Exchange Onlinetoc
Exchange Onlinetoc
Exchange Online
Article • 02/22/2023
Exchange Online is part of the Microsoft 365 and Office 365 suite of products.
End users - see Office help Assign admin Learn about the Exchange
and training permissions admin center
Microsoft Exchange Online is a cloud based messaging platform that delivers email,
calendar, contacts, and tasks. Users with an Exchange Online license connect to
Exchange Online through email and calendar clients like, Outlook desktop, Outlook on
the web and Outlook mobile app to access email and collaboration functionality,
including shared mailboxes, shared calendars and global address lists.
You get Exchange Online when you sign up for Microsoft 365 for business and Microsoft
365 for enterprise subscriptions.
1. Sign in to Microsoft 365 or Office 365 using your work or school account, and
then choose the Admin tile.
2. In the Microsoft 365 admin center, choose Admin centers > Exchange.
Not all settings will be available if you are using Azure AD groups to manage role
assignments.
To help you administer Exchange Online, assign users to the Exchange administrator
role.
Tip
Microsoft 365 admin center help: how to get started with the Microsoft 365 admin
center, reset passwords, and more.
Manage email and calendars: how to set up email, fix problems, and import email.
Exchange admin center in Exchange
Online
Article • 02/22/2023
) Important
Effective from December 2022, the classic Exchange Admin Center will be
deprecated for worldwide customers. Microsoft recommends using the new
Exchange Admin Center , if not already doing so.
While most of the features have been migrated to new EAC, some have been
migrated to other admin centers and remaining ones will soon be migrated to New
EAC. Find features that are not yet there in new EAC at Other Features or use
Global Search that will help you navigate across new EAC.
The new Exchange admin center (EAC) is a modern, web-based management console for
managing Exchange that is designed to provide an experience more in line with the
overall Microsoft 365 admin experience. It replaces the Exchange Control Panel (ECP) to
manage email settings for your organization.
To experience some of the new Exchange admin center features, see the following:
The new EAC offers actionable insights and includes reports for mail flow,
migration, and priority monitoring.
https://www.microsoft.com/en-us/videoplayer/embed/RWBuGX?
postJsllMsg=true
The new EAC includes a left navigation panel to make it easier to find features.
https://www.microsoft.com/en-us/videoplayer/embed/RWBuGF?
postJsllMsg=true
Recipient management is one of the most crucial tasks that admins perform. The
new EAC now includes easier mailbox management.
https://www.microsoft.com/en-us/videoplayer/embed/RWBGra?
postJsllMsg=true
The new EAC enables you to create and manage four types of groups: Microsoft
365 Groups, Distribution lists, Mail-enabled security groups, and Dynamic
distribution lists.
https://www.microsoft.com/en-us/videoplayer/embed/RWBJbk?
postJsllMsg=true
Migration capabilities
To understand the differences between Classic and new EAC, see Classic and New
Exchange admin center differences.
To explore features in new EAC, see New Exchange admin center.
To explore features in Classic EAC, see Classic Exchange admin center.
To get an update on the journey of the new EAC, see What's new in Exchange
admin center.
Supported browsers
See the following articles:
Microsoft 365 and Office resources : lists supported browsers for Microsoft 365,
Office 365, and the Exchange admin center.
Supported Browsers for Outlook on the web .
Related articles
Are you using Exchange Server? See Exchange admin center in Exchange Server.
Are you using standalone Exchange Online Protection (EOP)? See Exchange admin
center in Exchange Online Protection.
Differences between the Classic
Exchange admin center (Classic EAC)
and the new Exchange admin center
(new EAC) in Exchange Online
Article • 05/26/2023
The following are the differences between the Classic Exchange admin center (Classic
EAC) and the new Exchange admin center (new EAC).
In new EAC, they're merged together under Mailboxes. In Mailboxes page, you can
select Filter > User mailbox/Shared mailbox to view them. You can also sort them
by clicking Recipient type.
In new EAC, it is not available and is now a part of Microsoft Purview compliance
portal .
7 Note
The UI support for auditing and add-ins in the Exchange Admin Center (EAC)
will be discontinued. However, alternative solutions are available through
Commandlet workarounds. For detailed instructions on auditing, refer to the
Auditing reports in the Exchange admin center in Exchange Online.
Similarly, for add-ins, visit the Add-ins for Outlook in Exchange Online for
information on Commandlet alternatives.
Protection tab
In Classic EAC, it is available.
In new EAC, it is not available and is now a part of Microsoft 365 security center .
Migration
In Classic EAC, it is under Recipients.
In new EAC, it is available as a separate tab in the feature pane.
Permissions tab
In Classic EAC, it is available.
In new EAC, it is now known as Roles and is available in the feature pane.
View Alerts
In Classic EAC, it is not available.
In new EAC, it is a new addition and is available under Mail flow.
Related articles
Microsoft Purview compliance portal
The new Exchange admin center is simple and accessible, and it enables you to perform
tasks like restoring mailboxes, migrating data, and much more.
1. Sign in to Microsoft 365 or Office 365 using your work or school account.
You can also get to the new Exchange admin center directly by using the URL
https://admin.exchange.microsoft.com and signing in using your credentials.
7 Note
Be sure to use a private browsing session (not a regular session) to access the
Exchange admin center using the direct URL. This will prevent the credential that
you are currently logged on with from being used. To open an InPrivate Browsing
session in Microsoft Edge or an incognito window in Google Chrome, press
CTRL+SHIFT+N. To open an InPrivate Browsing session in Microsoft Edge Legacy,
Internet Explorer, or a Private Browsing session in Mozilla Firefox, press
CTRL+SHIFT+P.
New Exchange admin center features
Here's what the new Exchange admin center looks like.
Home page
You can personalize your home page by selecting a theme, setting your language, and
timezone from the Settings bubble.
1. To personalize your dashboard, click + Add card on top of the homepage and drag
any card onto the dashboard to the location you want.
2. To learn about the new updates in the new Exchange admin center, click What's
New?.
3. To sign out of the new Exchange admin center and sign in as a different user, click
My account tile. You can also sign in with another account.
4. To learn about the new Exchange admin center, in Training & guide, select
Training for admins for a video tutorial and Documentation.
6. To give feedback to help improve the new Exchange admin center, click . While
it's not necessary to provide your email ID, you can click You can contact me
about this feedback checkbox and provide your email ID to help the team to
resolve your concerns faster.
Feature pane
Here are the features available in the left-hand navigation.
Recipients View and manage your mailboxes (both user and shared mailboxes), groups,
resource mailboxes, and contacts.
Mail flow Trace messages, create rules, manage remote domains and accepted domains,
add connectors, manage alert, and alert policies.
Insights Use the recommendations to discover trends and/or insights, and take actions to
fix issues related to mailbox and mail flow.
7 Note
You can also access Classic Exchange admin center and Microsoft 365 admin
center, by selecting them at the bottom of left navigation panel.
Tabs
The tabs are your second level of navigation. Each of the feature areas contains various
tabs, each representing a complete feature.
Toolbar
When you click most tabs, you'll see a toolbar. The toolbar has icons that perform a
specific action.
List view
When you select a tab, in most cases you'll see a list view. The list view in the new
Exchange admin center is designed to remove limitations that existed in the Classic
Exchange admin center and Exchange Control Panel.
Details pane
When you select an item from the list view, information about that object is displayed in
the details pane.
To bulk edit several items: Select the objects you want to bulk edit, and use the options
in the toolbar.
Related articles
[Exchange Online]Exchange Online
Exchange admin center in Exchange Online
Differences between the Classic Exchange admin center (Classic EAC) and the new
Exchange admin center (new EAC)
Classic Exchange admin center in
Exchange Online
Article • 01/27/2023
) Important
Check out the new Exchange admin center! The experience is modern, intelligent,
and better. Personalize your dashboard, manage cross tenant migration, experience
the improved Groups feature, and more. Try it now !
1. Sign in to Microsoft 365 or Office 365 using your work or school account, and
then choose the Admin tile.
2. In the Microsoft 365 admin center, choose Admin centers > Exchange.
You can also get to the Classic Exchange admin center directly by using a URL. To do
this, go to https://outlook.office365.com/ecp and sign in using your credentials.
7 Note
Be sure to use a private browsing session (not a regular session) to access the
Exchange admin center using the direct URL. This will prevent the credential that
you are currently logged on with from being used. To open an InPrivate Browsing
session in Microsoft Edge or an incognito window in Google Chrome, press
CTRL+SHIFT+N. To open an InPrivate Browsing session in Microsoft Edge Legacy,
Internet Explorer, or a Private Browsing session in Mozilla Firefox, press
CTRL+SHIFT+P.
Feature pane
Here are the features you'll find in the left-hand navigation.
Recipients View and manage your mailboxes, groups, resource mailboxes, contacts, shared
mailboxes, and mailbox migrations.
Permissions Manage administrator roles, user roles, and Outlook on the web (formerly known
as Outlook Web App) policies.
Compliance Manage In-Place eDiscovery & Hold, auditing, data loss prevention (DLP),
management retention policies, retention tags, and journal rules.
Protection Manage malware filters, connection filters, content filters, outbound spam, and
quarantine for your organization.
Mail flow Manage rules, message tracing, accepted domains, remote domains, and
connectors.
Mobile Manage the mobile devices that you allow to connect to your organization. You
can manage mobile device access and mobile device mailbox policies.
Tabs
The tabs are your second level of navigation. Each of the feature areas contains various
tabs, each representing a complete feature.
Toolbar
When you click most tabs, you'll see a toolbar. The toolbar has icons that perform a
specific action.
List view
When you select a tab, in most cases you'll see a list view. The list view in the Classic
Exchange admin center is designed to remove limitations that existed in Exchange
Control Panel.
In Exchange Online, the viewable limit from within the Classic Exchange admin center list
view is approximately 10,000 objects. In addition, paging is included so you can page to
the results. In the Recipients list view, you can also configure page size and export the
data to a CSV file.
Details pane
When you select an item from the list view, information about that object is displayed in
the details pane.
To bulk edit several items: press the CTRL key, select the objects you want to bulk edit,
and use the options in the details pane.
Disable Help bubble: The Help bubble displays contextual help for fields when you
create or edit an object. You can turn off the Help bubble or turn it on if it has
been disabled.
Related articles
Exchange Online
We're continuously adding new features to the Exchange admin center (EAC); fixing
issues as we learn about them and making changes based on your feedback. On this
page, you can find highlights of all the recent changes we've made. Some features get
rolled out at different times to our customers, so if you are not seeing a new feature yet,
keep checking back.
For now, it is possible to switch back to the existing EAC (often called the "classic" EAC).
However, the classic EAC will be fully deprecated by September 2022.
September 2021
Here are some of the changes and new features we introduced in the modern EAC in
September 2021.
) Important
This change is for Worldwide (WW) only. It does not affect GCC, GCC-High, DoD, or
other Sovereign Clouds.
You can read more about the Classic EAC deprecation here: Deprecation of the classic
Exchange admin center in WW service - Microsoft Tech Community
August 2021
Here are some of the changes and new features we introduced in the modern EAC in
August 2021.
Currently, it has one customizable setting for admins; 'List view preference'. This setting
allows users to select the normal view or compact view as the preferred list view for the
entire EAC portal. Once the user selects either of the views, it is applied to all the list
pages in the new EAC.
Hide from GAL feature in resources
The Hide from GAL [Global Address List] feature in resources is now available. Click on
any of the resource mailboxes, and this feature setting can be found under General
settings.
July 2021
Here are some of the changes and new features we introduced in the modern EAC in
July 2021.
The recipient filter setting is non-editable from the new EAC. The admin will have to use
PowerShell to edit the member setting.
User and Shared Mailboxes: Click on any user/shared mailbox for which you want
to check the 'Hide from GAL' setting, click on 'Account' and then click on 'Manage
contact information' to edit the setting.
Groups: Hide from GAL functionality is available for all groups Hide from GAL
functionality is available in all four types of groups: Microsoft 365 Groups,
Distribution lists, Mail-enabled security groups, and Dynamic distribution lists. The
setting is available under the Settings tab of the groups.
June 2021
Here are some of the changes and new features we introduced in the modern EAC in
June 2021.
The GCC customers now have access to a new dashboard, new usability features, and
several intelligent reports to help them be more productive in their work.
May 2021
Here are some of the changes and new features we introduced in the modern EAC in
May 2021.
The new EAC now includes 15 extension attributes that you can use to add information
about a recipient, such as an employee ID, organizational unit (OU), or some other
custom value for which there isn't an existing attribute. You can use the EAC to manage
the attributes, and you don't need to build custom controls or write scripts to populate
and display these attributes.
Missing "Member of" attribute in mailboxes view
New EAC now offers a view of the Groups that a particular mailbox is a part of.
April 2021
You can read more about it here: Announcing General Availability of the new Exchange
admin center - Microsoft Tech Community
February 2021
Here are some of the changes and new features we introduced in the modern EAC in
February 2021.
Rules, Organization, and Public Folders from the classic EAC are now available in the
modern EAC. Admins can take actions on messages that flow through their Exchange
Online organization through Rules. They can set up organization relationships to share
calendar information with external business partners through Organization sharing. In
addition, admins can collect, organize, and share information with other people in their
workgroup or organization through Public Folders.
7 Note
Permissions granted via Azure Privileged Identity Management won't work for
Rules, Organization, or Public Folders in the modern EAC.
2. Another user
The new, modern EAC now has a View another mailbox option, which adjusts Inbox
rules and out-of-office messages on behalf of a user, without requiring that user to
grant full admin access to their mailboxes.
December 2020
Here are some of the changes and new features we introduced in the modern EAC in
December 2020.
The pivot experience (different pivots for different group types) makes groups
management even easier.
The membership list for dynamic distribution groups is calculated each time a message
is sent to the group, based on the filters and conditions that are defined.
Delivery management setting
This setting allows admins to manage who can send email to any group. The user can
define these settings once the group is created. This setting is available in all group
types.
September 2020
Here are some of the changes and new features we introduced in the modern EAC in
September 2020.
Microsoft 365 groups - Microsoft 365 groups are the recommended group type.
They allow for effective collaboration by providing group members a shared email
and a shared workplace.
Distribution groups - These are the most commonly used group type, and they
allow you to send email to all members of the distribution list.
Mail-enabled security groups - These groups give members access to various
resources like OneDrive, SharePoint, and various admin roles.
Administrators now have command over the group naming policy. They can now add
prefixes and suffixes for future groups that will be created, and they can block specific
words from being used in group names and aliases.
Administrators can now upgrade their distribution groups into the recommended
Microsoft 365 Groups (previously Microsoft 365 Groups) with a few clicks, as shown
below:
Opt-in/out
End-users now have a single-click opt-in toggle button, available in both the classic
Exchange admin center and in the new EAC. This button provides easy navigation
between the two portals, allowing users to switch to and explore the new portal
seamlessly.
Support Assistant
The admins can now get their queries resolved without going anywhere else. The
support assistant feature allows users to resolve the queries without leaving the EAC
window. In case the user is not satisfied with the provided solution, the user can even
raise a ticket and register their issues.
July 2020
Here are some of the changes and new features we introduced in the modern EAC in
July 2020.
Discover and understand some more trends related to mail flow in your Microsoft 365
or Office 365 organization. The following reports were already available in the Security
& Compliance Center but are now available in the EAC for added convenience.
Top domain mail-flow status report: To identify and troubleshoot domains with mail flow
issues. Learn more.
Queued messages report: To check those messages that are queued for more than 1
hour and were sent through connectors from your Microsoft cloud org. Learn more.
SMTP AUTH clients report: To check for unusual activity and TLS used by clients or
devices using SMTP AUTH. SMTP AUTH client submission protocol only offers basic
authentication and is a less-secure protocol used by devices, such as printers, to send
email messages. Learn more.
June 2020
Here are some of the changes and new features we introduced in the modern EAC in
June 2020.
Custom attributes
Admins can include 15 extension attributes that they can use to add information about a
recipient, such as an employee ID, organizational unit (OU), or some other custom value
for which there isn't an existing attribute.
Google Workspace (formerly G Suite) automation
Admins can migrate batches of users from Google Workspace to Microsoft 365. In order
to move the mailboxes from Google Workspace to Microsoft 365, there is a series of
steps that admins need to perform in Google Workspace in order to establish the
connection between the two environments. The new EAC aims to help the admins
automate those steps to make the process easier and more convenient.
May 2020
Here are some of the changes and new features we introduced in the modern EAC in
May 2020.
Export to .csv
Admins can now click on the Export button in the command bar to prepare a .csv file
lists all of the mailboxes residing in Exchange Online.
April 2020
Here are some of the changes and new features we introduced in the modern EAC in
April 2020.
Contacts
Admins now have a new experience when managing contacts for people outside the
organization. Admins can create and manage mail contacts and mail users with external
email addresses.
Column chooser
Admins can now customize the columns that appear in the EAC.
People picker for remote migration
A common request from our customers was to bring back the people picker for a
remote migration scenario. This helps admins to move the selected mailboxes to
Exchange Online.
Migration report: Learn about the status of the migration batches in your
Exchange environment.
Mail flow reports: Discover and understand trends related to mail flow in your
Microsoft 365 or Office 365 organization. These reports were already available in
the Security & Compliance Center, but are now available in the EAC for added
convenience.
Auto-forwarded messages: Monitor for potential data leaks when people in
your organization automatically forward email messages to an external domain,
such as a personal email address. Learn more.
Inbound & outbound messages details: Monitor message volume and TLS
encryption for each connector. Learn more.
Non-accepted domain: Display messages from your on-premises organization
where the sender's email domain isn't configured as an accepted domain in
Microsoft 365 or Office 365. Learn more.
Non-delivery report: Display the most commonly encountered error codes in
non-delivery reports (also known as NDRs or bounce messages) for your
message senders. Learn more.
Recoverable Items
Admins now have a new experience for finding recoverable items. With this feature,
items that were deleted from a user's mailbox can be recovered back to the inbox.
March 2020
Here are some of the changes and new features we introduced in the modern EAC in
March 2020.
Recipients
In the modern EAC, the user and shared mailbox management experiences are now
merged, and the mailbox list and properties are available on the same page. The option
to filter mailboxes based on type can be found on the top right.
Resources experience has been simplified for managing room and resource mailboxes.
Migration
Migration is now a first-class citizen under the Modern EAC and is no longer buried
inside the Recipient tab as it was in the classic EAC. The major feature additions to the
migration flow are:
The Exchange and Google Workspace migrations are now simple, wizard-based
experiences.
The Google Workspace migration supports migrating Calendar and Contact data
along with emails.
For Google Workspace migration, the 2 GB per mailbox per day restriction has
been removed.
Mail flow
The Mail flow Experience, which was a part of the Security and compliance portal, is now
returning to EAC. As a part of the experience, we have added the following features:
Accepted domains
Remote domains
Connectors
Want to access more features?
As the modern experience is being developed, we are providing deep links from the new
portal for users to move to the old portal for completing their work.
To access familiar features that were in the classic Exchange admin center, click on the
"More features" tab on the left nav and select the feature to open it in a new tab.
What's next?
We are working hard to create modern experiences for Exchange admins. Here are some
features that are coming soon:
Check out our Ignite blog entry where we detail the changes to the Exchange admin
center, and other Exchange Online improvements that we announced at Microsoft Ignite
2019.
Exchange Online in Microsoft 365 and Office 365 includes a large set of predefined
permissions, based on the Role Based Access Control (RBAC) permissions model, which
you can use right away to easily grant permissions to your administrators and users. You
can use the permissions features in Exchange Online so that you can get your new
organization up and running quickly.
RBAC is also the permissions model that's used in Microsoft Exchange Server. Most of
the links in this topic refer to topics that reference Exchange Server. The concepts in
those topics also apply to Exchange Online.
For information about permissions across Microsoft 365 or Office 365, see About admin
roles
7 Note
Several RBAC features and concepts aren't discussed in this topic because they're
advanced features. If the functionality discussed in this topic doesn't meet your
needs, and you want to further customize your permissions model, see
Understanding Role Based Access Control.
Role-based permissions
In Exchange Online, the permissions that you grant to administrators and users are
based on management roles. A management role defines the set of tasks that an
administrator or user can perform. For example, a management role called Mail
Recipients defines the tasks that someone can perform on a set of mailboxes, contacts,
and distribution groups. When a management role is assigned to an administrator or
user, that person is granted the permissions provided by the management role.
Administrative roles and end-user roles are the two types of management roles.
Following is a brief description of each type:
Exchange Online includes role groups that you can use to grant permissions. For more
information, see the next section.
7 Note
Role groups: Role groups enable you to grant permissions to administrators and
specialist users.
The following sections provide more information about role groups and role assignment
policies.
Role groups
Every administrator who manages Exchange Online must be assigned at least one or
more roles. Administrators might have more than one role because they may perform
job functions that span multiple areas in Exchange Online.
7 Note
It's possible to assign a role directly to a user without using a role group. However,
that method of role assignment is an advanced procedure and isn't covered in this
topic. We recommend that you use role groups to manage permissions.
The following figure shows the relationship between users, role groups, and roles.
Exchange Online includes several built-in role groups, each one providing permissions
to manage specific areas in Exchange Online. Some role groups may overlap with other
role groups. The following table lists each role group with a description of its use.
Compliance Management Members can configure and manage compliance Audit Logs
settings within Exchange in accordance with their Compliance
policies. Admin
Data Loss
Prevention
Information
Rights
Management
Journaling
Message
Tracking
Retention
Management
Transport
Rules
View-Only
Audit Logs
View-Only
Configuration
View-Only
Recipients
Discovery Management Members can perform searches of mailboxes in the Legal Hold
Exchange Online organization for data that meets Mailbox
specific criteria and can also configure legal holds on Search
mailboxes.
Help Desk Members can view and manage the configuration Reset
for individual recipients and view recipients in an Password
Exchange organization. Members of this role group User Options
can only manage the configuration each user can
manage on their own mailbox. View-Only
Recipients
View-Only
Recipients
E-Mail
By default, the Mailbox Search role is only assigned Address
to the Discovery Management role group Policies
Journaling
Legal Hold
Mail Enabled
Public
Folders
Mail
Recipient
Creation
Mail
Recipients
Mail Tips
Message
Tracking
Migration
Move
Mailboxes
Org Custom
Apps
Org
Marketplace
Apps
Organization
Client Access
Organization
Configuration
Organization
Transport
Settings
Public
Folders
Recipient
Policies
Remote and
Accepted
Role group Description Default roles
assigned
Domains
Reset
Password
Retention
Management
Role
Management
Security
Admin
Security
Group
Creation and
Membership
Security
Reader
Team
Mailboxes
Transport
Hygiene
Transport
Rules
UM
Mailboxes
UM Prompts
Unified
Messaging
User Options
View-Only
Audit Logs
View-Only
Configuration
View-Only
Recipients
Role group Description Default roles
assigned
Mail
Recipients
Message
Tracking
Migration
Move
Mailboxes
Recipient
Policies
Reset
Password
Team
Mailboxes
Records Management Members can configure compliance features, such Audit Logs
as retention policy tags, message classifications, and Journaling
mail flow rules (also known as transport rules).
Message
Tracking
Retention
Management
Transport
Rules
Unified
Messaging
View-Only Organization Members can view the properties of any object in View-Only
Management the Exchange Online organization. Configuration
View-Only
Recipients
If you work in a small organization that has only a few administrators, you might need to
add those administrators to the Organization Management role group only, and you
may never need to use the other role groups. If you work in a larger organization, you
might have administrators who perform specific tasks administering Exchange Online,
such as recipient configuration. In those cases, you might add one administrator to the
Recipient Management role group, and another administrator to the Organization
Management role group. Those administrators can then manage their specific areas of
Exchange Online, but they won't have permissions to manage areas they're not
responsible for.
If the built-in role groups in Exchange Online don't match the job function of your
administrators, you can create role groups and add roles to them. For more information,
see the Work with role groups section later in this topic.
Role assignment policies
Exchange Online provides role assignment policies so that you can control what settings
your users can configure on their own mailboxes and on distribution groups they own.
These settings include their display name, contact information, voice mail settings, and
distribution group membership.
Your Exchange Online organization can have multiple role assignment policies that
provide different levels of permissions for the different types of users in your
organizations. Some users can be allowed to change their address or create distribution
groups, while others can't, depending on the role assignment policy associated with
their mailbox. Role assignment policies are added directly to mailboxes, and each
mailbox can only be associated with one role assignment policy at a time.
Of the role assignment policies in your organization, one is marked as default. The
default role assignment policy is associated with new mailboxes that aren't explicitly
assigned a specific role assignment policy when they're created. The default role
assignment policy should contain the permissions that should be applied to the majority
of your mailboxes.
Permissions are added to role assignment policies using end-user roles. End-user roles
begin with My and grant permissions for users to manage only their mailbox or
distribution groups they own. They can't be used to manage any other mailbox. Only
end-user roles can be assigned to role assignment policies.
When an end-user role is assigned to a role assignment policy, all of the mailboxes
associated with that role assignment policy receive the permissions granted by the role.
This enables you to add or remove permissions to sets of users without having to
configure individual mailboxes. The following figure shows:
End-user roles are assigned to role assignment policies. Role assignment policies
can share the same end-user roles. For details about the end-user roles that are
available in Exchange Online, see Role assignment policies in Exchange Online.
Role assignment policies are associated with mailboxes. Each mailbox can only be
associated with one role assignment policy.
After a mailbox is associated with a role assignment policy, the end-user roles are
applied to that mailbox. The permissions granted by the roles are granted to the
user of the mailbox.
The Default Role Assignment Policy role assignment policy is included with Exchange
Online. As the name implies, it's the default role assignment policy. If you want to
change the permissions provided by this role assignment policy, or if you want to create
role assignment policies, see Work with role assignment policies later in this topic.
7 Note
The user that was used to create your Microsoft 365 or Office 365 organization is
automatically assigned to the Global administrator Microsoft 365 or Office 365 role.
The following table lists the Microsoft 365 or Office 365 roles and the Exchange Online
role group they correspond to.
For a description of the Exchange Online role groups, see the table "Built-in role groups"
in Role groups.
In Microsoft 365 or Office 365, when you add a user to either the Global administrator
or Password administrator roles, the user is granted the rights provided by the
respective Exchange Online role group. Other Microsoft 365 or Office 365 roles don't
have a corresponding Exchange Online role group and won't grant administrative
permissions in Exchange Online. For more information about assigning a Microsoft 365
or Office 365 role to a user, see Assign admin roles.
Users can be granted administrative rights in Exchange Online without adding them to
Microsoft 365 or Office 365 roles. This is done by adding the user as a member of an
Exchange Online role group. When a user is added directly to an Exchange Online role
group, they'll receive the permissions granted by that role group in Exchange Online.
However, they won't be granted any permissions to other Microsoft 365 or Office 365
components. They'll have administrative permissions only in Exchange Online. Users can
be added to any of the role groups listed in the "Built-in role groups table" in Role
groups with the exception of the Company Administrator and Help Desk Administrators
role groups. For more information about adding a user directly to an Exchange Online
role group, see Work with role groups.
Work with role groups
To manage your permissions using role groups in Exchange Online, we recommend that
you use the EAC. When you use the EAC to manage role groups, you can add and
remove roles and members, create role groups, and copy role groups with a few clicks
of your mouse. The EAC provides simple dialog boxes, such as the Add role group
dialog box, shown in the following figure, to perform these tasks.
Exchange Online includes several role groups that separate permissions into specific
administrative areas. If these existing role groups provide the permissions your
administrators need to manage your Exchange Online organization, you need only add
your administrators as members of the appropriate role groups. After you add
administrators to a role group, they can administer the features that relate to that role
group. To add or remove members to or from a role group, open the role group in the
EAC, and then add or remove members from the membership list. For a list of built-in
role groups, see the table "Built-in role groups" in Role groups.
) Important
After you create the role group, you manage it like any other role group.
If there's an existing role group that has some, but not all, of the permissions you need,
you can copy it and then make changes to create a role group. You can copy an existing
role group and make changes to it, without affecting the original role group. As part of
copying the role group, you can add a new name and description, add and remove roles
to and from the new role group, and add new members. When you create or copy a role
group, you use the same dialog box that's shown in the preceding figure.
Existing role groups can also be modified. You can add and remove roles from existing
role groups, and add and remove members from it at the same time, using an EAC
dialog box similar to the one in the preceding figure. By adding and removing roles to
and from role groups, you turn on and off administrative features for members of that
role group.
7 Note
Although you can change which roles are assigned to built-in role groups, we
recommend that you copy built-in role groups, modify the role group copy, and
then add members to the role group copy. > The Company Administrator and Help
Desk administrator role groups can't be copied or changed.
Join or leave distribution groups that allow members to manage their own
membership.
View and modify basic mailbox settings on their own mailbox, such as Inbox rules,
spelling behavior, junk mail settings, and Microsoft ActiveSync devices.
Modify their contact information, such as work address and phone number, mobile
phone number, and pager number.
Create, modify, or view text message settings.
View or modify voice mail settings.
View and modify their marketplace apps.
Create team mailboxes and connect them to Microsoft SharePoint lists.
Create, modify, or view email subscription settings, such as message format and
protocol defaults.
If you want to add or remove permissions from the Default Role Assignment Policy or
any other role assignment policy, you can use the EAC. The dialog box you use is similar
to the one in the preceding figure. When you open the role assignment policy in the
EAC, select the check box next to the roles you want to assign to it or clear the check
box next to the roles you want to remove. The change you make to the role assignment
policy is applied to every mailbox associated with it.
If you want to assign different end-user permissions to the various types of users in your
organization, you can create role assignment policies. When you create a role
assignment policy, you see a dialog box similar to the one in the preceding figure. You
can specify a new name for the role assignment policy, and then select the roles you
want to assign to the role assignment policy. After you create a role assignment policy,
you can associate it with mailboxes using the EAC.
If you want to change which role assignment policy is the default, you must use
Exchange Online PowerShell. When you change the default role assignment policy, any
mailboxes that are created will be associated with the new default role assignment
policy if one wasn't explicitly specified. The role assignment policy associated with
existing mailboxes doesn't change when you select a new default role assignment
policy.
7 Note
If you select a check box for a role that has child roles, the check boxes for the child
roles are also selected. If you clear the check box for a role with child roles, the
check boxes for the child roles are also cleared.
For detailed role assignment policy procedures, see Role assignment policies in
Exchange Online.
Permissions documentation
The following table contains links to topics that will help you learn about and manage
permissions in Exchange Online.
Topic Description
Understanding Learn about each of the components that make up RBAC and how you can
Role Based create advanced permissions models if role groups and management roles
Access Control aren't enough.
Manage role Configure permissions for Exchange Online administrators and specialist users
groups in using role groups, including adding and removing members to and from role
Exchange groups.
Online
Role Configure which features end users have access to on their mailboxes using role
assignment assignment policies, view, create, modify, and remove role assignment policies,
policies in specify the default role assignment policy, and apply role assignment policies to
Exchange mailboxes.
Online
Feature Learn more about the permissions required to manage Exchange Online features
permissions in and services.
Exchange
Online
Feature permissions in Exchange Online
Article • 02/22/2023
The permissions required to perform tasks to manage Microsoft Exchange Online vary
depending on the procedure being performed or the cmdlet you want to run.
For information about Exchange Online Protection (EOP) permissions, see Feature
Permissions in EOP.
To find out what permissions you need to perform the procedure or run the cmdlet, do
the following:
1. In the table below, find the feature that is most related to the procedure you want
to perform or the cmdlet you want to run.
2. Next, look at the permissions required for the feature. You must be assigned one
of those role groups, an equivalent custom role group, or an equivalent
management role. You can also click on a role group to see its management roles.
If a feature lists more than one role group, you only need to be assigned one of
the role groups to use the feature. For more information about role groups and
management roles, see Understanding Role Based Access Control.
7 Note
You must be assigned the Role Management management role to run the
Get-ManagementRoleAssignment cmdlet. If you don't have permissions to
run the Get-ManagementRoleAssignment cmdlet, ask your Exchange
administrator to retrieve the role groups or management roles assigned to
you.
If you want to delegate the ability to manage a feature to another user, see Delegate
role assignments.
Notes:
Records Management
Help Desk
Records Management
View reports Organization Management: Users have access to mailbox reports and mail
protection reports.
View-Only Organization Management: Users have access to mailbox reports.
Compliance Management: Users have access to mail protection reports and data
loss prevention (DLP) reports (if their subscription has DLP capabilities).
7 Note
To find the permissions that are required to run any Exchange Online cmdlet, see
Find the permissions required to run any Exchange cmdlet.
Manage role groups in Exchange Online
Article • 02/22/2023
A role group is a special kind of universal security group (USG) that's used in the Role
Based Access Control (RBAC) permissions model in Exchange Online. Management role
groups simplify the assignment and maintenance of permissions to users in Exchange
Online. The members of the role group are assigned the same set of roles, and you add
and remove permissions from users by adding them to or removing them from the role
group. For more information about role groups in Exchange Online, see Permissions in
Exchange Online.
To open the Exchange admin center (EAC), see Exchange admin center in Exchange
Online. To open Exchange Online PowerShell, see Connect to Exchange Online
PowerShell.
The procedures in this topic require the Role Management RBAC role in Exchange
Online. Typically, you get this permission via membership in the Organization
Management role group (the Microsoft 365 or Office 365 Global administrator
role).
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at:
Exchange Online, or Exchange Online Protection .
2. Select a role group. The details pane shows the Name, Description, Assigned
roles, Members, Managed by, and Write scope of the role group. You can also see
this information by clicking Edit .
PowerShell
PowerShell
Get-RoleGroup
This example returns detailed information for the role group named Recipient
Administrators.
PowerShell
This example returns all role groups where the user Julia is a member. You need to use
the DistinguishedName (DN) value for Julia, which you can find by running the
command: Get-User -Identity Julia | Format-List DistinguishedName .
PowerShell
2. In the Add role group window, under Set up the basics section, configure the
following settings and click Next:
Write scope: The default value is Default, but you can also select a custom
recipient write scope from the drop-down list.
3. In Add permissions section, select the roles and click Next. Roles define the scope
of the tasks that the members assigned to this role group have permission to
manage.
4. In Assign admins section, select the users to assign to this role group and click
Next. They'll have permissions to manage the roles that you assigned.
5. In Review role group and finish section, verify all the details, and then click Add
role group.
6. Click Done.
2. In the New role group window that appears, configure the following settings:
Roles: Click Add to select the roles that you want to be assigned to the
role group in the new window that appears.
Members: Click Add to select the members that you want to add to the
role group in the new window that appears. You can select users, mail-
enabled universal security groups (USGs), or other role groups (security
principals).
PowerShell
The Roles parameter specifies the management roles to assign to the role group by
using the following syntax "Role1","Role1",..."RoleN" . You can see the available
roles by using the Get-ManagementRole cmdlet.
The Members parameter specifies the members of the role group by using the
following syntax: "Member1","Member2",..."MemberN" . You can specify users, mail-
enabled universal security groups (USGs), or other role groups (security principals).
The ManagedBy parameter specifies the delegates who can modify and remove the
role group by using the following syntax: "Delegate1","Delegate2",..."DelegateN" .
Note that this setting isn't available in the EAC.
The CustomRecipientWriteScope parameter specifies the existing custom recipient
write scope to apply to the role group. You can see the available custom recipient
write scopes by using the Get-ManagementScope cmdlet.
This example creates a new role group named "Limited Recipient Management" with the
following settings:
The Mail Recipients and Mail Enabled Public Folders roles are assigned to the role
group.
The users Kim and Martin are added as members. Because no custom recipient
write scope was specified, Kim and Martin can manage any recipient in the
organization.
PowerShell
This is the same example with a custom recipient write scope, which means Kim and
Martin can only manage recipients that are included in the Seattle Recipients scope
(recipients who have their City property set to the value Seattle).
PowerShell
2. Select the role group that you want to copy and then click Copy role group.
3. In the Copy role group window, under Set up the basics section, configure the
following settings and click Next:
Name: The default value is "Copy of <Role Group Name>, but you can enter a
unique name for the role group.
Description: The existing description is present, but you can change it.
Write scope: The existing write scope is selected, but you can select Default
or a custom recipient write scope from the drop-down list.
4. In Edit permissions section, modify the roles and click Next. Roles define the scope
of the tasks that the members assigned to this role group have permission to
manage.
5. In Assign admins section, modify the role group membership and click Next.
They'll have permissions to manage the roles that you assigned.
6. In Review role group and finish section, verify all the details, and then click Copy
role group.
7. Click Done.
2. Select the role group that you want to copy and then click Copy .
3. In the New role group window that appears, configure the following settings:
Name: The default value is "Copy of <Role Group Name>, but you can enter a
unique name for the role group.
Description: The existing description is present, but you can change it.
Write scope: The existing write scope is selected, but you can select Default
or another custom recipient write scope that you've already created.
Roles: Click Add or Remove to modify the roles that are assigned to the
role group.
PowerShell
PowerShell
The Members parameter specifies the members of the role group by using
the following syntax: "Member1","Member2",..."MemberN" . You can specify
users, mail-enabled universal security groups (USGs), or other role groups
(security principals).
The ManagedBy parameter specifies the delegates who can modify and
remove the role group by using the following syntax:
"Delegate1","Delegate2",..."DelegateN" . Note that this setting isn't available
in the EAC.
The CustomRecipientWriteScope parameter specifies the existing custom
recipient write scope to apply to the role group. You can see the available
custom recipient write scopes by using the Get-ManagementScope cmdlet.
This example copies the Organization Management role group to the new role group
named "Limited Organization Management". The role group members are Isabelle,
Carter, and Lukas and the role group delegates are Jenny and Katie.
PowerShell
This example copies the Organization Management role group to the new role group
called Vancouver Organization Management with the Vancouver Users recipient custom
recipient write scope.
PowerShell
In General section, click Edit basics to change the name and description.
In Assigned section, add/delete users from this role group.
In Permissions section, add/remove roles assigned to the role group.
The same options are available when you modify role groups as when you Use the
Classic EAC to create role groups. You can:
Notes:
You can't use the Classic EAC to modify the write scope, roles, and members of a
role group if you've used Exchange Online PowerShell to configure multiple scopes
or exclusive scopes on the role group. To modify the settings of these role groups,
you need to use Exchange Online PowerShell.
Some role groups (for example, the Organization Management role group) restrict
the roles that you can remove from group.
You can add or remove delegates to a role group in the Classic EAC. You can only
use Exchange Online PowerShell.
The role assignment name is created automatically if you don't specify one.
If you don't use the RecipientRelativeWriteScope parameter, the implicit read scope
and implicit write scope of the role is applied to the role assignment.
If a predefined scope meets your business requirements, you can use the
RecipientRelativeWriteScope parameter to apply the scope to the role assignment.
To apply a custom recipient write scope, use the CustomRecipientWriteScope
parameter.
This example assigns the Transport Rules management role to the Seattle Compliance
role group.
PowerShell
This example assigns the Message Tracking role to the Enterprise Support role group
and applies the Organization predefined scope.
PowerShell
This example assigns the Message Tracking role to the Seattle Recipient Admins role
group and applies the Seattle Recipients scope.
PowerShell
PowerShell
To remove regular role assignments that grant permissions to users, use the value
$false for the Delegating parameter.
To remove delegating role assignments that allow the role to be assigned to others,
use the value $true for the Delegating parameter.
This example removes the Distribution Groups role from the Seattle Recipient
Administrators role group.
PowerShell
The implicit scope from the roles themselves. This means you didn't specify any
custom scopes when you created the role group, or you set the value of all role
assignments in an existing role group to the value $null .
The same custom scope for all role assignments.
Different custom scopes for each individual role assignment.
To set the scope on all of the role assignments on a role group at the same time, use the
following syntax:
PowerShell
Get-ManagementRoleAssignment -RoleAssignee "<Role Group Name>" | Set-
ManagementRoleAssignment [-CustomRecipientWriteScope "<Recipient Write Scope
Name>"] [-RecipientRelativeScopeWriteScope <MyDistributionGroups |
Organization | Self>] [-ExclusiveRecipientWriteScope "<Exclusive Recipient
Write Scope name>"]
This example changes the recipient scope for all role assignments on the Sales Recipient
Management role group to Direct Sales Employees.
PowerShell
To change the scope on an individual role assignment between a role group and a
management role, do the following steps:
1. Replace <Role Group Name> with the name of the role group and run the
following command to find the names of all the role assignments on the role
group:
PowerShell
2. Find the name of the role assignment you want to change. Use the name of the
role assignment in the next step.
3. To set the scope on the individual role assignment, use the following syntax:
PowerShell
This example changes the recipient scope for the role assignment named Mail
Recipients_Sales Recipient Management to All Sales Employees.
PowerShell
Set-ManagementRoleAssignment "Mail Recipients_Sales Recipient
Management" -CustomRecipientWriteScope "All Sales Employees"
To modify the list of delegates in a role group, use the following syntax:
PowerShell
To replace the existing list of delegates with the values you specify, use the
following syntax: "Delegate1","Delegate2",..."DelegateN" .
To selectively modify the existing list of delegates, use the following syntax:
@{Add="Delegate1","Delegate2"...; Remove="Delegate3","Delegate4"...} .
This example replaces all current delegates of the Help Desk role group with the
specified users.
PowerShell
This example adds Daigoro Akai and removes Valeria Barrio from the list of delegates on
the Help Desk role group.
PowerShell
The members of a role group can be users, mail-enabled universal security groups
(USGs), or other role groups (security principals).
PowerShell
To replace the existing list of members with the values you specify, use the
following syntax: "Member1","Member2",..."MemberN" .
To selectively modify the existing list of members, use the following syntax:
@{Add="Member1","Member2"...; Remove="Member3","Member4"...} .
This example replaces all current members of the Help Desk role group with the
specified users.
PowerShell
This example adds Daigoro Akai and removes Valeria Barrio from the list of members on
the Help Desk role group.
PowerShell
Notes:
When you remove a role group, the management role assignments between the
role group and the management roles are deleted. Any management roles that are
assigned to the role group aren't deleted.
If a user depends on the role group for access to a feature, the user will no longer
have access to the feature after you delete the role group.
PowerShell
PowerShell
This example removes the Vancouver Recipient Administrators role group. Because the
user running the command isn't defined in the ManagedBy property of the role group,
the BypassSecurityGroupManagerCheck switch is required in the command. The user
that's running the command is assigned the Role Management role, which enables the
user to bypass the security group manager check.
PowerShell
A role assignment policy is a collection of one or more end-user roles that enable users
to manage their mailbox settings and distribution groups in Exchange Online. End-users
roles are part of the role based access control (RBAC) permissions model in Exchange
Online. You can assign different role assignment policies to different users to allow or
prevent specific self-management features in Exchange Online. For more information,
see Role assignment policies.
In Exchange Online, a default role assignment policy named Default Role Assignment
Policy is specified by the mailbox plan that's assigned to users when their account is
licensed. For more information about mailbox plans, see Mailbox plans in Exchange
Online.
7 Note
Currently User roles and Outlook Web App policies are not available in new
Exchange admin center.
Role assignment policies are how end-user roles (as opposed to management roles) are
assigned to users in Exchange Online. There are several ways you can use role
assignment policies to assign permissions to users:
New users:
Change the end-user roles that are assigned to the default role assignment
policy.
Create a custom role assignment policy and set it as the default. Note that this
method only affects mailboxes that you create without specifying a role
assignment policy or assigning a license (the license specifies the mailbox plan,
which specifies the role assignment policy).
Specify a custom role assignment policy in the mailbox plan. For more
information, see Use Exchange Online PowerShell to modify mailbox plans.
Existing users:
Assign a different license to the user. This will apply the settings of the different
mailbox plan, which specifies the role assignment policy to apply.
The available end-user roles that you can assign to mailbox plans are described in the
following table:
MyProfileInformation Yes Edit their first name, middle initial, last name,
and display name in the GAL.
This role contains the following child roles:
*
This feature isn't available in all regions or organizations.
The procedures in this topic require the Role Management RBAC role in Exchange
Online. Typically, you get this permission via membership in the Organization
Management role group (the Microsoft 365 or Office 365 Global administrator
role). For more information, see Manage role groups in Exchange Online.
To open the Exchange admin center (EAC), see Exchange admin center in Exchange
Online. To connect to Exchange Online PowerShell, see Connect to Exchange
Online PowerShell.
Changes to permissions take effect after the user logs out and logs in again.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
PowerShell
This example returns the roles that are assigned to the policy named Default Role
Assignment Policy.
PowerShell
Note: To return a list of all available end-user roles, run the following command:
PowerShell
2. In the policy properties window that opens, do one of the following steps:
To add a role, select the check box next to the role.
If you select a check box for a role that has child roles, the check boxes for the
child roles are also selected. If you clear the check box of the parent role, the check
boxes for the child roles are also cleared. You can select a child role by clearing the
check box of the parent role and then selecting the individual child role.
PowerShell
This example adds the role MyMailboxDelegation to the role assignment policy named
Default Role Assignment Policy.
PowerShell
2. To remove the role from the role assignment policy, use this syntax:
PowerShell
This example removes the MyDistributionGroups role from the role assignment
policy named Default Role Assignment Policy.
PowerShell
2. In the new role assignment policy window that opens, configure the following
settings:
PowerShell
PowerShell
You can only use Exchange Online PowerShell to specify the default role assignment
policy that's applied to new mailboxes that aren't assigned a license or a role
assignment policy when they're created.
Otherwise, all you can do in the EAC or Exchange Online PowerShell is modify the name
and description of the role assignment policy.
PowerShell
This example configures Contoso Users as the default role assignment policy.
PowerShell
You can't remove a role assignment policy that's assigned to mailboxes. Use the
procedures described in the Use Exchange Online PowerShell to modify role assignment
policy assignments on mailboxes section to replace the role assignment policy that's
assigned to mailboxes.
PowerShell
This example removes the role assignment policy named Contoso Managers.
PowerShell
2. In the mailbox properties window that opens, click Mailbox features. The role
assignment policy is shown in the Role assignment policy field.
PowerShell
This example returns the role assignment policy for the mailbox named Pedro Pizarro.
PowerShell
To return all mailboxes that have a specific role assignment policy assigned, use the
following syntax:
PowerShell
PowerShell
This example returns all mailboxes that have the role assignment policy named Contoso
Managers assigned.
PowerShell
PowerShell
$Mgrs | where {$_.RoleAssignmentPolicy -eq 'Contoso Managers'}
Individual mailboxes: Select the mailbox > click Edit > click Mailbox features in
the window that opens > click the dropdown next to Role assignment policy >
select a new role assignment policy > click Save.
Multiple mailboxes: Select multiple mailboxes of the same type (for example,
User) by selecting a mailbox, holding down the Shift key, and select another
mailbox farther down in the list or by holding down the CTRL key as you select
each mailbox. In the details pane (that's now titled Bulk Edit): click More options >
click Update under Role Assignment Policy > select the role assignment policy in
the window that appears > click Save.
PowerShell
This example applies the role assignment policy named Contoso Managers to the
mailbox named Pedro Pizarro.
PowerShell
Get-Mailbox -Identity "Pedro Pizarro" -RoleAssignmentPolicy "
<RoleAssignmentPolicyName>"
To change the assignment for all mailboxes that have a specific role assignment policy
assigned, use the following syntax:
PowerShell
PowerShell
This example changes the role assignment policy from Default Role Assignment Policy
to Contoso Staff for all mailboxes that currently have Default Role Assignment Policy
assigned.
PowerShell
PowerShell
This article will guide you through using granular and scalable, resource-scoped access
control: Role Based Access Control (RBAC) for Applications in Exchange Online.
Overview
RBAC for Applications in Exchange Online allows admins to grant permissions to an
application that's independently accessing data in Exchange Online. This grant can be
paired with a scope of access (resource scope) to specify which mailboxes an app can
access. This feature extends the current RBAC model in Exchange Online and it replaces
Application Access Policies.
At the core of this system is the management role assignment configuration, which
expresses an admin's intent to allow a principal to access data. In this case, allowing an
app to perform some role against a set of target resources. For example an admin might
configure a room booking system with access to calendar data only in specific regions
using a Management Scope. See the diagram below illustrating the role assignment
model:
Configuration Instructions
The following steps will guide you to create these Application RBAC assignments:
Management Scopes
Management scopes allow an admin to scope a set of mailboxes based on the
properties of these objects. Refer to the Management Scope documentation for add,
remove, set. Here's a list of the filterable properties in a Management Scope.
7 Note
While there is a property called Administrative Units, we recommend you use the
native Admin Units parameter on a role assignment to avoid creating a scope as an
intermediary pointer object.
Service Principals
Service Principals represent an instance of an application within your tenant. You should
consider the Service Principal in Exchange to be a pointer to an existing Service Principal
in Azure AD. Service Principals can't be created directly using Exchange Online tools.
Azure AD tools are used to manage Service Principal registrations within tenants.
Exchange prevents the creation of an invalid pointer and reflects any deletions of
Service Principals in Azure AD automatically.
The following screenshot will help you find these IDs in Azure AD:
7 Note
Don't use the IDs from the App Registrations page, as it shows different values. The
red outlined "Application ID" is the AppID and the "Object ID" is the ServiceID.
You can use another approach to find these IDs using Get-AzureADServicePrincipal.
PowerShell
PowerShell
Set-ServicePrincipal -Identity <ObjectID, AppID, or DisplayName > -
DisplayName <Updated name>
Application Roles
Application roles are a special type of management role in Exchange Online, which is
only assignable to an Application. These roles can be enumerated using Get-
ManagementRole.
Role Assignments
Management role assignments tie together a principal, role, and custom resource scope
of access. This assignment acts as the permissions assignment for a service principal
performing a role across a scope.
PowerShell
PowerShell
Testing Authorization
A test cmdlet can be used to simulate the behavior enabled by RBAC assignments for a
particular service principal.
7 Note
This method excludes permissions that might be granted seperately in Azure AD.
When testing authorization, you can include an optional resource parameter to evaluate
which scoped permissions apply to that target mailbox. InScope will = true or false
to represent if, true that permission applies to that mailbox for that service principal, or
false that service principal has that permission but not over that particular mailbox.
Omitting this flag will result in "Not Run".
Test results always include the allowed resource scope for a particular assigned
permission.
PowerShell
Examples
After using Connect-ExchangeOnline in PowerShell, follow these steps:
PowerShell
PowerShell
PowerShell
RoleName GrantedPermissions
AllowedResourceScope ScopeType InScope
-------- ------------------ ------------------
-- --------- ------
Application Mail.Read Mail.Read Scope-MESGaDN
CustomRecipientScope False
Application Calendars.Read Calendars.Read Scope-DL1
CustomRecipientScope False
Application Contacts.Read Contacts.Read Scope-MESGa
CustomRecipientScope False
Limitations
Applications can't become member of a Role Group.
Application roles can only be assigned to Service Principals.
Application roles can't be copied or derived.
Exclusive management scopes don't restrict app access.
Changes to app permissions are subject to cache maintenance that varies between
30 minutes and 2 hours depending on the app's recent usage. When testing
configurations, the test command bypasses this cache. An app with no inbound
calls to APIs will have its cache reset in 30 minutes, whereas an actively used app
will keep its cache alive for up to 2 hours.
Supported Protocols
MS Graph
EWS
without a signed-in
user.
mailboxes without a
signed-in user.
You might notice these roles represent Microsoft Graph permissions that you can
consent elsewhere in the Azure Identity platform. These permissions will have the same
effect as those Graph permissions except for these role assignments allowing for
granular resource scoped access.
FAQ
Why does my application still have access to mailboxes that aren't
granted using RBAC?
You need to ensure that you've removed the tenant-wide unscoped permissions you
assigned in Azure AD. The permissions assigned using RBAC act in addition to grants
you make in Azure AD. Azure AD permissions can only be constrained using Application
Access Policies.
Migration steps:
1. Create a new management scope, which points to the scoping group from the
Application Access Policy
2. Create the service principal pointer object
3. Assign the needed permissions to the service principal in Exchange Online with the
management scope restriction
4. Remove consent to permission in Azure
5. Remove the Application Access Policy
When creating the management scope in step #1, you'll use a recipient filter with the
filter parameter MemberOfGroup . Here's an example: "MemberOfGroup -eq
'CN=mesga20220818210551,OU=Fabrikam346.onmicrosoft.com,OU=Microsoft
Exchange Hosted Organizations,DC=NAMPR00A001,DC=prod,DC=outlook,DC=com'"
7 Note
This filter parameter uses the distinguished name of the group, which you can find
using Get-Group cmdlets.
Limitations:
Nested group members are considered out of scope. Only direct group
membership results in the member being considered in scope for the
authorization.
Microsoft 365 Groups, Mail-Enabled Security Groups, and Distribution Lists are
supported.
Application Access Policies constrain ONLY the permissions assigned in Azure AD.
An app can have both Azure AD consented permissions and RBAC assignments.
We expect this case when an app has tenant wide Mail.Read and scoped Mail.Send,
for example.
MS Graph access to an endpoint requiring both Mail.Read and Calendar.Read for App 1:
This endpoint needs both Mail.Read and Calendar.Read. While the app has these
permissions individually against two separate mailboxes, it does not have both
permissions against one mailbox.
While the Mail.Read from Azure AD only allows access to Mailbox A, the RBAC
assignment allows access to everything except A. In effect, this allows access to
everything because "A and Not A" means everything.
While we've outlined these edge cases for completeness, we don't expect Application
Access Policies to be typically used with RBAC for Applications. Tenant-wide permissions
should be assigned in Azure AD while resource-scoped permissions should be granted
using RBAC for Applications.
A recipient is any mail-enabled object in Exchange Online that can receive email
messages. Exchange Online includes several recipient types. Each recipient type is
identified in the Exchange admin center (EAC) and has a unique value in the
RecipientTypeDetails property in Exchange Online PowerShell.
7 Note
In Exchange Online, the new EAC enhances the admin experience with a different
look and feel. The Mailboxes and Shared mailboxes tabs under Recipients in the
Classic EAC are now merged into a single Mailboxes tab under Recipients in the
new EAC. On the Mailboxes tab, you can view shared mailboxes and user mailboxes
under one list view. For more information, see Exchange admin center in Exchange
Online.
The following table describes the different types of recipients in Exchange Online and
provides links to articles that explain how to manage and configure them.
Recipient Description
type
Users
User mailbox A mailbox that's assigned to an individual user in your Exchange Online
organization. A mailbox contains the user's email messages, calendar items,
contacts, tasks, and other important business data.
Create user mailboxes in Exchange Online.
Mail contact A mail contact contains information about a person who's outside of your
Exchange Online organization. A mail contact has an external email address, but
the mail contact is visible in your organization's shared address book (also known
as the global address list or GAL) and other address lists.
Manage mail contacts
Recipient Description
type
Mail user A mail user (also known as a mail-enabled user) is similar to a mail contact in that
it represent a user with an external email address and is visible in your
organization's shared address book and other address lists. However, a mail user
also has a user account in your organization, and you can assign permissions to
the mail user.
Resources
Equipment A type of resource mailbox that's assigned to a resource that's not location-
mailbox specific, such as a portable computer, projector, microphone, or a company car.
Equipment mailboxes can be included as resources in meeting requests.
Manage resource mailboxes
Groups
Distribution Distribution groups (also known as distribution lists) provide a single point of
group contact for delivering email to the members of the group.
Mail-enabled Like a distribution group, a mail-enabled security group provides a single point
security of contact for delivering email to the members of the group. However, a mail-
group enabled security group is also a security principal, which means you can assign
permissions to the group that affect all group members who are also security
principals (user mailboxes, mail users, other mail-enabled security groups, etc.).
Dynamic A dynamic distribution group uses recipient filters and conditions to periodically
distribution calculate the membership of the group.
group Manage dynamic distribution groups
Collaboration
Recipient Description
type
Microsoft 365 Microsoft 365 groups (formerly known as Office 365 groups), are used for
group collaboration between teams, both inside and outside your company, by
providing group email and a shared workspace for conversations, files, and
calendars.
For email, the benefit of a Microsoft 365 group over traditional groups is: the
email history of the group is preserved. If a new user joins an old Microsoft 365
group, the entire email history of the group is available to them.
Mail-enabled A public folder is designed for shared access to collect, organize, and share
public folder information.
Public folders in Microsoft 365, Office 365, and Exchange Online
See also
Manage permissions for recipients
Plus Addressing
To find information about message and recipient limits in Exchange Online, check
out the new article at Exchange Online Limits.
Message and recipient limits in
Exchange Online
Article • 02/22/2023
The content in this topic has been moved to another topic. Check out the new topic at
Exchange Online Limits.
Create user mailboxes in Exchange
Online
Article • 02/22/2023
You have to use the Microsoft 365 admin center or Exchange Online PowerShell to
create an Exchange Online user mailbox. You can't create new user mailboxes using the
new Exchange admin center (EAC). However, after Exchange Online mailboxes are
created, you can manage them using the new EAC. For more information on adding
users in Microsoft 365 admin center, see Add users and assign licenses.
7 Note
After you create a new mailbox using Exchange Online PowerShell, you have to
assign it an Exchange Online license or it will be disabled when the 30-day grace
period ends.
You need permissions before you can perform this procedure or procedures. To
see what permissions you need, see the "Recipients" entry in the Feature
permissions in Exchange Online article.
It's a good idea to use strong passwords that are at least eight characters long, and
combine uppercase and lowercase letters, numbers, and symbols.
For information about keyboard shortcuts that may apply to the procedures in this
article, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
Use the Microsoft 365 admin center to create a
new mailbox
You can use the Microsoft 365 admin center to create a new user account. When you
assign the user account a license for Exchange Online, a mailbox is automatically created
for the user. To create new user accounts in the Microsoft 365 admin center, see Add
users individually or in bulk.
PowerShell
After you create a mailbox by running the previous command, a user account is also
created. You have to activate this user account by assigning a license. To assign a license
in the Microsoft 365 admin center, see Add users individually or in bulk.
Delete or restore user mailboxes in
Exchange Online
Article • 02/22/2023
) Important
Effective from December 2022, the classic Exchange Admin Center will be
deprecated for worldwide customers. Microsoft recommends using the new
Exchange Admin Center , if not already doing so.
While most of the features have been migrated to new EAC, some have been
migrated to other admin centers and remaining ones will soon be migrated to New
EAC. Find features that are not yet there in new EAC at Other Features or use
Global Search that will help you navigate across new EAC.
) Important
Check out the new Exchange admin center! The experience is modern, intelligent,
accessible, and better. Personalize your dashboard, manage cross tenant migration,
experience the improved Groups feature, and more. Try it now !
There are several things you should consider before you decide to delete a user mailbox.
There are different kinds of deletions that you can do on a user mailbox and some of
them won't allow you to restore or recover the mailbox. This article walks you through
the deleted mailbox scenarios, and how to delete, recover or permanently remove a
mailbox from Exchange Online.
7 Note
The user mailbox's associated Azure AD user account is soft-deleted (the Azure AD
user object is out of scope or in the recycle bin container).
The user mailbox's associated Azure AD user account has been hard-deleted but a
Litigation Hold or an eDiscovery hold was placed on the Exchange Online mailbox
before it was deleted.
The user mailbox's associated Azure AD user account has been purged within the
last 30 days, which is the retention length Exchange Online keeps the mailbox in a
soft-deleted state before it's permanently purged and unrecoverable.
7 Note
If in the 30-day time period a new Azure AD user is synchronized from the original on-
premises recipient account with the same ExchangeGuid or ArchiveGuid, this will result
in an ExchangeGuid validation conflict error.
Check out Overview of inactive mailboxes for more info about creating an inactive
mailbox by placing a Litigation Hold on a mailbox before deleting it.
The user mailbox has been soft-deleted for more than 30 days, and the associated
Azure AD user has been hard-deleted. Check out the Remove-MsolUser cmdlet.
All mailbox content such as emails, contacts, and files will be permanently deleted.
The user mailbox's associated user account has been hard-deleted in Azure AD.
The user mailbox is now soft-deleted in Exchange Online and stays in the soft
deleted state for 30 days. If in the 30 days time period a new Azure AD user is
synchronized from the original on-premises recipient account with the same
ExchangeGuid or ArchiveGuid, and that new account is licensed for Exchange
Online, this results in a hard deletion of the original user mailbox. All mailbox
content such as emails, contacts, and files will be permanently deleted.
The soft deleted mailbox has been deleted using the Remove-Mailbox cmdlet with
the PermanentlyDelete parameter in Exchange Online PowerShell.
The above scenarios assume that the user mailbox isn't in any of the hold states, like
Litigation hold or eDiscovery hold. If there is any type of hold on the user mailbox the
mailbox can't be removed from Exchange Online. For all mail user recipient types,
Litigation hold or eDiscovery hold are ignored and have no impact on the mail users
hard-deleted or soft-delete behavior. The mail user object can't be deleted if there is a
journal mailbox associated with it. You can disable journaling on the mail user by using
the Disable-JournalArchiving cmdlet.
To delete a Microsoft 365 or Office 365 work or school account, see Delete or restore
users.
PowerShell
When you delete an Exchange Online mailbox using Exchange Online PowerShell, the
corresponding Microsoft 365 or Office 365 user is deleted and removed from the list of
users in the Microsoft 365 admin center. The user will still be recoverable for 30 days.
After the 30 days time limit, the user is permanently deleted.
This example deletes an Exchange Online mailbox and the corresponding user account
for Walter Harp.
PowerShell
7 Note
This feature requires a Microsoft 365 administrator account. This feature isn't
available for Microsoft 365 Government, Microsoft 365 operated by 21Vianet, or
Microsoft 365 Germany.
To help you understand the current status of a recently deleted mailbox, we provide
automated diagnostics in the Microsoft 365 admin center. To launch the diagnostics,
select the following button:
Run Tests: Deleted Mailbox
7 Note
We strongly recommend restoring the mailbox from the same source (Azure AD or
Exchange Online) from where the user or mailbox was deleted. Failing to do so will
result in a failed restore operation.
PowerShell
License removal
When an Exchange Online license is removed from a user, Exchange Online data
associated with that account is held for 30 days. After the 30-day grace period, the data
is deleted and can't be recovered. If you add the license back to the user during the
grace period, this will restore access, and the mailbox will become fully active.
7 Note
If the Microsoft 365 or Office 365 or Exchange Online license is removed from a
user, the user's mailbox is no longer searchable by using an eDiscovery tool such as
Content Search or eDiscovery (Premium). For more information, see the "Searching
disconnected or de-licensed mailboxes" section in Feature reference for Content
search.
2. Run the following cmdlet to identify the soft-deleted mailbox that you want to
restore.
PowerShell
For the soft-deleted mailbox that you want to restore, note its GUID value (you use
the value in Step 4).
3. Create a target mailbox for the restored mailbox. For more information, see Create
user mailboxes in Exchange Online. After you create the target mailbox, run the
following command to get the GUID value of the target mailbox that you'll need in
the next step.
PowerShell
PowerShell
New-MailboxRestoreRequest -SourceMailbox <SoftDeletedMailboxGUID> -
TargetMailbox <NewTargetMailboxGUID>
For other mailbox restoring scenarios related to hybrid infrastructures, refer to Common
mailbox recovery scenarios for hybrid environments .
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
2. Run the following command to show the required MailboxGuid value of the
disconnected mailbox:
PowerShell
3. Run the following command to show the required GUID value of the mailbox
database that holds the disconnected mailbox:
PowerShell
5. Replace <MailboxIdentity> with the name, alias, or email address of the target
Exchange Online mailbox, and then run one of the following commands:
Restore to Exchange Online mailbox: Run the following command to show
the required ExchangeGuid value:
PowerShell
7 Note
PowerShell
6. Now that we have all the required details, run one of the following commands to
start the restore request. In both commands, use the following values:
PowerShell
7 Note
PowerShell
a. Run the following command to get the Identity value of the mailbox restore
request:
PowerShell
Get-MailboxRestoreRequest
PowerShell
Get-MailboxRestoreRequestStatistics -Identity
<MailboxRestoreRequestIdentity> -IncludeReport
After the PercentComplete value of the restore request has reached 100, you have
successfully restored the disconnected on-premises mailbox to an Exchange Online
mailbox.
Plus Addressing in Exchange Online
Article • 01/26/2023
An SMTP email address uses the basic syntax: <local-part>@<domain> . For example,
sean@contoso.com.
The original email address must be valid. The +tag value that you add is arbitrary,
although regular character restrictions for SMTP email addresses apply (for example, no
spaces). For more information about using plus addresses, see the Using plus addresses
section.
Plus addressing can be used in any email client that sends emails and you can receive
emails addressed to you using plus addresses as you would normal emails.
If you create a mailbox with an address that contains a + in Exchange Online, Exchange
Online will try to resolve the full email address (for example,
sean+newsletter@contoso.com) to a known mailbox. If the first resolution attempt fails,
Exchange Online does a second attempt to resolve the email address without the plus
sign and tag (for example, sean@contoso.com).
If inbound internet email for your on-premises organization is routed through Exchange
Online, your on-premises mailboxes can also use plus addresses if those mailbox
addresses are known in Exchange Online. If the on-premises mailbox addresses are
unknown to Exchange Online, plus addressing won't work and message delivery will be
affected.
PowerShell
PowerShell
7 Note
As plus addresses are not aliases that are configured on the mailbox, they don't resolve
to a user's name in Outlook clients. This limitation results in plus addresses being easily
identifiable in the To or CC fields of messages. However, there might be scenarios
where you can't use a plus address for a Microsoft service that needs to be associated
with your mailbox.
To automatically identify and filter messages that are sent to plus addresses, use Inbox
rules to act on those messages. Using the condition Recipient address includes, you can
specify an action for messages sent to a particular plus address. For example, you can
move messages sent to a plus address to a folder.
Manage user mailboxes in Exchange
Online
Article • 02/22/2023
) Important
Effective from December 2022, the classic Exchange Admin Center will be
deprecated for worldwide customers. Microsoft recommends using the new
Exchange Admin Center , if not already doing so.
While most of the features have been migrated to new EAC, some have been
migrated to other admin centers and remaining ones will soon be migrated to New
EAC. Find features that are not yet there in new EAC at Other Features or use
Global Search that will help you navigate across new EAC.
After you create a user mailbox, you can make changes and set additional properties by
using the new Exchange admin center (EAC) or Exchange Online PowerShell.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Recipients" section in the
Feature permissions in Exchange Online topic.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
Add a shared mailbox: Use this option to create a new shared mailbox. The new
EAC allows you to create only shared mailboxes. If you want to create a user
mailbox, you have to use the Microsoft 365 admin center or Exchange Online
PowerShell. However, after Exchange Online mailboxes are created, you can
manage them using the new EAC.
Set default message size restrictions: Use this option to set a maximum size for
messages that can be sent and received by the mailboxes in your organization.
These settings are applied by default to the mailboxes you create.
Refresh: Use this option to refresh the mailbox list.
Export: Use this option to download a .csv file (excel sheet) with details of all the
mailboxes.
Search: Use this option to search for any mailbox by entering the suitable keyword.
Filter: Use this detailed option for creating custom filters or using pre-defined
filters.
Normal List and Compact List - The default view that you see when you open
Mailboxes is the normal listing view. In the Compact List view, you can see more
numbers of rows with reduced spaces in between.
When you select any mailbox by clicking on the radio button next to the display
name (on any row), certain additional options are also available on top. If you are
not able to view all the options, click the more options (...) menu.
Hide from address list: Select this option to prevent the recipient from
appearing in the address book and other address lists that are defined in your
Exchange organization. After you select this option, users can still send
messages to the recipient by using the email address.
Edit contact information: Select this option to edit the contact information.
Manage mailbox delegation: Select this option to assign permissions to other
users (also called delegates) to allow them to sign in to the user's mailbox or
send messages on behalf of the user. For more information, see the section on
"Mailbox permissions" explained later on in this topic.
Recover deleted items: Administrators can search for and recover deleted email
messages in a user's mailbox. This includes items that are permanently deleted
(purged) by a person by using the Recover Deleted Items feature in Outlook or
Outlook on the web (formerly known as Outlook Web App), or items deleted by
an automated process, such as the retention policy assigned to user mailboxes.
In these situations, the purged items can't be recovered by a user. But
administrators can recover purged messages if the deleted item retention
period for the item hasn't expired. Administrators can search for deleted items
based on Time or Subject Line or Item type.
Convert to shared mailbox: Select this option to convert a mailbox from regular
to shared.
Edit email address: Select this option to change the user's email information.
Refresh: Select this option to refresh the Mailboxes list.
2. In the list of user mailboxes, click the mailbox that you want to change the
properties for. A display pane is shown for the selected user mailbox.
3. On this page, the user can change the Mailbox and Account settings.
4. Use the Mailbox settings for changing any of the following properties.
Email addresses
Mailbox permissions
Mail flow settings
Mailbox policies
More actions
Automatic replies
Email apps
Mailbox Usage
Email Addresses
Use the Email Addresses section to view or change the email addresses associated with
the user mailbox.
By clicking the Manage email address types link, you can view all the email addresses
associated with the user mailbox. The primary SMTP address (also known as the default
reply address) is displayed in bold text in the address list.
Add email address type: Click Add email address type to add a new email address
for this mailbox. Select one of following address types:
SMTP: This is the default address type. Click this button and then type the new
SMTP address in the Email address*: box.
Enter a custom address type: Click this button and type one of the supported
non-SMTP email address types in the Email address*: box.
7 Note
Make this the reply address: In Exchange Online, you can select this check box to
make the new email address the primary SMTP address for the mailbox. This check
box isn't available in the EAC in Exchange Server.
By clicking the Manage mail flow settings link, you can set the following options:
Email forwarding: Click the Edit button and turn the Email forwarding option to
ON/OFF. Email forwarding lets you set up a mailbox to forward email messages
sent to that mailbox to another user's mailbox in or outside of your organization.
Message size restriction: These settings control the size of messages that the user
can send and receive. Click the Edit button and set a maximum size for messages
sent and received by this mailbox.
Message delivery restriction: Message delivery restrictions are useful to control
who can send messages to users in your organization. For example, you can
configure a mailbox to accept or reject messages sent by specific users, or to
accept messages only from users in your Exchange organization. Click the Edit
button and set the message delivery restrictions.
Mailbox permissions
Use the Mailbox permissions section to assign permissions to other users (also called
delegates) to allow them to sign in to the user's mailbox or send messages on behalf of
the user. By clicking the Mailbox permissions link, you can assign the following
permissions:
Send As: This permission allows users other than the mailbox owner to use the
mailbox to send messages. After this permission is assigned to a delegate, any
message that a delegate sends from this mailbox will appear as if it was sent by the
mailbox owner. However, this permission doesn't allow a delegate to sign in to the
user's mailbox.
Send on behalf: This permission also allows a delegate to use this mailbox to send
messages. However, after this permission is assigned to a delegate, the From:
address in any message sent by the delegate indicates that the message was sent
by the delegate on behalf of the mailbox owner.
Read and manage: This permission allows a delegate to sign in to the user's
mailbox and view the contents of the mailbox. However, after this permission is
assigned to a delegate, the delegate can't send messages from the mailbox. To
allow a delegate to send email from the user's mailbox, you still have to assign the
delegate the Send As or the Send on Behalf Of permission.
To assign permissions to delegates, click on the Edit button next to the appropriate
permission. By clicking Add permissions, you can view a list of all recipients in your
Exchange organization that can be assigned the permission. Select the recipients you
want, add them to the list, and then click Save. You can also search for a specific
recipient by typing the recipient's name in the search box.
Mailbox policies
Use the Mailbox policies section to apply default mailbox policies for the organization.
On clicking Manage mailbox policies, you can view or change the mailbox policies. Click
and change the following mailbox policies.
Sharing policy: This box shows the sharing policy applied to the mailbox. A sharing
policy controls how users in your organization can share calendar and contact
information with users outside your Exchange organization. The default sharing
policy is assigned to mailboxes when they are created. To change the sharing
policy that's assigned to the user, select a different one from the drop-down list.
Role assignment policy: This box shows the role assignment policy assigned to the
mailbox. The role assignment policy specifies the role-based access control (RBAC)
roles that are assigned to the user and control what specific mailbox and
distribution group configuration settings users can modify. To change the role
assignment policy that's assigned to the user, select a different one from the drop-
down list.
Retention policy: This box shows the retention policy assigned to the mailbox. A
retention policy is a group of retention tags that are applied to the user's mailbox.
They allow you to control how long to keep items in users' mailboxes and define
what action to take on items that have reached a certain age. A retention policy
isn't assigned to mailboxes when they are created. To assign a retention policy to
the user, select one from the drop-down list.
Address book policy: This box shows the address book policy applied to the
mailbox. An address book policy allows you to segment users into specific groups
to provide customized views of the address book. To apply or change the address
book policy applied to the mailbox, select one from the drop-down list.
More actions
Use the More actions section to do the following changes:
Convert to shared mailbox: Use this option to convert a mailbox from regular to
shared.
Date hold created: This read-only box indicates the date and time when the
mailbox was put on litigation hold. It is NULL by default.
Hold started by: This read-only box indicates the user who put the mailbox on
litigation hold.
Hold duration (days). Leave blank for no limit. - Enter the hold duration in
days.
Note (visible to the user): Use this box to notify the user about the litigation
hold, explain why the mailbox is on litigation hold, or provide additional
guidance to the user, such as informing them that the litigation hold won't
affect their day-to-day use of email.
Web page with more information for the user: Use this box to provide a URL to
a website that provides information or guidance about the litigation hold on the
mailbox.
7 Note
The text from these boxes appears in the user's mailbox only if they are
using Outlook 2010 or later versions. It doesn't appear in Outlook on the
web or other email clients. To view the text from the Note and URL boxes in
Outlook, click the File tab, and on the Info page, under Account Settings,
you'll see the litigation hold comment.
Manage mailbox archive: Use this option to enable or disable the archive mailbox.
Set recipient limit: This setting controls the maximum number of recipients the
user can send a message to. Specify the maximum number of recipients in the
Maximum recipients text box. In Exchange Online, the limit is 500 recipients.
Recover deleted items: Administrators can search for and recover deleted email
messages in a user's mailbox. This includes items that are permanently deleted
(purged) by a person by using the Recover Deleted Items feature in Outlook or
Outlook on the web (formerly known as Outlook Web App), or items deleted by an
automated process, such as the retention policy assigned to user mailboxes. In
these situations, the purged items can't be recovered by a user. But administrators
can recover purged messages if the deleted item retention period for the item
hasn't expired. Administrators can search for deleted items based on Time or
Subject Line or Item type.
Custom attributes: Custom attributes are extension attributes that you can use to
add information about a recipient for which there isn't an existing attribute. You
can add a maximum of 15 custom attributes to a mailbox. Click Add custom
attribute to add custom attributes.
Automatic replies
Use these settings to create automatic reply (Out of Office) messages. By clicking
Manage automatic replies, you can turn ON the Automatic replies option.
Reply to all senders inside the organizations from this mailbox - Enter the
automatic reply message in this text box.
7 Note
Send automatic replies to senders outside the organizations from this mailbox -
Enable this check box to send automatic replies to senders outside the
organizations from this mailbox. On enabling this check box, you can choose
between the options, Only reply to senders in the mailbox's contact list or Reply
to all senders. Enter the automatic reply message in the Reply to all senders
outside the organizations from this mailbox text box.
Email apps
Use this section to apply the default settings for Outlook on the web, IMAP, POP3, MAPI
applied. By clicking Manage email apps settings, you can set the default settings for the
following:
7 Note
Mailbox Usage
The Mailbox Usage section displays the last time that the user signed in to their
mailbox, the total size of the mailbox, and the percentage of the total mailbox quota
that has been used. You can't change the Mailbox usage in this display pane. It is a read-
only information for the admins.
2. In the list of user mailboxes, click the mailbox that you want to change the
properties for, and then click Edit .
3. On the mailbox properties page, you can change any of the following properties.
General
Mailbox Usage
Contact Information
Organization
Email Address
Mailbox Features
Member Of
MailTip
Mailbox Delegation
General
Use the General section to view or change basic information about the user.
* Name: This is the name that's listed in Active Directory. If you change this name,
it can't exceed 64 characters.
* Display name: This name appears in your organization's address book, on the To:
and From: lines in email, and in the Mailbox list. This name can't contain empty
spaces before or after the display name.
* Alias: This specifies the email alias for the user. The user's alias is the portion of
the email address on the left side of the at (@) symbol. It must be unique in the
forest.
* User ID: This is the name that the user uses to sign in to their mailbox and to log
on to the domain. Typically the user logon name consists of the user's alias on the
left side of the @ symbol, and the domain name in which the user account resides
on the right side of the @ symbol.
Hide from address lists: Select this check box to prevent the recipient from
appearing in the address book and other address lists that are defined in your
Exchange organization. After you select this check box, users can still send
messages to the recipient by using the email address.
Custom attributes: This section displays the custom attributes defined for the user
mailbox. To specify custom attribute values, click Edit. You can specify up to 15
custom attributes for the recipient.
Mailbox Usage
Use the Mailbox Usage section to view or change the mailbox storage quota and
deleted item retention settings for the mailbox. These settings are configured by default
when the mailbox is created. They use the values that are configured for the mailbox
database and apply to all mailboxes in that database. You can customize these settings
for each mailbox instead of using the mailbox database defaults.
Last logon: This read-only box displays the last time that the user signed in to their
mailbox.
Mailbox usage: This area shows the total size of the mailbox and the percentage of
the total mailbox quota that has been used.
7 Note
To obtain the information that's displayed in the previous two boxes, the EAC
queries the mailbox database that hosts the mailbox. If the EAC is unable to
communicate with the Exchange store that contains the mailbox database, these
boxes will be blank. A warning message is displayed if the user hasn't signed in to
the mailbox for the first time.
Contact Information
Use the Contact Information section to view or change the user's contact information.
The information on this page is displayed in the address book. Click More options to
display additional boxes.
Tip
You can use the State/Province box to create recipient conditions for dynamic
distribution groups, email address policies, or address lists.
Mailbox users can use Outlook or Outlook on the web (formerly known as Outlook Web
App) to view and change their own contact information. But they can't change the
information in the Notes and Web page boxes.
Organization
Use the Organization section to record detailed information about the user's role in the
organization. This information is displayed in the address book. Also, you can create a
virtual organization chart that is accessible from email clients such as Outlook.
Title: Use this box to view or change the recipient's title.
Department: Use this box to view or change the department in which the user
works. You can use this box to create recipient conditions for dynamic distribution
groups, email address policies, or address lists.
Company: Use this box to view or change the company for which the user works.
You can use this box to create recipient conditions for dynamic distribution groups,
email address policies, or address lists.
Manager: To add a manager, click Browse. In Select Manager, select a person, and
then click OK.
Direct reports: You can't modify this box. A direct report is a user who reports to a
specific manager. If you've specified a manager for the user, that user appears as a
direct report in the details of the manager's mailbox. For example, Kari manages
Chris and Kate, so Kari's mailbox is specified in the Manager box of Chris's mailbox
and Kate's mailbox, and Chris and Kate appear in the Direct reports box in the
properties of Kari's mailbox.
Email Address
Use the Email Address section to add, view or change the email addresses associated
with the user mailbox. This includes the user's primary SMTP address and any associated
proxy addresses. The primary SMTP address (also known as the default reply address) is
displayed in bold text in the address list, with the uppercase SMTP value in the Type
column.
Add:
1. Click Add email address type to add a new email address for this mailbox.
Select one of following address types:
SMTP: This is the default address type. Click this button and then type the
new SMTP address in the * Email address box.
Custom address type: Click this button and type one of the supported
non-SMTP email address types in the * Email address box.
7 Note
2. Click OK.
3. Click Save.
Remove:
1. Click Remove corresponding to the email address that you want to remove
from the mailbox.
2. Click Save.
Mailbox Features
Use the Mailbox Features section to view or change the following mailbox features and
settings:
Sharing policy: This box shows the sharing policy applied to the mailbox. A sharing
policy controls how users in your organization can share calendar and contact
information with users outside your Exchange organization. The default sharing
policy is assigned to mailboxes when they are created. To change the sharing
policy that's assigned to the user, select a different one from the drop-down list.
Role assignment policy: This box shows the role assignment policy assigned to the
mailbox. The role assignment policy specifies the role-based access control (RBAC)
roles that are assigned to the user and control what specific mailbox and
distribution group configuration settings users can modify. To change the role
assignment policy that's assigned to the user, select a different one from the drop-
down list.
Retention policy: This box shows the retention policy assigned to the mailbox. A
retention policy is a group of retention tags that are applied to the user's mailbox.
They allow you to control how long to keep items in users' mailboxes and define
what action to take on items that have reached a certain age. A retention policy
isn't assigned to mailboxes when they are created. To assign a retention policy to
the user, select one from the drop-down list.
Address book policy: This box shows the address book policy applied to the
mailbox. An address book policy allows you to segment users into specific groups
to provide customized views of the address book. To apply or change the address
book policy applied to the mailbox, select one from the drop-down list.
Mobile Devices: Use this section to view and change the settings for Exchange
ActiveSync, which is enabled by default. Exchange ActiveSync enables access to an
Exchange mailbox from a mobile device. Click Disable Exchange ActiveSync to
disable this feature for the mailbox.
Outlook on the web: This feature is enabled by default. Outlook on the web
enables access to an Exchange mailbox from a web browser. Click Disable to
disable Outlook on the web for the mailbox. Click Edit details to add or change an
Outlook on the web mailbox policy for the mailbox.
IMAP: This feature is enabled by default. Click Disable to disable IMAP for the
mailbox.
POP3: This feature is enabled by default. Click Disable to disable POP3 for the
mailbox.
Hold date: This read-only box indicates the date and time when the mailbox
was put on litigation hold.
Put on hold by: This read-only box indicates the user who put the mailbox on
litigation hold.
Note: Use this box to notify the user about the litigation hold, explain why the
mailbox is on litigation hold, or provide additional guidance to the user, such as
informing them that the litigation hold won't affect their day-to-day use of
email.
URL: Use this box to provide a URL to a website that provides information or
guidance about the litigation hold on the mailbox.
7 Note
The text from these boxes appears in the user's mailbox only if they are
using Outlook 2010 or later versions. It doesn't appear in Outlook on the
web or other email clients. To view the text from the Note and URL boxes in
Outlook, click the File tab, and on the Info page, under Account Settings,
you'll see the litigation hold comment.
Archiving: If an archive mailbox doesn't exist for the user, this feature is disabled.
To enable an archive mailbox, click Enable. If the user has an archive mailbox, the
size of the archive mailbox and usage statistics are displayed. Click Edit details to
view and change the following archive mailbox settings:
Database: This read-only box shows the name of the mailbox database that
hosts the archive mailbox. This box isn't available in Exchange Online.
Name: Type the name of the archive mailbox in this box. This name is displayed
under the folder list in Outlook or Outlook on the web.
Archive quota (GB): This box shows the total size of the archive mailbox.
Issue warning at (GB): This box shows the maximum storage limit for the
archive mailbox before a warning is issued to the user. If the archive mailbox
size reaches or exceeds the value specified, Exchange sends a warning message
to the user.
7 Note
The archive quota and the issue warning quota for the archive mailbox
can't be changed in Exchange Online.
Delivery Options: Use to forward email messages sent to the user to another
recipient and to set the maximum number of recipients that the user can send a
message to. Click View details to view and change these settings.
Forwarding address: Select the Enable forwarding check box and then click
Browse to display the Select Mail User and Mailbox page. Use this page to
select a recipient to whom you want to forward all email messages that are sent
to this mailbox.
Deliver message to both forwarding address and mailbox: Select this check
box so that messages will be delivered to both the forwarding address and the
user's mailbox.
Recipient limit: This setting controls the maximum number of recipients the
user can send a message to. Select the Maximum recipients check box to limit
the number of recipients allowed in the To:, Cc:, and Bcc: boxes of an email
message and then specify the maximum number of recipients. In Exchange
Online, the limit is 500 recipients.
Message Size Restrictions: These settings control the size of messages that the
user can send and receive. Click View details to view maximum size for sent and
received messages.
7 Note
Message Delivery Restrictions: These settings control who can send email
messages to this user. Click View details to view and change these restrictions.
Accept messages from: Use this section to specify who can send messages to
this user.
All senders: Select this option to specify that the user can accept messages from
all senders. This includes both senders in your Exchange organization and
external senders. This option is selected by default. This option includes external
users only if you clear the Require that all senders are authenticated check box.
If you select this check box, messages from external users will be rejected.
Only senders in the following list: Select this option to specify that the user can
accept messages only from a specified set of senders in your Exchange
organization. Click Add to display the Select Recipients page, which displays
a list of all recipients in your Exchange organization. Select the recipients you
want, add them to the list, and then click OK. You can also search for a specific
recipient by typing the recipient's name in the search box and then clicking
Search .
Require that all senders are authenticated: Select this option to prevent
anonymous users from sending messages to the user.
Reject messages from: Use this section to block people from sending messages
to this user.
No senders: Select this option to specify that the mailbox won't reject messages
from any senders in the Exchange organization. This option is selected by
default.
Senders in the following list: Select this option to specify that the mailbox will
reject messages from a specified set of senders in your Exchange organization.
Click Add to display the Select Recipients page, which displays a list of all
recipients in your Exchange organization. Select the recipients you want, add
them to the list, and then click OK. You can also search for a specific recipient by
typing the recipient's name in the search box and then clicking Search .
Member Of
Use the Member Of section to view a list of the distribution groups or security groups
to which this user belongs. You can't change membership information on this page.
Note that the user may match the criteria for one or more dynamic distribution groups
in your organization. However, dynamic distribution groups aren't displayed on this
page because their membership is calculated each time they are used.
MailTip
Use the MailTip section to add a MailTip to alert users of potential issues if they send a
message to this recipient. A MailTip is text that is displayed in the InfoBar when this
recipient is added to the To, Cc, or Bcc boxes of a new email message.
7 Note
MailTips can include HTML tags, but scripts aren't allowed. The length of a custom
MailTip can't exceed 175 displayed characters. HTML tags aren't counted in the
limit.
Mailbox Delegation
Use the Mailbox Delegation section to assign permissions to other users (also called
delegates) to allow them to sign in to the user's mailbox or send messages on behalf of
the user. You can assign the following permissions:
Send As: This permission allows users other than the mailbox owner to use the
mailbox to send messages. After this permission is assigned to a delegate, any
message that a delegate sends from this mailbox will appear as if it was sent by the
mailbox owner. However, this permission doesn't allow a delegate to sign in to the
user's mailbox.
Send on Behalf Of: This permission also allows a delegate to use this mailbox to
send messages. However, after this permission is assigned to a delegate, the From:
address in any message sent by the delegate indicates that the message was sent
by the delegate on behalf of the mailbox owner.
Full Access: This permission allows a delegate to sign in to the user's mailbox and
view the contents of the mailbox. However, after this permission is assigned to a
delegate, the delegate can't send messages from the mailbox. To allow a delegate
to send email from the user's mailbox, you still have to assign the delegate the
Send As or the Send on Behalf Of permission.
Get-Mailbox
Set-Mailbox
Here are some examples of using Exchange Online PowerShell to change user mailbox
properties.
This example shows how to forward Pat Coleman's email messages to Sunil Koduri's
(sunilk@contoso.com) mailbox.
PowerShell
This example uses the Get-Mailbox command to find all user mailboxes in the
organization, and then uses the Set-Mailbox command to set the recipient limit to 500
recipients allowed in the To:, Cc:, and Bcc: boxes of an email message.
PowerShell
PowerShell
This example uses the Get-Mailbox cmdlet to find all users in the Customer Service
department, and then uses the Set-Mailbox cmdlet to change the maximum message
size for sending messages to 2 MB.
PowerShell
PowerShell
Here's a list of the user mailbox properties and features that can be bulk edited. Note
that not all properties in each area are available to be changed.
Contact Information: Change shared properties such as street, postal code, and
city name.
Organization: Change shared properties such as department name, company
name, and the manager that the selected users report to.
Custom attributes: Change or add values for custom attributes 1 - 15.
Mailbox quota: Change the mailbox quota values and the retention period for
deleted items. This isn't available in Exchange Online.
Email connectivity: Enable or disable Outlook on the web, POP3, IMAP, MAPI, and
Exchange ActiveSync.
Archive: Enable or disable the archive mailbox.
Retention policy, role assignment policy, and sharing policy: Update the settings
for each of these mailbox features.
Move mailboxes to another database: Move the selected mailboxes to a different
database.
Delegate permissions: Assign permissions to users or groups that allow them to
open or send messages from other mailboxes. You can assign Full, Send As and
Send on Behalf permissions to users or groups. Check out Manage permissions for
recipients for more details.
7 Note
The estimated time to complete this task is 2 minutes, but may take longer if you
change multiple properties or features.
Tip
You can select multiple adjacent mailboxes by holding down the Shift key and
clicking the first mailbox, and then clicking the last mailbox you want to edit.
You can also select multiple non-adjacent mailboxes by holding down the Ctrl
key and clicking each mailbox that you want to edit.
3. In the Details pane, under Bulk Edit, select the mailbox properties or feature that
you want to edit.
4. Make the changes on the properties page and then save your changes.
Add or remove email addresses for a
mailbox in Exchange Online
Article • 02/22/2023
) Important
Check out the new Exchange admin center! The experience is modern, intelligent,
accessible, and better. Personalize your dashboard, manage cross tenant migration,
experience the improved Groups feature, and more. Try it now !
You can configure more than one email address for the same mailbox. The additional
addresses are called proxy addresses. A proxy address lets a user receive email that's
sent to a different email address. Any email message sent to the user's proxy address is
delivered to their primary email address, which is also known as the primary SMTP
address or the default reply address.
) Important
If you're using Microsoft 365 or Office 365 for business, you should add or remove
email addresses for user mailboxes in the Add another email alias for a user
For additional management tasks related to managing recipients, see the "Recipients
documentation" table in Recipients in Exchange Online.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Recipients" entry in the
Feature permissions in Exchange Online article.
For information about keyboard shortcuts that may apply to the procedures in this
article, see Keyboard shortcuts for the Exchange admin center.
The procedures in this article show how to add or remove email addresses for a user
mailbox. You can use similar procedures to add or remove email addresses for other
recipient types.
7 Note
You can use similar procedures to add or remove email addresses that use plus
addressing. For more information about plus addressing, see Plus Addressing.
2. In the list of user mailboxes, click the mailbox that you want to add an email
address to. A display pane is shown for the selected user mailbox.
3. Under Mailbox settings > Email addresses, click the Manage email address types
link.
4. The Manage email address types display pane is shown. You can view all the email
addresses associated with this user mailbox. Each email address type has one
default reply address. The default reply address is displayed in bold.
7 Note
On the Email Address page, the primary SMTP address is displayed in bold
text in the address list, with the uppercase SMTP value in the Type column.
5. Click Add email address type, and then click SMTP to add an SMTP email
address to this mailbox.
SMTP is the default email address type. You can also add custom addresses to a
mailbox. For more information, see "Change user mailbox properties" in the
Manage user mailboxes topic.
6. Type the new SMTP address in the Email address:* box, and then click OK.
The new address is displayed in the list of email addresses for the selected
mailbox.
You can select the Make this the reply address check box if you wish to make this
address as the reply address.
7. Click Save to save the change.
2. In the list of user mailboxes, click the mailbox that you want to add an email
address to, and then click Edit .
7 Note
On the Email Address page, the primary SMTP address is displayed in bold
text in the address list, with the uppercase SMTP value in the Type column.
4. Click Add , and then click SMTP to add an SMTP email address to this mailbox.
SMTP is the default email address type. You can also add custom addresses to a
mailbox. For more information, see "Change user mailbox properties" in the
Manage user mailboxes topic.
5. Type the new SMTP address in the Email address box, and then click OK.
The new address is displayed in the list of email addresses for the selected
mailbox.
This example shows how to add an SMTP address to the mailbox of Dan Jump.
PowerShell
PowerShell
For more information about how to use this method of adding and removing values for
multivalued properties, see Modifying Multivalued Properties.
This example shows another way to add email addresses to a mailbox by specifying all
addresses associated with the mailbox. In this example, danj@tailspintoys.com is the
new email address that you want to add. The other two email addresses are existing
addresses. The address with the case-sensitive qualifier SMTP is the primary SMTP
address. You have to include all email addresses for the mailbox when you use this
command syntax. If you don't, the addresses specified in the command will overwrite
the existing addresses.
PowerShell
) Important
Do not make frequent and multiple changes using the EmailAddress parameter.
Otherwise, the changes might be lost due to a race condition within the Exchange
Online sync infrastructure. As described in the previous example, we recommend
adding multiple EmailAddress values in one command. Do not use multiple
successive commands to add one EmailAddress value per command.
3. Under Mailbox settings > Email addresses, click the Manage email address types
link.
4. In the list of email addresses, select the address you want to remove, and then click
the Remove icon.
2. In the list of user mailboxes, click the mailbox that you want to remove an email
address from, and then click Edit .
4. In the list of email addresses, select the address you want to remove, and then click
Remove .
PowerShell
PowerShell
For more information about how to use this method of adding and removing values for
multivalued properties, see Modifying Multivalued Properties.
