- Microsoft plans to block legacy authentication protocols in Microsoft 365 starting mid-July 2025.
- The change affects applications and access via SharePoint, OneDrive, and Office, strengthening security by default.
- Administrator consent will be required for third-party applications to access sites and files.
- These measures are aligned with Microsoft's Secure Future initiative and seek to strengthen security in enterprise environments.
Next July 2025 will mark a relevant point in the Evolution of Microsoft security policies in the Windows 11 environmentThe company has confirmed the arrival of a An update specifically focused on strengthening the protection of its cloud platforms, including Microsoft 365, OneDrive, and SharePoint. This move responds to the need for establish new barriers against growing threats, such as unauthorized access and identity theft attempts, adapting to the today's demanding standards.
The deployment of these changes will affect organizations and business users globally and falls under the umbrella of the 'Microsoft Secure Future Initiative' (SFI). The stated objective is harden the default defense posture, eliminating traditional access methods and protocols considered vulnerable and that do not meet modern authentication criteria.
New blocks for access via old protocols

From mid-July 2025, Microsoft will begin enabling access restriction by default for all Microsoft 365 tenants. using outdated authentication protocols. Among those affected are the Relying Party Suite (RPS) protocol used for browser access to SharePoint and OneDrive, and the FrontPage Remote Procedure Call (FPRPC) protocol, primarily used for remotely opening and editing Office files. The main reason is that both methods facilitate brute force or phishing attacks. for not incorporating modern authentication mechanisms.
The use of these protocols will no longer be available. once the update is applied, which means that administrators and users will need to review their tools and work processes to avoid interruptions. Microsoft suggests migrating to options that use modern authentication, such as OAuth 2.0 and other current standards, to maintain operational continuity and benefit from a significantly higher level of security.
Administrator consent for third-party applications
Another notable change is that, after the implementation of the new default values, Users will not be able to grant permission directly to external applications to access files and sites within the Microsoft 365 environment. Explicit administrator intervention or approval will be required to authorize these accesses. With this setting, The company seeks to avoid accidental overexposure of sensitive information and strengthen centralized control over business data.
In addition, they have been presented New consent policies managed by Microsoft, which restrict users' ability to authorize external connections until they've been approved by IT managers. For specific needs, administrators can define more detailed rules for specific groups, based on the organization's operational needs.
Other news and context within Windows 11

This shift toward enhanced security is not an isolated one. Microsoft has been working for months implementing additional measures such as disabling ActiveX controls in Microsoft 365 and Office 2024 apps, as well as the introduction of features aimed at preventing screenshots from being taken in Microsoft Teams. This comprehensive strategy seeks to reduce the risk of data exposure and minimize the attack surface. in enterprise environments using Windows 11 and the 365 ecosystem.
The update scheduled for July 2025 will be automatic and It will not require additional licenses or prior intervention by administrators, although it is advisable to review internal systems and procedures to adapt to the new access requirements.
The modifications that Microsoft is preparing for this summer focus on eliminate risks associated with legacy technologiesThe transition to modern authentication methods and strict permission management for external applications are key aspects of the new approach, aimed at addressing an increasingly sophisticated threat landscape. Businesses and users still relying on legacy procedures will need to update their tools and workflows to avoid access issues and benefit from more robust protection.
I am a technology enthusiast who has turned his "geek" interests into a profession. I have spent more than 10 years of my life using cutting-edge technology and tinkering with all kinds of programs out of pure curiosity. Now I have specialized in computer technology and video games. This is because for more than 5 years I have been writing for various websites on technology and video games, creating articles that seek to give you the information you need in a language that is understandable to everyone.
If you have any questions, my knowledge ranges from everything related to the Windows operating system as well as Android for mobile phones. And my commitment is to you, I am always willing to spend a few minutes and help you resolve any questions you may have in this internet world.