Even if an organizer uses the "Allow all" function, the system will exempt bots from this. These remain isolated in the lobby. This causality ensures that a separate, conscious approval must occur for each bot. A bot can therefore no longer enter the meeting "in the slipstream" of human participants. For you as an admin, this means a massive relief in the enforcement of Data Loss Prevention strategies (DLP), as the risk of accidental data leakage is minimized.
Implementation in the Admin Center
Although the feature is rolled out natively in the Teams client, you control the framework conditions via the Teams Admin Center. You should check whether your lobby policies are configured so that external participants generally have to wait.
- Open the Microsoft Teams Admin Center.
- Navigate to Settings & Policies > Meetings > Meeting Settings.
- Check the option "Who can bypass the lobby" under Meeting participation and lobby.

If you have set this to "EVERYONE", you are bypassing part of the protective effect. The recommended setting is "People in my organization" to ensure that every external party, whether human or machine, must go through the new identification logic.

Rollout Schedule and Platforms
The feature is currently under development and will be rolled out according to the following plan:
- Start of rollout: May 2026
- Platforms: Windows, Mac, iOS, Android
- Cloud instances: Worldwide (Standard Multi-Tenant) and GCC
Compliance Audit via PowerShell
Before you can effectively use the new bot identification (Roadmap ID 558107), your local system must be prepared. Without the current Microsoft Teams module, you run the risk that newer policy parameters will not be correctly recognized.
1. Preparing the environment
First, we ensure that the necessary module is installed and that your system's execution policies allow scripting in the first place.
# Installation des Microsoft Teams Moduls (falls noch nicht geschehen)
Install-Module -Name MicrosoftTeams -AllowClobber -Force
# Setzen der Execution Policy, um lokale Skripte ausführen zu können
Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope CurrentUser2. Audit of Lobby Settings (The Check)
Once the connection is established, you identify the vulnerabilities. Bot identification in the lobby is useless if the lobby is completely bypassed by the "Everyone" setting. This would allow the bot to enter the meeting before the security logic can take effect.
# Modul Installation & Verbindung zum Microsoft Teams Admin Center herstellen
Connect-MicrosoftTeams
# Alle Besprechungsrichtlinien abrufen und relevante Felder filtern
$MeetingPolicies = Get-CsTeamsMeetingPolicy | Select-Object Identity, AutoAdmittedUsers, AllowExternalParticipantGiveRequestControl
Write-Host "--- Audit der Teams Lobby-Einstellungen ---" -ForegroundColor Cyan
foreach ($Policy in $MeetingPolicies) {
# Wir suchen nach Richtlinien, die "Everyone" oder "Anonymous" den direkten Zutritt erlauben
if ($Policy.AutoAdmittedUsers -eq "Everyone" -or $Policy.AutoAdmittedUsers -eq "EveryoneInSameAndFederatedOrganizations") {
Write-Host "WARNUNG: Die Richtlinie '$($Policy.Identity)' ist unsicher konfiguriert!" -ForegroundColor Red
Write-Host "Aktueller Wert für AutoAdmittedUsers: $($Policy.AutoAdmittedUsers)"
Write-Host "Empfehlung: Ändere diesen Wert auf 'OrganizersOnly' oder 'EveryoneInCompany'." -ForegroundColor Yellow
Write-Host "-------------------------------------------"
} else {
Write-Host "Sicher: Die Richtlinie '$($Policy.Identity)' erzwingt eine Lobby für Externe." -ForegroundColor Green
}
}3. Hardening the Policies (The Implementation)
If you have identified an insecure policy, you must actively adjust it. This is the only way to ensure that every bot will be forced into the waiting area in May 2026 and require explicit approval by the organizer.
Through this sequence -> Installation, Audit, and targeted Implementation - you do not rely on Microsoft's default settings but actively shape your security architecture. The technical necessity arises from the risk of uncontrolled data leakage: a bot that bypasses the lobby begins recording immediately. With these steps, you ensure that the "gatekeeper" moment of Roadmap 558107 actually takes place in your tenant.
# Korrektur einer unsicheren Richtlinie (Beispiel: Global)
# Wir setzen den Wert auf 'EveryoneInCompany', damit Externe (und Bots) in die Lobby müssen.
Set-CsTeamsMeetingPolicy -Identity Global -AutoAdmittedUsers "EveryoneInCompany"
# Verifizierung der Änderung
Get-CsTeamsMeetingPolicy -Identity Global | Select-Object Identity, AutoAdmittedUsersCritical Evaluation
Technically speaking, Roadmap ID 558107 is the long-overdue response to the proliferation of LLM-based third-party tools. From an IT security perspective, "Explicit Admission" is a blessing. It prevents audio streams from flowing into third-party systems without an explicit opt-in, where they could be used for training models or analysis by unauthorized parties.
One downside remains the User Experience (UX). In meetings with high fluctuation, the additional click for the bot will be perceived as disruptive. This is where your role as a communicator is required: you must convey to users that this click is not an obstacle, but a digital firewall.
Particularly in industries with high protection requirements (law, medicine, finance), this update is without alternative. It replaces tedious app blocklists, which hardly stood a chance against constantly appearing new bot providers anyway. Control shifts from the static blocklist to the dynamic real-time decision of the person in charge.
Sei der Erste und starte die Diskussion mit einem hilfreichen Beitrag.
Kommentar hinterlassen
Dein Beitrag wird vor der Veröffentlichung kurz geprüft — fachlich, respektvoll und auf den Punkt ist hier genau richtig.