You can also remove an email address by omitting it from the command to set email
addresses for a mailbox. For example, let's say Janet Schorr's mailbox has three email
addresses: janets@contoso.com (the primary SMTP address), janets@corp.contoso.com,
and janets@tailspintoys.com. To remove the address janets@corp.contoso.com, you
would run the following command.
PowerShell
Console
Mailbox,NewEmailAddress
Dan Jump,danj@northamerica.contoso.com
David Pelton,davidp@northamerica.contoso.com
Kim Akers,kima@northamerica.contoso.com
Janet Schorr,janets@northamerica.contoso.com
Jeffrey Zeng,jeffreyz@northamerica.contoso.com
Spencer Low,spencerl@northamerica.contoso.com
Toni Poe,tonip@northamerica.contoso.com
...
Run the following command to use the data in the CSV file to add the email address to
each mailbox specified in the CSV file.
PowerShell
The column names in the first row of this CSV file ( Mailbox,NewEmailAddress ) are
arbitrary. Whatever you use for column names, make sure you use the same
column names in Exchange Online PowerShell command.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
Change how long permanently deleted
items are kept for an Exchange Online
mailbox
Article • 02/22/2023
) Important
Check out the new Exchange admin center! The experience is modern, intelligent,
accessible, and better. Personalize your dashboard, manage cross tenant migration,
experience the improved Groups feature, and more. Try it now !
7 Note
You must use Exchange Online PowerShell to make the change. Unfortunately, you
can't currently do this directly in Outlook or Outlook on the web.
If you want to place a mailbox on In-Place Hold and Litigation Hold so the
retention limit is ignored, make sure the mailbox has an Exchange Online (Plan 2)
user license.
You need permissions before you can do this procedure or procedures. To see
what permissions you need, see the "Recipients" section in the Feature permissions
in Exchange Online article.
You can use Exchange Online PowerShell to perform this procedure. To learn how
to use Windows PowerShell to connect to Exchange Online, see Connect to
Exchange Online PowerShell.
For information about keyboard shortcuts that may apply to the procedures in this
article, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
Example 1: Set Emily Maier's mailbox to keep deleted items for 30 days. In Exchange
Online PowerShell, run the following command.
PowerShell
Example 2: Set all user mailboxes in the organization to keep deleted items for 30 days.
In Exchange Online PowerShell, run the following command.
PowerShell
Need more details about using these commands? See Exchange Online PowerShell Help
article Set-Mailbox.
7 Note
These commands only apply to existing mailboxes and will not affect new
mailboxes that you create in the future. To change this setting on all new
mailboxes, use a mailbox plan that has a new retention policy that applies to new
mailboxes. See Mailbox plans and Set-MailboxPlan for more information.
Tip
To keep deleted items for longer than 30 days, place the mailbox on In-Place Hold
or Litigation Hold. This works because when a mailbox is placed on hold, deleted
items are kept and retention settings for deleted items are ignored. See In-Place
Hold and Litigation Hold.
PowerShell
PowerShell
A mailbox item is deleted and moved to the Recoverable Items folder when a user does
one of the following:
How long deleted items are kept in the Deletions folder depends on the deleted item
retention period that is set for the mailbox. An Exchange Online mailbox keeps deleted
items for 14 days, by default. Use Exchange Online PowerShell, as shown above, to
change this setting, to increase the period up to a maximum of 30 days.
Users can recover, or purge, deleted items before the retention time for a deleted item
expires. To do so, they use the Recover Deleted Items feature in Outlook or Outlook on
the web. See the following articles for Outlook for Windows or for Outlook on the
web .
Additional help:
If a user purges a deleted item, you can recover it before the deleted item
retention period expires. For details, see Recover deleted messages in a user's
mailbox.
To learn more about deleted item retention, the Recoverable Items folder, In-Place
Hold, and Litigation Hold, see Recoverable Items folder in Exchange Online.
Configure email forwarding for a
mailbox in Exchange Online
Article • 02/22/2023
) Important
Check out the new Exchange admin center! The experience is modern, intelligent,
accessible, and better. Personalize your dashboard, manage cross tenant migration,
experience the improved Groups feature, and more. Try it now !
Email forwarding lets you set up a mailbox to forward email messages sent to that
mailbox to another user's mailbox in or outside of your organization.
) Important
If you're using Microsoft 365 or Office 365 for business, you should configure email
forwarding in the Configure email forwarding
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Recipients" entry in the Feature
permissions in Exchange Online article.
2. In the list of user mailboxes, click the mailbox that you want to configure mail
forwarding for. A display pane is shown for the selected user mailbox.
3. Under Mailbox settings > Mail flow settings, click the Manage mail flow settings
link.
4. In the Manage mail flow settings display pane, you will see the Email forwarding
option. Click the Edit button next to this option to view or change the setting for
forwarding email messages.
5. The Manage email forwarding display pane is shown. By default the Forward all
emails sent to this mailbox setting is OFF. Turn it ON.
6. Under Forwarding address text box, enter the forwarding email address. The text
box allows a search option for searching email addresses by partially entering the
keyword.
7. You can turn ON the Keep a copy of forwarded email in this mailbox option if you
wish to keep a copy of the forwarded email.
8. Click Save to save your changes. Click Close to exit from the Manage mail flow
settings display pane.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Recipients" entry in the Feature
permissions in Exchange Online article.
2. In the list of user mailboxes, click or tap the mailbox that you want to configure
mail forwarding for, and then click or tap Edit .
4. Under Mail Flow, select View details to view or change the setting for forwarding
email messages.
On this page, you can set the maximum number of recipients that the user can
send a message to. For on-premises Exchange organizations, the recipient limit is
unlimited. For Exchange Online organizations, the limit is 500 recipients.
5. Check the Enable forwarding check box, and then click or tap Browse.
6. On the Select Recipient page, select a user you want to forward all email to. Select
the Deliver message to both forwarding address and mailbox check box if you
want both the recipient and the forwarding email address to get copies of the
emails sent. Click or tap OK, and then click or tap Save.
What if you want to forward mail to an address outside your organization? Or forward
mail to multiple recipients? You can do that, too!
External addresses: Create a mail contact and then, in the steps above, select the
mail contact on the Select Recipient page. Need to know how to create a mail
contact? Check out Manage mail contacts.
Multiple recipients: Create a distribution group, add recipients to it, and then in
the steps above, select the mail contact on the Select Recipient page. Need to
know how to create a mail contact? Check out Create and manage distribution
groups.
2. In the list of user mailboxes, click or tap the mailbox that you configured email
forwarding for, and then click Edit .
4. Under Mail Flow, click or tap View details to view the mail forwarding settings.
Additional information
This article is for admins. If you want to forward your own email to another recipient,
check out the following articles:
For information about keyboard shortcuts that may apply to the procedures in this
article, see Keyboard shortcuts for the Exchange admin center.
Having problems? Ask for help in the Exchange forums. Visit the forums at Exchange
Online or Exchange Online Protection .
Configure message delivery restrictions
for a mailbox in Exchange Online
Article • 02/22/2023
You can use the new EAC, the classic EAC or Exchange Online PowerShell to place
restrictions on whether messages are delivered to individual recipients. Message
delivery restrictions are useful to control who can send messages to users in your
organization. For example, you can configure a mailbox to accept or reject messages
sent by specific users or to accept messages only from users in your Exchange
organization.
) Important
Message delivery restrictions do not impact mailbox permissions. A user with Full
Access permissions on a mailbox will still be able to update the contents in that
mailbox, such as by copying messages into the mailbox, even if that user has been
restricted.
The message delivery restrictions covered in this topic apply to all recipient types. To
learn more about the different recipient types, see Recipients in Exchange Online.
For additional management tasks related to recipients, see the following topics:
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Recipients" entry in the
Feature permissions in Exchange Online topic.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
2. In the list of user mailboxes, click the mailbox that you want to configure message
delivery restrictions for. A display pane is shown for the selected user mailbox.
3. Under Mailbox settings > Mail flow settings, click the Manage mail flow settings
link.
4. In the Manage mail flow settings display pane, you will see the Message Delivery
Restrictions option. Click the Edit button next to this option. The Message delivery
restrictions display pane is shown.
Accept messages from: Use this section to specify who can send messages to this
user.
All senders: This option specifies that the user can accept messages from all
senders. This includes both senders in your Exchange organization and external
senders. This is the default option. It includes external users only if you clear the
Check if all senders are authenticated check box. If you select this check box,
messages from external users will be rejected.
Selected senders: This specifies that the user can choose from a list of senders.
Click Add sender to display the list of all recipients in your Exchange
organization. You can also search for a specific recipient by typing the
recipient's name in the search box. Select the desired recipients, and then click
Confirm.
Check if all senders are authenticated: This option prevents anonymous users
from sending messages to the user. This includes external users that are outside
of your Exchange organization.
Block messages from: Use this section to block people from sending messages to
this user.
None: This option specifies that the mailbox won't reject messages from any
senders in the Exchange organization. This is the default option.
Selected senders: This specifies that the user can choose from a list of senders.
Click Add sender to display the list of all recipients in your Exchange
organization. You can also search for a specific recipient by typing the
recipient's name in the search box. Select the desired recipients, and then click
Confirm.
5. Click Save to save your changes. Click Close to exit from the Manage mail flow
settings display pane.
2. In the list of user mailboxes, click the mailbox that you want to configure message
delivery restrictions for, and then click Edit .
4. Under Message Delivery Restrictions, click View details to view and change the
following delivery restrictions:
Accept messages from: Use this section to specify who can send messages to
this user.
All senders: This option specifies that the user can accept messages from all
senders. This includes both senders in your Exchange organization and
external senders. This is the default option. It includes external users only if
you clear the Require that all senders are authenticated check box. If you
select this check box, messages from external users will be rejected.
Only senders in the following list: This option specifies that the user can
accept messages only from a specified set of senders in your Exchange
organization. Click Add to display a list of all recipients in your Exchange
organization. Select the recipients you want, add them to the list, and then
click OK. You can also search for a specific recipient by typing the recipient's
name in the search box and then clicking Search .
Require that all senders are authenticated: This option prevents anonymous
users from sending messages to the user. This includes external users that are
outside of your Exchange organization.
Reject messages from: Use this section to block people from sending
messages to this user.
No senders: This option specifies that the mailbox won't reject messages
from any senders in the Exchange organization. This is the default option.
Senders in the following list: This option specifies that the mailbox will reject
messages from a specified set of senders in your Exchange organization. Click
Add to display a list of all recipients in your Exchange organization. Select
the recipients you want, add them to the list, and then click OK. You can also
search for a specific recipient by typing the recipient's name in the search box
and then clicking Search .
5. Click OK to close the Message Delivery Restrictions page, and then click Save to
save your changes.
To verify that you've successfully configured message delivery restrictions for a user
mailbox, do one the following:
2. In the list of user mailboxes, click the mailbox that you want to verify the message
delivery restrictions for, and then click Edit .
4. Under Message Delivery Restrictions, click View details to verify the delivery
restrictions for the mailbox.
This example configures the mailbox of Robin Wood to accept messages only from the
users Lori Penor, Jeff Phillips, and members of the distribution group Legal Team 1.
PowerShell
7 Note
This example adds the user named David Pelton to the list of users whose messages will
be accepted by the mailbox of Robin Wood.
PowerShell
This example configures the mailbox of Robin Wood to require all senders to be
authenticated. This means the mailbox will only accept messages sent by other users in
your Exchange organization.
PowerShell
This example configures the mailbox of Robin Wood to reject messages from the users
Joe Healy, Terry Adams, and members of the distribution group Legal Team 2.
PowerShell
This example configures the mailbox of Robin Wood to also reject messages sent by
members of the group Legal Team 3.
PowerShell
Set-DistributionGroup
Set-DynamicDistributionGroup
Set-Mailbox
Set-MailContact
Set-MailUser
To verify that you've successfully configured message delivery restrictions for a user
mailbox using powershell, do one the following:
PowerShell
You can use the new Exchange admin center (EAC) for the following types of mailbox
conversions:
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Recipients" entry in the
Feature permissions in Exchange Online topic.
PowerShell
If the mailbox was previously migrated to Exchange Online, you also need to
update the mailbox object in Exchange Online. For more information, see:
Use the new Exchange admin center to convert a mailbox
Use Exchange Online PowerShell to convert a mailbox
If you're converting a user mailbox to a shared mailbox, you should do one of the
following steps:
Remove any mobile devices from the mailbox before the conversion.
Block mobile access to the mailbox after the conversion. For more information,
see Remove a former employee.
This step is required because mobile functionality won't work properly after the
mailbox is converted to a shared mailbox.
To prevent access to the converted mailbox, you might need to reset the password.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
You can filter for display of only user mailboxes or shared mailboxes by clicking
Filter.
2. Select the user mailbox or a shared mailbox that you want to convert into its other
type, and click on the display name.
3. From the More actions pane, click Convert to regular mailbox or Convert to
shared mailbox.
4. Click Confirm.
The mailbox is converted from its present type to its other type, and the
notification message Mailbox converted successfully is displayed.
Use Exchange Online PowerShell to convert a
mailbox
To convert a mailbox, use the following syntax:
PowerShell
This example converts the shared mailbox named MarketingDept1 to a user mailbox.
PowerShell
PowerShell
You can use the EAC or Exchange Online PowerShell to enable or disable Microsoft
Exchange ActiveSync for a user mailbox. Exchange ActiveSync is a client protocol that
lets users synchronize a mobile device with their Exchange mailbox. Exchange
ActiveSync is enabled by default when a user mailbox is created. To learn more, see
Exchange ActiveSync in Exchange Online.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Mobile devices" entry in
the Feature permissions in Exchange Online topic.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
2. In the list of user mailboxes, click the mailbox that you want to enable or disable
Exchange ActiveSync for. A display pane is shown for the selected user mailbox.
3. Under Mailbox settings > Email apps, click the Manage email apps settings link.
4. In the Manage settings for email apps display pane, do one of the following.
To disable Exchange ActiveSync, for the Mobile (Exchange ActiveSync)
option, when the button is Enabled, set to Disabled.
5. Click Save to save your change. A message Email app settings updated
successfully is displayed. Click Close to exit.
2. In the list of user mailboxes, click the mailbox that you want to enable or disable
Exchange ActiveSync for, and then click Edit .
7 Note
You can enable and disable Exchange ActiveSync for multiple user mailboxes by
using the EAC bulk edit feature. For more information about how to do this, see the
"Bulk edit user mailboxes" section in Manage user mailboxes.
In the EAC, navigate to Recipients > Mailboxes, click the mailbox, and then click
Edit .
On the mailbox properties page, click Mailbox Features.
PowerShell
This example enables Exchange ActiveSync for the mailbox of Elly Nkya.
PowerShell
PowerShell
You can use the Exchange admin center or Exchange Online PowerShell to enable or
disable MAPI for a user mailbox. When MAPI is enabled, a user's mailbox can be
accessed by Outlook or other MAPI email clients. When MAPI is disabled, it can't be
accessed by Outlook or other MAPI clients. However, the mailbox will continue to
receive email messages, and, assuming that the mailbox is enabled to support access by
those clients, a user can access the mailbox to send and receive email by using Outlook
on the web (formerly known as Outlook Web App), a POP email client, or an IMAP client.
7 Note
Support for Outlook on the web and MAPI, POP3, and IMAP4 email clients is
enabled by default when a user mailbox is created.
For additional management tasks related to managing email client access to a mailbox,
see the following topics:
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Client Access user
settings" entry in the Feature permissions in Exchange Online topic.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
Use the new Exchange admin center to enable
or disable MAPI
1. In the new EAC, navigate to Recipients > Mailboxes.
2. In the list of user mailboxes, click the mailbox that you want to enable or disable
MAPI. A display pane is shown for the selected user mailbox.
3. Under Mailbox settings > Email apps, click the Manage email apps settings link.
4. In the Manage settings for email apps display pane, do one of the following.
To disable MAPI, for the Outlook desktop (MAPI) option, when the button is
Enabled, set to Disabled.
To enable MAPI, for the Outlook desktop (MAPI) option, when the button is
Disabled, set to Enabled.
5. Click Save to save your change. A message Email app settings updated
successfully is displayed. Click Close to exit.
2. In the list of user mailboxes, click the mailbox that you want to enable or disable
MAPI, and then click Edit .
A warning appears asking if you're sure you want to disable MAPI. Click Yes.
To verify that you've successfully enabled or disabled MAPI for a user mailbox, do one of
the following:
In the EAC, navigate to Recipients > Mailboxes, click the mailbox, and then click
Edit .
PowerShell
PowerShell
To verify that you've successfully enabled or disabled MAPI for a user mailbox, do one of
the following:
PowerShell
You can use the EAC or Exchange Online PowerShell to enable or disable Outlook on the
web (formerly known as Outlook Web App) for a user mailbox. When Outlook on the
web is enabled, a user can use Outlook on the web to send and receive email. When
Outlook on the web is disabled, the mailbox will continue to receive email messages,
and a user can access it to send and receive email by using a MAPI client, such as
Microsoft Outlook, or with a POP or IMAP email client, assuming that the mailbox is
enabled to support access by those clients.
7 Note
Support for Outlook on the web and MAPI, POP3, and IMAP4 email clients is
enabled by default when a user mailbox is created.
Tip
Outlook on the web is required for the Share to Outlook feature to work in
Microsoft Teams.
For additional management tasks related to managing email client access to a mailbox,
see the following articles:
Disabling access to Outlook on the web will also limit the use of the new Outlook for
Windows.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Client Access user
settings" entry in the Feature permissions in Exchange Online article.
For information about keyboard shortcuts that may apply to the procedures in this
article, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
2. In the list of user mailboxes, click the mailbox that you want to enable or disable
Outlook on the web. A display pane is shown for the selected user mailbox.
3. Under Mailbox settings > Email apps, click the Manage email apps settings link.
4. In the Manage settings for email apps display pane, do one of the following.
To disable Outlook on the web, for the Outlook on the web option, when the
button is Enabled, set to Disabled.
To enable Outlook on the web, for the Outlook on the web option, when the
button is Disabled, set to Enabled.
5. Click Save to save your change. A message Email app settings updated
successfully is displayed. Click Close to exit.
2. In the list of user mailboxes, click the mailbox that you want to enable or disable
Outlook on the web for, and then click Edit .
A warning appears asking if you're sure you want to disable Outlook on the web.
Click Yes.
To enable Outlook on the web, under Outlook Web App: Disabled, click
Enable.
7 Note
You can enable and disable Outlook on the web for multiple user mailboxes by
using the EAC bulk edit feature. For more information about how to do this, see the
"Bulk edit user mailboxes" section in Manage user mailboxes.
In the EAC, navigate to Recipients > Mailboxes, click the mailbox, and then click
Edit .
PowerShell
This example enables Outlook on the web for the mailbox of Elly Nkya.
PowerShell
Set-CASMailbox -Identity "Elly Nkya" -OWAEnabled $true
PowerShell
If Outlook on the web is enabled, the value for the OWAEnabled property is True .
If Outlook on the web is disabled, the value is False .
Mailbox plans in Exchange Online
Article • 02/22/2023
The following table describes the mailbox plans that you're likely to see in Exchange
Online.
Notes:
MaxReceiveSize Varies by The maximum total message size that can be received
license. by the mailbox. This value is roughly 33% larger than
the actual message size to account for Base64
encoding.
For more information, see Exchange Online limits.
MaxSendSize Varies by The maximum total message size that can be sent
license. from the mailbox. This value is roughly 33% larger
than the actual message size to account for Base64
encoding.
For more information, see Exchange Online limits.
ProhibitSendQuota Varies by The user receives a warning message and they can't
license. send messages when their mailbox reaches the
specified size (which must be greater than the
IssueWarningQuota value).
ProhibitSendReceiveQuota Varies by The user receives a warning message and they can't
license. send or receive messages when their mailbox reaches
the specified size (which must be greater than the
ProhibitSendQuota value).
RetentionPolicy Default Note: The value for this property must either be null
MRM Policy (blank) or match the name of the Exchange retention
policy that is configured as default for the tenant
otherwise the experience may be inconsistent when
creating new mailboxes, enabling disabled mailboxes,
and changing licenses.
RoleAssignmentPolicy Default Role Grants users permissions to their own mailbox and
Assignment distribution groups. For more information, see Role
Policy assignment policies.
The modifiable settings that are available in CAS mailbox plans by using the Set-
CasMailboxPlan cmdlet are described in the following table:
Modifying the settings of a mailbox plan won't update the settings of an existing
mailbox that already has the mailbox plan applied. To modify these settings on an
existing mailbox, you can:
Modify the corresponding mailbox settings directly in the Exchange admin center
(EAC) or in Exchange Online PowerShell (the Set-Mailbox and Set-CasMailbox
cmdlets).
Assign a different license to the user. The mailbox plan that corresponds to the
new license will be applied to the existing mailbox (the settings in the mailbox plan
will be applied to the existing mailbox).
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Mailbox settings" entry in
the Feature permissions in Exchange Online topic.
You can only use Exchange Online PowerShell to perform the procedures in this
topic. To connect to Exchange Online PowerShell, see Connect to Exchange Online
PowerShell.
Tip
PowerShell
PowerShell
These examples return the modifiable property values in all mailbox plans:
PowerShell
Get-MailboxPlan | Format-List
DisplayName,IsDefault,Max*Size,IssueWarningQuota,Prohibit*Quota,RetainDelete
dItemsFor,RetentionPolicy,RoleAssignmentPolicy
PowerShell
Get-CasMailboxPlan | Format-List
DisplayName,ActiveSyncEnabled,ImapEnabled,PopEnabled,OwaMailboxPolicy
These examples return detailed information for the mailbox plan named
ExchangeOnlineEnterprise.
PowerShell
PowerShell
This example returns the mailbox plan that's assigned to the user named Suk-Jae Yoo.
PowerShell
To return all mailboxes that had a specific mailbox plan applied, do the following steps:
1. Run the following command to find the distinguished name of the mailbox plan:
PowerShell
2. Use the following syntax to return the mailboxes that have the mailbox plan
assigned:
PowerShell
This example returns the mailboxes that have the ExchangeOnline mailbox plan
applied.
PowerShell
Get-Mailbox -ResultSize unlimited -Filter "MailboxPlan -eq
'CN=ExchangeOnline-93f46670-2ae7-4591-baa4-
ee153e090945,OU=constoso.onmicrosoft.com,OU=Microsoft Exchange Hosted
Organizations,DC=NAMPR22B009,DC=PROD,DC=OUTLOOK,DC=COM'"
For detailed syntax and parameter information, see Get-MailboxPlan and Get-
CasMailboxPlan.
PowerShell
PowerShell
PowerShell
This example modifies the mailbox plan named ExchangeOnlineEnterprise to use the
retention policy named Contoso Retention Policy.
PowerShell
This example disables Exchange ActiveSync, POP3, and IMAP4 access to mailboxes in all
CAS mailbox plans.
PowerShell
For detailed syntax and parameter information, see Set-MailboxPlan and Set-
CasMailboxPlan.
Automatically save sent items in
delegator's mailbox in Exchange Online
Article • 02/22/2023
Mailboxes in Microsoft 365 or Office 365 can be set up so that someone (such as an
executive assistant) can access the mailbox of another person (such as a manager) and
send mail as them. These people are often called the delegate and the delegator,
respectively. We'll call them "assistant" and "manager" for simplicity's sake. When an
assistant is granted access to a manager's mailbox, it's called delegated access.
People often set up delegated access and send permissions to allow an assistant to
manage a manager's calendar where they need to send and respond to meeting
requests. By default, when an assistant sends mail as, or on behalf of, a manager, the
sent message is stored in the assistant's Sent Items folder. You can use this article to
change this behavior so that the sent message is stored in both the assistant and
manager's Sent Items folders.
Let's take a look at a quick example of how this would work in real life:
Mary is the Vice President of Global Sales. She has an extremely busy schedule and
has Rob, her executive assistant, to help manage her calendar.
To help Mary, Rob's been granted delegated access to Mary's mailbox and to send
messages on her behalf. This allows him to see what's on her calendar; schedule,
accept, and decline meeting requests; and respond to messages.
Messages that Rob sends on behalf of Mary are stored in his Sent Items folder.
Mary wants a copy so Rob manually copies messages he's sent on her behalf from
his Sent Items folder to her Sent Item folder.
Rob's wonders if there's a better way to handle Sent Items so he asks his IT Help
Desk. He learns Mary's mailbox can be set up to store messages he sends on her
behalf in both his Sent Items and her Sent Items automatically. This is exactly what
he wants so he asks the Help Desk to set it up.
Send As When someone has "Send as" permissions on a mailbox, messages they
send from that mailbox will show only the mailbox owner's name in the From: field
of the message. In the example above, if Rob has "Send as" permissions on Mary's
mailbox, messages he sends from her mailbox will show From: Mary to recipients.
The send permissions that someone has on another user's mailbox are important when
thinking about how sent items should be handled. This is because you can decide, for
each level of permissions, whether messages should be stored in just the assistant's Sent
Items folder or in both the assistant and manager's Sent Items folders. Microsoft 365
and Office 365 default to storing sent items for messages sent with "Send as" and "Send
on behalf" permissions in the assistant's Sent Items only. You can change that default
behavior using the steps below.
Tip
Managers might have multiple assistants with different levels of permissions. In the
example above, while Rob may be able to send messages on behalf of Mary, she
could have another assistant that can Send as Mary. If this was the case, Mary's IT
department could do the steps for both "Send as" and "Send on behalf"
permissions.
PowerShell
PowerShell
That's it! The manager will now automatically get a copy of any messages sent by an
assistant, in their Sent Items folder.
Tip
You can turn this off by going through the steps above and replacing $true with
$false in the [Set-Mailbox] command. For example, to turn it off for Mary, they'd
run the command: Set-Mailbox -Identity mary@contoso.com -
MessageCopyForSentAsEnabled $false .
PowerShell
That's it! The manager will now automatically get a copy of any messages sent by an
assistant, in their Sent Items folder.
Tip
You can turn this off by going through the steps above and replacing $true with
$false in the [Set-Mailbox] command. For example, to turn it off for Mary, they'd
run the command Set-Mailbox mary@contoso.com -
MessageCopyForSendOnBehalfEnabled $false .
Clutter notifications in Outlook in
Exchange Online
Article • 02/22/2023
Tip
Focused Inbox is replacing Clutter. Learn more here: Update on Focused Inbox
and our plans for Clutter .
Clutter is a feature in Microsoft 365 and Office 365 that helps users focus on the most
important messages in their Inbox by moving lower priority messages into a new Clutter
folder.
Clutter Notifications
Clutter is enabled by users in their Microsoft 365 or Office 365 Settings options. This
article contains information for Microsoft 365 or Office 365 administrators about
notifications from Clutter to end-users.
These notifications are an integral part of the Clutter feature and therefore can't be
suspended by administrators. Clutter is a user election, similar to someone opting to use
Conversation view, and the notifications help the user understand the state of Clutter
across all clients. There is no central reporting available at this time. For information on
how to change the branding of the notifications see Change the branding of Clutter
notifications.
7 Note
For information on how end users can enable and begin using Clutter, see Use
Clutter to sort low priority messages in Outlook on the web .
To determine whether or not a user receives an invitation to enable Clutter, there are
several criteria, including:
Sufficient email: Does the user receive at least 3 clutter messages and at least 3
non-clutter messages?
Watermark current : Is the state of training reflective of the user's current state?
Supported classification version: Is the version for which training is complete still
supported?
True positive rate: Are at least 85% of true clutter messages classified as clutter?
False positive rate: Are less than 20% of messages classified as clutter actually non-
clutter?
Around the time that an invitation is sent, a new folder called Clutter is created and
added to their Favorites. The same invitation message will appear as the first message
inside the Clutter folder.
Cleaning up
To make sure the user understands that the new feature is on, Clutter will send another
notification to their Inbox, describing how Clutter works and how to correct Clutter
when it incorrectly moves a message to the Clutter folder. Clutter is a "learning" feature,
which means that after the user provides information to Clutter by manually moving
low-priority messages to the Clutter folder, Clutter will be able to identify similar
messages and move them automatically.
If the user finds that Clutter isn't what they need, this notification also provides a link for
turning Clutter off. In newer clients, there are specific controls to control Clutter, but
these are unavailable in older clients.
Hard at work
During the first three weeks of Clutter usage, the following notification is sent
periodically for two reasons. First, it reminds the user to inspect the Clutter folder and
make sure that Clutter is filtering messages correctly. Second, this notification provides a
way for the user to provide feedback on Clutter. Additionally, there are links that provide
more information about the feature and that turn Clutter off.
Change the branding of Clutter
notifications in Exchange Online
Article • 02/22/2023
Tip
Focused Inbox is going to replace Clutter. Learn more: Update on Focused Inbox
and our plans for Clutter .
The Clutter feature uses Inbox notifications to invite users and to send status messages.
The default branding used for these notifications is Outlook, but you can modify the
branding for your organization.
7 Note
For more information about the types of Clutter notifications that end users in your
organization receive, see Clutter notifications in Outlook.
To begin, you will need to sign in to Microsoft 365 or Office 365 with your work or
school account.
1. Once signed in to Microsoft 365 or Office 365, go to the Microsoft 365 admin
center.
3. Select Add to add a user. The Create a new user account dialog will open.
4. In the Create a new user account dialog, enter a Display name and a username.
The display name will appear in the Sender field for all Clutter notifications sent to
your users. A new temporary password is generated for the new user account. Click
Create to create the account.
5. Go to the new Exchange admin center (EAC).
7. Select the user you just created. A details pane will be shown.
8. Under Mailbox settings > Email addresses, click Manage email address types.
9. In the Manage email address types display pane, click Add email address type
to add an email address to the new user account.
10. In the new email address dialog, select SMTP as the email address type, and then,
in the Email address:* box, type the following: 7a694ec2-b7c9-41eb-b562-
08fd2b277ae0@[your default domain], where [your default domain] is the domain
that your organization uses. For most organizations, this would be [your domain
name].onmicrosoft.com. When finished, click OK.
11. Back in the Manage email address types dialog, click Save to associate the new
email address with the user account. All Clutter notifications sent to end users in
your organization will now originate from this account.
7 Note
For more information about the types of Clutter notifications that end users in your
organization receive, see Clutter notifications in Outlook.
To begin, you will need to sign in to Microsoft 365 or Office 365 with your work or
school account.
1. Once signed in to Microsoft 365 or Office 365, go to the Microsoft 365 admin
center.
3. Select Add to add a user. The Create a new user account dialog will open.
4. In the Create a new user account dialog, enter a Display name and a username.
The display name will appear in the Sender field for all Clutter notifications sent to
your users. A new temporary password is generated for the new user account. Click
Create to create the account.
7. Select the user you just created, and then click the pencil icon to edit the account,
as shown in the following example.
8. In the user account dialog, click Email address, and then click Add to add an
email address to the new user account.
9. In the new email address dialog, select SMTP as the email address type, and then,
in the Email address box, type the following: 7a694ec2-b7c9-41eb-b562-
08fd2b277ae0@[your default domain], where [your default domain] is the domain
that your organization uses. For most organizations, this would be [your domain
name].onmicrosoft.com.
PowerShell
You can use Exchange Online PowerShell to enable or disable single item recovery on a
mailbox. In Exchange Online, single item recovery is enabled by default when a new
mailbox is created. In Exchange Server, single item recovery is disabled when a mailbox
is created. If single item recovery is enabled, messages that are permanently deleted
(purged) by the user are retained in the Recoverable Items folder of the mailbox until
the deleted item retention period expires. This lets an administrator recover messages
purged by the user before the deleted item retention period expires.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Retention policies" entry
in the Feature permissions in Exchange Online topic.
You can't use the Exchange admin center (EAC) to enable or disable single item
recovery.
In Exchange Online, the deleted item retention period is set to 14 days, by default.
You can change this setting to a maximum of 30 days. For details, see Change how
long permanently deleted items are kept for an Exchange Online mailbox.
In Exchange Server, the mailbox uses the deleted item retention settings of the
mailbox database, by default. The deleted item retention period for a mailbox
database is set to 14 days, but you can override the default by configuring this
setting on a per-mailbox basis. For details, see Change how long permanently
deleted items are kept for an Exchange Online mailbox.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Having problems? Ask for help in the Exchange forums. Visit the forums at Exchange
Online or Exchange Online Protection .
Use Exchange Online PowerShell to enable
single item recovery
This example enables single item recovery for the mailbox of April Summers.
PowerShell
This example enables single item recovery for the mailbox of Pilar Pinilla and sets the
number of days that deleted items are retained to 30 days.
PowerShell
This example enables single item recovery for all user mailboxes in the organization.
PowerShell
This example enables single item recovery for all user mailboxes in the organization and
sets the number of days that deleted items are retained to 30 days
PowerShell
PowerShell
PowerShell
You can use this same command to verify that single item recovery is disabled for a
mailbox.
More information
To learn more about single item recovery, see Recoverable Items folder in
Exchange Online. To recover messages purged by the user before the deleted item
retention period expires, see Recover deleted messages in a user's mailbox.
) Important
Effective from December 2022, the classic Exchange Admin Center will be
deprecated for worldwide customers. Microsoft recommends using the new
Exchange Admin Center , if not already doing so.
While most of the features have been migrated to new EAC, some have been
migrated to other admin centers and remaining ones will soon be migrated to New
EAC. Find features that are not yet there in new EAC at Other Features or use
Global Search that will help you navigate across new EAC.
) Important
Check out the new Exchange admin center! The experience is modern, intelligent,
accessible, and better. Personalize your dashboard, manage cross tenant migration,
experience the improved Groups feature, and more. Try it now !
Administrators can search for and recover deleted email messages in a user's mailbox.
This includes items that are permanently deleted (purged) by a person (by using the
Recover Deleted Items feature in Outlook or Outlook on the web (formerly known as
Outlook Web App)), or items deleted by an automated process, such as the retention
policy assigned to user mailboxes. In these situations, the purged items can't be
recovered by a user. But administrators can recover purged messages if the deleted item
retention period for the item hasn't expired.
7 Note
In addition to using this procedure to search for and recover deleted items (which
are moved to the Recoverable Items\Purges folder if either single item recovery or
litigation hold is enabled), you can also use this procedure to search for items
residing in other folders in the mailbox and to delete items from the source
mailbox (also known as search and destroy).
What you need to know before you begin?
Estimated time to complete: 15-30 minutes.
Procedures in this article require specific permissions. See each procedure for its
permissions information.
Single item recovery must be enabled for a mailbox before the item you want to
recover is deleted. In Exchange Online, single item recovery is enabled by default
when a new mailbox is created. In Exchange Server, single item recovery is disabled
when a mailbox is created. For more information, see Enable or disable single item
recovery for a mailbox.
To search for and recover items, you must have the following information:
2. Select the mailbox for which you want to recover deleted messages, and click on
the display name.
4. Enter values for each or either of the filter criteria from the drop-down lists.
7 Note
You can use In-Place eDiscovery in the Exchange admin center (EAC) to search for
missing items. However, when using the EAC, you can't restrict the search to the
Recoverable Items folder. Messages matching your search parameters will be
returned even if they're not deleted. After they're recovered to the specified
discovery mailbox, you may need to review the search results and remove
unnecessary messages before recovering the remaining messages to the user's
mailbox or exporting them to a .pst file. For details about how to use the EAC to
perform an In-Place eDiscovery search, see Create an In-Place eDiscovery search.
This example returns all of the available recoverable deleted messages with the specified
subject in the mailbox laura@contoso.com for the specified date/time range.
Tip
7 Note
After messages have been recovered to a discovery mailbox, you can restore them to
the user's mailbox by using the Restore-RecoverableItems cmdlet.
After using the Get-RecoverableItems cmdlet to verify the existence of the item, this
example restores the specified deleted items in the specified mailboxes:
More information
The ability to recover deleted items is enabled by single item recovery, which lets
an administrator recover a message that's been purged by a user or by retention
policy as long as the deleted item retention period hasn't expired for that item. To
learn more about single item recovery, see Recoverable Items folder in Exchange
Online.
As previously explained, you can also use the In-Place eDiscovery tool to find and
export deleted items to a PST file. The user will use this PST file to restore the
deleted messages to their mailbox. For detailed instructions, see Recover deleted
items in a user's mailbox - Admin Help.
Users can recover a deleted item if it hasn't been purged and if the deleted item
retention period for that item hasn't expired. If users need to recover deleted items
from the Recoverable Items folder, point them to the following articles:
In addition to using this procedure to search for and recover deleted items, you
can also use a similar procedure to search for items in user mailboxes and then
delete those items from the source mailbox. For more information, see Search for
and delete email messages.
Related article
Are you using Exchange Server? See Recover deleted messages in a user's mailbox in
Exchange Server.
Use Exchange Online PowerShell to
display Microsoft 365 or Office 365
mailbox information
Article • 02/22/2023
) Important
Check out the new Exchange admin center! The experience is modern, intelligent,
accessible, and better. Personalize your dashboard, manage cross tenant migration,
experience the improved Groups feature, and more. Try it now !
Admins can learn how to use Exchange Online PowerShell to display information about
mailboxes in their Microsoft 365 or Office 365 organization.
To give you an idea of some of the things you can do with PowerShell in Microsoft 365
and Office 365, let's take a look at user mailboxes in Exchange Online PowerShell.
PowerShell
PowerShell
Here's an example command that displays all the information for a specific mailbox:
PowerShell
The command instructs Exchange Online PowerShell to return all of the available
properties for the mailbox in a list. There are about 200 different properties and
property values. You can also use the Format-List and Format-Table cmdlets to return
only specific property values. For example, you can also view litigation hold-related
properties for Ken Myer with this command:
PowerShell
You can also use wildcard characters when working with the Format-List cmdlet. For
example, all the litigation hold properties start with the letters lit . You can retrieve this
same information by using this command:
PowerShell
This command tells Get-Mailbox to retrieve the value of Ken's DisplayName property
along with the values of any properties that have names that begin with the letters lit .
Here's an example of what we get back:
PowerShell
You can return information about multiple mailboxes by leaving out the Identity
parameter. This example returns the DisplayName and LitigationHoldEnabled
properties for all mailboxes:
PowerShell
In many cases, you only want to look at a subset of your mailboxes. For example,
suppose you are asked to come up with a list of all the mailboxes that have been
assigned a litigation hold. You can use the Where-Object cmdlet in conjunction with the
Get-Mailbox cmdlet. The Where-Object cmdlet needs a filter phrase to tell Exchange
Online PowerShell what set of mailboxes you are interested in.
gt (greater than)
lt (less than)
Values for <PropertyValue> depend on the property, and can be values like strings,
numbers, Boolean values ( $True or $False ), or no value ( $Null ). Text values with
spaces require quotation marks around the value. Numerical values, Boolean values, and
$Null don't require quotation marks around the value.
Returning to our example of all the mailboxes that have been assigned a litigation hold,
the filter phrase is "LitigationHoldEnabled -eq $True" :
Once you have the filter phrase, you can construct the Where-Object portion of the
command using this syntax:
PowerShell
PowerShell
For another example, suppose you'd like to make sure that all of your users have the
junk email rule enabled. Here's a quick command to find any users who don't have that
rule enabled:
PowerShell
This is just one example. If you want to display a set of mailboxes based on a setting and
can't filter on that setting in the Microsoft 365 admin center, do these steps:
1. Find the mailbox property that corresponds to the setting you're interested in by
running the command Get-Mailbox -Identity "<MailboxIdentity" | Select-Object
* to list all the properties of a mailbox. <MailboxIdentity> is any unique identifier
2. Construct your Office 365 PowerShell command like this: Get-Mailbox -ResultSize
unlimited | Where-Object {$_.<PropertyName> -<ComparisonOperator>
<PropertyValue>}
Create and manage groups in the new
Exchange admin center in Exchange
Online
Article • 01/27/2023
Use the new Exchange admin center (EAC) to create, modify, export, or remove groups
in your Exchange Online organization.
There are four types of groups that can be used to distribute messages:
Microsoft 365 group (formerly known as Office 365 groups), is used for
collaboration between teams, both inside and outside your company; by giving
them a group email and a shared workspace for conversations, files, and calendars.
7 Note
Dynamic distribution list group is used to expedite the mass sending of email
messages and other information within a Microsoft Exchange organization.
Create a group
1. Login to the new Exchange admin center , and navigate to Recipients > Groups.
2. Click Add a group and follow the instructions in the details pane.
3. Click Close.
Edit a group
1. From the list view, select the group that you want to edit, and click the selected
group name.
In General section, you can edit the Basic information and the Email address
of the group.
In Members section, you can view, manage, and add Owners and Members
to the group.
a. For Microsoft 365 group, you can edit/check the confirmation boxes under
General settings, change the status in Privacy settings, and then click Save to
save the changes.
b. For Distribution list group and Mail-enabled security group, you can
edit/check the confirmation box to allow external senders to email this group
and then click Advanced Settings to edit/manage more settings in the
Exchange admin center.
7 Note
Microsoft Teams can be added to only a Microsoft 365 group. This option is
not available for the other groups. To create a team, all group owners must
have a license that includes Teams.
Export a group
You can export group details in a .csv file format.
1. Select the group from the list view that you want to export and click Export
groups.
2. Click Continue.
Naming policy
You can add prefixes and suffixes to your group names.
In Blocked words, add specific words that you want to block from being used
in group names and aliases.
3. Click Save.
1. Select the group from the list view that you want to upgrade and click Upgrade
distribution group.
2. Click Upgrade.
7 Note
Other actions
1. Click Refresh to update the list of groups page after adding a group or editing the
details of a group.
2. Click ... to perform the following actions:
3. Select a group, click ... > Edit email address to edit Primary and Aliases email
address.
4. Click Filter to filter the groups based on the displayed options in the drop-down
list.
5. Enter information in the Search box to search a group, group email id, or other
details.
See one of the following topics for managing groups in the Classic Exchange admin
center:
) Important
Effective from December 2022, the classic Exchange Admin Center will be
deprecated for worldwide customers. Microsoft recommends using the new
Exchange Admin Center , if not already doing so.
While most of the features have been migrated to new EAC, some have been
migrated to other admin centers and remaining ones will soon be migrated to New
EAC. Find features that are not yet there in new EAC at Other Features or use
Global Search that will help you navigate across new EAC.
) Important
Check out the new Exchange admin center! The experience is modern, intelligent,
accessible, and better. Personalize your dashboard, manage cross tenant migration,
experience the improved Groups feature, and more. Try it now !
Use the Exchange admin center (EAC) or Exchange Online PowerShell to create, modify,
or remove distribution list groups in your Exchange Online organization.
You can use Exchange Online PowerShell to convert an existing distribution list group
into a shared mailbox. For information on how to do it, see Use the Exchange
Management Shell to convert a distribution list group into a shared mailbox.
There are two types of groups that can be used to distribute messages:
Mail-enabled universal distribution groups (also called distribution list groups) can
be used only to distribute messages.
Mail-enabled universal security groups (also called security groups) can be used to
distribute messages and to grant access permissions to resources. For more
information, see Manage mail-enabled security groups.
It's important to note the terminology differences between Active Directory and
Exchange Online. In Active Directory, a distribution list group refers to any group that
doesn't have a security context, whether it's mail-enabled or not. In contrast, in
Exchange Online, all mail-enabled groups are referred to as distribution list groups,
whether they have a security context or not.
To open the Exchange admin center, see Exchange admin center in Exchange
Online.
You need permissions before you can do this procedure or procedures. To see
what permissions you need, see the "Recipients" entry in the Feature permissions
in Exchange Online article.
If your organization has configured a group naming policy, it's applied only to
groups created by users. When you or other administrators use the EAC to create
distribution list groups, the group naming policy is ignored and isn't applied to the
group name. However, if you use Exchange Online PowerShell to create or rename
a distribution list group, the policy is applied unless you use the
IgnoreNamingPolicy parameter to override the group naming policy. For more
information, see:
2. Click Add a group and follow the instructions in the details pane.
Under Choose a group type section, select Distribution and click Next.
Under Set up the basics section, enter the details and click Next.
3. In Assign owners section, click + Assign owners, select the group owner from the
list, and click Next.
4. Under Add members, click + Add members, select the group members from the
list, and click Next.
5. In Edit settings section, enter the group email address, select the following boxes
and then click Next:
Joining the group: Select who are allowed to join the group.
b. Closed: Only group owners can add members. All requests to join are
automatically denied.
c. Owner approval: Anyone can request to join this group and owners must
approve the request.
Leaving the group: Select who are allowed to leave the group.
a. Open: Anyone can leave this group without group owner approval.
b. Closed: Only group owners can remove members. All requests to leave are
automatically denied.
6. In Review and finish adding group section, verify all the details, click Create
group, and then click Close.
2. In the list of groups, click the distribution list group that you want to view or
change.
3. On the group's properties page, click one of the following sections to view or
change properties.
) Important
Prior to converting an existing distribution list group into a shared mailbox, replace
your existing distribution list group's address with another address so that this
distribution list group is free to be converted into a shared mailbox. An address
being used for a distribution list group cannot be converted into a shared mailbox.
Once you've freed the existing distribution list group from the email address that's to be
used for the shared mailbox, perform the following steps:
Email address: Specifically the email address that was freed from the
distribution list group.
3. Click Save to save your changes and create the shared mailbox.
3. To grant Full Access and Send As permissions, click Add and then select the
users you want to grant permissions to.
7 Note
The Full Access permission allows a user to open the mailbox as well as create
and modify items in it. The Send As permission allows anyone other than the
mailbox owner to send email from this shared mailbox. Both permissions are
required for successful shared mailbox operation.
2. You have the LegacyExchangeDN of the distribution list group you're converting
into a shared mailbox by running the following command in your Exchange
Management Shell:
1. Delete the distribution list group and create a shared mailbox with the email
address that was freed from the distribution list group. Do this step by running the
following command:
PowerShell
2. Ensure that you are adding to the shared mailbox the email addresses of all the
persons you intended to add as members to the shared mailbox. For more
information on how to add persons as members to the shared mailbox, see Add
users to the shared mailbox.
3. Convert the email address of the newly created shared mailbox into an x500 email
address by performing the following steps:
a. From the page displaying details of the newly created shared mailbox, click the
Email address tab.
b. Click Add Icon., select Custom address, and then perform the following steps:
7 Note
ii. Select the x500 from the Email type dropdown list.
5. After adding the members to the newly created shared mailbox, assign the Full
Access and Send As permissions to these members by running the following
command.
PowerShell
PowerShell
General
Use this section to view or change basic information about the group.
Name: This name appears in the address book, on the To line when email is sent to
this group, and in the Groups list. The display name is required and should be
user-friendly so people recognize what it is. It also has to be unique in your
domain.
Description: Use this box to describe the group so people know what the purpose
of the group is. This description appears in the address book and in the Details
pane in the new EAC.
Email options
Use this section to view or change the email addresses associated with the group. This
includes the group's primary SMTP addresses and any associated proxy addresses.
Under Edit email addresses page, change/edit the Primary email address, add/delete
Aliases, and then click Save changes.
You can also select the group and then click Edit email address from the toolbar to
change/edit the Primary email address, add/delete Aliases, and then click Save
changes.
Members
Use this section to change/edit the following:
Under Owners section, click View all and manage owners to add/remove group
owners from the drop-down list and then click Save changes. The distribution list
group must have at least one owner.
Under Members section, click View all and manage members to add/remove
group members from the drop-down list and then click Save changes. The
distribution list group must have at least one member.
Settings
Under General settings section, select the checkbox Allow external senders to email
this group if you want to allow the external users to send email to this group.
Delivery management
Use this section to manage who can send email to this group.
Sender options: By default, only people inside your organization can send
message to this group. You can also allow people outside the organization to send
message to this group.
Only allow messages from people inside my organization: Select this option to
allow only senders in your organization to send messages to the group. This
means that if someone outside your organization sends an email message to this
group, it is rejected. This is the default setting.
Allow messages from people inside and outside my organization: Select this
option to allow anyone to send messages to the group.
Specified senders: You can further limit who can send messages to the group by
allowing only specific senders to send messages to this group. Select/remove one
or more recipients/group from the drop-down list. If you add senders to this list,
they are the only ones who can send mail to the group. Mail sent by anyone not in
the list will be rejected.
) Important
If you've configured the group to allow only senders inside your organization
to send messages to the group, email sent from a mail contact is rejected,
even if they're added to this list.
Manage delegates
Use this section to assign permissions to a user (called a delegate) to allow them to send
messages as the group or send messages on behalf of the group. You can assign the
following permissions:
Send As: This permission allows the delegate to send messages as the group. After
this permission is assigned, the delegate has the option to add the group to the
From line to indicate that the message was sent by the group.
Send on Behalf: This permission also allows a delegate to send messages on
behalf of the group. After this permission is assigned, the delegate has the option
to add the group to the From line. The message will appear to be sent by the
group and will say that it was sent by the delegate on behalf of the group.
To assign permissions to delegates in new EAC, add the delegates under the Edit
delegates page, select the Permission type from the drop-down list and click Save
changes.
Message approval
Use this section to set options for moderating the group. Moderators approve or reject
messages sent to the group before they reach the group members.
Require moderator approval for messages sent to this group: This check box isn't
selected by default. If you select this check box, incoming messages are reviewed
by the group moderators before delivery. Group moderators can approve or reject
incoming messages.
Add senders who don't require message approval: To add/remove users that can
bypass moderation for this group, search/add users from the drop-down list.
Notify a sender if their message isn't approved: Use this section to set how users
are notified about message approval.
Only sender: This is the default setting. Notify all senders, inside and outside your
organization, when their message isn't approved.
Only senders in your organization: When you select this option, only users or
groups in your organization are notified when a message that they sent to the
group isn't approved by a moderator.
No notifications: When you select this option, notifications aren't sent to senders
whose messages aren't approved by the group moderators.
Membership approvals
Use this section to edit membership approvals and to specify if group owner approval is
needed for users to join or leave this group.
Joining the group: View/Edit who are allowed to join the group.
2. Closed: Only group owners can add members. All requests to join are
automatically denied.
3. Owner approval: Anyone can request to join this group and owners must
approve the request.
Leaving the group: View/Edit who are allowed to leave the group.
1. Open: Anyone can leave this group without group owner approval.
2. Closed: Only group owners can remove members. All requests to leave are
automatically denied.
2. In the list of groups, select the distribution list group that you want to remove, and
then click Delete group from the toolbar.
You can now create a Microsoft 365 group instead of a distribution group, if you have a
Microsoft 365 or Office 365 for business plan or an Exchange Online plan. Microsoft 365
groups have the features of a distribution group and much more. With Microsoft 365
groups, you can send email to a group, share a common calendar, and have a library for
storing and working on group files and folders. Click New > Microsoft 365 group to
get started and see Learn about Microsoft 365 Groups .
If you have existing distribution groups that you want to migrate to Microsoft 365
groups, see Upgrade distribution lists to Microsoft 365 Groups in Outlook.
If you still want to create distribution list groups, use the following steps:
3. In the New distribution group page that opens, configure the following settings.
Settings marked with an * are required.
*
Display name: This name appears in your organization's address book, on
the To: line when email is sent to this group, and in the Groups list in the EAC.
The display name is required, must be unique, and should be user-friendly so
people recognize what it is.
*
Alias: Use this box to type the name of the alias for the group. The alias can't
exceed 64 characters and must be unique. When a user types the alias in the
To line of an email message, it resolves to the group's display name.
*Email address: The email address consists of the alias on the left side of the
at (@) symbol, and a domain on the right side. By default, the value of Alias is
used for the alias value, but you can change it. For the domain value, click the
drop-down and select and accepted domain in your organization.
Notes: This description appears in the address book and in the Details pane
in the Classic EAC.
*Owners: A group owner can add members to the group, approve or reject
requests to join or leave the group, and approve or reject messages sent to
the group. By default, the person who creates a group is the owner. All
groups must have at least one owner.
To add owners, click Add . In the dialog that appears, find, and select a
recipient or group, and then click add ->. Repeat this step as many times as
necessary. When you're finished, click OK.
Members: Add and remove group members and specify whether approval is
required for people to join or leave the group.
Open: Anyone can join this group without being approved by the group
owners. This is the default value.
Closed: Members can be added only by the group owners. All requests to
join will be rejected automatically
Open: Anyone can leave this group without being approved by the group
owners. This is the default value.
Closed: Members can be removed only by the group owners. All requests
to leave will be rejected automatically.
4. When you're finished, click Save to create the distribution list group.
7 Note
2. In the list of groups, select the distribution list group that you want to modify, and
then click Edit .
3. On the distribution group properties page that opens, click one of the following
tabs to view or change properties.
General
Use this tab to view or change basic information about the group.
Display name: This name appears in the address book, on the To line when email is
sent to this group, and in the Groups list. The display name is required and should
be user-friendly so people recognize what it is. It also has to be unique in your
domain.
If you've implemented a group naming policy, the display name has to conform to the
naming format defined by the policy.
Alias: This is the portion of the email address that appears to the left of the at (@)
symbol. If you change the alias, the primary SMTP address for the group will also
be changed, and contain the new alias. Also, the email address with the previous
alias will be kept as a proxy address for the group.
Email address: The email address consists of the alias on the left side of the at (@)
symbol, and a domain on the right side. By default, the value of Alias is used for
the alias value, but you can change it. For the domain value, click the drop-down
and select and accepted domain in your organization.
Notes: This description appears in the address book and in the Details pane in the
Classic EAC.
Hide this group from address lists: Select this check box if you don't want users to
see this group in the address book. To send email to this group, a sender has to
type the group's alias or email address on the To: or Cc: lines.
Ownership
Use this tab to assign group owners. The group owner can add members to the group,
approve or reject requests to join or leave the group, and approve or reject messages
sent to the group. By default, the person who creates a group is the owner. All groups
must have at least one owner.
To add owners, click Add . In the dialog that appears, find and select a recipient, and
then click add ->. Repeat this step as many times as necessary. When you're finished,
click OK.
Membership
Use this tab to add or remove group members. Group owners don't need to be
members of the group.
To add members, click Add . In the dialog that appears, find, and select a recipient or
group, and then click add ->. Repeat this step as many times as necessary. When you're
finished, click OK.
Membership approval
Use this tab to specify whether approval is required for users to join or leave the group.
Choose whether owner approval is required to join the group: Select one of the
following settings:
Open: Anyone can join this group without being approved by the group
owners. This is the default value.
Closed: Members can be added only by the group owners. All requests to join
will be rejected automatically
Owner Approval: All requests are manually approved or rejected by the group
owners. If you select this option, the group owners will receive an email
message requesting approval to join the group.
Choose whether the group is open to leave: Specify whether approval is required
for people to leave the group. Select one of the following settings:
Open: Anyone can leave this group without being approved by the group
owners. This is the default value.
Closed: Members can be removed only by the group owners. All requests to
leave will be rejected automatically.
Delivery management
Use this tab to manage who can send email to this group.
You can configure the group to accept messages only from specific senders.
To add senders, click Add . In the dialog that appears, find, and select a sender or
group, and then click add ->. Repeat this step as many times as necessary. When you're
finished, click OK.
To remove a sender from the list, select the sender, and then click Remove .
) Important
Mail contacts are always considered external users. So, if you configure the group
to only accept messages from internal senders and you add mail contacts to the list
of allowed senders, messages from those mail contacts are still rejected.
Message approval
Use this tab to set options for moderating the group. Moderators approve or reject
messages sent to the group before they reach the group members.
Group moderators: To add moderators, click Add . In the dialog that appears,
find and select a recipient, and then click add ->. Repeat this step as many times as
necessary. When you're finished, click OK.
If you enable moderation for the group but don't specify any moderators, group owners
are responsible for approving messages that are sent to the group.
Senders who don't require message approval: Messages sent to the group by the
specified senders don't require approval from a moderator.
To add senders, click Add . In the dialog that appears, find, and select a sender or
group, and then click add ->. Repeat this step as many times as necessary. When you're
finished, click OK.
Notify all senders when their messages aren't approved: Internal and external
senders are notified when their messages aren't approved. This is the default value.
Email options
Use the Email addresses tab to view or change the email addresses associated with the
group. This includes the group's primary SMTP address and any associated proxy
addresses. The primary SMTP address (also known as the reply address) is displayed in
bold text in the address list, with the uppercase SMTP value in the Type column.
Add: Click Add . In the New email address page that appears, configure the
following settings:
Edit: Select the email address that you want to modify, and then click Edit . In
the Email address page that appears, configure the following settings:
Make this the reply address: This setting only appears if the email address you
selected isn't already the reply address.
Remove: Select the email address that you want to remove, and then click Remove
. You can't remove the reply address.
MailTip
Use the MailTip tab to add an alert for potential issues before a user sends messages to
this recipient. The text is displayed in the InfoBar when this recipient is added to the To,
Cc, or Bcc lines of a new email message.
MailTips can include HTML tags, but scripts aren't allowed. The length of a custom
MailTip can't exceed 175 displayed characters. HTML tags aren't counted in the limit.
Group delegation
Use this section to assign permissions to a user (called a delegate) to allow them to send
messages as the group or send messages on behalf of the group. You can assign the
following permissions:
Send As: Allows the delegate to send messages as if they came directly from the
group. There's no indication that the message was sent by the delegate. After this
permission is assigned, the delegate has the option to add the group to the From:
line to indicate that the message was sent by the group.
Send on Behalf: Allows the delegate to send messages from the group. The From
address of these messages clearly shows that the message was sent by the
delegate ("<Delegate> on behalf of <Group>"). However, replies to these
messages are sent to the group, not to the delegate. After this permission is
assigned, the delegate has the option to add the group in the From: line.
To add senders, click Add . In the dialog that appears, find, and select a sender or
group, and then click add ->. Repeat this step as many times as necessary. When you're
finished, click OK.
To remove a sender from the list, select the sender, and then click Remove .
2. In the list of groups, select the distribution list groups that you want to remove,
and then click Remove .
PowerShell
Get-DistributionGroup
Set-DistributionGroup
Here are some examples of using Exchange Online PowerShell to change distribution
group properties.
This example changes the primary SMTP address (also called the reply address) for the
Seattle Employees distribution group from employees@contoso.com to
sea.employees@contoso.com. Also, the previous reply address will be kept as a proxy
address.
PowerShell
This example enables moderation for the distribution group Customer Support and sets
the moderator to Amy. In addition, this moderated distribution group will notify senders
who send mail from within the organization if their messages aren't approved.
PowerShell
This example changes the user-created distribution group Dog Lovers to require the
group manager to approve users' requests to join the group. In addition, by using the
BypassSecurityGroupManagerCheck parameter, the group manager will not be notified
that a change was made to the distribution list group's settings.
PowerShell
This example exports the members of a distribution group to a .csv file named
DLGroupMembers.csv.
PowerShell
This example exports the members of a dynamic distribution group to a .csv file named
DDLGroupMembers.csv.
PowerShell
In the new EAC, select the group to view the property or feature that you changed.
Depending on the property that you changed, it might be displayed in the details
pane for the selected group.
In the Classic EAC, go to Recipients > Groups. Verify that the group is listed (or not
listed). The Group Type is Distribution group. Select the group and click Edit to
verify the property settings.
PowerShell
PowerShell
To get a list of members in the group, replace <GroupIdentity> with the name,
alias, or email address of the distribution list group, and run the following
command:
PowerShell
Admins allow end users (owners) of distribution lists to upgrade their list to a Microsoft
365 Group. The end owners can't initiate this process; admins have complete control
and decide which distribution list needs to be upgraded.
1. In the Exchange Admin Center, go to Recipients > Group > Distribution List and
select the specific distribution list. Admins can now see the new option "Send
upgrade request". The email isn't sent at this stage.
2. If the distribution list is eligible for an upgrade, select the owners to send this
email. You can either choose all the owners or specific owners to send this email.
7 Note
If the distribution list isn't eligible for an upgrade. You get the following error message
for such distribution lists.
The end user gets the email. And once the user selects the Upgrade in the email, the
distribution list gets converted to a Microsoft 365 Group.
7 Note
The email address of the distribution list will not change when users upgrade.
Create a distribution group naming
policy in Exchange Online
Article • 02/22/2023
A group naming policy lets you standardize and manage the names of distribution
groups created by users in your organization. You can add specific prefix and suffix to
the name of a distribution group when it's created. And you can also block specific
words from being used. This helps you minimize the use of inappropriate words in
group names.
Identifies the type of users who are likely members of the group.
How does a group naming policy work? When a user creates a group, they specify a
name in the Display Name field. After the group is created, Microsoft Exchange applies
the group naming policy by adding any prefix or suffix that you've defined in the group
naming policy. The full name is displayed in the distribution groups list in the Exchange
admin center (EAC), the shared address book, and the To:, Cc:, and From: fields in email
messages. If a user tries to use a word that you've blocked, they get an error message
when they try to save the new group and are asked to remove the blocked word and
save the group again.
Here are some examples of a group naming policy. In each, <Group Name> is a
descriptive name provided by the person who creates the group. Exchange adds the
prefixes and suffixes defined by the policy to the display name when the group is
created.
Text strings, with underscore characters, used for a single prefix (DG) and suffix
(Users):
DG_<Group Name>_Users
Multiple prefixes (DG and Contoso) and one suffix (Users), using text strings:
DG_Contoso_<Group Name>_Users
Department_<Group Name>
For example, say that your school populates the Department attribute for faculty
members. Here's an example of a group name created by a faculty member in the
Psychology department:
Psychology_Cognitive201
In this example, the underscore character (_) is provided as the only text string in a
second prefix to separate the department name from the group name.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Recipients" entry in the
Feature permissions in Exchange Online topic.
The maximum length for a group name is 64 characters. This includes the
combined number of characters in the prefix, the group name provided by the
user, and the suffix.
The group naming policy is applied only to groups created by users. When you or
other administrators use the EAC to create distribution groups, the group naming
policy is ignored and not applied to the group name.
Group names are created without spacing. We recommend that you use an
underscore character (_) or some other placeholder between text strings,
attributes, and the group name.
You can use Windows PowerShell to override the group naming policy when you
create and edit a distribution group. For more information, see Override the
distribution group naming policy.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
2. Click Add naming policy to add prefixes and suffixes to your group names.
3. In Edit group naming policy details pane, under Policy section, configure the
prefix by selecting either Attribute or Text in the drop-down menu.
5. For the suffix, in the drop-down menu, select either Attribute or Text, and
configure the suffix.
After you add a prefix and suffix, notice that a preview of the group naming policy
is displayed.
8. Under Blocked words section, add specific words that you want to block from
being used in group names and aliases.
2. Under Group Naming Policy, configure the prefix by selecting either Attribute or
Text in the pull-down menu.
Notice that the text string that you typed or the attribute you selected is displayed
as a hyperlink. Click the hyperlink to change the text string or attribute.
4. For the suffix, in the pull-down menu, select either Attribute or Text, and configure
the suffix.
After you add a prefix or suffix, notice that a preview of the group naming policy is
displayed.
To add a word to the list, type the word to block and click Add .
In the new EAC, select Recipients > Groups > Add naming policy.
In Edit group naming policy details pane, the group naming policy that you
defined is displayed under Preview policy section.
In the Classic EAC, select Groups > More > Configure group naming policy.
On the Group naming policy page, the group naming policy that you defined is
displayed under Preview of policy.
In Windows PowerShell, run the following command to display the group naming
policy.
PowerShell
The group naming policy for distribution groups is applied only to groups created by
users and to groups created by administrators using the new Exchange admin center
(new EAC). When you or other administrators use the classic Exchange admin center
(classic EAC) to create distribution groups, the group naming policy is ignored and not
applied to the group name.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Recipients" entry in the
Feature permissions in Exchange Online topic.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
PowerShell
New-DistributionGroup -Name <Group Name> -IgnoreNamingPolicy
For example, if the group naming policy for your organization is DG_<Group
Name>_Users, run the following command to create a group named All Administrators.
PowerShell
When Microsoft Exchange creates this group, it uses All Administrators for both the
Name and DisplayName parameters.
PowerShell
For example, let's say you created a group naming policy late one night and the next
morning you realized you misspelled the text string in the prefix. The next morning, you
see that a new group has already been created with the misspelled prefix. You can fix
the group naming policy in the EAC, but you have to use Exchange Online PowerShell to
rename the group with the misspelled name. Run the following command.
PowerShell
) Important
Be sure to include the DisplayName parameter when you rename a group. If you
don't, the old name is still displayed in the shared address book on the To:, Cc:, and
From: lines in email messages.
PowerShell
PowerShell
If the format of the display name for the group is different than the one enforced by
your organization's group naming policy, it worked.
Manage dynamic distribution groups in
Exchange Online
Article • 02/22/2023
7 Note
A new version of this feature is currently being rolled out to customers. Modern
Dynamic Distribution Groups will be fully released by April 2022, replacing the
earlier method.
Dynamic distribution groups (DDGs) are mail-enabled Active Directory group objects
that are created to expedite the mass sending of email messages and other information
within a Microsoft Exchange organization.
DDGs in Exchange Online have been modernized to bring a more reliable, predictable,
and better performing experience. This change will reduce mail delivery latency, improve
service reliability, and allow you to see the members of a DDG before sending a
message.
The membership list is now stored for each DDG and is updated once every 24 hours.
You'll know exactly to whom the message is being sent, and it also addresses potential
compliance issues. By storing the calculated list of members on the DDG object,
messages can be delivered more quickly and our service will have greater reliability.
) Important
Mail delivery Unpredictable. The time it takes to Faster and more predictable overall. You
latency deliver mail to a DDG depends on should see delivery times more in line
how complex the filters are on that with those for regular distribution groups.
DDG.
Creation DDGs could be used immediately It takes 2 hours for the initial membership
after being created. list to be calculated and be available for
use.
Modification DDGs could be used immediately Users have to wait up to 2 hours for the
after any changes were made membership list to be recalculated and
links updated.
Membership The list of members was up to date in The list of members for each DDG is
list real time. refreshed every 24 hours.
"freshness"
) Important
The list of DDG members might become stale. For example, if a user has left a
department that was used as a filter for the DDG, they might continue to
receive mail that's sent to the DDG for the next 24 hours util the membership
list is refreshed.
Mail flow rules (also known as transport rules) are also affected by this
behavior, because the membership list that the mail flow rules use is also
refreshed once every 24 hours.
A dynamic distribution group includes any recipient in Active Directory with
attribute values that match its filter. If a recipient's properties are modified to
match the filter, the recipient could inadvertently become a group member
and start receiving messages that are sent to the group. Well-defined,
consistent account provisioning processes will reduce the chances of this
issue occurring.
Dynamic distribution groups are not synced from Exchange Online to Azure
Active Directory or to your on-premises Active Directory. Therefore, features
such as Azure Conditional Access do not support being scoped to an
Exchange Online dynamic distribution group.
For information about keyboard shortcuts that may apply to the procedures in this
article, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
) Important
It can take up to 2 hours for the initial membership list to be calculated and be
available for use.
2. Select Add a group and follow the instructions in the details pane.
Under Set up the basics section, enter the details and select Next.
3. In Assign Users section, select the group owner from the drop-down list.
4. Use the Members section to specify the types of recipients for the group and
set up rules that will determine membership. Select one of the following
boxes:
All recipient types: Choose this option to send messages that meet the
criteria defined for this group to all recipient types.
Only the following recipient types: Messages that meet the criteria
defined for this group will be sent to one or more of the following
recipient types:
Users with Exchange mailboxes: Select this check box if you want to
include users that have Exchange mailboxes. Users that have
Exchange mailboxes are those that have a user domain account and a
mailbox in the Exchange organization. Resource mailboxes are also
included.
Mail users with external email addresses: Select this check box if you
want to include users that have external email addresses. Users that
have external email accounts have user domain accounts in Active
Directory, but use email accounts that are external to the
organization. This enables them to be included in the global address
list (GAL) and added to distribution lists.
Mail contacts with external email addresses: Select this check box if
you want to include contacts that have external email addresses.
Contacts that have external email addresses don't have user domain
accounts in Active Directory, but the external email address is
available in the GAL.
5. Select one of the following attributes from the drop-down list and provide a
value to define the criteria for membership in this group.
) Important
The values that you enter for the selected attribute must exactly match
those that appear in the recipient's properties. For example, if you enter
Washington for State or province, but the value for the recipient's
property is WA, the condition will not be met. Also, text-based values that
you specify aren't case-sensitive. For example, if you specify Contoso for
the Company attribute, messages will be sent to a recipient if this value is
contoso.
6. To add another rule to define the criteria for membership, select Add another
rule, when you've finished, select Next.
) Important
7. In Edit settings section, enter the group email address and select Next.
8. In Review and finish adding group section, verify all the details, select Create
group and then select Close.
7 Note
If you want to specify rules for attributes other than the ones available in the
new EAC, you must use Exchange Online PowerShell to create a dynamic
distribution group. Keep in mind that the filter and condition settings for
dynamic distribution groups that have custom recipient filters can be managed
only by using Exchange Online PowerShell. For an example of how to create a
dynamic distribution group with a custom query, see the next section on using
Exchange Online PowerShell to create a dynamic distribution group.
View members of a dynamic distribution
group in Exchange Online
Article • 02/22/2023
Use Exchange Online PowerShell to view the list of recipients for a Dynamic Distribution
group (DDG). You can't view members of a dynamic distribution in the Exchange admin
center (EAC).
Do not use the old procedure for viewing members. The old procedure returns all users
that satisfy the DDG filters at the time you run the command. The calculated list of
members that are stored on the DDG object are not returned.
) Important
If your tenant resides in a government cloud, including GCC, GCC High, or DoD,
Dynamic Distribution groups function differently.
See Using Dynamic Distribution groups in a government cloud for steps on how
to view members.
To view the members of a DDG, replace <DDGIdentity> with the name, alias, or email
address of the DDG and run the following command in Exchange Online PowerShell. The
command returns the calculated list of members that's stored on the dynamic
distribution group object.
PowerShell
PowerShell
Set-DynamicDistributionGroup -Identity <DDGIdentity> -ForceMembershipRefresh
7 Note
You can run the refresh command only after more than one hour has passed since
the last membership refresh.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
Moderated recipients in Exchange
Online
Article • 02/22/2023
Sometimes it makes sense to have a second set of eyes on a message before the
message is delivered. As an Exchange Online admin, you can set this up. Requiring
approval before a message is deliver is called moderation, and the approver of the
message is called the moderator.
There are two basic ways to do moderated mail flow in Exchange Online:
Require approval for messages that match specific criteria: You use mail flow
rules (also known as transport rule) to specify the message criteria (for example,
message content, the message sender, or message recipients) and who needs to
approve the message for delivery (which might include multiple levels of approval).
For instruction, see Use mail flow rules for message approval scenarios in Exchange
Online.
The rest of this article describes how moderation works in Exchange Online.
7 Note
Approve: The message goes to the original intended recipients. The original
sender isn't notified.
Reject: A rejection message is sent to the sender. The moderator can add an
explanation as shown in the following screenshot:
Ignore or delete the approval message An expiration message is sent to the
sender. In Exchange Online, the approval request expires after two days.
7 Note
The processing of expired moderated messages runs every seven days. This
means that a moderated message can expire at any time between two and
nine days.
The message flow and result of a moderator's actions are described in the following
diagram:
Moderated recipient FAQ
Also, messages that the owner sends to the distribution group do not need to be
approved by a moderator.
If a message is intended for more than one moderated recipient, a separate copy of the
message is automatically created for each moderated recipient and each copy goes
through the appropriate approval process.
In your Exchange Online organization, messages that are sent to moderated recipients
require the approval of a moderator before they're actually delivered. For more
information, see Moderated recipients in Exchange Online.
This article described how to configure moderated groups in the Exchange admin center
(EAC) and all recipient types in Exchange Online Powershell.
For more granular control over messages that need approval, you can use mail
flow rules (transport rules). For details, see Use mail flow rules for message
approval scenarios in Exchange Online.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the"Moderated Transport"
entry in the Feature permissions in Exchange Online topic.
You can use the EAC or PowerShell to configure groups for moderation. All other
recipient types can only be configured for moderation using PowerShell. To open
the EAC, see Exchange admin center in Exchange Online. To connect to Exchange
Online PowerShell, see Connect to Exchange Online PowerShell.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
7 Note
You can configure moderation for Microsoft 365 Groups only in Exchange Online
PowerShell using the Set-UnifiedGroup command.
Messages that the owner of the group sends to the distribution group do not need
to be approved by a moderator
The folowing steps are basically the same for all other group types: distribution
groups, mail-enabled security groups, and dynamic distribution groups.
A common scenario for moderation is to control email replies to large groups. In fact,
groups with more than 5,000 members automatically have moderation configured.
This example configures moderation for the distribution group named All Employees
with the following settings:
To accomplish the tasks in this example scenario, perform the following procedure:
This example configures the following moderation settings for the distribution group
named All Employees:
To accomplish the tasks in this example scenario, run the following command:
PowerShell
To add or remove users from the list of moderators or recipients who bypass
moderation without affecting other entries, use the following syntax:
PowerShell
This example configures the following moderation settings for the distribution group
named All Employees:
PowerShell
) Important
Check out the new Exchange admin center! The experience is modern, intelligent,
accessible, and better. Personalize your dashboard, manage cross tenant migration,
experience the improved Groups feature, and more. Try it now !
A mail-enabled security group can be used to distribute messages and to grant access
permissions to resources in Active Directory. For more information, see Recipients in
Exchange Online.
You need permissions before you can do this procedure or procedures. To see
what permissions you need, see the "Recipients" entry in the Feature permissions
in Exchange Online article.
For information about keyboard shortcuts that may apply to the procedures in this
article, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
Under Choose a group type section, select Mail-enabled security and click
Next.
Under Set up the basics section, enter the details and click Next.
3. In Assign owners section, click + Assign owners, select the group owner from the
list, and click Next.
4. Under Add members, click + Add members, select the group members from the
list, and click Next.
5. In Edit settings section, enter the group email address, configure the following and
then click Next:
Add Microsoft Teams to your group: Select this to create a Team for your
group.
6. In Review and finish adding group section, verify all the details, click Create
group, and then click Close.
2. In the list of groups, click the mail-enabled security group that you want to view or
change.
3. On the group's properties page, click one of the following sections to view or
change properties.
General
Use this section to view or change basic information about the group.
Name: This name appears in the address book, on the To line when email is
sent to this group, and in the Groups list. The display name is required and
should be user-friendly so people recognize what it is. It also has to be
unique in your domain.
Description: Use this box to describe the group so people know what the
purpose of the group is. This description appears in the address book and in
the Details pane in the new EAC.
Email options
Use this section to view or change the email addresses associated with the group.
This includes the group's primary SMTP addresses and any associated proxy
addresses. Under Edit email addresses page, change/edit the Primary email
address, add/delete Aliases, and then click Save changes.
You can also select the group and then click Edit email address from the toolbar to
change/edit the Primary email address, add/delete Aliases, and then click Save
changes.
Members
Under Owners section, click View all and manage owners to add/remove
group owners from the drop-down list and then click Save changes. The
mail-enabled security group must have at least one owner.
Under Members section, click View all and manage members to add/remove
group members from the drop-down list and then click Save changes. The
mail-enabled security group must have at least one member.
Settings
Under General settings section, select the checkbox Allow external senders to
email this group if you want to allow the external users to send email to this
group.
Delivery management
Use this section to manage who can send email to this group.
Sender options
By default, only people inside your organization can send messages to this
group. You can also allow people outside the organization to send messages
to this group.
Only allow messages from people inside my organization: Select this
option to allow only senders in your organization to send messages to the
group. This means that if someone outside your organization sends an
email message to this group, it is rejected. This is the default setting.
Specified senders
You can further limit who can send messages to the group by allowing only
specific senders to send messages to this group. Select/remove one or more
recipients/group from the drop-down list. If you add senders to this list, they
are the only ones who can send mail to the group. Mail sent by anyone not in
the list will be rejected.
) Important
Manage delegates
Use this section to assign permissions to a user (called a delegate) to allow them to
send messages as the group or send messages on behalf of the group. You can
assign the following permissions:
Send As: This permission allows the delegate to send messages as the group.
After this permission is assigned, the delegate has the option to add the
group to the From line to indicate that the message was sent by the group.
To assign permissions to delegates in new EAC, add the delegates under the Edit
delegates page, select the Permission type from the drop-down list and click Save
changes.
Message approval
Use this section to set options for moderating the group. Moderators approve or
reject messages sent to the group before they reach the group members.
Require moderator approval for messages sent to this group: This check
box isn't selected by default. If you select this check box, incoming messages
are reviewed by the group moderators before delivery. Group moderators
can approve or reject incoming messages.
Add senders who don't require message approval: To add/remove users that
can bypass moderation for this group, search/add users from the drop-down
list.
Notify a sender if their message isn't approved: Use this section to set how
users are notified about message approval.
Only sender: This is the default setting. Notify all senders, inside and
outside your organization, when their message isn't approved.
Only senders in your organization: When you select this option, only
users or groups in your organization are notified when a message that
they sent to the group isn't approved by a moderator.
Membership approvals
Use this section to specify if group owner approval is needed for users to join this
group.
* Display name: Use this box to type the display name. This name appears in
the shared address book, on the To: line when email is sent to this group, and
in the Groups list in the Classic EAC. The display name is required and should
be user-friendly so people recognize what it is. It also must be unique in the
forest.
7 Note
* Alias: Use this box to type the alias for the security group. The alias can't
exceed 64 characters and must be unique in the forest. When a user types the
alias on the To: line of an email message, it resolves to the group's display
name.
Description: Use this box to describe the security group so people know what
the purpose of the group is.
Organizational unit: You can select an organizational unit (OU) other than the
default (which is the recipient scope). If the recipient scope is set to the
forest, the default value is set to the Users container in the Active Directory
domain that contains the computer on which the Classic EAC is running. If the
recipient scope is set to a specific domain, the Users container in that domain
is selected by default. If the recipient scope is set to a specific OU, that OU is
selected by default.
To select a different OU, click Browse. The dialog box displays all OUs in the
forest that are within the specified scope. Select the desired OU, and then
click OK.
* Owners: By default, the person who creates a group is the owner. All groups
must have at least one owner. You can add owners by clicking Add.
Members: Use this section to add members and to specify whether approval
is required for people to join or leave the group.
Group owners don't have to be members of the group. Use Add group
owners as members to add or remove the owners as members.
To add members to the group, click Add . When you've finished adding
members, click OK to return to the New security group page.
Select the Owner approval is required check box if you want the group
owners to receive user requests to join the group. If you select this option,
members can only be removed by the group owners.
7 Note
By default, all new mail-enabled security groups require that all senders be
authenticated. This prevents external senders from sending messages to mail-
enabled security groups. To configure a mail-enabled security group to accept
messages from all senders, you must modify the message delivery restriction
settings for that group.
2. In the list of groups, click the security group that you want to view or change, and
then click Edit .
3. On the group properties page, click one of the following sections to view or
change properties.
General
Use this section to view or change basic information about the group.
* Display name: This name appears in the address book, on the To: line when
email is sent to this group, and in the Groups list. The display name is
required and should be user-friendly so people recognize what it is. It also
has to be unique in your domain.
* Alias: This is the portion of the email address that appears to the left of the
at (@) symbol. If you change the alias, the primary SMTP address for the
group will also be changed, and contain the new alias. Also, the email address
with the previous alias will be kept as a proxy address for the group.
Description: Use this box to describe the group so people know what the
purpose of the group is. This description appears in the address book and in
the Details pane in the EAC.
Hide this group from address lists: Select this check box if you don't want
users to see this group in the address book. If this check box is selected, a
sender has to type the group's alias or email address on the To: or Cc: lines to
send mail to the group.
Tip
Organizational unit: This read-only box displays the organizational unit (OU)
that contains the security group. You have to use Active Directory Users and
Computers to move the group to a different OU.
Ownership
Use this section to assign group owners. The group owner can add members to
the group, and approve or reject requests to join the group. By default, the person
who creates a group is the owner. All groups must have at least one owner.
You can add owners by clicking Add . You can remove an owner by selecting the
owner and then clicking Remove .
Membership
Use this section to add or remove members. Group owners don't have to be
members of the group. Under Members, you can add members by clicking Add .
You can remove a member by selecting a user in the member list and then clicking
Remove .
Membership approval
Use this section to specify whether owner approval is required for users to join the
group. If you select the Owner approval is required check box, the group owner or
owners receive an email requesting approval to join the group. As previously
mentioned, only owners can remove members from the group.
7 Note
This option will not work with mail-enabled security groups because of
security-related limitations.
Delivery management
Use this section to manage who can send email to this group.
Only senders inside my organization: Select this option to allow only senders
in your organization to send messages to the group. This means that if
someone outside of your organization sends an email message to this group,
it will be rejected. This is the default setting.
You can further limit who can send messages to the group by allowing only
specific senders to send messages to this group. Click Add and then select
one or more recipients. If you add senders to this list, they are the only ones
who can send mail to the group. Mail sent by anyone not in the list will be
rejected.
To remove a person or a group from the list, select them in the list and then
click Remove .
) Important
Message approval
Use this section to set options for moderating the group. Moderators approve or
reject messages sent to the group before they reach the group members.
Messages sent to this group have to be approved by a moderator: This
check box isn't selected by default. If you select this check box, incoming
messages will be reviewed by the group moderators before delivery. Group
moderators can approve or reject incoming messages.
Senders who don't require message approval: To add people or groups that
can bypass moderation for this group, click Add . To remove a person or a
group, select the item, and then click Remove .
Select moderation notifications: Use this section to set how users are
notified about message approval.
Notify all senders when their messages aren't approved: This is the
default setting. Senders inside and outside your organization will be
notified when their messages aren't approved.
Don't notify anyone when a message isn't approved: When you select
this option, notifications aren't sent to message senders whose messages
aren't approved by the group moderators.
Email options
Use this section to view or change the email addresses associated with the group.
This includes the group's primary SMTP addresses and any associated proxy
addresses. The primary SMTP address (also known as the reply address) is
displayed in bold text in the address list, with the uppercase SMTP value in the
Type column.
Add: Click Add to add a new email address for this mailbox. Select one of
following address types:
SMTP: This is the default address type. Click this button and then type the
new SMTP address in the * Email address box.
7 Note
To make the new address the primary SMTP address for the group,
select the Make this the reply address check box. This check box is
displayed only when the Automatically update email addresses
based on the email address policy applied to this recipient check
box isn't selected.
Custom address type: Click this button and type one of the supported
non-SMTP email address types in the * Email address box.
7 Note
Edit: To change an email address associated with the group, select it in the
list, and then click Edit .
7 Note
To make an existing address the primary SMTP address for the group,
select the Make this the reply address check box. As previously
mentioned, this check box is displayed only when the Automatically
update email addresses based on the email address policy applied to
this recipient check box isn't selected.
Remove: To delete an email address associated with the group, select it in the
list, and then click Remove .
7 Note
MailTips can include HTML tags, but scripts aren't allowed. The length of a
custom MailTip can't exceed 175 displayed characters. HTML tags aren't
counted in the limit.
Group delegation
Use this section to assign permissions to a user (called a delegate) to allow them to
send messages as the group or send messages on behalf of the group. You can
assign the following permissions:
Send As: This permission allows the delegate to send messages as the group.
After this permission is assigned, the delegate has the option to add the
group to the From line to indicate that the message was sent by the group.
PowerShell
For more information about using Exchange Online PowerShell to create mail-enabled
security groups, see New-DistributionGroup.
In the new EAC, navigate to Recipients > Groups > Mail-enabled security. The
new mail-enabled security group is displayed in the group list.
In the Classic EAC, navigate to Recipients > Groups. The new mail-enabled security
group is displayed in the group list. Under Group Type, the type is Security group.
PowerShell
Set-DistributionGroup
Here are some examples of using Exchange Online PowerShell to change security group
properties.
PowerShell
This example changes the primary SMTP address (also called the reply address) for the
Seattle Administrators security group from admins@contoso.com to
seattle.admins@contoso.com. The previous reply address will be kept as a proxy
address.
PowerShell
This example hides all security groups in the organization from the address book.
PowerShell
In the new EAC, select the group to view the property or feature that you changed.
Depending on the property that you changed, it might be displayed in the details
pane for the selected group.
In the Classic EAC, select the group and then click Edit to view the property or
feature that you changed. Depending on the property that you changed, it might
be displayed in the Details pane for the selected group.
In Exchange Online PowerShell, use the Get-DistributionGroup cmdlet to verify the
changes. One advantage of using Exchange Online PowerShell is that you can view
multiple properties for multiple groups. In the example above where all security
groups were hidden from the address book, run the following command to verify
the new value.
PowerShell
You can allow or block guest users who are using a specific domain. For example, let's
say your business (Contoso) has a partnership with another business (Fabrikam). You can
add Fabrikam to your allowlist so your users can add those guests to their groups.
Or, let's say you want to block personal email address domains. You can set up a
blocklist that contains domains like Gmail.com and Outlook.com.
You can create only one policy per organization. You can update that policy with
more domains, or you can delete that policy to create a new one.
This list works independently from SPO allow/block list. You would need to set up
Allow/Block list for SPO if you want to restrict individual file sharing of Group
connected site.
This list doesn't apply to already added guest members. This will be enforced for
all the guests added after the list is set up.
2. Run this command to see if you have any versions of the Azure Active Directory
Module for Windows PowerShell installed on your computer:
PowerShell
If no results are returned, run this command to install the latest version of the
AzureADPreview module:
PowerShell
Install-Module AzureADPreview
If only the AzureAD module is shown in the results, run these commands to
install the AzureADPreview module:
PowerShell
Uninstall-Module AzureAD
PowerShell
Install-Module AzureADPreview
If only the AzureADPreview module is shown in the results, but the version is
less than 2.0.0.98, run these commands to update it:
PowerShell
Uninstall-Module AzureADPreview
PowerShell
Install-Module AzureADPreview
If both the AzureAD and AzureADPreview modules are shown in the results,
but the version of the AzureADPreview module is less than 2.0.0.98, run
these commands to update it:
PowerShell
Uninstall-Module AzureAD
PowerShell
Uninstall-Module AzureADPreview
PowerShell
Install-Module AzureADPreview
PowerShell
Where you replace contoso.com and fabrikam.com with the domains you want to
allow.
OR
PowerShell
Remember, you can create only one policy. You'll get an error if you try to create
another one.
Replace the existing policy with a new list of
domains
To replace the existing policy with new list of domains, run this command:
PowerShell
Where you replace contoso.com and fabrikam.com with the domains you want to
allow.
OR
PowerShell
PowerShell
Where you replace contoso.com and fabrikam.com with the domains you want to
allow.
OR
PowerShell
However, if your organization already has an allow/block list for SharePoint Online, you
can migrate that list using this command.
PowerShell
Set-GuestAllowBlockDomainPolicy.ps1 -MigrateFromSharepoint
PowerShell
Set-GuestAllowBlockDomainPolicy.ps1 -Remove
) Important
Check out the new Exchange admin center! The experience is modern, intelligent,
accessible, and better. Personalize your dashboard, manage cross tenant migration,
experience the improved Groups feature, and more. Try it now !
In Exchange Online organizations, mail contacts are mail-enabled objects that contain
information about people who exist outside your organization. Each mail contact has an
external email address. For more information about mail contacts, see Recipients in
Exchange Online.
You manage mail contacts in the Exchange admin center (EAC) or in PowerShell
(Exchange Online PowerShell in organizations with Exchange Online mailboxes;
standalone Exchange Online Protection (EOP) in organizations without Exchange Online
mailboxes).
You need permissions before you can do this procedure or procedures. To see
what permissions you need, see the "Recipients" entry in the Feature permissions
in Exchange Online article.
For information about keyboard shortcuts that may apply to the procedures in this
article, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
2. Click + Add a contact and configure the following settings in the details pane.
Settings marked with an * are required.
First name
Last name
*
Display name: By default, this box shows the values from the First name, and
Last name boxes. You can accept this value or change it.
*
Email: Enter the user's email address. The domain should be external to your
cloud-based organization.
Company
Work phone
Mobile phone
2. In the list of contacts, select the mail contact that you want to modify.
3. In the details pane, click to view or edit the user's contact details.
Web site
Fax phone
Street
City
State/Province
ZIP/Postal code
Country/Region
Organization
Use the Organization section, to record detailed information about the user's role
in the organization. This information is displayed in the address book. Also, you
can create a virtual organization chart that's accessible from email clients such as
Outlook.
Department: Use this box to view or change the department in which the
user works. You can use this box to create recipient conditions for dynamic
distribution groups, email address policies, or address lists.
Manager: To add a manager, enter the name and select from the drop-down
list.
Direct reports: You can't modify this box. A direct report is a user who reports
to a specific manager. If you've specified a manager for the user, that user
appears as a direct report in the details of the manager's mailbox. For
example, Kari manages Chris and Kate, so Kari is specified in the Manager
box for Chris and Kate, and Chris and Kate appear in the Direct reports box in
the properties of Kari's account.
7 Note
3. In the New mail contact page that opens, configure the following settings.
Settings marked with an * are required.
First name
Last name
*
Display name: By default, this box shows the values from the First name,
Initials, and Last name boxes. You can accept this value or change it. The
value should be unique, and has a maximum length of 64 characters.
*
Alias: Enter a unique alias, using up to 64 characters, for the user
*
External email address: Enter the user's email address. The domain should
be external to your cloud-based organization.
2. In the list of contacts, select the mail contact that you want to modify, and then
click Edit .
3. On the mail contact properties page that opens, click one of the following tabs to
view or change properties.
First name
Initials
Last name
Display name: This name appears in your organization's address book, on the
To: and From: lines in email, and in the list of contacts in the EAC. This name
can't contain empty spaces before or after the display name.
Alias: This is the mail contact's alias. If you change it, it must be unique in the
organization and must be 64 characters or less.
External email address: This is mail contact's primary SMTP address in their
external email organization. Email sent to this contact is forwarded to this
email address.
Hide from address lists: Select this check box to prevent the mail contact
from appearing in the address book and other address lists that are defined
in your organization. After you select this check box, users can still send
messages to the recipient by using the email address.
Contact Information
Use the Contact information tab to view or change the user's contact information.
The information on this page is displayed in the address book.
Street
City
State/Province
ZIP/Postal code
Country/Region
Office
Work phone
Fax
Home phone
Mobile phone
Notes
Tip
You can use the State/Province value to create recipient conditions for
dynamic distribution groups, email address policies, or address lists.
Organization
Use the Organization tab to record detailed information about the user's role in
the organization. This information is displayed in the address book. Also, you can
create a virtual organization chart that's accessible from email clients such as
Outlook.
Department: Use this box to view or change the department in which the
user works. You can use this box to create recipient conditions for dynamic
distribution groups, email address policies, or address lists.
Company: Use this box to view or change the company for which the user
works. You can use this box to create recipient conditions for dynamic
distribution groups, email address policies, or address lists.
Direct reports: You can't modify this box. A direct report is a user who reports
to a specific manager. If you've specified a manager for the user, that user
appears as a direct report in the details of the manager's mailbox. For
example, Kari manages Chris and Kate, so Kari is specified in the Manager
box for Chris and Kate, and Chris and Kate appear in the Direct reports box in
the properties of Kari's account.
Email Options
Use the Email Options section to add or remove proxy addresses for the mail
contact or edit existing proxy addresses. The mail contact's primary SMTP address
is also displayed in this section, but you can't change it. To change it, you have to
change the contact's external email address in the General section.
7 Note
The Email Options section is only available in Exchange Server. It's not
available in Exchange Online.
MailTip
Use the MailTip tab to add an alert for potential issues before a user sends
messages to this recipient. The text is displayed in the InfoBar when this recipient
is added to the To, Cc, or Bcc lines of a new email message.
MailTips can include HTML tags, but scripts aren't allowed. The length of a custom
MailTip can't exceed 175 displayed characters. HTML tags aren't counted in the
limit.
Contact information
Organization
2. In the list of contacts, select two or more mail contacts. You can't bulk edit a
combination of mail contacts and mail users.
Tip
You can select multiple adjacent mail contacts by holding down the Shift key
and clicking the first mail contact, and then clicking the last mail contact you
want to edit. You can also select multiple mail contacts by holding down the
Ctrl key and clicking each one that you want to edit.
3. In the Details pane, under Bulk Edit, click Update under Contact Information or
Organization.
4. Make the changes on the properties page and then save your changes.
2. Select the mail contact that you want to remove, and then click Remove .
The name and display name is Debra Garcia (if you don't use the DisplayName
parameter, the value of the Name parameter is used for the display name).
PowerShell
Get-Contact
Set-Contact
Get-MailContact
Set-MailContact
Here are some examples of using Exchange Online PowerShell to change mail contact
properties:
This example configures the Title, Department, Company, and Manager properties for
the mail contact Kai Axford.
PowerShell
This example sets the CustomAttribute1 property to a value of PartTime for all mail
contacts and hides them from the organization's address book.
PowerShell
PowerShell
PowerShell
PowerShell
In the new EAC, go to Recipients > Contacts. Verify the mail contact is listed (or
not listed). The Contact Type value is MailContact. Select the mail contact from the
list, and click to view or edit the user's details.
In the Classic EAC, go to Recipients > Contacts. Verify the mail contact is listed (or
not listed). The Contact Type value is Mail contact. Select the mail contact from
the list, and click Edit to view the properties.
PowerShell
PowerShell
Get-MailContact | Format-List
Name,CustomAttribute1,HiddenFromAddressListsEnabled
PowerShell
In Exchange Online organizations, mail users are similar to mail contacts. Both have
external email addresses and both contain information about people outside your
Exchange Online organization that can be displayed in the shared address book and
other address lists. However, unlike a mail contact, a mail user has sign in credentials in
your Microsoft 365 organization and can access resources. For more information about
mail contacts and mail users, see Recipients in Exchange Online.
You manage mail users in the Exchange admin center (EAC) or in PowerShell (Exchange
Online PowerShell in organizations with Exchange Online mailboxes.
When you create mail users in EOP PowerShell, you might encounter throttling.
Also, the EOP PowerShell cmdlets use a batch processing method that results in a
propagation delay of a few minutes before the results of the commands are visible.
You need permissions before you can perform this procedure or procedures. To
see what permissions you need, see the "Recipients" entry in the Feature
permissions in Exchange Online article.
For information about keyboard shortcuts that may apply to the procedures in this
article, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
Use the Exchange admin center to manage mail
users
2. Click + Add a contact and configure the following settings in the details pane.
Settings marked with an * are required.
2. In the list of users, select the mail user that you want to modify.
Contact Information:
Use the Contact information section, to view, or edit the user's information. The
information on this page is displayed in the address book.
Web site
Fax phone
Street
City
State/Province
ZIP/Postal code
Country/Region
Organization:
Use the Organization section, to record detailed information about the user's role in the
organization. This information is displayed in the address book. Also, you can create a
virtual organization chart that's accessible from email clients such as Outlook.
2. Select the mail user that you want to remove, and then click Delete.
7 Note
3. In the New mail user page that opens, configure the following settings. Settings
marked with an * are required.
First name
Initials: The person's middle initial.
Last name
*
Display name: By default, this box shows the values from the First name,
Initials, and Last name boxes. You can accept this value or change it. The
value should be unique, and has a maximum length of 64 characters.
*
Alias: Enter a unique alias, using up to 64 characters, for the user
External email address: Enter the user's email address. The domain should be
external to your cloud-based organization.
*
User ID: Enter the account that the person will use to sign in to the service.
The user ID consists of a username on the left side of the at (@) symbol (@)
and a domain on the right side.
*
New password and *Confirm password: Enter and reenter the account
password. Verify that the password complies with the password length,
complexity, and history requirements of your domain.
2. In the list of contacts, select the mail user that you want to modify, and then click
Edit .
3. On the mail user properties page that opens, click one of the following tabs to
view or change properties.
General:
Use the General tab to view or change basic information about the mail user.
First name
Initials
Last name
Display name: This name appears in your organization's address book, on the To:
and From: lines in email, and in the list of contacts in the EAC. This name can't
contain empty spaces before or after the display name.
User ID: This is the user's account in Microsoft 365. You can't modify this value
here.
Hide from address lists: Select this check box to prevent the mail user from
appearing in the address book and other address lists that are defined in your
organization. After you select this check box, users can still send messages to the
recipient by using the email address.
More options > Custom attributes: Click Edit in the Custom attributes pages
that opens, enter values for Custom Attribute 1 through Custom Attribute 15.
When you're finished, click OK.
Contact information:
Use the Contact information tab to view or change the user's contact information. The
information on this page is displayed in the address book.
Street
City
State/Province
ZIP/Postal code
Country/Region
Work phone
Mobile phone
Fax
More options
Office
Home phone
Web page
Notes
Tip
You can use the State/Province value to create recipient conditions for
dynamic distribution groups, email address policies, or address lists.
Organization:
Use the Organization tab to record detailed information about the user's role in the
organization. This information is displayed in the address book. Also, you can create a
virtual organization chart that's accessible from email clients such as Outlook.
Title: Use this box to view or change the recipient's title.
Department: Use this box to view or change the department in which the user
works. You can use this box to create recipient conditions for dynamic distribution
groups, email address policies, or address lists.
Company: Use this box to view or change the company for which the user works.
You can use this box to create recipient conditions for dynamic distribution groups,
email address policies, or address lists.
Manager: To add a manager, click Browse. In Select Manager, select a person, and
then click OK.
Direct reports: You can't modify this box. A direct report is a user who reports to a
specific manager. If you've specified a manager for the user, that user appears as a
direct report in the details of the manager's mailbox. For example, Kari manages
Chris and Kate, so Kari is specified in the Manager box for Chris and Kate, and
Chris and Kate appear in the Direct reports box in the properties of Kari's account.
Email addresses:
Use the Email addresses tab to view or change the email addresses associated with the
mail user. This includes the mail user's primary SMTP address, their external email
address, and any associated proxy addresses. The primary SMTP address (also known as
the reply address) is displayed in bold text in the address list, with the uppercase SMTP
value in the Type column. By default, the external email address is the primary SMTP
address.
Add: Click Add . In the New email address page that appears, configure the
following settings:
Email address type: Verify SMTP is selected.
Email address: Enter the email address to add.
Make this the reply address: For mail users, you shouldn't need to select this
option (the external email address is the reply address).
Edit: Select the email address that you want to modify, and then click Edit . In
the Email address page that appears, configure the following settings:
Email address: Modify the existing email address.
Make this the reply address: This setting only appears if the email address you
selected isn't already the reply address.
Remove: Select the email address that you want to remove, and then click Remove
. You can't remove the reply address.
Mail flow settings:
In the Message delivery restrictions section, click View details. In the Message delivery
restrictions page that opens, configure the following settings:
Accept messages from: Specify who can send messages to this mail user.
Unspecified senders are blocked.
All senders: This is the default value.
Only senders in the following list: Click Add . Select a recipient, click Add,
and repeat as many times as necessary. When you're finished, click OK.
Require that all senders are authenticated: Select this option to prevent
anonymous users (external users) from sending messages to the user.
Reject messages from: Specify who isn't allowed to send messages to this mail
user.
No senders: This is the default value.
Senders in the following list: Click Add . Select a recipient, click Add, and
repeat as many times as necessary When you're finished, click OK.
Member of:
Use the Member of tab to view a list of the distribution groups or mail-enabled security
groups that the user belongs to. You can't change group membership on this page.
Note that dynamic distribution groups aren't displayed on this page because their
membership is calculated each time they're used.
MailTip:
Use the MailTip tab to add an alert for potential issues before a user sends messages to
this recipient. The text is displayed in the InfoBar when this recipient is added to the To,
Cc, or Bcc lines of a new email message.
MailTips can include HTML tags, but scripts aren't allowed. The length of a custom
MailTip can't exceed 175 displayed characters. HTML tags aren't counted in the limit.
Contact information
Organization
1. In the Classic EAC, go to Recipients > Contacts.
2. In the list of contacts, select two or more mail users. You can't bulk edit a
combination of mail contacts and mail users.
You can select multiple adjacent mail users by holding down the Shift key and
clicking the first mail user, and then clicking the last mail user you want to edit. You
can also select multiple mail users by holding down the Ctrl key and clicking each
one that you want to edit.
3. In the Details pane, under Bulk Edit, click Update under Contact Information or
Organization.
4. Make the changes on the properties page and then save your changes.
Get-User
Set-User
Get-MailUser
New-MailUser
Remove-MailUser
Set-MailUser
The name and display name is Rene Valdes (if you don't use the DisplayName
parameter, the value of the Name parameter is used for the display name).
The alias is renev.
The external email address is renevaldes@fabrikam.com.
The sign in name is renev@contoso.onmicrosoft.com.
The password is Pa$$word1.
PowerShell
Use the Get-MailUser and Set-MailUser cmdlets to view and change properties for mail
users. For information, see the following articles:
Get-User
Set-User
Get-MailUser
Set-MailUser
Here are some examples of using Exchange Online PowerShell to change mail user
properties.
This example sets the external email address for Pilar Pinilla.
PowerShell
This example hides all mail users from the organization's address book.
PowerShell
This example sets the Company property for all mail users to Contoso.
PowerShell
$U = Get-User -ResultSize unlimited -Filter "RecipientTypeDetails -eq
'mailuser'"
$U | foreach {Set-User -Identity $_ -Company Contoso}
This example sets the CustomAttribute1 property to a value of ContosoEmployee for all
mail users that have a value of Contoso in the Company property.
PowerShell
PowerShell
PowerShell
In the new EAC, go to Recipients > Contacts. Verify the mail user is listed (or not
listed). The Contact Type value is MailUser. Select the mail user from the list, and
click to view or edit the user's details.
In the Classic EAC, go to Recipients > Contacts. Verify the mail user is listed (or not
listed). The Contact Type value is Mail user. Select the mail user from the list, and
click lick Edit to view the properties.
In Exchange Online PowerShell, replace <MailUserIdentity> with the name, email
address, or alias of the mail user, and run the following command to verify that the
mail user is listed (or not listed).
PowerShell
PowerShell
PowerShell
Notes:
If you use directory synchronization to manage your recipients, you can still add
and manage users in the Microsoft 365 admin center, but they will not be
synchronized with your on-premises Active Directory. This is because directory
synchronization only syncs recipients from your on-premises Active Directory to
the cloud.
Get the necessary permissions and prepare for directory synchronization, as described in
What is hybrid identity with Azure Active Directory?.
Express
Custom
Pass-through authentication
) Important
When you finish the Azure Active Directory Sync Tool Configuration Wizard, the
MSOL_AD_SYNC account is created in your Active Directory forest. This account is
used to read and synchronize your on-premises Active Directory information. In
order for directory synchronization to work correctly, make sure that TCP 443 on
your local directory synchronization server is open.
After configuring your sync, be sure to verify that AAD Connect is synchronizing
correctly. In the EAC, go to Recipients > Contacts and view that the list of users was
correctly synchronized from your on-premises environment.
Manage resource mailboxes in Exchange
Online
Article • 02/22/2023
Use the new Exchange admin center (EAC) to create, modify, and manage your
resources through email/delegation in your Exchange Online organization.
2. Click Add a resource and follow the instructions in the details pane.
3. In Review resource tab, under Review the resource information you have entered,
verify all the details, and then click Create.
4. Click Done.
Edit a resource
1. From the list view, select the resource that you want to edit, and click the selected
resource.
7 Note
Click Manage settings > Manage booking options, to edit the settings for
booking policy that defines when the resource can be scheduled.
Booking options
Use the Manage booking options section to view or change the settings for the
booking policy that defines when the room can be scheduled, how long it can be
reserved, and how far in advance it can be reserved.
Allow repeated meetings: This setting allows or prevents repeated meetings for
the room. By default, this setting is enabled, so repeated meetings are allowed.
Allow scheduling only during working hours: This setting accepts or declines
meeting requests that aren't scheduled during the working hours defined for the
room. The default working hours are 8:00 A.M. to 5:00 P.M. Monday through
Friday. By default, this setting is disabled, so meeting requests are allowed outside
the working hours.
Automatically decline meetings outside the limits below: By default, this setting is
enabled.
Booking window (days): This setting specifies the maximum number of days in
advance that a room can be booked. The default value is 180 days.
Maximum duration (hours): This setting specifies the maximum duration that
the room can be reserved in a booking request. The default value is 24 hours.
Booking delegates
In Manage booking options section, under Booking delegates, add/remove the
delegates for the meeting requests. Resource delegates are responsible for accepting or
declining meeting requests that are sent to the room mailbox.
7 Note
For the delegates, you can also select the permission types from the following as
Full access, Send as or Send on behalf.
You must be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Recipients" entry in the
Feature permissions in Exchange Online topic.
) Important
If you're running Exchange Server in a hybrid scenario, ensure you create the
room mailboxes in the appropriate place. Create your room mailboxes for
your on-premises organization on-premises, and room mailboxes for
Exchange Online side should be created in the cloud.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
3. Use the options on the page to specify the settings for the new resource mailbox.
* Room name: Use this box to type a name for the room mailbox. This is the
name that's listed in the resource mailbox list in the Classic Exchange admin
center and in your organization's address book. This name is required and it
can't exceed 64 characters.
Tip
Although there are other fields that describe the details of the room, for
example, Location and Capacity, consider summarizing the most
important details in the room name using a consistent naming
convention. Why? So users can easily see the details when they select
the room from the address book in the meeting request.
Once you've created your room mailbox, you can edit your room mailbox to update info
about booking options, MailTips and mailbox delegation. Check out the Use the Classic
Exchange admin center section below to change room mailbox properties.
The mailbox's name is ConfRoom1. This name will also be used to create the
room's email address.
The display name in the Classic Exchange admin center and the address book will
be Conference Room 1.
The Room switch specifies that this mailbox will be created as a room mailbox.
PowerShell
You can make sure you've created the room mailbox correctly a couple of different ways:
In the Classic Exchange admin center, navigate to Recipients > Resources. The new
room mailbox is displayed in the mailbox list. Under Mailbox Type, the type is
Room.
PowerShell
PowerShell
PowerShell
You may already have created distribution groups in the past that contain your
conference rooms. You don't need to recreate them; we can convert them quickly into a
room list.
This example converts the distribution group, building 34 conference rooms, to a room
list.
PowerShell
2. In the list of resource mailboxes, click the room mailbox that you want to change
the properties for, and then click Edit .
3. On the room mailbox properties page, click one of the following sections to view
or change properties.
General:
Use the General section to view or change basic information about the resource.
* Room name: This name appears in the resource mailbox list in the Classic
Exchange admin center and in your organization's address book. It can't exceed 64
characters if you change it.
* Email address: This read-only box displays the email address for the room
mailbox. You can change it in the Email Address section.
Capacity: Use this box to enter the maximum number of people who can safely
occupy the room.
Organizational unit: This read-only box displays the organizational unit (OU) that
contains the account for the room mailbox. You have to use Active Directory Users
and Computers to move the account to a different OU.
Mailbox database: This read-only box displays the name of the mailbox database
that hosts the room mailbox. Use the Migration page in the Classic Exchange
admin center to move the mailbox to a different database.
* Alias: Use this box to change the alias for the room mailbox.
Hide from address lists: Select this check box to prevent the room mailbox from
appearing in the address book and other address lists that are defined in your
Exchange organization. After you select this check box, users can still send booking
messages to the room mailbox by using the email address.
Department: Use this box to specify a department name that the room is
associated with. You can use this property to create recipient conditions for
dynamic distribution groups and address lists.
Company: Use this box to specify a company that the room is associated with, if
applicable. Like the Department property, you can use this property to create
recipient conditions for dynamic distribution groups and address lists.
Address book policy: Use this option to specify an address book policy (ABP) for
the room mailbox. ABPs contain a global address list (GAL), an offline address book
(OAB), a room list, and a set of address lists. To learn more, see Address book
policies.
In the drop-down list, select the policy that you want associated with this mailbox.
Custom attributes: This section displays the custom attributes defined for the
room mailbox. To specify custom attribute values, click Edit . You can specify up
to 15 custom attributes for the recipient.
Delegates:
Use this section to view or change how the room mailbox handles reservation requests
and to define who can accept or decline booking requests if it isn't done automatically.
Booking requests: Select one of the following options to handle booking requests.
Delegates: If you selected the option requiring that booking requests be sent to
delegates, the specified delegates are listed. Click Add or Remove to add or
remove delegates from this list.
Booking Options
Use the Booking Options section to view or change the settings for the booking policy
that defines when the room can be scheduled, how long it can be reserved, and how far
in advance it can be reserved.
Allow repeating meetings: This setting allows or prevents repeating meetings for
the room. By default, this setting is enabled, so repeating meetings are allowed.
Allow scheduling only during working hours: This setting accepts or declines
meeting requests that aren't during the working hours defined for the room. By
default, this setting is disabled, so meeting requests are allowed outside the
working hours. By default, working hours are 8:00 A.M. to 5:00 P.M. Monday
through Friday. You can configure the working hours of the room mailbox in the
Appearance section on the Calendar page.
Always decline if the end date is beyond this limit: This setting controls the
behavior of repeating meetings that extend beyond the date specified by the
maximum booking lead time setting.
Maximum booking lead time (days): This setting specifies the maximum number
of days in advance that the room can be booked. Valid input is an integer between
0 and 1080. The default value is 180 days.
Maximum duration (hours): This setting specifies the maximum duration that the
room can be reserved in a booking request. The default value is 24 hours.
For repeating booking requests, the maximum booking duration applies to the
length of Classic Exchange admin center instance of the repeating booking
request.
There's also a box on this page that you can use to write a message that will be sent to
users who send booking requests to reserve the room.
Contact Information:
Use the Contact Information section to view or change the contact information for the
room. The information on this page is displayed in the address book.
Tip
You can use the State/Province box to create recipient conditions for dynamic
distribution groups, email address policies, or address lists.
Email address:
Use the Email address section to view or change the email addresses associated with
the room mailbox. This includes the mailbox's primary SMTP address and any associated
proxy addresses. The primary SMTP address (also known as the reply address) is
displayed in bold text in the address list, with the uppercase SMTP value in the Type
column.
Add: Click Add to add a new email address for this mailbox. Select one of
following address types:
SMTP: This is the default address type. Click this button and then type the new
SMTP address in the * Email address box.
Custom address type: Click this button and type one of the supported non-
SMTP email address types in the * Email address box.
7 Note
When you add a new email address, you have the option to make it the
primary SMTP address.
Automatically update email addresses based on the email address policy applied
to this recipient: Select this check box to have the recipient's email addresses
automatically updated based on changes made to email address policies in your
organization.
MailTip:
Use the MailTip section to add a MailTip to alert users of potential issues before they
send a booking request to the room mailbox. A MailTip is text that's displayed in the
InfoBar when this recipient is added to the To, Cc, or Bcc lines of a new email message.
7 Note
MailTips can include HTML tags, but scripts aren't allowed. The length of a custom
MailTip can't exceed 175 displayed characters. HTML tags aren't counted in the
limit.
Get-User and Set-User: Use these cmdlets to view and set general properties such
as location, department, and company names.
Get-Mailbox and Set-Mailbox: Use these cmdlets to view and set mailbox
properties, such as email addresses.
Get-CalendarProcessing and Set-CalendarProcessing: Use these cmdlets to view
and set booking options and delegates.
Get-MailboxFolderPermission and Set-MailboxFolderPermission: Use this cmdlet
to view and modify delegate permissions on the Calendar folder of the room
mailbox.
Get-User
Set-User
Get-Mailbox
Set-Mailbox
Get-CalendarProcessing
Set-CalendarProcessing
Get-MailboxFolderPermission
Set-MailboxFolderPermission
Here are some examples of using Exchange Online PowerShell to change room mailbox
properties.
This example changes the display name, the primary SMTP address (called the default
reply address), and the room capacity. Also, the previous reply address is kept as a proxy
address.
PowerShell
PowerShell
The Get-User cmdlet finds all room mailboxes that correspond to private
conference rooms.
The Set-CalendarProcessing cmdlet sends booking requests to a delegate named
Robin Wood to accept or decline.
The Set-MailboxFolderPermission cmdlet gives Robin the required Calendar folder
permissions to the private conference room mailboxes.
PowerShell
To verify that you've successfully changed properties for a room mailbox, do the
following:
In the Classic Exchange admin center, select the mailbox and then click Edit to
view the property or feature that you changed. Depending on the property that
you changed, it might be displayed in the Details pane for the selected mailbox.
In Exchange Online PowerShell, use the Get-Mailbox cmdlet to verify the changes.
One advantage of using Exchange Online PowerShell is that you can view multiple
properties for multiple mailboxes. In the example above where booking requests
could be scheduled only during working hours and have a maximum duration of 9
hours, run the following command to verify the new values.
PowerShell
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
3. Use the options on the page to specify the settings for the new resource mailbox.
* Equipment name: Use this box to type a name for the equipment mailbox.
This is the name that's listed in the resource mailbox list in the Classic
Exchange admin center and in your organization's address book. This name is
required and it can't exceed 64 characters.
Tip
Although there are other fields that describe the details of the room, for
example, Capacity, consider summarizing the most important details in
the equipment name using a consistent naming convention. Why? So
users can easily see the details when they select the equipment from the
address book in a meeting request.
* Email address: An equipment mailbox has an email address so it can receive
booking requests. The email address consists of an alias on the left side of
the @ symbol, which must be unique in the forest, and your domain name on
the right. The email address is required.
Once you've created your equipment mailbox, you can edit your equipment mailbox to
update info about booking options, MailTips and delegates. Check out the Change
equipment mailbox properties section below to change room mailbox properties
PowerShell
To verify that you've successfully created a user mailbox, do one of the following:
In the Classic Exchange admin center, navigate to Recipients > Resources. The new
user mailbox is displayed in the mailbox list. Under Mailbox Type, the type is
Equipment.
PowerShell
Get-Mailbox <Name> | Format-List
Name,RecipientTypeDetails,PrimarySmtpAddress
2. In the list of resource mailboxes, click the equipment mailbox that you want to
change the properties for, and then click Edit .
3. On the equipment mailbox properties page, click one of the following sections to
view or change properties.
General:
Use the General section to view or change basic information about the resource.
* Equipment name: This name appears in the resource mailbox list in the Classic
Exchange admin center and in your organization's address book. It can't exceed 64
characters if you change it.
* Email address: This read-only box displays the email address for the equipment
mailbox. You can change it in the Email Address section.
Capacity: Use this box to enter the maximum number of people who can use this
resource, if applicable, For example, if the equipment mailbox corresponds to a
compact car, you could enter 4.
Organizational unit: This read-only box displays the organizational unit (OU) that
contains the account for the equipment mailbox. You have to use Active Directory
Users and Computers to move the account to a different OU.
Mailbox database: This read-only box displays the name of the mailbox database
that hosts the equipment mailbox. Use the Migration page in the Classic Exchange
admin center to move the mailbox to a different database.
* Alias: Use this box to change the alias for the equipment mailbox.
Hide from address lists: Select this check box to prevent equipment mailbox from
appearing in the address book and other address lists that are defined in your
Exchange organization. After you select this check box, users can still send booking
messages to the equipment mailbox by using the email address.
Department: Use this box to specify a department name that the resource is
associated with. You can use this property to create recipient conditions for
dynamic distribution groups and address lists.
Company: Use this box to specify a company that the resource is associated with.
Like the Department property, you can use this property to create recipient
conditions for dynamic distribution groups and address lists.
Address book policy: Use this option to specify an address book policy (ABP) for
the resource. ABPs contain a global address list (GAL), an offline address book
(OAB), a room list, and a set of address lists. To learn more, see Address book
policies.
In the drop-down list, select the policy that you want associated with this mailbox.
Custom attributes: This section displays the custom attributes defined for the
equipment mailbox. To specify custom attribute values, click Edit . You can
specify up to 15 custom attributes for the recipient.
Delegates:
Use this section to view or change how the equipment mailbox handles reservation
requests and to define who can accept or decline booking requests if it isn't done
automatically.
Booking requests: Select one of the following options to handle booking requests.
Booking Options:
Use the Booking Options section to view or change the settings for the booking policy
that defines when the resource can be scheduled, how long it can be reserved, and how
far in advance it can be reserved.
Allow repeating meetings: This setting allows or prevents repeating meetings for
the resource. By default, this setting is enabled, so repeating meetings are allowed.
Allow scheduling only during working hours: This setting accepts or declines
meeting requests that aren't during the working hours defined for the resource. By
default, this setting is disabled, so meeting requests are allowed outside the
working hours.By default, working hours are 8:00 A.M. to 5:00 P.M. Monday
through Friday. You can configure the working hours of the equipment mailbox in
the Appearance section on the Calendar page.
Always decline if the end date is beyond this limit: This setting controls the
behavior of repeating meetings that extend beyond the date specified by the
maximum booking lead time setting.
Maximum booking lead time (days): This setting specifies the maximum number
of days in advance that the resource can be booked. Valid input is an integer
between 0 and 1080. The default value is 180 days.
Maximum duration (hours): This setting specifies the maximum duration that the
resource can be reserved in a booking request. The default value is 24 hours.
For repeating booking requests, the maximum booking duration applies to the
length of each instance of the repeating booking request.
There is also a box on this page that you can use to write a message that will be sent to
users who send meeting requests to reserve the resource.
Contact Information:
Use the Contact Information section to view or change the contact information for the
resource. The information on this page is displayed in the address book.
Tip
You can use the State/Province box to create recipient conditions for dynamic
distribution groups, email address policies, or address lists.
Email Address:
Use the Email Address section to view or change the email addresses associated with
the equipment mailbox. This includes the mailbox's primary SMTP address and any
associated proxy addresses. The primary SMTP address (also known as the reply
address) is displayed in bold text in the address list, with the uppercase SMTP value in
the Type column.
Add: Click Add to add a new email address for this mailbox. Select one of
following address types:
SMTP: This is the default address type. Click this button and then type the new
SMTP address in the * Email address box.
Custom address type: Click this button and type one of the supported non-
SMTP email address types in the * Email address box.
7 Note
When you add a new email address, you have the option to make it the
primary SMTP address.
Automatically update email addresses based on the email address policy applied
to this recipient: Select this check box to have the recipient's email addresses
automatically updated based on changes made to email address policies in your
organization.
MailTip:
Use the MailTip section to add a MailTip to alert users of potential issues before they
send a booking request to the equipment mailbox. A MailTip is text that's displayed in
the InfoBar when this recipient is added to the To, Cc, or Bcc lines of a new email
message.
7 Note
MailTips can include HTML tags, but scripts aren't allowed. The length of a custom
MailTip can't exceed 175 displayed characters. HTML tags aren't counted in the
limit.
Get-User and Set-User: Use these cmdlets to view and set general properties such
as department and company names.
Get-Mailbox and Set-Mailbox: Use these cmdlets to view and set mailbox
properties, such as email addresses.
Get-CalendarProcessing and Set-CalendarProcessing: Use these cmdlets to view
and set booking options and delegates.
Get-MailboxFolderPermission and Set-MailboxFolderPermission: Use this cmdlet
to view and modify delegate permissions on the Calendar folder of the room
mailbox.
Get-User
Set-User
Get-Mailbox
Set-Mailbox
Get-CalendarProcessing
Set-CalendarProcessing
Get-MailboxFolderPermission
Set-MailboxFolderPermission
Here are some examples of using Exchange Online PowerShell to change equipment
mailbox properties.
This example changes the display name and primary SMTP address (called the default
reply address) for the MotorPool 1 equipment mailbox. The previous reply address is
kept as a proxy address.
PowerShell
PowerShell
The Get-User cmdlets find all equipment mailboxes in the Audio Visual
department.
The Set-CalendarProcessing cmdlet sends booking requests to a delegate named
Ann Beebe to accept or decline.
The Set-MailboxFolderPermission cmdlet gives Ann the required Calendar folder
permissions to the equipment mailboxes.
PowerShell
To verify that you've successfully changed properties for an equipment mailbox, do the
following:
In the Classic Exchange admin center, select the mailbox and then click Edit to
view the property or feature that you changed. Depending on the property that
you changed, it might be displayed in the Details pane for the selected mailbox.
In Exchange Online PowerShell, use the Get-Mailbox cmdlet to verify the changes.
One advantage of using Exchange Online PowerShell is that you can view multiple
properties for multiple mailboxes. In the example above where booking requests
could be scheduled only during working hours, run the following command to
verify the new value.
PowerShell
) Important
Check out the new Exchange admin center! The experience is modern, intelligent,
accessible, and better. Personalize your dashboard, manage cross tenant migration,
experience the improved Groups feature, and more. Try it now !
In Exchange Online, you can use the Exchange admin center (EAC) or Exchange Online
PowerShell to assign permissions to a mailbox or group so that other users can access
the mailbox (the Full Access permission), or send email messages that appear to come
from the mailbox or group (the Send As or Send on Behalf permissions). The users that
are assigned these permissions on other mailboxes or groups are called delegates.
The permissions that you can assign to delegates for mailboxes and groups in Exchange
Online are described in the following table:
Note: Although you might be able use Exchange Online PowerShell to assign some or all
of these permissions to other delegate types on other kinds of recipient objects, this
article focuses on the delegate and recipient object types that produce useful results.
Full Access Allows the delegate to open the User Discovery Mailboxes
mailbox, and view, add and remove the mailboxes mailboxes with user
contents of the mailbox. Doesn't allow accounts
the delegate to send messages from the Resource
mailbox. mailboxes Mail users
with
If you assign the Full Access permission Shared accounts
to a mailbox that's hidden from address mailboxes
lists, the delegate won't be able to open Mail-
the mailbox. By default, discovery enabled
mailboxes are hidden from address lists. security
groups
By default, the mailbox auto-mapping
feature uses Autodiscover to
automatically open the mailbox in the
delegate's Outlook profile (in addition
to their own mailbox). Note that auto-
mapping will only work for individual
users granted the proper permissions
and will not work for any kind of group.
If you don't want mailboxes to be auto-
mapped, you need to take one of the
following actions:
Mail-
enabled
security
groups
Microsoft
365 groups
Microsoft
365 groups
7 Note
If a user has both Send As and Send on Behalf permissions to a mailbox or group,
the Send As permission is always used.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Mailbox settings" entry in
the Feature permissions in Exchange Online article.
To open and use the EAC, see Exchange admin center in Exchange Online. To
connect to Exchange Online PowerShell, see Connect to Exchange Online
PowerShell.
When a mailbox is added to Outlook using Advanced Settings, only the primary
mailbox will be added; the archive mailbox won't be added. If a user needs to also
access the archive mailbox, the mailbox should be added to Outlook as a second
account in the same Outlook profile.
For information about keyboard shortcuts that may apply to the procedures in this
article, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
3. On the mailbox properties page that opens, click Mailbox delegation and
configure one or more of the following permissions:
Send As: Messages sent by a delegate appear to come from the mailbox.
Send on Behalf: Messages sent by a delegate have " <Delegate> on behalf of
<Mailbox>" in the From address. Note that this permission isn't available in
the EAC for shared mailboxes.
Full Access: The delegate can open the mailbox and do anything except send
messages.
To remove a permission from a delegate, select the delegate in the list under the
appropriate permission, and then click Remove .
2. Select the mailboxes that you want to assign permissions for. Use click + Shift key
+ click to select a range of mailboxes, or Ctrl key + click to select multiple
individual mailboxes. The title of the details pane changes to Bulk Edit as shown in
the following diagram.
3. At the bottom of the details pane, click More options. Under the Mailbox
Delegation option that appears, choose Add or Remove. Depending on your
selection, do one of the following steps:
Add: In the Bulk Add Delegation dialog box that appears, click Add under
the appropriate permission (Send As, Send on Behalf, or Full Access). When
you're finished selecting users or groups to add as delegates, click Save.
Remove: In the Bulk Remove Delegation dialog box that appears, click Add
under the appropriate permission (Send As, Send on Behalf, or Full
Access). When you're finished selecting users or groups to remove from the
existing delegates, click Save.
2. In the list of groups, select the group that you want to assign permissions for, and
then click Edit .
3. On the group properties page that opens, click Group delegation and configure
one of the following permissions:
Send As: Messages sent by a delegate appear to come from the group.
Send on Behalf: Messages sent by a delegate have " <Delegate> on behalf of
<Group>" in the From address.
4. To assign permissions to delegates, click Add under the appropriate permission.
A dialog box appears that lists the users or groups that can have the permission
assigned to them. Select the user or group from the list, and then click Add.
Repeat this process as many times as necessary. You can also search for users or
groups in the search box by typing all or part of the name, and then clicking
Search . When you're finished selecting delegates, click OK.
To remove a permission from a delegate, select the delegate in the list under the
appropriate permission, and then click Remove .
PowerShell
PowerShell
This example assigns the delegate Raymond Sam the Full Access permission to the
mailbox of Terry Adams.
PowerShell
This example assigns Esther Valle the Full Access permission to the organization's
default discovery search mailbox, and prevents the mailbox from automatically opening
in Esther Valle's Outlook.
PowerShell
Add-MailboxPermission -Identity "DiscoverySearchMailbox{D919BA05-46A6-415f-
80AD-7E09334BB852}" -User estherv -AccessRights FullAccess -InheritanceType
All -AutoMapping $false
This example assigns members of the Helpdesk mail-enabled security group the Full
Access permission to the shared mailbox named Helpdesk Tickets.
PowerShell
This example removes Full Access permission for Jim Hance from Ayla Kol's mailbox.
PowerShell
Add-MailboxPermission.
Remove-MailboxPermission.
In the properties of the mailbox in the EAC, verify the delegate is or isn't listed in
Mailbox delegation > Full Access.
Replace <MailboxIdentity> with the identity of the mailbox and run the following
command in Exchange Online PowerShell to verify that the delegate is or isn't
listed..
PowerShell
PowerShell
This example assigns the Send As permission to the Printer Support group on the
shared mailbox named Contoso Printer Support.
PowerShell
This example removes the Send As permission for the user Karen Toh on the mailbox for
Yan Li.
PowerShell
Add-RecipientPermission
Remove-RecipientPermission
In the properties of the mailbox or group in the EAC, verify the delegate is or isn't
listed in Mailbox delegation > Send As or Group delegation > Send As.
PowerShell
Set-Mailbox
Set-DistributionGroup: Distribution groups and mail-enabled security groups.
Set-DynamicDistributionGroup
Set-UnifiedGroup: Microsoft 365 groups.
PowerShell
The GrantSendOnBehalfTo parameter has the following options for delegate values:
This example assigns the delegate Holly Holt the Send on Behalf permission to the
mailbox of Sean Chai.
PowerShell
PowerShell
This example assigns the delegate Sara Davis the Send on Behalf permission to the
Printer Support distribution group.
PowerShell
This example removes the Send on Behalf permission that was assigned to the
administrator on the All Employees dynamic distribution group.
PowerShell
In the properties of the mailbox or group in the EAC, verify the delegate is or isn't
listed in Mailbox delegation > Send As or Group delegation > Send As.
Mailbox:
PowerShell
PowerShell
PowerShell
Next steps
For more information about how delegates can use the permissions that are assigned to
them on mailboxes and groups, see the following articles:
) Important
Tip
The features that are available to your Microsoft 365 or Office 365
organization are determined by the service plan for your account. Some
features aren't available to mailboxes or organizations in specific regions.
During the Outlook on the web and Facebook connection setup, the contacts in the
user's default contacts folder are uploaded to Facebook as part of a one-time
synchronization with Facebook. Facebook uses this contact information as part of the
"People you may know" friend suggestions on Facebook. The one-time upload of
information also allows Facebook to include the information for your users' Outlook on
the web contacts in Facebook applications that your users may choose to use, for
example, mobile phone applications.
For information about how your users can set up a connection to Facebook using a
desktop version of Outlook, see Social Connector for Microsoft Outlook .
Manage LinkedIn contact sync in your
organization in Exchange Online
Article • 02/22/2023
) Important
LinkedIn contact synchronization lets people set up a connection between their LinkedIn
account and their Microsoft 365 or Office 365 account by using Outlook on the web
(formerly known as Outlook Web App). After they set up LinkedIn contact sync, all their
LinkedIn connections are listed as contacts in People in Microsoft 365 or Office 365.
They can then interact with their LinkedIn connections as they do with other contacts.
LinkedIn contact sync is turned on by default if the feature is available for your region.
Tip
As an admin, you probably want to keep LinkedIn contact sync turned on if your
organization uses LinkedIn for business purposes, such as networking and
marketing. Turn it off if you don't want your users to download their LinkedIn
connections as contacts in Outlook on the web.
The features that are available to your Microsoft 365 or Office 365 organization are
determined by the service plan for your account. Some features aren't available to
mailboxes or organizations in specific regions.
If you have accidentally deleted any email conversations from Microsoft 365 Group and
are looking for a way to restore the email conversation, you can restore them using one
of the following options:
Ensure Folders and Rules feature for Microsoft 365 groups is enabled.
Ensure you're the owner of the group to and from which you're trying to restore
the deleted items.
1. Sign in to OWA.
3. If Deleted Items folder isn't visible, right click on the group, and select Create new
subfolder option.
4. Enter the name of the folder, and select Save to create a folder.
You can expand the group now and see the Deleted Items folder along with the
new folder you created.
5. Select the Deleted Items folder, select the messages that need to be restored, and
select Restore.
The messages are restored under Inbox folder of the Microsoft 365 group.
Prerequisite:
2. Use the following command to restore all emails from RecoverableItems folder to
Inbox:
PowerShell
You can further filter the message to be restored by using various options mentioned in
Restore-RecoverableItems.
For example:
Related article:
Restore a deleted Microsoft 365 group
Security and compliance for Exchange
Online
Article • 02/22/2023
Email has become a reliable and ubiquitous communication medium for information
workers in organizations of all sizes. Messaging stores and mailboxes have become
repositories of valuable data. It's important for organizations to formulate messaging
policies that dictate the fair use of their messaging systems, provide user guidelines for
how to act on the policies, and where required, provide details about the types of
communication that may not be allowed.
Organizations must also create policies to manage email lifecycle, retain messages for
the length of time based on business, legal, and regulatory requirements, preserve email
records for litigation and investigation purposes, and be prepared to search and provide
the required email records to fulfill eDiscovery requests.
Feature Description
Archive Archive mailboxes (called In-Place Archiving) let people in your Microsoft 365 or
mailboxes in Office 365 organization take control of messaging data by providing additional
Exchange email storage. People can use Outlook or Outlook on the web (formerly known as
Online Outlook Web App) to view messages in their archive mailbox and move or copy
messages between their primary and archive mailboxes.
Litigation Litigation Hold allows you to preserve or archive mailbox content for compliance
Hold and eDiscovery.
Feature Description
Inactive You can preserve the contents of deleted mailboxes indefinitely by using inactive
mailboxes in mailboxes. You can make an inactive mailbox by placing an In-Place Hold or a
Exchange Litigation Hold on the mailbox, and then deleting the corresponding user
Online account. In addition to preserving mailbox contents, administrators or compliance
officers can use Content Search in the Microsoft Purview compliance portal to
search the contents of an inactive mailbox.
Data loss Data loss prevention (DLP) helps you identify and monitor sensitive information,
prevention such as private identification numbers, credit card numbers, or standard forms
used in your organization. You can set up DLP policies to notify users that they are
sending sensitive information or block the transmission of sensitive information.
Exchange You can use the auditing functionality in Exchange Online to track changes made
auditing to your Exchange Online configuration by Microsoft and by your organization's
reports administrators, and to audit mailbox access by persons other than the mailbox
owner. In Exchange Online, audited actions are recorded and available to view in
an online report or export to a file.
Messaging Messaging records management (MRM) helps your organization manage email
records lifecycle to meet business and regulatory requirements and reduce the legal risks
management associated with email. In Exchange Online, you can use In-Place Hold or Litigation
(MRM) Hold to preserve email and Retention tags and retention policies to archive and
delete email.
Information Information Rights Management (IRM) helps you and your users control who can
Rights access, forward, print, or copy sensitive data within an email. IRM can use your
Management on-premises Active Directory Rights Management Services (AD RMS) server.
in Exchange
Online
Message Message Encryption allows you to send encrypted messages to people inside or
Encryption outside your organization, regardless of the destination email service, whether it's
FAQ Outlook.com, Yahoo, Gmail, or another service. Designated recipients can send
encrypted replies. Message Encryption combines email encryption and rights
management capabilities. Rights management capabilities are powered by Azure
Information Protection.
S/MIME for Secure/Multipurpose Internet Mail Extensions (S/MIME) allows email users to help
Message protect sensitive information by sending signed and encrypted email within their
Signing and organization. As an administrator, you can enable S/MIME-based security for your
Encryption organization if you have mailboxes in either Exchange Server or Exchange Online.
Journaling in Journaling can help you meet legal, regulatory, and organizational compliance
Exchange requirements by recording inbound and outbound email communications. In
Online Exchange Online, you can create journal rules to deliver journal reports to your
on-premises mailbox or archiving system, or to an external archiving service.
Feature Description
Mail flow You can use mail flow rules (also known as transport rules) to inspect messages
rules sent or received by your users and take actions such as blocking or bouncing a
(transport message, holding it for review by a manager or an administrator or delivering a
rules) in copy to another recipient if the message matches specified conditions.
Exchange
Online
Modify archive policies in Exchange
Online
Article • 02/22/2023
In Exchange Online, you can use archive policies to automatically move mailbox items to
personal (on-premises) or cloud-based archives. Archive policies are retention tags that
use the Move to Archive retention action.
Exchange Setup creates a retention policy called Default MRM Policy. This policy has a
default policy tag (DPT) assigned that moves items to the archive mailbox after two
years. The policy also includes a number of personal tags that users can apply to folders
or mailbox items to automatically move or delete messages. If a mailbox doesn't have a
retention policy assigned when it's archive-enabled, the Default MRM Policy is
automatically applied to it by Exchange. You can also create your own archive and
retention policies and apply them to mailbox users. To learn more, see Retention tags
and retention policies.
You can modify retention tags included in the default policy to meet your business
requirements. For example, you can modify the archive DPT to move items to the
archive after three years instead of two. You can also create additional personal tags and
either add them to a retention policy, including the Default MRM Policy, or allow users
to add personal tags to their mailboxes from Outlook on the web (formerly known as
Outlook Web App) Options.
For additional management tasks related to archives, see Enable archive mailboxes in
the Microsoft Purview compliance portal.
7 Note
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Messaging records
management" entry in the Feature permissions in Exchange Online topic.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
2. In the list view, select the tag Default 2 year move to archive and then click Edit .
Tip
You can click the TYPE column to sort retention tags by type. The default
archive policy is displayed as type Default and has the Archive retention
action. Alternatively, click NAME to sort retention tags by name.
3. In Retention Tag, view or modify the following settings, and then click Save:
Name: Use this box at the top of the page to view or change the tag name.
Retention tag type: This read-only field displays the tag type.
Never: Click this button to disable the tag. If the DPT is disabled, the tag is no
longer applied to the mailbox.
) Important
Items that have a disabled retention tag applied aren't processed by
the Mailbox Assistant. If you want to prevent a tag from being applied
to items, we recommend disabling the tag rather than deleting it.
When you delete a tag, the tag configuration is deleted from Active
Directory, and the Mailbox Assistant processes all messages to
remove the deleted tag.
When the item reaches the following age (in days): Click this button to
specify that items be moved to archive after a certain period. By default, this
setting is configured to move items to the archive after two years (730 days).
To modify this setting, in the corresponding text box, type the number of
days in the retention period. The range of values is from 1 through 24,855
days.
Comment: Use this box to type a comment that will be displayed to Outlook
and Outlook on the web users.
PowerShell
PowerShell
This example retrieves all archive DPTs and personal tags and disables them.
PowerShell
For detailed syntax and parameter information, see Set-RetentionPolicyTag and Get-
RetentionPolicyTag.
This command retrieves properties of the Default 2 year move to archive retention tag
and pipes the output to the Format-List cmdlet to display all properties in a list format.
PowerShell
) Important
Please refer to the Microsoft 365 security center and the Microsoft
Purview compliance portal for Exchange security and compliance features.
They are no longer available in the new Exchange admin center .
As we continue to invest in different ways to preserve mailbox content, we're
announcing the retirement of In-Place Holds in the Exchange admin center
(EAC) in Exchange Online. Starting July 1, 2020, you won't be able to create
new In-Place Holds. But you'll still be able to manage In-Place Holds in the
EAC or by using the Set-MailboxSearch cmdlet in Exchange Online
PowerShell. However, starting October 1, 2020, you won't be able to manage
In-Place Holds. You'll only be able to remove them in the EAC or by using the
Remove-MailboxSearch cmdlet. Using In-Place Holds in Exchange Server and
Exchange hybrid deployments will still be supported. You will also still be able
to place mailboxes on Litigation Hold. For more information about the
retirement of In-Place Holds in Exchange Online, see Retirement of legacy
eDiscovery tools.
End users may be asked to preserve email by not deleting any messages. However,
users can still delete email knowingly or inadvertently.
Failure to preserve email can expose an organization to legal and financial risks such as
scrutiny of the organization's records retention and discovery processes, adverse legal
judgments, sanctions, or fines.
You can use In-Place Hold or Litigation Hold to accomplish the following goals:
Use query-based In-Place Hold to search for and retain items matching specified
criteria.
Keep holds transparent from the user by not having to suspend MRM.
What to hold: You can specify which items to hold by using query parameters such
as keywords, senders and recipients, start and end dates, and also specify the
message types such as email messages or calendar items that you want to place
on hold.
How long to hold: You can specify a duration for items on hold.
Using this new model, In-Place Hold allows you to create granular hold policies to
preserve mailbox items in the following scenarios:
Indefinite hold: The indefinite hold scenario is similar to Litigation Hold. It's
intended to preserve mailbox items so you can meet eDiscovery requirements.
During the period of litigation or investigation, items are never deleted. The
duration isn't known in advance, so no end date is configured. To hold all mail
items indefinitely, you don't specify any query parameters or time duration when
creating an In-Place Hold.
) Important
Placing a mailbox on an indefinite hold means that mail items meeting the
hold requirements will never be removed from the mailbox. This could result
in the mailbox exceeding the Recoverable Items Quota, which could make
the mailbox unusable. Microsoft recommends enabling an Archive for the
mailbox, as well as enabling the auto-expanding archive feature. See Holds
and Mailbox Quotas for more information.
) Important
Time-based hold: Both In-Place Hold and Litigation Hold allow you to specify a
duration of time for which to hold items. The duration is calculated from the date a
mailbox item is received or created.
If your organization requires that all mailbox items be preserved for a specific
period, for example 7 years, you can create a time-based hold so that items on
hold are retained for a specific period of time. For example, consider a mailbox
that's placed on a time-based In-Place Hold and has a retention period set to 365
days. If an item in that mailbox is deleted after 300 days from the date it was
received, it's held for an additional 65 days before being permanently deleted. You
can use a time-based In-Place Hold in conjunction with a retention policy to make
sure items are preserved for the specified duration and permanently removed after
that period.
You can use In-Place Hold to place a user on multiple holds. When a user is placed on
multiple holds, the search queries from any query-based hold are combined (with OR
operators). In this case, the maximum number of keywords in all query-based holds
placed on a mailbox is 500. If there are more than 500 keywords, then all content in the
mailbox is placed on hold (not just that content that matches the search criteria). All
content is held until the total number of keywords is reduced to 500 or less.
When a mailbox is placed on one or more In-Place Holds and on Litigation Hold
(without a duration period) at the same time, all items are held indefinitely or until the
holds are removed. If you remove Litigation Hold and the user is still placed on one or
more In-Place Holds, items matching the In-Place Hold criteria are held for the period
specified in the hold settings.
7 Note
When you place a mailbox on In-Place Hold or Litigation Hold, the hold is placed
on both the primary and the archive mailbox. If you place an on-premises primary
mailbox on hold in an Exchange hybrid deployment, the cloud-based archive
mailbox (if enabled) is also placed on hold.
You can use the In-Place eDiscovery & Hold wizard in the Exchange admin center (EAC)
or the New-MailboxSearch and related cmdlets in Exchange Online PowerShell to
remove a mailbox on In-Place Hold. To learn more about removing a mailbox on In-
Place Hold, see Remove an In-Place Hold.
Many organizations require that users be informed when they're placed on hold.
Additionally, when a mailbox is on hold, any retention policies applicable to the mailbox
user don't need to be suspended. Because messages continue to be deleted as
expected, users may not notice they're on hold. If your organization requires that users
on hold be informed, you can add a notification message to the mailbox user's
RetentionComment property and use the RetentionUrl property to link to a web page
for more information. Outlook 2010 and later displays the notification and URL in the
backstage area. You must use Exchange Online PowerShell to add and manage these
properties for a mailbox. For more information, see Set-Mailbox.
Additionally, when you place public folders on In-Place Hold, email messages related to
the public folder hierarchy synchronization process are also preserved. This might result
in thousands of hierarchy synchronization related email items being preserved. These
messages can fill up the storage quota for the Recoverable Items folder on public folder
mailboxes. To prevent this, you can create a query-based In-Place Hold and add the
following property:value pair to the search query:
NOT(subject:HierarchySync*)
The result is that any message (related to the synchronization of the public folder
hierarchy) that contains the phrase "HierarchySync" in the subject line is not placed on
hold.
By default, when a user deletes a message from a folder other than the Deleted Items
folder, the message is moved to the Deleted Items folder. This is known as a move.
When a user soft deletes an item (accomplished by pressing the SHIFT and DELETE keys)
or deletes an item from the Deleted Items folder, the message is moved to the
Recoverable Items folder, thereby disappearing from the user's view.
Items in the Recoverable Items folder are retained for the deleted item retention period
configured for the user's mailbox. By default, the deleted item retention period is 14
days for Exchange Online mailboxes. You can also configure a storage quota for the
Recoverable Items folder. This protects the organization from a potential denial of
service (DoS) attack due to rapid growth of the Recoverable Items folder. If a mailbox
isn't placed on In-Place Hold or Litigation Hold, items are purged permanently from the
Recoverable Items folder on a first in, first out basis when the Recoverable Items
warning quota is exceeded, or the item has resided in the folder for a longer duration
than the deleted item retention period.
The Recoverable Items folder contains the following subfolders used to store deleted
items in various sites and facilitate In-Place Hold and Litigation Hold:
Deletions - Items removed from the Deleted Items folder or soft-deleted from
other folders are moved to the Deletions subfolder and are visible to the user
when using the Recover Deleted Items feature in Outlook and Outlook on the web.
By default, items reside in this folder until the deleted item retention period
configured for the mailbox expires.
Purges - When a user deletes an item from the Recoverable Items folder (by using
the Recover Deleted Items tool in Outlook and Outlook on the web, the item is
moved to the Purges folder. Items that exceed the deleted item retention period
configured for the mailbox are also moved to the Purges folder. Items in this folder
aren't visible to users if they use the Recover Deleted Items tool. When the
Managed Folder Assistant processes the mailbox, items in the Purges folder are
purged from the mailbox. When you place the mailbox user on Litigation Hold, the
Managed Folder Assistant doesn't purge items in this folder.
Versions - When a user placed on In-Place Hold or Litigation Hold, mailbox items
must be protected from tampering or modification by the user or a process. This is
accomplished using a copy-on-write process. When a user or a process changes
specific properties of a mailbox item, a copy of the original item is saved in the
Versions folder before the change is committed. The process is repeated for
subsequent changes. Items captured in the Versions folder are also indexed and
returned in eDiscovery searches. After the hold is removed, copies in the Versions
folder are removed by the Managed Folder Assistant.
Items other than messages and Any change to a visible property, except the following:
posts Item location (when an item is moved between folders)
Item status change (read or unread)
Changes to retention tag applied to an item
Items in the default folder Drafts None (items in the Drafts folder are exempt from copy on
write)
) Important
Enable the archive mailbox and turn on auto-expanding archiving - You can
enable an unlimited storage capacity for the Recoverable Items folder simply by
enabling the archive mailbox and then turning on the auto-expanding archiving
feature in Exchange Online. This results in 110 GB for the Recoverable Items folder
in the primary mailbox and an unlimited amount of storage capacity for the
Recoverable Items folder in the user's archive. See how: Enable archive mailboxes
in the compliance portal and Enable unlimited archiving - Admin help.
7 Note
After you enable the archive for a mailbox that's close to exceeding the
storage quota for the Recoverable Items folder, you might want to run the
Managed Folder Assistant to manually trigger the assistant to process the
mailbox so that expired items are moved the Recoverable Items folder in
the archive mailbox. For instructions, see Step 4 in Increase the
Recoverable Items quota for mailboxes on hold.
Note that other items in the user's mailbox might be moved to the new
archive mailbox. Consider telling the user that this might happen after you
enable the archive mailbox.
For more information, see Increase the Recoverable Items quota for mailboxes on hold.
If email forwarding is set up for a mailbox and messages aren't copied to the original
mailbox, what happens if the mailbox is on hold? The hold settings for the mailbox are
checked during the delivery process. If the message meets the hold criteria for the
mailbox, a copy of the message is saved to the Recoverable Items folder. That means
you can use eDiscovery tools to search the original mailbox to find messages that were
forwarded to another mailbox.
) Important
An In-Place Hold preserves all mailbox content, including deleted items and original
versions of modified items. All such mailbox items are returned in an In-Place eDiscovery
search. When you place an In-Place Hold on a user's mailbox on, the contents in the
corresponding archive mailbox (if it's enabled) are also placed on hold, and returned in a
eDiscovery search.
You need to be assigned permissions before you can perform this procedure. To
see what permissions you need, see the "In-Place Hold" entry in the Feature
permissions in Exchange Online topic.
Depending on your Active Directory topology and replication latency, it may take
up to an hour for the removal of an In-Place Hold to take effect.
) Important
Mailbox searches can be used for an In-Place Hold and In-Place eDiscovery. You
can't remove a mailbox search that's used for In-Place Hold. You must first disable
the In-Place Hold by clearing the Place content matching the search query in
selected mailboxes on hold check box on the In-Place Hold settings page or by
setting the InPlaceHoldEnabled parameter to $false in Exchange Online
PowerShell. You can also remove a mailbox by using the SourceMailboxes parameter
specified in the search.
2. In the list view, select the In-Place Hold you want to remove and then click Edit .
3. In In-Place eDiscovery & Hold properties, on the In-Place Hold page, clear the
Place content matching the search query in selected mailboxes on hold, and
then click Save.
4. Select the In-Place Hold again from the list view, and then click Delete .
PowerShell
Set-MailboxSearch "Hold-CaseId012" -InPlaceHoldEnabled $false
Remove-MailboxSearch "Hold-CaseId012"
Use the EAC to verify that the In-Place Hold doesn't appear in the list view of the
In-place eDiscovery & hold tab.
Use the Get-MailboxSearch cmdlet to retrieve all mailbox searches and check that
the search you removed is no longer listed. For an example of how to retrieve a
mailbox search, see the examples in Get-MailboxSearch.
In-Place eDiscovery in Exchange Online
Article • 02/22/2023
) Important
) Important
In-Place eDiscovery is a powerful feature that allows a user with the correct
permissions to potentially gain access to all messaging records stored throughout
the Exchange Online organization. It's important to control and monitor discovery
activities, including addition of members to the Discovery Management role group,
assignment of the Mailbox Search management role, and assignment of mailbox
access permission to discovery mailboxes.
Authorized users can perform an In-Place eDiscovery search by selecting the mailboxes,
and then specifying search criteria such as keywords, start and end dates, sender and
recipient addresses, and message types. After the search is complete, authorized users
can then select one of the following actions:
Estimate search results: This option returns an estimate of the total size and
number of items that will be returned by the search based on the criteria you
specified.
Preview search results: This option provides a preview of the results. Messages
returned from each mailbox searched are displayed.
Copy search results: This option lets you copy messages to a discovery mailbox.
Export search results: After search results are copied to a discovery mailbox, you
can export them to a PST file.
Exchange Search
In-Place eDiscovery uses the content indexes created by Exchange Search. Exchange
Search has been retooled to use Microsoft Search Foundation, a rich search platform
that comes with significantly improved indexing and querying performance and
improved search functionality. Because the Microsoft Search Foundation is also used by
other Office products, including SharePoint 2013, it offers greater interoperability and
similar query syntax across these products.
With a single content indexing engine, no additional resources are used to crawl and
index mailbox databases for In-Place eDiscovery when eDiscovery requests are received
by IT departments.
In-Place eDiscovery uses Keyword Query Language (KQL), a querying syntax similar to
the Advanced Query Syntax (AQS) used by Instant Search in Microsoft Outlook and
Outlook on the web. Users familiar with KQL can easily construct powerful search
queries to search content indexes.
For more information about the file formats indexed by Exchange search, see File
Formats Indexed By Exchange Search.
) Important
If a user hasn't been added to the Discovery Management role group or isn't
assigned the Mailbox Search role, the In-Place eDiscovery & Hold user interface
isn't displayed in the EAC, and the In-Place eDiscovery cmdlets aren't available in
Exchange Online PowerShell.
Auditing of RBAC role changes, which is enabled by default, makes sure that adequate
records are kept to track assignment of the Discovery Management role group. You can
use the administrator role group report to search for changes made to administrator
role groups. For more information, see Search the role group changes or administrator
audit logs.
For In-Place eDiscovery, the only property on a user mailbox that you can use to create
a recipient filter for a custom scope is distribution group membership. If you use other
properties, such as CustomAttributeN, Department, or PostalCode, the search fails when
it's run by a member of the role group that's assigned the custom scope. For more
information, see Create a custom management scope for In-Place eDiscovery searches.
Search on-premises mailboxes that use Exchange Online Archiving for cloud-based
archive mailboxes.
For information about running an In-Place eDiscovery search in Exchange Server, see
Create an In-Place eDiscovery search in Exchange Server.
Discovery mailboxes
After you create an In-Place eDiscovery search, you can copy the search results to a
target mailbox. The EAC allows you to select a discovery mailbox as the target mailbox.
A discovery mailbox is a special type of mailbox that provides the following
functionality:
Easier and secure target mailbox selection: When you use the EAC to copy In-
Place eDiscovery search results, only discovery mailboxes are made available as a
repository in which to store search results. You don't need to sort through a
potentially long list of mailboxes available in the organization. This also eliminates
the possibility of a discovery manager accidentally selecting another user's mailbox
or an unsecured mailbox in which to store potentially sensitive messages.
Large mailbox storage quota: The target mailbox should be able to store a large
amount of message data that may be returned by an In-Place eDiscovery search.
By default, discovery mailboxes have a mailbox storage quota of 50 gigabytes (GB).
This storage quota can't be increased.
More secure by default: Like all mailbox types, a discovery mailbox has an
associated Active Directory user account. However, this account is disabled by
default. Only users explicitly authorized to access a discovery mailbox have access
to it. Members of the Discovery Management role group are assigned Full Access
permissions to the default discovery mailbox. Any additional discovery mailboxes
you create don't have mailbox access permissions assigned to any user.
Email delivery disabled: Although visible in Exchange address lists, users can't
send email to a discovery mailbox. Email delivery to discovery mailboxes is
prohibited by using delivery restrictions. This preserves the integrity of search
results copied to a discovery mailbox.
Exchange Setup creates one discovery mailbox with the display name Discovery Search
Mailbox. You can use Exchange Online PowerShell to create additional discovery
mailboxes. By default, the discovery mailboxes you create won't have any mailbox access
permissions assigned. You can assign Full Access permissions for a discovery manager to
access messages copied to a discovery mailbox. For details, see Create a discovery
mailbox.
In-Place eDiscovery also uses a system mailbox with the display name
SystemMailbox{e0dc1c29-89c3-4034-b678-e6c29d823ed9} to hold In-Place eDiscovery
metadata. System mailboxes aren't visible in the EAC or in Exchange address lists. In on-
premises organizations, before removing a mailbox database where the In-Place
eDiscovery system mailbox is located, you must move the mailbox to another mailbox
database. If the mailbox is removed or corrupted, your discovery managers are unable
to perform eDiscovery searches until you re-create the mailbox. For details, see Delete
and re-create the default discovery mailbox in Exchange.
7 Note
Keyword statistics also include statistics for non-keyword properties such as dates,
message types, and senders/recipients specified in a search query.
You can also preview the search results to further ensure that messages returned
contain the content you're searching for and further fine-tune the query if required.
eDiscovery Search Preview displays the number of messages returned from each
mailbox searched and the total number of messages returned by the search. The
preview is generated quickly without requiring you to copy messages to a discovery
mailbox.
After you're satisfied with the quantity and quality of search results, you can copy them
to a discovery mailbox. When copying messages, you have the following options:
Include unsearchable items: For details about the types of items that are
considered unsearchable, see the eDiscovery search considerations in the previous
section.
Enable full logging: By default, only basic logging is enabled when copying items.
You can select full logging to include information about all records returned by the
search.
Send me mail when the copy is completed: An In-Place eDiscovery search can
potentially return a large number of records. Copying the messages returned to a
discovery mailbox can take a long time. Use this option to get an email notification
when the copying process is completed. For easier access using Outlook on the
web, the notification includes a link to the location in a discovery mailbox where
the messages are copied.
After search results are exported to a PST file, you or other users can open them in
Outlook to review or print messages returned in the search results. For more
information, see Export eDiscovery search results to a PST file.
If you do experience dissimilar results for the same search, consider placing mailboxes
on hold to preserve content, running searches during off-peak hours, and allowing time
for indexing after importing large amounts of email.
Basic logging: Basic logging is enabled by default for all In-Place eDiscovery
searches. It includes information about the search and who performed it.
Information captured about basic logging appears in the body of the email
message sent to the mailbox where the search results are stored. The message is
located in the folder created to store search results.
Full logging: Full logging includes information about all messages returned by the
search. This information is provided in a comma-separated value (.csv) file attached
to the email message that contains the basic logging information. The name of the
search is used for the .csv file name. This information may be required for
compliance or record-keeping purposes. To enable full logging, you must select
the Enable full logging option when copying search results to a discovery mailbox
in the EAC. If you're using Exchange Online PowerShell, specify the full logging
option using the LogLevel parameter.
7 Note
Besides the search log included when copying search results to a discovery mailbox,
Exchange also logs cmdlets used by the EAC or Exchange Online PowerShell to create,
modify or remove In-Place eDiscovery searches. This information is logged in the admin
audit log entries. For details, see View the administrator audit log.
You can't use the option to search all mailboxes. You must select the mailboxes or
distribution groups.
You can't remove an In-Place eDiscovery search if the search is also used for In-
Place Hold. You must first disable the In-Place Hold option in a search and then
remove the search.
) Important
1. Disable the Active Directory user account using Active Directory Users &
Computers or other Active Directory or account provisioning tools or scripts. This
prevents mailbox logon using the associated user account.
) Important
Users with Full Access mailbox permission will still be able to access the
mailbox. To prevent access by others, you must remove their Full Access
permission from the mailbox. For information about how to remove Full
Access mailbox permissions on a mailbox, see Manage permissions for
recipients.
2. Set the message size limit for messages that can be sent from or received by the
mailbox user to a very low value, 1 KB for example. This prevents delivery of new
mail to and from the mailbox.
3. Configure delivery restrictions for the mailbox so nobody can send messages to it.
For details, see Configure message delivery restrictions for a mailbox.
) Important
You must take the above steps along with any other account management
processes required by your organization, but without disabling or removing the
mailbox or removing the associated user account.
Assign eDiscovery Learn how to give a user access to use In-Place eDiscovery in the EAC to
permissions in search Exchange mailboxes. Adding a user to the Discovery Management
Exchange role group also allows the person to use the eDiscovery Center in
SharePoint 2013 and SharePoint Online to search Exchange mailboxes.
Create a discovery Learn how to use Exchange Online PowerShell to create a discovery mailbox
mailbox and assign access permissions.
Message Learn which email message properties can be searched using In-Place
properties and eDiscovery. The topic provides syntax examples for each property,
search operators information about search operators such as AND and OR, and information
for In-Place about other search query techniques such as using double quotation marks
eDiscovery (" ") and prefix wildcards.
Search limits for Learn In-Place eDiscovery limits in Exchange Online that help maintain the
In-Place health and quality of eDiscovery services for Microsoft 365 or Office 365
eDiscovery organizations.
Export eDiscovery Learn how to export the results of an eDiscovery search to a PST file.
search results to a
PST file
Create a custom Learn how to use custom management scopes to limit the mailboxes that a
management discovery manager can search.
scope for In-Place
eDiscovery
searches
Search for and Learn how to use Content Search to search for and then delete email
delete email messages.
messages
Reduce the size of Use this process to reduce the size of a discovery mailbox that's larger than
a discovery 50 GB.
mailbox in
Exchange
Delete and re- Learn how to delete the default discovery mailbox, re-create it, and then
create the default reassign permissions to it. Use this procedure if this mailbox has exceeded
discovery mailbox the 50 GB limit and you don't need the search results.
in Exchange
Using Oauth Learn about the eDiscovery scenarios in an Exchange hybrid deployment
Authentication to that require you to configure OAuth authentication.
Support
eDiscovery in an
Exchange Hybrid
Deployment
For more information about eDiscovery in Microsoft Purview, see the Get started with
eDiscovery (Standard).
Assign eDiscovery permissions in
Exchange Online
Article • 02/22/2023
If you want users to be able to use Microsoft Exchange Server In-Place eDiscovery, you
must first authorize them by adding them to the Discovery Management role group.
Members of the Discovery Management role group have Full Access mailbox
permissions for the Discovery mailbox that's created by Exchange Setup.
U Caution
Members of the Discovery Management role group can access sensitive message
content. Specifically, these members can use In-Place eDiscovery to search all
mailboxes in your Exchange organization, preview messages (and other mailbox
items), copy them to a Discovery mailbox and export the copied messages to a .pst
file. In most organizations, this permission is granted to legal, compliance, or
Human Resources personnel. >
To learn more about the Discovery Management role group and role based access
control (RBAC), see Permissions in Exchange Online.
Interested in scenarios where this procedure is used? See the following topics:
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Role assignments" entry in
the Feature permissions in Exchange Online topic.
By default, the Discovery Management role group doesn't contain any members.
Administrators with the Organization Management role are also unable to create
or manage discovery searches without being added to the Discovery Management
role group.
In Exchange Server, members of the Organization Management role group can
create an In-Place Hold and Litigation Hold to place all mailbox content on hold.
However, to create a query-based In-Place Hold, the user must be a member of the
Discovery Management role group or have the Mailbox Search role assigned.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
2. In the list view, select Discovery Management and then click Edit
4. In Select Members, select one or more users, click Add, and then click OK.
PowerShell
3. In the details pane, verify that the user is listed under Members.
You can also run this command to list the members of the Discovery Management role
group.
PowerShell
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
Export eDiscovery search results to a
PST file in the Exchange admin center in
Exchange Online
Article • 02/22/2023
) Important
You can use the eDiscovery Export tool in the Exchange admin center (EAC) to export
the results of an In-Place eDiscovery search to an Outlook Data File, which is also called
a PST file. Administrators can distribute the results of the search to other people within
your organization, such as a human resources manager or records manager, or to
opposing counsel in a legal case. After search results are exported to a PST file, you or
other users can open them in Outlook to review or print messages returned in the
search results. PST files can also be opened in third-party eDiscovery and reporting
applications. This topic shows you how to do this, as well as troubleshoot any issues you
might have.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "In-Place eDiscovery" entry
in the Feature permissions in Exchange Online topic.
The computer you use to export search results to a PST file must meet the
following system requirements:
A supported browser:
Internet Explorer 10 and later versions
OR
Mozilla Firefox or Google Chrome. If you use either of these browsers, be
sure you install the ClickOnce extension. To install the ClickOnce add-in, see
Mozilla ClickOnce add-ons or ClickOnce for Google Chrome .
You need an active mailbox attached to the account you wish to export.
Ensure that the local Intranet settings are setup correctly in Internet Explorer. Make
sure that https://*.outlook.com is added to the Local intranet zone.
Make sure the following URLS are not listed in the Trusted sites zone:
https://*.outlook.com
https://r4.res.outlook.com
https://*.res.outlook.com
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
2. In the list view, select the In-Place eDiscovery search you want to export the results
of, and then click Export to a PST file.
3. In the eDiscovery PST Export Tool window, do the following:
Click Browse to specify the location where you want to download the PST file.
Click the Include unsearchable items checkbox to include mailbox items that
couldn't be searched (for example, messages with attachments of file types
that couldn't be indexed by Exchange Search). Unsearchable items are
exported to a separate PST file.
) Important
A window is displayed that contains status information about the export process.
More information
You can reduce the size of the PST export fileby exporting only the unsearchable
items. To do this, create or edit a search, specify a start date in the future, and then
remove any keywords from the Keywords box. This will result in no search results
being returned. When you copy or export the search results and select the Include
unsearchable items checkbox, only the unsearchable items will be copied to the
discovery mailbox or exported to a PST file.
If you enable de-duplication, all search results are exported in a single PST file. If
you don't enable de-duplication, a separate PST file is exported for each mailbox
included in the search. And as previously stated, unsearchable items are exported
to a separate PST file.
In addition to the PST files that contain the search results, two other files are also
exported:
A configuration file (.txt file format) that contains information about the PST
export request, such as the name of the eDiscovery search that was exported,
the date and time of the export, whether de-duplication and unsearchable items
were enabled, the search query, and the source mailboxes that were searched.
A search results log (.csv file format) that contains an entry for each message
returned in the search results. Each entry identifies the source mailbox where
the message is located. If you've enabled de-duplication, this helps you identify
all mailboxes that contain a duplicate message.
The name of the search is the first part of the filename for each file that is
exported. Also, the date and time of the export request is appended to the
filename of each PST file and the results log.
For more information about de-duplication and unsearchable items, see Estimate,
preview, and copy search results.
Troubleshooting
Symptom Possible cause
Symptom Possible cause
Cannot export to a PST file. There is no active mailbox attached to the account. To export the
PST, you must have an active account.
Your version of Internet Explorer is out of date. Try updating IE to
version 10 or later. Or try a different browser.
Unable to export search The wrong Windows credentials were saved in the Credential
results on a specific Manager. Clear your credentials and log in again.
machine. Export works as
expected on a different
machine.
eDiscovery PST Export Tool Local intranet zone settings aren't set up correctly in Internet
won't start. Explorer. Make sure that *.outlook.com, *.office365.com,
*.sharepoint.com and *.onmicrosoft.com are added to the Local
intranet zone trusted sites.
To add these sites to the Trusted zone in IE, see Security zones:
adding or removing websites .
Message properties and search
operators for In-Place eDiscovery in
Exchange Online
Article • 02/22/2023
This topic describes the properties of Exchange email messages that you can search by
using In-Place eDiscovery & Hold in Exchange Server and Exchange Online. The topic
also describes Boolean search operators and other search query techniques that you can
use to refine eDiscovery search results.
In-Place eDiscovery uses Keyword Query Language (KQL). For more details, see Keyword
Query Language syntax reference.
7 Note
1 For the value of a recipient property, you can use the SMTP address, display
name, or alias to specify a user. For example, you can use annb@contoso.com,
annb, or "Ann Beebe" to specify the user Ann Beebe.
) Important
You must use uppercase Boolean operators in a search query. For example, use
AND; don't use and. Using lowercase operators in search queries will return an
error.
AND keyword1 AND Returns messages that include all of the specified keywords
keyword2 or property:value expressions.
+ keyword1 +keyword2 Returns items that contain either keyword2 or keyword3 and
+keyword3 that also contain keyword1 . Therefore, this example is
equivalent to the query (keyword2 OR keyword3) AND
keyword1 .
Note that the query keyword1 + keyword2 (with a space
after the + symbol) isn't the same as using the AND
operator. This query would be equivalent to "keyword1 +
keyword2" and return items with the exact phase "keyword1
+ keyword2" .
- keyword1 -keyword2 The same as the NOT operator. This query returns items
that contain keyword1 and excludes items that contain
keyword2 .
NEAR keyword1 NEAR(n) Returns messages with words that are near each other,
keyword2 where n equals the number of words apart. For example,
best NEAR(5) worst returns messages where the word
"worst" is within five words of "best". If no number is
specified, the default distance is eight words.
Operator Usage Description
: property:value The colon (:) in the property:value syntax specifies that the
property value being searched for equals the specified
value. For example, recipients:garthf@contoso.com returns
any message sent to garthf@contoso.com.
< property<value Denotes that the property being searched is less than the
specified value. 1
> property>value Denotes that the property being searched is greater than
the specified value.1
<= property<=value Denotes that the property being searched is less than or
equal to a specific value.1
>= property>=value Denotes that the property being searched is greater than or
equal to a specific value.1
"" "fair value" Use double quotation marks (" ") to search for an exact
subject:"Quarterly phrase or term in keyword and property:value search
Financials" queries.
(quarterly financials)
7 Note
1
Use this operator for properties that have date or numeric values.
Here's a list of the unsupported characters for an In-Place eDiscovery search query.
Smart quotation marks: Smart single and double quotation marks (also called
curly quotes) aren't supported. Only straight quotation marks can be used in a
search query.
Left-to-right and right-to-left marks: These are control characters used to indicate
text direction for left-to-right languages (such as English and Spanish) and right-
to-left languages (such as Arabic and Hebrew).
How to prevent unsupported characters in your search queries? The best way to
prevent unsupported characters is to just type the query in the keyword box.
Alternatively, you can copy a query from Word or Excel and then paste it to file in a plain
text editor, such as Microsoft Notepad. Then save the text file and select ANSI in the
Encoding drop-down list. This will remove any formatting and unsupported characters.
Then you can copy and paste the query from the text file to the keyword query box.
Use syntax that matches the property:value format. Values are not case-sensitive,
and they can't have a space after the operator. If there is a space, your intended
value will just be full-text searched. For example to: pilarp searches for "pilarp" as a
keyword, rather than for messages that were sent to pilarp.
When searching a recipient property, such as To, From, Cc, or Recipients, you can
use an SMTP address, alias, or display name to denote a recipient. For example,
you can use pilarp@contoso.com, pilarp, or "Pilar Pinilla".
You can use only prefix wildcard searches (for example, cat* or set*). Suffix
wildcard searches (*cat) or substring wildcard searches (*cat*) aren't supported.
When searching a property, use double quotation marks (" ") if the search value
consists of multiple words. For example subject:budget Q1 returns messages that
contain budget in the in the subject line and that contain Q1 anywhere in the
message or in any of the message properties. Using subject:"budget Q1" returns
all messages that contain budget Q1 anywhere in the subject line.
Search limits for In-Place eDiscovery in
Exchange Online
Article • 02/22/2023
Various types of limits are applied to In-Place eDiscovery searches in Exchange Online.
These limits help to maintain the health and quality of services provided to Exchange
Online organizations. In most cases, you can't modify these limits, but you should be
aware of them so that you can take these limits into consideration when planning,
running, and troubleshooting eDiscovery searches.
The maximum 10,000 If you have more than 10,000 mailboxes in your organization, you
number of won't be able to use the Search all mailboxes option on the
mailboxes that can Mailboxes page in the EAC. To search large numbers of
be searched in a mailboxes (up to 10,000 mailboxes total), you can organize users
single In-Place into distribution groups or dynamic distribution groups and then
eDiscovery search. specify a group on the Mailboxes page in the EAC. 1
The maximum 100 After you run an eDiscovery search estimate, you can view
number of keyword statistics. These statistics show details about the number
mailboxes that can of items returned for each keyword used in the search query. If
be searched in a more than 100 source mailboxes are included in the search, an
single In-Place error will be returned if you try to view keyword statistics.
eDiscovery search To view keyword statistics, reduce the number of source
that still allows you mailboxes to 100 or fewer, and then rerun the search estimate.
to view keyword When you're satisfied with the search query, you can add
statistics. additional source mailboxes to the search and then copy or
export the search results.
Description of Limit More information and suggested workarounds
limit
The maximum 10,000 You can place up to 10,000 mailboxes on In-Place Hold by using a
number of single eDiscovery search. However, if you select the Search all
mailboxes that can mailboxes option on the Sources page, you won't be able to
be placed on In- enable an In-Place Hold for that search. To place a large number
Place Hold in a of mailboxes on hold using a single In-Place Hold, use
single In-Place distribution groups or dynamic distribution groups to group
eDiscovery search. mailboxes together, and then specify one of those groups on the
Mailboxes page in the EAC. 1
A better option for placing a hold on a large number of
mailboxes is to use a Litigation Hold. Using lots of single In-Place
eDiscovery searches to place mailboxes on hold isn't
recommended.
7 Note
1
Group membership is calculated only when the search or a hold is created. If a
user gets added to the group after the search is created, the user's mailbox won't
be added automatically as a source mailbox. You'll have to edit the search and add
the mailbox. The same thing applies when a user is removed from a group that is
used to create a search or hold. You'll have to edit the search to remove the
mailbox.
The maximum 500 Only 500 mailboxes, distribution groups, and dynamic distribution
number of groups are listed in the mailbox picker to select source mailboxes from
mailboxes that when you create a new search. A message is displayed saying that there
are displayed are more recipients than the ones displayed. Here are some
in the mailbox workarounds for this limit:
picker for Use the search box to find a mailbox that isn't listed in the mailbox
selecting picker.
source Use distribution groups or dynamic distribution groups to group large
mailboxes numbers of mailboxes together. Then pick the group from the mailbox
when creating list or search for it using the search box. Groups are expanded into
a new In-Place source mailboxes when you create an eDiscovery search.
eDiscovery or Select Search all mailboxes on the Mailbox page if your organization
In-Place Hold has less than 10,000 mailboxes and you're not going to place mailboxes
search. on hold.
Use distribution groups or dynamic distribution groups to group users
if you want to place more than 500 mailboxes on In-Place Hold.
Description of Limit More information and suggested workarounds
limit
The maximum 3,000 Up to 3,000 mailboxes are displayed on the Sources page in the EAC
number of when you edit an In-Place eDiscovery search or hold. To add a mailbox
mailboxes that to the list of sources, you can use the search box to find a mailbox that
are displayed isn't listed in the mailbox picker (a maximum of 500 recipients are listed
when editing in the mailbox picker). To remove a mailbox that's listed, you can select
an In-Place it and then click Remove. To remove a mailbox that isn't listed, you have
eDiscovery or to use Exchange Online PowerShell to remove it. For example, the
In-Place Hold following commands are run to remove the user Ann Beebe from an In-
search. Place Hold named ContosoHold.
$SourceMailboxes = Get-MailboxSearch "ContosoHold"
$SourceMailboxes.Sources.Remove("/o=contoso/ou=Exchange
Administrative Group
(FYDIBOHF23SPDLT)/cn=Recipients/cn=28e3edb87e29422998ec8f3a946dd1e5-
annb")
Set-MailboxSearch "ContosoHold" -SourceMailboxes
$SourceMailboxes.Sources
The first command creates a variable that contains the properties of
ContosoHold. The second command removes the user Ann Beebe (by
specifying the value of the LegacyExchangeDN property) from the list
of source mailboxes. The third command edits ContosoHold with the
updated list of source mailboxes.
To add a user to an In-Place Hold, use the following syntax in the
second command in the previous example.
$SourceMailboxes.Sources.Add("<LegacyExchangeDN of the user>")
Note: The Sources property of an In-Place eDiscovery search or an In-
Place Hold identifies the source mailboxes by their LegacyExchangeDN
property. Because this property uniquely identifies a user mailbox, using
the Sources property helps prevent adding or removing the wrong
mailbox. This also helps to avoid issues if two mailboxes have the same
alias or primary SMTP address.
Other limits
The following table describes other limits that affect In-Place eDiscovery searches.
The maximum 2 If an eDiscovery search is started while two previous searches are
number of In- still running, the third search won't be queued and will instead fail.
Place eDiscovery You have to wait until one of the running searches is completed
searches that can before you can successfully start a new search.
run at the same Also, estimate-only and copy searches are both considered In-Place
time in your eDiscovery searches. So, if you are running an estimate-only search
organization. and a copy search at the same time, you can't start another search
until one of the running searches is completed. However, you can
preview or export the search results from another search while two
searches are running.
The maximum 500 Boolean operators, such as AND and OR aren't counted against the
number of total number of keywords. For example, the keyword query cat AND
keywords that can dog AND bird AND fish consists of four keywords.
be specified in a
single In-Place
eDiscovery search
query.
The maximum 200 When you preview search results, the mailboxes that were searched
number of items are listed in the right pane on the eDiscovery search preview page.
displayed on the For each mailbox, the number of items returned and the total size
search preview of these items are also displayed. Items returned by the search are
page when listed in the right pane. Up to 200 items are displayed on the
previewing In- preview page.
Place eDiscovery Note: Items from each mailbox can't be displayed in the right pane
search results. by clicking a mailbox in the left pane. To view the items returned
from a specific mailbox, you can copy the search results and view
the items in the discovery mailbox.
The maximum 500 If multiple In-Place Holds are placed on a user's mailbox, the
number of maximum number of keywords in all search queries is 500. That's
keywords that can because Exchange Online combines all the keyword search
be specified in all parameters from of all In-Place Holds by using the OR operator. If
In-Place Holds there are more than 500 keywords in the hold queries, then all
placed on a single content in the mailbox is placed on hold (and not just that content
mailbox. that matches the search criteria of any query-based hold). All
content is held until the total number of keywords in all In-Place
Holds is reduced to 500 or less. Holding all mailbox content is
similar in functionality to a Litigation Hold.
Description of Limit More information
limit
Maximum number 10,000 For non-phrase queries we use a special prefix index. This only tells
of variants us that a word occurs in a document, not where in the document it
returned when occurs. To do a phrase query we need to compare the position
using a prefix within the document for the words in the phrase. This means that
wildcard to search we cannot use the prefix index for phrase queries. In this case we
for an exact are internally expanding the query with all possible words that the
phrase in a prefix expands to (i.e. "time*" can expand to "time OR timer OR
keyword search times OR timex OR timeboxed OR ..."). 10,000 is the maximum
query or when number of variants the word can expand to, not the number of
using a prefix documents matching the query. For non-phrase terms there are no
wildcard and the upper limit.
NEAR operator.
Create a discovery mailbox in Exchange
Online
Article • 02/22/2023
U Caution
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Discovery mailboxes -
create" entry in Feature permissions in Exchange Online topic.
You can't use the EAC to create a discovery mailbox or assign permissions to
access it. You have to use Exchange Online PowerShell.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
PowerShell
) Important
To display a list of all discovery mailboxes in an Exchange organization, run the following
command:
PowerShell
PowerShell
Add-MailboxPermission <Name of the discovery mailbox> -User <Name of user or
group> -AccessRights FullAccess -InheritanceType all
For example, the following command assigns the Full Access permission to the Litigation
Managers group, so members of the group can open the Fabrikam Litigation discovery
mailbox.
PowerShell
More information
By default, members of the Discovery Management role group only have Full
Access permission to the default Discovery Search Mailbox. You will have to
explicitly assign the Full Access permission to the Discovery Management role
group if you want members to open a discovery mailbox that you've created.
Although visible in Exchange address lists, users can't send email to a discovery
mailbox. Email delivery to discovery mailboxes is prohibited with delivery
restrictions. This preserves the integrity of search results copied to a discovery
mailbox.
You can remove a discovery mailbox as you would any other type of mailbox.
Create a custom management scope for
In-Place eDiscovery searches in
Exchange Online
Article • 02/22/2023
You can use a custom management scope to let specific people or groups use In-Place
eDiscovery to search a subset of mailboxes in your Exchange Online organization. For
example, you might want to let a discovery manager search only the mailboxes of users
in a specific location or department. You can do this by creating a custom management
scope. This custom management scope uses a recipient filter to control which mailboxes
can be searched. Recipient filter scopes use filters to target specific recipients based on
recipient type or other recipient properties.
For In-Place eDiscovery, the only property on a user mailbox that you can use to create
a recipient filter for a custom scope is distribution group membership (the actual
property name is MemberOfGroup). If you use other properties, such as
CustomAttributeN, Department, or PostalCode, the search fails when it's run by a
member of the role group that's assigned the custom scope.
As previously stated, you can only use group membership as the recipient filter to
create a custom recipient filter scope that is intended to be used for eDiscovery.
Any other recipient properties can't be used to create a custom scope for
eDiscovery searches. Note that membership in a dynamic distribution group can't
be used either.
Perform steps 1 through 3 to let a discovery manager export the search results for
an eDiscovery search that uses a custom management scope.
If your discovery manager doesn't need to preview the search results, you can skip
step 4.
If your discovery manager doesn't need to copy the search results, you can skip
step 5.
You might be able to use existing distribution groups for eDiscovery purposes, or you
can create new ones. See More information at the end of this topic for tips on how to
create distribution groups that can be used to scope eDiscovery searches.
This procedure uses Exchange Online PowerShell commands to create a custom scope
named Ottawa Users eDiscovery Scope. It specifies the distribution group named
Ottawa Users for the recipient filter of the custom scope.
1. Run this command to get and save the properties of the Ottawa Users group to a
variable, which is used in the next command.
PowerShell
PowerShell
New-ManagementScope "Ottawa Users eDiscovery Scope" -
RecipientRestrictionFilter "MemberOfGroup -eq
'$($DG.DistinguishedName)'"
The distinguished name of the distribution group, which is contained in the variable
$DG, is used to create the recipient filter for the new management scope.
In the following examples, the Ottawa Users eDiscovery Managers security group will be
added as members this role group. You can use either Exchange Online PowerShell or
the EAC for this step.
PowerShell
Name: Provide a descriptive name for the new role group. For this example,
you'd use Ottawa Discovery Management.
Write scope: Select the custom management scope that you created in step
2. This scope will be applied to the new role group.
Roles: Click Add , and add the Legal Hold and Mailbox Search roles to the
new role group.
Members: Click Add , and select the users, security group, or role groups
that you want add as members of the new role group. For this example, the
members of the Ottawa Users eDiscovery Managers security group will be
able to search only the mailboxes of users who are members of the Ottawa
Users distribution group.
Here's an example of what the New role group window will look like when you're
done.
(Optional) Step 4: Add discovery managers as
members of the distribution group used to
create the custom management scope
You only need to perform this step if you want to let a discovery manager preview
eDiscovery search results.
Run this command to add the Ottawa Users eDiscovery Managers security group as a
member of the Ottawa Users distribution group.
PowerShell
7 Note
For Exchange on-premises, the discovery managers will have to be added directly
to the distribution group used to create the management scope. Nested groups
will not work.
You can also use the EAC to add members to a distribution group. For more information,
see Create and manage distribution groups.
Run this command to add a discovery mailbox named Ottawa Discovery Mailbox as a
member of the Ottawa Users distribution group.
PowerShell
7 Note
To open a discovery mailbox and view the search results, discovery managers must
be assigned Full Access permissions for the discovery mailbox. For more
information, see Create a discovery mailbox.
Create an eDiscovery search, and select the distribution group that was used to
create the custom management scope as the source of mailboxes to be searched.
All mailboxes should be successfully searched.
Create an eDiscovery search, and search the mailboxes of any users who aren't
members of the distribution group that was used to create the custom
management scope. The search should fail because the discovery manager can
only search mailboxes for users who are members of the distribution group that
was used to create the custom management scope. In this case, an error such as
"Unable to search mailbox <name of mailbox> because the current user does not
have permissions to access the mailbox" will be returned.
Create an eDiscovery search, and search the mailboxes of users who are members
of the distribution group that was used to create the custom management scope.
In the same search, include the mailboxes of users who aren't members. The search
should partially succeed. The mailboxes of members of the distribution group used
to create the custom management scope should be successfully searched. The
search of mailboxes for users who aren't members of the group should fail.
More information
Because distribution groups are used in this scenario to scope eDiscovery searches
and not for message delivery, consider the following when you create and
configure distribution groups for eDiscovery:
Enable group moderation so that any message sent to the group is first sent to
the group moderators who can approve or reject the message accordingly. If
you're creating the group in Exchange Online PowerShell, use the syntax
ModerationEnabled $true . If you're using the EAC, you can enable moderation
after the group is created.
Hide the distribution group from the organization's shared address book. Use
the EAC or the Set-DistributionGroup cmdlet after the group is created. If
you're using Exchange Online PowerShell, use the syntax
HiddenFromAddressListsEnabled $true .
In the following example, the first command creates a distribution group with
closed membership and moderation enabled. The second command hides the
group from the shared address book.
PowerShell
PowerShell
For more information about creating and managing distribution groups, see
Create and manage distribution groups.
Though you can use only distribution group membership as the recipient filter for
a custom management scope used for eDiscovery, you can use other recipient
properties to add users to that distribution group. Here are some examples of
using the Get-Mailbox and Get-Recipient cmdlets to return a specific group of
users based on common user or mailbox attributes.
PowerShell
PowerShell
PowerShell
PowerShell
You can then use the examples from the previous bullet to create a variable that
can be used with the Add-DistributionGroupMember cmdlet to add a group of
users to a distribution group. In the following example, the first command creates
a variable that contains all user mailboxes that have the value Vancouver for the
Department property in their user account. The second command adds these users
to the Vancouver Users distribution group.
PowerShell
PowerShell
PowerShell
You can also use the EAC to add members to a role group. For more information,
see the "Modify role groups" section in Manage role groups in Exchange Online.
For more information about inactive mailboxes, see Create and manage inactive
mailboxes.
Reduce the size of a discovery mailbox
in Exchange Online
Article • 02/22/2023
Have a discovery mailbox that's exceeded the 50 GB limit? You can fix this issue by
creating new discovery mailboxes and copying the search results from the large
discovery mailbox to the new ones.
2. Step 2: Copy search results to a discovery mailbox the search results from the
existing discovery mailbox to one or more of the new discovery mailboxes.
3. Step 3: Delete eDiscovery searches eDiscovery searches from the original discovery
mailbox to reduce its size.
The strategy presented here groups the search results from the original discovery
mailbox into separate eDiscovery searches that are based on date ranges. This is a quick
way to copy many search results to a new discovery mailbox. The following graphic
illustrates this approach.
What do you need to know before you begin?
Estimated time to complete this task: Time will vary based on the amount and size
of the search results that will be copied to different discovery mailboxes.
Run the following command to determine the size of the discovery mailboxes in
your organization.
PowerShell
Determine if you need to keep some or all of the search results from the discovery
mailbox that's exceeded the 50 GB limit. Follow the steps in this topic to retain
search results by copying them to a different discovery mailbox. If you don't need
to keep the results of a specific eDiscovery search, you can delete the search, as
explained in step 3. Deleting a search will delete the search results from the
discovery mailbox.
If you don't need any of the search results from a discovery mailbox that's
exceeded the 50 GB limit, you can delete it. If this is the default discovery mailbox
that was created when your Exchange organization was provisioned, you can re-
create it. For more information, see Delete and re-create the default discovery
mailbox in Exchange.
For current legal cases, you might want to export the results of selected eDiscovery
searches to .pst files. Doing this keeps the results from a specific search intact. In
addition to the .pst files that contain the search results, a search results log (.csv
file format) that contains an entry for each message returned in the search results
is also exported. Each entry in this file identifies the source mailbox where the
message is located. For more information, see Export eDiscovery search results to a
PST file.
After you export search results to .pst files, you'll need to use Outlook if you want
to import them to a new discovery mailbox.
PowerShell
2. Run the following command to assign a user or group permissions to open the
discovery mailbox and view search results.
PowerShell
PowerShell
Name: This parameter specifies the name of the new eDiscovery search.
Because the search is scoped by sent and received dates, it's useful that the
name of the search includes the date range.
StartDate and EndDate: These parameters specify the date range of the
search results in the default discovery mailbox to include in the search results.
7 Note
For dates, use the short date format, mm/dd/yyyy, even if the Regional
Options settings on the local computer are configured with a different
format, such as dd/mm/yyyy. For example, use 03/01/2014 to specify
March 1, 2014.
Using Exchange Online PowerShell: Run the following command to start the
search created in the previous step. Because the EstimateOnly switch was
included when the search was created, the search results won't be copied to
the target discovery mailbox.
PowerShell
3. If necessary, adjust the date range to increase or decrease the amount of search
results that are returned. If you change the date range, run the search again to get
a new estimate of the results. Consider changing the name of the search to reflect
the new date range.
4. When you're finished testing the search, use Exchange Online PowerShell or the
EAC to copy the search results to the target discovery mailbox.
PowerShell
PowerShell
5. Repeat steps 1 through 4 to create new searches for additional date ranges.
Include the date range in the name of the new search to indicate the range of the
results. To make sure none of the discovery mailboxes exceeds the 50 GB limit, use
different discovery mailboxes as the target mailbox.
Step 3: Delete eDiscovery searches
After you've copied search results from the original discovery mailbox to another
discovery mailbox, you can delete the original eDiscovery searches. Deleting an
eDiscovery search will delete the search results from the discovery mailbox where those
search results are stored.
Before deleting a search, you can run the following command to identify the size of the
search results that have been copied to a discovery mailbox for all searches in your
organization.
PowerShell
You can use Exchange Online PowerShell or the EAC to delete an eDiscovery search.
PowerShell
Using the EAC: Go to Compliance management > In-Place eDiscovery & hold.
Select the search that you want to delete, and then click Delete .
PowerShell
You can use Exchange Online PowerShell to delete the default discovery mailbox, re-
create it, and then assign permissions to it.
How you resolve this issue depends on whether you want to save the search results
from a default discovery mailbox that's exceeded 50 GB.
No Follow the steps in this topic to delete, and then re-create the
default discovery mailbox.
7 Note
You can't use the Exchange admin center (EAC) because discovery mailboxes aren't
displayed in the EAC.
PowerShell
Remove-Mailbox "DiscoverySearchMailbox{D919BA05-46A6-415f-80AD-
7E09334BB852}"
2. In the message asking you to confirm that you want to delete the mailbox and the
corresponding Active Directory user object, type Y, and then press Enter.
A new user object is created in Active Directory when you create the discovery
mailbox in the next step.
PowerShell
4. Run the following command to assign the Discovery Management role group
permissions to open the default discovery mailbox and view search results.
PowerShell
Add-MailboxPermission "DiscoverySearchMailbox{D919BA05-46A6-415f-80AD-
7E09334BB852}" -User "Discovery Management" -AccessRights FullAccess -
InheritanceType all
PowerShell
7 Note
Legacy Exchange Online data loss prevention in the Exchange admin center is in
the process of being deprecated. We recommend that you create DLP policies in
the Microsoft Purview compliance portal. For more information about this DLP, see
Learn about data loss prevention.
You can easily migrate your legacy Exchange Online DLP policies using the
migration wizard. For more information, see Migrate Exchange Online data loss
prevention policies to the Microsoft Purview compliance portal.
Detailed timelines for GCC-H and DoD special clouds will be communicated
separately.
Learn about DLP policies in Exchange Online, including what they contain and how to
test them. You'll also learn about a new feature in Exchange DLP.
Data loss prevention (DLP) is an important issue for enterprise message systems
because of the extensive use of email for business critical communication that includes
sensitive data. In order to enforce compliance requirements for such data, and manage
its use in email, without hindering the productivity of workers, DLP features make
managing sensitive data easier than ever before. For a conceptual overview of DLP,
watch the following video.
https://www.microsoft.com/en-us/videoplayer/embed/31f2b48e-93ed-4be3-b46d-
e7230c0fed8f?autoplay=false&postJsllMsg=true
DLP policies are simple packages that contain sets of conditions, which are made up of
mail flow rule (also known as transport rule) conditions, exceptions, and actions that you
create in the Exchange admin center (EAC) and then activate to filter email messages
and attachments. You can create a DLP policy, but choose to not activate it. This allows
you to test your policies without affecting mail flow. DLP policies can use the full power
of existing mail flow rules. In fact, a number of new types of mail flow rules have been
created in Exchange Online in order to accomplish new DLP capability. One important
new feature of mail flow rules is a new approach to classifying sensitive information that
can be incorporated into mail flow processing. This new DLP feature performs deep
content analysis through keyword matches, dictionary matches, regular expression
evaluation, and other content examination to detect content that violates organizational
DLP policies. For more information about mail flow rules, see Mail flow rules (transport
rules) in Exchange Online, and Integrating sensitive information rules with mail flow
rules in Exchange Online. You can also manage your DLP policies by using Exchange
Online PowerShell cmdlets at Exchange PowerShell.
In addition to the customizable DLP policies themselves, you can also inform email
senders that they may be about to violate one of your policies, even before they send an
offending message. You can accomplish this by configuring Policy Tips. Policy Tips are
similar to MailTips, and can be configured to present a brief note in the Microsoft
Outlook 2013 client that provides information about possible policy violations to a
person creating a message. In Exchange Online, Policy Tips are also displayed in Outlook
on the web (formerly known as Outlook Web App) and OWA for Devices. For more
information, see Policy Tips.
7 Note
Exchange Online DLP is a premium feature. For more information, see Exchange
Online Licensing , Exchange Online Service Description, and Exchange Online
Protection Service Description.
2. Import a pre-built policy file from outside your organization: You can import
policies that have already been created outside of your messaging environment by
independent software vendors. In this way you can extend the DLP solutions to suit
your business requirements.
3. Create a custom policy without any pre-existing conditions: Your enterprise may
have its own requirements for monitoring certain types of data known to exist
within a messaging system. You can create a custom policy entirely on your own in
order to start checking and acting upon your own unique message data. You will
need to know the requirements and constraints of the environment in which the
DLP policy will be enforced in order to create such a custom policy. More
information at Create a custom DLP policy.
After you have added a policy, you can review and change its rules, make the policy
inactive, or remove it completely.
To make it easy for you to make use of the sensitive information-related rules, Microsoft
has supplied policy templates that already include some of the sensitive information
types. You cannot add conditions for all of the sensitive information types listed here to
policy templates however, because the templates are designed to help you focus on the
most common types of compliance-related data within your organization. For more
information about the pre-built templates, see DLP policy templates supplied in
Exchange. You can create numerous DLP policies for your organization and have them
all enabled so that many disparate types of information are examined. You can also
create a DLP policy that is not based on an existing template. To begin creating such a
policy, see Create a custom DLP policy. For more information about sensitive
information types, see Sensitive information type entity definitions.
To learn more about these new features, see Integrating sensitive information rules with
mail flow rules in Exchange Online. The traditional message classification fields can still
be applied to messages in Exchange and these can be combined with the new sensitive
information detection either together within a single DLP policy or running concurrently
so they are evaluated independently within Exchange. To learn more about the legacy
Exchange 2010 message classifications, see Understanding Message Classifications.
Installation prerequisites
In order to make use of DLP features, you must have at least one mailbox with an
Exchange Online Plan 2 license configured. For more information, see Exchange Online
service description.
You can set up sensitive information rules within your Microsoft Exchange data loss
prevention (DLP) policies to detect specific data in email messages. This article will help
you understand how these rules are applied and how messages are evaluated. You can
avoid workflow disruptions for your email users and achieve a high degree of accuracy
with your DLP detections if you know how your rules are enforced. Let's use the
Microsoft-supplied credit card information rule as an example. When you activate a mail
flow rule (also known as a transport rule) or DLP policy, all messages that your users
send are compared with the rule sets that you create.
To meet this need, let's make it clear that the following information should be classified
as a credit card:
Margie's Travel,
I have received updated credit card information for Spencer.
Spencer Badillo
Visa: 4111 1111 1111 1111
Expires: 2/2012
Please update his travel profile.
Let's also make it clear that the following information shouldn't be classified as a credit
card.
Hi Alex,
I expect to be in Hawaii too. My booking code is 1234 1234 1234 1234 and I'll be
there on 3/2018.
Regards, Lisa
The following XML snippet shows how the needs expressed earlier are currently defined
in a sensitive information rule that is provided with Exchange and it's embedded within
one of the supplied DLP policy templates.
XML
In the credit card rule, there's a section of XML code for patterns, which includes a
primary identifier match and some additional corroborative evidence. All three of these
requirements are explained here:
2. It matches a regular expression (in this instance for 16 digits) that could also
include variations like a space delimiter so that it also matches 4111 1111 1111 1111 or
a hyphen delimiter so that it also matches 4111-1111-1111-1111.
3. It evaluates the Lhun's checksum algorithm against the 16-digit number in order to
ensure the likelihood of this being a credit card number is high.
5. <Any minMatches="1"> : This section indicates that the presence of at least one of
the following items of evidence is required.
<Match idRef="Keyword_cc_name">
<Match idRef="Func_expiration_date">
These three simply mean a list of keywords for credit cards, the names of the credit
cards, or an expiration date is required. The expiration date is defined and
evaluated internally as another function.
Step Action
4. Additional Evidence
5. Verdict
The way this rule is set up by Microsoft makes it mandatory that corroborating evidence
such as keywords are a part of the email message content in order to match the rule. So
the following email content wouldn't be detected as containing a credit card:
Margie's Travel,
I have received updated information for Spencer.
Spencer Badillo
4111 1111 1111 1111
Please update his travel profile.
You can use a custom rule that defines a pattern without extra evidence, as shown in the
next example. This would detect messages with only credit card number and no
corroborating evidence.
XML
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_credit_card" />
</Pattern>
</Entity>
The illustration of credit cards in this article can be extended to other sensitive
information rules as well. To see the complete list of the Microsoft-supplied rules in
Exchange, use the Get-ClassificationRuleCollection cmdlet in Exchange Online
PowerShell in the following manner:
PowerShell
$rule_collection = Get-ClassificationRuleCollection
$rule_collection[0].SerializedClassificationRuleCollection |
[System.IO.File]::WriteAllBytes('oob_classifications.xml', $file.FileData)
In Exchange Online, you can create DLP policies that contain rules for not only
traditional message classifications and existing mail flow rules (also known as transport
rules) but also combine these with rules for sensitive information found within
messages. The existing mail flow rules framework offers rich capabilities to define
messaging policies, covering the entire spectrum of soft to hard controls. Examples
include:
Mail flow rules allow you to apply messaging policies to email messages that flow
through the mail flow pipeline in the Transport service on Mailbox servers and on Edge
Transport servers. These rules allow system administrators to enforce messaging
policies, help keep messages more secure, help to protect messaging systems, and help
prevent accidental information loss. For more information about mail flow rules, see
Mail flow rules (transport rules) in Exchange Online.
The sensitive information condition may be combined with any of the already existing
mail flow rules to define messaging policies. If combined, the condition works in
conjunction with other rules and provides the AND semantics. For example, two
different conditions are added together with an AND statement such that both need to
match for the action to be applied. Any of the mail flow rule actions can be configured
as result of rules containing the sensitive information type matching. Many different file
types can be scanned by the mail flow rules agent, which scans messages to enforce
mail flow rules. To learn more about the supported file types, see Use mail flow rules to
inspect message attachments in Exchange Online.
The rules can also be used in the exception part of a rule definition. Their use in the
exception definition is independent of their use as a condition within the rule. This
provides the flexibility to define rules that have the condition specifying multiple
information types to be applied as part of the condition and also differing information
types in the condition. This would allow policies such as matching specific traditional
message-classification rules, but not matching other sensitive information types before
performing actions that you define within a policy.
In Microsoft Exchange Server and Exchange Online, you can use data loss prevention
(DLP) policy templates as a starting point for building DLP policies that help you meet
your specific regulatory and business policy needs. You can modify the templates to
meet the specific needs of your organization.
U Caution
You should enable your DLP policies in test mode before running them in your
production environment. During such tests, it is recommended that you configure
sample user mailboxes and send test messages that invoke your test policies in
order to confirm the results. > Use of these policies does not ensure compliance
with any regulation. After your testing is complete, make the necessary
configuration changes in Exchange so the transmission of information complies
with your organization's policies. For example, you might need to configure TLS
with known business partners or add more restrictive mail flow rule (also known as
transport rule) actions, such as adding rights protection to messages that contain a
certain type of data.
Template Description
Canada Health Helps detect the presence of information subject to Canada Health
Information Act Information Act (HIA) for Alberta, including data like passport numbers and
(HIA) health information.
Canada Personal Helps detect the presence of information subject to Canada Personal
Health Act (PHIPA) - Health Information Protection Act (PHIPA) for Ontario, including data like
Ontario passport numbers and health information.
Canada Personal Helps detect the presence of information subject to Canada Personal
Health Information Health Information Act (PHIA) for Manitoba, including data like health
Act (PHIA) - information.
Manitoba
Canada Personal Helps detect the presence of information subject to Canada Personal
Information Information Protection Act (PIPA) for British Columbia, including data like
Protection Act passport numbers and health information.
(PIPA)
Canada Personal Helps detect the presence of information subject to Canada Personal
Information Information Protection and Electronic Documents Act (PIPEDA), including
Protection Act data like passport numbers and health information.
(PIPEDA)
Israel Financial Data Helps detect the presence of information commonly considered to be
financial data in Israel, including bank account numbers and SWIFT codes.
Japan Protection of Helps detect the presence of information subject to Japan Protection of
Personal Personal Information, including data like resident registration numbers.
Information
PCI Data Security Helps detect the presence of information subject to PCI Data Security
Standard (PCI DSS) Standard (PCI DSS), including information like credit card or debit card
numbers.
Saudi Arabia - Anti- Helps detect the presence of information commonly considered to be
Cyber Crime Law subject to the Anti-Cyber Crime Law in Saudi Arabia, including international
bank account numbers and SWIFT codes.
U.K. Access to Helps detect the presence of information subject to United Kingdom
Medical Reports Act Access to Medical Reports Act, including data like National Health Service
numbers.
U.K. Data Protection Helps detect the presence of information subject to United Kingdom Data
Act Protection Act, including data like national insurance numbers.
U.K. Financial Data Helps detect the presence of information commonly considered to be
financial information in United Kingdom, including information like credit
card, account information, and debit card numbers.
U.K. Personal Helps detect the presence of information subject to United Kingdom
Information Online Personal Information Online Code of Practice, including data like health
Code of Practice information.
(PIOCP)
U.K. Privacy and Helps detect the presence of information subject to United Kingdom
Electronic Privacy and Electronic Communications Regulations, including data like
Communications financial information.
Regulations
U.S. Federal Trade Helps detect the presence of information subject to U.S. Federal Trade
Commission (FTC) Commission (FTC) Consumer Rules, including data like credit card numbers.
Consumer Rules
U.S. Financial Data Helps detect the presence of information commonly considered to be
financial information in United States, including information like credit card,
account information, and debit card numbers.
U.S. Health Helps detect the presence of information subject to United States Health
Insurance Act Insurance Portability and Accountability Act (HIPAA),including data like
(HIPAA) social security numbers and health information.
Template Description
U.S. Patriot Act Helps detect the presence of information commonly subject to U.S. Patriot
Act, including information like credit card numbers or tax identification
numbers.
U.S. State Breach Helps detect the presence of information subject to U.S. State Breach
Notification Laws Notification Laws, including data like social security and credit card
numbers.
U.S. State Social Helps detect the presence of information subject to U.S. State Social
Security Number Security Number Confidentiality Laws, including data like social security
Confidentiality Laws numbers.
In Microsoft Exchange, you can use data loss prevention (DLP) policy templates to help
meet the messaging policy and compliance needs of your organization. These templates
contain pre-built sets of rules that can help you manage message data that is associated
with several common legal and regulatory requirements. To see a list of all the templates
supplied by Microsoft, see DLP policy templates supplied in Exchange. Example DLP
templates that are supplied can help you manage:
You can customize any of these DLP templates or use them as-is. DLP policy templates
are built on top of mail flow rules (also known as transport rules) that include new
conditions or predicates and actions. DLP policies support the full range of traditional
mail flow rules, and you can add the additional rules after a DLP policy has been
established. For more information about policy templates, see What the DLP policy
templates include. To learn more about mail flow rule capabilities, see Mail flow rules
(transport rules) in Exchange Online. Once you have started enforcing a policy, you can
learn about how to observe the results by reviewing the Exchange Online: View the
reports for data loss prevention.
U Caution
You should enable your DLP policies in test mode before running them in your
production environment. During such tests, it is recommended that you configure
sample user mailboxes and send test messages that invoke your test policies in
order to confirm the results.
Configure both administrator and user accounts within your organization and
validate basic mail flow.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Data loss prevention
(DLP)" entry in the Feature permissions in Exchange Online topic.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
7 Note
You can also select this action if you click the arrow next to the Add icon
and select New DLP policy from template from the drop down menu.
2. On the Create a new DLP policy from a template page, complete the following
fields:
3. Name: Add a name that will distinguish this policy from others.
6. More options: Select the mode or state. The new policy is not fully enabled until
you specify that it should be. The default mode for a policy is test without
notifications.
7 Note
In addition to the rules within a specific template, your organization may have
additional expectations or company policies that apply to regulated data within
your messaging environment. Exchange Server makes it easy for you to change the
basic template in order to add actions so that your Exchange messaging
environment complies with your own requirements.
You can modify policies by editing the rules within them once the policy has been saved
in your Exchange Server environment. An example rule change might include making
specific people exempt from a policy or sending a notice and blocking message delivery
if a message is found to have sensitive content.
You have to navigate to the specific policy's rule set on the Edit DLP policy page and
use the tools available on that page in order to change a DLP policy you have already
created in Exchange Server.
Some policies allow the addition of rules that invoke RMS for messages. You must have
RMS configured on the Exchange server before adding the actions to make use of these
types of rules.
For any of the DLP policies, you can change the rules, actions, exceptions, enforcement
time period or whether other rules within the policy are enforced and you can add your
own custom conditions for each.
A custom data loss prevention (DLP) policy allows you to establish conditions, rules, and
actions that can help meet the specific needs of your organization, and which may not
be covered in one of the pre-existing DLP templates.
The rule conditions that are available to you in a single policy include all the traditional
mail flow rules (also known as transport rules) in addition to the sensitive information
types presented in Sensitive information types in Exchange Server. For more information
about mail flow rules, see Mail flow rules (transport rules) in Exchange Online.
U Caution
You should enable your DLP policies in test mode before running them in your
production environment. During such tests, it is recommended that you configure
sample user mailboxes and send test messages that invoke your test policies in
order to confirm the results. for more information about testing, see Test mail flow
rules in Exchange Online.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Data loss prevention
(DLP)" entry in the Feature permissions in Exchange Online topic.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
7 Note
For additional information on the .NET regex engine which is used for processing the
text, see /dotnet/standard/base-types/regular-expressions.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
2. Click the arrow that is beside the Add icon, and select New custom policy.
) Important
If you click Add icon instead of the arrow, you will create a new policy
based on a template. For more information about using templates, see Create
a DLP policy from a template.
a. Name: Add a name that will distinguish this policy from others.
4. Click Save to finish creating the new policy reference information. The policy is
added to the list of all policies that you have configured, although there are not
yet any rules or actions associated with this new custom policy.
5. Double-click the policy that you just created or select it and click Edit .
Click Add to add a new blank rule. You can establish conditions using all the
traditional mail flow rules in addition to the sensitive information types.
In order to avoid confusion, supply a unique name for each part of your policy or
rule. You can provide this unique name when you have the option to provide your
own character string. There are more options available to you:
a. Click the arrow that is beside the Add icon to add a rule about sender
notification or allowing overrides.
c. Click More options to add more conditions and actions for this rule including
time-bound limits of enforcement or effects on other rules in this policy.
7. Click Save to finish modifying the policy and save your changes.
DLP policy templates are one type of feature Exchange Online that can help you design
and apply a robust policy and compliance system for your messaging environment. For
more information about compliance features, see Security and compliance for Exchange
Online.
You can help to prevent your organization's Outlook, Outlook on the web (formerly
known as Outlook Web App), and OWA for Devices email users from inappropriately
sending sensitive information by creating data loss prevention (DLP) policies that
include Policy Tip notification messages. Similar to MailTips that were introduced in
Exchange Server 2010, Policy Tip notification messages are displayed to users in Outlook
while they are composing an email message. Policy Tip notification messages only show
up if something about the sender's email message seems to violate a DLP policy that
you have in place and that policy includes a rule to notify the sender when the
conditions that you establish are met. Watch this video to learn more.
https://www.microsoft.com/en-us/videoplayer/embed/dd629bb7-063d-49f3-b7e1-
8f2e0aa4de13?autoplay=false&postJsllMsg=true
In order to show Policy Tips to your email senders, your rules must include the Notify
the sender with a Policy Tip action. You can add this in the rules editor from the
Exchange admin center. For more information, see Manage policy tips.
DLP policies do not differentiate between email message attachments, body text, or
subject lines while evaluating messages and the conditions within your policies. For
example, if a user creates an email message that includes a credit card number in the
body of the message and then attempts to address the message to a recipient outside
your organization, then a Policy Tip notification message can be shown to that user in
Outlook or Outlook on the web reminding them of your enterprise's expectations for
such information. However, this type of notification will only show up if you have
configured a DLP policy that restricts the example actions described; in this case adding
an external email alias to the header of a message with credit card data. There is a great
variety of conditions, actions, and exceptions you can choose from while creating DLP
policies. This variety allows you to tailor your data loss prevention efforts in a way that
meets your specific organization's needs.
Any time you use either the notify sender action or an override action within a rule, we
recommend that you also include the condition that the message was sent from within
your organization. You can do this by using the policy rules editor to add the following
condition: The sender is located... > inside the organization. This is a best practice
recommendation because the notify sender action is applied as part of your company's
message creation experience. The senders referred to by the action are the authors of
messages within your company. The user interaction presented by Policy Tips cannot be
acted upon by your users for incoming messages and will be ignored when the sender is
located outside your organization. You can apply DLP policies to scan incoming
messages and take a variety of actions, but when you do this, don't add the notify
sender action.
If email senders in your organization who are in the act of composing a message are
made aware of your organizational expectations and standards in real time through
Policy Tip notifications, then they are less likely to violate standards that your
organization wants to enforce.
7 Note
DLP is a premium feature that requires an Exchange Online Plan 2 subscription. For
more information, see Compare Exchange Online Licensing plans .
Notify only Similar to MailTips, this causes an informative Policy Tip This message may
notification message about a policy violation. A sender contain sensitive
can prevent this type of tip from showing up by using a content. All recipients
Policy Tip options dialog box that can be accessed in must be authorized to
Outlook. receive this content.
Reject The message will not be delivered until the condition is This message may
message no longer present. The sender is provided with an contain sensitive
option to indicate that their email message does not content. Your
contain sensitive content. This is also known as a false- organization won't
positive override. If the sender indicates this, then allow this message to
Outlook will allow the message to leave the outbox so be sent until that
that the user's report may be audited, but Exchange will content is removed.
block the message from being sent.
Notification Meaning Default Policy Tip
rule notification message
that Outlook users
will see
Reject The result with this notification rule is similar to the Before the sender
unless false Reject message notification rule. However, if you select selects an option to
positive this then Exchange will allow the message to be sent to override: This message
override the intended recipient, instead of blocking the message. may contain sensitive
content. Your
organization won't
allow this message to
be sent until that
content is removed.
After the sender
selects an option
override: Your
feedback will be
submitted to your
administrator when the
message is sent.
Reject The message will not be delivered until the condition is Before the sender
unless silent no longer present or the sender indicates an override. selects an option to
override The sender is provided with an option to indicate that override: This message
they wish to override the policy. may contain sensitive
content. Your
organization won't
allow this message to
be sent until that
content is removed.
After the sender
selects an option
override: You have
overridden your
organization's policy
for sensitive content in
this message. Your
action will be audited
by your organization.
Notification Meaning Default Policy Tip
rule notification message
that Outlook users
will see
Reject The result with this notification rule is similar to the Before the sender
unless Reject unless silent override notification rule, except selects an option to
explicit that in this case when the sender attempts to override override: This message
override the policy, they are required to provide a justification for may contain sensitive
overriding the policy. content. Your
organization won't
allow this message to
be sent until that
content is removed.
After the sender
selects an option
override: You have
overridden your
organization's policy
for sensitive content in
this message. Your
action will be audited
by your organization.
For procedures that explain how to create your own Policy Tips, see Manage policy tips.
The custom text that you create can replace the default text shown in the previous table.
Notify the sender Your text only appears when a Notify the sender, but allow them to send
action is initiated.
Allow the sender Your text only appears when the following actions are initiated: Block the
to override message unless it's a false positive, Block the message, but allow the
sender to override and send.
Policy Tip Meaning
Notification
Actions and
Settings
Block the Your text only appears when a Block the message action is initiated.
message
Link to The compliance URL is a link to a web page where you can explain your
compliance URL compliance and override policies. This link is displayed in the Policy Tip when
a user clicks the More details link.
Policy Tips are informative notices that are displayed to email senders while they're
composing a message. The purpose of the Policy Tip is to educate users that they might
be violating the business practices or policies that you are enforcing with the data loss
prevention (DLP) policies that you have established. The following procedures will help
you begin using Policy Tips. Watch this video to learn more.
https://www.microsoft.com/en-us/videoplayer/embed/dd629bb7-063d-49f3-b7e1-
8f2e0aa4de13?autoplay=false&postJsllMsg=true
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Data loss prevention
(DLP)" entry in the Feature permissions in Exchange Online topic.
Policy Tips will only show up for email senders when the following conditions are
met:
1. Sender's message client program is Microsoft Outlook 2013 or later. (For a list of
the Outlook client versions/licenses that support DLP Policy Tips, see Outlook
license requirements for Exchange features .) If your organization has deployed
Exchange 2013 SP1 or later, or is using Exchange Online, Policy Tips also show up
in Outlook on the web (formerly known as Outlook Web App) and OWA for
Devices.
2. A mail flow rule (also known as a transport rule) exists that invokes Policy Tip
notifications. You can create such a mail flow rule by configuring a DLP policy that
includes the action Notify the sender with a Policy Tip.
The default Policy Tip notification text that is built into the system will be
shown if you don't use the Policy Tip settings feature to customize your Policy
Tip text. To learn more about the default text, see Policy Tips.
For information about keyboard shortcuts that may apply to the procedures
in this topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
2. Double-click one of the policies that appear in your list of policies or highlight one
item and select Edit .
4. To add Policy Tips to an existing rule, highlight the rule and select Edit .
To add a new blank rule that you can fully customize, select Add and then select
Create a new rule.
5. In Apply this rule if, select, The message contains sensitive information. This
condition is required.
6. Select Add , select the sensitive information types, select Add, select OK, and
then select OK.
7. In the Do the following box, select Notify the sender with a Policy Tip, and select
an option in the Choose whether the message is blocked or can be sent drop-
down list, and then select OK.
8. If you want to add additional conditions or actions, at the bottom of the window,
select More options.
Note:
9. In the Choose a mode for this rule list, select whether you want the rule to be
enforced. We recommend testing the rule first.
10. Select Save to finish modifying the rule and save your changes.
4. Select the specific rule that you expect to contain a notification message.
5. Confirm that your Notify the sender action appears in the lower portion of the rule
summary.
2. Double-click one of the policies that appear in your list of policies or highlight one
item and select Edit .
4. To add Policy Tips to an existing rule, highlight the rule and select Edit .
5. To add a new blank rule that you can fully customize, select Add .
6. To add an action that will reveal a Policy Tip, select More options... and then select
the Add action button.
7. From the drop down list, select Notify the sender with a Policy Tip and then select
Block the message.
8. Select OK, then select Save to finish modifying the rule and save your changes.
2. Select one time to highlight the policy that you expect to contain a notification
message.
4. Select one time to highlight the specific rule that you expect to contain a
notification message.
5. Confirm that your Notify the sender that the message can't be sent action
appears in the lower portion of the rule summary.
Create or modify a block-unless-override Policy
Tip
There are four options for Policy Tips that can reject messages or prevent messages
from leaving the sender's outbox. To learn more about these options, see Policy Tips.
2. Double-select one of the policies that appear in your list of policies or highlight
one item and select Edit .
4. To add Policy Tips to an existing rule, highlight the rule and select Edit .
To add a new blank rule that you can fully customize, select Add and then select
More options....
5. To add the action that will reveal a Policy Tip, Select the Add action button.
6. From the drop down list, select Notify the sender with a Policy Tip and then select
Block the message, but allow the sender to override and send.
7. Select OK, then select Save to finish modifying the rule and save your changes.
2. Select one time to highlight the policy that you expect to contain a notification
message.
4. Select one time to highlight the specific rule that you expect to contain a
notification message.
5. Confirm that your Block the message, but allow the sender to override and send
action appears in the lower portion of the rule summary.
3. To add a new Policy Tip with your own customized message, select Add . For
more information about the action choices available, see Policy Tips.
To modify an existing Policy Tip, highlight the tip and select Edit .
To delete an existing Policy Tip, highlight it and select Delete and then confirm
your action.
4. Select Save to finish modifying the Policy Tip and save your changes.
5. Select Close to finish managing your Policy Tips and save your changes.
3. Select Refresh .
4. Confirm that your action, locale and text for that locale appear in the list.
Policy Tips
7 Note
Legacy Exchange Online data loss prevention in the Exchange admin center is in the
process of being deprecated.
7 Note
Mailbox audit logging is not available in standalone EOP. Management log export
from the EAC is not available in standalone EOP, but is available in PowerShell by
using the New-AdminAuditLogSearch cmdlet. For instructions, see Use PowerShell
to search for audit log entries and send results to a recipient.
Export management audit log: Any action performed by an admin that's based on
an Exchange Online PowerShell or standalone Exchange Online Protection
PowerShell cmdlet that doesn't begin with the verbs Get, Search, or Test is logged
in the management log. Audit log entries include the cmdlet that was run, the
parameter and values used with the cmdlet, and when the operation was
successful. You can export records of configuration changes in your organization
from management logs. The log entries are saved in an XML file and the file is sent
as an attachment to specified users within 24 hours via email. For more
information, see:
View and export the external management log (Exchange Online only)
7 Note
By default, management log entries are kept for 90 days. When an entry is
older than 90 days, it's deleted. This setting can't be changed in a cloud-
based organization. However, it can be changed in an on-premises
Exchange organization by using the Set-AdminAuditLog cmdlet.
PowerShell
Export mailbox audit logs: When mailbox audit logging is enabled for a mailbox,
Exchange Online stores a record of actions performed on mailbox data by
nonowners in the mailbox audit log, which is stored in a hidden folder in the
mailbox being audited. Entries in this log indicate who accessed the mailbox and
when the action's been performed, and whether the action was successful. You can
export nonowner access entries from mailbox logs. Log entries are saved in an
XML file and are attached to an email message, and sent to specified users within
24 hours. For more information, see Export mailbox audit logs.
PowerShell
PowerShell
Run a non-owner mailbox access report: Use this report to search the
administrative logs for mailboxes that have been opened by someone other than
the mailbox owner. For more information, see Run a nonowner mailbox access
report.
) Important
You must enable auditing for each mailbox for which you want to report non-
owner opening. When you run the report, you won't be able to see results for
mailboxes that don't have logging enabled.
PowerShell
Run an administrator role group report: Use this report to find changes made to
role groups in the administration log (role groups are used to assign administrative
permissions to users). For more information, see Search the role group changes.
PowerShell
Run a local eDiscovery and retention report: Use this report to search the
management log for local discovery searches and changes to in-place hold. For
more information, see:
In-Place Hold and Litigation Hold
In-Place eDiscovery
Use the following cmdlet to run a local eDiscovery and retention report:
PowerShell
Run a mailbox broken procedural hold report:: Use this report to determine
whether procedural hold is enabled or not for a user's mailbox from the
management log. For more information, see Run a mailbox broken procedural
hold report.
Use the following cmdlet to run a mailbox broken procedural hold report:
PowerShell
Run the management log report: Use this report to view entries in the
management log that shows what changes your organization's admins have made
to the configuration. For more information, see View the management log.
PowerShell
Run the external management log report: Use this report to view entries in the
administration log that shows changes that Microsoft or a delegated administrator
have made to the configuration of Exchange Online services. For more information,
see View and export the external management log.
Use the following cmdlet to run the external management log report:
PowerShell
*
This report is available in standalone EOP organizations.
7 Note
Mailbox audit logging is not available in standalone EOP.
As of January 2019, mailbox audit logging on by default is enabled for all Exchange
Online organizations. For more information, see Manage mailbox auditing.
The Auditing Logs role allows users to view the Auditing page to run any of the
available reports, export the mailbox audit log, and export and view the
management log. By default, this role is assigned to the Organization
Management, Compliance Management, and Records Management role groups.
The View-Only Audit Logs role allows user to run auditing reports, but not to
export audit logs. By default, this role is assigned to the Organization
Management and Compliance Management role groups.
The easiest way to give users access to the reports is to add them to the Records
Management role group, which has the Auditing Logs role assigned.
2. In the list of role groups, click Records Management. This will open Records
Management details pane.
4. In the Select Members dialog box, select the user. You can search for a user by
typing all or part of a display name, and then clicking Search . You can also sort
the list by clicking the Name or Display Name column headings.
5. Click Add and then click OK to return to the role group page.
PowerShell
7 Note
When mailbox auditing is enabled for a mailbox, Exchange Online logs information in
the mailbox audit log whenever a user other than the owner accesses the mailbox. Each
log entry includes information about who accessed the mailbox and when, the actions
performed by the non-owner, and whether the action was successful. Entries in the
mailbox audit log are retained for 90 days by default. You can use the mailbox audit log
to determine if a user other than the owner has accessed a mailbox.
When you export entries from mailbox audit logs, Exchange Online saves the entries in
an XML file and attaches it to an email message sent to the specified recipients.
As of January 2019, mailbox audit logging on by default is enabled for all Exchange
Online organizations. For more information, see Manage mailbox auditing.
If you're going to use Outlook on the web (formerly known as Outlook Web App)
to view the exported entries, you need to enable .xml attachments in Outlook on
the web. For details, see Configure Outlook on the web to allow XML attachments.
To find and open the Exchange admin center (EAC), see, Exchange admin center in
Exchange Online.
You need to be assigned permissions before you can perform this procedure. To
see what permissions you need, see the "View reports" entry in the Feature
permissions in Exchange Online topic.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
3. Configure the following search criteria for exporting the entries from the mailbox
audit log:
Start and end dates: Select the date range for the entries to include in the
exported file.
Mailboxes to search audit log for: Select the mailboxes to retrieve audit log
entries for.
Type of non-owner access: Select one of the following options to define the
type of non-owner access to retrieve entries for:
All non-owners: Search for access by admins and delegated users inside
your organization, and by Microsoft datacenter administrators in Exchange
Online.
External users: Search for access by Microsoft datacenter administrators.
Administrators and delegated users: Search for access by admins and
delegated users inside your organization.
Administrators: Search for access by admins in your organization.
Recipients: Select the users to send the mailbox audit log to.
4. Click Export.
Exchange Online retrieves entries in the mailbox audit log that meet your search criteria,
saves them to a file named SearchResult.xml, and then attaches the XML file to an email
message sent to the recipients that you specified.
1. Sign in to the mailbox where the mailbox audit log was sent.
2. In the Inbox, open the message with the XML file attachment sent by Exchange
Online. Notice that the body of the email message contains the search criteria.
3. Click the attachment and select to download the XML file.
4. Open the SearchResult.xml in Microsoft Excel.
More information
XML
<Event MailboxGuid="6d4fbdae-e3ae-4530-8d0b-f62a14687939"
Owner="PPLNSL-dom\david50001-1363917750"
LastAccessed="2021-04-30T11:01:55.140625-07:00"
Operation="HardDelete"
OperationResult="Succeeded"
LogonType="Admin"
FolderId="0000000073098C3277988F4CB882F5B82EBF64610100A7C317F68C24304BBD18A
BE1F185E79B00000026BD4F0000"
FolderPathName="\Recoverable Items\Deletions"
ClientInfoString="Client=OWA;Action=ViaProxy"
ClientIPAddress="10.196.241.168"
InternalLogonType="Owner"
MailboxOwnerUPN="david@contoso.com"
MailboxOwnerSid="S-1-5-21-290112810-296651436-1966561949-1151"
CrossMailboxOperation="false"
LogonUserDN="Administraor"
LogonUserSid="S-1-5-21-290112810-296651436-1966561949-1149">
<SourceItems>
<ItemId="0000000073098C3277988F4CB882F5B82EBF64610700A7C317F68C24304BBD18ABE
1F185E79B00000026BD4F0000A7C317F68C24304BBD18ABE1F185E79B00000026BD540"
Subject="Notification of litigation hold"
FolderPathName="\Recoverable Items\Deletions" />
</SourceItems>
</Event>
Field Description
LastAccessed The date and time when the mailbox was accessed.
Operation The action that was performed by the non-owner. For more information, see
the "What gets logged in the mailbox audit log?" section in Run a non-
owner mailbox access report in Exchange Online.
LogonType The type of non-owner access. These include admin, delegate, and external.
FolderPathName The name of the folder that contained the message that was affected by the
non-owner.
ClientInfoString Information about the mail client used by the non-owner to access the
mailbox.
ClientIPAddress The IP address of the computer used by the non-owner to access the
mailbox.
InternalLogonType The logon type of the account used by the non-owner to access this
mailbox.
Subject The subject line of the email message that was affected by the non-owner.
Run a per-mailbox litigation hold report
in Exchange Online
Article • 02/22/2023
7 Note
If your Exchange Online organization is involved in a legal action, you may have to take
steps to preserve relevant data, such as email messages, that may be used as evidence.
In situations like this, you can use litigation hold to retain all email sent and received by
specific people or retain all email sent and received in your organization for a specific
time period. For more information about what happens when a mailbox is on litigation
hold and how to enable and disable it, see the "Mailbox Features" section in Manage
user mailboxes.
Use the litigation hold report to keep track of the following types of changes made to a
mailbox in a given time period:
For each of these change types, the report includes the user who made the change and
the time and date the change was made.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange Online forum.
Microsoft Exchange runs the report for litigation hold changes made to any
mailbox in the past two weeks.
3. To view the changes for a specific mailbox, in the search results pane, select the
mailbox. View the search results in the details pane.
Tip
Want to narrow the search results? Select the start date, end date, or both, and
select specific mailboxes to search. Click Search to re-run the report.
7 Note
When a mailbox is put on litigation hold, it can take up to 240 minutes for the hold
to take effect.
Search for role group changes or admin
audit logs in Exchange Online
Article • 02/22/2023
7 Note
Run an administrator role group report in the Exchange admin center (EAC).
Use PowerShell to search for admin audit log entries and send the results to a
recipient.
These options can be helpful when you're trying to track the cause of unexpected
behavior, to identify a malicious administrator, or to verify that compliance requirements
are being met. Both of these options are described in this article.
Tip
You can also use the EAC to view entries in the admin audit log. For more
information, see View the admin audit log.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "View-only administrator
audit logging" entry in the Feature permissions in Exchange Online topic.
To open the Exchange admin center (EAC), see Exchange admin center in Exchange
Online.
To connect to Exchange Online PowerShell, see Connect to Exchange Online
PowerShell. To connect to standalone Exchange Online Protection PowerShell see
Connect to Exchange Online Protection PowerShell.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
1. In the EAC, go to Compliance management > Auditing, and then choose Run an
administrator role group report.
2. In the Search for changes to administrator role groups page that opens,
configure the following settings:
Start date and End date: Enter a date range. By default, the report searches
for changes made to administrator role groups in the past two weeks.
Select role groups: By default, all role groups are searched. To filter the
results by specific role groups, click Select role groups. In the dialog that
appears, select a role group and click add ->. Repeat this step as many times
as necessary, and then click OK when you're finished.
If any changes are found using the specified criteria, they will appear in the results pane.
Click a role group in the search results to see the changes in the details pane.
To determine if a user was added or removed, you have to compare two separate entries
in the report. For example, let's look at the following log entries for the HelpDesk role
group:
1/27/2021 4:43 PM
Administrator
Updated members: Administrator;annb,florencef;pilarp
2/06/2018 10:09 AM
Administrator
Updated members: Administrator;annb;florencef;pilarp;tonip
2/19/2021 2:12 PM
Administrator
Updated members: Administrator;annb;florencef;tonip
In this example, the Administrator user account made the following changes:
7 Note
In standalone EOP, you can't export the admin audit log from the EAC. But, you can
Use PowerShell to search for audit log entries and send results to a recipient
If you're going to use Outlook on the web (formerly known as Outlook Web App)
to view the exported entries, you need to enable .xml attachments in Outlook on
the web. For details, see Configure Outlook on the web to allow XML
attachments.
Exporting the admin audit log writes the information to an XML file and sends it to you
as an attachment in an email message. The maximum size of the XML file is 10
megabytes (MB).
1. In the EAC, select Compliance management > Auditing, and then click Export the
admin audit log.
2. Select a date range using the Start date and End date fields.
3. In the Send the auditing report to field, click Select users and then select the
recipient you want to send the report to.
4. Click Export.
If any log entries are found using the criteria you specified, an XML file will be created
and sent as an email attachment to the recipient you specified.
To search the audit log for criteria you specify, use the following syntax.
PowerShell
7 Note
This example performs a search for all audit log entries with the following criteria:
PowerShell
Search-AdminAuditLog -Cmdlets Set-Mailbox -Parameters
ProhibitSendQuota,ProhibitSendReceiveQuota,IssueWarningQuota,MaxSendSize,Max
ReceiveSize -StartDate 08/04/2020 -EndDate 10/03/2020 -UserIds
davids,chrisd,kima
This example searches for changes made to a specific mailbox. This is useful if you're
troubleshooting or you need to provide information for an investigation. The following
criteria are used:
PowerShell
If your searches return many log entries, we recommend that you use the procedure
provided in Use PowerShell to search for audit log entries and send results to a recipient
later in this article. The procedure in that section sends an XML file as an email
attachment to the recipients you specify, enabling you to more easily extract the data
you're interested in.
To view the contents of the CmdletParameters and ModifiedProperties fields, use the
following steps. Or, you can use the procedure in Use PowerShell to search for audit log
entries and send results to a recipient later in this article to create an XML file.
PowerShell arrays
PowerShell variables
1. Decide the criteria you want to search for, run the Search-AdminAuditLog cmdlet,
and store the results in a variable using the following command.
PowerShell
2. Each audit log entry is stored as an array element in the variable $Results . You can
select an array element by specifying its array element index. Array element
indexes start at zero (0) for the first array element. For example, to retrieve the 5th
array element, which has an index of 4, use the following command.
PowerShell
$Results[4]
3. The previous command returns the log entry stored in array element 4. To see the
contents of the CmdletParameters and ModifiedProperties fields for this log
entry, use the following commands.
PowerShell
$Results[4].CmdletParameters
$Results[4].ModifiedProperties
7 Note
If you're going to use Outlook on the web (formerly known as Outlook Web App)
to view the exported entries, you need to enable .xml attachments in Outlook on
the web. For details, see Configure Outlook on the web to allow XML
attachments.
You can use Exchange Online PowerShell or standalone Exchange Online Protection
PowerShell to search for audit log entries that meet the criteria you specify, and then
send those results to a recipient you specify as an XML file attachment. The results are
sent to the recipient within 15 minutes. For a list of search criteria, see Search-
AdminAuditLog cmdlet criteria.
To search the audit log for criteria you specify, use the following syntax.
PowerShell
This example performs a search for all audit log entries with the following criteria:
The command sends the results to the davids@contoso.com SMTP address with
"Mailbox limit changes" included in the subject line of the message.
PowerShell
For more information about the format of the XML file, see admin audit log structure.
7 Note
The admin audit log records specific actions, based on Exchange Online PowerShell or
standalone Exchange Online Protection PowerShell cmdlets, done by admins and users
who have been assigned administrative privileges. Entries in the admin audit log provide
you with information about what cmdlet was run, which parameters were used, who ran
the cmdlet, and what objects were affected.
Notes:
Admin auditing logging is enabled by default, and you can't disable it.
The admin audit log doesn't record actions based on cmdlets that begins with the
verbs Get, Search, or Test.
When a change is made in your organization, it may take up to 15 minutes to
appear in audit log search results. If a change doesn't appear in the admin audit
log, wait a few minutes and run the search again.
Audit log entries are kept for 90 days. When an entry is older than 90 days, it's
deleted.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "View-only administrator
audit logging" entry in the Feature permissions in Exchange Online topic.
For information about keyboard shortcuts that may apply to the procedures in this
article, see Keyboard shortcuts for the Exchange admin center in Exchange Online.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
2. In the Search for changes to administrator role groups page that opens, choose a
Start date and End date (the default range is the past two weeks), and then choose
Search. All configuration changes made during the specified time period are
displayed, and can be sorted, using the following information:
Date: The date and time that the configuration change was made. The date
and time are stored in Coordinated Universal Time (UTC) format.
Cmdlet: The name of the cmdlet that was used to make the configuration
change.
User: The name of the user account of the user who made the configuration
change.
PowerShell
Notes:
You can only use the Parameters parameter together with the Cmdlets parameter.
The ObjectIds parameter filters the results by the object that was modified by the
cmdlet. A valid value depends on how the object is represented in the audit log.
For example:
Name
Canonical distinguished name (for example, contoso.com/Users/Akia Al-Zuhairi)
You'll likely need to use other filtering parameters on this cmdlet to narrow down
the results and identify the types of objects that you're interested in.
The UserIds parameter filters the results by the user who made the change (who
ran the cmdlet).
For the StartDate and EndDate parameters, if you specify a date/time value without
a time zone, the value is in Coordinated Universal Time (UTC). To specify a
date/time value for this parameter, use either of the following options:
Specify the date/time value in UTC: For example, "2016-05-06 14:30:00z".
Specify the date/time value as a formula that converts the date/time in your
local time zone to UTC: For example, (Get-Date "5/6/2016 9:30
AM").ToUniversalTime() . For more information, see Get-Date.
The cmdlet returns a maximum of 1,000 log entries by default. Use the ResultSize
parameter to specify up to 250,000 log entries. Or, use the value Unlimited to
return all entries.
This example performs a search for all audit log entries with the following criteria:
PowerShell
To view the contents of the CmdletParameters and ModifiedProperties fields, use the
following steps.
1. Decide the criteria you want to search for, run the Search-AdminAuditLog cmdlet,
and store the results in a variable using the following command.
PowerShell
2. Each audit log entry is stored as an array element in the variable $Results . You can
select an array element by specifying its array element index. Array element
indexes start at zero (0) for the first array element. For example, to retrieve the 5th
array element, which has an index of 4, use the following command.
PowerShell
$Results[4]
3. The previous command returns the log entry stored in array element 4. To see the
contents of the CmdletParameters and ModifiedProperties fields for this log
entry, use the following commands.
PowerShell
$Results[4].CmdletParameters
$Results[4].ModifiedProperties
Field Description
ObjectModified This field contains the object that was modified by the cmdlet specified in
the CmdletName field.
CmdletName This field contains the name of the cmdlet that was run by the user in the
Caller field.
CmdletParameters This field contains the parameters that were specified when the cmdlet in
the CmdletName field was run. Also stored in this field, but not visible in the
default output, is the value specified with the parameter, if any.
ModifiedProperties This field contains the properties that were modified on the object in the
ObjectModified field. Also stored in this field, but not visible in the default
output, are the old value of the property and the new value that was
stored.
Caller This field contains the user account of the user who ran the cmdlet in the
CmdletName field.
Succeeded This field specifies whether the cmdlet in the CmdletName field ran
successfully. The value is either True or False .
Error This field contains the error message generated if the cmdlet in the
CmdletName field failed to complete successfully.
RunDate This field contains the date and time when the cmdlet in the CmdletName
field was run. The date and time are stored in Coordinated Universal Time
(UTC) format.
Field Description
OriginatingServer This field indicates the server on which the cmdlet specified in the
CmdletName field was run.
7 Note
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "View-only administrator
audit logging" entry in the Feature permissions in Exchange Online topic.
If you're going to use Outlook on the web (formerly known as Outlook Web App)
to view the exported entries, you need to enable .xml attachments in Outlook on
the web. For details, see Configure Outlook on the web to allow XML attachments.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
1. Go to Compliance management > Auditing and click View the external admin
audit log report. All configuration changes made by Microsoft datacenter
administrators and delegated administrators during the specified time period are
displayed, and can be sorted, using the following information:
Date: The date and time that the configuration change was made. The date
and time are stored in Coordinated Universal Time (UTC) format.
Cmdlet: The name of the cmdlet that was used to make the configuration
change.
The user who ran the cmdlet. For all entries in the external admin audit log
report, the user is identified as Administrator, which indicates a Microsoft
datacenter administrator or an external administrator.
The cmdlet parameters that were used, and any value specified with the
parameter, in the format Parameter:Value.
2. If you want to print a specific audit log entry, select it in the search results pane
and then click Print in the details pane.
3. To narrow the search, choose dates in the Start date and End date drop-down
menus, and then click Search.
You can use the Search-AdminAuditLog cmdlet with the ExternalAccess parameter to
view entries from the admin audit log for actions performed by Microsoft datacenter
administrators and delegated administrators.
This command returns all entries in the admin audit log for cmdlets run by external
administrators.
PowerShell
This command returns entries in the admin audit log for cmdlets run by external
administrators between September 17, 2013 and October 2, 2013.
PowerShell
You can use the New-AdminAuditLogSearch cmdlet with the ExternalAccess parameter
to export entries from the admin audit log for actions performed by Microsoft
datacenter administrators or delegated administrators. Microsoft Exchange retrieves
entries in the admin audit log that were performed by external administrators and saves
them to a file named SearchResult.xml. This XML file is attached to an email message
that is sent to the specified recipients within 24 hours.
The following command returns entries in the admin audit log for cmdlets run by
external administrators between September 25, 2013 and October 24, 2013. The search
results are sent to the admin@contoso.com and pilarp@contoso.com SMTP addresses
and the text "External admin audit log" is added to the subject line of the message.
PowerShell
7 Note
When you include the ExternalAccess parameter, only entries for actions performed
by Microsoft datacenter administrator or delegated administrators are included in
the audit log that is exported. If you don't include the ExternalAccess parameter, the
audit log will contain entries for actions performed by the administrators in your
organization and by external administrators.
To verify that the command to export the admin audit log entries performed by external
administrators was successful, and to display information about current admin audit log
searches, run the following command:
PowerShell
Get-AuditLogSearch | Format-List
More information
In Microsoft 365 and Office 365, you can delegate the ability to perform certain
administrative tasks to an authorized partner of Microsoft. These admin tasks
include creating or editing users, resetting user passwords, managing user licenses,
managing domains, and assigning admin permissions to other users in your
organization. When you authorize a partner to take on this role, the partner is
referred to as a delegated admin. The tasks performed by a delegated admin are
logged in the admin audit log. As previously described, actions performed by
delegated admins can be viewed by running the external admin audit log report or
exported by using the New-AdminAuditLogSearch cmdlet with the ExternalAccess
parameter.
The admin audit log records specific actions, based on Exchange Online PowerShell
cmdlets, performed by administrators and users who have been assigned
administrative privileges. Actions performed by external administrators are also
logged. Entries in the admin audit log provide you with information about the
cmdlet that was run, which parameters were used, and what objects were affected.
The admin audit log doesn't record any action that is based on an Exchange Online
PowerShell cmdlet that begins with the verbs Get, Search, or Test.
Audit log entries are kept for 90 days. When an entry is older than 90 days, it's
deleted.
Messaging records management in
Exchange Online
Article • 02/22/2023
7 Note
If you currently use messaging records management, this older feature will
continue to work side-by-side with retention policies and retention labels. However,
we recommend that going forward, you use retention policies and retention labels
instead. They provide you with a single mechanism to centrally manage both
retention and deletion of content across Microsoft 365.
Users send and receive email every day. If left unmanaged, the volume of email
generated and received each day can inundate users, impact user productivity, and
expose your organization to risks. As a result, email lifecycle management is a critical
component for most organizations.
MRM provides the flexibility to implement the records management policy that best
meets your organization's requirements. With a good understanding of MRM, In-Place
Archiving, and In-Place Hold, you can help meet your goals of managing mailbox
storage and meeting regulatory retention requirements.
Looking for management tasks related to MRM? See Messaging Records Management
Procedures.
When a message reaches its retention age specified in the applicable retention tag, the
Managed Folder Assistant takes the retention action specified by the tag. Messages can
then be deleted permanently or deleted with the ability to recover them. If an archive
has been provisioned for the user, you can also use retention tags to move items to the
user's In-Place Archive.
MRM strategies
You can use retention policies to enforce basic message retention for an entire mailbox
or for specific default folders. Although there are several strategies for deploying MRM,
here are some of the most common:
Remove all messages after a specified period: In this strategy, you implement a single
MRM policy that removes all messages after a certain period. In this strategy, there's no
classification of messages. You can implement this policy by creating a single default
policy tag (DPT) for the mailbox. However, this doesn't ensure that messages are
retained for the specified period. Users can still delete messages before retention period
is reached.
Move messages to archive mailboxes: In this strategy, you implement MRM policies
that move items to the user's archive mailbox. An archive mailbox provides additional
storage for users to maintain old and infrequently accessed content. Retention tags that
move items are also known as archive policies. Within the same retention policy, you can
combine a DPT and personal tags to move items, and a DPT, RPTs, and personal tags to
delete items. To learn more about archiving policies, see:
7 Note
Remove messages based on folder location: In this strategy, you implement MRM
policies based on email location. For example, you can specify that messages in the
Inbox are retained for one year and messages in the Junk Email folder are retained for
60 days. You can implement this policy by using a combination of retention policy tags
(RPTs) for each default folder you want to configure and a DPT for the entire mailbox.
The DPT applies to all custom folders and all default folders that don't have an RPT
applied.
7 Note
In Exchange Server, you can create RPTs for the Calendar and Tasks folders. If you
don't want items in these folders or other default folders to expire, you can create a
disabled retention tag for that default folder.
Allow users to classify messages: In this strategy, you implement MRM policies that
include a baseline retention setting for all messages but allow users to classify messages
based on business or regulatory requirements. In this case, users become an important
part of your records management strategy - often they have the best understanding of
a message's retention value.
Users can apply different retention settings to messages that need to be retained for a
longer or shorter period. You can implement this policy using a combination of the
following:
Personal tags that users can apply to custom folders or individual messages
For example, you can use a retention policy with personal tags that have a shorter
retention period (such as two days, one week, or one month), as well as personal tags
that have a longer retention period (such as one, two, or five years). Users can apply
personal tags with the shorter retention periods for items such as newsletter
subscriptions that may lose their value within days of receiving them, and apply the tags
with longer periods to preserve items that have a high business value. They can also
automate the process by using Inbox rules in Outlook to apply a personal tag to
messages that match rule conditions.
Retain messages for eDiscovery purposes: In this strategy, you implement MRM
policies that remove messages from mailboxes after a specified period but also retain
them in the Recoverable Items folder for In-Place eDiscovery purposes, even if the
messages were deleted by the user or another process.
You can meet this requirement by using a combination of retention policies and In-Place
Hold and Litigation Hold or Litigation Hold. Retention policies remove messages from
the mailbox after the specified period. A time-based In-Place Hold or Litigation Hold
preserves messages that were deleted or modified before that period. For example, to
retain messages for seven years, you can create a retention policy with a DPT that
deletes messages in seven years and Litigation Hold to hold messages for seven years.
Messages that aren't removed by users will be deleted after seven years; messages
deleted by users before the seven year period will be retained in the Recoverable Items
folder for seven years. To learn more about this folder, see Recoverable Items folder in
Exchange Online.
Optionally, you can use RPTs and personal tags to allow users to clean up their
mailboxes. However, In-Place Hold and Litigation Hold continues to retain the deleted
messages until the hold period expires.
7 Note
) Important
Please refer to the Microsoft 365 security center and the Microsoft Purview
compliance portal for Exchange security and compliance features. They are no
longer available in the new Exchange admin center .
7 Note
If you currently use messaging records management, this older feature will
continue to work side-by-side with retention policies and retention labels. However,
we recommend that going forward, you use retention policies and retention labels
instead. They provide you with a single mechanism to centrally manage both
retention and deletion of content across Microsoft 365.
Watch this video for a quick overview of how to apply retention tags and a retention
policy to a mailbox in Exchange Online.
Assigning retention policy tags (RPTs) to default folders, such as the Inbox and
Deleted Items.
Applying default policy tags (DPTs) to mailboxes to manage the retention of all
untagged items.
Allowing the user to assign personal tags to custom folders and individual items.
Separating MRM functionality from users' Inbox management and filing habits.
Users aren't required to file messages in managed folders based on retention
requirements. Individual messages can have a different retention tag than the one
applied to the folder in which they're located.
The following figure illustrates the tasks involved in implementing this strategy.
Retention tags
As illustrated in the preceding figure, retention tags are used to apply retention settings
to folders and individual items such as e-mail messages and voice mail. These settings
specify how long a message remains in a mailbox and the action to be taken when the
message reaches the specified retention age. When a message reaches its retention age,
it's moved to the user's archive mailbox or deleted.
The following example picture is for Exchange Server, although you can configure the
same settings for Exchange Online:
Retention tags allow users to tag their own mailbox folders and individual items for
retention. Users no longer have to file items in managed folders provisioned by an
administrator based on message retention requirements.
Personal Manually to items and folders Users Move to Personal tags allow
tag Users can automate tagging archive your users to
by using Inbox rules to either Delete and determine how long
move a message to a folder allow an item should be
that has a particular tag or to recovery retained. For
apply a personal tag to the Permanently example, the
message. delete mailbox can have a
DPT to delete items
in seven years, but a
user can create an
exception for items
such as newsletters
and automated
notifications by
applying a personal
tag to delete them
in three days.
Users can apply personal tags to folders they create or to individual items. Messages
that have a personal tag applied are always processed based on the personal tag's
settings. Users can apply a personal tag to a message so that it's moved or deleted
sooner or later than the settings specified in the DPT or RPTs applied to that user's
mailbox. You can also create personal tags with retention disabled. This allows users to
tag items so they're never moved to an archive or never expire.
7 Note
Users can also use the OWA settings dialog to select additional personal tags that
aren't linked to their retention policy. The selected tags then become available in
Outlook and Outlook on the web. To enable users to select additional tags via OWA, you
must add the MyRetentionPolicies Role to the user's role assignment policy. To learn
more about role assignment policies for users, see Role assignment policies in Exchange
Online. If you allow users to select additional personal tags, all personal tags in your
Exchange organization become available to them.
7 Note
Personal tags are a premium feature. Mailboxes with policies that contain these
tags (or as a result of users adding the tags to their mailbox) require an Exchange
Enterprise client access license (CAL).
Retention age
When you enable a retention tag, you must specify a retention age for the tag. This age
indicates the number of days to retain a message after it arrives in the user's mailbox.
The retention age for non-recurring items (such as email messages) is calculated
differently than items that have an end date or recurring items (such as meetings and
tasks). To learn how retention age is calculated for different types of items, see How
retention age is calculated.
You can also create retention tags with retention disabled or disable tags after they're
created. Because messages that have a disabled tag applied aren't processed, no
retention action is taken. As a result, users can use a disabled personal tag as a Never
Move tag or a Never Delete tag to override a DPT or RPT that would otherwise apply to
the message.
Retention actions
When creating or configuring a retention tag, you can select one of the following
retention actions to be taken when an item reaches its retention age:
Move to Moves the message to the user's archive If the user doesn't have an archive
Archive1,2 mailbox mailbox, no action is taken.
Only available for DPTs and personal tags
For details about archiving, see In-Place
Archiving
Retention Action taken... Except...
action
Delete and Emulates the behavior when the user If you've set the deleted item
Allow empties the Deleted Items folder. retention period to zero days,
Recovery Items are moved to the Recoverable Items items are permanently deleted. For
folder in Exchange Online in the mailbox and details, see Change how long
preserved until the deleted item retention permanently deleted items are
period. kept for an Exchange Online
Provides the user a second chance to mailbox.
recover the item using the Recover Deleted
Items dialog box in Outlook or Outlook on
the web
7 Note
1
In an Exchange hybrid deployment, you can enable a cloud-based archive mailbox
for an on-premises primary mailbox. If you assign an archive policy to an on-
premises mailbox, items are moved to the cloud-based archive. If an item is moved
to the archive mailbox, a copy of it isn't retained in the on-premises mailbox. If the
on-premises mailbox is placed on hold, an archive policy will still move items to the
cloud-based archive mailbox where they are preserved for the duration specified by
the hold.
2
To move Calendar items from Primary to Online Archive mailbox, create a Default
Policy Tag and apply it to the mailbox. In Exchange Online, Personal Tags cannot be
applied to the Calendar folder in Outlook or OWA.
For details about how to create retention tags, see Create a Retention Policy.
Retention policies
To apply one or more retention tags to a mailbox, you must add them to a retention
policy and then apply the policy to mailboxes. A mailbox can't have more than one
retention policy. Retention tags can be linked to or unlinked from a retention policy at
any time, and the changes automatically take effect for all mailboxes that have the
policy applied.
7 Note
Although a retention policy doesn't need to have any retention tags linked to it, we
don't recommend using this scenario. If mailboxes with retention policies don't
have retention tags linked to them, this may cause mailbox items to never expire.
A retention policy can contain both archive tags (tags that move items to the personal
archive mailbox) and deletion tags (tags that delete items). A mailbox item can also have
both types of tags applied. From a retention perspective, the primary mailbox and
online archive should not be looked at as separate entities. Retention settings are
applied to the primary mailbox, and by design, extend to the online archive. The online
archive is an extension of the primary mailbox.
When planning to create retention policies, you must consider whether they'll include
both archive and deletion tags. As mentioned earlier, a retention policy can have one
DPT that uses the Move to Archive action and one DPT that uses either the Delete and
Allow Recovery or Permanently Delete action. The DPT with the Move to Archive
action must have a lower retention age than the DPT with a deletion action. For
example, you can use a DPT with the Move to Archive action to move items to the
archive mailbox in two years, and a DPT with a deletion action to remove items from the
mailbox in seven years. Items in both primary and archive mailboxes will be deleted after
seven years.
For a list of management tasks related to retention policies, see Messaging Records
Management Procedures.
You can modify tags included in the Default MRM Policy, for example by changing the
retention age or retention action, disable a tag or modify the policy by adding or
removing tags from it. The updated policy is applied to mailboxes the next time they're
processed by the Managed Folder Assistant.
For more information, including a list of retention tags linked to the policy, see Default
Retention Policy in Exchange Online and Exchange Server.
The Managed Folder Assistant applies the retention policy by inspecting items in the
mailbox and determining whether they're subject to retention. It then stamps items
subject to retention with the appropriate retention tags and takes the specified
retention action on items past their retention age.
7 Note
The Managed Folder Assistant doesn't take any action on messages that aren't
subject to retention, specified by disabling the retention tag. You can also disable a
retention tag to temporarily suspend items with that tag from being processed.
MRM won't move items larger than the values of MaxSendSize and MaxReceiveSize
set on the mailbox.
Example: A user has a folder named Project Contoso in the primary mailbox with a
Delete - three years personal tag and a Project Contoso folder also exists in the
archive mailbox. The user applies a Delete - one year personal tag to delete items in
the Project Contoso folder in archive mailbox. The next time the mailbox is processed
by MFA, the folder reverts back to the Delete - three years personal tag, based on the
applied tag in primary mailbox. This behavior occurs for any folder for which a folder
with an identical folder path exists in the primary mailbox. It doesn't matter if it is a user
created folder or a default folder (e.g., Inbox or Deleted Items).
Existing items that have been stamped with that tag continue to be processed by the
Managed Folder Assistant based on those settings and any retention action specified in
the tag is applied to those messages.
However, if you delete the tag, the tag definition stored in Active Directory is removed.
This causes the Managed Folder Assistant to process all items in a mailbox and restamp
the ones that have the removed tag applied. Depending on the number of mailboxes
and messages, this process may significantly consume resources on all Mailbox servers
that contain mailboxes with retention policies that include the removed tag.
) Important
If a retention tag is removed from a retention policy, any existing mailbox items
with the tag applied will continue to expire based on the tag's settings. To prevent
the tag's settings from being applied to any items, you should delete the tag.
Deleting a tag removes it from any retention policies in which it's included.
7 Note
The retention period for a disabled retention tag is displayed to the user as Never.
If a user tags an item believing it will never be deleted, enabling the tag later may
result in unintentional deletion of items the user didn't want to delete. The same is
true for tags with the Move to Archive action.
Retention hold
When users are temporarily away from work and don't have access to their e-mail,
retention settings can be applied to new messages before they return to work or access
their e-mail. Depending on the retention policy, messages may be deleted or moved to
the user's personal archive. You can temporarily suspend retention policies from
processing a mailbox for a specified period by placing the mailbox on retention hold.
When you place a mailbox on retention hold, you can also specify a retention comment
that informs the mailbox user (or another user authorized to access the mailbox) about
the retention hold, including when the hold is scheduled to begin and end. Retention
comments are displayed in supported Outlook clients. You can also localize the
retention hold comment in the user's preferred language.
7 Note
Placing a mailbox on retention hold doesn't affect how mailbox storage quotas are
processed. Depending on the mailbox usage and applicable mailbox quotas,
consider temporarily increasing the mailbox storage quota for users when they're
on vacation or don't have access to e-mail for an extended period. For more
information about mailbox storage quotas, see Mailbox storage limits.
During long absences from work, users may accrue a large amount of e-mail. Depending
on the volume of e-mail and the length of absence, it may take these users several
weeks to sort through their messages. In these cases, consider the additional time it may
take the users to catch up on their mail before removing them from retention hold.
If your organization has never implemented MRM, and your users aren't familiar with its
features, you can also use retention holds during the initial warm up and training phase
of your MRM deployment. You can create and deploy retention policies and educate
users about the policies without the risk of having items moved or deleted before users
can tag them. A few days before the warm up and training period ends, you should
remind users of the warm-up deadline. After the deadline, you can remove the retention
hold from user mailboxes, allowing the Managed Folder Assistant to process mailbox
items and take the specified retention action.
For details about how to place a mailbox on retention hold, see Place a mailbox on
retention hold.
7 Note
This feature requires a Microsoft 365 administrator account. This feature isn't
available for Microsoft 365 Government, Microsoft 365 operated by 21Vianet, or
Microsoft 365 Germany.
You can run an automated diagnostic check on a user's mailbox to check and validate
the retention policy settings configured for the user.
A flyout page opens in the Microsoft 365 admin center. Enter the email address of the
mailbox you want to check and click Run Tests.
Default Retention Policy in Exchange
Online
Article • 02/22/2023
) Important
Please refer to the Microsoft 365 security center and the Microsoft Purview
compliance portal for Exchange security and compliance features. They are no
longer available in the new Exchange admin center .
7 Note
If you currently use messaging records management, this older feature will
continue to work side-by-side with retention policies and retention labels. However,
we recommend that going forward, you use retention policies and retention labels
instead. They provide you with a single mechanism to centrally manage both
retention and deletion of content across Microsoft 365.
Exchange creates the retention policy Default MRM Policy in your Exchange Online and
on-premises Exchange organization. The policy is automatically applied to new users in
Exchange Online. In on-premises organizations, the policy is applied when you create an
archive for the mailbox. You can change the retention policy applied to a user at any
time.
You can modify tags included in the Default MRM Policy, for example by changing the
retention age or retention actions, disable a tag, or modify the policy by adding or
removing tags from it. The updated policy is applied to mailboxes the next time they're
processed by the Managed Folder Assistant
[NOTE] The Default MRM Policy doesn't include a default tag to automatically delete
content from the Deleted items folder as per Extended email retention for deleted
items in Office 365 . If you want to apply the 30-day retention or set a custom
retention period, that can be done by adding an appropriate retention tag for
deleted items folder to the Default MRM Policy.
Default 2 years move to archive Default Policy Tag 730 Move to Archive
(DPT)
Personal never move to archive Personal tag Not applicable Move to Archive
Apply the Default MRM Policy Yes, applied Yes, applied by default if you also create an
automatically to new users by default. No archive for the new user.
action is If you create an archive for the user later, the
required. policy is applied automatically only if the user
doesn't have an existing Retention Policy.
More information
A Retention Tag can be linked to more than one Retention Policy. For details about
managing Retention tags and retention policies, see Messaging Records
Management Procedures.
The Default MRM Policy doesn't include a DPT to automatically delete items (but it
does contain personal tags with the delete retention action that users can apply to
mailbox items). If you want to automatically delete items after a specified period,
you can create a DPT with the required delete action and add it to the policy. For
details, see Create a Retention Policy and Add retention tags to or remove
retention tags from a retention policy.
Retention policies are applied to mailbox users. The same policy applies to the
user's mailbox and archive.
Default folders that support Retention
Policy Tags in Exchange Online
Article • 02/22/2023
7 Note
If you currently use messaging records management, this older feature will
continue to work side-by-side with retention policies and retention labels. However,
we recommend that going forward, you use retention policies and retention labels
instead. They provide you with a single mechanism to centrally manage both
retention and deletion of content across Microsoft 365.
You can use Retention tags and retention policies to manage email lifecycle. Retention
Policies contain Retention Tags, which are settings you can use to specify when a
message should be automatically moved to the archive or when it should be deleted.
A Retention Policy Tag (RPT) is a type of retention tag that you can apply to default
folders in a mailbox, such as Inbox and Deleted Items.
Supported default folders
You can create RPTs for the default folders shown in the following table.
Archive This folder is the default destination for messages archived with the Archive
button in Outlook. The Archive feature provides a fast way for users to remove
messages from their Inbox without deleting them.
This RPT is available only in Exchange Online.
Clutter This folder contains email messages that are low priority. Clutter looks at what
you've done in the past to determine the messages you're most likely to ignore. It
then moves those messages to the Clutter folder.
Deleted This default folder is used to store items deleted from other folders in the
Items mailbox. Outlook and Outlook on the web (formerly known as Outlook Web App)
users can manually empty this folder. Users can also configure Outlook to empty
the folder upon closing Outlook.
Drafts This default folder is used to store draft messages that haven't been sent by the
user. Outlook on the web also uses this folder to save messages that were sent by
the user but not submitted to the Hub Transport server.
Journal This default folder contains actions selected by the user. These actions are
automatically recorded by Outlook and placed in a timeline view.
Junk E-mail This default folder is used to save messages marked as junk e-mail by the content
filter on an Exchange server or by the anti-spam filter in Outlook.
Notes This folder contains notes created by users in Outlook. These notes are also visible
in Outlook on the web.
Outbox This default folder is used to temporarily store messages sent by the user until
they're submitted to a Hub Transport server. A copy of sent messages is saved in
the Sent Items default folder. Because messages usually remain in this folder for a
brief period, it isn't necessary to create an RPT for this folder.
Recoverable This is a hidden folder in the Non-IPM sub-tree. It contains the Deletions,
Items Versions, Purges, DiscoveryHolds, and Audits sub-folders. Retention tags for this
folder move items from the Recoverable Items folder in the user's primary mailbox
to the Recoverable Items folder in the user's archive mailbox. You can assign only
the Move To Archive retention action to tags for this folder. To learn more, see
Recoverable Items folder in Exchange Online.
Sent Items This default folder is used to store messages that have been submitted to a Hub
Transport server.
Tasks This default folder is used to store tasks. To create an RPT for the Tasks folder, you
have to use Exchange Online PowerShell. For more information, see New-
RetentionPolicyTag. After the RPT for the Tasks folder is created, you can manage
it by using the Exchange admin center.
More Info
RPTs are retention tags for default folders. You can only select a delete action for
RPTs - either delete and allow recovery or permanently delete.
You can't create an RPT to move messages to the archive. To move old items to
archive, you can create a Default Policy Tag (DPT), which applies to the entire
mailbox, or Personal Tags, which are displayed in Outlook and Outlook on the web
as Archive Policies. Your users can apply them to folders or individual messages.
You can only add one RPT for a particular default folder to a Retention Policy. For
example, if a retention policy has an Inbox tag, you can't add another RPT of type
Inbox to that retention policy.
To learn how to create RPTs or other types of retention tags and add them to a
retention policy, see Create a Retention Policy.
In Exchange Server and Exchange Online, a DPT also applies to the Calendar and
Tasks default folders. This may result in items being deleted or moved to the
archive based on the DPT settings. To prevent the DPT settings from deleting items
in these folders , create RPTs with retention disabled. To prevent the DPT settings
from moving items in a default folder, you can create a disabled Personal Tag with
the move to archive action, add it to the retention policy, and then have users
apply it to the default folder. For details, see Prevent archiving of items in a default
folder in Exchange 2010 .
How retention age is calculated in
Exchange Online
Article • 02/22/2023
7 Note
If you currently use messaging records management, this older feature will
continue to work side-by-side with retention policies and retention labels. However,
we recommend that going forward, you use retention policies and retention labels
instead. They provide you with a single mechanism to centrally manage both
retention and deletion of content across Microsoft 365.
The Managed Folder Assistant (MFA) is one of many mailbox assistant processes that
runs in Exchange Online. Its job is to process mailboxes that have a Retention Policy
applied, add the Retention Tags included in the policy to the mailbox, and process items
in the mailbox. If the items have a retention tag, the assistant tests the age of those
items. If an item has exceeded its retention age, it takes the specified retention action.
Retention actions include moving an item to the user's archive, deleting the item and
allowing recovery, or deleting the item permanently.
Items in the Deleted Items folder and items which may have a start and end date, such
as calendar items (meetings and appointments) and tasks, are handled differently as
shown in this table.
Journal
item
Meeting
request,
response,
or
cancellation
Missed call
Notes
Email In the Date of delivery or creation unless the item was deleted from a folder
message Deleted that does not have an inherited or implicit retention tag.
Document Items If an item is in a folder that doesn't have an inherited or implicit
folder retention tag applied, the item isn't processed by the MFA and therefore
Fax doesn't have a start date stamped by it. When the user deletes such an
item, and the MFA processes it for the first time in the Deleted Items
Journal
folder, it stamps the current date as the start date.
item
Meeting
request,
response,
or
cancellation
Missed call
Notes
Calendar Not in Non-recurring calendar items expire according to their end date.
the Recurring calendar items expire according to the end date of their last
Deleted occurrence. Recurring calendar items with no end date don't expire.
Items
folder
If the item And The retention age is calculated based on...
type is... the
item
is...
Calendar In the A calendar item expires according to its message-received date, if one
Deleted exists. If a calendar item doesn't have a message-received date, it expires
Items according to its message-creation date. If a calendar item has neither a
folder message-received date nor a message-creation date, it doesn't expire.
A recurring task expires according to the end date of its last occurrence.
If a recurring task doesn't have an end date , it doesn't expire.
Task In the A task expires according to its message-received date, if one exists. If a
Deleted task doesn't have a message-received date, it expires according to its
Items message-creation date. If a task has neither a message-received date nor
folder a message-creation date, it doesn't expire.
Contact In any Contacts aren't stamped with a start date or an expiration date, so
folder they're skipped by the Managed Folder Assistant and don't expire.
Corrupted In any Corrupted items are skipped by the Managed Folder Assistant and don't
folder expire.
Examples
If the user... The The Managed Folder Assistant...
retention
tags on
folder...
If the user... The The Managed Folder Assistant...
retention
tags on
folder...
Receives a message in Inbox: Processes the message in the Inbox on 1/26/2019; stamps it
the Inbox on Delete in with a start date of 01/26/2019 and an expiration date of
01/26/2019. Deletes 365 days 01/26/2020.
the message on Deleted Processes the message again in the Deleted Items folder on
2/27/2019. Items: 2/27/2019. It recalculates the expiration date based on the
Delete in same start date (01/26/2019). Because the item is older
30 days than 30 days, it is expired immediately.
Receives a message in Inbox: Processes the message in the Deleted Items folder on
the Inbox on None 02/27/2019 and determines the item doesn't have a start
01/26/2019. Deletes (inherited date.
the message on or It stamps the current date as the start date, and 03/27/2019
2/27/2019. implicit) as the expiration date. The item is expired on 3/27/2019,
Deleted which is 30 days after the user deleted or moved it to the
Items: Deleted Items folder.
Delete in
30 days
More Info
In Exchange Online, the Managed Folder Assistant processes a mailbox once in
seven days. This might result in items being expired up to seven days after the
expiration date stamped on the item.
In hybrid deployments, the same retention tags and retention policies must exist in
your on-premises and Exchange Online organizations in order to consistently
move and expire items across both organizations. See Export and Import Retention
Tags for more information.
Create a retention policy for Exchange
Online
Article • 02/22/2023
7 Note
If you currently use messaging records management (MRM), this older feature will
continue to work side-by-side with Microsoft 365 retention policies and retention
labels. However, we recommend that going forward, you use Microsoft 365
retention policies and retention labels instead. They provide you with a single
mechanism to centrally manage both retention and deletion of content across
Microsoft 365.
In Exchange Online, you can use messaging records management (MRM) retention
policies to manage email lifecycle. Retention policies are applied by creating retention
tags, adding them to a retention policy, and applying the policy to mailbox users.
For additional management tasks related to retention policies, see Messaging Records
Management Procedures.
Procedures in this topic require specific permissions. See each procedure for its
permissions information.
Configuration for the MRM retention policies and tags is in the Microsoft Purview
compliance portal.
Mailboxes to which you apply these retention policies must reside in Microsoft
365.
Step 1: Create a retention tag
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Messaging records
management" entry in the Feature permissions in Exchange Online topic.
2. On the Define how the tag will be applied page, select one of the following
options, and then select Next:
You can't use this configuration to create a DPT to delete voice mail items.
For details about how to create a DPT to delete voice mail items, see the
Exchange Online PowerShell example on this page.
You can create RPTs only with the Delete and allow recovery or Permanently
delete retention actions.
3. On the Define retention settings page title and options will vary depending on the
type of tag you selected. Complete the following fields, and then select Next:
Never: Select this option to specify that items should never be deleted or
moved to the archive.
Retention Action: Select one of the following actions to be taken after the
item reaches its retention period:
Delete and allow recovery: Select this action to delete items but allow
users to recover them using the Recover Deleted Items option in Outlook
or Outlook on the web. Items are retained until the deleted item retention
period configured for the mailbox database or the mailbox user is reached.
) Important
Move item to archive: This action is available only if you're creating a DPT
or a personal tag. Select this action to move items to the user's archive
mailbox.
4. On the Name your tag page, enter a name and optional description, and then
select Next:
Name: Enter a name for the retention tag. The tag name is for display
purposes and doesn't have any impact on the folder or item a tag is applied
to. Consider that the personal tags you provision for users are available in
Outlook and Outlook on the web.
5. Review and submit to create the tag with your chosen configuration.
Use Exchange Online PowerShell to create a retention tag
Use the New-RetentionPolicyTag cmdlet to create a retention tag. Different options
available in the cmdlet allow you to create different types of retention tags. Use the Type
parameter to create a DPT (value of All), RPT (specify a default folder type, such as
Inbox) or a personal tag (value of Personal).
The following example creates a DPT to delete all messages in the mailbox after 7 years
(2,556 days):
PowerShell
The following example creates a DPT to move all messages to the In-Place Archive in 2
years (730 days):
PowerShell
The following example creates a DPT to delete voice mail messages after 20 days:
PowerShell
The following example creates an RPT to permanently delete messages in the Junk EMail
folder after 30 days:
PowerShell
PowerShell
2. On the Configure your policy page, enter a name for the retention policy, and
then select + Add tag to select the tags you want to add to this retention policy.
You can create a retention policy without adding any retention tags to it, but items
in the mailbox to which the policy is applied won't be moved or deleted. You can
also add and remove retention tags from a retention policy after it's created.
3. On the Choose retention tags page, select the tags you want, and then select Add.
One DPT with the Delete and allow recovery or Permanently delete actions.
One DPT for voice mail messages with the Delete and allow recovery or
Permanently delete actions.
7 Note
Although you can add any number of personal tags to a retention policy,
having many personal tags with different retention settings can confuse users.
We recommend linking no more than ten personal tags to a retention policy.
4. Review and submit to create your retention policy with your configurations.
You can create a retention policy without adding any retention tags to it, but items in
the mailbox to which the policy is applied won't be moved or deleted. You can also add
and remove retention tags from a retention policy after it's created.
PowerShell
To verify that you have applied the retention policy, do the following:
1. Replace <Mailbox Identity> with the name, email address, or alias of the mailbox,
and run the following command in Exchange Online PowerShell command to run
the MRM assistant manually against a single mailbox:
PowerShell
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
Add retention tags to or remove
retention tags from a retention policy in
Exchange Online
Article • 02/22/2023
) Important
Please refer to the Microsoft 365 security center and the Microsoft Purview
compliance portal for Exchange security and compliance features. They are no
longer available in the new Exchange admin center .
7 Note
If you currently use messaging records management, this older feature will
continue to work side-by-side with retention policies and retention labels. However,
we recommend that going forward, you use Microsoft 365 retention policies and
retention labels instead. They provide you with a single mechanism to centrally
manage both retention and deletion of content across Microsoft 365.
You can add retention tags to a retention policy when the policy is created or anytime
thereafter. For details about how to create a retention policy, including how to
simultaneously add retention tags, see Create a Retention Policy.
One or more retention policy tags (RPTs) for supported default folders
One default policy tag (DPT) with the Move item to archive (compliance portal) or
Move to Archive (Classic EAC) action
One DPT with the Delete and allow recovery or Permanently delete actions
One DPT for voice mail
For more information about retention tags, see Retention tags and retention policies.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Messaging records
management" entry in the Feature permissions in Exchange Online topic.
Retention tags aren't applied to a mailbox until they're linked to a retention policy
and the Managed Folder Assistant processes the mailbox. Use the Start-
ManagedFolderAssistant cmdlet to manually trigger the assistant to process a
specified mailbox.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
2. In the list view, select the retention policy to which you want to add retention tags,
and then select Edit.
To add and remove retention tags to and from the retention policy: Select +
Add tag, and on the Choose retention tags pane, you can select new
retention tags and remove already selected retention tags. When the
required retention tags are selected, select Add.
To just remove retention tags: In the view list of retention tags, use the Delete
icon for a retention tag that you want to remove.
U Caution
If the policy has retention tags linked to it, this command replaces the existing tags.
PowerShell
The following example adds the retention tag VPs-DeletedItems to the retention policy
RetPolicy-VPs, which already has other retention tags linked to it:
PowerShell
The following example removes the retention tag VPs-Inbox from the retention policy
RetPolicy-VPs:
PowerShell
For detailed syntax and parameter information, see set-RetentionPolicy and get-
RetentionPolicy.
This example uses the Get-RetentionPolicy cmdlet to retrieve retention tags added to
the Default MRM Policy and pipes them to the Format-Table cmdlet to output only the
name property of each tag.
PowerShell
7 Note
If you currently use messaging records management, this older feature will
continue to work side-by-side with retention policies and retention labels. However,
we recommend that going forward, you use retention policies and retention labels
instead. They provide you with a single mechanism to centrally manage both
retention and deletion of content across Microsoft 365.
You can use retention policies to group one or more retention tags and apply them to
mailboxes to enforce message retention settings. A mailbox can't have more than one
retention policy.
U Caution
Messages are expired based on settings defined in the retention tags linked to the
policy. These settings include actions such moving messages to the archive or
permanently deleting them. Before applying a retention policy to one or more
mailboxes, we recommended that you test the policy and inspect each retention
tag associated with it.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
2. In the list view, select the mailbox to which you want to apply the retention policy.
3. In the details panes for that mailbox, select Mailbox, and then for the Retention
policy section, select Manage mailbox policies.
4. In the Mailbox policies pane, use the dropdown list box for Retention policy to
select the policy you want to apply to the mailbox, and then select Save.
2. In the list view, select the multiple mailboxes to apply the same retention policy.
3. Above the list view, select ... for more options, and select Mailbox policies.
4. In the Mailbox policies pane, use the dropdown list box for Retention policy to
select the policy you want to apply to the multiple mailboxes, and then select Save.
PowerShell
$OldPolicy=(Get-RetentionPolicy "Old-Retention-Policy").distinguishedName
Get-Mailbox -Filter "RetentionPolicy -eq '$OldPolicy'" -Resultsize Unlimited
| Set-Mailbox -RetentionPolicy "New-Retention-Policy"
PowerShell
PowerShell
For detailed syntax and parameter information, see Get-Mailbox and Set-Mailbox.
The following example retrieves the retention policy for Morris's mailbox:
PowerShell
The following command retrieves all mailboxes that have the retention policy RP-
Finance applied:
PowerShell
During retention hold, users can log on to their mailbox and change or delete items.
When you perform a mailbox search, deleted items that are past the deleted item
retention period aren't returned in search results. To make sure items changed or
deleted by users are preserved in legal hold scenarios, you must place a mailbox on
legal hold. For more information, see Create or remove an In-Place Hold.
You can also include retention comments for mailboxes you place on retention hold. The
comments are displayed in supported versions of Microsoft Outlook.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Messaging records
management" entry in the Feature permissions in Exchange Online topic.
You can't use the Exchange admin center (EAC) to place a mailbox on retention
hold. You must use Exchange Online PowerShell.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
Use Exchange Online PowerShell to place a
mailbox on retention hold
This example places Michael Allen's mailbox on retention hold.
PowerShell
PowerShell
This command retrieves the RetentionHoldEnabled property for Michael Allen's mailbox.
PowerShell
This command retrieves all mailboxes in the Exchange organization, filters the mailboxes
that are placed on retention hold, and lists them along with the retention policy applied
to each.
) Important
Because RetentionHoldEnabled isn't a filterable property in Exchange Server, you
can't use the Filter parameter with the Get-Mailbox cmdlet to filter mailboxes that
are placed on retention hold on the server-side. This command retrieves a list of all
mailboxes and filters on the client running Exchange Online PowerShell session. In
large environments with thousands of mailboxes, this command may take a long
time to complete.
PowerShell
processing the mailbox at all. So in addition to not processing the MRM retention policy,
other functions performed by the Managed Folder assistant, such as expiring items in
the Recoverable Items folder by marking them for permanent removal, won't be
performed. For more information, see Set-OrganizationConfig.
In contrast, when RetentionHoldEnabled is set to True, the Managed Folder Assistant will
continue to process the MRM retention policy on the mailbox (including applying
retention tags to items), but it will not expire items in folders that are visible to the user
(that is, in folders in the IPM subtree of the mailbox). However, the Managed Folder
Assistant will continue to process items in the Recoverable Items folder, including
purging expired items. So setting ElcProcessingDisabled to True is more restrictive and
has more consequences than setting the RetentionHoldEnabled property to True.
Another significant difference between these two mailbox properties is that the
ElcProcessingDisabled property can be set at the organizational level with the Set-
OrganizationConfig -ElcProcessingDisabled $true command (the default setting is
False). This means that you could prevent the Managed Folder Assistant from
processing all mailboxes in your organization. In contrast, you can only set the
RetentionHoldEnabled property on a per mailbox basis.
Keep the following things in mind when managing the ElcProcessingDisabled property
for a mailbox:
) Important
Please refer to the Microsoft 365 security center and the Microsoft Purview
compliance portal for Exchange security and compliance features. They are no
longer available in the new Exchange admin center .
When possible, we recommend that you use Microsoft 365 retention to archive and
manage data in-place to meet your compliance requirements. However, some
organizations might need to use a third-party solution to receive a copy of emails for
storage or other scenarios. Configure journaling to store that data outside Exchange.
You don't have these additional administrative overheads when you use Microsoft 365
retention and other Microsoft Purview compliance solutions that keep the data within
your tenant. As a more modern compliance solution, they aren't restricted to just email
but can also manage today's array of communication and productivity apps, such as
Microsoft Teams.
Journal rules
The following are key aspects of journal rules:
Journal rule scope: Defines which messages are journaled by the Journaling agent.
Journal recipient: Specifies the SMTP address of the recipient you want to journal.
Journaling mailbox: Specifies one or more mailboxes used for collecting journal
reports.
In Exchange Online, there's a limit to the number of journal rules that you can create.
For details, see Journal, Transport, and Inbox rule limits.
Journal rule scope
You can use a journal rule to journal only internal messages, only external messages, or
both. The following list describes these scopes:
Internal messages only: Journal rules with the scope set to journal internal
messages sent between the recipients inside your Exchange organization.
External messages only1: Journal rules with the scope set to journal external
messages sent to recipients or received from senders outside your Exchange
organization.
All messages: Journal rules with the scope set to journal all messages that pass
through your organization regardless of origin or destination. These include
messages that may have already been processed by journal rules in the Internal
and External scopes.
1
If the sender and recipients are both in accepted domains of the same organization, the
messages are not honored as external, even if the x-ms-exchange-crosstenant-authas
header in the messages has the value anonymous . Accordingly, these messages are not
journaled as external.
Journal recipient
You can implement targeted journaling rules by specifying the SMTP address of the
recipient you want to journal. The recipient can be a mailbox, distribution group,
dynamic distribution group, mail user, or contact. These recipients may be subject to
regulatory requirements, or they may be involved in legal proceedings where email
messages or other communications are collected as evidence. By targeting specific
recipients or groups of recipients, you can easily configure a journaling environment
that matches your organization's processes and meets regulatory and legal
requirements. Targeting only the specific recipients that need to be journaled also
minimizes storage and other costs associated with retention of large amounts of data.
All messages sent to or from the journaling recipients you specify in a journaling rule are
journaled. If you specify a distribution group as the journaling recipient, all messages
sent to or from members of the distribution group are journaled. If you don't specify a
journaling recipient, all messages sent to or from recipients that match the journal rule
scope are journaled.
7 Note
The SMTP address specified for the journaling recipient cannot contain a wildcard
character. For example, the SMTP address cannot be listed as *@contoso.com .
Journaling mailbox
The journaling mailbox is used to collect journal reports. How you configure the
journaling mailbox depends on your organization's policies, regulatory requirements,
and legal requirements. You can specify one journaling mailbox to collect messages for
all the journal rules configured in the organization, or you can use different journaling
mailboxes for different journal rules or sets of journal rules.
You can't designate an Exchange Online mailbox as a journaling mailbox. You can deliver
journal reports to an on-premises archiving system or a third-party archiving service. If
you're running an Exchange hybrid deployment with your mailboxes split between on-
premises servers and Exchange Online, you can designate an on-premises mailbox as
the journaling mailbox for your Exchange Online and on-premises mailboxes.
) Important
When the journaling mailbox becomes available again, you can use the Send Again
feature in Outlook to submit journal reports for delivery to the journaling mailbox.
When you configure an alternate journaling mailbox, all the journal reports that are
rejected or can't be delivered across your entire Exchange organization are delivered to
the alternate journaling mailbox. Therefore, it's important to make sure that the
alternate journaling mailbox and the Mailbox server where it's located can support many
journal reports.
U Caution
If you configure an alternate journaling mailbox, you must monitor the mailbox to
make sure that it doesn't become unavailable at the same time as the journal
mailboxes. If the alternate journaling mailbox also becomes unavailable or rejects
journal reports at the same time, the rejected journal reports are lost and can't be
retrieved. Due to existing limits on receiving email for Exchange Online
mailboxes, configuring the alternate journaling mailbox to be an Exchange Online
mailbox is not supported.
Because the alternate journaling mailbox collects all the rejected journal reports for the
entire Exchange Online organization, you must make sure that this doesn't violate any
laws or regulations that apply to your organization. If laws or regulations prohibit your
organization from allowing journal reports sent to different journaling mailboxes from
being stored in the same alternate journaling mailbox, you may be unable to configure
an alternate journaling mailbox. Discuss this with your legal representatives to
determine whether you can use an alternate journaling mailbox.
When you configure an alternate journaling mailbox, you should use the same criteria
that you used when you configured the journaling mailbox.
) Important
The alternate journaling mailbox should be treated as a special dedicated mailbox.
Any messages addressed directly to the alternate journaling mailbox aren't
journaled.
Journal reports
A journal report is the message that the Journaling agent generates when a message
matches a journal rule and is to be submitted to the journaling mailbox. The original
message that matches the journal rule is included unaltered as an attachment to the
journal report. The body of a journal report contains information from the original
message such as the sender email address, message subject, message-ID, and recipient
email addresses. This is also referred to as envelope journaling, and is the only
journaling method supported by Microsoft 365 and Office 365.
To enable journal report decryption for the organization, complete these steps.
1. On your local computer, using a work or school account that has global
administrator or compliance admin permissions in your organization, connect to
Exchange Online PowerShell.
PowerShell
) Important
Journal report decryption doesn't currently support the explicit use of OME
branding templates. If you use a mail flow rule (also known as a transport rule) to
apply an OME branding template, the journal report won't contain a decrypted
copy of the message. Currently, journal report decryption only works with the
default OME branding template that's applied without a mail flow rule by Exchange
Online. In other words, the branding template applied by OME implicitly on
messages.
Troubleshooting
When a message matches the scope of multiple journal rules, all matching rules will be
triggered.
If the matching rules are configured with different journal mailboxes, a journal
report will be sent to each journal mailbox.
If the matching rules are all configured with the same journal mailbox, only one
journal report is sent to the journal mailbox.
Journaling always identifies messages as internal if the email address in the SMTP MAIL
FROM command is in a domain that's configured as an accepted domain in Exchange
Online. These messages include spoofed messages from external sources (messages
where the X-MS-Exchange-Organization-AuthAs header value is also Anonymous).
Therefore, journal rules that are scoped to external messages won't be triggered by
spoofed messages with SMTP MAIL FROM email addresses in accepted domains.
1. Cloud to cloud: Any situations where email is forked will lead to duplicate
journaling, such as:
Having problems? Ask for help in the Exchange forums. Visit the forums at Exchange
Online or Exchange Online Protection .
If you're having trouble with the JournalingReportDNRTo mailbox, see Transport and
Mailbox Rules in Exchange Online don't work as expected .
Manage journaling in Exchange Online
Article • 02/22/2023
This article shows you how to perform basic tasks related to managing the older
compliance feature of journaling in Exchange Online. They're necessary only if you have
to store email outside Exchange Online. Make sure you're aware of the limitations and
considerations of this older feature before you configure any new journaling rules.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Journaling" entry in the
Feature permissions in Exchange Online article.
Currently, you can use either the Microsoft Purview compliance portal or the
Classic Exchange admin center (EAC) to manage journaling in Exchange Online.
In Exchange Online, there's a limit to the number of journal rules that you can
create. For details, see Journal, Transport, and Inbox rule limits.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection . If you're having trouble with
the JournalingReportDNRTo mailbox, see Transport and Mailbox Rules in
Exchange Online don't work as expected .
) Important
2. On the Define journal rule settings page, provide a name for the journal rule and
then complete the following fields:
Send journal reports to: Type the address of the journaling mailbox that will
receive all the journal reports.
7 Note
You can also type the display name or alias of a mail user or a mail
contact as the journal mailbox. In this case, journal reports will be sent to
the external email address of the mail user or mail contact. But as
previously explained, the external email address of a mail user or mail
contact can't be the address of an Exchange Online mailbox.
Journal rule name: Enter the name of this new journal rule.
Journal messages sent or received from: Specify the recipient that the rule
will target. You can either apply the rule to all messages, or select a specific
recipient.
Type of message to journal: Specify the scope of the journal rule. You can
journal all messages regardless of origin or destination, internal messages
only, or external messages only.
3. Select Next, review the settings, and then Submit to create the journal rule.
2. In Journal rule, provide a name for the journal rule and then complete the
following fields:
If the message is sent to or received from: Specify the recipient that the rule
will target. You can either select a specific recipient or apply the rule to all
messages.
Journal the following messages: Specify the scope of the journal rule. You
can journal only the internal messages, only the external messages, or all
messages regardless of origin or destination.
Send journal reports to: Type the address of the journaling mailbox that will
receive all the journal reports.
7 Note
You can also type the display name or alias of a mail user or a mail
contact as the journal mailbox. In this case, journal reports will be sent to
the external email address of the mail user or mail contact. But as
previously explained, the external email address of a mail user or mail
contact can't be the address of an Exchange Online mailbox.
PowerShell
From the admin portal you used to create the journaling rule, verify that the new
journal rule you created is listed on the Journal rules tab.
From Exchange Online PowerShell, verify that the new journal rule exists by
running the following command (the example below verifies the rule created in
Exchange Online PowerShell example above):
PowerShell
Get-JournalRule -Identity "Discovery Journal Recipients"
2. In the list view, you'll see all the journal rules in your organization.
3. Select the rule you want to view or modify, and select Edit.
4. On the Define journal rule settings page, modify the settings you want, select
Next, and Submit. For more information about the settings, see the previous
procedure to create a journal rule.
2. In the list view, you'll see all the journal rules in your organization.
4. In Journal Rule, modify the settings you want. For more information about the
settings in this dialog box, see the previous procedure to create a journal rule.
PowerShell
Get-JournalRule
This example retrieves the journal rule Brokerage Journal Rule, and pipes the output to
the Format-List command to display rule properties in a list format:
PowerShell
If you want to modify the properties of a specific rule, you need to use the Set-
JournalRule cmdlet. This example changes the name of the journal rule JR-Sales to
TraderVault . The following rule settings are also changed:
Recipient
JournalEmailAddress
Scope
PowerShell
From the admin portal where you modified the journal rule, on the Journal rules
tab, double-click the rule you modified and verify your changes were saved.
From Exchange Online PowerShell, verify that you modified the journal rule
successfully by running the following command. This command will list the
properties you modified along with the name of the rule (the example below
verifies the rule modified in Exchange Online PowerShell example above):
PowerShell
) Important
When you disable a journal rule, the journaling agent will stop journaling messages
targeted by that rule. While a journal rule is disabled, any messages that would
have normally been journaled by the rule aren't journaled. Make sure that you
don't compromise the regulatory or compliance requirements of your organization
by disabling a journaling rule.
2. In the list view, next to the rule's name, select the check box and then select
Disable or Enable to enable the rule or disable the rule.
2. In the list view, in the On column next to the rule's name, select the check box to
enable the rule or clear it to disable the rule.
PowerShell
PowerShell
From the Microsoft Purview compliance portal, view the list of journal rules and
use the Status column to confirm whether the rule is enabled (On) or disabled
(Off).
From the Classic EAC, view the list of journal rules check the status of the check
box in the On column.
From Exchange Online PowerShell, run the following command to return a list of
all journal rules in your organization along, including their status:
PowerShell
2. In the list view, select the rule you want to remove, and then select Delete.
2. In the list view, select the rule you want to remove, and then click Delete .
PowerShell
From the admin portal you used, verify that the rule you removed is no longer
listed on the Journal rules tab after you've refreshed the page.
From Exchange Online PowerShell, run the following command to verify that the
rule you removed is no longer listed:
PowerShell
Get-JournalRule
Get-JournalRule
Set-JournalRule
Enable-JournalRule
Disable-JournalRule
Remove-JournalRule
Configure Journaling in Exchange
Online
Article • 02/22/2023
Journaling is an older compliance feature of Exchange that allows you to meet your
organization's archiving requirements when you must store emails outside Exchange
Online.
You can create journal rules and have messages matching the rule's conditions delivered
to the journaling address specified in the rule. For more information about journaling,
including the limitations and considerations for using this older feature, see Journaling
in Exchange Online.
Here are two things you need to know before you start creating journal rules.
) Important
The original journal report is an attachment in the NDR. When the journaling mailbox
for an undelivered journal report becomes available again, you can use the Send Again
feature in Outlook on the NDRs in the alternate journaling mailbox to send the
unaltered delivery report to the journaling mailbox.
Enable or disable journaling of voice
mail and missed call notifications in
Exchange Online
Article • 02/22/2023
In Exchange Online, when you create a journal rule to journal email messages sent to or
from recipients or senders in an Exchange organization, voice mail and missed call
notifications generated by the Unified Messaging (UM) service are included. Use the
procedures in this topic to turn this feature on or off for your entire organization.
) Important
When voice mail journaling is disabled, the following messages classes won't be
journaled. It's important to be aware that messages that are "spoofed" using these
message classes will not be journaled.
text
"IPM.Note.Microsoft.Voicemail.UM"
"IPM.Note.Microsoft.Voicemail.UM.CA"
"IPM.Note.Microsoft.Missed.Voice"
"IPM.Note.rpmsg.Microsoft.Voicemail.UM.CA"
"IPM.Note.rpmsg.Microsoft.Voicemail.UM"
Use PowerShell to disable or enable journaling of voice mail and missed call
notifications. For information about how to connect to Exchange Online PowerShell, see
Connect to Exchange Online PowerShell.
The following command disables journaling of voice mail and missed call notifications
by setting the VoicemailJournalingEnabled parameter to $false .
PowerShell
PowerShell
The rest of this article generally describes S/MIME and how these services work.
Data integrity: An additional security service that digital signatures provide is data
integrity. Data integrity is a result of the specific operations that make digital
signatures possible. With data integrity services, when the recipient of a digitally
signed email message validates the digital signature, the recipient is assured that
the email message that is received is, in fact, the same message that was signed
and sent, and has not been altered while in transit. Any alteration of the message
while in transit after it has been signed invalidates the signature. In this way, digital
signatures provide an assurance that signatures on paper cannot, because it is
possible for a paper document to be altered after it has been signed.
) Important
S/MIME encryption
Message encryption provides a solution to information disclosure. SMTP-based internet
email does not secure messages. An SMTP internet email message can be read by
anyone who sees it as it travels or views it where it is stored. These problems are
addressed by S/MIME using encryption. Encryption is a way to change information so
that it cannot be read or understood until it is changed back into a readable and
understandable form. Message encryption provides two specific security services:
Transport Layer Security (TLS) which replaces Secure Sockets Layer (SSL):
Encrypts the tunnel or the route between email servers in order to help prevent
snooping and eavesdropping.
Encrypts the connection between email clients and email servers.
BitLocker: Encrypts data on hard drives in client computers and servers. If an
unauthorized party somehow gains access, they can't read the data on the drives.
Microsoft Purview Message Encryption is a direct competitor to S/MIME, and has the
following advantages over S/MIME:
S/MIME is available in Exchange Online with the following types of email clients:
Outlook on the web (formerly known as Outlook Web App) on Windows clients.
For more information, see Encrypt messages by using S/MIME in Outlook on the
web .
7 Note
Sensitive policy actions are applied on the server backend, while S/MIME
signing and/or encryption is done in the Outlook on the web client. Because
of this architectural constraint, S/MIME is disabled in Outlook on the web in
messages where there are sensitivity labels with protection actions.
Mobile devices (for example, Outlook for iOS and Android, Exchange ActiveSync
apps or native email apps).
As an Exchange Online admin, you can enable S/MIME-based security for the mailboxes
in your organization. The high-level steps are described in the following list and are
expanded upon in this article:
For end-to-end S/MIME configuration instructions for Outlook for iOS and Android, see
S/MIME for Outlook for iOS and Android.
For more information about Active Directory, see Active Directory Domain Services
Overview.
Notes:
2. Publish the user's certificate in their on-premises Active Directory account in the
UserSMIMECertificate and/or UserCertificate attributes.
1. Export the root and intermediate certificates that are required to validate user
S/MIME certificates from a trusted machine to a serialized certificate store (SST) file
in Windows PowerShell. For example:
PowerShell
Get-ChildItem -Path cert:\<StoreCertPath> | Export-Certificate -
FilePath "C:\My Documents\Exported Certificate Store.sst" -Type SST
2. Import the certificates from the SST file into Exchange Online by running the
following command in Exchange Online PowerShell:
PowerShell
Set-SmimeConfig -SMIMECertificateIssuingCA
([System.IO.File]::ReadAllBytes('C:\My Documents\Exported Certificate
Store.sst'))
1. Issue certificates and publish them in your local Active Directory. For more
information, see Active Directory Certificate Services Overview.
2. After your certificates are published, use Azure AD Connect to synchronize user
data from your on-premises Exchange environment to Microsoft 365. For more
information on this process, see Azure AD Connect sync: Understand and
customize synchronization.
Along with synchronizing other directory data, Azure AD Connect synchronizes the
userCertificate and userSMIMECertificate attributes for each user object for S/MIME
signing and encryption of email messages. For more information about Azure AD
Connect, see What is Azure AD Connect?.
Specifically, you need to set and configure the policy named ExtensionInstallForcelist to
install the S/MIME extension in the browser. The policy value is
maafgiompdekodanheihhgilkjchcakm;https://outlook.office.com/owa/SmimeCrxUpdate.ash
x . Applying this policy requires domain-joined or Azure AD-joined devices, so using
ExtensionInstallForcelist - Edge
ExtensionInstallForcelist - Chrome
The policy is a prerequisite for using S/MIME in Outlook on the web. It does not replace
the S/MIME control that's installed by users. Users are prompted to download and
install the S/MIME control in Outlook on the web during their first use of S/MIME. Or,
users can proactively go to S/MIME in their Outlook on the web settings to get the
download link for the control.
For more information about S/MIME in email clients, see the following topics:
Outlook: See the "Encrypting with S/MIME" section in Encrypt email messages .
Outlook for iOS and Android: Enabling S/MIME in the client
Mail in iOS: Use S/MIME to send encrypted messages in an Exchange environment
in iOS
You can also use the following parameters on the New-MobileDeviceMailboxPolicy and
Set-MobileDeviceMailboxPolicy cmdlets in Exchange Online PowerShell to configure
S/MIME settings for mobile devices:
AllowSMIMEEncryptionAlgorithmNegotiation
AllowSMIMESoftCerts
RequireEncryptedSMIMEMessages
RequireEncryptionSMIMEAlgorithm
RequireSignedSMIMEAlgorithm
RequireSignedSMIMEMessages
S/MIME for Outlook for iOS and
Android in Exchange Online
Article • 02/22/2023
To leverage S/MIME in Outlook for iOS and Android, you need to configure specific
S/MIME prerequisite in Exchange Online. After you have completed those steps, you can
deploy S/MIME certificates to Outlook for iOS and Android using the following
methods:
This article describes how to configure Exchange Online for S/MIME using Outlook for
iOS and Android, and how to use S/MIME in Outlook for iOS and Android.
S/MIME prerequisites
Ensure S/MIME has been properly configured in Exchange Online by following the steps
outlined in Configure S/MIME in Exchange Online. Specifically, this includes:
In manual and automated certificate delivery solutions, it's expected that the certificate's
trusted root chain is available and discoverable within your Exchange Online tenant's
virtual certificate collection. Trust verification is performed on all digital certificates.
Exchange Online validates the certificate by validating each certificate in the certificate
chain until it reaches a trusted root certificate. This verification is done by obtaining the
intermediate certificates through the authority information access attribute in the
certificate until a trusted root certificate is located. Intermediate certificates can also be
included with digitally signed email messages. If Exchange Online locates a trusted root
certificate and can query the certificate revocation list for the certificate authority, the
digital certificate's chain for that digital certificate is considered valid and trusted and
can be used. If Exchange Online fails to locate a trusted root certificate or fails to contact
the certificate revocation list for the certificate authority, that certificate is considered
invalid and is not trusted.
Outlook for iOS and Android leverages the user's primary SMTP address for mail flow
activities, which is configured during account profile setup. The S/MIME certificate used
by Outlook for iOS and Android is calculated by comparing the user's primary SMTP
address as defined in the account profile with the certificate's subject value or the
subject alternative name value; if these do not match, then Outlook for iOS and Android
will report that a certificate is not available (see Figure 7) and will not allow the user to
sign and/or encrypt messages.
A user can export their own certificate and mail it to themselves using Outlook. For
more information, see Exporting a digital certificate .
) Important
When exporting the certificate, ensure that the exported certificate is password-
protected with a strong password.
Outlook for iOS and Android only supports automated certificate delivery
when Microsoft Endpoint Manager is the enrollment provider.
For Outlook for iOS, this is due to the iOS keychain architecture. iOS offers a
system keychain and publisher keychains. iOS prevents third-party apps from
accessing the system keychain (only first-party apps and the Safari webview
controller can access the system keychain). In order to deliver certificates that
can be accessed by Outlook for iOS, the certificates must reside in the
Microsoft publisher keychain to which Outlook for iOS has access. Only
Microsoft published apps, like the Company Portal, can place certificates into
the Microsoft publisher keychain.
Outlook for Android relies on Endpoint Manager to deliver and approve the
S/MIME certificates. Automatic certificate delivery is supported with Android
enrollment scenarios: device administrator, Android Enterprise work profile,
and Android Enterprise fully managed.
With Endpoint Manager, organizations can import encryption certificate histories from
any Certification Authority. Endpoint Manager will then automatically deliver those
certificates to any device that the user enrolls. Generally, Simple Certificate Enrollment
Protocol (SCEP) is used for signing certificates. With SCEP, the private key is generated
and stored on the enrolled device and a unique certificate is delivered to each device
that a user enrolls, which can be used for non-repudiation. Lastly, Endpoint Manager
supports derived credentials for customers who need support for the NIST 800-157
standard. The Company Portal is used to retrieve signing and encryption certificates
from Intune.
In order to deliver certificates to Outlook for iOS and Android, you must complete the
following prerequisites:
Deploy trusted root certificates via Endpoint Manager. For more information, see
Create trusted certificate profiles.
Encryption certificates must be imported into Endpoint Manager. For more
information, see Configure and use imported PKCS certificates with Intune.
Install and Configure the PFX Connector for Microsoft Intune. For more
information, see Download, install, and configure the PFX Certificate Connector for
Microsoft Intune.
Devices must be enrolled to receive trusted root and S/MIME certificates
automatically from Endpoint Manager.
3. On the App Configuration policies blade, choose Add and select Managed
devices to start the app configuration policy creation flow.
4. On the Basics section, enter a Name, and optional Description for the app
configuration settings.
6. For Targeted app, choose Select app, and then, on the Associated app blade,
choose Microsoft Outlook. Click OK.
7 Note
If Outlook is not listed as an available app, then you must add it by following
the instructions in Assign apps to Android work profile devices with Intune
and Add iOS store apps to Microsoft Intune.
9. Set Enable S/MIME to Yes. When selecting Yes or No, administrators can choose to
allow the user to change the app setting's value. Select Yes (app default) to allow
the user to change the setting or choose No if you want to prevent the user from
changing the setting's value.
10. Choose whether to Encrypt all emails by selecting Yes or No. When selecting Yes
or No, administrators can choose to allow the user to change the app setting's
value. Select Yes (app default) to allow the user to change the setting or choose
No if you want to prevent the user from changing the setting's value.
11. Choose whether to Sign all emails by selecting Yes or No. When selecting Yes or
No, administrators can choose to allow the user to change the app setting's value.
Select Yes (app default) to allow the user to change the setting or choose No if you
want to prevent the user from changing the setting's value.
12. If needed, deploy a LDAP URL for recipient certificate lookup. For more
information on the URL format, see LDAP support for certificate lookup.
SCEP: Creates a certificate that is unique for the device and user that can be
used by Microsoft Outlook for signing. For information on what is required to
use SCEP certificate profiles, see Configure infrastructure to support SCEP
with Intune.
PKCS imported certificates: Uses a certificate that is unique to the user, but
may be shared across devices and has been imported to Endpoint Manager
by the administrator on behalf of the user. The certificate is delivered to any
device that a user enrolls. Endpoint Manager will automatically pick the
imported certificate that supports signing to deliver to the device that
corresponds to the enrolled user. For information on what is required to use
PKCS imported certificates, see Configure and use PKCS certificates with
Intune.
Derived credentials: Uses a certificate that is already on the device that can
be used for signing. The certificate must be retrieved on the device using the
derived credentials flows in Intune.
15. Under Encryption certificates next to Certificate profile type, choose one of the
following options:
16. Next to End-user notifications, choose how to notify end users to retrieve the
certificates by selecting Company Portal or Email.
On iOS, users must use the Company Portal app to retrieve their S/MIME
certificates. Endpoint Manager will inform the user that they need to launch the
Company Portal to retrieve their S/MIME certificates via the Notifications section of
Company Portal, a push notification, and/or an email. Clicking one of the
notifications will take the user to a landing page that informs them of progress
retrieving the certificates. Once the certificates are retrieved, the user can use
S/MIME from within Microsoft Outlook for iOS to sign and encrypt email.
End-users will see an experience similar to the following for automated certificate
delivery:
17. Select Assignments to assign the app configuration policy to the Azure AD groups.
For more information, see Assign apps to groups with Microsoft Intune.
2. Create a SCEP certificate profile or PKCS certificate profile and assign it to your
mobile users.
4. On the App Configuration policies blade, choose Add and select Managed
devices to start the app configuration policy creation flow.
5. On the Basics section, enter a Name, and optional Description for the app
configuration settings.
6. For Platform, choose Android Enterprise and for Profile Type, choose All Profile
Types.
7. For Targeted app, choose Select app, and then, on the Associated app blade,
choose Microsoft Outlook. Click OK.
7 Note
If Outlook is not listed as an available app, then you must add it by following
the instructions in Assign apps to Android work profile devices with Intune
and Add iOS store apps to Microsoft Intune.
10. Set Enable S/MIME to Yes. When selecting Yes or No, administrators can choose to
allow the user to change the app setting's value. Select Yes (app default) to allow
the user to change the setting or choose No if you want to prevent the user from
changing the setting's value.
11. Choose whether to Encrypt all emails by selecting Yes or No. When selecting Yes
or No, administrators can choose to allow the user to change the app setting's
value. Select Yes (app default) to allow the user to change the setting or choose
No if you want to prevent the user from changing the setting's value.
12. Choose whether to Sign all emails by selecting Yes or No. When selecting Yes or
No, administrators can choose to allow the user to change the app setting's value.
Select Yes (app default) to allow the user to change the setting or choose No if you
want to prevent the user from changing the setting's value.
13. Select Assignments to assign the app configuration policy to the Azure AD groups.
For more information, see Assign apps to groups with Microsoft Intune.
End users will need to enable S/MIME functionality manually by accessing their account
settings, tapping Security, and tapping the S/MIME control, which is off by default. The
Outlook for iOS S/MIME security setting looks like the following:
When the S/MIME setting is enabled, Outlook for iOS and Android will automatically
disable the Organize By Thread setting. This is because S/MIME encryption becomes
more complex as a conversation thread grows. By removing the threaded conversation
view, Outlook for iOS and Android reduces the opportunity for issues with certificates
across recipients during signing and encryption. As this is an app-level setting, this
change affects all accounts added to the app. This threaded conversation dialog is
rendered in iOS as follows:
Once S/MIME is enabled and the S/MIME certificates are installed, users can view the
installed certificates by accessing their account settings and tapping Security.
Furthermore, users can tap on each individual S/MIME certificate and view the
certificate's details, including information like key usage and the validity period.
Users can configure Outlook to automatically sign or encrypt messages. This allows
users to save time sending email while being confident that their emails are being
signed/encrypted.
ldap://contoso.com
ldap://contoso.com:389
ldaps://contoso.com:636
contoso.com
contoso.com:389
contoso.com:636
When Outlook for iOS and Android performs a certificate lookup for a recipient, the app
will search the local device first, then query Azure Active Directory, and then evaluate
any LDAP directory endpoint. When Outlook for iOS and Android connects to the LDAP
directory endpoint to search for a recipient's public certificate, certificate validation is
performed to ensure that the certificate is not revoked. The certificate is only considered
valid by the app if certificate validation completes successfully.
) Important
In order to read an encrypted message, the recipient's private certificate key must
be available on the device.
Users can install a sender's public certificate key by tapping the S/MIME status bar. The
certificate will be installed on the user's device, specifically in the Microsoft publisher
keychain in iOS or the system KeyStore in Android . The Android version appears
similar to the following:
If there are certificate errors, Outlook for iOS and Android will warn the user. The user
can tap the S/MIME status bar notification to view more information about the
certificate error, such as in the following example.
Outlook for iOS and Android can send S/MIME signed and encrypted messages to
distribution groups. Outlook for iOS and Android enumerates the certificates for the
users defined in the distribution group, including those in nested distribution groups,
though care should be taken on limiting the number of nested distribution groups to
minimize the processing impact.
) Important
Outlook for iOS and Android only supports sending clear-signed messages.
In order to compose an encrypted message, the target recipient's public
certificate key must be available either in the Global Address List or stored on
the local device. In order to compose a signed message, the sender's private
certificate key must be available on the device.
On-premises Lync Server 2010 and Lync Server 2013 can interoperate with Exchange
Online in two additional ways:
For more information about how to configure Skype for Business Server 2015 with
Exchange Online, see Configuring On-premises Skype for Business Server 2015
Integration with Exchange Online. For hybrid configurations, see Supported Skype for
Business Server 2015 hybrid configurations.
Through messaging protocols such as MAPI over HTTP, SMTP, POP3, IMAP4, or
Exchange Web Services External applications that are running on-premises, in
Azure, or in other hosted services can access data stored with Exchange Online by
using messaging protocols such as MAPI over HTTP, SMTP, POP3, and IMAPv4.
Exchange Web Services or the Exchange Web Services Managed API is
recommended for application development.
SMTP relay
Exchange Online can be used as an SMTP delivery service to relay email messages sent
from fax gateways, network appliances, and custom applications. For example, if a line-
of-business application sends email alerts to users, it can be configured to use Exchange
Online as the mail delivery system. The application or service must authenticate with the
username and password of a valid, licensed Exchange Online mailbox, and connect by
using Transport Layer Security (TLS).
Feature availability
To view feature availability across plans, standalone options, and on-premises solutions,
see Exchange Online service description.
Mail flow rules (transport rules) in
Exchange Online
Article • 02/22/2023
) Important
Effective from December 2022, the classic Exchange Admin Center will be
deprecated for worldwide customers. Microsoft recommends using the new
Exchange Admin Center , if not already doing so.
While most of the features have been migrated to new EAC, some have been
migrated to other admin centers and remaining ones will soon be migrated to New
EAC. Find features that are not yet there in new EAC at Other Features or use
Global Search that will help you navigate across new EAC.
7 Note
Mail flow rules are similar to the Inbox rules that are available in Outlook and Outlook
on the web (formerly known as Outlook Web App). The main difference is mail flow rules
take action on messages while they're in transit, not after the message is delivered to
the mailbox. Mail flow rules contain a richer set of conditions, exceptions, and actions,
which provides you with the flexibility to implement many types of messaging policies.
This article explains the components of mail flow rules, and how they work.
For steps to create, copy, and manage mail flow rules, see Manage mail flow rules. For
each rule, you have the option of enforcing it, testing it, or testing it and notifying the
sender. To learn more about the testing options, see Test mail flow rules in Exchange
Online and Policy Tips (policy tips aren't available in standalone EOP).
For summary and detail reports about messages that matched mail flow rules, see Use
mail protection reports to view data about malware, spam, and rule detections.
To implement specific messaging policies by using mail flow rules, see Mail flow rule
procedures in Exchange Online.
Conditions: Identify the messages that you want to apply the actions to. Some
conditions examine message header fields (for example, the To, From, or Cc fields).
Other conditions examine message properties (for example, the message subject,
body, attachments, message size, or message classification). Most conditions
require you to specify a comparison operator (for example, equals, doesn't equal,
or contains) and a value to match.
7 Note
If you create a rule without conditions and exceptions, the rule action is applied to
all messages. This can have unintended consequences. For example, if the rule
action is to delete the message, removing the conditions and exceptions could
cause the rule to delete all inbound and outbound messages for the entire
organization.
For more information about mail flow rule conditions in Exchange Online, see Mail flow
rule conditions and exceptions (predicates) in Exchange Online.
Exceptions: Optionally identify the messages that the actions shouldn't apply to.
The same message identifiers that are available in conditions are also available in
exceptions. Exceptions override conditions and prevent the rule actions from being
applied to a message, even if the message matches all of the configured
conditions.
Actions: Specify what to do to messages that match the conditions in the rule, and
don't match any of the exceptions. There are many actions available, such as
rejecting, deleting, or redirecting messages, adding additional recipients, adding
prefixes in the message subject, or inserting disclaimers in the message body.
For more information about mail flow rule actions that are available in Exchange
Online, see Mail flow rule actions in Exchange Online.
For more information, see the Mail flow rule properties section in this article.
Multiple AND A message must match all the conditions in the rule. If you need to match
conditions one condition or another, use separate rules for each condition. For
example, if you want to add the same disclaimer to messages with
attachments and messages that contain specific text, create one rule for
each condition. In the EAC, you can easily copy a rule.
One OR Some conditions allow you to specify more than one value. The message
condition must match any one (not all) of the specified values. For example, if an
with email message has the subject Stock price information, and the The
multiple subject includes any of these words condition is configured to match the
values words Contoso or stock, the condition is satisfied because the subject
contains at least one of the specified values.
Multiple OR If a message matches any one of the exceptions, the actions are not
exceptions applied to the message. The message doesn't have to match all the
exceptions.
Component Logic Comments
Multiple AND Messages that match a rule's conditions get all the actions that are
actions specified in the rule. For example, if the actions Prepend the subject of
the message with and Add recipients to the Bcc box are selected, both
actions are applied to the message.
Keep in mind that some actions (for example, the Delete the message
without notifying anyone action) prevent subsequent rules from being
applied to a message. Other actions (for example, the Forward the
message) don't allow additional actions.
You can also set an action on a rule so that when that rule is applied,
subsequent rules are not applied to the message.
Priority Priority Indicates the order that the rules are applied to
messages. The default priority is based on when the rule
is created (older rules have a higher priority than newer
rules, and higher priority rules are processed before
lower priority rules).
You change the rule priority in the EAC by moving the
rule up or down in the list of rules. In the PowerShell, you
set the priority number (0 is the highest priority).
Audit this SetAuditSeverity Sets the severity level of the incident report and the
rule with corresponding entry that's written to the message
severity tracking log when messages violate DLP policies. Valid
level values are DoNotAudit, Low, Medium, and High.
Property Parameter name in Description
name in the PowerShell
EAC
Mode Mode You can specify whether you want the rule to start
processing messages immediately, or whether you want
to test rules without affecting the delivery of the
message (with or without Data Loss Prevention or DLP
Policy Tips).
Policy Tips present a brief note in Outlook or Outlook on
the web that provides information about possible policy
violations to the person that's creating the message. For
more information, see Policy Tips.
Activate this ActivationDate Specifies the date range when the rule is active.
rule on the ExpiryDate
following
date
Deactivate
this rule on
the
following
date
On check New rules:Enabled You can create a disabled rule, and enable it when you're
box selected parameter on the ready to test it. Or, you can disable a rule without
or not New-TransportRule deleting it to preserve the settings.
selected cmdlet.
Existing rules: Use the
Enable-TransportRule
or Disable-
TransportRule
cmdlets.
Defer the RuleErrorAction You can specify how the message should be handled if
message if the rule processing can't be completed. By default, the
rule rule will be ignored, but you can choose to resubmit the
processing message for processing.
doesn't
complete
Property Parameter name in Description
name in the PowerShell
EAC
Match SenderAddressLocation If the rule uses conditions or exceptions that examine the
sender sender's email address, you can look for the value in the
address in message header, the message envelope, or both.
message
Stop StopRuleProcessing This is an action for the rule, but it looks like a property
processing in the EAC. You can choose to stop applying additional
more rules rules to a message after a rule processes a message.
Comments Comments You can enter descriptive comments about the rule.
Each rule also offers the option of stopping processing more rules when the rule is
matched. This setting is important for messages that match the conditions in multiple
mail flow rules (which rule do you want applied to the message? All? Just one?).
Message Encryption: Messages Rules can always access envelope headers and process
encrypted by Message Encryption in messages based on conditions that inspect those
Microsoft 365 or Office 365. For more headers.
information, see Encryption. For a rule to inspect or modify the contents of an
encrypted message, you need to verify that transport
decryption is enabled (Mandatory or Optional; the
default is Optional). For more information, see Enable or
disable transport decryption.
S/MIME encrypted messages Rules can only access envelope headers and process
messages based on conditions that inspect those
headers.
Rules with conditions that require inspection of the
message's content, or actions that modify the message's
content can't be processed.
RMS protected messages: Messages Rules can always access envelope headers and process
that had an Active Directory Rights messages based on conditions that inspect those
Management Services (AD RMS) or headers.
Azure Rights Management (RMS) For a rule to inspect or modify the contents of an RMS
policy applied. protected message, you need to verify that transport
decryption is enabled (Mandatory or Optional; the
default is Optional). For more information, see Enable or
disable transport decryption.
The mail flow rules UX in the new EAC has been enhanced and modernized. This
updated experience is consistent with the new EAC design and will enable easier rule
management. The new Mail Flow Rules landing page now exposes more rule details;
therefore, you can immediately get more insight into your rule configurations. The new
UX also walks you through the process of creating a rule to simplify the rule creation
experience. You'll find that most of the functionality remains the same, so these Updates
in UX don't interrupt your workflow and allow for a smoother transition.
Updates in UX
The following updates have taken place in the mail flow rules section in the new EAC:
1. Rule creation wizard: This new wizard experience will be used to create new rules.
The wizard walks you through configuration of all your rule conditions and settings
with a step-by-step approach to help avoid misconfiguring the rules.
2. Rules will be disabled upon creation: If you want the rule to be turned on, enable
it from the Details panel by selecting and enabling the rule.
3. The status of the Stop rule processing setting is displayed on the landing page.
Use this setting to avoid applying more rules once this rule (the created rule)
processes a message. The display of this setting on the landing page enables you
to know when this setting is turned on for a rule as this setting can affect more
rules from processing.
3. In the Rule Creation wizard, enter a name for the new rule in the Name dialog box,
and then select the conditions and actions for this rule.
From the See the rule if dropdown list (in which you'll see all the possible
conditions you can set for your rule), select the condition you want.
7 Note
In the new Rule Creation wizard, conditions are constructed in the same
way as the "More options" conditions in the classic EAC.]
Most conditions will require you to make a selection using both the side-
by-side dropdown lists. Select the rule condition subject from the first
dropdown list and you'll be able to see all your possible rule options in the
second dropdown list. For example, if you select The sender is.. from the
first dropdown list, then you'll have a list of options in the second
dropdown list from which you select one to complete the condition, as
shown in the preceding screenshot. Furthermore, some conditions will
require you to specify values. For example, if you select the The sender is
this person... condition, you'll need to select a recipient in your
organization.
If you don't want to specify a condition and want this rule to apply to
every message in your organization, select the Apply to all messages
condition.
As you configure your conditions, the description below the dropdown
lists will update as well.
From the Do the following dropdown list, select the action you want the rule
to take on messages matching the criteria.
Most of the actions follow the same structure as the conditions. There are
two dropdown lists, so you can select from the variety of actions available.
Some of the actions will require you to specify values. For example, if you
select the Forward the message for approval to these people action,
you'll need to select a recipient in your organization.
To add more conditions, select + beside the dropdown lists. You can remove
any one of them by selecting the trash bin icon next to it.
To add more actions, select Add action. You can remove any one of them by
selecting the trash bin icon next to it.
From the Except if dropdown list, select the exceptions you want the rule to
take on.You can remove any exceptions from the rule by selecting the trash
bin icon next to it.
7 Note
4. After you're done configuring your rule conditions, select Next to configure your
rule settings.
Specify how the rule-match data for this rule is displayed in the Data Loss
Prevention (DLP) reports and the Mail protection reports.
Under Audit this rule with severity level, select a level to specify the
severity for this rule. The activity reports for mail flow rules group the rule-
matches by severity level. The severity level is just a filter to make the
reports easier to use. The severity level has no impact on the priority in
which the rule is processed.
7 Note
If you uncheck the Audit this rule with severity level checkbox, rule-
matches will not show up in the rule reports.
Set the mode for the rule. You can use one of the two test modes to test the
rule without impacting mail flow. In both test modes, when the conditions are
met, an entry is added to the message trace.
Enforce: This mode turns on the rule and it starts processing messages
immediately. All actions on the rule will be performed.
Test with Policy Tips: This mode turns on the rule, and any Policy Tip
actions (Notify the sender with a Policy Tip) will be sent, but no actions
related to message delivery will be performed. Data loss prevention (DLP)
is required to use this mode. For more information, see Policy Tips.
Test without Policy Tips: Only the "Generate incident report" action will be
enforced. No actions related to message delivery are performed.
If you want to be deactivated only on a specific date:
Select Activate this rule on the following date: and specify a date. The
rule will still be enabled prior to that date, but it won't be processed.
Similarly, you can have the rule stopped from being processed on a certain
date. To do so, select Deactivate this rule on the following date: and
specify a date. The rule will remain enabled, but it won't be processed.
You can choose to avoid applying more rules once this rule processes a
message. To do so, select Stop processing more rules. If you select this
option, and a message is processed by this rule, no subsequent rules are
processed for that message.
You can specify how the message should be handled if the rule processing
can't be completed. By default, the rule will be ignored, and the message will
be processed regularly, but you can choose to resubmit the message for
processing. To do so, check the Defer the message if rule processing doesn't
complete checkbox.
If your rule analyzes the sender's address, it only examines the message
headers by default. However, you can configure your rule to also examine
the SMTP message envelope. To specify what is to be examined, select one
of the following values for the Match sender address parameter in
message:
Header: Only the message headers will be examined.
Envelope: Only the SMTP message envelope will be examined.
Header or envelope: Both the message headers and SMTP message
envelope will be examined.
You can add comments to this rule in the Comments box.
5. Select Next if you're satisfied with the rule settings that have been configured.
For the final step of the rule creation process, look over the description to see
all the conditions, actions, exceptions, and settings that you've configured for
the rule.
Once you're satisfied with all your selections, select Finish.
All rules will be defaulted to Off upon creation. If you wish to enable your rule, then
select the rule from the mail flow rules landing page and turn on your rule from the
Details panel.
Mail flow rule conditions and exceptions
(predicates) in Exchange Online
Article • 05/31/2023
Conditions and exceptions in mail flow rules (also known as transport rules) identify the messages that the
rule is applied to or not applied to. For example, if the rule adds a disclaimer to messages, you can configure
the rule to only apply to messages that contain specific words, messages sent by specific users, or to all
messages except those sent by the members of a specific distribution group. Collectively, the conditions and
exceptions in mail flow rules are also known as predicates, because for every condition, there's a
corresponding exception that uses the exact same settings and syntax. The only difference is conditions
specify messages to include, while exceptions specify messages to exclude.
Most conditions and exceptions have one property that requires one or more values. For example, the The
sender is condition requires the sender of the message. Some conditions have two properties. For example,
the A message header includes any of these words condition requires one property to specify the message
header field, and a second property to specify the text to look for in the header field. Some conditions or
exceptions don't have any properties. For example, the Any attachment has executable content condition
simply looks for attachments in messages that have executable content.
For more information about mail flow rules in Exchange Online, including how multiple
conditions/exceptions or multi-valued conditions/exceptions are handled, see Mail flow rules (transport
rules) in Exchange Online.
Senders
Recipients
Attachments
Any recipients
Message sensitive information types, To and Cc values, size, and character sets
Message properties
Message headers
Notes:
After you select a condition or exception in the Exchange admin center (EAC), the value that's
ultimately shown in the Apply this rule if or Except if field is often different (shorter) than the click
path value you selected. Also, when you create new rules based on a template (a filtered list of
scenarios), you can often select a short condition name instead of following the complete click path.
The short names and full click path values are shown in the EAC column in the tables.
If you select [Apply to all messages] in the EAC, you can't specify any other conditions. The equivalent
in PowerShell is to create a rule without specifying any condition parameters.
The settings and properties are the same in conditions and exceptions, so the output of the Get-
TransportRulePredicate cmdlet doesn't list exceptions separately. Also, the names of some of the
predicates that are returned by this cmdlet are different than the corresponding parameter names, and
a predicate might require multiple parameters.
Senders
For conditions and exceptions that examine the sender's address, you can specify where rule looks for the
sender's address.
In the EAC, in the Properties of this rule section, click Match sender address in message. Note that you
might need to click More options to see this setting. In PowerShell, the parameter is SenderAddressLocation.
The available values are:
Header: Only examine senders in the message headers (From field). This is the default value.
Envelope: Only examine senders from the message envelope (the MAIL FROM value that was used in
the SMTP transmission, which is typically stored in the Return-Path field). Note that message envelope
searching is only available for the following conditions (and the corresponding exceptions):
The sender is (From)
The sender is a member of (FromMemberOf)
The sender address includes (FromAddressContainsWords)
The sender address matches (FromAddressMatchesPatterns)
The sender's domain is (SenderDomainIs)
Header or envelope ( HeaderOrEnvelope ) Examine senders in the message header and the message
envelope.
7 Note
In the automatic-forwarding scenario the sender address for forwarded mail is the original sender and
not the forwarder. To learn more, see A transport rule doesn't match if user mailbox rules
automatically forward messages
If you set -Headers, the sender will be user generated Auto-Reply message.
If you set -Envelope, the sender will be user who sent original message.
The sender has HasSenderOverride n/a Messages where the sender has
overridden the ExceptIfHasSenderOverride chosen to override a data loss
Policy Tip prevention (DLP) policy. For more
information about DLP policies,
The sender > has see Data loss prevention.
overridden the
Policy Tip Note: This condition/exception
isn't available in standalone
Exchange Online Protection (EOP)
environments.
Recipients
For conditions and exceptions that examine the recipient's address, you can specify where rule looks for the
recipient's address by using the RecipientAddressType parameter in PowerShell. Valid values are:
7 Note
If the Mail flow rule is configured to check for the recipient where the recipient is a distribution group,
the rule will not be matched. When the message is sent to a distribution group, the group will be
resolved to distinct users of that group before reaching Mail flow rules and instead check every
member of a group.
"subdomain.domain.com" will
be matched.
7 Note
The search for words or text patterns in the subject or other header fields in the message occurs after
the message has been decoded from the MIME content transfer encoding method that was used to
transmit the binary message between SMTP servers in ASCII text. You can't use conditions or exceptions
to search for the raw (typically, Base64) encoded values of the subject or other header fields in
messages.
The subject or body SubjectOrBodyContainsWords Words Messages that have the specified
includes ExceptIfSubjectOrBodyContainsWords words in the Subject field or
message body.
The subject or body >
subject or body
includes any of these
words
The subject or body SubjectOrBodyMatchesPatterns Patterns Messages where the Subject field
matches ExceptIfSubjectOrBodyMatchesPatterns or message body contain text
patterns that match the specified
The subject or body > regular expressions.
subject or body
matches these text
patterns
The subject includes SubjectContainsWords Words Messages that have the specified
ExceptIfSubjectContainsWords words in the Subject field.
The subject or body >
subject includes any
of these words
The subject matches SubjectMatchesPatterns Patterns Messages where the Subject field
ExceptIfSubjectMatchesPatterns contains text patterns that match
The subject or body > the specified regular expressions.
subject matches these
text patterns
Attachments
For more information about how mail flow rules inspect message attachments, see Use mail flow rules to
inspect message attachments in Exchange Online.
Tip
If you suspect that your rule is not working properly, first check which attachments the message
contains. To inspect which attachment/s the message contained during Mail flow rule evaluation, see
Test-TextExtraction.
Any
attachment >
content
includes any
of these
words
Any
attachment >
file name
matches these
text patterns
Any
attachment >
file extension
includes these
words
Any recipients
The conditions and exceptions in this section provide a unique capability that affects all recipients when the
message contains at least one of the specified recipients. For example, let's say you have a rule that rejects
messages. If you use a recipient condition from the Recipients section, the message is only rejected for those
specified recipients. For example, if the rule finds the specified recipient in a message, but the message
contains five other recipients. The message is rejected for that one recipient, and is delivered to the five
other recipients.
If you add a recipient condition from this section, that same message is rejected for the detected recipient
and the five other recipients.
Conversely, a recipient exception from this section prevents the rule action from being applied to all
recipients of the message, not just for the detected recipients.
7 Note
These conditions don't consider messages that are sent to recipient proxy addresses. They only match
messages that are sent to the recipient's primary email address.
These conditions are applied to all recipients in the current fork of the message only. If the message
was bifurcated by any other action (for example, anti-malware or an erlier mail flow rule), the action will
be applied on the matching fork only.
Notes:
The recipient conditions in this section do not consider messages that are sent to recipient proxy
addresses. They only match messages that are sent to the recipient's primary email address.
For more information about using Microsoft 365 groups with the recipient conditions in this section,
see the Addresses entry in the Property types section.
The message
> character
set name
includes any
Condition or Condition and exception parameters in Property type Description
exception in Exchange Online PowerShell
the EAC
of these
words
The manager of the ManagerForEvaluatedUser and First property: Messages where either a
sender or recipient ManagerAddress EvaluatedUser specified user is the
is ExceptIfManagerForEvaluatedUser and manager of the sender,
ExceptIfManagerAddress Second property: or a specified user is the
The sender and the Addresses manager of a recipient.
recipient > the
manager of the
sender or recipient
is this person
The sender's and ADAttributeComparisonAttribute and First property: Messages where the
any recipient's ADComparisonOperator ADAttribute specified Active
property compares ExceptIfADAttributeComparisonAttribute Directory attribute for
as and ExceptIfADComparisonOperator Second property: the sender and recipient
Evaluation either match or don't
The sender and the match.
recipient > the
sender and
recipient property
compares as
Message properties
Condition or Condition and exception Property type Description
exception in parameters in Exchange
the EAC Online PowerShell
The message WithImportance Importance Messages that are marked with the
importance is ExceptIfWithImportance specified Importance level.
set to
The message
properties >
include the
importance
level
Message headers
7 Note
The search for words or text patterns in the subject or other header fields in the message occurs after
the message has been decoded from the MIME content transfer encoding method that was used to
transmit the binary message between SMTP servers in ASCII text. You can't use conditions or exceptions
to search for the raw (typically, Base64) encoded values of the subject or other header fields in
messages.
Property types
The property types that are used in conditions and exceptions are described in the following table.
7 Note
ADAttribute Select from a predefined You can check against any of the following Active Directory attributes:
list of Active Directory City
attributes Company
Country
CustomAttribute1 - CustomAttribute15
Department
DisplayName
Email
FaxNumber
FirstName
HomePhoneNumber
Initials
LastName
Manager
MobileNumber
Notes
Office
OtherFaxNumber
OtherHomePhoneNumber
Property type Valid values Description
OtherPhoneNumber
PagerNumber
PhoneNumber
POBox
State
Street
Title
UserLogonName
ZipCode
In the EAC, to specify multiple words or text patterns for the same
attribute, separate the values with commas. For example, the value
San Francisco,Palo Alto for the City attribute looks for "City equals
San Francisco" or City equals Palo Alto".
When you specify multiple attributes, or multiple values for the same
attribute, the or operator is used. Don't use values with leading or
trailing spaces.
Note that the Country attribute requires the two-letter ISO 3166-1
country code value (for example, DE for Germany). For more
information, see Country Codes - ISO 3166 .
Addresses Exchange Online Depending on the nature of the condition or exception, you might be
recipients able to specify any mail-enabled object in the organization (for
example, recipient-related conditions), or you might be limited to a
specific object type (for example, groups for group membership
conditions). And, the condition or exception might require one value,
or allow multiple values.
In Exchange Online PowerShell, separate multiple values by commas.
The recipient picker in the EAC doesn't allow you to select Microsoft
365 groups from the list of recipients. But, you can enter the email
address of a Microsoft 365 group in the box next to Check names,
and then validate the email address by clicking Check names, which
will add the group to the add box.
CharacterSets Array of character set One or more content character sets that exist in a message. For
names example:
Arabic/iso-8859-6
Chinese/big5
Chinese/euc-cn
Chinese/euc-tw
Chinese/gb2312
Chinese/iso-2022-cn
Cyrillic/iso-8859-5
Cyrillic/koi8-r
Cyrillic/windows-1251
Property type Valid values Description
Greek/iso-8859-7
Hebrew/iso-8859-8
Japanese/euc-jp
Japanese/iso-022-jp
Japanese/shift-jis
Korean/euc-kr
Korean/johab
Korean/ks_c_5601-1987
Turkish/windows-1254
Turkish/iso-8859-9
Vietnamese/tcvn
EvaluatedUser Single value of Sender or Specifies whether the rule is looking for the manager of the sender or
Recipient the manager of the recipient.
Evaluation Single value of Equal or When comparing the Active Directory attribute of the sender and
Not equal ( NotEqual ) recipients, this specifies whether the values should match, or not
match.
Importance Single value of Low, The Importance level that was assigned to the message by the sender
Normal, or High in Outlook or Outlook on the web.
IPAddressRanges Array of IP addresses or You enter the IPv4 addresses using the following syntax:
address ranges Single IP address: For example, 192.168.1.1 .
IP address range: For example, 192.168.0.1-192.168.0.254 .
Classless InterDomain Routing (CIDR) IP address range: For
example, 192.168.0.1/25 .
ManagementRelationship Single value of Manager Specifies the relationship between the sender and any of the
or Direct report recipients. The rule checks the Manager attribute in Active Directory
( DirectReport ) to see if the sender is the manager of a recipient, or if the sender is
managed by a recipient.
MessageClassification Single message In the EAC, you select from the list of message classifications that
classification you've created.
In Exchange Online PowerShell, you use the Get-
MessageClassification cmdlet to identify the message classification.
For example, use the following command to search for messages with
the Company Internal classification and prepend the message subject
with the value CompanyInternal : New-TransportRule "Rule Name" -
HasClassification @(Get-MessageClassification "Company
Internal").Identity -PrependSubject "CompanyInternal"
MessageHeaderField Single string Specifies the name of the header field. The name of the header field is
always paired with the value in the header field (word or text pattern
match).The message header is a collection of required and optional
header fields in the message. Examples of header fields are To, From,
Received, and Content-Type. Official header fields are defined in RFC
Property type Valid values Description
MessageType Single message type Specifies one of the following message types:
value Automatic reply ( OOF )
Auto-forward ( AutoForward )
Encrypted
Calendaring
Permission controlled ( PermissionControlled )
Voicemail
Signed
Approval request ( ApprovalRequest )
Read receipt ( ReadReceipt )
Patterns Array of regular Specifies one or more regular expressions that are used to identify
expressions text patterns in values. For more information, see Regular Expression
Syntax.
SCLValue One of the following Specifies the spam confidence level (SCL) that's assigned to a
values: message. A higher SCL value indicates that a message is more likely to
Bypass spam be spam.
filtering ( -1 )
Integers 0 through
9
SensitiveInformationTypes Array of sensitive Specifies one or more sensitive information types that are defined in
information types your organization. For a list of built-in sensitive information types, see
Sensitive information types in Exchange Server.
Size Single size value Specifies the size of an attachment or the whole message.
In the EAC, you can only specify the size in kilobytes (KB).
B (bytes)
KB (kilobytes)
MB (megabytes)
GB (gigabytes)
SupervisionList Single value of Allow or Supervision policies were a feature in Live@edu that allowed you to
Block control who could send mail to and receive mail from users in your
organization (for example, the closed campus and anti-bullying
policies). In Microsoft 365 and Office 365, you can't configure
supervision list entries on mailboxes.
UserScopeFrom Single value of Inside the A sender is considered to be inside the organization if either of the
organization following conditions is true:
( InOrganization ) or The sender is a mailbox, mail user, group, or mail-enabled
Outside the organization public folder that exists inside the organization.
( NotInOrganization ) The sender's email address is in an accepted domain that's
configured as an authoritative domain or an internal relay
domain, and the message was sent or received over an
authenticated connection. For more information about
accepted domains, see Manage accepted domains in Exchange
Online.
UserScopeTo One of the following A recipient is considered to be inside the organization if any of the
values: following conditions are true:
Inside the The recipient is a mailbox, mail user, group, or mail-enabled
organization public folder that exists inside the organization.
( InOrganization ) The recipient's email address is in an accepted domain that's
Outside the configured as an authoritative domain or an internal relay
organization domain, and the message was sent or received over an
( NotInOrganization ) authenticated connection.
The recipient's domain is in a remote domain with the IsInternal
parameter is set to the value $true .
Words Array of strings Specifies one or more words to look for. The words aren't case-
sensitive, and can be surrounded by spaces and punctuation marks.
Wildcards and partial matches aren't supported. For example,
"contoso" matches " Contoso".
However, if the text is surrounded by other characters, it isn't
considered a match. For example, "contoso" doesn't match the
following values:
Acontoso
Contosoa
Acontosob
Property type Valid values Description
New-TransportRule
Mail flow rule actions in Exchange Online
Article • 02/22/2023
Actions typically require additional properties. For example, when the rule redirects a message, you
need to specify where to redirect the message. Some actions have multiple properties that are
available or required. For example, when the rule adds a header field to the message header, you
need to specify both the name and value of the header. When the rule adds a disclaimer to
messages, you need to specify the disclaimer text, but you can also specify where to insert the text,
or what to do if the disclaimer can't be added to the message. Typically, you can configure
multiple actions in a rule, but some actions are exclusive. For example, one rule can't reject and
redirect the same message.
For more information about mail flow rules, including how multiple actions are handled, see Mail
flow rules (transport rules) in Exchange Online.
For more information about conditions and exceptions in mail flow rules, see Mail flow rule
conditions and exceptions (predicates) in Exchange Online.
For more information about actions in mail flow rules in Exchange Server, see or Mail flow rule
actions in Exchange Server.
Notes:
After you select an action in the Exchange admin center (EAC), the value that's ultimately
shown in the Do the following field is often different from the click path you selected. Also,
when you create new rules, you can sometimes (depending on the selections you make)
select a short action name from a template (a filtered list of actions) instead of following the
complete click path. The short names and full click path values are shown in the EAC column
in the table.
The names of some of the actions that are returned by the Get-TransportRuleAction cmdlet
are different than the corresponding parameter names, and multiple parameters might be
required for an action.
Action in Action parameter in PowerShell Property Description
the EAC
Redirect the
message to
> hosted
quarantine
Action in Action parameter in PowerShell Property Description
the EAC
Block the
message >
delete the
message
without
notifying
anyone
Modify the
message
properties >
remove a
message
header
Modify the
message
properties >
set a
message
header
Modify the
message
properties >
set the spam
confidence
level (SCL)
Modify the
message
security >
Message
Encryption
and rights
protection
Modify the
message
security >
Message
Encryption
and rights
protection
Notify the NotifySender First property: Notifies the sender or blocks the
sender with RejectMessageReasonText NotifySenderType message when the message
a Policy Tip RejectMessageEnhancedStatusCode Second property: String matches a DLP policy.
(PowerShell only) Third property When you use this action, you
(PowerShell only): need to use the The message
DSNEnhancedStatusCode contains sensitive information
(MessageContainsDataClassification
condition.
Notify the GenerateNotification NotificationMessageText Specifies the text, HTML tags, and
recipient message keywords to include in
with a the notification message that's sent
message to the message's recipients. For
example, you can notify recipients
that the message was rejected by
the rule, or marked as spam and
delivered to their Junk Email folder.
If the rule with this action is
matched, this action is going to be
executed even if the rule is in
AuditAndNotify mode, but it will
not be executed if the rule is in the
Audit mode.
More
options >
Properties
of this rule
section >
Stop
processing
more rules
Property values
The property values that are used for actions in mail flow rules are described in the following table.
AuditSeverityLevel One of the following values: The values Low, Medium, or High
Uncheck Audit this rule with specify the severity level that's
severity level, or select Audit this assigned to the incident report and
rule with severity level with the to the corresponding entry in the
value Not specified ( DoNotAudit ) message tracking log.
Low
Medium The other value prevents an
High incident report from being
generated, and prevents the
corresponding entry from being
written to the message tracking log.
Property Valid values Description
DSNEnhancedStatusCode Single DSN code value: Specifies the DSN code that's used.
5.7.1 You can create custom DSNs by
5.7.900 through 5.7.999 using the New-SystemMessage
cmdlet.
IncidentReportContent One or more of the following values: Specifies the original message
Sender properties to include in the incident
Recipients report. You can choose to include
Subject any combination of these
Cc'd recipients ( Cc ) properties. In addition to the
Bcc'd recipients ( Bcc ) properties you specify, the message
Severity ID is always included. The available
Sender override information properties are:
( Override ) Sender: The sender of the
Matching rules ( RuleDetections ) original message.
False positive reports Recipients, Cc'd recipients,
( FalsePositive ) and Bcc'd recipients: All
Detected data classifications recipients of the message, or
( DataClassifications ) only the recipients in the Cc
Matching content ( IdMatch ) or Bcc fields. For each
Original mail ( AttachOriginalMail ) property, only the first 10
recipients are included in the
incident report.
Subject: The Subject field of
the original message.
Severity: The audit severity of
the rule that was triggered.
Message tracking logs
Property Valid values Description
If a message is processed by
more than one rule, the
highest severity is included in
any incident reports.
Sender override information:
The override if the sender
chose to override a Policy Tip.
If the sender provided a
justification, the first 100
characters of the justification
are also included.
Matching rules: The list of
rules that the message
triggered.
False positive reports: The
false positive if the sender
marked the message as a
false positive for a Policy Tip.
Detected data classifications:
The list of sensitive
information types detected in
the message.
Matching content: The
sensitive information type
detected, the exact matched
content from the message,
and the 150 characters before
and after the matched
sensitive information.
Original mail: The entire
message that triggered the
rule is attached to the
incident report.
MessageClassification Single message classification object In the EAC, you select from the list
of available message classifications.
In PowerShell, use the Get-
MessageClassification cmdlet to
see the message classification
objects that are available.
NotificationMessageText Any combination of plain text, HTML tags, Specified the text to use in a
and keywords recipient notification message.
In addition to plain text and HTML
tags, you can specify the following
keywords that use values from the
original message:
%%From%%
%%To%%
%%Cc%%
%%Subject%%
%%Headers%%
%%MessageDate%%
Property Valid values Description
NotifySenderType One of the following values: Specifies the type of Policy Tip that
Notify the sender, but allow them the sender receives if the message
to send ( NotifyOnly ) violates a DLP policy. The settings
Block the message ( RejectMessage ) are described in the following list:
Block the message unless it's a false Notify the sender, but allow
positive them to send: The sender is
( RejectUnlessFalsePositiveOverride ) notified, but the message is
Block the message, but allow the delivered normally.
sender to override and send Block the message: The
( RejectUnlessSilentOverride ) message is rejected, and the
Block the message, but allow the sender is notified.
sender to override with a business Block the message unless it's
justification and send a false positive: The message
( RejectUnlessExplicitOverride ) is rejected unless it's marked
as a false positive by the
sender.
Block the message, but allow
the sender to override and
send: The message is rejected
unless the sender has chosen
to override the policy
restriction.
Block the message, but allow
the sender to override with a
business justification and
send: This is similar to Block
the message, but allow the
sender to override and send
type, but the sender also
provides a justification for
overriding the policy
restriction.
RMSTemplate Single Azure RMS template object Specifies the Azure Rights
Management (Azure RMS) template
that's applied to the message.
In the EAC, you select the RMS
template from a list.
SCLValue One of the following values: Specifies the spam confidence level
Bypass spam filtering ( -1 ) (SCL) that's assigned to the
Integers 0 through 9 message. A higher SCL value
indicates that a message is more
likely to be spam.
This article shows you how to create, copy, adjust the order, enable or disable, delete, or
import or export rules, and how to monitor rule usage.
Tip
To make sure your rules work the way you expect, be sure to thoroughly test each
rule and interactions between rules.
Interested in scenarios where these procedures are used? See Mail flow rule procedures
in Exchange Online
For information about how to access the Exchange admin center (EAC), see
Exchange admin center in Exchange Online. To connect to Exchange Online
PowerShell, see Connect to Exchange Online PowerShell. To connect to standalone
EOP PowerShell, see Connect to standalone Exchange Online Protection
PowerShell.
You need to be assigned permissions before you can perform these procedures. To
see what permissions you need, see the "Mail flow" entry in Feature permissions in
Exchange Online.
For information about keyboard shortcuts that may apply to the procedures in this
article, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
7 Note
After you create or modify a mail flow rule, it can take up to 30 minutes or more in
some cases for the new or updated rule to be applied to email.
7 Note
Each DLP policy is a collection of mail flow rules. After you create the DLP policy, you
can fine-tune the rules using the procedures below.
a. In Apply this rule if..., select the condition you want from the list of available
conditions.
Some conditions require you to specify values. For example, if you select
The sender is... condition, you must specify a sender address. If you're
adding a word or phrase, note that trailing spaces are not allowed.
If the condition you want isn't listed, or if you need to add exceptions,
select More options. Additional conditions and exceptions will be listed.
If you don't want to specify a condition, and want this rule to apply to
every message in your organization, select [Apply to all messages]
condition.
b. In Do the following..., select the action you want the rule to take on messages
matching the criteria from the list of available actions.
Some of the actions will require you to specify values. For example, if you
select the Forward the message for approval to... condition, you will need
to select a recipient in your organization.
If the condition you want isn't listed, select More options. Additional
conditions will be listed.
c. Specify how rule match data for this rule is displayed in the Data Loss
Prevention (DLP) reports and the Mail protection reports.
Under Audit this rule with severity level, select a level to specify the severity
level for this rule. The activity reports for mail flow rules group rule matches by
severity level. Severity level is just a filter to make the reports easier to use. The
severity level has no impact on the priority in which the rule is processed.
7 Note
If you clear the Audit this rule with severity level checkbox, rule matches
will not show up in the rule reports.
d. Set the mode for the rule. You can use one of the two test modes to test the
rule without impacting mail flow. In both test modes, when the conditions are
met, an entry is added to the message trace.
4. If you are satisfied with the rule, go to step 5. If you want to add more conditions
or actions, or if you want to specify exceptions or set additional properties, click
More options. After you click More options, complete the following fields to
create your rule:
a. To add more conditions, click Add condition. If you have more than one
condition, you can remove any one of them by clicking Remove X next to it.
Note that there are a larger variety of conditions available once you click More
options.
b. To add more actions, click Add action. If you have more than one action, you
can remove any one of them by clicking Remove X next to it. Note that there
are a larger variety of actions available once you click More options.
c. To specify exceptions, click Add exception, then select exceptions using the
Except if... dropdown. You can remove any exceptions from the rule by clicking
the Remove X next to it.
d. If you want this rule to take effect after a certain date, click Activate this rule on
the following date: and specify a date. Note that the rule will still be enabled
prior to that date, but it won't be processed.
Similarly, you can have the rule stop processing at a certain date. To do so, click
Deactivate this rule on the following date: and specify a date. Note that the
rule will remain enabled, but it won't be processed.
e. You can choose to avoid applying additional rules once this rule processes a
message. To do so, click Stop processing more rules. If you select this, and a
message is processed by this rule, no subsequent rules are processed for that
message.
f. You can specify how the message should be handled if the rule processing can't
be completed. By default, the rule will be ignored and the message will be
processed regularly, but you can choose to resubmit the message for
processing. To do so, check the Defer the message if rule processing doesn't
complete check box.
g. If your rule analyzes the sender address, it only examines the message headers
by default. However, you can configure your rule to also examine the SMTP
message envelope. To specify what's examined, click one of the following values
for Match sender address in message:
PowerShell
The rule parameters and action used in the above procedure are for illustration only.
Review all the available mail flow rule conditions and actions to determine which ones
meet your requirements.
In the EAC, verify that the new mail flow rule you created is listed in the Rules list.
From Exchange Online PowerShell, verify that you created the new mail flow rule
successfully by running the following command (the example below verifies the
rule created in Exchange Online PowerShell example above):
PowerShell
7 Note
After you create or modify a mail flow rule, it can take up to 30 minutes and more
in some case for the new or updated rule to be applied to email.
PowerShell
Get-TransportRule
To view the properties of a specific mail flow rule, you provide the name of that rule or
its GUID. It is usually helpful to send the output to the Format-List cmdlet to format the
properties. The following example returns all the properties of the mail flow rule named
Sender is a member of Marketing:
PowerShell
To modify the properties of an existing rule, use the Set-TransportRule cmdlet. This
cmdlet allows you to change any property, condition, action or exception associated
with a rule. The following example adds an exception to the rule "Sender is a member of
marketing" so that it won't apply to messages sent by the user Kelly Rollin:
PowerShell
From the rules list in the EAC, click the rule you modified in the Rules list and view
the details pane.
From Exchange Online PowerShell, verify that you modified the mail flow rule
successfully by running the following command to list the properties you modified
along with the name of the rule (the example below verifies the rule modified in
Exchange Online PowerShell example above):
PowerShell
Audit severity SetAuditSeverity Enables you to select a severity level for the audit
Rule modes Mode Enables you to set the mode for the rule
Set the priority of a mail flow rule
The rule at the top of the list is processed first. This rule has a Priority of 0.
PowerShell
From the rules list in the EAC, look at the order of the rules.
From Exchange Online PowerShell, verify the priority of the rules (the example
below verifies the rule modified in Exchange Online PowerShell example above):
PowerShell
PowerShell
The following example enables the mail flow rule "Sender is a member of marketing":
PowerShell
In the EAC, view the list of rules in the Rules list and check the status of the check
box in the ON column.
From Exchange Online PowerShell, run the following command which will return a
list of all rules in your organization along with their status:
PowerShell
PowerShell
In the EAC, view the rules in the Rules list and verify that the rule you removed is
no longer shown.
From Exchange Online PowerShell, run the following command and verify that the
rule you remove is no longer listed:
PowerShell
Get-TransportRule
7 Note
While most data is in the report within 24 hours, some data may take as long as 5
days to appear.
For information about how to export a mail flow rule collection to an XML file, see
Export-TransportRuleCollection.
Applies to: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange
Online
You can use regular expressions in Microsoft Exchange Online transport rule predicates
to match text patterns in different parts of a message (such as message headers, sender,
recipients, message subject, and body). Predicates are used by conditions and
exceptions to determine whether a configured action should be applied to an e-mail
message.
7 Note
Looking for management tasks related to transport rules? See Managing Transport
Rules.
Contents
This article contains the following sections:
A regular expression is a concise and flexible notation for finding patterns of text in a
message. The notation consists of two basic character types:
Literal characters: Text that must exist in the target string. These characters are
normal characters, as typed.
Metacharacters: One or more special characters that aren't interpreted literally.
These characters indicate how the text can vary in the target string.
You can use regular expressions to quickly parse email messages to find specific text
patterns. These expressions enable you to detect messages with specific types of
content, such as social security numbers (SSNs), patent numbers, and phone numbers.
You can't reasonably match this data with a simple expression because a simple
expression requires that you enter every possible variation of the value that you want to
detect. In many cases, using simple expressions for such applications becomes a
logistical challenge, and matching a large number of simple expressions in message
content can be resource intensive. Using regular expressions is more efficient. Instead of
specifying all possible variations, you can configure the transport rule predicate to
search for a text pattern.
2 Warning
You must carefully test the regular expressions that you construct to ensure that
they yield the expected results. An incorrectly configured regular expression could
yield unexpected matches and cause unwanted transport rule behavior. These
implications may result in undesirable actions being taken on messages and
message content, potentially resulting in data loss when actions such as rejecting
or bouncing a message are used. Also, complex regular expressions may affect
email transport performance. Test your regular expressions in a test environment
before you implement them in production.
The following table lists the pattern strings that you can use to create a pattern-
matching regular expression in Exchange Online:
Pattern Description
String
\S The \S pattern string matches any single character that's not a space.
\w The \w pattern string matches any single Unicode character categorized as a letter or a
decimal digit.
\W The \W pattern string matches any single Unicode character not categorized as a letter
or a decimal digit.
* The asterisk ( * ) character matches zero or more instances of the previous character.
For example, ab*c matches the following strings: ac, abc, and abbbbc.
() Parentheses act as grouping delimiters. For example, a(bc)* matches the following
strings: a, abc, abcbc, abcbcbc, and so on.
^ The caret ( ^ ) character indicates that the pattern string that follows the caret must
exist at the start of the text string being matched. For example, ^fred@contoso
matches fred@contoso.com and fred@contoso.co.uk but not alfred@contoso.com.
$ The dollar-sign $ character indicates that the preceding pattern string must exist at the
end of the text string being matched. For example, contoso.com$ matches
adam@contoso.com and kim@research.contoso.com, but doesn't match
kim@contoso.com.au.
By using the preceding table, you can construct a regular expression that matches the
pattern of the data that you want to match. Working from left to right, examine each
character or group of characters in the data that you want to match. Read the
description of each pattern string to determine how it's applied to the data that you're
matching. Then, determine which pattern string in the table represents that character or
group of characters, and add that pattern string to the regular expression. When
finished, you have a fully constructed regular expression.
This example of a regular expression matches North American telephone numbers in the
formats 425 555-0100 and 425.555.0100.
PowerShell
425(\s|.)\d\d\d(-|.)\d\d\d\d
You can expand on this example by adding the telephone format (425) 555-0100, which
uses parentheses around the area code. This example of a regular expression matches
all three telephone number formats.
\d\d\d((\s|.|-|)|)\s)\d\d\d(\s|.|-)\d\d\d\d
\d\d\d: This portion requires that exactly three numeric digits appear first.
((\s|.|-|)|)\s): This portion requires that a space, a period, or a hyphen exists after
the three-digit number. Each character-matching string is contained in the
grouping delimiters and is separated by the pipe character. This separation means
that only one of the specified characters inside the grouping delimiters can exist in
this location in the string being matched. For the separation between area code
and the next three digits, it also looks for a closed parenthesis, or closed
parenthesis and space.
\d\d\d: This portion requires that exactly three numeric digits appear next.
(\s|.|-): This portion requires that a space, a period, or a hyphen exists after the
three-digit number.
\d\d\d\d: This portion requires that exactly four numeric digits appear next.
The above regular expression will match the following sample values:
(425)555.0100
425 555 0100
425 555 0100
(425) 555-0100
425-555-0100
(425) 555-0100
PowerShell
PowerShell
Restrict a rule to messages either coming into or going out of the organization:
By default, a new rule applies to messages that are sent by and received by people
in your organization. So if you want the rule to apply only one way, be sure to
specify that in the conditions for the rule. For examples, see Use mail flow rules for
attachment blocking scenarios in Exchange Online
Restrict a rule based on the sender's or receiver's domain: By default, a new rule
applies to messages sent from or received by any domain. Sometimes you want a
rule to apply to all domains except for one, or to just one domain. See Create
blocked sender lists in EOP.
For a complete list of all the conditions and exceptions that are available for mail flow
rules, see Mail flow rule conditions and exceptions (predicates) in Exchange Online.
If you use two rules like this, be sure that the conditions are identical. For example:
To stop rule processing after a rule is triggered, in the rule, select the Stop processing
more rules check box.
Expression Matches
For an example that shows a text file with regular expressions and the Exchange module
Windows PowerShell commands to use, see Use mail flow rules to route email based on
a list of words, phrases, or patterns in Exchange Online.
To learn how to specify patterns using regular expressions, see Regular Expression
Reference.
If a DLP rule changes message properties that affect delivery (for example, by adding
recipients), the message is resubmitted into the transport pipeline for delivery. Mail flow
rules don't evaluate the message again, because the message has already been
evaulated.
So, if a DLP rule add recipients to a message, the message containing those new
recipients isn't evaluated by mail flow rules.
Test mail flow rules in Exchange Online
Article • 02/22/2023
) Important
Wait at least 30 minutes after creating a rule before you test it. If you test
immediately after you create the rule, you may get inconsistent behavior.
7 Note
You can evaluate the conditions for a rule without taking any actions that impact mail
flow by choosing a test mode. You can set up a rule so that you get an email notification
any time the rule is matched, or you can look at the Look at the message trace for
messages that might match the rule. There are two test modes:
Test without Policy Tips: Use this mode together with an incident report action,
and you can receive an email message each time an email matches the rule.
Test with Policy Tips: This mode is only available if you're using Data loss
prevention (DLP), which is available with some Exchange Online and Exchange
Online Protection (EOP) subscription plans. With this mode, a message is set to the
sender when a message they are sending matches a policy, but no mail flow
actions are taken.
Here's what you'll see when a rule is matched if you include the incident report action:
Use a test mode with an incident report action
1. In the Exchange admin center (EAC), go to Mail flow > Rules.
2. Create a new rule, or select an existing rule, and then select Edit.
3. Scroll down to the Choose a mode for this rule section, and then select Test
without Policy Tips or Test with Policy Tips.
a. Select Add action, or, if this isn't visible, select More options, and then select
Add action.
d. Select Include message properties, and then select any message properties that
you want included in the email you receive. If you don't select any, you will still
get an email when the rule is matched.
5. Select Save.
If you don't have access to multiple accounts in your organization, you can test in a
trial account or create a few temporary fake users in your organization.
Because a web browser typically doesn't let you have simultaneous open sessions
on the same computer signed in to multiple accounts, you can use Internet
Explorer InPrivate Browsing , or a different computer, device, or web browser for
each user.
2. Find the messages that you want to trace by using criteria such as the sender and
the date sent. For help specifying criteria, see Run a Message Trace and View
Results.
3. After locating the message you want to trace, double-click it to view details about
the message.
4. Look in the Event column for Transport rule. The Action column shows the specific
action taken.
3. Select Enforce.
4. If you used an action to generate an incident report, select the action and then
select Remove.
5. Select Save.
Tip
Troubleshooting suggestions
Here are some common problems and resolutions:
Occasionally it takes longer than 15 minutes for a new mail flow to be available.
Wait a few hours, and then test again. Also check to see if another rule might be
interfering. Try changing this rule to priority 0 by moving it to the top of the list.
Disclaimer is added to original message and all replies, instead of just the
original message.
To avoid this, you can add an exception to your disclaimer rule to look for a unique
phrase in the disclaimer.
My rule has two conditions, and I want the action to happen when either of the
conditions is met, but it only is matched when both conditions are met.
You need to create two rules, one for each condition. You can easily copy the rule
by selecting Copy and then remove one condition from the original and the other
condition from the copy.
I'm working with distribution groups, and The sender is ( SentTo) doesn't seem
to be working.
To view a rules report, in the Microsoft 365 admin center, select Reports.
7 Note
While most data is in the report within 24 hours, some data may take as long as 5
days to appear.
To learn more, see View mail protection reports.
To learn about concepts and objectives for mail flow rules, see Mail flow rules (transport
rules) in Exchange Online.
Use mail flow rules to block messages with executable attachments: Learn how to use
mail flow rules to block messages that contain executable attachments.
Use mail flow rules to inspect message attachments: Learn how to use mail flow rule
conditions that allow you to inspect the content of message attachments.
Use mail flow rules to set the spam confidence level (SCL) in messages: Learn how to use
mail flow rules to mark specific messages as spam before they're even scanned by spam
filtering, or mark messages so they'll skip spam filtering.
Use mail flow rules to filter bulk email: Examples describing how to mark messages that
contain specific bulk indicator content as spam.
Use mail flow rules to see what users are reporting to Microsoft: Receive copies of
messages that users report as junk, not junk or phishing to Microsoft.
Use mail flow rules so messages can bypass Clutter: Information to help you make sure
messages are sent to an inbox instead of the Clutter folder.
Use mail flow rules to route email based on a list of words, phrases, or patterns:
Information to help you comply with your organization's email policies.
Use mail flow rules to automatically add meetings to calendars in Exchange Online: Use
the Direct to Calendar feature in Exchange Online to add meetings directly to calendars
in Exchange Online.
Define rules to encrypt email messages in Exchange Online: Learn how to use mail flow
rules to encrypt messages using Microsoft Purview Message Encryption.
Use mail protection reports to view data about malware, spam, and rule detections
Common attachment blocking scenarios
for mail flow rules in Exchange Online
Article • 02/22/2023
Notes:
For additional examples showing how to block specific attachments by using mail
flow rules, see Use mail flow rules to inspect message attachments in Exchange
Online.
Anti-malware polices EOP allow you to block specific file types by turning on and
configuring the common attachment types filter. For instructions, see Configure
anti-malware policies in EOP.
To get started using mail flow rules to block certain message types, do the following
steps:
1. Open the Exchange admin center (EAC). For more information, see Exchange
admin center in Exchange Online.
2. Go to Mail flow > Rules.
3. Click New ( ) and then select Create a new rule.
4. In the Name box, specify a name for the rule, and then click More options.
5. Select the conditions and actions you want.
7 Note
In the EAC, the smallest attachment size that you can enter is 1 kilobyte, which
should detect most attachments. However, if you want to detect every possible
attachment of any size, you need to use PowerShell to adjust the attachment size to
1 byte after you create the rule in the EAC. To connect to PowerShell, see Connect
to Exchange Online PowerShell or Connect to standalone Exchange Online
Protection PowerShell.
Embedded images are treated as attachments (for example, messages with a
picture in the signature). For this reason, we do not recommend using a very small
value for the attachment size since unexpected messages will be blocked.
In this example, all messages sent to or from the organization with attachments greater
than 10 Megabytes are blocked.
If all you want to do is block the message, you might want to stop rule processing once
this rule is matched. Scroll down the rule dialog box, and select the Stop processing
more rules check box.
You can include placeholders in the notification message so that it includes information
about the original message. The placeholders must be enclosed in two percent signs
(%%), and when the notification message is sent, the placeholders are replaced with
information from the original message. You can also use basic HTML such as <br>, <b>,
<i>, and <img> in the message.
Headers from the original message. This is similar to the list of headers in %%Headers%%
a delivery status notification (DSN) generated for the original message.
In this example, all messages that contain attachments and are sent to people inside
your organization are blocked, and the recipient is notified.
The first rule adds the word "undeliverable" to the beginning of the subject of any
messages with attachments.
The second rule blocks the message and sends a notification message to the
sender using the new subject of the original message.
) Important
The two rules must have identical conditions. Rules are processed in order, so the
first rule adds the word "undeliverable", and the second rule blocks the message
and notifies the recipient.
Here's what the first rule would look like if you want to add "undeliverable" to the
subject:
And the second rule does the blocking and notification (the same rule from Example 2):
Example 4: Apply a rule with a time limit
If you have a malware outbreak, you might want to apply a rule with a time limit so that
you temporarily block attachments. For example, the following rule has both a start and
stop day and time:
See also
Mail flow rules (transport rules) in Exchange Online
Use mail flow rules to block messages
with executable attachments in
Exchange Online
Article • 02/21/2023
To further enhance protection, you can use mail flow rules (also known as transport
rules) to identify and block messages that contain executable attachments as described
in this article.
For example, following a malware outbreak, a company could apply this rule with a time
limit so that affected users can get back to sending attachments after a specified length
of time.
To open the EAC in Exchange Online, see Exchange admin center in Exchange
Online. To open the EAC in standalone EOP, see Exchange admin center in
standalone EOP.
For more information about mail flow rules in Exchange Online and standalone
EOP, see the following topics:
Mail flow rules (transport rules) in Exchange Online
Mail flow rule conditions and exceptions (predicates) in Exchange Online
Mail flow rule actions in Exchange Online
3. In the New rule page that opens, configure the following settings:
Apply this rule if: Select Any attachment > has executable content.
Do the following: Select Block the message and then choose the action you
want:
reject the message with the enhanced status code of: In the Enter
enhanced status code dialog that appears, enter the enhanced status
code that you want to appear in the NDR. Valid values are 5.7.1 or a value
from 5.7.900 to 5.7.999. The default rejection text is: Delivery not
authorized, message refused.
4. When you're finished, click Save. Your attachment blocking rule is now in force.
Notes:
This example creates a new rule named Block Executable Attachments that silently
deletes messages that contain executable attachments.
PowerShell
In the EAC, go to Mail flow > Rules > select the rule > click Edit , and verify the
settings.
PowerShell
Search for files with text that matches a pattern you specify, and add a disclaimer
to the end of the message.
Inspect content within attachments and, if there are any keywords you specify,
redirect the message to a moderator for approval before it's delivered.
Check for messages with attachments that can't be inspected and then block the
entire message from being sent.
Check for attachments that exceed a certain size and then notify the sender of the
issue, if you choose to prevent the message from being delivered.
Check whether the properties of an attached Office document match the values
that you specify. With this condition, you can integrate the requirements of your
mail flow rules and DLP policies with a third-party classification system, such as
SharePoint or the Windows Server File Classification Infrastructure (FCI).
Create notifications that alert users if they send a message that has matched a mail
flow rule.
Block all messages containing attachments. For examples, see Use mail flow rules
for attachment blocking scenarios in Exchange Online.
7 Note
Exchange Online admins can create mail flow rules in the Exchange admin center (EAC)
at Mail flow > Rules. You need permissions to do this procedure. After you start to
create a new rule, you can see the full list of attachment-related conditions by clicking
More options > Any attachment under Apply this rule if. The attachment-related
options are shown in the following diagram.
For more information about mail flow rules, including the full range of conditions and
actions that you can choose, see Mail flow rules (transport rules) in Exchange Online.
Exchange Online Protection (EOP) and hybrid customers can benefit from the mail flow
rules best practices provided in Best Practices for Configuring EOP. If you're ready to
start creating rules, see Manage mail flow rules in Exchange Online.
Tip
If you suspect that your rule is not working properly, first check which attachments
the message contains. To inspect which attachment/s the message contained
during Mail flow rule evaluation, see Test-TextExtraction.
Any AttachmentIsUnsupported Mail flow rules only can inspect the content
attachment's of supported file types. If the mail flow rule
content can't be finds an attachment that isn't supported, the
inspected AttachmentIsUnsupported condition is
Any attachment triggered. The supported file types are
> content can't described in the next section.
be inspected
7 Note
Learn more about property types for these conditions at Mail flow rule
conditions and exceptions (predicates) in Exchange Online.
Microsoft Office .doc, .docm, .docx, .dot, .dotm, The contents of any embedded parts
.dotx, .obd, .obt, .one, .pot, .potm, contained within these file types are also
.potx, .ppa, .ppam, .pps, .ppsm, inspected. However, any objects that
.ppsx, .ppt, .pptm, .pptx, .xlb, .xlc, aren't embedded (for example, linked
.xls, .xlsb, .xlsm, .xlsx, .xlt documents) aren't inspected. Content
within the custom properties is also
scanned.
OpenDocument .odp, .ods, .odt No parts of .odf files are processed. For
example, if the .odf file contains an
embedded document, the contents of
that embedded document aren't
inspected.
Text .asm, .bat, .c, .cmd, .cpp, .cs, .csv, Other files that are text based are also
.cxx, .def, .dic, .h, .hpp, .hxx, .ibq, scanned. This list is representative.
.idl, .inc, .inf, .ini, .inx, .java, .js, .lnk,
.log, .m3u, messagestorage, .mpx,
.php, .pl, .pos, .txt, .vcf, .vcs
7 Note
If you would like to block certain files using the file condition
AttachmentNameMatchesPatterns or AttachmentExtensionMatchesWords, be aware
that this condition is inspecting the actual file name extension and not the file
properties. Which is different, than the earlier mentioned file content inspection of
other conditions. If you need to block a file based on the system file proterty
detection, e.g. the file is renamed, please use the "common attachment filter"
feature of the Anti-Mailware policy instead.
Any attachment
> file name
matches these
text patterns
Any attachment
> file extension
Condition name Condition name in Exchange Description
in the EAC Online PowerShell
includes these
words
Any attachment
> didn't
complete
scanning
7 Note
Learn more about property types for these conditions at Mail flow rule
conditions and exceptions (predicates) in Exchange Online.
32-bit Windows executable file with a dynamic link library extension. .dll
European Institute for Computer Antivirus Research standard antivirus test .com
file.
) Important
.rar (self-extracting archive files created with the WinRAR archiver), .jar (Java archive
files), and .obj (compiled source code, 3D object, or sequence files) files are not
considered to be executable file types. To block these files, you can use mail flow
rules that look for files with these extensions as described earlier in this article, or
you can configure an antimalware policy that blocks these file types (the common
attachment types filter). For more information, see Configure anti-malware policies
in EOP.
7 Note
To help you manage important business information in email, you can include any of the
attachment-related conditions along with the rules of a data loss prevention (DLP)
policy.
DLP policies and attachment-related conditions can help you enforce your business
needs by defining those needs as mail flow rule conditions, exceptions, and actions.
When you include the sensitive information inspection in a DLP policy, any attachments
to messages are scanned for that information only. However, attachment-related
conditions such as size or file type aren't included until you add the conditions listed in
this article. DLP isn't available with all versions of Exchange; learn more at Data loss
prevention.
If you want to mark specific messages as spam before they're even scanned by spam
filtering, or mark messages so they'll skip spam filtering, you can create mail flow rules
(also known as transport rules) to identify the messages and set the spam confidence
level (SCL). For more information about the SCL, see Spam confidence level (SCL) in EOP.
To open the EAC in Exchange Online, see Exchange admin center in Exchange
Online. To open the EAC in standalone EOP, see Exchange admin center in
standalone EOP.
For more information about mail flow rules in Exchange Online and standalone
EOP, see the following topics:
Mail flow rules (transport rules) in Exchange Online
Mail flow rule conditions and exceptions (predicates) in Exchange Online
Mail flow rule actions in Exchange Online
3. In the New rule page that opens, configure the following settings:
Apply this rule if: Select one or more conditions to identify messages. For
more information, see Mail flow rule conditions and exceptions (predicates)
in Exchange Online.
Do the following: Select Modify the message properties > set the spam
confidence level (SCL). In the Specify SCL dialog that appears, configure one
of the following values:
Bypass spam filtering: The messages will skip spam filtering. High confidence
phishing messages are still filtered. Other features in EOP are not affected (for
example, messages are always scanned for malware).
U Caution
Be very careful about allowing messages to skip spam filtering. The mail
flow rule should use more conditions than just the sender's email
address or domain. For more information, see Create safe sender lists in
EOP.
4. Specify any additional properties that you want for the rule. When you're finished,
click Save.
If you want more options to filter bulk mail, you can create mail flow rules (also known
as transport rules) to search for text patterns or phrases that are frequently found in
bulk mail, and mark those messages as spam. For more information about bulk mail, see
What's the difference between junk email and bulk email? and Bulk complaint level
(BCL) in EOP.
This topic explains how create these mail flow rules in the Exchange admin center (EAC)
and PowerShell (Exchange Online PowerShell for Microsoft 365 organizations with
mailboxes in Exchange Online; standalone EOP PowerShell for organizations without
Exchange Online mailboxes).
To open the EAC in Exchange Online, see Exchange admin center in Exchange
Online. To open the EAC in standalone EOP, see Exchange admin center in
standalone EOP.
For more information about mail flow rules in Exchange Online and standalone
EOP, see the following topics:
Mail flow rules (transport rules) in Exchange Online
Mail flow rule conditions and exceptions (predicates) in Exchange Online
Mail flow rule actions in Exchange Online
The list of words and text patterns that are used to identify bulk mail in the
examples aren't exhaustive; you can add and remove entries as necessary.
However, they are a good starting point.
The search for words or text patterns in the subject or other header fields in the
message occurs after the message has been decoded from the MIME content
transfer encoding method that was used to transmit the binary message between
SMTP servers in ASCII text. You can't use conditions or exceptions to search for the
raw (typically, Base64) encoded values of the subject or other header fields in
messages.
The following procedures mark a bulk message as spam for your entire
organization. However, you can add another condition to apply these rules only to
specific recipients, so you can use aggressive filtering on a few, highly targeted
users, while the rest of your users (who mostly get the bulk email they signed up
for) aren't impacted.
3. In the New rule page that opens, configure the following settings:
Apply this rule if: Configure one of the following settings to look for content
in messages using regular expressions (RegEx) or words or phrases:
The subject or body > subject or body matches these text patterns: In
the Specify words or phrases dialog that appears, enter one of the
following values, click Add , and repeat until you've entered all the
values.
If you are unable to view the content of this email\, please
please
If you are unable to view the content of this email\, please click
here
To ensure you receive (your daily deals|our e-?mails)\, add
unsubscribe)
To edit an entry, select it and click Edit . To remove an entry, select it and
click Remove .
The subject or body > subject or body includes any of these words: In
the Specify words or phrases dialog that appears, enter one of the
following values, click Add , and repeat until you've entered all the
values.
to change your preferences or unsubscribe
This is an advertisement
you would like to unsubscribe or change your
To edit an entry, select it and click Edit . To remove an entry, select it and
click Remove .
Do the following: Select Modify the message properties > set the spam
confidence level (SCL). In the Specify SCL dialog that appears, configure one
of the following settings:
To mark messages as Spam, select 6. The action that you've configured for
Spam filtering verdicts in your anti-spam policies is applied to the
messages (the default value is Move message to Junk Email folder).
For more information about SCL values, see Spam confidence level (SCL) in EOP.
PowerShell
This example creates a new rule named "Bulk email filtering - RegEx" that uses the same
list of regular expressions from earlier in the topic to set messages as Spam.
PowerShell
This example creates a new rule named "Bulk email filtering - Words" that uses the same
list of words from earlier in the topic to set messages as High confidence spam.
PowerShell
In the EAC, go to Mail flow > Rules > select the rule > click Edit , and verify the
settings.
In PowerShell, replace <Rule Name> with the name of the rule, and run the
following command to verify the settings:
PowerShell
You can create a mail flow rule (also known as a transport rule) that looks for messages
that users report to Microsoft, and you can configure Bcc recipients to receive copies of
these reported messages.
You can create the mail flow rule in the Exchange admin center (EAC) and PowerShell
(Exchange Online PowerShell for Microsoft 365 organizations with mailboxes in
Exchange Online; standalone EOP PowerShell for organizations without Exchange Online
mailboxes).
To open the EAC in Exchange Online, see Exchange admin center in Exchange
Online. To open the EAC in standalone EOP, see Exchange admin center in
standalone EOP.
3. In the New rule page that opens, configure the following settings:
Name: Enter a unique, descriptive name for the rule. For example, Bcc
Messages Reported to Microsoft.
Apply this rule if: Select The recipient > address includes any of these
words: In the Specify words or phrases dialog that appears, enter one of the
following values, click Add , and repeat until you've entered all the values.
junk@office365.microsoft.com
abuse@messaging.microsoft.com
phish@office365.microsoft.com
not_junk@office365.microsoft.com
To edit an entry, select it and click Edit . To remove an entry, select it and
click Remove .
Do the following: Select Add recipients > to the Bcc box. In the dialog that
appears, find and select the recipients that you want to add. When you're
finished, click OK.
4. You can make additional selections to audit the rule, test the rule, activate the rule
during a specific time period, and other settings. We recommend testing the rule
before you enforce it.
PowerShell
In the EAC, go to Mail flow > Rules > select the rule > click Edit , and verify the
settings.
PowerShell
Send a test message to one of the reporting email addresses and verify the results.
Organization-wide message disclaimers,
signatures, footers, or headers in
Exchange Online
Article • 04/10/2023
Notes:
Users can apply signatures to their own outgoing messages in Outlook or Outlook
on the web (formerly known as Outlook Web App). For more information, see
Create and add an email signature in Outlook on the web .
If you want the information to be added only to outgoing messages, you need to
add a corresponding condition (for example, recipients located outside the
organization). By default, mail flow rules are applied to incoming and outgoing
messages.
Test the disclaimer. When you create the mail flow rule, you have the option to
start using it immediately (Enforce), or to test it first and logging the results. We
recommend testing all mail flow rules prior to setting them to Enforce.
For information about the Exchange admin center (EAC), see Exchange admin
center in Exchange Online. To connect to Exchange Online PowerShell, see Connect
to Exchange Online PowerShell. To connect to standalone EOP PowerShell, see
Connect to standalone Exchange Online Protection PowerShell.
You need to be assigned permissions before you can perform these procedures. To
see what permissions you need, see the "Mail flow" entry in the Feature
permissions in Exchange Online article.
For information about keyboard shortcuts that may apply to the procedures in this
article, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
2. On the Rules page, click Add a rule , and then select Apply disclaimers.
3. In the new rule wizard that opens, configure the following settings on the Set rule
conditions page:
Apply this rule if: Select the conditions that identify which messages get the
disclaimer. For example:
The recipient > is external/internal
In the Select recipient location flyout that opens, select Outside the
organization, and then click Save.
Or, if you want this rule to apply to every message that enters or leaves the
organization, select Apply to all messages.
Click the Enter text link to enter the text of the disclaimer.
Disclaimer text can include HTML tags and inline cascading style sheet
(CSS) tags. You can add images using the IMG tag. Disclaimer text also
supports the following tokens that use values from the sender:
%%City%%
%%Company%%
%%CountryOrRegion%%
%%Department%%
%%DisplayName%%
%%Fax%%
%%FirstName%%
%%HomePhone%%
%%Initials%%
%%LastName%%
%%Manager%%
%%MobilePhone%%
%%Notes%%
%%Office%%
%%Pager%%
%%Phone%%
%%PostalCode%%
%%PostOfficeBox%%
%%StateOrProvince%%
%%StreetAddress%%
%%Title%%
%%UserPrincipalName%%
%%WindowsEmailAddress%%
Click the Select one link to enter the fallback action if the disclaimer can't
be inserted in the message.
Except if: To add an exception that prevents multiple disclaimers from being
added in an email conversation, configure the following settings:
Select The subject or body and Subject or body matches these text
patterns.
In the Specify words or phrases flyout that opens, enter the words or
phrases in the disclaimer, click Add, and then click Save.
Rule mode: Leave the default value Enforce selected to turn on the rule
immediately, or select Test without Policy Tips to log the results without
actually adding the disclaimer to messages.
Severity: Assign the severity level that appears in the message log. Valid
values are:
Low
Medium
High
Not audit
Not specified
Activate this rule on and Deactivate this rule on: Optionally, select a date-
time range when the rule is active.
Stop processing more rules: Optionally, stop applying additional rules to a
message after the disclaimer rule processes the message.
Defer the message if rule processing doesn't complete: Optionally, defer the
message if the rule isn't able to process the message.
Match sender address in message: Select one of the following values:
Header: Only the message headers are examined. This is the default value
Envelope: Only the SMTP message envelope is examined.
Header or envelope: Both the message headers and SMTP message
envelope are examined.
Comments: Optionally, enter comments to help describe the rule.
5. On the Review and finish page, review the settings of the rule and then click
Finish.
This example creates a new mail flow rule that adds a disclaimer with an image to the
end of all email messages that are sent outside the organization.
PowerShell
This example creates a new mail flow rule that adds an advertisement for one month to
the beginning of all outgoing messages.
PowerShell
Send yourself both a plain text email and an HTML email that match the conditions
and exceptions you defined, and verify that the text appears as you intended.
If you added an exception to avoid adding the disclaimer to successive messages
in a conversation, forward your test messages to yourself to verify that you don't
get an extra copy of the disclaimer.
Send yourself some messages that should not get the disclaimer and verify that
the disclaimer is not included.
Ignore: The rule is ignored and the original message is delivered without the
disclaimer.
In the EAC, you select the fallback option in the rule action. In Exchange Online
PowerShell, you use the ApplyHtmlDisclaimerFallbackAction parameter.
If you want to be sure that you receive particular messages, you can create a mail flow
rule (also known as a transport rule) that makes sure that these messages bypass your
Clutter folder. Check out Use Clutter to sort low-priority messages in Outlook for
more info on Clutter.
For additional management tasks related to mail flow rules, check out Mail flow rules
(transport rules) in Exchange Online and the New-TransportRule PowerShell article. If
you're new to Exchange Online PowerShell, check out Connect to Exchange Online
PowerShell.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Mail flow" entry in the
Feature permissions in Exchange Online article.
For more information about opening and using the Exchange admin center (EAC),
see Exchange admin center in Exchange Online.
For information about keyboard shortcuts that may apply to the procedures in this
article, see Keyboard shortcuts for the Exchange admin center.
3. In the New rule page that opens, configure the following settings:
Name: Enter something descriptive. For example, Bypass Clutter if the subject
contains "meeting".
Apply this rule if > The subject includes > meeting
Do the following > Set the message header to this value > X-MS-Exchange-
Organization-BypassClutter: true.
PowerShell
7 Note
For a short list of words or phrases, you can use the Exchange admin center (EAC). For a
longer list, you can use Exchange Online PowerShell or standalone EOP PowerShell to
import the words from a text file.
If your Exchange Online organization uses Data loss prevention (DLP), see Data loss
prevention for additional options for identifying and routing email that contains
sensitive information (DLP is not available in standalone EOP).
PowerShell
Expression Matches
text
[mn]sft
[mn]icrosft
[mn]icro soft
[mn].crosoft
To learn how to specify patterns using regular expressions, see Regular Expression
Reference.
Use mail flow rules for message
approval scenarios in Exchange Online
Article • 02/22/2023
7 Note
This article does not apply to standalone Exchange Online Protection (EOP)
organizations.
But, other than exceptions from specific senders, when you configure the moderation
settings in the properties of the recipient, all messages that are sent to the recipient
require approval before they're delivered, regardless of the content or specifics of the
messages.
For granular control over the type and circumstances of messages that require
moderation, you can use mail flow rules (also known as transport rules). This article
discusses examples of using mail flow rules for moderation in order to meet specific
legal, compliance, or business requirements.
To require that messages need to be sent to the sender's manager for approval, follow
these steps:
1. Create a mail flow rule using the Send messages to a moderator template.
2. Configure the action to send messages to the sender's manager for approval: Do
the following > Forward to the sender's manager for approval.
3. Configure the conditions that define the messages that require approval in Apply
this rule if.
Here's an example where all external messages sent by the trainee named Garth Fort
require approval by their manager.
and
Apply this rule if > The recipient is located > Outside the organization
Some rule settings, including the ability to add multiple conditions or exceptions to
the rule as in this example, are hidden by default. To see them, click More options.
To create this type of multiple-level approval, create one mail flow rule for each level of
approval. Each rule detects the same patterns in the messages, as follows:
The first rule forwards the message to the first moderator. After the first moderator
approves the message, a second rule forwards the message to the second rule, and
so on.
If all moderators in the chain approve the message, the original message is sent to
the intended recipients.
If any of the moderators in the chain reject the approval request, the sender
receives a rejection message.
If any of the approval requests aren't approved within the expiration time (two
days for Exchange Online), the sender receives an expiration message.
7 Note
The processing of expired moderated messages runs every seven days. This
means that a moderated message can expire at any time between two and
nine days.
The following example assumes that you have a customer named Blue Yonder Airlines,
and you want both the customer relationship manager and the compliance officer to
approve all messages that go to this customer.
As shown in the following screenshot, you create two rules. The first rule goes to the
first-level approver. The second rule goes to the second-level approver.
The first rule identifies all messages with the company name Blue Yonder Airlines in the
subject or message, and it sends these messages to the internal customer relationship
manager named Garret Vargas.
Apply this rule if > The sender is located > Inside the organization.
and
Apply this rule if > The subject or boy matches > 'B.Y.A' or 'BYA' or 'Blue Yonder
Airlines' or 'Blue Yonder'.
Do the following > Forward the message for approval to > Garret Vargas.
The second rule sends these messages to the compliance officer, Tony Krijnen for
approval:
Apply this rule if > The sender is located > Inside the organization.
and
Apply this rule if > The subject or boy matches > 'B.Y.A' or 'BYA' or 'Blue Yonder
Airlines' or 'Blue Yonder'.
Do the following > Forward the message for approval to > Tony Krijnen.
Forward messages that match one of several
criteria
Within a mail flow rule, all conditions in the rule must be true for the rule to match
(Condition1 AND Condition2). If you want the same action applied for multiple
conditions (Condition1 OR Condition2), you need to create a separate rule for each
condition.
To do this, on the Rules page in EAC, create a rule for the first condition. Then select the
rule, select Copy, and change the conditions in the new rule to match the second
condition.
For approval scenarios, be careful when you create multiple rules with the same action
so the same message isn't sent to the moderator multiple times. Add an exception to
the second rule so it ignores messages that matched the first rule.
For example, you want to send a message to a moderator if the message has "sales
quote" in the subject line or message body or in the content of any attachments.
You need two rules. If the first rule checks the subject line or message body, the second
rule that checks the attachment content needs an exception that checks for "sales
quote" in the subject line or message body (the condition of the first rule).
7 Note
As described previously, some rule settings, including the ability to add multiple
conditions or exceptions to the rule as in this example, are hidden by default. To
see them, click More options.
Here's an example where messages that contain a credit card number require approval.
Apply this rule if > The message contains sensitive information > Credit Card
Number
Do the following > Forward to the sender's manager for approval
Use mail flow rules to automatically add
meetings to calendars in Exchange
Online
Article • 02/22/2023
7 Note
This article does not apply to standalone Exchange Online Protection (EOP)
organizations.
With the Direct to Calendar feature in Exchange Online, admins can configure mail flow
rules (also known as transport rules) that allow designated users to add meetings to
calendars. The benefits of Direct to Calendar are:
The event is automatically added to the recipient's calendar without any action
from them. If the user received the meeting invitation, it's on their calendar.
The sender doesn't need to deal with Out of Office or other unwanted response
messages that result from sending meeting invitations to a large number of
recipients.
No meeting-related messages are seen by attendees unless the meeting is
cancelled.
Direct to Calendar requires two mail flow rules with specific conditions and actions.
These rules are described in the following table:
This mail The sender is or The sender > Set the message We recommend that you
flow rule is this person (the From header to this value use dedicated mailboxes
turns parameter). or Modify the (shared mailboxes are OK)
regular message properties for sending Direct to
meeting This condition identifies the > set a message Calendar meeting
invitations users who are authorized to header (the invitations, because any
into Direct send Direct to Calendar SetHeaderName meeting invitations from
to Calendar meeting invitations. Although and SetHeaderValue these senders will be
meeting you can use other conditions, parameters). automatically added to
invitations. restricting the invitations by recipient calendars.
sender helps prevent This action sets the
unauthorized use of Direct to X-MS-Exchange- The dedicated mailboxes
Calendar meeting invitations. Organization- require no special
CalendarBooking- permissions to send Direct
Response header to to Calendar meeting
the value Accept . invitations.
Other valid values
are Tentative and
Decline .
This mail The sender is or The sender > Set the message Technically, this rule is
flow rule is this person (the From header to this value optional (without it,
prevents parameter). or Modify the meetings are still
Direct to message properties automatically added to
Calendar > set a message recipient calendars).
meeting header (the Note that this rule doesn't
invitations SetHeaderName prevent meeting
from and SetHeaderValue cancellation messages for
appearing parameters). Direct to Calendar
in the Inbox meetings from appearing
of This action sets the in the Inbox of recipients.
recipients. X-MS-Exchange-
Organization-
CalendarBooking-
TriageAction
header to the value
MoveToDeletedItems .
The other valid
value is None .
For more information about mail flow rules, see Mail flow rules (transport rules) in
Exchange Online.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Mail flow" entry in the
Feature permissions in Exchange Online article.
The designated accounts for sending Direct to Calendar meeting invitations need
to exist.
For more information about opening and using the Exchange admin center (EAC),
see Exchange admin center in Exchange Online.
For information about keyboard shortcuts that may apply to the procedures in this
article, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
PowerShell
This example configures the rule using the dedicated mailbox named Direct to
Calendar invites.
PowerShell
2. To create the mail flow rule that prevents Direct to Calendar meeting invitations
from appearing in the Inbox of recipients, use the following syntax:
PowerShell
This example configures the rule using the dedicated mailbox named Direct to
Calendar invites.
PowerShell
More information
The designated sender mailbox will receive meeting acceptance responses to
Direct to Calendar meetings. Use the following strategies to help minimize the
impact of these messages on the designated sender:
Meeting cancellation messages for Direct to Calendar meetings will always appear
in the Inbox of recipients.
Define mail flow rules to encrypt email
messages
Article • 07/21/2023
As an administrator that manages Exchange Online, you can create mail flow rules (also
known as transport rules) to help protect email messages you send and receive. You can
set up rules to encrypt any outgoing email messages and remove encryption from
encrypted messages coming from inside your organization or from replies to encrypted
messages sent from your organization. You can use the Exchange admin center (EAC)
or Exchange Online PowerShell to create these rules. In addition to overall encryption
rules, you can also choose to enable or disable individual message encryption options
for end users.
You can't encrypt inbound mail from senders outside of your Exchange Online
organization. If a mail flow rule is set up to encrypt mail from outside the organization,
the inbound mail will be delivered without encryption.
If you recently migrated from Active Directory RMS to Azure Information Protection,
you'll need to review your existing mail flow rules to ensure that they continue to work
in your new environment. Also, to use Microsoft Purview Message Encryption with Azure
Information Protection, you need to update your existing mail flow rules. Otherwise,
your users will continue to receive encrypted mail that uses the previous HTML
attachment format instead of the new, seamless experience. If you haven't set up
message encryption yet, see Set up Microsoft Purview Message Encryption for
information.
For information about the components that make up mail flow rules and how mail flow
rules work, see Mail flow rules (transport rules) in Exchange Online. For additional
information about how mail flow rules work with Azure Information Protection, see
Configuring Exchange Online mail flow rules for Azure Information Protection labels.
) Important
For hybrid Exchange environments, on-premises users can send and receive
encrypted mail using message encryption only if email is routed through Exchange
Online. To configure message encryption in a hybrid Exchange environment, you
need to first configure hybrid using the Hybrid Configuration wizard and then
configure mail to flow from Office 365 to your email server and configure mail to
flow from your email server to Office 365. Once you've configured mail to flow
through Office 365, then you can configure mail flow rules for message encryption
by using this guidance.
Tip
If you're not an E5 customer, use the 90-day Microsoft Purview solutions trial to
explore how additional Purview capabilities can help your organization manage
data security and compliance needs. Start now at the Microsoft Purview
compliance portal trials hub . Learn details about signing up and trial terms.
3. In the Microsoft 365 admin center , choose Admin centers > Exchange.
4. In the EAC, go to Mail flow > Rules and select New > Create a new rule. For
more information about using the EAC, see Exchange admin center in Exchange
Online.
5. In Name, type a name for the rule, such as Encrypt mail for
DrToniRamos@hotmail.com.
6. In Apply this rule if, select where the mail originates from inside the Exchange
Online organization. Add The sender is located > Inside the organization for
sending mail.
7. In Apply this rule if, select a condition, and enter a value if necessary. For example,
to encrypt messages going to DrToniRamos@hotmail.com:
a. In Apply this rule if, select the recipient is.
b. Select an existing name from the contact list or type a new email address in the
check names box.
To select an existing name, select it from the list and then click OK.
To enter a new name, type an email address in the check names box and
then select check names > OK.
8. To add more conditions, choose More options and then choose add condition
and select from the list.
For example, to apply the rule only if the recipient is outside your organization,
select add condition and then select The recipient is external/internal > Outside
the organization > OK.
9. To enable message encryption, from Do the following, select Modify the message
security and then choose Apply Office 365 Message Encryption and rights
protection. Select an RMS template from the list, choose Save, and then choose
OK.
The list of templates includes all default templates and options as well as any custom
templates you've created for use by Office 365. If the list is empty, ensure that you have
set up Microsoft Purview Message Encryption as described in Set up Microsoft Purview
Message Encryption. For information about the default templates, see Configuring and
managing templates for Azure Information Protection. For information about the Do
Not Forward option, see Do Not Forward option for emails. For information about the
encrypt-only option, see Encrypt-only option for emails.
You can choose add action if you want to specify another action.
3. In the Microsoft 365 admin center , choose Admin centers > Exchange.
The list of templates includes all default templates and options as well as any
custom templates you've created for use by Office 365. If the list is empty, ensure
that you have set up Microsoft Purview Message Encryption as described in Set up
Microsoft Purview Message Encryption. For information about the default
templates, see Configuring and managing templates for Azure Information
Protection. For information about the Do Not Forward option, see Do Not Forward
option for emails. For information about the encrypt-only option, see Encrypt Only
option for emails.
You can choose add action if you want to specify another action.
7. From the Do the following list, remove any actions that are assigned to Modify
the message security > Apply the previous version of OME.
8. Choose Save.
1. In a web browser, using a work or school account that has been granted global
administrator permissions, sign in to Office 365 .
2. Choose the Admin tile.
3. In the Microsoft 365 admin center , choose Admin centers > Exchange.
4. In the EAC, go to Mail flow > Rules and select New > Create a new rule. For
more information about using the EAC, see Exchange admin center in Exchange
Online.
5. In Name, type a name for the rule, such as Remove encryption from outgoing mail .
6. In Apply this rule if, select the conditions where encryption should be removed
from messages. Add The sender is located > Inside the organization for sending
mail out to any recipients or add The recipient is located > Inside the
organization for receiving mail replies from outside the organization.
7. In Do the following, select Modify the message security > Remove Office 365
Message Encryption and rights protection applied by the organization.
8. (Optional) In Do the following, select Modify the message security > Remove
attachment rights protection protection applied by the organization.
Related content
Encryption in Office 365
) Important
Please refer to the Microsoft 365 security center and the Microsoft Purview
compliance portal for Exchange security and compliance features. They are no
longer available in the new Exchange admin center .
In-Place Hold
Litigation Hold
eDiscovery hold
Calendar logging
Terminology
Knowledge of the following terms will help you understand the content in this article.
Delete: Describes when an item is deleted from any folder and placed in the Deleted
Items default folder.
Soft delete: Describes when an item is deleted from the Deleted Items default folder
and placed in the Recoverable Items folder. Also describes when an Outlook user
deletes an item by pressing Shift+Delete, which bypasses the Deleted Items folder and
places the item directly in the Recoverable Items folder.
Hard delete: Describes when an item is marked to be purged from the mailbox
database. This is also known as a store hard delete.
Exchange can prevent data from being purged from the Recoverable Items folder.
Deletions: This subfolder contains all items deleted from the Deleted Items folder.
(In Outlook, a user can soft delete an item by pressing Shift+Delete.) This subfolder
is available to users through the Recover Deleted Items feature in Outlook and
Outlook on the web.
Audits: If mailbox audit logging is enabled for a mailbox, this subfolder contains
the audit log entries. To learn more about mailbox audit logging, see Export
mailbox audit logs in Exchange Online.
Calendar Logging: This subfolder contains calendar changes that occur within a
mailbox. This folder isn't available to users.
The following illustration shows the subfolders in the Recoverable Items folders. It also
shows the deleted item retention, single item recovery, and hold workflow processes
that are described in the following sections.
A user deletes an item or empties all items from the Deleted Items folder.
A user presses Shift+Delete to delete an item from any other mailbox folder.
Soft-deleted items are moved to the Deletions subfolder of the Recoverable Items
folder. This provides an additional layer of protection so users can recover deleted items
without requiring Help desk intervention. Users can use the Recover Deleted Items
feature in Outlook or Outlook on the web to recover a deleted item. Users can also use
this feature to permanently delete an item. For more information, see:
Items remain in the Deletions subfolder until the deleted item retention period is
reached. The default deleted item retention period for Exchange Online is 14 days. You
can modify this period for mailboxes up to a maximum of 30 days. In addition to a
deleted item retention period, the Recoverable Items folder is also subject to quotas. To
learn more, see Recoverable Items mailbox quotas later in this article.
When the deleted item retention period expires, the item is removed from Exchange
Online.
The following table lists the contents of and actions that can be performed in the
Recoverable Items folder if single item recovery is enabled.
Putting a mailbox on In-Place Hold or Litigation Hold stops the Managed Folder
Assistant from automatically purging messages from the DiscoveryHolds, Deletions, and
Purges subfolders. Additionally, copy-on-write page protection is also enabled for the
mailbox. Copy-on-write page protection creates a copy of the original item before any
modifications are written to the Exchange store. After the mailbox is removed from hold,
the Managed Folder Assistant resumes automated purging.
7 Note
If you put a mailbox on both In-Place Hold and Litigation Hold, Litigation Hold
takes preference because this puts the entire mailbox on hold.
The following table lists the contents of and actions that can be performed in the
Recoverable Items folder if Litigation Hold is enabled.
To learn more about In-Place eDiscovery, In-Place Hold, and Litigation Hold, see the
following articles:
The following table lists the message properties that trigger copy-on-write page
protection.
Attachments
Items other than messages Any change to a visible property, except the following:
and posts Item location (when an item is moved between folders)
Item status change (read or unread)
Changes to a retention tag applied to an item
Items in the Drafts default None. Items in the Drafts folder are exempt from copy-on-write
folder page protection.
) Important
If the Recoverable Items folder for a mailbox reaches the Recoverable Items quota, no
more items can be stored in the folder. This impacts mailbox functionality in the
following ways:
The Managed Folder Assistant can't delete items based on retention tag or
managed folder settings.
For mailboxes that have single item recovery, In-Place Hold or Litigation Hold
enabled, the copy-on-write page protection process can't maintain versions of
items edited by the user.
For mailboxes that have mailbox audit logging enabled, no mailbox audit log
entries can be saved in the Audits subfolder.
For mailboxes that aren't placed on In-Place Hold or Litigation Hold, the Managed
Folder Assistant automatically purges items from the Recoverable Items folder when the
deleted item retention period expires. If the folder reaches the Recoverable Items
warning quota, the assistant automatically purges items in first-in-first-out order.
More information
Copy-on-write is only enabled when a mailbox is on In-Place Hold or Litigation
Hold.
If users need to recover deleted items from the Recoverable Items folder, point
them to the following articles:
If you need to change the default deleted item retention period for Exchange
Online, read the following article:
Change how long permanently deleted items are kept for an Exchange Online
mailbox
Clean up or delete items from the
Recoverable Items folder in Exchange
Online
Article • 02/22/2023
) Important
Please refer to the Microsoft 365 security center and the Microsoft Purview
compliance portal for Exchange security and compliance features. They are no
longer available in the new Exchange admin center .
The Recoverable Items folder (known in earlier versions of Exchange as the dumpster)
exists to protect from accidental or malicious deletions and to facilitate discovery efforts
commonly undertaken before or during litigation or investigations.
How you clean up or delete items from a user's Recoverable Items folder depends on
whether the mailbox is placed on In-Place Hold or Litigation Hold, or had single item
recovery enabled:
If a mailbox isn't placed on In-Place Hold, Litigation Hold, or another type of hold
in Microsoft 365 or Office 365, or if a mailbox doesn't have single item recovery
enabled, you can delete items from the Recoverable Items folder. After items are
deleted, you can't use single item recovery to recover them.
If the mailbox is placed on In-Place Hold, Litigation Hold, or another type of hold
in Microsoft 365 or Office 365, or if single item recovery is enabled, you'll want to
preserve the mailbox data until the hold is removed or single item recovery is
disabled. In this case, you need to perform more detailed steps to clean up the
Recoverable Items folder.
To learn more about In-Place Hold and Litigation Hold, see In-Place Hold and Litigation
Hold in Exchange Online. To learn more about single item recovery, see Single item
recovery.
Because incorrectly cleaning up the Recoverable Items folder can result in data
loss, it's important that you're familiar with the Recoverable Items folder and the
impact of removing its contents. Before performing this procedure, we recommend
that you review the information in Recoverable Items folder in Exchange Online.
You can only use Security & Compliance PowerShell to perform the procedures in
this article. To connect to Security & Compliance PowerShell, see Connect to
Security & Compliance PowerShell.
Tip
Having problems? Ask for help in the Microsoft Tech Community. Visit it at
Microsoft Tech Community - Exchange .
To search for items that are located in the Recoverable Items folder, we recommend that
you perform a targeted collection. This means you narrow the scope of your search only
to items located in the Recoverable Items folder. You can do this by running the script in
the Use Content Search for targeted collections article. This script returns the value of
the folder ID property for all the subfolders in the target Recoverable Items folder. Then
you use the folder ID in a search query to return items located in that folder.
Here's an overview of the process to search for and delete items in a user's Recoverable
Items folder:
1. Run the targeted collection script that returns the folder IDs for all folders in the
target user's mailbox. The script connects to Exchange Online PowerShell and
Security & Compliance PowerShell in the same PowerShell session. For more
information, see Run the script to get a list of folders for a mailbox or site.
2. Copy the folder IDs for all subfolders in the Recoverable Items folder. Alternatively,
you can redirect the output of the script to a text file.
Here is a list and description of the subfolders in the Recoverable Items folder that
you can search and delete items from:
text
For more information and examples about running content searches that use the
folder ID property, see Use a folder ID or documentlink to perform a targeted
collection.
7 Note
If you use the New-ComplianceSearch cmdlet to search the Recoverable
Items folder, be sure to use the Start-ComplianceSearch cmdlet to run the
search.
4. After you've created a content search and validated that it returns the items that
you want to delete, use the New-ComplianceSearchAction -Purge -PurgeType
HardDelete command (in Security & Compliance PowerShell) to permanently
delete the items returned by the content search that you created in the previous
step. For example, you can run a command similar to the following command:
PowerShell
5. A maximum of 10 items per mailbox are deleted when you run the previous
command. That means you may have to run the New-ComplianceSearchAction -
Purge command multiple times to delete all the items that you want to delete in
the Recoverable Items folder. To delete additional items, you first have to remove
the previous compliance search purge action. You do this by running the Remove-
ComplianceSearchAction cmdlet. For example, to delete the purge action that was
run in the previous step, run the following command:
PowerShell
Remove-ComplianceSearchAction "RecoverableItems_Purge"
After you do this, you can create a new compliance search purge action to delete
more items. You'll have to delete each purge action before creating a new one.
To get a list of the compliance search actions, you can run the Get-
ComplianceSearchAction cmdlet. Purge actions are identified by _Purge appended
to the search name.
Run the following command to get the current size and the total number of items in
folders and subfolders in the Recoverable Items folder in the user's primary mailbox.
PowerShell
Run the following command to get the size and total number of items in folders and
subfolders in the Recoverable Items folder in the user's archive mailbox.
PowerShell
Use Microsoft Exchange Online and Microsoft 365 or Office 365 to manage mail flow.
Find out how, and get tips and best practices for setting up and managing your email.
Try Set up Microsoft 365 for business or Deploy Office 365 Enterprise for your
organization.
Microsoft 365 and Office 365 give you flexibility in determining the best arrangement
for how email is delivered to your organization's mailboxes. The path email takes from
the internet to a mailbox and vice versa is called mail flow. Most organizations want
Microsoft 365 or Office 365 to manage all their mailboxes and filtering, and some
organizations need more complex mail flow setups to make sure that they comply with
specific regulatory or business needs. If you're part of a small business or simply an
organization that wants Microsoft 365 or Office 365 to manage all your mailboxes and
mail flow, we recommend following the steps in Set up Microsoft 365 for business. That
article provides a complete checklist for setting up Microsoft 365 or Office 365 services
and programs, including how to set up your mail flow and email clients.
For information about how your email is protected with EOP, see Exchange Online
Protection Overview.
Tip
Are you new to Microsoft 365 or Office 365 mail flow? Check out the External
Domain Name System records for Microsoft 365 or Office 365 topic. We
especially recommend reading the part about SPF records because customers often
list the wrong values in their SPF record, which can cause mail flow problems.
Microsoft 365 and Office 365 mail flow covers the following scenarios:
For information about migrating your email to Microsoft Exchange Online, see Ways to
migrate multiple email accounts to Microsoft 365 or Office 365.
MX (mail exchanger) records provide an easy way for mail servers to know where to
send email. You can think of the MX record as a type of postal address. If you want
Microsoft 365 or Office 365 to receive all email addressed to anyone@contoso.com, the
MX record for contoso.com should point to Microsoft 365 or Office 365, and it will look
like the following example:
Hostname: contoso-com.mail.protection.outlook.com
Priority: 0
TTL: 1 hour
SPF (sender policy framework) is a specially formatted TXT record in DNS. SPF validates
that only the organization that owns a domain is actually sending email from that
domain. SPF is a security measure that helps makes sure someone doesn't impersonate
another organization. This impersonation is often called spoofing. As a domain owner,
you can use SPF to publish a list of IP addresses or subnets that are authorized to send
email on your organization's behalf. This can be helpful if you want to send email from
multiple servers or services with different IP addresses.
) Important
You can only have one SPF record per domain. Having multiple SPF records will
invalidate all SPF records and cause mail flow problems.
Because most modern email servers look up a domain's SPF record before they accept
any email from it, it's important to set up a valid SPF record in DNS when you first set up
mail flow. For a quick introduction to SPF and to get it configured quickly, see Set up
SPF in Microsoft 365 or Office 365 to help prevent spoofing. For a more in-depth
understanding of how Microsoft 365 and Office 365 use SPF, or for troubleshooting or
non-standard deployments such as hybrid deployments, start with How Microsoft 365
and Office 365 use Sender Policy Framework (SPF) to prevent spoofing.
DomainKeys Identified Mail (DKIM). lets you attach a digital signature to email
messages in the message header of emails you send. Email systems that receive email
from your domain use this digital signature to determine if incoming email that they
receive is legitimate. For information about DKIM and Microsoft 365 or Office 365, see
Use DKIM to validate outbound email sent from your domain in Microsoft 365 or Office
365.
Use SPF, DKIM, and DMARC together for the best experience.
With that said, there are legitimate business scenarios that require your domain's MX
record to point to somewhere other than Microsoft 365 or Office 365. For example,
email destined for your organization might need to initially arrive at another destination
(such as a third-party archiving solution), then route through Microsoft 365 or Office
365, and then be delivered to mailboxes on your organization's mail server. This setup
might provide the best solution to meet your business requirements.
Whatever your needs, this guide will help you understand how your MX records, SPF,
and, potentially, connectors need to be set up.
Use Directory Based Edge Blocking to reject messages sent to invalid recipients
How to set up a multifunction device or application to send email using Microsoft 365
or Office 365
Test mail flow by validating your
connectors in Exchange Online
Article • 02/22/2023
To validate and troubleshoot mail flow from Microsoft 365 or Office 365 to your
organization's email server (also called on-premises server), validate your connectors.
You can set up and validate connectors on the connectors page in the Exchange admin
center (EAC). The built-in validation tests that your mail flow from Microsoft 365 or
Office 365 reaches:
A partner organization.
Mail flow issues can also happen when your MX record is not setup correctly. To verify
your MX record, see Find and fix issues after adding your domain or DNS records.
7 Note
These tests replace Microsoft 365 or Office 365 mail flow troubleshooting that was
previously available in the Remote Connectivity Analyzer .
See also
Configure mail flow using connectors
Set up connectors to route mail between Microsoft 365 or Office 365 and your own
email servers
Validate connectors
Can't send or receive email? Microsoft 365 and Office 365 for business offer admins
several ways to troubleshoot. We recommend using the automated solutions because
they are typically easier and faster than manual troubleshooting.
For instructions about troubleshooting options, see Find and fix email delivery issues as
a Microsoft 365 or Office 365 for business admin.
A partner organization.
Mail flow issues can also happen when your MX record is not setup correctly. To verify
your MX record, see Find and fix issues after adding your domain or DNS records.
Connectors are a collection of instructions that customize the way your email flows to
and from your Microsoft 365 or Office 365 organization. Actually, most Microsoft 365
and Office 365 organizations don't need connectors for regular mail flow. This article
describes the mail flow scenarios that require connectors.
Enable mail flow between Microsoft 365 or Office 365 and email servers that you
have in your on-premises environment (also known as on-premises email servers).
Apply security restrictions or controls to email that's sent between your Microsoft
365 or Office 365 organization and a business partner or service provider.
Relay mail from devices, applications, or other non-mailbox entities in your on-
premises environment through Microsoft 365 or Office 365.
Avoid graylisting that would otherwise occur due to the large volume of mail that's
regularly sent between your Microsoft 365 or Office 365 organization and your on-
premises environment or partners.
7 Note
The process for setting up connectors has changed; instead of using the terms
"inbound" and "outbound", we ask you to specify the start and end points that you want
to use. The way connectors work in the background is the same as before (inbound
means into Microsoft 365 or Office 365; outbound means from Microsoft 365 or Office
365).
You have a standalone EOP You have your own on- Yes Connector for
subscription. premises email servers, and incoming email:
you subscribe to EOP only for
email protection services for From: Your
your on-premises mailboxes on-premises
(you have no mailboxes in email server
Exchange Online). To: Office 365
For more information about
Connector for
standalone EOP, see
outgoing email:
Standalone Exchange Online
Protection and the How From: Office
connectors work with my on- 365
premises email servers section To: Your on-
later in this article. premises mail
server
Scenario Description Connector Connector settings
required?
Some of your mailboxes are Before you manually configure Yes Connector for
on your on-premises email connectors, check whether an incoming email:
servers, and some are in Exchange hybrid deployment
Exchange Online. better meets your business From: Your
needs. on-premises
For details, see the I have my email server
own email servers section To: Office 365
later in this article and
Connector for
Exchange Server Hybrid
outgoing email:
Deployments.
From: Office
365
To: Your on-
premises
email server
All of your mailboxes are in You can relay messages from Optional Only one connector
Exchange Online, you don't these non-mailbox entities for incoming email:
have any on-premises email through Microsoft 365 or
servers, but you need to Office 365. From: Your
send email from printers, organization's
fax machines, apps, or other For details, see Option 3: email server
devices. Configure a connector to send To: Office 365
mail using Office 365 SMTP
relay
You frequently exchange You want to use Transport Optional Connector for
sensitive information with Layer Security (TLS) to encrypt incoming email:
business partners, and you sensitive information or you
want to apply security want to limit the source (IP From: Partner
restrictions. addresses) for email from the organization
partner domain. To: Office 365
For details, see Set up
Connector for
connectors for secure mail
outgoing email:
flow with a partner
organization. From: Office
365
To: Partner
organization
7 Note
If you don't have Exchange Online or EOP and are looking for information about
Send connectors and Receive connectors in Exchange 2016 or Exchange 2019, see
Connectors.
You can't have an "allow" by sender domain connector when there is a restrict by IP
or certificate connector. The restrict connector will take precedence, as partner
connectors are pulled up by IP or certificate lookup when restrictions and mail
rejections are applied. You should not have IPs and certificates configured in the
same partner connector. Instead, you should use separate connectors. Don't use
associated accepted domains unless you're testing the connector for a subset of
the accepted domains or recipient domains.
Your on- Your service Have you Do I need to set up connectors manually?
premises subscription completed
email is an Exchange
organization hybrid
is deployment?
Your on- Your service Have you Do I need to set up connectors manually?
premises subscription completed
email is an Exchange
organization hybrid
is deployment?
Exchange Exchange Not available Yes. Follow the instructions in Set up connectors
2010 or later Online to route mail between Microsoft 365 or Office
Protection 365 and your own email servers.
Exchange Exchange Not available Yes. Follow the instructions in Set up connectors
2007 or Online to route mail between Microsoft 365 or Office
earlier Protection or 365 and your own email servers.
Exchange
Online In limited circumstances, you might have a hybrid
configuration with Exchange Server 2007 and
Microsoft 365 or Office 365. Check whether
connectors are already set up for your
organization by going to the Connectors page in
the EAC.
Non- Exchange Not available Yes. Follow the instructions in Set up connectors
Microsoft Online to route mail between Microsoft 365 or Office
SMTP server Protection or 365 and your own email servers.
Exchange
Online
How connectors work with my on-premises email servers
Connectors enable mail flow in both directions (to and from Microsoft 365 or Office
365). You can enable mail flow with any SMTP server (for example, Microsoft Exchange
or a third-party email server).
The diagram below shows how connectors in Exchange Online or EOP work with your
own email servers.
In this example, John and Bob are both employees at your company. John has a mailbox
on an email server that you manage, and Bob has a mailbox in Exchange Online. John
and Bob both exchange mail with Sun, a customer with an internet email account:
When email is sent between John and Bob, connectors are needed
When email is sent between John and Sun, connectors are needed. (All internet
email is delivered via Microsoft 365 or Office 365).
When email is sent between Bob and Sun, no connector is needed.
) Important
Keep in mind that there are other options that don't require connectors. For details
about all of the available options, see How to set up a multifunction device or
application to send email.
Set up connectors to route mail between Microsoft 365 or Office 365 and your
own email servers
Set up connectors for secure mail flow with a partner organization
See also
Set up connectors to route mail between Microsoft 365 or Office 365 and your own
email servers
Mail flow best practices for Exchange Online and Microsoft 365 or Office 365 (overview)
What happens when I have multiple connectors for the same scenario?
Do I need to create a connector in
Exchange Online?
Article • 02/22/2023
Find your mail flow scenario to see if you need to create a connector for your Exchange
Online organization.
You have a standalone You have your own on-premises Yes Connector for
EOP subscription. email servers, and you subscribe to incoming email:
EOP only for email protection
services for your on-premises From: Your
mailboxes (you have no mailboxes on-premises
in Exchange Online). email server
For more information, see the To: Office 365
topic Exchange Online Protection
Connector for
overview and How connectors
outgoing email:
work with my on-premises email
servers. From: Office
365
To: Your on-
premises mail
server
Connector for
outgoing email:
From: Office
365
To: Your on-
premises
email server
Scenario Description Connector Connector settings
required?
All of your mailboxes You don't have your own email Optional Only one connector
are in Exchange Online, servers, but you need to send for incoming email:
but you need to send email from non-mailboxes:
email from sources in printers, fax machines, apps, or From: Your
your on-premises other devices. organization's
organization. For details, see Option 3: email server
Configure a connector to send To: Office 365
mail using Microsoft 365 or Office
365 SMTP relay
You frequently You want to use Transport Layer Optional Connector for
exchange sensitive Security (TLS) to encrypt sensitive incoming email:
information with information or you want to limit
business partners, and the source (IP addresses) for email From: Partner
you want to apply from the partner domain. organization
security restrictions. For details, see Set up connectors To: Office 365
for secure mail flow with a partner
Connector for
organization.
outgoing email:
From: Office
365
To: Partner
organization
7 Note
For more information about these scenarios, see Configure mail flow using
connectors in Office 365.
Inbound connector: FAQ
Article • 07/25/2023
Summary: This article covers the most common questions asked by the customers and
administrators about using Inbound connectors in Exchange Online.
For Exchange Online customers (any Office 365/Microsoft 365 customers using
Exchange Online), the following document states best practices related to transport
connectors. For more information, see Configure mail flow using connectors in Exchange
Online.
The Inbound connector of OnPremises type can be created in the following ways:
1. Within the Exchange Admin Center in Exchange Online, it's defined as follows:
The purpose of an Inbound connector of OnPremises type is for our customers that are
still in Hybrid mode. To send emails from their mailboxes hosted within on-premises
environment to mailboxes hosted in the Exchange Online service.
When you create an Inbound connector of OnPremises type, you may see the warning
message:
"Inbound connector for this service offering is created in a disabled state. Contact Support
to enable it."
When you update an Inbound connector of OnPremises type, you may see the warning
message:
"For this service offering, you can't enable an inbound connector. Contact Support to
enable it."
Read the below FAQ and document listed above to understand whether or not you
need an Inbound connector of OnPremises type.
FAQs
) Important
Effective from December 2022, the classic Exchange Admin Center will be
deprecated for worldwide customers. Microsoft recommends using the new
Exchange Admin Center , if not already doing so.
While most of the features have been migrated to new EAC, some have been
migrated to other admin centers and remaining ones will soon be migrated to New
EAC. Find features that are not yet there in new EAC at Other Features or use
Global Search that will help you navigate across new EAC.
This topic helps you set up the connectors you need for the following two scenarios:
You have your own email servers (also called on-premises servers), and you
subscribe to Exchange Online Protection (EOP) for email protection services.
You have (or intend to have) mailboxes in two places; some of your mailboxes are
in Microsoft 365 or Office 365, and some of your mailboxes are on your
organization email servers (also called on-premises servers).
) Important
Before you get started, make sure to check on your specific scenario in I have my
own email servers.
If you apply the steps described in this article to partner email services, you may
have unintended consequences including email delivery failure. To learn more
about partner scenarios, see Set up connectors for secure mail flow with a partner
organization.
The diagram below shows how connectors in Microsoft 365 or Office 365 (including
Exchange Online or EOP) work with your own email servers.
In this example, John and Bob are both employees at your company. John has a mailbox
on an email server that you manage, and Bob has a mailbox in Office 365. John and Bob
both exchange mail with Sun, a customer with an internet email account:
When email is sent between John and Bob, connectors are needed.
When email is sent between John and Sun, connectors are needed. (All internet
email is delivered via Office 365.)
When email is sent between Bob and Sun, no connector is needed.
If you have your own email servers and Microsoft 365 or Office 365, you must set up
connectors in Microsoft 365 or Office 365. Without connectors, email will not flow
between Microsoft 365 or Office 365 and your organization's email servers.
When you set up Microsoft 365 or Office 365 to accept all emails on behalf of your
organization, you will point your domain's MX (mail exchange) record to Microsoft 365
or Office 365. To prepare for this mail delivery scenario, you must set up an alternative
server (called a "smart host") so that Microsoft 365 or Office 365 can send emails to your
organization's email server (also called "on-premises server"). To complete the scenario,
you might need to configure your email server to accept messages delivered by
Microsoft 365 or Office 365.
When this connector is set up, Microsoft 365 or Office 365 accepts messages from
your organization's email server and send the messages to recipients on your
behalf. This recipient could be a mailbox for your organization in Microsoft 365 or
Office 365, or it could be a recipient on the internet. To complete this scenario,
you'll also need to configure your email server to send email messages directly to
Microsoft 365 or Office 365.
This connector enables Microsoft 365 or Office 365 to scan your email for spam and
malware, and to enforce compliance requirements such as running data loss prevention
policies. When your email server sends all email messages directly to Microsoft 365 or
Office 365, your own IP addresses are shielded from being added to a spam-block list.
To complete the scenario, you might need to configure your email server to send
messages to Microsoft 365 or Office 365.
7 Note
This scenario requires two connectors: one from Microsoft 365 or Office 365 to
your mail servers, and one to manage mail flow in the opposite direction. Before
you start, ensure you have all the information you need, and continue with the
instructions until you have set up and validated both connectors.
1. Ensure that your on-premises email server is set up and capable of sending and
receiving Internet (external) email.
2. Check that your on-premises email server has Transport Layer Security (TLS)
enabled, with a valid certification authority-signed (CA-signed) certificate. We
recommend that the certificate subject name includes the domain name that
matches the primary email server in your organization. Buy a CA-signed digital
certificate that matches this description, if necessary.
3. If you want to use certificates for secure communication between Microsoft 365 or
Office 365 and your email server, update the connector your email server uses to
receive mail. This connector must recognize the right certificate when Microsoft
365 or Office 365 attempts a connection with your server. If you're using Exchange,
see Receive connectors for more information. On the Edge Transport Server or
Client Access Server (CAS), configure the default certificate for the Receive
connector. Update the TlsCertificateName parameter on the Set-ReceiveConnector
cmdlet in the Exchange Management Shell. To learn how to open the Exchange
Management Shell in your on-premises Exchange organization, see Open the
Exchange Management Shell.
5. Open port 25 on your firewall so that Microsoft 365 or Office 365 can connect to
your email servers.
6. Ensure that your firewall accepts connections from all Microsoft 365 or Office 365
IP addresses. See Exchange Online for the published IP address ranges.
7. Make a note of an email address for each domain in your organization. You'll need
this email address later to test that your connector is working properly.
1. To set up connectors, you need permissions assigned before you can begin. To
check what permissions you need, see the Microsoft 365 and Office 365
connectors entries in the Permissions in standalone EOP topic.
2. If you want EOP or Exchange Online to relay email from your email servers to the
internet, either:
-OR-
Ensure that all the sender domains and subdomains of your organization are
configured as accepted domains in Microsoft 365 or Office 365.
For more information about defining accepted domains, see Manage accepted
domains in Exchange Online and Enable mail flow for subdomains in Exchange
Online.
3. Decide whether you want to use mail flow rules (also known as transport rules) or
domain names to deliver mail from Microsoft 365 or Office 365 to your email
servers. Most businesses choose to deliver mail for all accepted domains. For more
information, see Scenario: Conditional mail routing in Exchange Online.
7 Note
You can set up mail flow rules as described in Mail flow rule actions in Exchange
Online. For example, you might want to use mail flow rules with connectors if your
mail is currently directed via distribution lists to multiple sites.
If you don't plan to use the hybrid configuration wizard, or if you're running Exchange
Server 2007 or earlier, or if you're running a non-Microsoft SMTP mail server, or if no
connector is listed from your organization's mail server to Microsoft 365 or Office 365,
set up a connector using the wizard, as described in the procedures below.
7 Note
Before creating a connector, navigate to the new EAC from the Microsoft 365
admin center by clicking Exchange under the Admin centers pane.
6. Provide a name for the connector and click Next. The Use of connector screen
appears.
7. Choose an option that determines when you want to use the connector, and click
Next. The Routing screen appears.
7 Note
For information on choosing one of the three option on the Use of connector
screen and the reasons for choosing that option, see Options determining use of
connector, below in this article.
8. Enter the domain name or IP address of the host computer to which Office 365 will
deliver email messages.
9. Click +.
7 Note
It is mandatory to click + after entering the smart host name to navigate to the
next screen.
Checking the check box for Always use Transport Layer Security (TLS) to secure
the connection (recommended).
7 Note
It is not mandatory to configure the Transport Layer Security (TLS) settings on the
Security restrictions page. You can navigate to the next screen without choosing
anything on this screen. The need to define TLS settings on this page depends on
whether the destination server supports TLS or not.
Choosing any one of the two options under Connect only if the recipient's email
server certificate matches this criteria.
7 Note
If you are choosing the Issue by a trusted certificate authority (CA) option, the
Add the subject name or subject alternative name (SAN) matches this domain
name option is activated.
It is optional to choose the Add the subject name or subject alternative name
(SAN) matches this domain name option. However, if you choose it, you must
enter the domain name to which the certificate name matches.
Clicking Next, on which the Validation email screen appears.
12. Enter an email that belongs to the mailbox of your organization's domain.
13. Click +.
7 Note
15. Once the validation process is completed, click Next. The Review connector screen
appears.
16. Review the settings you have configured and click Create connector.
Click Next, and follow the instructions in the wizard. Click the Help or Learn More links
if you need more information. The wizard will guide you through setup. At the end,
make sure your connector validates. If the connector does not validate, double-click the
message displayed to get more information, and see Validate connectors for help
resolving issues.
3. Change your MX record to redirect your mail flow from
the internet to Microsoft 365 or Office 365
To redirect email flow to Microsoft 365 or Office 365, change the MX (mail exchange)
record for your domain. For instructions on how to do this task, see Add DNS records to
connect your domain.
1. Set up a connector from your email server to Microsoft 365 or Office 365.
2. Set up your email server to relay mail to the internet via Microsoft 365 or Office
365.
7 Note
If any connectors already exist for your organization, they are displayed on clicking
Connectors.
7 Note
Once you select the Your organization's email server radio button under
Connection from, the option under Connection to is greyed out, implying that it is
the default option chosen.
5. Provide a name for the connector and click Next. The Authenticating sent email
screen appears.
6. Choose either of the two options between By verifying that the subject name on
the certificate that the sending server uses to authenticate with Office 365
matches the domain entered in the text box below (recommended) and By
verifying that the IP address of the sending server matches one of the following
IP addresses, which belong exclusively to your organization.
7 Note
If you choose the first option, provide your domain name (if your organization has
only one domain) or any one of the domains of your organization (in case of
multiple domains). If you choose the second option, provide the IP address of
organization's domain server.
8. Review the settings you have configured, and click Create connector.
7 Note
If you need more information, you can click the Help or Learn More links. In
particular, see Identifying email from your email server for help in configuring
certificate or IP address settings for this connector. The wizard will guide you
through setup.
To start the wizard, click the plus symbol +. On the first screen, choose the options that
are depicted in the following screenshot:
Click Next, and follow the instructions in the wizard. Click the Help or Learn More links
if you need more information. In particular, see Identifying email from your email server
for help configuring certificate or IP address settings for this connector. The wizard will
guide you through setup. At the end, save your connector.
To create the Send connector in Exchange Server, use the following syntax in the
Exchange Management Shell. To learn how to open the Exchange Management Shell in
your on-premises Exchange organization, see Open the Exchange Management Shell.
7 Note
PowerShell
This example creates a new Send Connector with the following properties:
PowerShell
When there are multiple connectors, the first step to resolving mail flow issues is to
know which connector Microsoft 365 or Office 365 is using. Microsoft 365 or Office 365
uses the following order to choose a connector to apply to an email:
Connector 1 is configured for all accepted domains in your organization. The following
screenshot shows the connectors wizard screen where you define which domains the
connector applies to. In this case, the setting chosen is For email messages sent to all
accepted domains in your organization. The following two screenshots depict the
chosen setting for New EAC and Classic EAC, respectively.
Connector 2 is set up specifically for your company domain Contoso.com. The following
screenshot shows the connectors wizard screen where you define which domains the
connector applies to. In this case, the setting chosen is Only when email messages are
sent to these domains. For Connector 2, your company domain Contoso.com is
specified. The following two screenshots depict the chosen setting for New EAC and
Classic EAC, respectively.
Connector 3 is also set up by using the option Only when email messages are sent to
these domains. But, instead of the specific domain Contoso.com, the connector uses a
wildcard: *.Contoso.com as shown in the following screenshot. The following two
screenshots depict the chosen setting for New EAC and Classic EAC, respectively.
For each email sent from Microsoft 365 or Office 365 to mailboxes on your email server,
Microsoft 365 or Office 365 selects the most specific connector possible. For email sent
to:
See also
Configure mail flow using connectors
Mail flow best practices for Exchange Online, Microsoft 365, and Office 365 (overview)
Validate connectors
You can create connectors to apply security restrictions to mail exchanges with a partner
organization or service provider. A partner can be an organization you do business with,
such as a bank. It can also be a third-party cloud service that provides services such as
archiving, anti-spam, and filtering.
You can create a connector to enforce encryption via transport layer security (TLS). You
can also apply other security restrictions such as specifying domain names or IP address
ranges that your partner organization sends mail from.
7 Note
If you use a third-party cloud service for email filtering and need instructions for making
this work with Microsoft 365 or Office 365, see Mail flow best practices for Exchange
Online and Microsoft 365 or Office 365 (overview).
7 Note
For information about TLS, see How Exchange Online uses TLS to secure email
connections and for detailed technical information about how Exchange Online
uses TLS with cipher suite ordering, see Enhancing mail flow security for Exchange
Online .
When you set up a connector, email messages are checked to ensure they meet the
security restrictions that you specify. If email messages don't meet the security
restrictions that you specify, the connector rejects them, and those messages will not be
delivered. This behavior of the connector makes it possible to set up a secure
communication channel with a partner organization.
You can set up one or both of the following, depending on your requirements:
Set up a connector to apply security restrictions to mail sent from Microsoft 365 or
Office 365 to your partner organization
Set up a connector to apply security restrictions to mail sent from your partner
organization to Microsoft 365 or Office 365
Change a connector that Microsoft 365 or Office 365 is using for mail flow
Example security restrictions you can apply to email sent from a partner
organization
Review this section to help you determine the specific settings you need for your
business.
Check for any connectors that are already listed here for your organization. For
example, if you already have a connector set up for a partner organization, you'll
see it listed. Ensure you don't create duplicate connectors for a single
organizational partner; when this happens, it can cause errors, and your mail might
not be delivered.
If any connectors already exist for your organization, you can see them listed here, as
shown in the below screenshots for New EAC and Classic EAC, respectively.
Navigate to the new EAC from the Microsoft 365 admin center by clicking
Exchange under the Admin centers pane.
6. Provide a name for the connector and click Next. The Use of connector screen
appears.
7. Choose any one of the two options between Only when i have a transport rule set
up that redirects messages to this connector and Only when email messages are
sent to these domains.
7 Note
If you choose the second option, provide the name of any one of the domains that
are part of your organization. If there is only one domain for your organization,
enter its name.
8. Click + (after entering the domain name, if you have chosen Only when email
messages are sent to these domains)
10. Choose any of the two options between Use the MX record associated with the
partner's domain and Route email through these smart hosts.
If you choose the first option, you need not mention the details of smart host. If
you choose second option, enter the domain name of the smart host in the text
box.
12. Check the check box for Always use Transport Layer Security (TLS) to secure the
connection (recommended).
7 Note
It is not mandatory to configure the Transport Layer Security (TLS) settings on the
Security restrictions page. You can navigate to the next screen without choosing
anything on this screen. The need to define TLS settings on this page depends on
whether the destination server supports TLS or not.
13. Choose one of the options under Connect only if the recipient's email server
certificate matches this criteria.
7 Note
If you are choosing the Issue by a trusted certificate authority (CA) option, the
Add the subject name or subject alternative name (SAN) matches this domain
name option is activated.
It is optional to choose the Add the subject name or subject alternative name
(SAN) matches this domain name option. However, if you choose it, you must
enter the domain name to which the certificate name matches.
15. Enter an email address that is part of the mailbox in your organization's email
server.
16. Click +.
18. Once the validation process is completed, click Next. The Review connector screen
appears.
19. Review the settings you have configured, and click Create connector.
The connector is created.
7 Note
If you need more information about the setup, click the Help or Learn More links.
20. At the end, ensure your connector validates. If the connector does not validate, see
Validate connectors for help resolving issues.
To start the wizard, click the plus symbol +. On the first screen, choose the options that
are depicted in the following screenshot:
Click Next, and follow the instructions in the wizard. Click the Help or Learn More links
if you need more information. The wizard will guide you through setup. At the end,
ensure your connector validates. If the connector does not validate, see Validate
connectors for help resolving issues.
If you want to create a secure channel with your partner organization in both directions,
set up a connector that restricts mail flow from your partner organization to Microsoft
365 or Office 365.
7 Note
Once you select the Partner organization radio button under Connection from, the
option under Connection to is greyed out, implying that Office 365 is chosen by
default.
4. Click Next. The Connector name screen appears.
5. Provide a name for the connector and click Next. The Authenticating sent email
screen appears.
6. Choose one of the two options between By verifying that the sender domain
matches one of the following domains and By verifying that the IP address of
the sending server matches one of the following IP addresses, which belong to
your partner organization.
7 Note
If you choose By verifying that the sender domain matches one of the following
domains, you can provide the name of any one domain from the list of domains for
your organization. If you have only one domain for your organization, enter its
name. If you choose By verifying that the IP address of the sending server
matches one of the following IP addresses, which belong to your partner
organization, provide an IP address of any of the recipients who are part of your
organization's mailbox.
8. Check the check box for Reject email messages if they aren't sent over TLS.
7 Note
It is optional to choose the option of And require that the subject name of the
certificate that the partner uses to authenticate with Office 365 matches this
domain name. If you choose this option, enter the domain name of the partner
organization.
9. Check the check box for Reject email messages if they aren't sent from within this
IP address range, and provide the IP address range.
) Important
You can choose this option in addition to the option specified in Step 5; Else, you
can choose either this option or the one in Step 5. Choosing at least one of these
options is mandatory.
11. Review the settings you have configured, and click Create connector.
7 Note
If you need more information, you can click the Help or Learn More links. In
particular, see Identifying email from your email server for help in configuring
certificate or IP address settings for this connector. The wizard will guide you
through the setup.
Ask your partner organization to send a test email. Ensure the email your partner
organization sends will cause the connector to be applied. For example, if you specified
security restrictions for mail sent from a specific partner domain, ensure they send test
mail from that domain. Check that the test email is delivered to confirm that the
connector works correctly.
Select the connector you want to edit and then click the Edit icon, as shown in the
following two screens for New EAC and Classis EAC, respectively.
The connector wizard opens, and you can make changes to the existing connector
settings. While you change the connector settings, Microsoft 365 or Office 365
continues to use the existing connector settings for mail flow. When you save changes
to the connector, Microsoft 365 or Office 365 starts using the new settings.
For details on this procedure, see the For New EAC subsection in the Set up a
connector to apply security restrictions to mail sent from your partner organization to
Microsoft 365 or Office 365 section in this topic.
For Classic EAC
From the new EAC portal, navigate to the Classic EAC portal by clicking Classic Exchange
admin center. Select mail flow and then connectors.
To start the wizard, click the plus symbol +. To create a connector for email you receive
from a partner organization, use the options depicted in the following screenshot:
Once you choose this mail flow scenario, you can set up a connector that will apply
security restrictions to emails that your partner organization sends to you. For some
security restrictions, you might need to talk to your partner organization to obtain
information to complete some settings. Look for the examples that best meet your
needs to help you set up your partner connector.
7 Note
Any email sent from your partner organization which does not meet security
restrictions that you specify will not be delivered.
During setup of the connector in the New EAC, use the options as shown in the
following screenshots:
Use this screen to enter your partner organization's domain name(s) so the connector
can identify mail sent by your partner:
Choose this setting to require encryption for all email from ContosoBank.com using TLS:
During setup of the connector in the Classic EAC, use the options as shown in the
following screenshots:
Use this screen to enter your partner organization's domain name(s) so the connector
can identify mail sent by your partner:
Choose this setting to require encryption for all email from ContosoBank.com using TLS:
When you choose these settings, all emails from your partner organization's domain,
ContosoBank.com, must be encrypted using TLS. Any mail that is not encrypted will be
rejected.
2. Add the certificate domain name that your partner organization uses to connect
with Microsoft 365 or Office 365.
2. Add the certificate domain name that your partner organization uses to connect
with Microsoft 365 or Office 365.
When you set these restrictions, all mail from your partner organization domain must be
encrypted using TLS, and sent from a server with the certificate name you specify. Any
email that does not meet these conditions will be rejected.
To do this, specify your partner organization domain name to identify mail from that
partner, and then restrict the IP addresses that you accept mail from. Using an IP
address makes the connector more specific because it identifies a single address or an
address range that your partner organization sends mails from.
When you set these restrictions, all emails that are sent from your partner organization
domain, ContosoBank.com, or from your on-premises environment will be from the IP
address or an address range you specify. Any mail that does not meet these conditions
will be rejected.
7 Note
Ensure you identify the full range of IP addresses that your third-party email service
sends mail from. If you miss an IP address, or if one gets added without your
knowledge, some mails will not be delivered to your organization.
In the New EAC, to restrict all mails sent to your organization from a specific IP address
or address range, use the options during setup as shown in the following screenshots:
In the Classic EAC, to restrict all mails sent to your organization from a specific IP
address or address range, use the options during setup as shown in the following
screenshots:
When you set these restrictions, all mails sent to your organization will be from a
specific IP address range. Any internet email that does not originate from this IP address
range will be rejected.
To identify your partner organization by IP address, in the Classic EAC, use the options
during setup, as shown in the screenshots below:
Add the requirement for TLS encryption by using this setting:
When you set these restrictions, all mail from your partner organization sent from the IP
address or address range you specify must be sent using TLS. Any mail that does not
meet this restriction will be rejected.
See also
Configure mail flow using connectors in Microsoft 365 or Office 365
Mail flow best practices for Exchange Online, Microsoft 365, and Office 365 (overview)
Validate connectors
What happens when I have multiple connectors for the same scenario?
Validate connectors in Exchange Online
Article • 02/22/2023
If your organization has its own email server (also called on-premises server), you must
set up connectors to enable mail flow between Microsoft 365 or Office 365 and your
email server. For mail flow to work correctly, your connectors must be validated and
turned on. Connector validation runs as part of the connector setup process. This article
helps if you want to validate your connectors at a different time, or if you want to
understand more about the process. Use built-in connector validation to test whether a
connector is set up correctly and fix any mail flow issues before you turn the connector
on.
7 Note
If you want to change connector settings, Microsoft 365 or Office 365 uses the
existing connector settings for mail flow until you save your changes. For more
information, see Change a connector that Microsoft 365 or Office 365 is using for
mail flow
Before validating and turning on the connectors, sign in to Microsoft 365 or Office 365,
choose Admin, and then select Exchange to go to the New EAC.
7 Note
To navigate to Classic EAC, you need not seperately launch its URL. You can
navigate from New EAC interface by clicking Classic Exchange admin center on the
left-bottom.
7 Note
Any Microsoft 365 or Office 365 connectors that exist for your organization are
listed on the Connectors page. This list includes connectors that were created by
using the Hybrid Configuration Wizard or PowerShell. You can validate any
connector configured for mail flow from Microsoft 365 or Office 365 to your
organization's email server, or to a partner organization.
2. Choose and click the connector you want to validate or turn on.
5. Under Status, if Off is displayed, click Edit name or status. The Connector name
screen appears.
6. Under What do you want to do after connector is saved, check the check box for
Turn it on.
7. Click Next. The Validation email screen appears.
8. Enter an email address that is part of the active mailbox on your organization's
email server.
The connector is updated successfully from being turned off to being turned on.
1. Navigate to the Classic EAC portal by clicking Classic Exchange admin center.
Select mail flow and then connectors.
Any Microsoft 365 or Office 365 connectors that exist for your organization are
listed on the Connectors page. This includes connectors that were created by
using the Hybrid Configuration Wizard or PowerShell. You can validate any
connector configured for mail flow from Microsoft 365 or Office 365 to your
organization's email server, or to a partner organization.
2. Choose the connector you want to validate or turn on. You can see information
about the connector in the details pane as shown in the following screen shot.
3. When you select a connector for mail flow that originates in Microsoft 365 or
Office 365, you can choose the Validate this connector link. You can also see
whether the connector was validated previously as shown in the following screen
shot.
4. With the connector selected, choose Validate this connector. The Validate this
connector dialog box opens. Enter one or more email addresses to start the
validation. Microsoft 365 or Office 365 uses these addresses to make sure your
mail flow is set up correctly. For example, if you want to validate a connector for
mail flow from Microsoft 365 or Office 365 to your organization's email server,
enter an email address for a mailbox located on that email server.
5. Choose Validate to continue. To find out what issues validation examines, and for
details about fixing any validation errors, see Validate connectors.
6. For each connector, check whether the connector is turned on. If a connector that
you need for mail flow isn't turned on, under Status choose Turn it on.
7 Note
If you continue to have mail flow issues after validating a connector, check whether
you have set up multiple connectors that might apply in a single scenario. For
example, problems can occur if you have more than one connector set up for mail
flow from Microsoft 365 or Office 365 to your email server. If you need multiple
connectors for mail flow from Microsoft 365 or Office 365 to your email server (or
to a partner), ensure you validate and turn on each connector. If you want to
change a connector, Microsoft 365 or Office 365 uses the existing connector
settings for mail flow until you save your changes. For more information, see
Change a connector that Microsoft 365 or Office 365 is using for mail flow
See also
Set up connectors to route mail between Microsoft 365 or Office 365 and your own
email servers
Validate connectors
There might be times you need to route mail differently. These different routes depend
on the recipient or sender of the mail, where it's being sent, the contents of the
message, and so on. For example, if you have multiple sites around the world, you might
want to route mails to a specific site. You can do this using connectors and mail flow
rules (also known as transport rules).
When the steps below are completed, a mail flow rule will redirect messages addressed
to users whose City property is set to New Orleans to the IP address specified by the
connector from Office 365 to your organization's email server.
The subsequent two procedures are for creating connectors from Office 365 to your
organization's email server. These connectors are to be created in the New Exchange
admin center (EAC) and Classic EAC.
New EAC
1. Navigate to Mail flow > Connectors. The Connectors screen appears.
4. Under Connection to, choose either Your organization's email server or Partner
organization (if you want to connect to a server other than your organizations).
5. Click Next. The Connector name screen appears.
7. Check the check box for Turn it on under What do you want to do after
connector is saved?
11. Enter one or more smart hosts in the text box. (These smart hosts are the ones to
which Microsoft 365 or Office 365 will deliver email messages.)
7 Note
You must provide either the domain name or the IP address of the server.
12. Click +. The smart host value is displayed under the text box.
7 Note
It is mandatory to click + after entering the smart host name to navigate to the
next screen.
14. Check the check box for Always use Transport Layer Security (TLS) to secure the
connection (recommended).
15. Click Next. The Validation email screen appears.
16. Enter an email address that is valid on the mailbox of your organization's email
server.
17. Click +. The email address is displayed below the text box, indicating it is ready to
be validated.
19. Once the validation process is completed, click Next. The Review connector screen
appears.
20. Review the settings for the new connector and click Create connector. The
connector is created.
Classic EAC
1. Go to Mail flow > Connectors and click New to create a new connector.
3. In the To: drop-down box, choose either Your organization's email server or Partner
organization if you want to connect to a server other than your organizations.
4. Name the connector and add a description. If you want to turn on the connector
immediately, check Turn it on. Click Next.
7. Define your Transport Layer Security (TLS) settings depending on your security
needs.
8. Review your new connector configurations and click Next to validate the
connector.
7 Note
1. In the EAC, navigate to Mail flow > Rules. Click New and choose Create a new
rule....
2. In the New rule window, name the rule. To see all the options available for the rule,
click More options... at the bottom of the page.
3. For *Apply this rule if..., select The recipient... and has specific properties
including any of these words. The select user properties box appears. Click , and
under User properties: choose City. City is an Active Directory attribute made
available for use by the rule. Specify the name of the city, such as New Orleans.
Click OK, and then click OK again to close the select user properties box.
) Important
Check the accuracy of user attributes in Active Directory to ensure that the
mail flow rule works as intended. > Note that changes made in the connector
from Office 365 to your organization's email server take time to replicate.
4. For *Do the following..., choose Redirect the message to... and then specify the
following connector. The select connector box appears. Choose the connector
(from Office 365 to your organization's email server) that you created previously.
You can choose more properties for the rule, such as the test mode and when to
activate the rule.
Many third-party cloud service solutions provide add-on services for Exchange Online.
For security reasons, we don't allow third-party email add-on services to be installed in
Exchange Online. But, you can work with the service provider to configure the settings in
your Exchange Online organization so that you can use the service.
This topic describes the best practices for how your organization can use a third-party
email add-on service by examining a fictional service named Contoso Signature Service.
This fictional service runs in Azure and provides custom email signatures.
7 Note
The mail flow and a high-level summary of the service are shown in the following
diagram.
Contoso Signature Service uses smart host routing to route messages back to
the region where your Exchange Online organization is located. For example,
if your Exchange Online domain is fabrikam.onmicrosoft.com, the destination
smart host is fabrikam.mail.protection.outlook.com.
Contoso Signature Service provides a unique certificate domain name for
each customer. You configure this domain name as an accepted domain in
your Exchange Online organization and in the connector settings (for
example, S5HG3DCG14.smtp.contososignatureservice.com).
4. Exchange Online sends the message with the customized signature to the original
recipients.
The rest of this topic explains how to configure mail flow in Exchange Online to work
with the email add-on service.
7 Note
These elements are required for any email add-on service that you want to
integrate with your Exchange Online organization. You need to work with the email
add-on service provider to configure their required settings in Exchange Online.
You need permissions before you can perform this procedure or procedures. To
see what permissions you need, see the "Mail flow" entry in the Feature
permissions in Exchange Online topic.
To open the Exchange admin center (EAC), see Exchange admin center in Exchange
Online. To learn how to use Windows PowerShell to connect to Exchange Online,
see Connect to Exchange Online PowerShell.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
2. The new connector wizard opens. On the first page, configure these settings:
4. On the Use of connector page, select Only when I have a transport rule set up
that redirects messages to this connector, and then click Next.
5. On the Routing page, enter the smart host value click or the email add-on service
(for example, smtp.contososignatureservice.com), click Add , and then click Next.
8. On the Review connector page, review the settings for the new connector. You can
click Edit in the specific section to edit those settings.
When you're finished, click Create connector.
4. On When do you want to use this connector? page, select Only when I have a
transport rule set up that redirects messages to this connector, and then click
Next.
5. On the How do you want to route email messages? page, click Add . In the Add
smart host dialog that appears, enter the smart host value for the email add-on
service (for example, smtp.contososignatureservice.com), click Save, and then click
Next.
6. On the How should Office 365 connect to your email server? page, configure
these settings:
Verify Always use Transport Layer Security (TLS) to secure the connection
(recommended) is selected.
Verify Issued by a trusted certificate authority (CA) is selected.
Select And the subject name or subject alternative name (SAN) matches
this domain name, and enter the smart host that you used in the previous
step (for example, smtp.contososignatureservice.com).
7. On the Confirm your settings page, verify the settings. Click Back to modify the
settings as necessary.
PowerShell
PowerShell
In the EAC, go to Mail flow > Connectors, select the connector, and then verify the
settings.
In Exchange Online PowerShell, replace <Connector Name> with the name of the
connector, and run this command to verify the property values:
PowerShell
7 Note
Mail flow rule creation in the new EAC is exactly the same as in the classic EAC.
1. Go to Mail flow > Rules, and click New , and then select Create a new rule.
2. In the New rule page that opens, click More options near the bottom of the page.
PowerShell
PowerShell
In the EAC, go to Mail flow > Rules, select the rule, click Edit , and verify the
settings of the rule.
In Exchange Online PowerShell, replace <Rule Name> with the name of the rule,
and run this command to verify the property values:
PowerShell
4. The next page that you see depends on your previous selection. Use the details on
the page to create the required TXT or MX proof of domain ownership record for
the custom certificate domain.
After you've created the proof of domain ownership record, click Verify and wait
for the results.
5. On the Authenticating sent email page, verify that the first option is selected
(verify by certificate), and enter the certificate domain that the email add-on
service gave to you when you enrolled in the service (for example,
S5HG3DCG14.smtp.contososignatureservice.com).
6. On the Review connector page, verify the settings. You can click Edit in the
appropriate section to make changes. When you're finished, click Create
connector*.
Create the inbound connector in the classic EAC
1. Go to Mail flow > Connectors, and then click New .
2. The new connector wizard opens. On the Select your mail flow scenario page,
configure these settings:
4. On the How should Office 365 identify email from your email server? page, verify
that the first option is selected (verify by certificate), and enter the certificate
domain that the email add-on service gave to you when you enrolled in the service
(for example, S5HG3DCG14.smtp.contososignatureservice.com).
5. On the Confirm your settings page, verify the settings. You can click Back to
modify the settings.
PowerShell
PowerShell
In the EAC, go to Mail flow > Connectors, select the connector, and then verify the
settings.
In Exchange Online PowerShell, replace <Connector Name> with the name of the
connector, and run this command to verify the property values:
PowerShell
As you can see, the message adopts the source IP of the service, appliance, or on-
premises Exchange organization that sits in front of Microsoft 365. The message arrives
in Microsoft 365 with a different source IP address. This behavior isn't a limitation of
Microsoft 365; it's simply how SMTP works.
In these scenarios, you can still get the most out of Exchange Online Protection (EOP)
and Microsoft Defender for Office 365 by using Enhanced Filtering for Connectors (also
known as skip listing).
After you enable Enhanced Filtering for Connectors, mail routing in complex routing
scenarios looks like this:
As you can see, Enhanced Filtering for connectors allows IP address and sender
information to be preserved, which has the following benefits:
Improved accuracy for the Microsoft filtering stack and machine learning models,
which include:
Heuristic clustering
Anti-spoofing
Anti-phishing
Better post-breach capabilities in Automated investigation and response (AIR)
Able to use explicit email authentication (SPF, DKIM, and DMARC) to verify the
reputation of the sending domain for impersonation and spoof detection. For
more information about explicit and implicit email authentication, see Email
authentication in EOP.
For more information, see the What happens when you enable Enhanced Filtering for
Connectors? section later in this article.
Use the procedures in this article to enable Enhanced Filtering for Connectors on
individual connectors. For more information about connectors in Exchange Online, see
Configure mail flow using connectors.
7 Note
If you have mail flow rules (also known as transport rules) that set the SCL to -1 for
messages that flow through this connector, you must disable those mail flow rules
after you enable Enhanced Filtering for Connectors.
2. On the Enhanced Filtering for Connectors page, select the inbound connector that
you want to configure by clicking on the name.
3. In the connector details flyout that appears, configure the following settings:
Disable Enhanced Filtering for Connectors: Turn off Enhanced Filtering for
Connectors on the connector.
Skip these IP addresses that are associated with the connector: Select
this value to configure a list of IP addresses to skip.
) Important
Entering the IP addresses of Microsoft 365 or Office 365 is not
supported. Do not use this feature to compensate for issues
introduced by unsupported email routing paths. Use caution and
limit the IP ranges to only the email systems that will handle your
own organization's messages prior to Microsoft 365 or Office 365.
Entering any private IP address defined by RFC 1918 (10.0.0.0/8,
172.16.0.0/12, and 192.168.0.0/16) is not supported. Enhanced
Filtering automatically detects and skips private IP addresses. If the
previous hop is an email server that's behind a network address
translation (NAT) device that assigns private IP addresses, we
recommend that you configure NAT to assign a public IP address
to the email server.
If you selected Automatically detect and skip the last IP address or Skip
these IP addresses that are associated with the connector, the Apply to
these users section appears:
7 Note
This value is only affective on the actual email addresses that you
specify. For example, if a user has five email addresses associated
with their mailbox (also known as proxy addresses), you'll need to
specify all five of their email addresses here. Otherwise, messages
that are sent to the four other email addresses will go through
normal filtering.
In hybrid environments where inbound mail flows through on-
premises Exchange, you must specify the targetAddress of the
MailUser object. For example,
michelle@contoso.mail.onmicrosoft.com.
This value is only affective on messages where all recipients are
specified here. If a message contains any recipients that aren't
specified here, normal filtering is applied to all recipients of the
message.
PowerShell
EFSkipIPs: The specific IP addresses to skip when the EFSkipLastIP parameter value
is $false . Valid values are:
A single IP address: For example, 192.168.1.1 .
An IP address range: For example, 192.168.1.0-192.168.1.31 .
Classless Inter-Domain Routing (CIDR) IP: For example, 192.168.1.0/25 .
See the Skip these IP addresses that are associated with the connector
description in the previous section for limitations on IP addresses.
EFUsers: The comma-separated email address of recipient email addresses that you
want to apply Enhanced Filtering for Connectors to. See the Apply to a small set of
users description in the previous section for limitations on individual recipients.
The default value is blank ( $null ), which means Enhanced Filtering for Connectors
is applied to all recipients.
This example configures the inbound connector named From Anti-Spam Service with
the following settings:
Enhanced Filtering for Connectors is enabled on the connector, and the IP address
of the last message source is skipped.
Enhanced Filtering for Connectors only applies to the recipient email addresses
michelle@contoso.com, laura@contoso.com, and julia@contoso.com.
PowerShell
Set-InboundConnector -Identity "From Anti-Spam Service" -EFSkipLastIP $true
-EFUsers "michelle@contoso.com","laura@contoso.com","julia@contoso.com"
Note: To disable Enhanced Filtering for Connectors, use the value $false for the
EFSkipLastIP parameter.
Email domain authentication Implicit Explicit, based on the source domain's SPF,
using anti- DKIM, and DMARC records in DNS.
spoof
protection
technology.
You can view the improvements in filtering and reporting by using the Threat protection
status report in the Microsoft 365 Defender portal. For more information, see Threat
protection status report.
See also
Mail flow best practices for Exchange Online, Microsoft 365, and Office 365 (overview)
Directory-Based Edge Blocking (DBEB) lets you reject messages for invalid recipients at
the service network perimeter in Microsoft 365 organizations with Exchange Online
mailboxes and in standalone Exchange Online Protection (EOP) organizations without
Exchange Online mailboxes. DBEB lets admins add mail-enabled recipients to Microsoft
365 or Office 365 and block all messages sent to email addresses that aren't present in
Microsoft 365 or Office 365.
If a message is sent to a valid email address in Microsoft 365 or Office 365, the message
continues through the rest of the service filtering layers: anti-malware, anti-spam, and
mail flow rules (also known as transport rules). If the address doesn't exist, the service
blocks the message before filtering even occurs, and a non-delivery report (also known
as an NDR or bounce message) is returned to the sender. The NDR looks like this: 550
5.4.1 Recipient address rejected: Access denied .
If all recipients for your domain are in Exchange Online, DBEB is already in effect, and
you don't need to do anything. If you're migrating from another email system to
Exchange Online, you can use the procedure in this topic to enable DBEB for the domain
before the migration.
7 Note
In hybrid environments, in order for DBEB to work, the MX record for the
domain must point to Microsoft 365 or Office 365 so that email for the
domain is routed to Microsoft 365 or Office 365 first.
To open the Exchange admin center (EAC), see Exchange admin center in Exchange
Online.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at:
Exchange Online , or Exchange Online Protection .
Configure DBEB
This section describes the procedure to configure DBEB for both the New Exchange
admin center (EAC) and Classic EAC.
1. Verify that your accepted domain in Exchange Online is set to Internal relay:
a. Navigate to Mail flow > Accepted domains. The Accepted domains screen
appears.
b. Select an accepted domain and click it. The accepted domain's details screen
appears.
c. Ensure that the domain type is set to Internal relay. If it's set to Authoritative,
change it to Internal relay.
d. Click Save.
a. Navigate to Mail flow > Accepted domains. The Accepted domains screen
appears.
b. Select an accepted domain and click it. The accepted domain's details screen
appears.
c. Ensure that the domain type is set to Authoritative. If it's set to Internal relay,
change it to Authoritative.
d. Click Save.
1. Verify that your accepted domain in Exchange Online is set to Internal relay:
c. Ensure that the domain type is set to Internal relay. If it's set to Authoritative,
change it to Internal relay.
d. Click Save.
d. Click Save.
4. Choose Save to save your changes, and confirm that you want to enable DBEB.
7 Note
Until all of your valid recipients have been added to Exchange Online and
replicated through the system, you should leave the accepted domain
configured as Internal relay. Once the domain type has been changed to
Authoritative, DBEB is designed to allow any SMTP address that has been
added to the service (except for mail-enabled public folders). There might be
infrequent instances where recipient addresses that do not exist in your
Microsoft 365 or Office 365 organization are allowed to relay through the
service.
Manage accepted domains in Exchange
Online
Article • 02/22/2023
When you add your domain to Microsoft 365 or Office 365, it's called an accepted
domain. This functionality of an accepted domain means that users in this domain can
send and receive mail. For more information on how to add your domain to Microsoft
365 or Office 365 using the Microsoft 365 admin center, see Add a domain to Microsoft
365 or Office 365.
After you add your domain using the Microsoft 365 admin center, you can use the
Exchange admin center (EAC) to view your accepted domains and configure the domain
type.
Authoritative: Email is delivered to email addresses that are listed for recipients in
Microsoft 365 or Office 365 for this domain. Emails for unknown recipients are
rejected.
If you just added your domain to Microsoft 365 or Office 365 and you select this
option, it's critical that you add your recipients to Microsoft 365 or Office 365
before setting up mail to flow through the service.
Typically, you use this option when all the email recipients in your domain are
using Microsoft 365 or Office 365. You can also use it if some recipients exist on
your own email servers. However, if recipients exist on your own email servers,
you must add your recipients to this Microsoft 365 or Office 365 domain in
order to make sure that mail is delivered as expected. For more information
about how to manage your recipients, see these topics:
Exchange Online: Manage mail users
Exchange Online Protection: Manage mail users in EOP
Setting this option enables Directory-Based Edge Blocking (DBEB), which rejects
messages for invalid recipients at the service network perimeter. For more
information about configuring DBEB during a migration, see Use Directory-
Based Edge Blocking to reject messages sent to invalid recipients.
Internal relay (also known as non-authoritative): Recipients for this domain can
be in Microsoft 365 or Office 365 or your own email servers. Email is delivered to
known recipients in Office 365 or is relayed to your own email server if the
recipients aren't known to Microsoft 365 or Office 365.
You should not select this option if all of the recipients for this domain are in
Microsoft 365 or Office 365.
If you select this option, you must create a connector for mail flow from
Microsoft 365 or Office 365 to your on-premises email server; otherwise
recipients on the domain who are not hosted in Microsoft 365 or Office 365
won't be able to receive mail on your own email servers. For more information
about setting up connectors, see Set up connectors to route mail between
Microsoft 365 or Office 365 and your own email servers.
This option is required if you enable the subdomain routing option on a domain
in order to let email pass through the service and be delivered to any
subdomains of your accepted domains. For more information, see Enable mail
flow for subdomains in Exchange Online.
You need permissions before you can perform this procedure or procedures. To
see what permissions you need, see the "Domains" entry in the Feature
permissions in Exchange Online topic.
To open the Exchange admin center (EAC), see Exchange admin center in Exchange
Online. To connect to Exchange Online PowerShell, see Connect to Exchange
Online PowerShell.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
2. Click the Name, Accepted Domain, or Domain Type column heading to sort
alphabetically in ascending or descending order. By default, accepted domains are
sorted alphabetically by name in ascending order.
2. Click the Name, Accepted Domain, or Domain Type column heading to sort
alphabetically in ascending or descending order. By default, accepted domains are
sorted alphabetically by name in ascending order.
Configure the domain type
After you add a domain to your Exchange Online organization in the Microsoft 365
admin center, you can configure the domain type.
New EAC
1. Navigate to Mail flow > Accepted domains. The Accepted domains screen
appears.
2. Select an accepted domain and click it. The accepted domain's details screen
appears.
3. Under the This accepted domain is section, select the domain type. The possible
values are Authoritative and Internal relay.
If you select Authoritative, you must confirm that you want to enable
Directory-Based Edge Blocking.
If you select Internal Relay, you can enable the match-subdomains to enable
mail flow to all subdomains. For more information, see Enable mail flow for
subdomains in Exchange Online.
4. Click Save.
Classic EAC
1. In the Classic EAC, go to Mail flow > Accepted domains.
3. In the Accepted Domain window, under This accepted domain is section, select
the domain type. The possible values are Authoritative and Internal relay.
If you select Authoritative, you must confirm that you want to enable
Directory-Based Edge Blocking.
If you select Internal Relay, you can enable the match-subdomains to enable
mail flow to all subdomains. For more information, see Enable mail flow for
subdomains in Exchange Online.
PowerShell
Get-AcceptedDomain
To view details about a specific accepted domain, use the following syntax.
PowerShell
This example shows details about the accepted domain named contoso.com.
PowerShell
This example configures the accepted domain named contoso.com as an internal relay
domain.
PowerShell
If you have a hybrid environment, with mailboxes hosted both in Exchange Online and
on-premises Exchange, and you have subdomains of the accepted domains that only
exist in your on-premises environment, you can enable email flow to and from these on-
premises subdomains. For example, if you have an accepted domain called
Contoso.com, and you enable match subdomains, users can send email to, or receive
email from all subdomains of Contoso.com that exist in your on-premises environment,
such as marketing.contoso.com and nwregion.contoso.com. In Microsoft Forefront
Online Protection for Exchange (FOPE), this feature was called catch-all domains.
) Important
If you have a limited number of subdomains, and know all the subdomain
names, we recommend setting up each subdomain as an accepted domain in
the Microsoft 365 admin center, instead of using the procedures in this topic.
By setting up each subdomain separately, you can have finer control over mail
flow and can include unique mail flow rules (also known transport rules) for
each subdomain. For more information about adding a domain in the
Microsoft 365 admin center, see Add a domain to Microsoft 365.
In order to enable match subdomains, an accepted domain must be set up as
an internal relay domain. For information about setting the domain type to
internal relay, see Manage accepted domains in Exchange Online.
In order to send email to public folders within your Exchange Online
environment, you need to set the domain type to internal relay if the domain
contains recipient addresses assigned to public folders. Directory-Based Edge
Blocking cannot be used for public folders.
After you enable match subdomains, in order for the service to deliver mail for
all subdomains to your organization's email server (outside Microsoft 365 or
Office 365), you must also change the connector that is used for transmitting
messages from Office 365 to your organization's email server. For instructions,
see Use the EAC to add the domain to the connector used for transmitting
messages from Office 365 to your organization's email server.
What do you need to know before you begin?
Estimated time to complete: 5 minutes
You need permissions before you can perform this procedure or procedures. To
see what permissions you need, see the "Domains" entry in the Feature
permissions in Exchange Online topic.
To open the Exchange admin center (EAC), see Exchange admin center in Exchange
Online. To connect to Exchange Online PowerShell, see Connect to Exchange
Online PowerShell.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
4. Check the check box for Accept mail for all subdomains.
5. Click Save.
2. Select a connector that is used for transmitting messages from Office 365 to your
organization's email server.
4. In the connector properties screen that appears, under Use of connector, click Edit
use.
5. In the Use of connector screen that appears, select Only when email messages are
sent to these domains.
6. In the text box, enter the name of the domain to which you want to apply the
connector. For example, *.contoso.com.
7. Click +.
8. Click Next.
9. In the Validation email screen that appears, In the text box, enter the email of an
active mailbox on your organization's server.
2. Select a connector that is used for transmitting messages from Office 365 to your
organization's email server.
4. Click Next. The When do you want to use this connector section appears.
5. Select the radio button for Only when email messages are sent to these domains.
7. In the text box, enter the name of the domain to which you want to apply the
connector. For example, *.contoso.com.
8. Click OK. The Edit Connector screen reappears. The value *.contoso.com is listed in
the text field.
9. Click Next and navigate through the other screens in the wizard.
11. Click +.
PowerShell
PowerShell
There are many reasons why you might want to control the types and the format of
messages that your users send from Exchange Online to recipients in external domains.
For example:
You don't want to let your users forward messages to recipients in other domains.
You work with an organization that you don't want to receive automatic messages
from (for example, non-delivery reports and out-of-office replies).
You have a business partner that's outside your organization, and you'd like that
partner to receive the same out-of-office replies as those received by people inside
your organization.
Your users frequently send email to a company that supports limited email formats,
and you'd like to make sure all emails sent to that organization are sent in a format
that they can read.
To accomplish this, you use what's called a remote domain. The remote domain settings
override settings that your users might configure in Outlook or Outlook on the web
(formerly known as Outlook Web App), or that you configure in the Exchange admin
center (EAC) or Exchange Online PowerShell. For example, users might have an out-of-
office reply set up for people outside the organization, but if a sender from a remote
domain sends mail to them, and the remote domain is not set to receive out-of-office
replies, no out-of-office reply is sent. To change the settings, you can:
Create a remote domain for a specific domain, and set unique properties for emails
sent to that domain.
Modify the settings for the default remote domain. If you have no other remote
domains set up, changes to the default remote domain apply to all external
domains. If you have other remote domains set up, changes to the default remote
domain apply to all other external domains.
For instructions on how to create and configure remote domains, see Manage remote
domains in Exchange Online.
The following table shows the types of replies you can control in a remote domain and
the settings that each remote domain setting overrides.
.
Type of Description Per-user settings that this remote
reply domain setting overrides
Non- Allow or prevent non-delivery reports This remote domain setting is the only
delivery (also known a NDRs or bounce way to prevent non-delivery reports
report messages) to be sent to people on the from being sent when a message can't
remote domain. The default is to allow be delivered.
sending non-delivery reports.
Rich Text Choose how to format Message format can be defined in several places:
Format messages: Outlook or Outlook on the web, and the admin can
(RTF) Always: Use this value if also use the Set-MailContact or Set-MailUser
the remote domain uses cmdlets to modify settings per recipient.
Exchange. Remote domain settings override settings specified
Never: If the remote by a user or by the admin. For more information
domain does not use about the message formats and the order of
Exchange, use this value. precedence of message format settings, see
Follow user settings: Use Message format and transmission in Exchange
message format settings Online.
defined by the user. Use
this value if you don't
know what email system
the remote domain uses.
MIME None: Use the character These settings are used only if the message doesn't
character set specified in the include a character set. For a complete list of
set and message. supported character sets, see Supported character
Non- Select a character set sets for remote domains.
MIME from the list: If the
character message does not have a
set character set, the
selected character set is
used.
If you specify a particular message format for the remote domain, the format of the
headers and message content sent to the domain are modified.
Other settings
You can configure other message settings for remote domains by using Exchange
Online PowerShell. For a complete list of settings, see Set-RemoteDomain.
More information
You can't remove the default remote domain.
You can specify all subdomains when you create a remote domain.
See also
Manage remote domains in Exchange Online
Manage remote domains in Exchange
Online
Article • 02/22/2023
Remote domains define settings based on the destination domain of each email
message. All organizations have a default remote domain named "Default" that's
applied to the domain "*". The default remote domain applies the same settings to all
email messages regardless of the destination domain. However, you can configure
specific settings for a specific destination domain.
The following table shows the default values for common settings:
Setting Default
Out of office Send external out-of-office replies to people on the remote domain.
replies
Delivery and Allow delivery and non-delivery reports to be sent to people on the remote
non-delivery domain.
reports
Meeting Don't allow meeting forward notifications to be sent to people on the remote
forward domain.
notifications
Rich Text Follow settings created by each user in Outlook or Outlook on the web (formerly
format (RTF) known as Outlook Web App) when a message is sent to people on the remote
domain.
Supported Do not specify a MIME or non-MIME character set if the character set isn't
character set specified in the message sent to the remote domain.
For information about when to configure remote domains, descriptions of the available
settings, and information about how remote domain settings override per-user settings,
see Remote domains in Exchange Online.
To open the Exchange admin center (EAC), see Exchange admin center in Exchange
Online. To connect to Exchange Online PowerShell, see Connect to Exchange
Online PowerShell.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
7 Note
If you create a remote domain for a specific destination domain, and a setting
for the specific remote domain conflicts with the same setting in the default
remote domain, the setting for the specific remote domain overrides the
setting in the default remote domain.
Once you've created a remote domain, you can't change or replace the
domain inside the remote domain. Instead, create and configure a new
remote domain with the new domain name.
New EAC
1. Go to Mail flow > Remote domains. The Remote domain screen appears.
2. Click + Add a remote domain. The Name the domain screen appears.
3. In the Name text box, enter a descriptive name for the domain.
4. In the Remote Domain text box, enter the full domain name. Use the wildcard
character (*) for all subdomains of a specified domain, for example, *.contoso.com.
In the Out of Office reply types section, specify which type of out-of-office replies
should be sent to people at this domain.
In the Automatic replies section, specify whether you want to allow automatic
replies, automatic forwarding, or both.
8. Specify whether you want to allow delivery reports and non-delivery reports by
checking the respective check boxes.
In the Use Rich-text format pane, specify whether to follow each user's
message settings, or whether to always or never preserve RTF formatting.
Selecting Never means that RTF messages are sent as plain text or HTML.
In the Supported Character Set pane, specify which character set to use (if
the message doesn't specify the character set) by choosing from the MIME
character set or Non-MIME character set drop-down list.
Classic EAC
In the Out of Office reply types section, specify which type of out-of-office
replies should be sent to people at this domain.
In the Automatic replies section, specify whether you want to allow
automatic replies, automatic forwarding, or both.
In the Message reporting section, specify:
Whether you want to allow delivery reports and non-delivery reports.
If a meeting set up by someone on the remote domain is forwarded to
another person in your organization, whether the notification message
should go to the meeting organizer on the remote domain.
In the Use Rich-text format section, specify whether to follow each user's
message settings, or whether to always or never preserve RTF formatting.
Selecting Never means that RTF messages are sent as plain text or HTML.
In the Supported Character Set area, specify which character set to use if the
message doesn't specify the character set.
5. Click Save. If you created a new remote domain, it is added to the list.
7 Note
New EAC
1. Go to Mail flow > Remote domains. The Remote domain screen appears.
3. In the warning dialog box, click Confirm. The remote domain is deleted.
Classic EAC
1. Go to Mail flow > Remote domains.
PowerShell
This example creates a remote domain for messages sent to the contoso.com domain.
PowerShell
This example creates a remote domain for messages sent to the contoso.com domain
and all its subdomains.
PowerShell
PowerShell
Set-RemoteDomain -Identity <Name> [-AllowedOOfType <External |
InternalLegacy | ExternalLegacy | None>] [-AutoForwardEnabled <$true |
$false>] [-AutoReplyEnabled <$true | $false>] [-CharacterSet
<SupportedCharacterSet>] [-DeliveryReportEnabled <$true | $false>] [-
NonMimeCharacterSet <SupportedCharacterSet>] [-TNEFEnabled <$true | $false>]
This example disables automatic replies, automatic forwarding, and out-of-office replies
to recipients at all remote domains that aren't specified with their own remote domain.
PowerShell
This example sends internal out-of-office replies to users at the remote domain named
Contoso.
PowerShell
This example prevents delivery reports and non-delivery reports from being sent to
users at Contoso.
PowerShell
This example sends all messages to Contoso using Transport Neutral Encapsulation
Formation (TNEF) encoding, rather than MIME encoding. This usage of TNEF preserves
Rich Text format in messages.
PowerShell
This example sends all messages to Contoso using MIME encoding, which means that all
RTF messages are always converted to HTML or plain text.
PowerShell
PowerShell
This example uses the Korean (ISO) character set for MIME messages sent to Contoso.
PowerShell
This example specifies using the Unicode character set for non-MIME messages sent to
Contoso.
PowerShell
PowerShell
PowerShell
Remote domains define settings based on the destination domain of each email
message. All organizations have a default remote domain named "Default" that's
applied to the domain "*". The default remote domain applies the same settings to all
email messages regardless of the destination domain. However, you can configure
specific settings for a specific destination domain.
For more information about remote domains, see Remote domains in Exchange Online.
For remote domain procedures, see Manage remote domains in Exchange Online.
The following table describes the character sets that you can configure in remote
domains.
3. Provide a name for the domain and the remote domain in their respective text
boxes.
5. Configure the 'automatic email reply types' settings by choosing one of the
following options:
None
Allow only external out of office replies
Allow internal out of office replies
7 Note
9. Configure the format and delivery method of email messages. Do this task by
choosing any of the options in the following panes:
11. Review the settings configured and click Save. The new review domain is created
successfully.
Classic EAC
Navigate to Mail flow > Remote domains. Click New to create a new remote
domain or select the existing remote domain and click Edit . In the settings
window that opens, use the MIME character set and Non-MIME character set
drop-down lists to select the character set.
In Exchange Online PowerShell, use the value in the Name column in the following
table for the CharacterSet parameter or NonMimeCharacterSet parameter on the
Set-RemoteDomain cmdlet.
Name Description
There are settings in Outlook, Outlook on the web, and Exchange Online that control the
format of email messages and how they are sent to people on other domains. The
default settings work in most cases. If specific recipients have trouble reading messages
sent from your organization, you can adjust the settings for individual users, or for all
users on a specific domain. For example, you can prevent recipients from receiving a
winmail.dat attachment.
Message format: When a user creates a message, they can choose the message
format in which to author the message. In Outlook, they have a choice between
plain text, HTML, and rich-text format. In Outlook on the web (formerly known as
Outlook Web App) they have a choice between plain text and HTML.
Message transmission: This means how the message is actually sent to the other
email system. Exchange can send messages to other domains by using
Multipurpose Internet Mail Extensions (MIME) or Transport Neutral Encapsulation
Format (TNEF). All three message formats can be sent using TNEF. Only HTML and
plain text can be sent using MIME. Message transmission format can be set by an
admin per domain or per recipient, and users can also specify message
transmission format.
Message formats
The following list describes the three message formats available in Exchange Online, and
shows which ones are available in Outlook and Outlook on the web:
Plain A plain text message uses only US-ASCII text as Yes Yes
text described in RFC 2822. The message can't contain
different fonts or other text formatting.
Rich RTF supports text formatting and other graphical Yes Can read messages
text elements. formatted in RTF,
format Only Outlook, Outlook on the web, and a few other but can't format or
(RTF) MAPI email clients understand RTF messages. send this format
Please note that RTF messages that are encrypted
with S/MIME will face limitations and may be prone
to face conversion issues (like journaling delivery).
Transmission Description
format
Multipurpose MIME is an internet standard that supports text in character sets other than
Internet Mail ASCII, non-text attachments, message bodies with multiple parts, and header
Extensions information in non-ASCII character sets.
(MIME)
Remote domain settings: Remote domain settings control the format of messages
sent to people on the remote domain. You can control the format for a specific
external domain, or for all external domains. For more information about remote
domains, see Remote domains in Exchange Online. The remote domain settings
override the per-user settings set by admins or users.
Mail user and mail contact settings: You can change settings for individual
recipients by changing settings for specific mail users or mail contacts. Mail users
and mail contacts are similar because both have external email addresses and
contain information about people outside the Exchange Online organization. The
main difference is mail users have user IDs that can be used to sign in to the
Exchange Online organization. When an admin changes a per-recipient setting, it
overrides settings that a user sets for that recipient. For more information about
the admin settings, see Manage mail users and Manage mail contacts.
Outlook settings: In Outlook, you can set the message formatting and encoding
options described in the following list:
Message format: You can set the default message format for all messages. You
can override the default message format as you compose a specific message.
Internet message format: You can control whether TNEF messages are sent to
remote recipients or whether they are first converted to a more compatible
format. You can also specify various message encoding options for messages
sent to remote recipients. These settings don't apply to messages sent to
recipients in the Exchange Online organization.
Internet recipient message format: You can control whether TNEF messages are
sent to specific recipients or whether they are first converted to a more
compatible format. You can set the options for specific contacts in your
Contacts folder, and you can override these options for a specific recipient in
the To, Cc, or Bcc fields as you compose a message. These options aren't
available for recipients in the Exchange Online organization.
Internet recipient message encoding options: You can control the MIME or
plain text encoding options for specific contacts in your Contacts folder, and
you can override these options for a specific recipient in the To, Cc, or Bcc fields
as you compose a message. These options aren't available for recipients in the
Exchange Online organization.
International options: You can control the character sets used in messages.
For more information about Outlook settings, see Change the message format in
Outlook .
Outlook on the web settings: You can set the default message format for all
messages. You can override the default message format as you compose a specific
message.
Configure the external postmaster
address in Exchange Online
Article • 02/22/2023
The external postmaster address is used as the sender for system-generated messages
and notifications sent to message senders that exist outside your Microsoft Exchange
Online organization. An external sender is any sender that has an email address in a
domain that isn't configured as an accepted domain in your organization.
By default, the value of the external postmaster address setting is blank. This default
value sets the external postmaster address to the value postmaster@<Default accepted
domain> for your organization.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Mail flow" entry in the
Feature permissions in Exchange Online topic.
You can only use Exchange Online PowerShell to perform this procedure. To learn
how to connect to Exchange Online PowerShell, see Connect to Exchange Online
PowerShell.
PowerShell
This example sets the external postmaster address to the value postmaster@contoso.com .
PowerShell
Set-TransportConfig -ExternalPostmasterAddress postmaster@contoso.com
This example returns the external postmaster address to the default value.
PowerShell
PowerShell
Having problems? Ask for help in the Exchange forums. Visit the forums at Exchange
Online or Exchange Online Protection .
Manage all mailboxes and mail flow
using Microsoft 365 or Office 365
Article • 02/22/2023
Summary: How to use hosted mail flow with Microsoft 365 or Office 365.
For most organizations, we recommend using hosted mail flow because it's the simplest
configuration, in which Microsoft 365 or Office 365 manages all mailboxes and filtering.
This simple configuration makes it easy to set up and manage mail flow.
I'm a new Microsoft 365 or Office 365 customer. I have an existing email service,
but I plan to immediately move all existing mailboxes to the cloud. I want to use all
filtering solutions that Microsoft 365 and Office 365 offer.
For this scenario, your organization's mail flow setup looks like the following diagram:
The Microsoft 365 setup wizard walks you through the following steps.
1. Add your custom domains in Microsoft 365 or Office 365. To prove that you own
the domains, follow the instructions in Add a domain to Microsoft 365.
3. Update the DNS records for the domains that you added in step 1. (Not sure how
to do this task? Follow the instructions on this page.)
For example, the domain contoso.com should have the MX record contoso-
com.mail.protection.outlook.com.
SPF record - This record is a special TXT record in DNS that identifies a
service as a valid sender for a particular domain. Because Microsoft 365 and
Office 365 are sending all your messages, list only Microsoft 365 or Office 365
as a valid sender for your domain. To do that, add an SPF record for your
domain in the following format:
text
For a full list of setup instructions, check out Set up Microsoft 365 for business or
Deploy Office 365 Enterprise for your organization.
See also
Mail flow best practices for Exchange Online, Microsoft 365, and Office 365 (overview)
Manage mail flow using a third-party cloud service with mailboxes on Microsoft 365 or
Office 365 and on-prem
This topic covers the following complex mail flow scenarios using Exchange Online:
7 Note
Examples in this topic use the fictitious organization, Contoso, which owns the
domain contoso.com and is a tenant in Exchange Online. This is just an example.
You can adapt this example to fit your organization's domain name and third-party
service IP addresses where necessary.
) Important
For this scenario, your organization's mail flow setup looks like the following diagram:
Best practices for using a third-party cloud filtering service with
Microsoft 365 or Office 365
1. Add your custom domains in Microsoft 365 or Office 365. To prove that you own
the domains, follow the instructions in Add a domain to Microsoft 365.
3. Update the DNS records for the domains that you added in step 1. (Not sure how
to do this? Follow the instructions on this page.) The following DNS records control
mail flow:
SPF record: All mail sent from your domain to the internet originates in
Microsoft 365 or Office 365, so your SPF record requires the standard value
for Microsoft 365 or Office 365:
text
You would only need to include the third-party service in your SPF record if
your organization sends outbound internet email through the service (where
the third-party service would be a source for email from your domain).
When you're configuring this scenario, the "host" that you need to configure to
receive email from the third-party service is specified in the MX Record. For
example:
In this example, the host name for the Microsoft 365 or Office 365 host should be
hubstream-mx.mail.protection.outlook.com. This value can vary from domain to
domain, so check your value at Configuration > Domain > <select domain> to
confirm your actual value.
4. Lock down your Exchange Online organization to only accept mail from your third-
party service.
For example:
PowerShell
or
PowerShell
If you already have an OnPremises inbound connector for the same certificate
or sender IP addresses, you still need to create the Partner inbound connector
(the RestrictDomainsToCertificate and RestrictDomainsToIPAddresses
parameters are only applied to Partner connectors). The two connectors can
coexist without problems.
7 Note
Bypass spam filtering: Use a mail flow rule (also known as a transport rule) to
bypass spam filtering. This option will prevent most EOP and Defender for
Office 365 controls and will therefore prevent a double anti-spam check.
) Important
See also
Mail flow best practices for Exchange Online, Microsoft 365, Office 365 (overview)
Some messages aren't routed through the on-premises organization when you use
centralized mail transport
Manage all mailboxes and mail flow using Microsoft 365 or Office 365
Manage mail flow with mailboxes in multiple locations (Microsoft 365 or Office 365 and
on-premises Exchange)
Manage mail flow using a third-party cloud service with Exchange Online and on-
premises mailboxes
Summary: How to manage mail flow in an Exchange hybrid environment, which is when
some mailboxes are on-premises and some are in Microsoft 365 or Office 365.
This topic covers the following complex mail flow scenarios using Microsoft 365 or
Office 365:
Scenario 1: MX record points to Microsoft 365 or Office 365 and Microsoft 365 or
Office 365 filters all messages
Scenario 2: MX record points to Microsoft 365 or Office 365 and mail is filtered on-
premises
7 Note
Examples in this topic use the fictitious organization, Contoso, which owns the
domain contoso.com. The IP address of the Contoso email server is 131.107.21.231,
and its third-party provider uses 10.10.10.1 for their IP address. These are just
examples. You can adapt these examples to fit your organization's domain name
and public-facing IP address where necessary.
Most customers who need a hybrid mail flow setup should allow Microsoft 365 or Office
365 to perform all their filtering and routing. We recommend that you point your MX
record to Microsoft 365 or Office 365 because this setting provides for the most
accurate spam filtering. For this scenario, your organization's mail flow setup looks like
the following diagram.
Best practices
1. Add your custom domains in Microsoft 365 or Office 365. To prove that you own
the domains, follow the instructions in Add a domain to Microsoft 365.
SPF record: This record should list Microsoft 365 or Office 365 as a valid
sender; any IP addresses from your on-premises servers that connect to EOP;
and any third parties that send email on behalf of your organization. For
example, if your organization's email server's internet-facing IP address
is131.107.21.231, the SPF record for contoso.com should be:
text
text
v=spf1 include:spf.protection.outlook.com
include:third_party_cloud_service.com -all
4. In the Exchange admin center (EAC), use the connector wizard to Configure mail
flow using connectors in Microsoft 365 or Office 365 for the following scenarios:
To create the connector, choose the first option in the connector creation
wizard on the How should Office 365 identify email for your email server
screen, as shown in the below two screenshots, for New EAC and Classic EAC,
respectively.
This configuration enables Microsoft 365 or Office 365 to identify your email server by
using the certificate. In this scenario, the certificate CN or Subject Alternative Name
(SAN) contains the domain that belongs to your organization. For more information, see
Identifying email from your email server. For connector configuration details see, Part 2:
Configure mail to flow from your email server to Microsoft 365 or Office 365.
5. You don't need connectors in the following scenarios unless one of your partners
has a special requirement, such as enforcing TLS with a bank.
7 Note
If your organization's uses Exchange 2010 or later, we recommend that you use the
Hybrid Configuration Wizard to configure connectors in Microsoft 365 or Office
365 as well as on your on-premises Exchange servers. For this scenario, your
domain's MX record can't point to your organization's email server.
If you have business or regulatory reasons for filtering mail in your on-premises
environment, we recommend pointing your domain's MX record to Microsoft 365 or
Office 365 and enabling centralized mail transport. This setup provides optimal spam
filtering and protects your organization's IP addresses. For this scenario, your
organization's mail flow setup looks like the following diagram.
Best practices
1. Add your custom domains in Microsoft 365 or Office 365. To prove that you own
the domains, follow the instructions in Add a domain to Microsoft 365.
3. Update the DNS records for the domains that you added in step 1. (Not sure how
to do this task? Follow the instructions on this page.) The following DNS records
control mail flow:
SPF record: This record should list Microsoft 365 or Office 365 as a valid
sender, plus any IP addresses from your on-premises servers that connect to
EOP, and any third parties that send email on behalf of your organization. For
example, if your organization's email server's internet-facing IP address is
131.107.21.231, the SPF record for contoso.com should be:
text
Mail that comes from the internet to a mailbox in Exchange Online first gets
sent to your on-premises server and then comes back to Exchange Online to
be delivered to the mailbox. Line 1 represents this path in the scenario 2
diagram.
Mail that comes from Exchange Online and is destined for the internet is first
sent to your on-premises servers, then comes back to Exchange Online, and
is then delivered to the internet. Line 4 represents this path in the scenario 2
diagram.
You don't need connectors in the following scenarios unless one of your partners has
special requirements, such as enforcing TLS with a bank.
For this scenario, your organization's mail flow setup looks like the following diagram.
Best practices
If the MX record for your domain needs to point to your on-premises IP address, use the
following best practices:
1. Add your custom domains in Microsoft 365 or Office 365. To prove that you own
the domains, follow the instructions in Add a domain to Microsoft 365.
2. Create user mailboxes in Exchange Online or move all users' mailboxes to
Microsoft 365 or Office 365.
3. Update the DNS records for the domains that you added in step 1. (Not sure how
to do this task? Follow the instructions on this page.) The following DNS records
control mail flow:
SPF record: This record should list Microsoft 365 or Office 365 as a valid
sender. It should also include any IP addresses from your on-premises servers
that connect to EOP and any third parties that send email on behalf of your
organization. For example, if your organization's email server's internet-facing
IP address is131.107.21.231, the SPF record for contoso.com should be:
text
4. Because you're not relaying messages from your on-premises servers to the
internet through Microsoft 365 or Office 365, you don't technically need to create
connectors for the following scenarios. But if at some point you change your MX
record to point to Microsoft 365 or Office 365, you'll need to create connectors;
therefore, it's best to do it up front. In the Exchange admin center, use the
connector wizard to Part 2: Configure mail to flow from your email server to
Microsoft 365 or Office 365 for the following scenarios, or use the Hybrid
Configuration Wizard to create connectors:
Sending mail from Microsoft 365 or Office 365 to your organization's email
servers
Sending mail from your on-premises servers to Microsoft 365 or Office 365
5. To make sure that messages are sent to your organization's on-premises servers
through MX, go to Example security restrictions you can apply to email sent from a
partner organization, and follow "Example 3: Require that all email from your
partner organization domain ContosoBank.com is sent from a specific IP address
range."
For this scenario, your organization's mail flow setup looks like the following diagram.
Best practices
If the MX record for your domain needs to point to your on-premises IP address, use the
following best practices:
1. Add your custom domains in Microsoft 365 or Office 365. To prove that you own
the domains, follow the instructions in Add a domain to Microsoft 365.
3. Update the DNS records for the domains that you added in step 1. (Not sure how
to do this task? Follow the instructions on this page.) The following DNS records
control mail flow:
SPF record: This record should list Microsoft 365 or Office 365 as a valid
sender. It should also include any IP addresses from your on-premises servers
that connect to EOP and any third parties that send email on behalf of your
organization. For example, if your organization's email server's internet-facing
IP address is 131.107.21.231, the SPF record for contoso.com should be:
text
4. In the EAC, use the connector wizard to Configure mail flow using connectors in
Microsoft 365 or Office 365 for the following scenarios:
Sending mail from Microsoft 365 or Office 365 to your organization's email
servers
Sending mail from your on-premises servers to Microsoft 365 or Office 365
Create a connector to support the scenario "Sending mail from your on-
premises servers to Microsoft 365 or Office 365" if any of the following
scenarios apply to your organization:
Your organization is authorized to send mail on behalf of your client, but your
organization doesn't own the domain. For example, contoso.com is
authorized to send email through fabrikam.com, which doesn't belong to
contoso.com.
Your organization relays non-delivery reports (NDRs) to the internet through
Microsoft 365 or Office 365.
To create the connector, choose the first option in the connector creation
wizard on the How should Microsoft 365 or Office 365 identify email for
your email server screen, as shown in the below two screenshots, for New
EAC and Classic EAC, respectively.
This option allows Microsoft 365 or Office 365 to identify your email server by using the
certificate. In this scenario, the certificate CN or Subject Alternative Name (SAN) contains
the domain that belongs to your organization. For more information, see Identifying
email from your email server. For connector configuration details see, Part 2: Configure
mail to flow from your email server to Microsoft 365 or Office 365.
5. Set up connectors for secure mail flow with a partner organization to make sure
that messages are sent to your organization's on-premises servers via MX.
See also
Mail flow best practices for Exchange Online, Microsoft 365, and Office 365 (overview)
Manage all mailboxes and mail flow using Microsoft 365 or Office 365
Manage mail flow using a third-party cloud service with Microsoft 365 or Office 365
Manage mail flow using a third-party cloud service with mailboxes on Microsoft 365 or
Office 365 and on-prem
Test mail flow by validating your Microsoft 365 or Office 365 connectors
Manage mail flow using a third-party
cloud service with Exchange Online and
on-premises mailboxes
Article • 02/22/2023
This topic covers the most complex mail flow scenario using Microsoft 365 or Office 365.
7 Note
Examples in this guide use the fictitious organization, Contoso, which owns the
domain contoso.com. The IP address of the Contoso mail server is 131.107.21.231,
and its third-party provider uses 10.10.10.1 for their IP address. These are just
examples. You can adapt these examples to fit your organization's domain name
and public-facing IP address where necessary.
Scenario
I'm migrating my mailboxes to Exchange Online, and I want to keep some
mailboxes on my organization's on-premises email server. I want to use a third-
party cloud service to filter spam from the internet. My messages to the internet
must route through Microsoft 365 or Office 365 to prevent my on-premises
servers' IP addresses from being added to external block lists.
In this scenario, your organization's mail flow setup looks like the following diagram.
Best practices
1. Add your custom domains in Microsoft 365 or Office 365. To prove that you own
the domains, follow the instructions in Add a domain to Microsoft 365.
3. Update the DNS records for the domains that you added in step 1. (Not sure how
to do this? Follow the instructions on this page.) The following DNS records control
mail flow:
text
text
More information
There are additional considerations in hybrid deployments between on-premises
Exchange and Microsoft 365 or Office 365. For more information, see Exchange Server
hybrid deployments.
See also
Mail flow best practices for Exchange Online, Microsoft 365, and Office 365 (overview)
Manage all mailboxes and mail flow using Microsoft 365 or Office 365
Manage mail flow using a third-party cloud service with Microsoft 365 or Office 365
Manage mail flow with mailboxes in multiple locations (Microsoft 365 or Office 365 and
on-prem)
) Important
Effective from December 2022, the classic Exchange Admin Center will be
deprecated for worldwide customers. Microsoft recommends using the new
Exchange Admin Center , if not already doing so. While most of the features have
been migrated to new EAC, some have been migrated to other admin centers and
remaining ones will soon be migrated to New EAC. Find features that are not yet
there in new EAC at Other Features or use Global Search that will help you
navigate across new EAC.
) Important
Mail flow rules are now available in the new Exchange admin center. Try it now !
This article explains how you can send email from devices and business applications
when all of your mailboxes are in Microsoft 365 or Office 365. For example:
You have a scanner, and you want to email scanned documents to yourself or
someone else.
You have a line-of-business (LOB) application that manages appointments, and you
want to email reminders to clients of their appointment time.
7 Note
This option is not compatible with Microsoft Security Defaults. We recommend
using Modern Authentication when connecting with our service. Although SMTP
AUTH now supports OAuth, most devices and clients have not been designed to
use OAuth with SMTP AUTH. As a result, there are no plans to disable Basic
Authentication for SMTP AUTH clients at this time. To find out more about OAuth,
see Authenticate an IMAP, POP or SMTP connection using OAuth.
You must also verify that SMTP AUTH is enabled for the mailbox being used. SMTP
AUTH is disabled for organizations created after January 2020 but can be enabled
per-mailbox. For more information, see Enable or disable authenticated client
SMTP submission (SMTP AUTH) in Exchange Online.
This option supports most usage scenarios and is the easiest to set up. Choose this
option when:
You want to send email from a third-party hosted application, service, or device.
You want to send email to people inside and outside your organization.
To configure your device or application, connect directly to Microsoft 365 or Office 365
using the SMTP AUTH client submission endpoint smtp.office365.com.
Each device or application must be able to authenticate with Microsoft 365 or Office
365. The email address of the account that's used to authenticate with Microsoft 365 or
Office 365 will appear as the sender of messages from the device or application.
TLS/StartTLS Enabled
Username/email address and Enter the sign-in credentials of the hosted mailbox being
password used
TLS and other encryption options
Determine what version of TLS your device supports by checking the device guide or
with the vendor. If your device or application doesn't support TLS 1.2 or above, you have
the following alternatives:
To find out more about configuring your own email server to send mail to Microsoft 365
or Office 365, see Set up connectors to route mail between Microsoft 365 or Office 365
and your own email servers.
7 Note
If your device recommends or defaults to port 465, it doesn't support SMTP AUTH
client submission.
7 Note
For information about TLS, see How Exchange Online uses TLS to secure email
connections and for detailed technical information about how Exchange Online
uses TLS with cipher suite ordering, see TLS cipher suites supported by Office 365.
Avoid using a single mailbox with Send As permissions for all your users. This
method is not supported because of complexity and potential issues.
You want to send bulk email or newsletters. Microsoft 365 or Office 365 does not
allow you to send bulk messages via SMTP AUTH client submission. Direct send
allows you to send a higher volume of messages.
There is a risk of your email being marked as spam by Microsoft 365 or Office 365.
You might want to enlist the help of a bulk email provider to assist you. For
example, they'll help you adhere to best practices, and can help ensure that your
domains and IP addresses are not blocked by others on the internet.
Device or Value
application setting
Port Port 25
TLS/StartTLS Optional
Email address Any email address for one of your Microsoft 365 or Office 365 accepted
domains. This email address does not need to have a mailbox.
We recommend adding an SPF record to avoid having messages flagged as spam. If you
are sending from a static IP address, add it to your SPF record in your domain registrar's
DNS settings as follows:
3. Go to Settings > Domains, select your domain (for example, contoso.com), and
find the MX record.
The MX record will have data for Points to address or value that looks similar to
contoso-com.mail.protection.outlook.com .
4. Make a note of the data of Points to address or value for the MX record, which we
refer to as your MX endpoint.
5. Go back to the device, and in the settings, under what would normally be called
Server or Smart Host, enter the MX record Points to address or value you
recorded in step 4.
7 Note
Do NOT use an IP address for the Microsoft 365 or Office 365 server
connection, as IP addresses are not supported.
6. Now that you are done configuring your device settings, go to your domain
registrar's website to update your DNS records. Edit your sender policy framework
(SPF) record. In the entry, include the IP address that you noted in step 1. The
finished string looks similar to the following example:
v=spf1 ip4:10.5.3.2 include:spf.protection.outlook.com ~all
U Caution
7 Note
Skipping this step might cause email to be sent to recipient Junk Email
folders.
7. To test the configuration, send a test email from your device or application, and
confirm that the recipient received it.
You can configure your device to send email direct to Microsoft 365 or Office 365. Use
direct send to relay email to recipients with Microsoft 365 or Office 365 mailboxes in
your organization. If your device uses direct send to try to relay an email for a recipient
who doesn't have a Microsoft 365 or Office 365 mailbox, the email will be rejected.
7 Note
If your device or application has the ability to act as a email server to deliver
messages to Microsoft 365 or Microsoft 365 or Office 365 as well as other email
providers, there are no Microsoft 365 or Office 365 settings needed for this
scenario. For more information, see your device or application instructions.
Direct send has higher sending limits than SMTP client submission. Senders are not
bound by the limits described in Option 1.
Device or Value
application setting
Port Port 25
TLS/StartTLS Enabled
Email address Any email address in one of your Microsoft 365 or Office 365 verified
domains. This email address does not need a mailbox.
If you already have a connector that's configured to deliver messages from your on-
premises organization to Microsoft 365 or Office 365 (for example, a hybrid
environment), you probably don't need to create a dedicated connector for Microsoft
365 or Office 365 SMTP relay. If you need to create a connector, use the following
settings to support this scenario:
Domain restrictions: IP Your on-premises IP address or address range that the device or
address/range application will use to connect to Microsoft 365 or Office 365
We recommend adding an SPF record to avoid having messages flagged as spam. If you
are sending from a static IP address, add it to your SPF record in your domain registrar's
DNS settings as follows:
3. Go to Settings > Domains, select your domain (for example, contoso.com), and
find the MX record.
The MX record will have data for Points to address or value that looks similar to
contoso-com.mail.protection.outlook.com .
4. Make a note of data of Points to address or value for the MX record, which we
refer to as your MX endpoint.
5. Check that the domains that the application or device will send to have been
verified. If the domain is not verified, emails could be lost, and you won't be able
to track them with the Exchange Online message trace tool.
6. In Microsoft 365 or Office 365, select Admin and then Exchange to go to the new
Exchange admin center.
7 Note
7. In the Exchange admin center (EAC), go to Mail flow > Connectors. The
Connectors screen is depicted in the subsequent two images below, for New EAC
and Classic EAC, respectively.
8. Check the list of connectors set up for your organization. If there is no connector
listed from your organization's email server to Microsoft 365 or Office 365, create a
connector in the Exchange admin center (EAC):
Classic EAC:
d. Leave all the other fields with their default values, and select Save.
New EAC:
b. Click Add a connector . In the wizard that opens, choose the options
that are depicted in the following screenshot on the first screen:
c. Click Next. The Connector name screen appears.
d. Provide a name for the connector and click Next. The Authenticating sent
email screen appears.
f. Click Save.
9. Now that you're done with configuring your Microsoft 365 or Office 365 settings,
go to your domain registrar's website to update your DNS records. Edit your SPF
record. Include the IP address that you noted in step 1. The finished string should
look similar to this v=spf1 ip4:10.5.3.2 include:spf.protection.outlook.com ~all ,
where 10.5.3.2 is your public IP address. Skipping this step can cause email to be
sent to recipient Junk Email folders.
10. Now, go back to the device, and in the settings, find the entry for Server or Smart
Host, and enter the MX record POINTS TO ADDRESS value that you recorded in
step 3.
11. To test the configuration, send a test email from your device or application, and
confirm that it was received by the recipient.
Configure a certificate-based connector to relay email
through Microsoft 365 or Office 365
If your devices or applications are capable of using a certificate for mail flow, you can
configure a certificate-based connector to relay email through Microsoft 365 or Office
365.
To do this task, verify the subject name on the certificate used by the sending device or
application. The common name (CN) or subject alternative name (SAN) in the certificate
should contain a domain name that you have registered in Microsoft 365 or Office 365.
Also, you must create a certificate-based connector in Microsoft 365 or Office 365 with
this same domain name to accept and relay emails coming from these devices,
applications, or any other on-premises server. For more information about this method,
see important notice for email customers who have configured connectors.
The Microsoft 365 or Office 365 connector that you configure authenticates your
device or application with Microsoft 365 or Office 365 using an IP address. Your
device or application can send email using any address (including ones that can't
receive mail), as long as the address uses one of your domains. It is not mandatory
for the email address to be associated with an actual mailbox. For example, if your
domain is contoso.com, you could send from an address like
do_not_reply@contoso.com.
Microsoft 365 or Office 365 SMTP relay uses a connector to authenticate the mail
sent from your device or application. This authentication method allows Microsoft
365 or Office 365 to relay those messages to your own mailboxes and external
recipients. Microsoft 365 or Office 365 SMTP relay is similar to direct send except
that it can send mail to external recipients.
7 Note
As per SMTP RFC suggestion, Option 1 SMTP AUTH client submission may be
more appropriate method for an SMTP client/application, which is not a full-
featured mail server (MTA).
Bypasses antispam Yes, if the mail is No. Suspicious emails No. Suspicious emails might
destined for one might be filtered. We be filtered. We recommend a
of your Microsoft recommend a custom SPF record.
365 or Office 365 custom Sender Policy
mailboxes. Framework (SPF)
record.
Requirements
Throttling 10,000 recipients Standard throttling Reasonable limits are imposed. The
limits per day. 30 is in place to service can't be used to send spam or
messages per protect Microsoft bulk mail. For more information about
minute. 365 or Office 365.
Limitations SMTP client Direct send SMTP relay
submission
7 Note
If you still need help to set up applications or devices sending email using Microsoft 365
or you need help fixing issues with applications or devices sending email using
Microsoft 365, you can run an automated diagnostic.
A flyout page opens in the Microsoft 365 admin center. Select the appropriate option
that you are looking for, eg. new setup or troubleshooting existing setup.
Related articles
Fix issues with printers, scanners, and LOB applications that send email using Microsoft
365 or Office 365
Set up connectors to route mail between Microsoft 365 or Office 365 and your own
email servers
Continuous error throttling for SMTP
AUTH submissions in Exchange Online
Article • 01/26/2023
Every day, our service sees millions of requests coming in to send emails via
smtp.office365.com using the SMTP AUTH protocol. Many of these are for Line-of-
Business (LOB) applications and services that customers have configured to send out
automated emails.
Many of these requests that we receive, result in an error which if sent by a user from
Outlook can result in the user seeing an error message that they could immediately take
action on to unblock sending emails. However, many automated email applications
aren't designed well to handle errors. On the contrary, they ignore errors and send
continuously believing that the error will correct itself.
For some errors such as those involving Send As or Mailbox Full, the issue won't correct
itself without human intervention. To protect our service from bombardment from these
requests and to get the message to administrators that something is wrong with the
mailbox or configuration, we're introducing continuous error throttling for SMTP AUTH.
If Exchange Online sees too many errors during submissions for a mailbox related to the
five issues covered, that mailbox will be throttled from sending using SMTP AUTH
specifically for a period of time.
In many of these cases, customers might fail to notice that anything is wrong and the
forgotten application will continue trying to send to no avail. However, the mailbox
could be configured to send out emails successfully with one application and
misconfigured with another. In such a scenario, messages that were successfully sent will
be blocked as well. Lastly, if a mailbox is left to reach its size limit, a previously working
application will hit this new error and be throttled if it is ignored.
It's up to administrators or users to test these applications to make sure that they work
when configured. If and when these errors are hit, they'll need to investigate the
misconfiguration in cases such as Send As denied or correct new issues such as a
mailbox becoming full. Investigating this will be on the client side. These messages are
not accepted by Microsoft 365 so Message Trace is of no help here.
After correcting the issue, the mailbox will begin working again after the throttling
period expires in the same way that hitting the Recipient Rate Limit for a mailbox
requires waiting for that throttling to elapse. The throttling period will be decided by
Microsoft based on a number of factors.
If customers don't want to wait that long, they can switch to using another mailbox as
long as the issue has been resolved. Support is unable to lift the throttling here.
Updated Requirements for SMTP Relay
through Exchange Online
Article • 06/23/2023
This article explains how you can update your requirements for SMTP relay through
Exchange Online. If your organization doesn't use Inbound Connectors of OnPremises
type then this change won't affect you.
Current Requirements
To relay email through Exchange Online, the following must be true:
b. SMTP envelope sender domain is in the MAIL FROM command (P1 sender
domain); or
c. SMTP header sender domain, as shown in email clients (P2 sender domain).
2. The sending host’s IP address or the certificate domain on the SMTP connection
matches your tenant’s Inbound Connector of OnPremises type.
New Requirements
On November 1, 2023, the matching condition for the SMTP P2 sender domain will be
removed. After this condition is removed, relaying email through Exchange Online will
require the following:
b. SMTP envelope sender domain in the MAIL FROM command (P1 sender
domain).
After November 1, 2023, if either of the above conditions aren't met, the relay attempt
from your on-premises environment to Exchange Online will be rejected.
This change may affect your organization’s email routing or delivery. Possible scenarios
that are affected by this change include, but may not be limited to:
1. Your organization hosts email on-premises, and you need to relay nondelivery
reports (NDRs) generated by your on-premises system through Exchange Online.
In this scenario, the NDRs often have null as the SMTP envelope sender (P1
sender), but the SMTP header sender domain (P2 sender domain) is your
organization’s domain.
2. Your organization uses an application hosted on-premises to send email, and the
SMTP envelope sender domain (P1 sender domain) isn't an accepted domain in
Exchange Online.
2. If you need to use a third-party add-on service to process email messages sent
from your organization and then relay through Exchange Online, the third-party
service must support a unique certificate for your organization, and the certificate
domain must be an accepted domain of your organization. An example is that your
organization uses a signature service to add signature/disclaimer for each email
sent from your organization. For more information, see Scenario: Integrate
Exchange Online with an email add-on service.
Fix issues with printers, scanners, and
LOB apps that send email using
Microsoft 365
Article • 03/27/2023
Email clients provide actionable error messages when something goes wrong. Sending
email from devices and applications is less easy to fix, and you might not get clear
information to help you. This article can help you troubleshoot, and it uses printer
configurations as examples.
As a first step to fixing any problems, check your configuration. See How to set up a
multifunction device or application to send email using Microsoft 365 or Office 365 for
detailed information about the configuration options.
Your printer is connected to a Microsoft 365 or Office 365 server whose name
ends with mail.protection.outlook.com.
There's no connector in Microsoft 365 or Office 365 for mail sent from your
on-premises organization to Microsoft 365 or Office 365.
The printer can send email only to people in your organization; the printer
can't send email to recipients outside your organization.
3. Microsoft 365 or Office 365 SMTP relay
Your printer is connected to a Microsoft 365 or Office 365 server whose name
ends with mail.protection.outlook.com.
You've configured a connector in Microsoft 365 or Office 365 for mail sent
from your on-premises organization to Microsoft 365 or Office 365.
The printer can send email to people inside and outside your organization.
TLS/StartTLS Enabled
Username/email address and Sign in credentials of Microsoft 365 or Office 365 mailbox
password the printer uses
2. If your printer didn't require a password for the username/email address that you
entered, then your printer is trying to send email without logging on to Microsoft
365 or Office 365. SMTP AUTH client submission requires your printer to sign in to
Microsoft 365 or Office 365. Direct send and Microsoft 365 or Office 365 SMTP
relay don't require a logon; consider one of these options instead.
3. Your printer or application must send email from the same email address that you
entered as logon credentials during email setup. If the printer or application tries
to send email from a different account, the result is an error similar to:
5.7.60 SMTP; Client does not have permissions to send as this sender.
4. Test the username and password by logging on to Outlook on the web, and try to
send a test email to make sure the account isn't blocked. If the user is blocked, see,
Remove blocked users from the Restricted Users portal.
5. Next, test that you can connect to Microsoft 365 or Office 365 from your network
by doing the following steps:
a. Follow the instructions to install the Telnet Client tool on a computer on the
same network as the device or application.
c. Type open smtp.office365.com 587 (or substitute 25 for 587 if you're using that
port setting instead).
e. If you can't connect to Microsoft 365 or Office 365, your network firewall or
Internet Service Provider (ISP) might have blocked port 587 or 25. Fix this issue
so you can send email from your printer.
6. If none of these issues apply to your device, it might not meet requirements for
Transport Layer Security (TLS) encryption.
Your device must support TLS version 1.2 or above. Update the firmware on the
device or try one of the other configuration options where TLS is optional. If you
need to utilize TLS 1.0/1.1 for SMTP AUTH to retain legacy clients and devices, you
must opt-in by:
To learn more, see New opt-in endpoint available for SMTP AUTH clients still needing
legacy TLS
For more information about TLS, see How Exchange Online uses TLS to secure email
connections.
1. Make sure that you entered the correct username and password.
2. Try logging into Outlook on the web with the printer's username and password.
Send an email to make sure that the mailbox is active and has not been blocked
for sending spam.
3. Check that your device or application supports TLS version 1.2 or above. The best
way to check is by upgrading the firmware on the device or updating the
application to the latest version. Contact the device manufacturer to confirm that it
supports TLS version 1.2 or above.
PowerShell
If the value is True, replace <EmailAddress> with the email address and run the
following command to enable it:
PowerShell
In the Microsoft 365 admin center, in the left navigation menu, choose Users
> Active users.
On the Active users page, choose Multi-Factor Authentication.
On the multi-factor authentication page, select the user and disable the
Multi-Factor Authentication status.
3. Disable the Azure Security Defaults by toggling the Enable Security Defaults to
No:
U Caution
Don't do this step unless you understand the risks that are involved.
4. Exclude the user from a Conditional Access policy that blocks Legacy
Authentication:
1. A common reason for issues with direct send is a blocked IP address. If antispam
tools detect outbound spam from your organization, your IP address can be
blocked by a spam block list. Check whether your IP address is on a block list by
using a third-party service, such as MXToolbox or WhatIsMyIPAddress. Follow up
with the organization that added your IP address to their block list. Microsoft 365
and Office 365 use block lists to protect our service. For help, see Remove blocked
users from the Restricted Users portal.
2. To rule out a problem with your device, send a test email to check your connection
to Microsoft 365 or Office 365. To send a test email, follow these steps in the
article, Use Telnet to Test SMTP Communication. If you can't connect to Microsoft
365 or Office 365, your network or ISP might have blocked communication using
port 25. If you can't reverse this, use SMTP client submission instead.
Client was not authenticated to send anonymous mail
during MAIL FROM error
This indicates that you are connecting to the SMTP client submission endpoint
(smtp.office365.com), which can't be used for direct send. For direct send, use the MX
endpoint for your Microsoft 365 or Office 365 organization, which ends with
"mail.protection.outlook.com." You can find your MX endpoint by following the steps in
Option 2: Send mail directly from your printer or application to Microsoft 365 or Office
365 (direct send).
1. A common reason for issues with Microsoft 365 or Office 365 SMTP relay is a
blocked IP address. If antispam tools detect outbound spam from your
organization, your IP address can be blocked by a spam block list. Check whether
your IP address is on a block list by using a third-party service, such as MXToolbox
or WhatIsMyIPAddress. Follow up with the organization that added your IP address
to their block list. Microsoft 365 and Office 365 use block lists to protect our
service. For help, see Remove blocked users from the Restricted Users portal.
2. To rule out a problem with your device, send a test email to check your connection
to Microsoft 365 or Office 365. To send a test email, follow these steps in the
article, Use Telnet to Test SMTP Communication. If you can't connect to Microsoft
365 or Office 365, your network or ISP might have blocked communication using
port 25. If you can't reverse this, use SMTP client submission instead.
7 Note
If you still need help to fix issues with applications or devices sending email using
Microsoft 365, you can run an automated diagnostic.
A flyout page opens in the Microsoft 365 admin center. Select the appropriate option
that you are looking for, eg. new setup or troubleshooting existing setup.
Feedback
Was this page helpful? ツ Yes ト No
When there's a problem delivering an email message that you sent, Microsoft 365 or Office 365 will
generate an error code and often will send an email to let you know. The email you receive is a delivery
status notification, also known as a DSN or Bounce Message. The most common type is called a non-
delivery report (NDR) and they tell you that a message wasn't delivered. Non-delivery can be caused by
something as simple as a typo in an email address. NDRs include an error code that indicates why your
email wasn't delivered, solutions to help you get your email delivered, a link to more help on the web, and
technical details for administrators. Find out What's included in an NDR?.
432 4.3.2 STOREDRV.Deliver; recipient thread limit The recipient For more information about this by-design
exceeded mailbox's ability to throttling, see Store Driver Fault Isolation
accept messages is Improvements in Exchange 2010 SP1 .
being throttled
because it's
receiving too many
messages too
quickly. This is done
so a single
recipient's mail
processing doesn't
unfairly impact other
recipients sharing
the same mailbox
database.
4.4.316 Connection refused [Message=Socket error Microsoft 365 or This error almost always indicates an issue with
code 10061] Office 365 is trying the receiving server or network outside of
to send a message Microsoft 365 or Office 365. The error should
to an email server also include the IP address of the server or
outside of Microsoft service that's generating the error, which you
365 or Office 365, can use to identify the party responsible for
but attempts to fixing this.
connect to it are
failing due to a
network connection
issue at the external
server's location.
4.4.7 Message expired The message in the This message usually indicates an issue on the
queue has expired. receiving server. Check the validity of the
The sending server recipient address, and determine if the
tried to relay or receiving server is configured correctly to
Error Description Possible cause Additional information
code
4.4.8 MX hosts of <domain> failed MTA- The destination MX This error usually indicates an issue with the
STS validation host was not the destination domain's MTA-STS policy not
host expected per containing the MX host. For more information,
the domain's STS see Enhancing mail flow with MTA-STS.
policy.
4.5.3 Too many recipients The message has An envelope recipient is the original,
more than 200 unexpanded recipient that's used in the RCPT
SMTP envelope TO command to transmit the message
recipients from the between SMTP servers. When this error is
same domain. returned by Microsoft 365 or Office 365, the
sending server must break up the number of
envelope recipients into smaller chunks
(chunking) and resend the message.
4.7.5 Remote certificate failed MTA- The destination mail This error usually indicates an issue with the
STS validation. Reason: <validityStatus> server's certificate destination mail server's certificate. For more
must chain to a information, see Enhancing mail flow with
trusted root MTA-STS.
Certificate Authority
and the Common
Name or Subject
Alternative Name
must contain an
entry for the host
name in the STS
policy.
4.7.26 Access denied, a message sent over IPv6 The sending For more information, see Support for
[2a01:111:f200:2004::240] must pass message sent over anonymous inbound email messages over IPv6.
either SPF or DKIM validation, this IPv6 must pass
message is not signed either SPF or DKIM.
4.7.321 starttls-not-supported: Destination mail DNSSEC This message usually indicates an issue on the
server must support TLS to receive mail. checks have destination email server. Check the validity of
passed, yet the recipient address. Determine if the
upon destination server is configured correctly to
connection, receive the messages.
destination
mail server
Error Description Possible cause Additional information
code
doesn't
respond to the
STARTTLS
command.
The
destination
server
responds to
the STARTTLS
command, but
the TLS
handshake
fails.
4.7.322 certificate-expired: Destination mail DNSSEC checks have A valid X.509 certificate that isn't expired must
server's certificate is expired. passed, yet upon be presented. X.509 certificates must be
establishing the renewed after their expiration, most commonly
connection, the on an annual basis.
destination mail
server provides a
certificate that's
expired.
4.7.323 tlsa-invalid: The domain failed DANE Records are DNSSEC This message usually indicates an issue on the
validation. authentic, but one destination email server. Check the validity of
or multiple of these the recipient address and determine if the
scenarios occurred: destination server is configured correctly to
The receive messages. For more information, see
destination DANE protocol: updates and operational
mail server's guidance .
certificate
doesn't match
with what's
expected per
the authentic
TLSA record.
Authentic
TLSA record is
misconfigured.
Destination
domain is
being
attacked.
Any other
DANE failure.
4.7.324 dnssec-invalid: Destination domain The destination For more information, see Overview of
returned invalid DNSSEC records domain indicated it DNSSEC.
was DNSSEC-
authentic, but
Exchange Online
wasn't able to verify
it as DNSSEC-
authentic.
Error Description Possible cause Additional information
code
4.7.325 certificate-host-mismatch: Remote This happens when This message usually indicates an issue on the
certificate MUST have a common name or the presented destination email server. Check the validity of
subject alternative name matching the certificate identities the recipient address and determine if the
hostname (DANE) (CN and SAN) of a destination server is configured correctly to
destination SMTP receive messages. For more information, see
target host don't How SMTP DNS-based Authentication of
match any of the Named Entities (DANE) works to secure email
domains or MX host. communications.
4.7.500- Access denied, please try again later Suspicious activity If this activity is valid, this restriction will be
699 has been detected lifted shortly.
and sending has
been temporarily
restricted for further
evaluation.
4.7.850- Access denied, please try again later Suspicious activity If this activity is valid, this restriction will be
899 has been detected lifted shortly.
on the IP in
question, and it has
been temporarily
restricted while it's
being further
evaluated.
5.0.350 Generic error, x-dg-ref header is too 5.0.350 is a generic For more information, see Fix email delivery
long , or Requested action not taken: catch-all error code issues for error code 550 5.0.350 in Exchange
policy violation detected (AS345) for a wide variety of Online.
nonspecific errors
from the recipient's
email organization.
The specific x-dg-
ref header is too
long message is
related to Rich Text
formatted messages.
The specific
Requested action
not taken: policy
violation detected
(AS345) message is
related to nested
attachments.
5.1.0 Sender denied A common cause of Either the recipient address is incorrectly
this NDR is when formatted, or the recipient couldn't be
you use Microsoft correctly resolved. The first step in resolving
Outlook to save an this error is to check the recipient address, and
email message as a send the message again.
file, and then
someone opened For more information, see Fix email delivery
the message offline issues for error code 5.1.0 in Exchange Online.
and replied to it. The
message property
only preserves the
legacyExchangeDN
Error Description Possible cause Additional information
code
attribute when
Outlook delivers the
message, and
therefore the lookup
could fail.
5.1.1 Bad destination mailbox address This failure might be This error typically occurs when the sender of
caused by the the message enters an incorrect email address
following conditions: of the recipient. The sender should check the
The recipient's recipient's email address and send again. This
email address error can also occur if the recipient email
was entered address was correct in the past but has
incorrectly by changed or has been removed from the
the sender. destination email system.
The recipient's
email address If the sender of the message is in the same
doesn't exist organization as the recipient, and the
in the recipient's mailbox still exists, determine
destination whether the recipient's mailbox has been
email system. relocated to a new email server. If so, Outlook
The recipient's might not have updated the recipient cache
mailbox has correctly. Instruct the sender to remove the
been moved recipient's address from sender's Outlook
and the recipient cache and then create a new
Outlook message. Resending the original message will
recipient result in the same failure.
cache on the
sender's For more information, see Fix email delivery
computer issues for error code 5.1.1 through 5.1.20 in
hasn't Exchange Online.
updated.
An invalid
legacy domain
name (DN)
exists for the
recipient's
mailbox Active
Directory
Domain
Service.
5.1.8 Access denied, bad outbound sender The account has For more information, see Fix email delivery
been blocked for issues for error code 5.1.8 in Exchange Online.
sending too much
spam. Typically, this
problem occurs
because the account
has been
compromised
(hacked) by phishing
or malware.
5.1.10 Recipient not found The recipient's <SMTP For more information, see Fix email delivery
Address> wasn't issues for error code 550 5.1.10 in Exchange
Online.
Error Description Possible cause Additional information
code
found by SMTP
address lookup.
5.1.90 Your message can't be sent because The sender has This could indicate the account has been
you've reached your daily limit for exceeded the compromised and is being used to send spam.
message recipients recipient rate limit as For more information, see How to determine
described in whether your account has been compromised.
Sending limits.
5.2.2 Submission quota exceeded The sender has This could indicate the account has been
exceeded the compromised and is being used to send spam.
recipient rate limit or For more information, see How to determine
the message rate whether your account has been compromised.
limit as described in
Sending limits.
5.2.121 Recipient's per hour message receive The sender has The automated mailer or sender should try
limit from specific sender exceeded exceeded the again later, and reduce the number of
maximum number messages they send per hour to a specific
of messages they're recipient.
allowed to send per
hour to a specific This limit helps protect Microsoft 365 or Office
recipient in 365 users from rapidly filling their inboxes with
Exchange Online. a large number of messages from errant
automated notification systems or other single-
sender mail storms.
5.2.122 Recipient's per hour message receive The Microsoft 365 or The automated mailer or sender should try
limit exceeded Office 365 recipient again later, and reduce the number of
has exceeded the messages they send per hour to a specific
number of messages recipient.
they can receive per
hour from all This limit helps protect Microsoft 365 and
senders. Office 365 users from rapidly filling their
inboxes with a large number of messages from
errant automated notification systems or other
mail storms.
5.3.190 Journaling on-premises messages to Journaling on- A journaling rule is configured in the
Microsoft 365 or Office 365 not premises messages organization's on-premises environment to
supported when Journaling Archive is to Microsoft 365 or journal on-premises messages to Microsoft 365
disabled Office 365 isn't or Office 365, but Journaling Archive is
supported for this disabled. For this scenario to work, the
organization organization's Office 365 administrator should
because they either enable Journaling Archive or change the
haven't turned on journaling rule to journal messages to a
Journaling Archive in different location.
their settings.
5.4.1 Relay Access Denied The mail server For more information, see Fix email delivery
that's generating the issues for error code 5.4.1 in Exchange Online.
error doesn't accept
mail for the
recipient's domain.
This error is caused
by mail server or
Error Description Possible cause Additional information
code
DNS
misconfiguration.
5.4.1 Recipient address rejected: Access The recipient's For more information, see Use Directory Based
denied address doesn't Edge Blocking to reject messages sent to
exist. invalid recipients.
5.4.6 or Routing loop detected A configuration This error occurs when the delivery of a
5.4.14 error has caused an message generates another message in
email loop. 5.4.6 is response. That message then generates a third
generated by on- message, and the process is repeated, creating
premises Exchange a loop. To help protect against exhausting
server (you'll see this system resources, Exchange interrupts the mail
code in hybrid loop after 20 iterations. Mail loops are typically
environments). created because of a configuration error on the
5.4.14 is generated sending mail server, the receiving mail server,
by Exchange Online. or on both. Check the sender's and the
recipient's mailbox rules configuration to
By default, after 20 determine whether automatic message
iterations of an forwarding is enabled.
email loop,
Exchange interrupts For more information, see Fix email delivery
the loop and issues for error code 5.4.6 or 5.4.14 in Exchange
generates an NDR to Online.
the sender of the
message.
5.4.8 MX hosts of <domain> failed MTA- The destination MX This error usually indicates an issue with the
STS validation host was not the destination domain's MTA-STS policy not
host expected per containing the MX host. For more information,
the domain's STS see Enhancing mail flow with MTA-STS.
policy.
5.5.0 550 5.5.0 Requested action not taken: The recipient's <SMTP Similar to 550 5.1.10. For more information, see
mailbox unavailable Address> domain is Fix email delivery issues for error code 550
@hotmail.com or 5.1.10 in Exchange Online.
@outlook.com and
it wasn't found by
SMTP address
lookup.
5.6.11 Invalid characters Your email program For more information, see Fix email delivery
added invalid issues for error code 5.6.11 in Exchange Online.
Error Description Possible cause Additional information
code
5.7.1 Delivery not authorized The sender of the This error occurs when the sender tries to send
message isn't a message to a recipient but the sender isn't
allowed to send authorized to do this. This error frequently
messages to the occurs when a sender tries to send messages
recipient. to a distribution group that has been
configured to accept messages only from
members of that distribution group or other
authorized senders. The sender must request
permission to send messages to the recipient.
5.7.1 Unable to relay The sending email This error occurs when the sending email
system isn't allowed system tries to send an anonymous message to
to send a message a receiving email system, and the receiving
to an email system email system doesn't accept messages for the
that isn't the final domain or domains specified in one or more of
destination of the the recipients. The following reasons are the
message. most common ones for this error:
A third party tries to use a receiving
email system to send spam, and the
receiving email system rejects the
attempt. By the nature of spam, the
sender's email address might have been
forged, and the resulting NDR could
have been sent to the unsuspecting
sender's email address. It's difficult to
avoid this situation.
An MX record for a domain points to a
receiving email system where that
domain isn't accepted. The administrator
responsible for the specific domain name
must correct the MX record or configure
the receiving email system to accept
messages sent to that domain, or do
both.
A sending email system or client that
should use the receiving email system to
relay messages doesn't have the correct
permissions to do this.
5.7.1 Client was not authenticated The sending email This error occurs when the receiving server
system didn't must be authenticated before message
authenticate with submission, and the sending email system
Error Description Possible cause Additional information
code
5.7.5 Remote certificate failed MTA- The destination mail This error usually indicates an issue with the
STS validation. Reason: <validityStatus> server's certificate destination mail server's certificate. For more
must chain to a information, see Enhancing mail flow with
trusted root MTA-STS.
Certificate Authority
and the Common
Name or Subject
Alternative Name
must contain an
entry for the host
name in the STS
policy.
5.7.12 Sender was not authenticated by The sender's For more information, see Fix email delivery
organization message is rejected issues for error code 5.7.12 in Exchange Online.
because the
recipient address is
set up to reject
messages sent from
outside its
organization. Only
an email
administrator for the
recipient's
organization can
change this.
5.7.23 The message was rejected because of The destination For more information, see Fix email delivery
Sender Policy Framework violation email system uses issues for error code 5.7.23 in Exchange Online.
SPF to validate
inbound mail, and
there's a problem
with your SPF
configuration.
5.7.57 Client was not authenticated to send You configured an For more information, see Fix email delivery
anonymous mail during MAIL FROM application or device issues for error code 5.7.57 in Exchange Online.
to send (relay) email
messages in
Microsoft 365 or
Office 365 using the
smtp.office365.com
endpoint, and
there's a problem
with the
configuration of the
Error Description Possible cause Additional information
code
application or
device.
5.7.64 TenantAttribution; Relay Access Denied You use an inbound For more information, see Fix email delivery
connector to receive issues for error code 5.7.64 in Exchange Online.
messages from your
on-premises email
environment, and
something has
changed in your on-
premises
environment that
makes the inbound
connector's
configuration
incorrect.
5.7.124 Sender not in allowed-senders list The sender doesn't For more information, see Fix email delivery
have permission to issues for error code 5.7.124 in Exchange
send to the Online.
distribution group
because the sender
isn't in the group's
allowed-senders list.
Depending how the
group is set up, even
the group's owner
might need to be
added to the
allowed sender list
in order to send
messages to the
group.
5.7.133 Sender not authenticated for group The recipient For more information, see Fix email delivery
address is a group issues for error code 5.7.133 in Exchange
distribution list that Online.
is set up to reject
messages sent from
outside its
organization. Only
an email
administrator for the
recipient's
organization or the
group owner can
change this.
5.7.134 Sender was not authenticated for The recipient For more information, see Fix email delivery
mailbox address is a mailbox issues for error code 5.7.134 in Exchange
that is set up to Online.
reject messages sent
from outside its
organization. Only
an email
administrator for the
recipient's
Error Description Possible cause Additional information
code
organization can
change this.
5.7.13 or Sender was not authenticated for public The recipient For more information, see Fix email delivery
135 folder address is a public issues for error code 5.7.13 or 5.7.135 in
folder that is set up Exchange Online.
to reject messages
sent from outside its
organization. Only
an email
administrator for the
recipient's
organization can
change this.
5.7.136 Sender was not authenticated The recipient For more information, see Fix email delivery
address is a mail issues for error code 5.7.136 in Exchange
user that is set up to Online.
reject messages sent
from outside its
organization. Only
an email
administrator for the
recipient's
organization can
change this.
5.7.25 Access denied, the sending IPv6 address The sending IPv6 For more information, see Support for
[2a01:111:f200:2004::240] must have a address must have a anonymous inbound email messages over IPv6.
reverse DNS record reverse DNS record
to send email over
IPv6.
5.7.321 starttls-not-supported: Destination mail DNSSEC This message usually indicates an issue on the
server must support TLS to receive mail. checks have destination mail server. Check the validity of
passed, yet, the recipient address and determine if the
upon destination server is configured correctly to
connection, receive messages.
the
destination
mail server
doesn't
respond to the
STARTTLS
command.
The
destination
server
responds to
the STARTTLS
command, but
the TLS
handshake
fails.
Error Description Possible cause Additional information
code
5.7.322 certificate-expired: Destination mail DNSSEC checks have A valid X.509 certificate that isn't expired must
server's certificate is expired. passed, yet, upon be presented. X.509 certificates must be
establishing the renewed after their expiration, most commonly
connection, the on an annual basis.
destination mail
server provides a
certificate that is
expired.
5.7.323 tlsa-invalid: The domain failed DANE Records are DNSSEC This message usually indicates an issue on the
validation. authentic but one or destination mail server. Check the validity of
multiple of these the recipient address and determine if the
things occurred: destination server is configured correctly to
The receive messages.
destination
mail server's For more information about DANE, see
certificate https://datatracker.ietf.org/doc/html/rfc7671 .
doesn't match
with what is
expected per
the authentic
TLSA record.
Authentic
TLSA record is
misconfigured.
Destination
domain is
being
attacked.
The certificate
start date is in
the future.
Any other
DANE failure.
5.7.324 dnssec-invalid: Destination domain The destination For more information about DNSSEC, see
returned invalid DNSSEC records domain indicated it Overview of DNSSEC.
was DNSSEC
authentic but
Exchange Online
wasn't able to verify
it as DNSSEC
authentic.
5.7.325 certificate-host-mismatch: Remote This error occurs This message usually indicates an issue on the
certificate MUST have a common name or when the presented destination email server. Check the validity of
subject alternative name matching the certificate identities recipient address and determine if the
hostname (DANE) (CN and SAN) of a destination server is configured correctly to
destination SMTP receive messages. For more information, see
target host don't How SMTP DNS-based Authentication of
match any of the Named Entities (DANE) works to secure email
domains or MX host. communications.
5.7.501 Access denied, spam abuse detected The sending account For more information, see Fix email delivery
has been banned issues for error code 451 5.7.500-699 (ASxxx) in
Exchange Online.
Error Description Possible cause Additional information
code
due to detected
spam activity. Verify that account issues have been resolved,
and reset its credentials. To restore this
account's ability to send mail, contact support
through your regular channel.
5.7.502 Access denied, banned sender The sending account Verify that account issues have been resolved,
has been banned and reset its credentials. To restore this
due to detected account's ability to send mail, please contact
spam activity. support through your regular channel.
5.7.503 Access denied, banned sender The sending account Verify that account issues have been resolved,
has been banned and reset its credentials. To restore this
due to detected account's ability to send mail, please contact
spam activity. support through your regular channel.
5.7.504 [email@contoso.com]: Recipient address The recipient Verify the recipient's email address, and try
rejected: Access denied address that you're again.
attempting to
contact isn't valid.
5.7.505 Access denied, banned recipient The recipient that If you feel this is an error, contact support.
you're attempting to
contact isn't valid.
5.7.506 Access Denied, Bad HELO Your server is This isn't allowed, and it's characteristic of
attempting to typical spambot behavior.
introduce itself
(HELO according to
RFC 821) as the
server it's trying to
connect to, rather
than its own fully
qualified domain
name.
5.7.507 Access denied, rejected by recipient The IP that you're Contact the recipient to resolve this issue.
attempting to send
from has been
blocked by the
recipient's
organization.
5.7.508 Access denied, [$SenderIPAddress] has The sender's IPv6 Not applicable
exceeded permitted limits within $range range has attempted
range to send too many
messages in too
short a time period.
5.7.509 Access denied, sending domain The sender's domain For information on why this error occurred, see
[$SenderDomain] does not pass DMARC in the 5322.From Why does DMARC fail?.
verification and has a DMARC policy of address doesn't pass
reject. DMARC. A user too receives this Bounce Message
because it failed DMARC and the DMARC
policy is set to reject all failures. The user then
should contact their email administrator for
additional help.
Error Description Possible cause Additional information
code
5.7.510 Access denied, [contoso.com] does not The sender is Not applicable
accept email over IPv6 attempting to
transmit a message
to the recipient over
IPv6, but the
recipient doesn't
accept email
messages over IPv6.
5.7.511 Access denied, banned sender The IP that you're To delist the address, email
attempting to send delist@microsoft.com and provide the full NDR
from has been code and IP address.
banned.
For more information, see Use the delist portal
to remove yourself from the blocked senders
list.
5.7.512 Access denied, message must be RFC 5322 Message was sent Office 365 only. Each message must contain a
section 3.6.2 compliant without a valid valid email address in the "From" header field.
"From" email Proper formatting of this address includes
address. angle brackets around the email address, for
example, <security@contoso.com>. Without
an address with this format, Microsoft 365 or
Office 365 will reject the message.
5.7.513 Service unavailable, Client host The recipient The domain that received the email has
[$ConnectingIP] blocked by domain has added blocked your sender's IP address. If you think
$recipientDomain using Customer Block your sending IP your IP address has been added to the
list (AS16012607) address to its recipient domain's custom blocklist by error,
custom blocklist. you need to contact them directly and ask
them to remove it from the blocklist.
5.7.606- Access denied, banned sending IP The IP that you're Verify that you're following the best practices
649 [IP1.IP2.IP3.IP4] attempting to send for email deliverability, and ensure your IPs'
from has been reputations haven't been degraded as a result
banned. of compromise or malicious traffic. If you
believe you're receiving this message by error,
you can use the self-service portal to request
your IP address to be removed from this list.
domain is defined in
a block entry.
5.7.705 5.7.705 Access denied, tenant has Most of the traffic Ensure that any compromises or open relays
exceeded threshold , 5.7.708 Access from this tenant has have been resolved, and then contact support
5.7.708 denied, traffic not accepted from this been detected as through your regular channel.
IP suspicious and this
detection has For more information, see Fix email delivery
resulted in a ban on issues for error codes 5.7.700 through 5.7.750
the sending ability in Exchange Online.
for the tenant.
5.7.750 Service unavailable. Client blocked from A suspicious number Add and validate any or all domains that you
sending from unregistered domains of messages from use to send email from Microsoft 365 or Office
unprovisioned 365.
domains is coming
from this tenant. For more information, see Fix email delivery
issues for error codes 5.7.700 through 5.7.750
in Exchange Online.
n/a The message can't be submitted because The user account The account has likely been compromised. For
the sender's submission quota was has exceeded the more information, see Fix email delivery issues
exceeded recipient rate limit for error 'the sender's submission quota was
(10,000 recipients exceeded' in Exchange Online.
per day).
7 Note
This feature requires a Microsoft 365 administrator account. This feature isn't available for Microsoft
365 Government, Microsoft 365 operated by 21Vianet, or Microsoft 365 Germany.
To learn more about the description of the non-delivery report (NDR), possible cause, and solution (by
running the following NDR diagnostic), you can run an automated diagnostic. Ensure you get the NDR code
or status code from the undeliverable/non-delivery report.
A flyout page opens in the Microsoft 365 admin center. Paste the NDR code or error message, and then
select Run Tests.
Field Description
Office 365 This section indicates that Microsoft 365 or Office 365 generated the NDR. The logo doesn't mean that
logo Microsoft 365 or Office 365 was responsible for the error. This tells which messaging endpoints or
services are involved in the email transaction, which isn't always clear in older style NDRs.
Cause This section provides the reason that the message wasn't delivered.
Fix-it owner This section provides an at-a-glance view of the issue and who needs to fix it. The image shows the
indicator three basic parties in a Microsoft 365 or Office 365 email transaction: the sender, Microsoft 365 or
Office 365, and the recipient. The area marked in red is where the problem usually must be fixed.
How to fix it This section is designed for the end user or the email sender who receives the NDR. It explains how to
fix the issue.
More info for This section provides a detailed explanation of the problem and solution along with technical details
Field Description
email admins and a link to a web-based article that has detailed reference information.
Message hops This section contains times and system references for the message, which allows an administrator to
follow the message's hops or server-to-server path. With this information, an administrator might
quickly spot problems between message hops.
For NDRs that don't have the latest format, the information might be separated into two sections: User
information and Diagnostic information for administrators. The following figure shows the format for one
type of Exchange Online NDR:
User information
The User information section appears first in some NDRs, and the main purpose is to provide a summary
about what went wrong. The text is designed to help the message sender determine why the message was
rejected and, if possible, how to resend the message successfully. The email address of each recipient is
listed, and the reason for the failure is included in the space below the recipient's email address. The name
of the mail server that rejected the message might also be included in this section.
text
<SMTP response>
Original message headers
<message header fields>
Field Description
Generating This field indicates the name of the SMTP mail server that created the NDR. If no remote server is listed
server below the sender's email address, the generating server is also the server that rejected the original
email message. When the remote mail server acknowledges and accepts the message, but later rejects
the message, for example, because of content restrictions, the remote server generates the NDR. If the
remote mail server never acknowledges and never accepts the message, the sending server in Exchange
Online generates the NDR.
<Rejected This value is the email address of the recipient. If delivery failed to more than one recipient, the email
recipient> address of each recipient is listed. The following information is also included for each failed recipient:
Field
Description
<Remote This value is the name of the mail server that rejected the message. If the original message is
server> successfully acknowledged by the receiving server, but is later rejected, the remote server value isn't
populated.
<Enhanced This value is assigned by the mail server that rejected the original message and indicates why the
status code> message was rejected. These codes are defined in RFC 3463, and use the format abc x.y.z, where the
placeholder values are integers. For example, a 5.x.x code indicates a permanent error, and a 4.x.x code
indicates a temporary error. Although the enhanced status code is often generated by an external mail
server, Exchange Online uses the enhanced status code value to determine the text to display in the
User information section.
<SMTP This value is returned by the mail server that rejected the original message. This text provides an
response> explanation for the enhanced status code value. The text is always presented in US-ASCII format.
Original This section contains the message header fields of the rejected message. These header fields can
message provide useful diagnostic information, such as the path that the message took before it was rejected, or
headers whether the To field value matches the rejected recipient value.
Output
From the Diagnostic information for administrators section, you can see that alpineskihouse.com
attempted to connect to the server mail.contoso.com to deliver the message to the recipient
ronald@contoso.com. However, mail.contoso.com responded with the error 530 5.7.1 Client was not
authenticated . Even though bigfish.com generated the NDR, mail.contoso.com actually rejected the
message, so the administrators at contoso.com are responsible for understanding and fixing the problem.
This particular error indicates that the server mail.contoso.com is configured not to accept anonymous
email from the Internet.
Although the Original message headers are omitted from this example due to their length and complexity,
you can typically extract useful information from the following header fields:
To: This field might be helpful if the email address was mistyped.
Received: These fields can tell you what the path was for the message, and the last hop that
generated the delivery status notification if it isn't easy to tell from the Generating server value in the
NDR.
Received-SPF: If this value is anything other than pass , check the Sender Policy Framework (SPF) DNS
record for your domain. For more information, see Add or edit custom DNS records.
Find and fix email delivery issues as a Microsoft 365 for business admin
Microsoft includes the headers in the NDR email sent back to the original sender of the message that failed
DMARC.
Header information
SPF/DKIM Failures:
Azure PowerShell
Azure CLI
Message-ID: <1430c613-58@A.MB3outlook.com>
From: admin@o365e083.onmicrosoft.com
Subject: Consumer auto forward test
MIME-Version: 1.0
Content-Type: text/plain
Sender: "admin@o365e039.onmicrosoft.com"
<admin@o365e039.onmicrosoft.com>
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: AMB3284:EE_|DU0PRMB172:EE
To: Undisclosed recipients:;
Return-Path: admin@o365e039.onmicrosoft.com
Date: Tue, 11 Apr 2023 16:20:03 +0000
Header Readers
MSFT Header Reader
Google Admin Toolbox Messageheader
Feedback
Was this page helpful? ツ Yes ト No
Getting an error message that means the mail you sent wasn't delivered is frustrating.
This topic tells you what to do if you get error code 550 5.1.8 Access denied in a non-
delivery report (also known as an NDR, bounce message, delivery status notification, or
DSN), and mail isn't delivered.
I got this bounce message. How I'm an email admin. How do I fix this email
do I fix it? delivery issue?
Then, you need to tell your email admin that you think your account has been
compromised. Your admin will need to unblock your account before you can send email
again.
See also
Email non-delivery reports in Exchange Online
Feedback
Was this page helpful? ツ Yes ト No
It's frustrating when you get an error after sending an email message. This topic
describes what you can do if see the error codes 5.4.6, 5.4.14 or other error codes
related to mail routing loops in a non-delivery report (also known as an NDR, bounce
message, delivery status notification, or DSN).
5.4.6 indicates a mail loop or routing problem in on-premises Exchange Server, which
you would likely encounter in a hybrid environment.
The information here applies to a range of error codes 5.4.6 through 5.4.20. Use the
information in the NDR to help you decide how to fix the problem.
I got this bounce message. How do I I'm an email admin. How do I fix this
fix it? issue?
You route all incoming mail for your hybrid domain through
Exchange Online
This error can happen when the MX record for your hybrid domain points to Exchange
Online, and the connector that's used to route email from Exchange Online to your on-
premises Exchange organization is configured to use DNS routing instead of smart host
routing.
To fix the problem, configure a dedicated connector to be used for hybrid. This
connector will use smart host routing and will have your on-premises hybrid server
configured as a smart host. The easiest way to fix the problem is to rerun the Hybrid
Configuration Wizard in your on-premises Exchange organization. Or, you can verify the
configuration of the connector that's used for hybrid by following these steps:
New EAC
1. Open the Microsoft 365 admin center , and then click Admin centers > Exchange
(you might need to click ...show all first). The New EAC screen appears.
2. In the Exchange admin center (EAC), click Mail Flow > Connectors.
3. Select the connector that's used for hybrid, and then click it.
Classic EAC
1. Open the Microsoft 365 admin center , and then click Admin centers > Exchange
(you might need to click ...show all first).
2. Click Classic Exchange admin center on the left pane of the New EAC screen.
7 Note
You can go to the Classic EAC screen only from the New EAC screen.
3. Click mail flow on the left pane. The mail flow home screen appears.
5. Select the connector that's used for hybrid, and click Edit .
You route all outgoing mail from Exchange Online through your
on-premises hybrid server
This configuration is controlled by the value of the RouteAllMessagesViaOnPremises
parameter on the connector that's used for hybrid. When the value of this parameter is
$true , you're routing all outgoing mail from Exchange Online through your on-premises
hybrid server. You can verify this value by replacing <Connector Name> with your value
and running the following command in Exchange Online PowerShell:
PowerShell
In this configuration, the error is caused by either of the following issues on the
connector from your on-premises Exchange organization to Exchange Online:
You don't have a connector (from Office 365 to your organization's email server)
that has the Connector Type value On-premises.
The connector from Office 365 to your organization's email server is scoped to one
or more accepted domains.
To fix the problem, configure a dedicated connector (from Office 365 to your
organization's email server) that has the Connector Type value On-premises* and that's
not scoped to any accepted domains. The easiest way to fix the problem is to rerun the
Hybrid Configuration Wizard in the on-premises Exchange organization. Or, you can
verify the configuration of the connector (from Office 365 to your organization's email
server) that is used for hybrid by following these steps:
1. Open the Microsoft 365 admin center , and then click Admin centers > Exchange
(you might need to click ...show all first).
3. Select the connector that's used for hybrid, and then click Edit . Verify the
following information:
For more information about mail routing in hybrid deployments, see Transport routing
in Exchange hybrid deployments.
Based on the domain in the recipient's email address, your Exchange Online
organization accepted the message, but then couldn't correctly route the message
to the recipient. This failure is likely caused by accepted domain configuration
issues.
In hybrid environments, there are misconfigured connectors in your Exchange
Online organization.
554 5.4.6 Hop count exceeded - possible mail loop (always generated by on-
Feedback
Was this page helpful? ツ Yes ト No
It's frustrating when you get an error after sending an email message. This topic
describes what you can do if you see status code 550 5.7.12 or 5.7.12 in a non-delivery
report (also known as an NDR, bounce message, delivery status notification, or DSN).
You'll see this automated notification when the recipient is configured to reject
messages that are sent from outside of its organization.
I got this bounce message. How do I I'm an email admin. How do I fix this
fix it? issue?
To open the Exchange admin center (EAC), see Exchange admin center in Exchange
Online.
User mailboxes
New EAC
3. Under Mail flow settings, click Manage mail flow settings. The Manage mail flow
settings screen appears.
4. In the Message delivery restriction pane, click Edit. The Message delivery
restrictions screen appears.
5. Clear the check box for Require senders to be authenticated in the Accept
messages from section.
6. Click Save.
Classic EAC**
2. Select the mailbox from the list, and then click Edit . The mailbox properties
screen appears.
3. Go to Mailbox features > Message Delivery Restrictions > and then click View
details. The message delivery restrictions screen appears.
4. Clear the check box for Require that all senders are authenticated in the Accept
messages from section.
2. Select the group from the list and click it. The group properties screen appears.
4. Under the Delivery management pane, click Edit delivery management. The
Delivery management screen appears.
5. Choose the radio button for Allow messages from people inside and outside my
organization.
6. Click Save changes.
1. Go to Recipients > Groups > select the group from the list, and then click Edit .
The group properties screen appears.
3. Click the radio button for Senders inside and outside of my organization.
4. Click Save.
Mail users
) Important
Currently, editing mail flow settings for a mail user is available only in the Classic
EAC.
2. Select the mail user from the list, and then click Edit . The mail user properties
screen appears.
3. Go to Mailbox flow settings > Message Delivery Restrictions and click View
details. The Message delivery restrictions screen appears.
4. Clear the check box for Require that all senders are authenticated in the Accept
messages from section.
Shared mailboxes
2. Select a shared mailbox from the list and click it. The mailbox properties screen
appears.
3. Under Mail flow settings, click Manage mail flow settings. The Manage mail flow
settings screen appears.
4. In the Message delivery restriction pane, click Edit. The message delivery
restrictions screen appears.
5. Clear the check box for Require senders to be authenticated in the Accept
messages from section.
6. Click Save.
2. Select a shared mailbox from the list, and then click Edit . The shared mailbox
properties screen appears.
3. Go to Mailbox features > Message Delivery Restrictions > and then click View
details. The Message delivery restrictions screen appears.
4. Clear the check box for Require that all senders are authenticated in the Accept
messages from section.
Notes:
To add an external sender to a recipient's allowed senders list, you must first create
a mail contact or a mail user to represent the external sender in your organization.
To add everyone in your organization to a recipient's allowed sender's list, you can
create a distribution group or a dynamic distribution group that contains everyone
in your organization. After you create this group, you can add it to the recipient's
allowed senders list.
The recipient's allowed senders list is different from the organization's allowed
senders list for anti-spam that you manage in the EAC at Protection > Spam filter.
To configure the recipient's allowed senders list, open the EAC and use one of the
following procedures based on the recipient type.
User mailboxes
New EAC
2. Select a user mailbox from the list and click it. The mailbox properties screen
appears.
3. Under Mail flow settings, click Manage mail flow settings. The Manage mail flow
settings screen appears.
4. In the Message delivery restriction pane, click Edit. The Message delivery
restrictions screen appears.
5. Configure the following settings under the Accept messages from section:
In the Accept messages from screen, select the external senders and the "all
internal users" group.
Add the external senders and the "all internal users" group to the list of the
allowed senders of the recipient.
6. When you're finished, click Confirm.
7. Click Save.
Classic EAC
2. Select the mailbox from the list, and then click Edit . The mailbox properties
screen appears.
3. Go to Mailbox features > Message Delivery Restrictions > and then click View
details. The message delivery restrictions screen appears.
Clear the check box for Require that all senders are authenticated.
Select Only senders in the following list, and then click Add . In the Select
Members dialog box that opens, select external senders and the "all internal
users" group.
Add the external senders and the "all internal users" group to the list of the
allowed senders of the recipient.
See also
Email non-delivery reports in Exchange Online
Feedback
Was this page helpful? ツ Yes ト No
It's frustrating when you get an error after sending an email message. This topic
describes what you can do if you see error code 550 5.7.13 or 550 5.7.135 in a non-
delivery report (also known as an NDR, bounce message, delivery status notification, or
DSN). You'll see this automated notification when the recipient is a public folder that's
configured to reject messages from external senders (senders from outside the
organization).
I got this bounce message. How do I fix I'm an email admin. How do I fix
this issue? this issue?
To open the Exchange admin center (EAC), see Exchange admin center in Exchange
Online.
2. Choose a public folder from the list, and then click Edit . The public folder
properties screen appears.
3. Click Mail flow settings.
4. Under Message delivery Restrictions > Accept messages from, perform the
following tasks:
Clear the check box for Require that all senders are authenticated.
5. Click Save.
In Classic EAC
1. In the Classic EAC, go to Public folders > Public folders > select the public folder
from the list, and then click Edit .
2. In the public folder properties dialog box that opens, go to Mail flow settings, and
configure the following settings in the Accept messages from section:
Clear the check box for Require that all senders are authenticated.
Notes:
To add an external sender to a public folder's allowed senders list, you must first
create a mail contact or a mail user to represent the external sender in your
organization.
To add everyone in your organization to a public folder's allowed sender's list, you
can create a distribution group or a dynamic distribution group that contains
everyone in your organization. After you create this group, you can add it to the
public folder's allowed senders list.
The public folder's allowed senders list is different from the organization's allowed
senders list for anti-spam that you manage in the EAC at Protection > Spam filter.
To configure the public folder's allowed senders list, open the EAC do the following
steps:
In New EAC
3. Under Message delivery Restrictions > Accept messages from, perform the
following tasks:
Clear the check box for Require that all senders are authenticated.
Check the check boxes of the specific external senders and the all-internal-
users group you want to add to the senders list.
Click add.
When you're finished, click OK.
4. Click Save.
In Classic EAC
1. In the Classic EAC, go to Public folders > Public folders > select the public folder
from the list, and then click Edit .
2. In the public folder properties dialog box that opens, go to Mail flow settings, and
configure the following settings in the Accept messages from section:
Clear the check box for Require that all senders are authenticated.
Select Only senders in the following list, and then click Add . In the Select
Members dialog box that opens, select the external senders and the "all
internal users" group.
Add the external senders and the "all internal users" group to the allowed
senders list.
See also
Email non-delivery reports in Exchange Online
Feedback
Was this page helpful? ツ Yes ト No
This topic describes what you can do if you see error code 550 5.7.23 in a non-delivery
report (also known as an NDR, bounce message, delivery status notification, or DSN).
I got this bounce message. How do I fix I'm an email admin. How can I fix
it? this?
The Diagnostic information for administrators section in the bounce message will
contain the original error message when Office 365 tried to send the message to the
external email server or service.
Verify the SPF DNS record for your domain. To do this, we recommend that you
use a publicly available SPF or DNS record checker on the web.
Provision all of the domains you own. We limit the number of emails with
unprovisioned domains that a tenant can send.
Add your on-premises IPs, if any, to the SPF record of any domains you send for.
This would include any unprovisioned domains you might be relaying through
Microsoft 365 or Office 365.
Verify that the outbound message wasn't identified as spam by Microsoft 365 or
Office 365 and routed through the High Risk Delivery Pool. Messages in the High
Risk Delivery Pool won't pass SPF checks, and therefore won't be accepted by the
destination email organization.
To receive Bcc copies of outbound messages that are determined to be spam, see
Configure outbound spam policy notifications.
If you determine that the outbound message was incorrectly detected as spam by
Microsoft 365 or Office 365, contact support.
See also
Email non-delivery reports in Exchange Online
Feedback
Was this page helpful? ツ Yes ト No
It's frustrating when you get an error after sending an email message. This topic
describes what you can do if you see error code 550 5.7.57 in a non-delivery report (also
known as an NDR, bounce message, delivery status notification, or DSN).
I got this bounce message. How do I fix I'm an email admin. How can I fix
it? this?
Verify that the application or device is able to negotiate TLS, as TLS is required in
order to authenticate. For more information, see How to set up a multifunction
device or application to send email.
Feedback
Was this page helpful? ツ Yes ト No
It's frustrating when you get an error after sending an email message. This topic
describes what you can do if you see error code 550 5.7.64 in a non-delivery report (also
known as an NDR, bounce message, delivery status notification, or DSN).
I got this bounce message. How do I fix I'm an email admin. How can I fix
it? this?
The host name that's specified in the certificate on the inbound connector no
longer matches the source email server.
IP address of the source email server no longer matches the source IP address on
the inbound connector.
The Diagnostic information for administrators section in the bounce message will
contain the original error message when Microsoft 365 or Office 365 tried to send the
message to the external email server or service.
Feedback
Was this page helpful? ツ Yes ト No
It's frustrating when you get an error after sending an email message. This topic
describes what the remedies if you see status code 550 5.7.124 or 5.7.124 in a non-
delivery report.
7 Note
You'll see this automated notification when the sender isn't specified in the group's
allowed senders list (directly or as a member of a group). Depending how the group is
configured, even the group's owner might need to be in the group's allowed senders list
in order to send messages to the group.
I got this bounce message. How I'm the group owner or email admin. How do I
do I fix it? fix this issue?
You might have to wait for the group's owner to approve your request to join the group
before you can successfully send messages to it. If the group isn't in your organization,
or if the group doesn't allow requests to join, then you'll need to ask the group owner to
add you to the allowed senders list. You'll find instructions for finding the group owner
in the NDR.
To open the Exchange admin center (EAC), see Exchange admin center in Exchange
Online.
New EAC
3. Select a group from the list and click it. The group properties screen appears.
6. Under Sender options, choose the option Only allow messages from people
inside my organization.
7. Under Specified senders, click on the text box. The list of senders is displayed.
Choose senders from the list. The chosen sender's name is displayed below the
text box.
8. Click Save changes.
Classic EAC
1. In the Classic EAC, go to Recipients > Groups > select the group from the list, and
then click Edit .
2. In the group properties dialog box that opens, go to Delivery management and
then click Add .
3. In the Select Allowed Senders dialog box that opens, select the sender or a group
that the sender is a member of.
4. Add the sender or the sender's group to the list of allowed senders.
7 Note
To add an external sender to a group's allowed senders list, you must first create a
mail contact or a mail user to represent the external sender in your organization.
New EAC
1. Go to Recipients > Groups.
3. Select a group from the list and click it. The group properties screen appears.
4. Click the Settings tab.
6. Under Sender options, choose Allow messages from people inside and outside
my organization.
3. In the Distribution Group box, select Delivery management and configure the
following settings:
Remove any entries in the allowed senders list by selecting one entry,
pressing CTRL + A to select all entries, and then clicking Remove .
See also
Email non-delivery reports in Exchange Online
Feedback
Was this page helpful? ツ Yes ト No
It's frustrating when you get an error after sending an email message. This topic
describes what you can do if you see error code 550 5.7.133 in a non-delivery report
(also known as an NDR, bounce message, delivery status notification, or DSN). You'll see
this automated notification when the recipient is a group that's configured to reject
messages from external senders, that is, senders from outside the organization.
I got this bounce message. How do I'm the group owner or email admin. How
I fix this issue? do I fix this issue?
To open the Exchange admin center (EAC), see Exchange admin center in Exchange
Online.
5. Under Sender options, choose Allow messages from people inside and outside
my organization.
6. Click Save changes.
Classic EAC
1. In the EAC, go to Recipients > Groups > select the group from the list, and then
click Edit .
2. In the group properties dialog box that opens, go to Delivery management >
select Senders inside and outside of my organization.
3. Click Save.
Notes:
To add an external sender to a group's allowed senders list, you must first create a
mail contact or a mail user to represent the external sender in your organization.
To add everyone in your organization to a group's allowed sender's list, you can
create a distribution group or a dynamic distribution group that contains everyone
in your organization. After you create this group, you can add it to the group's
allowed senders list.
The group's allowed senders list is different from the organization's allowed
senders list for anti-spam that you manage in the EAC at Protection > Spam filter.
To configure the group's allowed senders list, perform the following steps:
New EAC
1. Go to Recipients > Groups.
2. Select a group from the list and click it. The group properties screen appears.
5. Under Sender options, choose Allow messages from people inside and outside
my organization.
6. Under Specified senders, click inside the text box. The list of senders (internal and
external) is displayed.
7. Choose the senders you want to add to the senders list, and click Save changes.
Classic EAC
1. Go to Recipients > Groups > select the group from the list, and then click Edit .
2. In the group properties dialog box that opens, go to Delivery management and
configure the following settings:
Click Add . In the Select Allowed Senders dialog box, select and add the
external senders and the "all internal users" group. When you're finished, click
OK.
3. Click Save.
See also
Email non-delivery reports in Exchange Online
Feedback
Was this page helpful? ツ Yes ト No
Provide product feedback | Get help at Microsoft Q&A
Fix NDR error "550 5.7.134" in Exchange
Online
Article • 02/13/2023
It's frustrating when you get an error after sending an email message. This topic
describes what you can do if you see error code 550 5.7.134 in a non-delivery report
also known as an NDR, bounce message, delivery status notification, or DSN). You'll see
this automated notification when the recipient is a mailbox that's configured to reject
messages from external senders (senders from outside the organization).
I got this bounce message. How do I fix I'm an email admin. How do I fix
this issue? this issue?
To open the New Exchange admin center (EAC), see Exchange admin center in Exchange
Online.
To open the Classic EAC, click Classic Exchange admin center on the left pane of the
Exchange admin center (New) home screen, as shown in the image below.
Method 1: Allow all internal and external senders to send
messages to this mailbox
New EAC
2. Select a user mailbox from the list and click it. The user mailbox properties screen
appears.
3. Under Mail flow settings, click Manage mail flow settings. The Manage mail flow
settings screen appears.
4. In the Message delivery restriction pane, click Edit. The Message delivery
restrictions screen appears.
5. Under Accept messages from, clear the check box for Require senders to be
authenticated.
6. Click Save.
Classic EAC
1. In the Classic EAC, go to Recipients > Mailboxes > select the mailbox from the list,
and then click Edit .
2. In the mailbox properties dialog box that opens, go to Mailbox features >
Message Delivery Restrictions > and then click View details.
3. In the Message delivery restrictions dialog box that opens, clear the check box for
Require that all senders are authenticated in the Accept messages from section.
Notes:
To add an external sender to a mailbox's allowed senders list, you must first create
a mail contact or a mail user to represent the external sender in your organization.
To add everyone in your organization to a mailbox's allowed sender's list, you can
create a distribution group or a dynamic distribution group that contains everyone
in your organization. After you create this group, you can add it to the mailbox's
allowed senders list.
The mailbox's allowed senders list is different from the organization's allowed
senders list for anti-spam that you manage in the EAC at Protection > Spam filter.
New EAC
1. Go to Recipients > Mailboxes.
2. Select a user mailbox from the list and click it. The user mailbox properties screen
appears.
3. Under Mail flow settings, click Manage mail flow settings. The Manage mail flow
settings screen appears.
4. In the Message delivery restriction pane, click Edit. The Message delivery
restrictions screen appears.
Check the check boxes of the internal-senders group and the specific external
users you want to add.
Click Confirm.
The Message delivery restrictions screen reappears.
6. Click Save.
Classic EAC
1. In the Classic EAC, go to Recipients > Mailboxes > select the mailbox from the list,
and then click Edit .
2. In the mailbox properties dialog box that opens, go to Mailbox features >
Message Delivery Restrictions > and then click View details.
3. In the Message delivery restrictions dialog box that opens, configure the
following settings in the Accept messages from section:
Clear the check box for Require that all senders are authenticated.
Select Only senders in the following list, and then click Add . In the Select
Members dialog box that opens, select the external senders and the "all
internal users" group.
Add the external senders and the "all internal users" group.
See also
Email non-delivery reports in Exchange Online
Feedback
Was this page helpful? ツ Yes ト No
It's frustrating when you get an error after sending an email message. This topic
describes what you can do if you see error code 550 5.7.136 in a non-delivery report,
also known as an NDR, bounce message, delivery status notification, or DSN. You'll see
this automated notification when the recipient is a mail user that's configured to reject
messages from external senders, that is, senders from outside the organization.
I got this bounce message. How do I fix I'm an email admin. How do I fix
this issue? this issue?
7 Note
Currently, there is no support for the two methods in the New EAC.
To open the Classic EAC, click Classic Exchange admin center on the left pane of the
home screen of the New EAC.
.
2. Go to Mailbox flow settings and then click View details in the Message Delivery
Restrictions section.
The Message delivery restrictions dialog box opens.
Clear the check box for Require that all senders are authenticated.
Select All senders.
Notes:
To add an external sender to a mail user's allowed senders list, you must first
create a mail contact or a mail user to represent the external sender in your
organization.
To add everyone in your organization to a mail user's allowed sender's list, you can
create a distribution group or a dynamic distribution group that contains everyone
in your organization. After you create this group, you can add it to the mail user's
allowed senders list.
The mail user's allowed senders list is different from the organization's allowed
senders list for anti-spam that you manage in the EAC at Protection > Spam filter.
To configure the mail user's allowed senders list, open the Classic EAC do the following
steps:
1. Go to Recipients > Contacts > select the mail user from the list, and then click Edit
.
The mail user properties dialog box opens.
2. Go to Mailbox flow settings and then click View details in the Message Delivery
Restrictions section.
Clear the check box for Require that all senders are authenticated.
Select Only senders in the following list, and then click Add . In the Select
Members dialog box that opens, select the external senders and the "all
internal users" group.
Add the external senders and the "all internal users" group to the allowed
senders list.
See also
Email non-delivery reports in Exchange Online
Feedback
Was this page helpful? ツ Yes ト No
It's frustrating when you get an error after sending an email message. This topic
describes what you can do if you see error codes 550 5.7.700 through 550 5.7.750 in a
non-delivery report (also known as an NDR, bounce message, delivery status
notification, or DSN).
Use the information in the NDR to help you decide how to fix the problem.
I got this bounce message. How do I I'm an email admin. What can I do to
fix it? fix this?
5.7.705 Access denied, tenant has exceeded threshold: This error occurs when too
much spam or bulk mail has been sent by your organization and we place a block
on outgoing mail.
5.7.708 Access denied, traffic not accepted from this IP: This error occurs when
sending email from known, low reputation IP addresses that are typically used by
new customers.
5.7.750 Client blocked from sending from unregistered domain: The error occurs
when a large volume of messages are sent from domains that aren't provisioned in
Office 365 (added as accepted domains and validated).
To remove this block, you need to understand and explain the cause to a support agent,
as well as correct the underlying problem. Admins can use the following reports to
investigate who or what is causing the issue:
In rare cases, this issue could also happen if you renew your subscription after it has
already expired. It takes time for the service to sync the new subscription information
(typically, no more than one day), but your organization could be blocked from sending
email in the meantime. The best way to prevent this issue is to make sure your
subscription does not expire.
Most common solution: Add and validate all domains in Microsoft 365 or Office
365 that you use to send email messages. For more information, see Add a
domain.
Look for unusual connectors and compromised accounts. Attackers will often
create new inbound connectors in your Microsoft 365 or Office 365 organization to
send spam. For more information, see Validate connectors, and Responding to a
compromised email account.
Feedback
Was this page helpful? ツ Yes ト No
It's frustrating when you get an error after sending an email message. This topic
describes what you can do if you see error code 451 4.7.500-699 (ASxxx) in a non-
delivery report (also known as an NDR, bounce message, delivery status notification, or
DSN).
This error code is part of anti-spam filtering in Microsoft 365 or Office 365. You'll get this
error when the source IP address that's sending you email changes significantly from its
previously-established patterns. This part of a filtering technique known as graylisting:
when new senders appear, they're treated more suspiciously than senders with a
previously-established history of sending email messages (think of it as a probation
period).
This error response is called IP throttling, and it can help reduce the amount of spam
that you receive.
I got this bounce message. How do I fix I'm an email admin. How can I fix
it? this?
fix-
this)
If the problem continues, send the bounce message to your email admin for assistance
and refer them to the information in this topic.
1. If you're trying to relay outbound email from your on-premises email server
through Microsoft 365 or Office 365, you need to configure a connector from your
email server to Microsoft 365 or Office 365. For more information, see Set up
connectors to route mail between Microsoft 365 or Office 365 and your own email
servers.
2. If inbound email to your Microsoft 365 or Office 365 organization is first routed
through a third-party service, appliance, or device, you need to set up a connector
to apply security restrictions.
After you have set up a connector, you can monitor if IP throttling has stopped.
7 Note
We don't recommend sending more than test messages from your initial
onmicrosoft.com domain. Email from onmicrosoft.com domains is limited and
filtered to prevent spam. In typical production environments, you need to add a
custom domain and then send your regular volume of email messages. For more
information on domains, check out this Domains FAQ.
Feedback
Was this page helpful? ツ Yes ト No
) Important
Mail flow rules are now available in the new Exchange admin center. Try it now !
It's frustrating when you get an error after sending an email message. This article
describes what you can do if you see error code 550 4.4.7 in a non-delivery report (also
known as an NDR, bounce message, delivery status notification, or DSN).
Use the information in the NDR to help you decide how to fix the problem.
I got this bounce message. I'm an email admin. How Causes for error
How do I fix it? do I fix this? code 4.4.7
If the steps in this section don't fix the problem for you, contact your email admin and
refer them to this article so they can try to resolve the issue for you.
If you get this error only for messages that you sent to a specific domain (for example,
only recipients in the @fabrikam.com domain), the problem is likely with that
destination domain. For example:
The name of the email mail server in the destination domain, and the error
message that's returned by the email server.
The number of delivery attempts made that were made by the datacenter server in
Exchange Online, and how long it tried to reach the remote server.
The email admins in the destination domain will need to investigate the issue. Possible
solutions might include:
Stop blocking messages from Exchange Online or specifically allow messages from
senders in your domain.
Contact the support channels for their email server or service. Microsoft support
might also be able to help.
Solution 1: The MX record for your domain might be missing or incorrect. Get
more information about how MX records work at DNS basics.
Solution 2: Test your MX record and your organization's ability to send mail by
using the Outbound SMTP Email test in the Microsoft Remote Connectivity
Analyzer .
Solution 3: The Sender Policy Framework (SPF) record for your domain might be
incomplete, and might not include all email sources for your domain. For more
information, see Set up SPF to help prevent spoofing.
Solution 4: Your domain might have expired due to non-payment. Verify with your
domain registrar that your domain is active and not expired.
For more information about message routing in hybrid deployments, see Transport
routing in Exchange hybrid deployments.
The message was considered too old by the rejecting system, either because it
remained on that host too long or because the time-to-live value specified by
the sender of the message was exceeded.
450 4.7.0 Proxy session setup failed on Frontend with '451 4.4.0 Primary
target IP address responded with ... Be sure to record the error that follows
this string and the last end point attempted.
See also
Email non-delivery reports in Exchange Online
Feedback
Was this page helpful? ツ Yes ト No
It's frustrating when you get an error after sending an email message. This topic
describes what you can do if you see error code 550 5.0.350 in a non-delivery report
(also known as an NDR, bounce message, delivery status notification, or DSN).
Use the information in the NDR to help you decide how to fix the problem.
I got this bounce message. How do I fix I'm an email admin. How can I fix
it? this?
But, if the NDR also contains x-dg-ref header is too long , that's a specific problem
with a specific solution. This issue occurs if you use Rich Text formatting in Outlook
messages. The message likely contains at least one attachment, and one of the
attachments is likely an email message that also contains at least one attached email
message.
Or, if the NDR also contains Requested action not taken: policy violation detected
(AS345) , that's another specific problem with a specific solution. This issue occurs if the
message contains an attachment (for example, a Word file) with 20 or more embedded
files (for example, Excel or Word files).
If the NDR contains Requested action not taken: policy violation detected (AS345) ,
remove some embedded files from the attachment.
Otherwise, forward the NDR to your admin for help.
In Exchange Online, you can control TNEF (also known as the Transport Neutral
Encapsulation Format, Outlook Rich Text Format, or Exchange Rich Text Format) settings
in remote domains, and in the properties of mail contacts or mail users. For more
information, see Message format and transmission in Exchange Online.
The Diagnostic information for administrators section in the bounce message will
contain the original error message when Microsoft 365 or Office 365 tried to send the
message to the external email server or service. Use this information to help identify the
issue, and to see if there's anything you can do to fix the problem.
See also
Email non-delivery reports in Exchange Online
Feedback
Was this page helpful? ツ Yes ト No
It's frustrating when you get an error after sending an email message. This topic
describes what you can do if you see error code 550 5.1.0 or 5.1.0 in a non-delivery
report (also known as an NDR, bounce message, delivery status notification, or DSN).
Use the information in the NDR to help you decide how to fix the problem.
I got this bounce message. I'm an email admin. How Details for error
How do I fix it? do I fix this? code 5.1.0
If these steps don't fix the problem for you, contact your email admin and refer them to
this topic so they can try to resolve the issue for you.
Contact the recipient (by phone, in person, etc.) to verify that your email address isn't in
their block list.
2. Start typing the recipient's name or email address in the To field until the recipient
appears in the drop-down list.
3. Use the Down Arrow and Up Arrow keys to select the recipient, and then press the
Delete key.
You can only clear your Auto-Complete list in the light version of Outlook on the web.
To open your mailbox in the light version of Outlook on the web, do either of the
following steps:
Open the mailbox in an older web browser that only supports the light version of
Outlook on the web (for example, Internet Explorer 9).
Configure your Outlook on the web settings to only use the light version of
Outlook on the web (the change takes effect the next time you open the mailbox):
1. In Outlook on the web, click Settings .
2. In the Search all settings box, type light and select Outlook on the web
version in the results.
3. In the page that opens, select Use the light version of Outlook on the web,
and then click Save.
4. Log off, close your web browser, and open the mailbox again in Outlook on
the web.
After you open your mailbox in the light version of Outlook on the web, do the
following steps to clear all entries from your Auto-Complete list:
2. In the E-Mail Name Resolution section, click Clear Most Recent Recipients list,
and then click OK in the confirmation dialog box.
3. While you're still in Options, to return your mailbox to the full version of Outlook
on the web, go to Outlook version, clear the check box for Use the light version,
and then click Save.
4. Log off and close your web browser. The next time you open your mailbox in a
supported web browser, you'll use the full version of Outlook on the web.
See also
Email non-delivery reports in Exchange Online
Feedback
Was this page helpful? ツ Yes ト No
) Important
Mail flow rules are now available in the new Exchange admin center. Try it now !
It's frustrating when you get an error after sending an email message. This article
describes what you can do if you see error codes 550 5.1.1 through 5.1.20 in a non-
delivery report (also known as an NDR, bounce message, delivery status notification, or
DSN).
I got this bounce message. How do I I'm an email admin. What can I do to fix
fix it? this?
If the steps in this section don't fix the problem for you, contact your email admin and
refer them to the information in this article so they can try to resolve the issue for you.
To remove invalid recipients or all recipients from your Auto-Complete list in Outlook
2010 later, see Manage suggested recipients in the To, Cc, and Bcc boxes with Auto-
Complete .
To remove recipients from your Auto-Complete list in Outlook on the web (formerly
known as Outlook Web App), do one of the following procedures:
2. Start typing the recipient's name or email address in the To field until the recipient
appears in the drop-down list.
3. Use the Down Arrow and Up Arrow keys to select the recipient, and then press the
Delete key.
Open the mailbox in an older web browser that only supports the light version of
Outlook on the web (for example, Internet Explorer 9).
Configure your Outlook on the web settings to only use the light version of
Outlook on the web (the change takes effect the next time you open the mailbox):
2. In the Search all settings box, type light and select Outlook on the web
version in the results.
3. In the page that opens, select Use the light version of Outlook on the web,
and then click Save.
4. Log off, close your web browser, and open the mailbox again in Outlook on
the web.
After you open your mailbox in the light version of Outlook on the web, do the
following steps to clear all entries from your Auto-Complete list:
2. In the E-Mail Name Resolution section, click Clear Most Recent Recipients list,
and then click OK in the confirmation dialog box.
3. While you're still in Options, to return your mailbox to the full version of Outlook
on the web, go to Outlook version, clear the check box for Use the light version,
and then click Save.
4. Log off and close your web browser. The next time you open your mailbox in a
supported web browser, you'll use the full version of Outlook on the web.
To remove invalid recipients or all recipients from your Auto-Complete list in Outlook
2010 later, see Manage suggested recipients in the To, Cc, and Bcc boxes with Auto-
Complete .
If the addresses don't match, contact the recipient (by phone, in person, etc.) and ask
them if they've configured an email rule that forwards incoming email messages from
you to another destination. Their rule could have tried to send a copy of your message
to a bad email address. If the recipient has such a rule, they'll need to correct the
destination email address or remove the rule in order to prevent 5.1.x message delivery
errors.
Check your recent messages in the Sent Items folder for strange or unknown messages
(messages that you didn't send). If you find any, it's possible that your email account
was compromised.
If you believe that your account has been compromised, follow these steps:
Reset your password and scan your devices for malware. However, the hacker
might have configured other settings on your mailbox (for example, created Inbox
rules to auto-forward email messages or added additional mailbox delegates). So,
follow the additional steps in How to determine whether your account has been
compromised.
Notify your email admin. Your admin will need to unblock your account before you
can send email again.
Typically, if a message can't be delivered, the recipient's email system will use the
sender's email address in the From field to notify the sender in an NDR like this one. But
what if the message was sent by a spammer who falsified the From address so it
appears the message came from your email address? The resulting NDR that you'll
receive is useless because it creates the false impression that you did something wrong.
This type of useless NDR is called backscatter. It's annoying, but if this NDR is
backscatter, your account hasn't been compromised.
Check your recent messages in the Sent Items folder for strange or unknown messages
(messages that you didn't send). If you don't see any suspicious messages, it's likely that
the NDR you received is backscatter. If you've already changed your password and run
an anti-malware scan, you can ignore these backscatter NDRs.
Open the Microsoft 365 admin center , and from the Home page, do the following
items:
1. Check the Message Center to see if your organization has a known configuration
issue.
2. Go to Health > Service health to see if there's a current service issue in Microsoft
365 or Office 365 affecting the user's account.
3. Check the sender and recipient domains for incorrect or stale mail exchange (MX)
resource records by running the Mailflow Troubleshooter tool that is available
within Microsoft 365 and Office 365.
If there's a problem with the recipient's domain, contact the recipient or the recipient's
email administrator to let them know about the problem. They'll have to resolve the
issue in order to prevent NDR 5.1.x errors.
7 Note
If external senders (senders outside your organization) receive this NDR when they send
message to recipients in your domain, try the following steps:
The MX resource record for your domain might be incorrect. The MX record for an
Exchange Online domain points to the email server (host)
<domain>.mail.protection.outlook.com.
Verify that you have only one MX record configured for your Exchange Online
domain. We don't support using more than one MX record for domains enrolled in
Exchange Online.
Test your MX record and your ability to send email from your Exchange Online
organization by using the Verify MX Record and Outbound Connector Test at
Office 365 > Mail Flow Configuration in the Microsoft Remote Connectivity
Analyzer.
For more information, see Add DNS records to connect your domain and Set up SPF to
help prevent spoofing.
A forwarding Inbox rule or delegate that the recipient configured in their own
mailbox.
A mail flow rule (also known as a transport rule) configured by an email admin that
copies or forwards messages sent to the recipient to another invalid recipient.
See also
Email non-delivery reports in Office 365
Feedback
Was this page helpful? ツ Yes ト No
) Important
Mail flow rules are now available in the new Exchange admin center. Try it now !
Problems sending and receiving email messages can be frustrating. If you get a non-
delivery report (NDR), also called a bounce message, for error code 550 5.1.10, this
article can help you fix the problem and get your message sent.
I got this bounce message. How do I I'm an email admin. How can I fix this
fix it? issue?
The recipient's email address doesn't exist or couldn't be found. Go to the I got
this bounce message. How do I fix it? section in this article.
Typically, if a message can't be delivered, the recipient's email system will use the
sender's email address in the From field to notify the sender in an NDR like this one. But
what if the message was sent by a spammer who falsified the From address so it
appears the message came from your email address? The resulting NDR that you'll
receive is useless because it creates the false impression that you did something wrong.
This type of useless NDR is called backscatter. It's annoying, but if this NDR is
backscatter, your account hasn't been compromised.
A spammer sent a message to a non-existent recipient, and they falsified the From
address so it appears the message was sent by your email address. The resulting
bounce message that you get is called backscatter, and you can safely ignore or
delete the bounce message.
Backscatter itself is harmless, but if you're getting much of it, it's possible that your
computer or device is infected with spam-sending malware. Consider running an
anti-malware scan. Additionally, to help prevent spammers from impersonating
you or others in your organization, ask your email admin to read this topic: Set up
SPF to help prevent spoofing.
If the steps in this section don't fix the problem for you, contact your email admin and
refer them to the information in this article so they can try to resolve the issue for you.
If your original message had an attachment larger than 10 MB, the Send Again
option might not be available or might not work. Instead, resend the message
from your Sent Items folder. For more information, see Resend an email
message .
2. In the new copy of your message, select the recipient's email address in the To box
and then press the Delete key.
3. Remove the recipient's email address from the Auto-Complete list (a bad or
outdated entry could be causing the problem):
a. In the To box, start typing the recipient's email address until it appears in the
Auto-Complete drop-down list as shown below.
b. Use the Down Arrow key to select the recipient from the Auto-Complete drop-
down list and then press the Delete key or choose the Delete icon to the
right of the email address.
4. In the To box, continue typing the entire recipient email address. Be sure to spell
the address correctly.
b. Use the Down Arrow key to select the recipient from the Auto-Complete drop-
down list and then press the Delete key or choose the Delete icon to the right
of the email address.
5. In the To box, continue typing the entire recipient email address. Be sure to spell
the address correctly.
6. Click Send.
Verify recipient's email address and resend your message in
Outlook on the web (formerly known as Outlook Web App)
1. Open the bounce message. In the reading pane, just below the message header
information, choose To send this message again, click here.
If your original message had an attachment larger than 10 MB, the Send Again
option might not be available or might not work. Instead, resend the message
from your Sent Items folder.
2. On the To line of the new copy of your message, choose the Delete icon to
delete the recipient's email address.
If your
original message had an attachment larger than 10 MB, the Send Again option
might not be available or might not work. Instead, resend the message from your
Sent Items folder.
3. On the To line of the new copy of your message, choose the Delete icon to delete
the recipient's email address.
4. Remove the recipient's email address from the Auto-Complete list (a bad or
outdated entry could be causing the problem):
a. On the empty To line, start typing the recipient's name or email address until it
appears in the Auto-Complete drop-down list.
b. Use the Down Arrow key to select the recipient from the Auto-Complete list,
and then press the Delete key. Or, hover over the recipient's name and click the
Delete icon .
c. Use the Down Arrow key to select the recipient from the Auto-Complete list,
and then press the Delete key. Or, hover over the recipient's name and click the
Delete icon.
5. On the To line, continue typing the recipient's entire email address. Be sure to spell
the address correctly.
6. Click Send.
If the addresses don't match, contact the recipient (by phone, in person, etc.) and ask
them if they've configured an email rule that forwards incoming email messages from
you to another destination. Their rule could have tried to send a copy of your message
to a bad email address. If the recipient has such a rule, they'll need to correct the
destination email address or remove the rule in order to prevent 5.1.x message delivery
errors.
Microsoft 365 and Office 365 support multiple ways to forward messages automatically.
If the intended recipient of your message is using Microsoft 365 or Office 365, ask them
to review the Update, disable, or remove Inbox Rules forwarding and Disable account
forwarding sections below.
If the problem persists after performing these steps, ask the recipient to refer their email
admin to the I'm an email admin. How can I fix this issue? section below.
2. Click the gear icon in the top-right corner to show the Settings pane.
4. From the Options navigation pane on the left, select Mail > Automatic processing
> Inbox and sweep rules.
5. From the Options navigation pane on the left, select Mail > Automatic processing
> Inbox and sweep rules.
6. Update, turn off, or delete any rules that might be forwarding the sender's
message to a non-existent or broken email address.
1. In the Microsoft 365 admin center, choose Users to go to the Active users page.
2. In the Active users > Filters search field, type part of the recipient's name, and
then press Enter to locate the recipient. If the recipient doesn't exist, then you must
create a new mailbox or contact for this user. (For more information, see Add users
individually or in bulk.) If the recipient does exist, make sure the recipient's
username matches the email address the sender used.
3. If the user's mailbox is hosted in Exchange Online, click the user's record to review
their details and verify that they've been assigned a valid license for email (for
example, an Office 365 Enterprise E5 license).
4. If the user's mailbox is hosted in Exchange Online, but no license has been
assigned, choose Edit and assign the user a license.
5. If the user's mailbox is hosted in Exchange Online, click the user's record to review
their details and verify that they've been assigned a valid license for email (for
example, an Office 365 Enterprise E5 license).
6. If the user's mailbox is hosted in Exchange Online, but no license has been
assigned, choose Edit and assign the user a license.
Follow the steps below to fix the recipient's broken mail forwarding rule or settings.
The recipient might have an Inbox rule that is forwarding messages to a problematic
email address. Inbox rules are available only to the user (or someone with delegated
access to their account). See Update, disable, or remove Inbox Rules forwarding for how
the user, or their delegate, can change or remove a broken forwarding Inbox rule.
2. In the Active users > Filters search field, type part of the recipient's name and then
press Enter to locate the recipient. Click the user's record to view its details.
3. From the user's profile page, select Mail Settings > Email forwarding > Edit.
4. Turn off Email forwarding and select Save.
Unlike Inbox rules that are associated with a user's mailbox, mail flow rules (also known
as transport rules) are organization-wide settings and can only be created and edited by
email admins.
1. In the Microsoft 365 Admin center, select Admin centers > Exchange.
2. In the Exchange admin center (EAC), that is, New EAC or Classic EAC, go to Mail
flow > Rules.
3. Look for any redirect rules that might be forwarding the sender's message to
another address.
4. In the Exchange admin center (EAC), that is, New EAC or Classic EAC, go to Mail
flow > Rules.
5. Look for any redirect rules that might be forwarding the sender's message to
another address.
If you have a hybrid configuration with a Microsoft 365 or Office 365 connector
configured to route messages to your on-premises environment, and you believe that
Internal Relay is the correct setting for your domain, change the Accepted Domain from
Authoritative to Internal Relay.
1. Open the New Exchange admin center (EAC). For more information, see Exchange
admin center in Exchange Online.
2. Choose Mail flow > Accepted domains. The Accepted domains screen appears.
5. Click Save.
Classic EAC:
1. Open the Classic EAC. For more information, see Exchange admin center in
Exchange Online.
2. From the EAC, choose Mail flow > Accepted domains and select the recipient's
domain.
3. Double-click the domain name.
4. In the Accepted Domain dialog box, set the domain to Internal Relay, and then
select Save.
If you have a hybrid configuration and the recipient is located in the on-premises
Exchange organization, it's possible that the recipient's email address isn't properly
synchronized with Microsoft 365 or Office 365. Follow these steps to synchronize
directories manually:
1. Log into the on-premises server that's running Azure AD Connect sync.
2. Open Windows PowerShell on the server and run the following commands:
PowerShell
When synchronization completes, repeat the steps in the Verify that the recipient exists
and has an active license assigned section to verify that the recipient address exists in
Exchange Online.
1. In the Microsoft 365 Admin center, go to Settings > Domains, and then select the
recipient's domain.
4. Verify that there's only one MX record configured for the recipient's domain.
Microsoft doesn't support using more than one MX record for a domain that's
enrolled in Exchange Online.
5. If Microsoft 365 or Office 365 detects any issues with your Exchange Online DNS
record settings, follow the recommended steps to fix them. You might be
prompted to make the changes directly within the Microsoft 365 admin center.
Otherwise, you must update the MX record from your DNS host provider's portal.
For more information, see Create DNS records at any DNS hosting provider.
7 Note
Backscatter in EOP
Feedback
Was this page helpful? ツ Yes ト No
It's frustrating when you get an error after sending an email message. This topic
describes what you can do if you see error code 5.4.1 in a non-delivery report (also
known as an NDR, bounce message, delivery status notification, or DSN).
I got this bounce message. How do I fix I'm an email admin. How can I fix
it? this?
If the steps in this section don't fix the problem for you, contact your email admin and
refer them to the information in this topic so they can try to resolve the issue for you.
Just wait: It might seem strange, but this error might go away on its own after a
few days. If your email admin made changes to your organization's domain name
system (DNS) records, the change can prevent you from sending and receiving
email for a brief period, even if they did everything correctly (it can take up to 72
hours for DNS changes to propagate on the internet). If you'd like more details
about DNS records, see DNS basics .
Service outage: A problem with the whole Microsoft 365 or Office 365 service
could be causing the problem. Even your email admins can't do anything about
service outages except wait for the problem to be resolved.
Incorrect MX record
If external senders receive this NDR when they send email to recipients in your domain,
try the following fixes:
Fix your MX record: For example, it might be pointing to an invalid mail server.
Check with your domain registrar or DNS hosting service to verify the MX record
for your domain is correct. The MX record for a domain that's enrolled in Exchange
Online uses the syntax <domain>.mail.protection.outlook.com.
Verify only one MX record is configured for your domain: We don't support using
more than one MX record for domains enrolled in Exchange Online.
Test your MX record: Use the Outbound SMTP EMail test in the Microsoft Remote
Connectivity Analyzer .
2. Click Domains and verify your domain appears in the list as Active.
3. Select the domain and click Troubleshoot. Follow the troubleshooting wizard
steps.
If you control of the DNS records for your Microsoft 365 or Office 365 domain, you can
also check the status of the domain in the Exchange admin center (EAC) by following
these steps:
3. Verify that your domain is listed, and verify the Domain Type value for the domain.
Typically, the value should be Authoritative. However, if you have properly
configured a shared domain, the value might be Internal Relay.
Verify the configuration of the Send connectors and Receive connectors in your
on-premises Exchange organization that are used for hybrid. These connectors are
configured automatically by the Hybrid Configuration Wizard, and the wizard
might need to be run again by your Exchange administrator.
For more information about transport routing in hybrid deployments, see Transport
Routing in Exchange Hybrid Deployments.
3. Select View all to a get more details about all known issues.
The outbound connection attempt was not answered because either the remote
system was busy or it was unable to take delivery of the message.
See also
Email non-delivery reports in Exchange Online
Feedback
Was this page helpful? ツ Yes ト No
It's frustrating when you get an error after sending an email message. This topic
describes what you can do if you see error code 5.6.11 in a non-delivery report (also
known as an NDR, bounce message, delivery status notification, or DSN).
I got this bounce message. How do I fix I'm an email admin. How can I fix
it? this?
A bare line feed is a line feed (LF) character that's not immediately preceded by a
carriage return (CR) character. In other words, instead of a line of text ending with CR LF,
it ends with only LF.
Typically, each line in an email message ends with a carriage return followed by a line
feed (CR LF).
If a message contains bare line feeds, the SMTP Chunking feature is required to transmit
the message between email servers. Chunking uses the SMTP BDAT command as
defined in RFC 3030 . If the destination email server doesn't support BDAT, then it can't
accept messages that contain bare line feeds.
Microsoft 365 and Office 365 used to remove bare line feeds from messages to enable
delivery to older email servers that didn't support SMTP Chunking and the BDAT
command. In an effort to better support security standards (for example, DomainKeys
Identified Mail or DKIM), Office 365 no longer removes bare line feeds from messages.
2. If the original message contained an attachment, try sending the message without
the attachment.
If these steps don't fix the problem for you, contact your email admin and refer them to
the information in this topic so they can try to resolve the issue for you.
See also
Email non-delivery reports in Exchange Online
RFC 3030 SMTP Service Extensions for Transmission of Large and Binary Mime Messages
(BDAT Support)
Feedback
Was this page helpful? ツ Yes ト No
) Important
Mail flow rules are now available in the new Exchange admin center. Try it now !
It's frustrating when you get an error after sending an email message. This topic
describes what you can do if you see error code 5.7.1 in a non-delivery report (also
known as an NDR, bounce message, delivery status notification, or DSN). This
information also applies to error codes 5.7.0 through 5.7.999.
I got this bounce message. How do I fix I'm an email admin. How can I fix
this issue? this issue?
This information also applies to error codes 5.7.0 through 5.7.999 in Exchange Online
and Microsoft 365 or Office 365. There can be several causes for dsn error code 5.7.1, for
which solutions are provided later in this topic.
If the recipient is an internal group: You might not have permission to send to the
group or to one of its subgroups. In this case, the NDR will include the names of
the restricted groups that you don't have permission to send to. Ask the owner of
the restricted group to grant you permission to send messages to the group. If you
don't know the group's owner, you can find it in Outlook or Outlook on the web
(formerly known as Outlook Web App) by doing the following steps:
Outlook: Select the NDR, double-click the group name on the To line, and then
choose Contact.
Outlook on the web: Select the NDR, choose the group name on the To line,
and then choose Owner.
If you're sending to a large distribution group: Groups with more than 5,000
members have the following restrictions automatically applied to them:
Messages sent to the group require approval by a moderator.
Large messages can't be sent to the group. However, senders of large messages
will receive a different NDR. For more information about large messages, see
Distribution group limits.
To resolve the issue, join the group, or ask the group's owner or moderator to
approve your message. Refer them to the I'm the owner of a restricted group.
What can I do? section later in this topic.
If none of the previous steps apply or solve your issue, contact the recipient's email
administrator, and refer them to the I'm an email admin. How can I fix this issue? section
later in this topic.
Remove the sender restriction: Change your group settings to unblock the sender
in one of the following ways:
Add the sender to the group's allowed senders list. Note that you must create a
mail contact or a mail user to represent the external sender in your
organization.
If the sender is restricted because they're external (outside your organization),
configure the group to accept messages from external senders.
If you've configured a mail flow rule (also known as a transport rule) to restrict
certain senders or groups of senders, you can modify the rule to accept
messages from the sender.
Restrictions on large groups: Groups with more than 5,000 members have the
following restrictions automatically applied:
Messages sent to the group require approval by a moderator.
Large messages can't be sent to the group (but you'll receive a different NDR
from this one if that's the issue). See Exchange Online Limits.
To resolve the issue for the sender, approve their message, or add them to the
group.
To configure the public folder to accept messages from external senders, follow these
steps:
New EAC
1. Open the Exchange admin center (EAC). For more information, see Exchange
admin center in Exchange Online.
3. Choose a public folder from the list, and then click Edit .
5. Under Message Delivery Restrictions > Accept messages from, perform the
following tasks:
Clear the check box for Require that all senders are authenticated.
Select All senders.
6. Click Save.
Classic EAC
1. Open the Exchange admin center (EAC). For more information, see exchange
admin center in exchange online.
2. In the EAC, go to Public folders > Public folders > select the public folder from
the list, and then click Edit .
3. In the public folder properties dialog box that opens, go to Mail flow settings, and
configure the following settings in the Accept messages from section:
Clear the check box for Require that all senders are authenticated.
Select All senders.
4. Click Save.
The sender is external and their source IP address is on
Microsoft's blocklist
In this case, the NDR the sender receives would include information in the Diagnostics
for administrators section similar to the following information:
To remove the restriction on the sender's source email system, forward the NDR
message to delist@microsoft.com. Also see Use the delist portal to remove yourself
from the blocked senders list.
Verify your domain appears as Healthy in the Microsoft 365 admin center at
Settings > Domains.
For information about adding your domain to Microsoft 365 or Office 365, see Add
a domain to Microsoft 365.
To troubleshoot domain verification issues, see Troubleshoot domain verification
issues in Office 365 .
1. Check the sender and recipient domains for incorrect or stale MX records by using
the Advanced diagnostics > Exchange Online test in the Microsoft Support and
Recovery Assistant. For more information about the Support and Recovery
Assistant, see About the Microsoft Support and Recovery Assistant .
2. Check with your domain registrar or DNS hosting service to verify the MX record
for your domain is correct. The MX record for a domain that's enrolled in Exchange
Online uses the syntax _\<domain\ >_.mail.protection.outlook.com .
3. Verify Inbound SMTP Email and Outbound SMTP Email at Office 365 > Mail Flow
Configuration in the Microsoft Remote Connectivity Analyzer .
4. Verify you have only one MX record configured for your domain. Microsoft doesn't
support using more than one MX record for a domain that's enrolled in Exchange
Online.
2. In the Exchange admin center, click Mail Flow > Connectors. Select the
connector that's used for hybrid, and choose Edit. Verify the following
information:
You can test your MX record and your ability to send mail from your
Exchange Online organization by using the Outbound SMTP Email test in
the Microsoft Remote Connectivity Analyzer .
Your message couldn't be delivered to the recipient because you don't have
permission to send to it. Ask the recipient's email admin to add you to the
accept list for the recipient. For more information, see DSN 5.7.129 Errors in
Exchange Online and Microsoft 365 or Office 365.
To cease all communication with the Exchange Online mailbox, you need to delete
the on-premises user account instead of disabling it.
Another solution would be to remove the license, but then you would need to
create a mail flow rule (also known as a transport rule) to prevent the user from
receiving email messages. Otherwise, the user would continue to receive messages
for about 30 days after removal of the license.
Consider this scenario as part of the workflow for disabling a user on Exchange
Online.
See also
Email non-delivery reports in Exchange Online
Feedback
Was this page helpful? ツ Yes ト No
It's frustrating when you get an error after sending an email message. This topic
describes what you can do if you see the error:
The message can't be submitted because the sender's submission quota was
exceeded.
I got this bounce message. How do I fix I'm an email admin. How can I fix
it? this?
If you didn't send the messages and you suspect your account has been compromised,
reset your password and scan your devices for malware. However, the attacker might
have configured other settings on your mailbox (for example, Inbox rules to forward
messages or additional mailbox delegates). So, follow the steps in How to determine
whether your Office 365 account has been compromised.
Feedback
Was this page helpful? ツ Yes ト No
) Important
Effective from December 2022, the classic Exchange Admin Center will be
deprecated for worldwide customers. Microsoft recommends using the new
Exchange Admin Center (EAC) , if not already doing so.
While most of the features have been migrated to the new EAC, some have been
migrated to other admin centers and remaining ones will soon be migrated to the
new EAC. Find features that're not yet there in new EAC at Other Features or use
Global Search that will help you navigate across the new EAC.
Your organization can migrate email to Microsoft 365 or Office 365 from other systems.
Your administrators can migrate mailboxes from Exchange Server or migrate email from
another IMAP-enabled email system. And your users can import their own email,
contacts, and other mailbox information to a Microsoft 365 or Office 365 mailbox
created for them. Your organization can also work with a partner to migrate email.
Before you start an email migration, review limits and best practices for Exchange Online
to ensure you get the performance and behavior you expect after migration.
For information on choosing the best option for your organization, see Decide on a
migration path or Exchange migration advisors .
Tip
Another option available to assist you with your email migration is FastTrack Center
Benefit Overview. FastTrack specialists can help you plan and perform your
migration. For more information, see Data Migration.
There are three types of email migrations that can be made from an Exchange Server:
Use this type of migration if you're running Exchange 2003, Exchange 2007,
Exchange 2010, or Exchange 2013, and if there are fewer than 2000 mailboxes. You
can perform a cutover migration by starting from the EAC; for more information,
see Perform a cutover migration to Microsoft 365 or Office 365. For information on
how to use the Express migration, see Use express migration to migrate Exchange
mailboxes to Microsoft 365 or Office 365.
) Important
With cutover migration, you can move up to 2000 mailboxes, but due to
length of time it takes to create and migrate 2000 users, it's more reasonable
to migrate 150 users or less.
Use this type of migration if you're running Exchange 2003 or Exchange 2007, and
if there are more than 2000 mailboxes. For an overview of staged migration, see
What you need to know about a staged email migration to Microsoft 365 or Office
365. To perform the migration tasks, see Perform a staged migration of Exchange
Server 2003 and Exchange 2007 to Microsoft 365 or Office 365.
Migrate using an integrated Exchange Server and Microsoft 365 or Office 365
environment (hybrid)
Use this type of migration to maintain both on-premises and online mailboxes for
your organization and to gradually migrate users and email to Microsoft 365 or
Office 365. Use this type of migration if:
You have Exchange 2010 and more than 150-2,000 mailboxes.
You have Exchange 2010 and want to migrate mailboxes in small batches over
time.
For more information, see Use the Microsoft 365 and Office 365 mail migration
advisor.
You can use the Import Service either to upload the PST files through a network, or to
mail the PST files in a drive that you prepare.
For more information, see Overview of importing your organization's PST files.
IMAP migration also doesn't create mailboxes in Microsoft 365 or Office 365. You'll have
to create a mailbox for each user before you migrate their email.
To migrate email from another mail system, see Migrate your IMAP mailboxes to
Microsoft 365 or Office 365. After the email migration is done, any new mail sent to the
source email isn't migrated.
For information on how to find a partner, see the Microsoft solution providers page.
Hybrid Exchange > On- Exchange > Online > Mail User with ExchangeGuid
onboarding premises > Hybrid Hybrid Org A
Org A
Exchange Source Target Recipient in Target
Migration
Type
Hybrid Exchange > Online > Exchange > On- Mail User / Remote Mailbox
offboarding Hybrid Org A premises > Hybrid with ExchangeGuid
Org B
Cross-tenant Exchange > Online > Exchange > Online > Mail User with ExchangeGuid +
Migration Tenant A Tenant B matching attributes
Cutover Exchange > On- Exchange > Online No recipient (migration service
migration premises creates the mailbox in EXO)
Gmail Google Workspace Exchange > Online Mail User (migration service
migration converts to mailbox in EXO)
Related Topics
Use PowerShell for email migration to Microsoft 365 or Office 365
Decide on a migration path in Exchange
Online
Article • 02/22/2023
Deciding on the best migration path of your users' email to Microsoft 365 or Office 365
can be difficult. This article gives guidance based on your current email system and
other factors, such as how quickly you want to migrate to Microsoft 365 or Office 365.
Your migration performance will vary based on your network, mailbox size, migration
speed, and so on.
) Important
This topic is intended for global administrators. If you want to migrate email for a
single account, see Migrate email and contacts to Microsoft 365 or Office 365
instead.
You, as global administrator, can migrate mailboxes from an Exchange Server or from
another email system. The content in the following sections is organized by email
system, and the linked topics help you decide on the best method based on number of
mailboxes and your time and mailbox size constraints.
) Important
Staged and Exchange Hybrid migrations require that you also set up directory
synchronization. For more information, see Microsoft 365 or Office 365 integration
with on-premises environments.
For migration recommendations, expand one of the following sections based on your
source system:
7 Note
If the mailboxes you're migrating contain a large amount of data, you can also use the
Import service to import PST files to Microsoft 365 or Office 365. You can use the
Microsoft 365 or Office 365 Import Service to either ship the files or to import them
across the network.
If you have an extremely large number of mailboxes (5,000+), you might want to hire a
partner to help you migrate your email data.
You can search for partners on the Microsoft solution providers page.
7 Note
If the mailboxes you're migrating contain a large amount of data, you can also use the
Import service to import PST files to Microsoft 365 or Office 365. You can use the Import
Service to either ship the files or to import them across the network.
If you have an extremely large number of mailboxes (5,000+), you might want to hire a
partner to help you migrate your email data.
You can search for partners on the Microsoft solution providers page.
This topic includes the instructions for the migration CSV files for Exchange,
Mirapoint, Dovecoat, and Courier IMAP.
If the mailboxes you're migrating contain a large amount of data, you can also use the
Import service to import PST files to Microsoft 365 or Office 365. You can use the Import
Service to either ship the files or to import them across the network.
You can also hire a partner to help you migrate your email data. You can search for
partners on the Microsoft solution providers page.
Leave us a comment
Were these instructions helpful? If so, please let us know at the bottom of this topic. If
they weren't, and you're still having trouble deciding on a migration strategy, tell us
what source email system you want to migrate from and we'll use your feedback to
improve our content.
Use Minimal Hybrid to quickly migrate
Exchange mailboxes to Microsoft 365 or
Office 365
Article • 02/22/2023
You can use the minimal hybrid, also known as express migration, option in the
Exchange Hybrid Configuration Wizard to migrate the contents of user mailboxes to
Microsoft 365 or Office 365 over a course of couple of weeks or less.
Pre-requisites
Use minimal hybrid to migrate emails if you:
Are running at least one Exchange 2010, Exchange 2013, and/or Exchange 2016
server on-premises.
1. Sign in to Microsoft 365 or Office 365 with your work or school account.
3. On the Domains- page, click Add domain to start the domain wizard.
4. On the Add a domain page, type in the domain name (for example, Contoso.com)
you use for your on-premises Exchange organization, and then choose Next.
5. On the Verify domain page, select either Sign in to GoDaddy (if your DNS records
are managed by GoDaddy) or Add a TXT record instead for any other registrars >
Next.
6. Follow the instructions provided for your DNS hosting provider. The TXT record
usually is chosen to verify ownership.
You can also find the instructions in Create DNS records at any DNS hosting
provider for Office 365.
After you add your TXT or MX record, wait about 15 minutes before proceeding to
the next step.
7. In the domain wizard, choose done, verify now, and you'll see a verification page.
Choose Finish.
Do not continue to the next step in the domains wizard. You now have verified
that you own the on-premises Exchange organization domain and are ready to
continue with an email migration.
You will finish setting up your domain after the migrations are complete.
4. On the Email sources page, choose Download the Hybrid Configuration Wizard.
5. On the Download and run the Office 365 Hybrid Configuration Wizard page,
choose Download application
6. On the first Hybrid Configuration Wizard page, choose next and on the On-
premises Exchange Server Organization page, accept the default values and
choose next.
By default the wizard connects to the Exchange server running the latest version.
7. On the Credentials page, choose Use current Windows credentials for on-
premises Exchange server, and enter admin credentials for it and your Microsoft
365 or Office 365 organization choose next, and then choose next again once the
connections and credentials have validated.
8. On the Hybrid Features page, select Minimal Hybrid Configuration > next.
9. On the Ready for Update page, choose update to prepare the on-premises
mailboxes for migration.
At this point you are prompted to download and install the Azure AD Connect
wizard to synchronize your users from on-premises to Microsoft 365 or Office 365.
2. Once Azure AD Connect has downloaded, run it and choose the default options
for Express settings.
After synchronization is completed, you will be taken to the Data migration page
where you can see all of your users that were synchronized to Microsoft 365 or
Office 365.
The status on the Data migration page indicates that a license is needed as shown in
the figure.
In the Admin center, go to Users > Active users and follow these instructions to Add
users individually or in bulk.
Step 5: Start migrating user mailbox data
After you assign licences to your users you can go to the Data migration page to start
migrating their mailboxes.
1. Go to Setup > Data migration, and on the Migration page choose Exchange for
your data service.
2. On the Data migration page, select the users whose mailboxes you want to
migrate and then choose Start migration.
It is recommended that you migrate mailboxes for two or three users as a test
before migrating all of your users to make sure everything works as expected.
The Data migration page will display the migration status as it progresses. For a
full list, see Migration users status report, which you can also view in the Exchange
admin center.
See also
Microsoft 365 and Office 365 migration performance and best practices
As part of a Microsoft 365 or Office 365 deployment, you can migrate the contents of
user mailboxes from a source email system to Microsoft 365 or Office 365. When you do
this all at one time, it's called a cutover migration. Additionally, this migration method
moves mail users, mail contacts, and mail-enabled groups with their membership.
Choosing a cutover migration is suggested when:
7 Note
If a cutover migration won't work for you, see Ways to migrate email to Microsoft 365 or
Office 365 for other options.
Things to consider
Setting up an email cutover migration to Microsoft 365 or Office 365 requires careful
planning. Before you begin, here are a few things to consider:
You can move your entire email organization to Microsoft 365 or Office 365 over a
few days and manage user accounts in Microsoft 365 or Office 365.
The primary domain name used for your on-premises Exchange organization must
be an accepted as a domain owned by you in your Microsoft 365 or Office 365
organization.
After the migration is complete, each user who has an on-premises Exchange
mailbox also will be a new user in Microsoft 365 or Office 365. But you'll still have
to assign licenses to users whose mailboxes are migrated.
Impact to users
After your on-premises and Microsoft 365 or Office 365 organizations are set up for a
cutover migration, post-setup tasks could impact your users.
Potential delay in email routing: Email sent to on-premises users whose mailboxes
were migrated to Microsoft 365 or Office 365 are routed to their on-premises
Exchange mailboxes until the MX record is changed.
2. The administrator prepares the servers for a cutover migration and creates empty
mail-enabled security groups in Microsoft 365 or Office 365.
3. The administrator connects Microsoft 365 or Office 365 to the on-premises email
system (this is called creating a migration endpoint).
4. The administrator migrates the mailboxes and then verifies the migration.
7. The administrator verifies that routing has changed, and then deletes the cutover
migration batch.
9. The administrator sends a welcome letter to users to tell them about Microsoft 365
or Office 365 and to describe how to sign in to their new mailboxes.
Ready to start?
If you're comfortable setting up a migration to Microsoft 365 or Office 365, here are the
tasks that need to be done:
See also
Ways to migrate email to Microsoft 365 or Office 365
As part of a Microsoft 365 or Office 365 deployment, you can migrate the contents of
user mailboxes from a source email system to Microsoft 365 or Office 365. When you do
this all at one time, it's called a cutover migration. Choosing a cutover migration is
suggested when:
7 Note
You can move your entire email organization to Microsoft 365 or Office 365 over a
few days and manage user accounts in Microsoft 365 or Office 365.
The primary domain name used for your on-premises Exchange organization must
be an accepted as a domain owned by you in your Microsoft 365 or Office 365
organization.
After the migration is complete, each user who has an on-premises Exchange
mailbox also will be a new user in Microsoft 365 or Office 365, but you must still
assign licenses to users whose mailboxes are migrated.
7 Note
When migrating from Exchange 2003, TCP port 6001, 6002 and 6004 need to
be open on the Exchange 2003 side.
Impact to users
After your on-premises and Microsoft 365 or Office 365 organizations are set up for a
cutover migration, post-setup tasks could impact your users.
Potential delay in email routing: Email sent to on-premises users whose mailboxes
were migrated to Microsoft 365 or Office 365 are routed to their on-premises
Exchange mailboxes until the MX record is changed.
2. The administrator prepares the servers for a cutover migration and creates empty
mail-enabled security groups in Microsoft 365 or Office 365.
3. The administrator connects Microsoft 365 or Office 365 to the on-premises email
system (this is called creating a migration endpoint).
4. The administrator migrates the mailboxes and then verifies the migration.
7. The administrator verifies that routing has changed, and then deletes the cutover
migration batch.
9. The administrator sends a welcome letter to users to tell them about Microsoft 365
or Office 365 and to describe how to sign in to their new mailboxes. (See Overview
of Outlook e-mail profile for information on creating new Outlook profiles).
7 Note
If you have turned on directory synchronization, you need to turn it off before you
can perform a cutover migration. You can do this by using PowerShell. For
instructions, see Turn off directory synchronization.
2. You must use a certificate issued by a trusted certification authority (CA) with your
Outlook Anywhere configuration in order for Microsoft 365 or Office 365 to run a
cutover migration. If you are doing a cutover migration, you will need to add the
Outlook Anywhere and Autodiscover services to your certificate. For instructions
on how to set up certificates, see:
3. Optional: Verify that you can connect to your Exchange organization using
Outlook Anywhere: Try one of the following methods to test your connection
settings.
Use Outlook from outside your corporate network to connect to your on-
premises Exchange mailbox.
4. Set permissions: The on-premises user account that you use to connect to your
on-premises Exchange organization (also called the migration administrator) must
have the necessary permissions to access the on-premises mailboxes that you want
to migrate to Microsoft 365 or Office 365. This user account is used when you
connect Microsoft 365 or Office 365 to your email system later in this procedure.
To migrate the mailboxes, the admin must have one of the following permissions:
or
For instructions about how to set these permissions, see Assign Exchange
permissions to migrate mailboxes to Microsoft 365 or Office 365.
5. Verify that the mailboxes to be migrated are not hidden from the address lists.
7. Create security groups and clean up delegates: Because the email migration
service can't detect whether on-premises Active Directory groups are security
groups, it can't provision any migrated groups as security groups in Microsoft 365
or Office 365. If you want to have security groups in Microsoft 365 or Office 365,
you must first provision an empty mail-enabled security group in Microsoft 365 or
Office 365 before starting the cutover migration.
Additionally, this migration method only moves mailboxes, mail users, mail
contacts, and mail-enabled groups with their membership. If any other Active
Directory object, such as user mailbox that is not migrated to Microsoft 365 or
Office 365 is assigned as a manager or delegate to an object being migrated, you
must remove them from the object before migration.
1. Sign in to Microsoft 365 or Office 365 with your work or school account.
3. On the Domains- page, click Add domain to start the domain wizard.
4. On the Add a domain page, type in the domain name (for example, Contoso.com)
you use for your on-premises Exchange organization, and then choose Next.
5. On the Verify domain page, select either Sign in to GoDaddy (if your DNS records
are managed by GoDaddy) or Add a TXT record instead for any other registrars >
Next.
6. Follow the instructions provided for your DNS hosting provider. The TXT record
usually is chosen to verify ownership.
You can also find the instructions in Add DNS records to connect your domain.
After you add your TXT or MX record, wait about 15 minutes before proceeding to
the next step.
7. In the Office 365 domain wizard, choose done, verify now, and you'll see a
verification page. Choose Finish.
5. On the Select the migration endpoint type page, choose Outlook Anywhere >
Next.
Email address: Type the email address of any user in the on-premises
Exchange organization that will be migrated. Microsoft 365 or Office 365 will
test the connectivity to this user's mailbox. Make sure that this mailbox is not
hidden from the address lists.
If Microsoft 365 or Office 365 successfully connects to the source server, the
connection settings are displayed. Choose Next.
If the test connection to the source server isn't successful, provide the
following information:
Exchange server: Type the fully qualified domain name (FQDN) for the on-
premises Exchange Server. This is the host name for your Mailbox server. For
example, EXCH-SRV-01.corp.contoso.com.
RPC proxy server: Type the FQDN for the RPC proxy server for Outlook
Anywhere. Typically, the proxy server is the same as your Outlook on the web
(formerly known as Outlook Web App) URL. For example, mail.contoso.com,
which is also the URL for the proxy server that Outlook uses to connect to an
Exchange Server
8. On the Enter general information page, type a Migration endpoint name, for
example, Test5-endpoint. Leave the other two boxes blank to use the default
values.
9. Choose New to create the migration endpoint.
To validate your Exchange Online is connected to the on-premises server, you can
run the command in Example 4 of Test-MigrationServerAvailability.
3. On the Select a migration type page, choose Cutover migration > next.
4. On the Confirm the migration endpoint page, the migration endpoint information
is listed. Verify the information and then choose next.
5. On the Move configuration page, type the name (cannot contain spaces or special
characters) of the migration batch, and then choose next. The batch name is
displayed in the list of migration batches on the Migration page after you create
the migration batch.
Automatically start the batch: The migration batch is started as soon as you
save the new migration batch with a status of Syncing.
Manually start the batch later: The migration batch is created but is not
started. The status of the batch is set to Created. To start a migration batch,
select it on the migration dashboard, and then choose Start.
2. On the migration dashboard, select the batch and then choose Start.
You can also verify that the users get created in the Microsoft 365 admin center as the
migration proceeds.
When people outside of your organization send you email, their email systems don't
double-check where to send that email every time. Instead, their systems save the
location of your email system based on a setting in your DNS server known as a time-
to-live (TTL). If you change the location of your email system before the TTL expires, the
sender's email system tries to send email to the old location before figuring out that the
location changed. This location change can result in a mail delivery delay. One way to
avoid this is to lower the TTL that your DNS server gives to servers outside of your
organization. This will make the other organizations refresh the location of your email
system more often.
Most email systems ask for an update each hour if a short interval such as 3,600 seconds
(one hour) is set. We recommend that you set the interval at least this low before you
start the email migration. This setting allows all the systems that send you email enough
time to process the change. Then, when you make the final switch over to Microsoft 365
or Office 365, you can change the TTL back to a longer interval.
The place to change the TTL setting is on your email system's MX record. This lives on
your public-facing DNS system. If you have more than one MX record, you need to
change the value on each record to 3,600 seconds or less.
If you need some help configuring your DNS settings, see Add DNS records to connect
your domain.
For many DNS providers, there are specific instructions to change your MX record. If
your DNS provider isn't included, or if you want to get a sense of the general directions,
general MX record instructions are provided as well.
It can take up to 72 hours for the email systems of your customers and partners to
recognize the changed MX record. Wait at least 72 hours before you proceed to the next
task: Delete the cutover migration batch.
All users are using Microsoft 365 or Office 365 mailboxes. After the batch is
deleted, mail sent to mailboxes on the on-premises Exchange Server isn't copied to
the corresponding Microsoft 365 or Office 365 mailboxes.
Microsoft 365 or Office 365 mailboxes were synchronized at least once after mail
began being sent directly to them. To do this, make sure that the value in the Last
Synced Time box for the migration batch is more recent than when mail started
being routed directly to Microsoft 365 or Office 365 mailboxes.
When you delete a cutover migration batch, the migration service cleans up any records
related to the migration batch and then deletes the migration batch. The batch is
removed from the list of migration batches on the migration dashboard.
7 Note
4. Verify that the migration batch is no longer listed on the migration dashboard.
1. Create an Autodiscover DNS record so users can easily get to their mailboxes:
After all on-premises mailboxes are migrated to Microsoft 365 or Office 365, you
can configure an Autodiscover DNS record for your Microsoft 365 or Office 365
organization to enable users to easily connect to their new Microsoft 365 or Office
365 mailboxes with Outlook and mobile clients. This new Autodiscover DNS record
has to use the same namespace that you're using for your Microsoft 365 or Office
365 organization. For example, if your cloud-based namespace is
cloud.contoso.com, the Autodiscover DNS record you need to create is
autodiscover.cloud.contoso.com.
If you keep your Exchange Server, you should also make sure that Autodiscover
DNS CNAME record has to point to Microsoft 365 or Office 365 in both internal
and external DNS after the migration so that the Outlook client will to connect to
the correct mailbox. Replace <ServerName> with the name of the Client Access
server and run the following command in the Exchange Management Shell to
prevent client connections to the server. You'll need to run the command on every
Client Access server.
PowerShell
Set-ClientAccessServer -Identity <ServerName> -
AutoDiscoverServiceInternalUri $null
Microsoft 365 or Office 365 uses a CNAME record to implement the Autodiscover
service for Outlook and mobile clients. The Autodiscover CNAME record must
contain the following information:
Alias: autodiscover
Target: autodiscover.outlook.com
For more information, see Add DNS records to connect your domain.
2. Decommission on-premises Exchange Servers: After you've verified that all email
is being routed directly to the Microsoft 365 or Office 365 mailboxes, and no
longer need to maintain your on-premises email organization or don't plan on
implementing a single sign-on solution, you can uninstall Exchange from your
servers and remove your on-premises Exchange organization.
7 Note
See also
Ways to migrate email to Microsoft 365 or Office 365
As part of a Microsoft 365 or Office 365 deployment, you can migrate the contents of
user mailboxes from a source email system to Microsoft 365 or Office 365. When you do
this over time, it's called a staged migration. A staged migration is recommended when:
Your source email system is Microsoft Exchange Server 2003 or Microsoft Exchange
Server 2007.
7 Note
Microsoft Exchange Server 2003 and Microsoft Exchange Server 2007 are
out of support. Support for Exchange 2003 ended on April 8, 2014. Support
for Exchange 2007 ended on April 11, 2017.
If a staged email migration won't work for you, see Ways to migrate email for other
options.
Things to consider
Here are a few items to be aware of:
The primary domain name used for your on-premises Exchange organization must
be a domain verified to your Microsoft 365 or Office 365 organization.
You can migrate only user mailboxes and resource mailboxes. Other recipient
types, such as distribution groups, contacts, and mail-enabled users are migrated
to Microsoft 365 or Office 365 through the process of directory synchronization.
Out of Office messages aren't migrated with user mailboxes. If a user turns on the
Out of Office feature before the migration, the feature will remain enabled on the
migrated mailbox, but the Out of Office message is blank. People who send
messages to the mailbox won't receive an Out of Office notification. To allow Out
of Office notifications to be sent, the user needs to recreate the Out of Office
message after the mailbox is migrated.
If you limited the connections to your source email system, it's a good idea to
increase them to improve migration performance. Common connection limits
include client/server total connections, per-user connections, and IP address
connections on either the server or the firewall. If you didn't limit these
connections, you can skip this task.
Users must create new Outlook profiles: After the mailboxes are migrated and the
on-premises accounts are converted to mail-enabled accounts, the users must
create a new Microsoft 365 or Office 365 profile in Outlook, and then Outlook
automatically connects to Microsoft 365 or Office 365.
2. The administrator creates a comma-separated value (CSV) file that contains a row
for each user whose on-premises mailbox will be migrated in the migration batch.
3. The administrator creates and runs a staged migration batch by using the
migration dashboard in the Exchange admin center.
See how-to steps in Connect Office 365 to your email system, Migrate your
mailboxes, and Start the staged migration batch.
After the administrator starts the migration batch, Exchange Online does the
following:
Checks that a mail-enabled user exists in the Microsoft 365 or Office 365
organization for each user listed in the CSV file. Mail-enabled users are
created in Microsoft 365 or Office 365 as a result of the directory
synchronization process.
4. After it creates the Exchange Online mailbox and configures mail forwarding for
each user in the CSV file, Exchange Online sends a status email message to the
administrator. This status message lists the number of mailboxes that were
successfully migrated and how many couldn't be migrated. The message also
includes links to migration statistics and error reports that contain more detailed
information. At this point, users can start using their Exchange Online mailboxes.
6. After a migration batch is complete and the administrator verifies that all
mailboxes in the batch are successfully migrated, the administrator can convert the
on-premises mailboxes to mail-enabled users.
8. The administrator creates additional migration batches, submitting a CSV file for
each one.
10. The administrator resolves any issues. After all on-premises mailboxes in a batch
are successfully migrated, the administrator deletes the migration batch.
12. The administrator, to complete the transition to Exchange Online and Microsoft
365 or Office 365, performs post-configuration tasks such as:
See how-to steps in Route your email directly to Microsoft 365 or Office 365 and
Complete post migration tasks.
7 Note
To finish a staged email migration successfully, it's a good idea to be comfortable doing
these tasks:
You use step-by-step wizards in Microsoft 365 or Office 365 to configure and start
the migration process.
You add or change your organization's DNS records, such as the Autodiscover and
MX records.
If you're ready to begin a staged email migration, you can use the steps given in
Perform a staged migration email.
See also
Ways to migrate email to Microsoft 365 or Office 365
You can migrate the contents of user mailboxes from an Exchange 2003 or Exchange
2007 email to Microsoft 365 or Office 365 over time by using a staged migration.
This article walks you through the tasks involved with for a staged email migration. What
you need to know about a staged email migration gives you an overview of the
migration process. When you're comfortable with the contents of that article, use this
one to begin migrating mailboxes from one email system to another.
For Windows PowerShell steps, see Use PowerShell to perform a staged migration.
Migration Tasks
Here are the tasks to do when you're ready to get started with your staged migration.
) Important
You must use a certificate issued by a trusted certification authority (CA) with
your Outlook Anywhere configuration. Outlook Anywhere can't be configured
with a self-signed certificate. For more information, see How to configure SSL
for Outlook Anywhere.
2. (Optional) Verify that you can connect to your Exchange organization using
Outlook Anywhere: Try one of the following methods to test your connection
settings.
Use Outlook from outside your corporate network to connect to your on-
premises Exchange mailbox.
3. Set permissions: The on-premises user account that you use to connect to your
on-premises Exchange organization (also called the migration administrator) must
have the necessary permissions to access the on-premises mailboxes that you want
to migrate to Microsoft 365 or Office 365. This user account is used when you
Connect Microsoft 365 or Office 365 to your email system later in this procedure.
4. To migrate the mailboxes, the admin must have one of the following permission
sets:
Be assigned the FullAccess permission for each on-premises mailbox and be
assigned the WriteProperty permission to modify the TargetAddress
property on the on-premises user accounts.
or
For instructions about how to set these permissions, see Assign Exchange
permissions to migrate mailboxes to Microsoft 365 or Office 365.
Use the domains wizard to verify you own the on-premises domain:
1. Sign in to Microsoft 365 or Office 365 with your work or school account.
7 Note
You must be a global admin in Microsoft 365 or Office 365 to complete these
steps.
3. On the Manage domains page, click Add domain to start the domain wizard.
4. On the Add a domain to Microsoft 365 or Office 365 page, choose Specify a
domain name and confirm ownership.
5. Type the domain name (for example, Contoso.com) you use for your on-premises
Exchange organization, and then choose Next.
6. On the confirm that you own <your domain name> page, select your Domain
Name System (DNS) hosting provider from the list or select General Instructions, if
applicable.
7. Follow the instructions provided for your DNS hosting provider. The TXT record
usually is chosen to verify domain ownership.
You can also find the TXT or MX value specific to your Microsoft 365 or Office 365
organization by following instructions in Gather the information you need to
create Office 365 DNS records.
After you add your TXT or MX record, wait about 15 minutes before proceeding to
the next step.
8. In the Microsoft 365 or Office 365 domain wizard choose done, verify now, and
you should see a verification page. Choose Finish.
If you do not see the verification page, wait awhile, and try again.
Do not continue to the next step in the domain wizard. You now have verified that
you own the on-premises Exchange organization domain, and are ready to
continue with an email migration.
You will need to license the users after they're created. You have 30 days to add licenses
after the users are created. For steps to add licenses, see the Complete post migration
tasks section later in this topic.
You can use either the Microsoft Azure Active Directory Synchronization Tool or the
Microsoft Azure Active Directory Sync Services (AAD Sync) to synchronize and create
your on-premises users in Microsoft 365 or Office 365. After mailboxes are migrated to
Microsoft 365 or Office 365, you'll manage user accounts in your on-premises
organization and they're synchronized with your Microsoft 365 or Office 365
organization. For more information, see What is hybrid identity with Azure Active
Directory?.
Create a list of mailboxes to migrate
After you identify the users whose on-premises mailboxes you want to migrate to
Microsoft 365 or Office 365, you'll use a comma-separated value (CSV) file to create a
migration batch. Each row in the CSV file (used by Microsoft 365 or Office 365 to run the
migration) contains information about an on-premises mailbox.
7 Note
There isn't a limit for the number of mailboxes that you can migrate to Microsoft
365 or Office 365 using a staged migration. The CSV file for a migration batch can
contain a maximum of 2,000 rows. To migrate more than 2,000 mailboxes, create
additional CSV files and use each file to create a new migration batch.
Supported attributes
The CSV file for a staged migration supports the following three attributes. Each row in
the CSV file corresponds to a mailbox and must contain a value for each of these
attributes.
EmailAddress Specifies the primary SMTP email address, for example, Required
pilarp@contoso.com, for on-premises mailboxes.
Use the primary SMTP address for on-premises mailboxes
and not user IDs from the Microsoft 365 or Office 365. For
example, if the on-premises domain is named contoso.com
but the Microsoft 365 or Office 365 email domain is named
service.contoso.com, you would use the contoso.com
domain name for email addresses in the CSV file.
Password The password to be set for the new Microsoft 365 or Office Optional
365 mailbox. Any password restrictions that are applied to
your Microsoft 365 or Office 365 organization also apply to
the passwords included in the CSV file.
ForceChangePassword Specifies whether a user must change the password the Optional
first time they sign in to their new Microsoft 365 or Office
365 mailbox. Use True or False for the value of this
parameter. Note that if you've implemented a single sign-
on solution by deploying Active Directory Federation
Services (AD FS) 2.0 (AD FS 2.0) or greater in your on-
premises organization, you must use False for the value of
the ForceChangePassword attribute.
CSV file format
Here's an example of the format for the CSV file. In this example, three on-premises
mailboxes are migrated to Microsoft 365 or Office 365.
The first row, or header row, of the CSV file lists the names of the attributes, or fields,
specified in the rows that follow. Each attribute name is separated by a comma.
CSV
EmailAddress,Password,ForceChangePassword
pilarp@contoso.com,Pa$$w0rd,False
tobyn@contoso.com,Pa$$w0rd,False
briant@contoso.com,Pa$$w0rd,False
Each row under the header row represents one user and supplies the information that
will be used to migrate the user's mailbox. The attribute values in each row must be in
the same order as the attribute names in the header row.
Use any text editor, or an application like Excel, to create the CSV file. Save the file as a
.csv or .txt file.
7 Note
If the CSV file contains non-ASCII or special characters, save the CSV file with UTF-8
or other Unicode encoding. Depending on the application, saving the CSV file with
UTF-8 or other Unicode encoding may be easier when the system locale of the
computer matches the language used in the CSV file.
1. Go to the Classic Exchange admin center, and navigate to Migration > Batch.
5. On the Select the migration endpoint type page, choose Outlook Anywhere >
Next.
Email address: Type the email address of any user in the on-premises
Exchange organization that will be migrated. Microsoft 365 or Office 365 will
test the connectivity to this user's mailbox.
Password of account with privileges: Type the password for the account with
privileges that is the administrator account.
If Microsoft 365 or Office 365 successfully connects to the source server, the
connection settings are displayed. Choose Next.
If the test connection to the source server isn't successful, provide the
following information:
Exchange server: Type the fully qualified domain name (FQDN) for the on-
premises Exchange Server. This is the host name for your Mailbox server; for
example, EXCH-SRV-01.corp.contoso.com.
RPC proxy server: Type the FQDN for the RPC proxy server for Outlook
Anywhere. Typically, the proxy server is the same as your Outlook on the web
(formerly known as Outlook Web App) URL. For example, mail.contoso.com,
which is also the URL for the proxy server that Outlook uses to connect to an
Exchange Server
8. On the Enter general information page, type a Migration endpoint name, for
example, Test5-endpoint. Leave the other two boxes blank to use the default
values.
9. Choose New to create the migration endpoint.
To validate your Exchange Online is connected to the on-premises server, you can
run the command in Example 4 of Test-MigrationServerAvailability.
7 Note
For new EAC, the Migration endpoints can be created during the creation of a new
migration batch. For more information, continue to the section, Create a staged
migration batch in new Exchange admin center (New EAC).
2. Click New Migration batch and follow the instructions in the details pane.
3. In Migration Onboarding section, enter the batch name, select the mailbox
migration path and click Next.
4. Select the migration type as Staged migration from the drop-down list and click
Next.
6. In Set endpoint section, you can either create a new migration endpoint or select
the migration endpoint from the drop-down list:
a. Select Create a new migration endpoint and follow the instructions to create
the endpoints.
b. Select the migration endpoint from the drop-down list and click Next.
7. Select and upload a CSV file containing the set of all of the users you want to
migrate. You will need its filename below. The allowed headers are:
CSV
EmailAddress
will@fabrikaminc.net
user123@fabrikaminc.net
8. In Add user mailboxes section, import the CSV file and click Next.
10. In Schedule batch migration section, verify all the details, click Save, and then click
Done.
The batch status changes from Syncing to Synced, you can complete the batch.
12. In the details pane, select the preferred option to complete the batch and click
Save.
3. On the Select a migration type page, choose Staged migration > next.
4. On the Select the users page, choose Browse and select the CSV file to use for this
migration batch.
After you select a CSV file, Microsoft 365 or Office 365 checks the CSV file to make
sure that:
It isn't empty.
All rows have the same number of columns as the header row.
If any one of these checks fails, you'll get an error that describes the reason for the
failure. At this point, you must fix any errors in the CSV file and resubmit it to
create a migration batch. After the CSV file is validated, the number of users listed
in the CSV file is displayed as the number of mailboxes to migrate.
5. Choose next.
6. On the Confirm the migration endpoint page, verify the migration endpoint
information that is listed and then choose next.
7. On the Move configuration page, type the name (no spaces or special characters)
of the migration batch, and then choose next. This name is displayed in the list of
migration batches on the Migration page after you create the migration batch.
Automatically start the batch: The migration batch is started as soon as you
save the new migration batch. The batch starts with a status of Syncing.
Manually start the batch later: The migration batch is created but not
started. The status of the batch is set to Created. To start a migration batch,
select it on the migration dashboard and then choose Start.
1. In the new Exchange admin center, go to Migration > Batch. On the migration
dashboard, select the batch, and then click Start Migration.
You'll be able to follow the sync status in the migration dashboard. If there is an issue,
you can view a log file that gives you more information about the errors.
You can also verify that the users get created in the Microsoft 365 admin center as the
migration proceeds.
Because you are not done with your migrations, you are not yet ready to direct all users
to Microsoft 365 or Office 365 for their email. So what do you do for those people who
have both? What you can do is change the on-premises mailboxes that you've already
migrated to mail-enabled users. When you change from a mailbox to a mail-enabled
user, you can direct the user to Microsoft 365 or Office 365 for their email instead of
going to their on-premises mailbox.
For more information and to download scripts that you can run to convert mailboxes to
mail-enabled users, see the following:
When you're done migrating everyone to Microsoft 365 or Office 365, you'll be ready to
start sending email directly to Microsoft 365 or Office 365 and decommissioning your
old email system.
When people outside of your organization send you email, their email systems don't
double-check where to send that email every time. Instead, their systems save the
location of your email system based on a setting in your DNS server known as a time-
to-live (TTL). If you change the location of your email system before the TTL expires,
they'll try to send you email at the old location first before figuring out that the location
changed. This can result in a mail delivery delay. One way to avoid this is to lower the
TTL that your DNS server gives to servers outside of your organization. This will make
the other organizations refresh the location of your email system more often.
Using a short interval, such as 3,600 seconds (one hour) or less, means that most email
systems will ask for an updated location every hour. We recommend that you set the
interval at least this low before you start the email migration. This allows all the systems
that send you email enough time to process the change. Then, when you make the final
switch over to Office 365, you can change the TTL back to a longer interval.
The place to change the TTL setting is on your email system's mail exchanger record, also
called an MX record. This lives on your public facing DNS system. If you have more than
one MX record, you need to change the value on each record to 3,600 or less.
If you need some help configuring your DNS settings, go to our Create DNS records at
any DNS hosting provider.
For many DNS providers, we have host-specific instructions. If your DNS provider isn't
included, or you want to get a sense of the general directions, we've provided general
MX record instructions as well.
It can take up to 72 hours for the email systems of your customers and partners to
recognize the changed MX record. Wait at least 72 hours before you proceed to the next
task.
All users in the batch are using their Microsoft 365 or Office 365 mailboxes. After
the batch is deleted, mail sent to mailboxes on the on-premises Exchange Server
isn't copied to the corresponding Microsoft 365 or Office 365 mailboxes.
Microsoft 365 and Office 365 mailboxes were synchronized at least once after mail
began being sent directly to them. To do this, make sure that the value in the Last
Synced Time box for the migration batch is more recent than when mail started
being routed directly to Microsoft 365 or Office 365 mailboxes.
When you delete a staged migration batch, the migration service cleans up any records
related to the migration batch and then deletes the migration batch. The batch is
removed from the list of migration batches on the migration dashboard.
1. In the new Exchange admin center, go to Migration > Batch. On the migration
dashboard, select the batch, and then click Delete.
1. Activate user accounts for the migrated accounts by assigning licenses: If you
don't assign a license, the mailbox is disabled when the grace period (30 days)
ends. To assign a license in the Microsoft 365 admin center, see Add users
individually or in bulk.
2. Create an Autodiscover DNS record so users can easily get to their mailboxes:
After all on-premises mailboxes are migrated to Microsoft 365 or Office 365, you
can configure an Autodiscover DNS record for your Microsoft 365 or Office 365
organization to enable users to easily connect to their new Microsoft 365 or Office
365 mailboxes with Outlook and mobile clients. This new Autodiscover DNS record
has to use the same namespace that you're using for your Microsoft 365 or Office
365 organization. For example, if your cloud-based namespace is
cloud.contoso.com, the Autodiscover DNS record you need to create is
autodiscover.cloud.contoso.com.
Microsoft 365 or Office 365 uses a CNAME record to implement the Autodiscover
service for Outlook and mobile clients. The Autodiscover CNAME record must
contain the following information:
Alias: autodiscover
Target: autodiscover.outlook.com
For more information, see Add DNS records to connect your domain.
3. Decommission on-premises Exchange servers: After you've verified that all email
is being routed directly to the Microsoft 365 or Office 365 mailboxes, have
completed the migration, and no longer need to maintain your on-premises email
organization, you can uninstall Exchange.
7 Note
See also
What you need to know about a staged email migration to Microsoft 365 or Office 365
After you've completed a staged migration, convert the on-premises mailboxes to mail-
enabled users so the on-premises users can automatically connect to their cloud
mailboxes.
Two things happen after a mailbox is migrated to the cloud in a staged Exchange
migration:
The user won't be able to connect to their cloud mailbox in Microsoft Outlook. The
Autodiscover service in the on-premises organization still tries to connect to their
on-premises mailbox. You can't point your on-premises Autodiscover CNAME
record to the cloud until all users have been migrated.
The solution is to convert the user's on-premises mailbox to a mail-enabled user (MEU)
after the mailbox has been migrated to the cloud. When you convert an on-premises
mailbox to an MEU, the following actions occur:
The proxy addresses from the cloud-based mailbox are copied to the new MEU. If
you decommission Exchange, these proxy addresses are still retained in Active
Directory.
The properties of the MEU enables directory synchronization to match the MEU
with its corresponding cloud mailbox.
The Autodiscover service uses the MEU to connect Outlook to the cloud mailbox
after the user creates a new Outlook profile.
The PowerShell script collects information from your cloud mailboxes and saves it to a
CSV file. Run this script first.
Copy the script into Notepad and save the file as ExportO365UserInfo.ps1.
7 Note
Before you run the PowerShell script, you need to install the Exchange Online
PowerShell module. For instructions, see Install and maintain the Exchange
Online PowerShell module. The module uses modern authentication.
Typically, you can use the script as-is if your organization is Microsoft 365 or
Microsoft 365 GCC. If your organization is Office 365 Germany, Microsoft 365
GCC High, or Microsoft 365 DoD, you need to edit the Connect-
ExchangeOnline line in the script. Specifically, you need to use the
PowerShell
Param($migrationCSVFileName = "migration.csv")
function O365Logon
{
#Check for current open O365 sessions and allow the admin to either use
the existing session or create a new one
$session = Get-PSSession | ?{$_.ConfigurationName -eq
'Microsoft.Exchange'}
if($session -ne $null)
{
$a = Read-Host "An open session to Exchange Online PowerShell
already exists. Do you want to use this session? Enter y to use the open
session, anything else to close and open a fresh session."
if($a.ToLower() -eq 'y')
{
Write-Host "Using existing Exchange Online Powershell session."
-ForeGroundColor Green
return
}
Disconnect-ExchangeOnline -Confirm:$false
}
Import-Module ExchangeOnlineManagement
Connect-ExchangeOnline -Prefix "Cloud"
}
function Main
{
#Verify the migration CSV file exists
if(!(Test-Path $migrationCSVFileName))
{
Write-Host "File $migrationCSVFileName does not exist." -
ForegroundColor Red
Exit
}
#Import user list from migration.csv file
$MigrationCSV = Import-Csv $migrationCSVFileName
#Get LegacyDN, Tenant, and On-Premises Email addresses for the users
foreach($user in $MailBoxList)
{
$UserInfo = New-Object System.Object
The Visual Basic script converts on-premises Exchange 2003 mailboxes to MEUs. Run
this script after you run the PowerShell script to collect information from the cloud
mailboxes.
Copy the script into Notepad and save the file as Exchange2007MBtoMEU.vbs.
PowerShell
param($DomainController = [String]::Empty)
function Main
{
#Script Logic flow
#1. Pull User Info from cloud.csv file in the current directory
#2. Lookup AD Info (DN, mail, proxyAddresses, and legacyExchangeDN)
using the SMTP address from the CSV file
#3. Save existing proxyAddresses
#4. Add existing legacyExchangeDN's to proxyAddresses
#5. Delete Mailbox
#6. Mail-Enable the user using the cloud email address as the
targetAddress
#7. Disable RUS processing
#8. Add proxyAddresses and mail attribute back to the object
#9. Add msExchMailboxGUID from cloud.csv to the user object (for
offboarding support)
#Disable Mailbox
Write-Host "Disabling Mailbox" -ForegroundColor Green
Disable-Mailbox -Identity $UserInfo.OnPremiseEmailAddress -
DomainController $DomainController -Confirm:$false
#Mail Enable
Write-Host "Enabling Mailbox" -ForegroundColor Green
Enable-MailUser -Identity $UserInfo.Identity -ExternalEmailAddress
$UserInfo.CloudEmailAddress -DomainController $DomainController
#Disable RUS
Write-Host "Disabling RUS" -ForegroundColor Green
Set-MailUser -Identity $UserInfo.Identity -EmailAddressPolicyEnabled
$false -DomainController $DomainController
[Void]$ADUser.psbase.invokeset('msExchMailboxGUID',$MailboxGUID.ToByteArray(
))
Write-Host "Setting Mailbox GUID" $UserInfo.MailboxGUID -
ForegroundColor Green
$ADUser.psbase.CommitChanges()
function LookupADInformationFromSMTPAddress($CSV)
{
$Mailbox = Get-Mailbox $CSV.OnPremiseEmailAddress -ErrorAction
SilentlyContinue
$UserInfo
}
Main
3. In the Exchange Management Shell, run the following command. The script
assumes that the CSV file is in the same directory and is named migration.csv.
PowerShell
.\ExportO365UserInfo.ps1
You will be prompted to use the existing session or open a new session.
The script runs and then saves the Cloud.csv file to the current working directory.
5. Enter the administrator credentials for your cloud-based organization and then
click OK.
6. Run the following command in a new Exchange Management Shell session. This
command assumes that ExportO365UserInfo.ps1 and Cloud.csv are located in the
same directory.
PowerShell
For example:
PowerShell
.\Exchange2007MBtoMEU.ps1 DC1.contoso.com
The script converts on-premises mailboxes to MEUs for all users included in the
Cloud.csv.
7. Verify that the new MEUs have been created. In Active Directory Users and
Computers, do the following steps:
c. Select Show only Exchange recipients, and then select Users with external
email address.
The mailboxes that were converted to MEUs are listed under Search results.
8. Use Active Directory Users and Computers, ADSI Edit, or Ldp.exe to verify that
the following MEU properties are populated with the correct information.
legacyExchangeDN
mail
msExchMailboxGuid
proxyAddresses
targetAddress
Convert Exchange 2003 mailboxes to
mail-enabled users in Exchange Online
Article • 02/22/2023
After you've completed a staged migration, convert the on-premises mailboxes to mail-
enabled users so the on-premises users can automatically connect to their cloud
mailboxes.
This article includes a PowerShell script that collects information from the cloud-based
mailboxes, and a Visual Basic (VB) script that converts Exchange 2003 mailboxes to
MEUs. When you run this script, the proxy addresses from the cloud-based mailbox are
copied to the MEU, which resides in Active Directory. The properties of the MEU enables
directory synchronization to match the MEU with its corresponding cloud mailbox.
The PowerShell script collects information from your cloud mailboxes and saves it to a
CSV file. Run this script first.
Copy the script into Notepad and save the file as ExportO365UserInfo.ps1.
7 Note
Before you run the script, you need to install the Exchange Online PowerShell
module. For instructions, see Install and maintain the Exchange Online PowerShell
module. The module uses modern authentication.
Typically, you can use the script as-is if your organization is Microsoft 365 or
Microsoft 365 GCC. If your organization is Office 365 Germany, Microsoft 365
GCC High, or Microsoft 365 DoD, you need to edit the Connect-
ExchangeOnline line in the script. Specifically, you need to use the
PowerShell
Param($migrationCSVFileName = "migration.csv")
function O365Logon
{
#Check for current open O365 sessions and allow the admin to either use
the existing session or create a new one
$session = Get-PSSession | ?{$_.ConfigurationName -eq
'Microsoft.Exchange'}
if($session -ne $null)
{
$a = Read-Host "An open session to Exchange Online PowerShell
already exists. Do you want to use this session? Enter y to use the open
session, anything else to close and open a fresh session."
if($a.ToLower() -eq 'y')
{
Write-Host "Using existing Exchange Online Powershell Session."
-ForeGroundColor Green
return
}
Disconnect-ExchangeOnline -Confirm:$false
}
Import-Module ExchangeOnlineManagement
Connect-ExchangeOnline
}
function Main
{
#Verify the migration CSV file exists
if(!(Test-Path $migrationCSVFileName))
{
Write-Host "File $migrationCSVFileName does not exist." -
ForegroundColor Red
Exit
}
#Import user list from migration.csv file
$MigrationCSV = Import-Csv $migrationCSVFileName
#Get mailbox list based on email addresses from CSV file
$MailBoxList = $MigrationCSV | %{$_.EmailAddress} | Get-Mailbox
$Users = @()
#Get LegacyDN, Tenant, and On-Premises Email addresses for the users
foreach($user in $MailBoxList)
{
$UserInfo = New-Object System.Object
$CloudEmailAddress = $user.EmailAddresses | ?{($_ -match
'onmicrosoft') -and ($_ -cmatch 'smtp:')}
if ($CloudEmailAddress.Count -gt 1)
{
$CloudEmailAddress =
$CloudEmailAddress[0].ToString().ToLower().Replace('smtp:', '')
Write-Host "$user returned more than one cloud email address.
Using $CloudEmailAddress" -ForegroundColor Yellow
}
else
{
$CloudEmailAddress =
$CloudEmailAddress.ToString().ToLower().Replace('smtp:', '')
}
$UserInfo | Add-Member -Type NoteProperty -Name LegacyExchangeDN -
Value $user.LegacyExchangeDN
$UserInfo | Add-Member -Type NoteProperty -Name CloudEmailAddress -
Value $CloudEmailAddress
$UserInfo | Add-Member -Type NoteProperty -Name
OnPremiseEmailAddress -Value $user.PrimarySMTPAddress.ToString()
$Users += $UserInfo
}
#Check for existing csv file and overwrite if needed
if(Test-Path ".\cloud.csv")
{
$delete = Read-Host "The file cloud.csv already exists in the
current directory. Do you want to delete it? Enter y to delete, anything
else to exit this script."
if($delete.ToString().ToLower() -eq 'y')
{
Write-Host "Deleting existing cloud.csv file" -ForeGroundColor
Red
Remove-Item ".\cloud.csv"
}
else
{
Write-Host "Will NOT delete current cloud.csv file. Exiting
script." -ForeGroundColor Green
Exit
}
}
$Users | Export-CSV -Path ".\cloud.csv" -notype
(Get-Content ".\cloud.csv") | %{$_ -replace '"', ''} | Set-Content
".\cloud.csv" -Encoding Unicode
Write-Host "CSV File Successfully Exported to cloud.csv" -
ForeGroundColor Green
}
O365Logon
Main
The Visual Basic script converts on-premises Exchange 2003 mailboxes to MEUs. Run
this script after you run the PowerShell script to collect information from the cloud
mailboxes.
Copy the script into Notepad and save the file as Exchange2003MBtoMEU.vbs.
VB.net
'Globals/Constants
Const ADS_PROPERTY_APPEND = 3
Dim UserDN
Dim remoteSMTPAddress
Dim remoteLegacyDN
Dim domainController
Dim csvMode
csvMode = FALSE
Dim csvFileName
Dim lastADLookupFailed
Class UserInfo
public OnPremiseEmailAddress
public CloudEmailAddress
public CloudLegacyDN
public LegacyDN
public ProxyAddresses
public Mail
public MailboxGUID
public DistinguishedName
Public Sub Class_Initialize()
Set ProxyAddresses = CreateObject("Scripting.Dictionary")
End Sub
End Class
'Command Line Parameters
If WScript.Arguments.Count = 0 Then
'No parameters passed
WScript.Echo("No parameters were passed.")
ShowHelp()
ElseIf StrComp(WScript.Arguments(0), "-c", vbTextCompare) = 0 And
WScript.Arguments.Count = 2 Then
WScript.Echo("Missing DC Name.")
ShowHelp()
ElseIf StrComp(WScript.Arguments(0), "-c", vbTextCompare) = 0 Then
'CSV Mode
csvFileName = WScript.Arguments(1)
domainController = WScript.Arguments(2)
csvMode = TRUE
WScript.Echo("CSV mode detected. Filename: " & WScript.Arguments(1) &
vbCrLf)
ElseIf wscript.Arguments.Count <> 4 Then
'Invalid Arguments
WScript.Echo WScript.Arguments.Count
Call ShowHelp()
Else
'Manual Mode
UserDN = wscript.Arguments(0)
remoteSMTPAddress = wscript.Arguments(1)
remoteLegacyDN = wscript.Arguments(2)
domainController = wscript.Arguments(3)
End If
Main()
'Main entry point
Sub Main
'Check for CSV Mode
If csvMode = TRUE Then
UserInfoArray = GetUserInfoFromCSVFile()
Else
WScript.Echo "Manual Mode Detected" & vbCrLf
Set info = New UserInfo
info.CloudEmailAddress = remoteSMTPAddress
info.DistinguishedName = UserDN
info.CloudLegacyDN = remoteLegacyDN
ProcessSingleUser(info)
End If
End Sub
'Process a single user (manual mode)
Sub ProcessSingleUser(ByRef UserInfo)
userADSIPath = "LDAP://" & domainController & "/" &
UserInfo.DistinguishedName
WScript.Echo "Processing user " & userADSIPath
Set MyUser = GetObject(userADSIPath)
proxyCounter = 1
For Each address in MyUser.Get("proxyAddresses")
UserInfo.ProxyAddresses.Add proxyCounter, address
proxyCounter = proxyCounter + 1
Next
UserInfo.OnPremiseEmailAddress =
GetPrimarySMTPAddress(UserInfo.ProxyAddresses)
UserInfo.Mail = MyUser.Get("mail")
UserInfo.MailboxGUID = MyUser.Get("msExchMailboxGUID")
UserInfo.LegacyDN = MyUser.Get("legacyExchangeDN")
ProcessMailbox(UserInfo)
End Sub
'Populate user info from CSV data
Function GetUserInfoFromCSVFile()
CSVInfo = ReadCSVFile()
For i = 0 To (UBound(CSVInfo)-1)
lastADLookupFailed = false
Set info = New UserInfo
info.CloudLegacyDN = Split(CSVInfo(i+1), ",")(0)
info.CloudEmailAddress = Split(CSVInfo(i+1), ",")(1)
info.OnPremiseEmailAddress = Split(CSVInfo(i+1), ",")(2)
WScript.Echo "Processing user " & info.OnPremiseEmailAddress
WScript.Echo "Calling LookupADInformationFromSMTPAddress"
LookupADInformationFromSMTPAddress(info)
If lastADLookupFailed = false Then
WScript.Echo "Calling ProcessMailbox"
ProcessMailbox(info)
End If
set info = nothing
Next
End Function
'Populate user info from AD
Sub LookupADInformationFromSMTPAddress(ByRef info)
'Lookup the rest of the info in AD using the SMTP address
Set objRootDSE = GetObject("LDAP://RootDSE")
strDomain = objRootDSE.Get("DefaultNamingContext")
Set objRootDSE = nothing
Set objConnection = CreateObject("ADODB.Connection")
objConnection.Provider = "ADsDSOObject"
objConnection.Open "Active Directory Provider"
Set objCommand = CreateObject("ADODB.Command")
BaseDN = "<LDAP://" & domainController & "/" & strDomain & ">"
adFilter = "(&(proxyAddresses=SMTP:" & info.OnPremiseEmailAddress & "))"
Attributes =
"distinguishedName,msExchMailboxGUID,mail,proxyAddresses,legacyExchangeDN"
Query = BaseDN & ";" & adFilter & ";" & Attributes & ";subtree"
objCommand.CommandText = Query
Set objCommand.ActiveConnection = objConnection
On Error Resume Next
Set objRecordSet = objCommand.Execute
'Handle any errors that result from the query
If Err.Number <> 0 Then
WScript.Echo "Error encountered on query " & Query & ". Skipping
user."
lastADLookupFailed = true
return
End If
'Handle zero or ambiguous search results
If objRecordSet.RecordCount = 0 Then
WScript.Echo "No users found for address " &
info.OnPremiseEmailAddress
lastADLookupFailed = true
return
ElseIf objRecordSet.RecordCount > 1 Then
WScript.Echo "Ambiguous search results for email address " &
info.OnPremiseEmailAddress
lastADLookupFailed = true
return
ElseIf Not objRecordSet.EOF Then
info.LegacyDN = objRecordSet.Fields("legacyExchangeDN").Value
info.Mail = objRecordSet.Fields("mail").Value
info.MailboxGUID = objRecordSet.Fields("msExchMailboxGUID").Value
proxyCounter = 1
For Each address in objRecordSet.Fields("proxyAddresses").Value
info.ProxyAddresses.Add proxyCounter, address
proxyCounter = proxyCounter + 1
Next
info.DistinguishedName =
objRecordSet.Fields("distinguishedName").Value
objRecordSet.MoveNext
End If
objConnection = nothing
objCommand = nothing
objRecordSet = nothing
On Error Goto 0
End Sub
'Populate data from the CSV file
Function ReadCSVFile()
'Open file
Set objFS = CreateObject("Scripting.FileSystemObject")
Set objTextFile = objFS.OpenTextFile(csvFileName, 1, false, -1)
'Loop through each line, putting each line of the CSV file into an array
to be returned to the caller
counter = 0
Dim CSVArray()
Do While NOT objTextFile.AtEndOfStream
ReDim Preserve CSVArray(counter)
CSVArray(counter) = objTextFile.ReadLine
counter = counter + 1
Loop
'Close and return
objTextFile.Close
Set objTextFile = nothing
Set objFS = nothing
ReadCSVFile = CSVArray
End Function
'Process the migration
Sub ProcessMailbox(User)
'Get user properties
userADSIPath = "LDAP://" & domainController & "/" &
User.DistinguishedName
Set MyUser = GetObject(userADSIPath)
'Add x.500 address to list of existing proxies
existingLegDnFound = FALSE
newLegDnFound = FALSE
'Loop through each address in User.ProxyAddresses
For i = 1 To User.ProxyAddresses.Count
If StrComp(address, "x500:" & User.LegacyDN, vbTextCompare) = 0 Then
WScript.Echo "x500 proxy " & User.LegacyDN & " already exists"
existingLegDNFound = true
End If
If StrComp(address, "x500:" & User.CloudLegacyDN, vbTextCompare) = 0
Then
WScript.Echo "x500 proxy " & User.CloudLegacyDN & " already
exists"
newLegDnFound = true
End If
Next
'Add existing leg DN to proxy list
If existingLegDnFound = FALSE Then
WScript.Echo "Adding existing legacy DN " & User.LegacyDN & " to
proxy addresses"
User.ProxyAddresses.Add (User.ProxyAddresses.Count+1),("x500:" &
User.LegacyDN)
End If
'Add new leg DN to proxy list
If newLegDnFound = FALSE Then
'Add new leg DN to proxy addresses
WScript.Echo "Adding new legacy DN " & User.CloudLegacyDN & " to
existing proxy addresses"
User.ProxyAddresses.Add (User.ProxyAddresses.Count+1),("x500:" &
User.CloudLegacyDN)
End If
'Dump out new list of addresses
WScript.Echo "Original proxy addresses updated count: " &
User.ProxyAddresses.Count
For i = 1 to User.ProxyAddresses.Count
WScript.Echo " proxyAddress " & i & ": " & User.ProxyAddresses(i)
Next
'Delete the Mailbox
WScript.Echo "Opening " & userADSIPath & " as CDOEXM::IMailboxStore
object"
Set Mailbox = MyUser
Wscript.Echo "Deleting Mailbox"
On Error Resume Next
Mailbox.DeleteMailbox
'Handle any errors deleting the mailbox
If Err.Number <> 0 Then
WScript.Echo "Error " & Err.number & ". Skipping User." & vbCrLf &
"Description: " & Err.Description & vbCrLf
Exit Sub
End If
On Error Goto 0
'Save and continue
WScript.Echo "Saving Changes"
MyUser.SetInfo
WScript.Echo "Refeshing ADSI Cache"
MyUser.GetInfo
Set Mailbox = nothing
'Mail Enable the User
WScript.Echo "Opening " & userADSIPath & " as CDOEXM::IMailRecipient"
Set MailUser = MyUser
WScript.Echo "Mail Enabling user using targetAddress " &
User.CloudEmailAddress
MailUser.MailEnable User.CloudEmailAddress
WScript.Echo "Disabling Recipient Update Service for user"
MyUser.PutEx ADS_PROPERTY_APPEND, "msExchPoliciesExcluded", Array("
{26491CFC-9E50-4857-861B-0CB8DF22B5D7}")
WScript.Echo "Saving Changes"
MyUser.SetInfo
WScript.Echo "Refreshing ADSI Cache"
MyUser.GetInfo
'Add Legacy DN back on to the user
WScript.Echo "Writing legacyExchangeDN as " & User.LegacyDN
MyUser.Put "legacyExchangeDN", User.LegacyDN
'Add old proxies list back on to the MEU
WScript.Echo "Writing proxyAddresses back to the user"
For j=1 To User.ProxyAddresses.Count
MyUser.PutEx ADS_PROPERTY_APPEND, "proxyAddresses",
Array(User.ProxyAddresses(j))
MyUser.SetInfo
MyUser.GetInfo
Next
'Add mail attribute back on to the MEU
WScript.Echo "Writing mail attribute as " & User.Mail
MyUser.Put "mail", User.Mail
'Add msExchMailboxGUID back on to the MEU
WScript.Echo "Converting mailbox GUID to writable format"
Dim mbxGUIDByteArray
Call ConvertHexStringToByteArray(OctetToHexString(User.MailboxGUID),
mbxGUIDByteArray)
WScript.Echo "Writing property msExchMailboxGUID to user object with
value " & OctetToHexString(User.MailboxGUID)
MyUser.Put "msExchMailboxGUID", mbxGUIDByteArray
WScript.Echo "Saving Changes"
MyUser.SetInfo
WScript.Echo "Migration Complete!" & vbCrLf
End Sub
'Returns the primary SMTP address of a user
Function GetPrimarySMTPAddress(Addresses)
For Each address in Addresses
If Left(address, 4) = "SMTP" Then GetPrimarySMTPAddress = address
Next
End Function
'Converts Hex string to byte array for writing to AD
Sub ConvertHexStringToByteArray(ByVal strHexString, ByRef pByteArray)
Set FSO = CreateObject("Scripting.FileSystemObject")
Set Stream = CreateObject("ADODB.Stream")
Temp = FSO.GetTempName()
Set TS = FSO.CreateTextFile(Temp)
For i = 1 To (Len (strHexString) -1) Step 2
TS.Write Chr("&h" & Mid (strHexString, i, 2))
Next
TS.Close
Stream.Type = 1
Stream.Open
Stream.LoadFromFile Temp
pByteArray = Stream.Read
Stream.Close
FSO.DeleteFile Temp
Set Stream = nothing
Set FSO = Nothing
End Sub
'Converts raw bytes from AD GUID to readable string
Function OctetToHexString (arrbytOctet)
OctetToHexStr = ""
For k = 1 To Lenb (arrbytOctet)
OctetToHexString = OctetToHexString & Right("0" &
Hex(Ascb(Midb(arrbytOctet, k, 1))), 2)
Next
End Function
Sub ShowHelp()
WScript.Echo("This script runs in two modes, CSV Mode and Manual Mode."
& vbCrLf & "CSV Mode allows you to specify a CSV file from which to pull
usernames." & vbCrLf& "Manual mode allows you to run the script against a
single user.")
WSCript.Echo("Both modes require you to specify the name of a DC to use
in the local domain." & vbCrLf & "To run the script in CSV Mode, use the
following syntax:")
WScript.Echo(" cscript Exchange2003MBtoMEU.vbs -c
x:\csv\csvfilename.csv dc.domain.com")
WScript.Echo("To run the script in Manual Mode, you must specify the
users AD Distinguished Name, Remote SMTP Address, Remote Legacy Exchange DN,
and Domain Controller Name.")
WSCript.Echo(" cscript Exchange2003MBtoMEU.vbs " & chr(34) &
"CN=UserName,CN=Users,DC=domain,DC=com" & chr(34) & " " & chr(34) &
"user@cloudaddress.com" & chr(34) & " " & chr(34) & "/o=Cloud Org/ou=Cloud
Site/ou=Recipients/cn=CloudUser" & chr(34) & " dc.domain.com")
WScript.Quit
End Sub
ExportO365UserInfo.ps1
ExportO365UserInfo.ps1 is a PowerShell script that you run in your cloud based
organization to collect information about the cloud mailboxes that you migrated during
the staged Exchange migration. It uses a CSV file to scope the batch of users. We
recommended that you use the same migration CSV file that you used to migrate a
batch of users.
When you run the ExportO365UserInfo script, the following actions occur:
The following properties are collected from the cloud mailboxes for users listed in
the input CSV file:
Primary SMTP address.
Primary SMTP address of the corresponding on-premises mailbox.
Other proxy addresses for the cloud mailbox.
LegacyExchangeDN
The collected properties are saved to a CSV file named Cloud.csv.
Exchange2003MBtoMEU.vbs
Exchange2003MBtoMEU.vbs is a VB script that you run in your on-premises Exchange
2003 organization to convert mailboxes to MEUs. It uses the Cloud.csv file that was
produced by the ExportO365UserInfo.ps1 PowerShell script.
When you run the Exchange2003MBtoMEU.vbs script, the following actions occur for
each mailbox listed in input CSV file:
Collects information from the input CSV file and from the on-premises mailbox.
Creates a list of proxy addresses from the on-premises and cloud mailbox to add
to the MEU.
Deletes the on-premises mailbox.
Creates a MEU with the following properties:
proxyAddresses: Values from both the on-premises mailbox and the cloud
mailbox.
targetAddress: Read from the on-premises mailbox; the value is the primary
SMTP of the cloud mailbox.
) Important
PowerShell
This command extracts the primary SMTP address and Guid for all cloud
mailboxes into the guid.csv file, and then saves this file to the current
directory.
Instead of using the input CSV file to convert a batch of mailboxes, you can run the
Exchange2003MBtoMEU.vbs script in manual mode to convert one mailbox at a time. If
you choose this method, you need to provide the following input parameters:
PowerShell
For example:
PowerShell
cd c:\data\scripts
.\ExportO365UserInfo.ps1 .\MigrationBatch1.csv
For example:
To run the script in manual mode, enter the following command. Use spaces
between each value.
For example:
4. Verify that the new MEUs have been created. In Active Directory Users and
Computers, do the following steps:
c. Select Show only Exchange recipients, and then select Users with external
email address.
The mailboxes that were converted to MEUs are listed under Search results.
5. Use Active Directory Users and Computers, ASI Edit, or Ldp.exe to verify that the
following MEU properties are populated with the correct information:
legacyExchangeDN
mail
msExchMailboxGuid*
proxyAddresses
targetAddress
) Important
Effective from December 2022, the classic Exchange Admin Center will be
deprecated for worldwide customers. Microsoft recommends using the new
Exchange Admin Center , if not already doing so.
While most of the features have been migrated to new EAC, some have been
migrated to other admin centers and remaining ones will soon be migrated to New
EAC. Find features that are not yet there in new EAC at Other Features or use
Global Search that will help you navigate across new EAC.
You can migrate the contents of user mailboxes from your source email system to
Microsoft 365 or Office 365. Use the Internet Message Access Protocol (IMAP) to
migrate email when:
If this option won't work for you, see Ways to migrate email to Microsoft 365 or Office
365 for other options.
For Windows PowerShell steps, see Use PowerShell to perform an IMAP migration to
Microsoft 365 or Office 365.
Things to consider
Here are a few limitations to be aware of:
You can only migrate items in a user's inbox or other mail folders. This type of
migration doesn't migrate contacts, calendar items, or tasks.
You can migrate a maximum of 500,000 items from a user's mailbox (emails are
migrated from newest to oldest).
If you limited the connections to your source email system, it's a good idea to
increase them to improve migration performance. Common connection limits
include client/server total connections, per-user connections, and IP address
connections on either the server or the firewall.
If you can't access user mailboxes, you'll have to reset the passwords. This lets you
access the user mailboxes by using a new password that you know. If users don't know
the new passwords, they won't be able to get to their old mailboxes during or after the
email migration. You can distribute the new passwords after the migration if you want
users to get to their old mailboxes.
1. First you have to create your users in Microsoft 365 or Office 365 and assign
licenses to them. The mailboxes have to exist in Microsoft 365 or Office 365 to use
IMAP migration.
2. Prepare your IMAP source email system and get the information you need to
migrate. If you plan to migrate your domain to Microsoft 365 or Office 365, verify
that you own your domain with your domain registrar.
Depending on which type of email service you are migrating from, you might need
to configure some settings or record the name of your email server or service to
use later. You also need to verify your domain in your domain registry system if
you have a custom domain.
3. Communicate changes to users.
It's a good idea to let users know about the email migration and how it impacts
them. Give users information about what tasks need to be done before, during,
and after migration.
To perform the migration, you need an administrator account that has permissions,
or the username and password to each mailbox.
5. If you are using the steps described in Migrate Google Apps mailboxes to
Microsoft 365 or Office 365 or Migrate other types of IMAP mailboxes to Microsoft
365 or Office 365, you will create a list of mailboxes to migrate (CSV file). These
migrations instructions start from the Exchange admin center, and you will need to
create a CSV file that lists the email addresses, usernames, and passwords for the
mailboxes you want to migrate.
You can also use the migrations page or setup instructions in the Admin center
preview to migrate from IMAP systems such as Gmail, Hotmail.com, or
Outlook.com. These steps are the best if you plan to migrate mail for only a few
users (less than 50). If you are migrating mail for more users, it is easier to use a
CSV file to enter all the information for the accounts.
To migrate email successfully, Microsoft 365 or Office 365 needs to connect and
communicate with the source email system. To do this, Microsoft 365 or Office 365
uses a migration endpoint, the settings that are used to create the connection.
To migrate mailboxes, you create a migration batch, and then start the migration.
After the migration batch is run, verify that the email was migrated successfully.
There are some settings you can configure so that it doesn't take as long for email
to start showing up in your new Microsoft 365 or Office 365 mailboxes. See Tips
for optimizing IMAP migrations.
You need to change a DNS record called an MX record so that your email system
can start routing mail to Office 365.
10. Verify routing and then stop email synchronization.
After you verify that all email is being routed to Microsoft 365 or Office 365, you
can delete the migration batch to stop the synchronization between your source
email system and Microsoft 365 or Office 365.
Let your users know about Microsoft 365 or Office 365 and how to sign in to their
new mailboxes.
Ready to start?
To finish an email migration successfully, it's a good idea to be comfortable doing these
tasks:
You create a list of mailboxes to migrate in Excel. You add your users' email
addresses, usernames, and passwords to this file.
You use step-by-step wizards in Microsoft 365 or Office 365 to configure and start
the migration process.
After the mail has been migrated, you change your organization's MX record to
point to Microsoft 365 or Office 365 when the migration is complete. Your MX
record is how other mail systems find the location of your email system. Changing
your MX record allows other mail systems to begin to send email directly to the
new mailboxes in Microsoft 365 or Office 365. To learn how to update your MX
record, see Create DNS records at any DNS hosting provider as well.
Gmail
This procedure uses the Exchange admin center steps for an IMAP migration.
This procedure uses the Exchange admin center steps for an IMAP migration.
) Important
Effective from December 2022, the classic Exchange Admin Center will be
deprecated for worldwide customers. Microsoft recommends using the new
Exchange Admin Center , if not already doing so.
While most of the features have been migrated to new EAC, some have been
migrated to other admin centers and remaining ones will soon be migrated to New
EAC. Find features that are not yet there in new EAC at Other Features or use
Global Search that will help you navigate across new EAC.
7 Note
This article explains how to migrate consumer Gmail mailboxes to Microsoft 365 or
Office 365. For organizations and enterprises interested in migrating Google
Workspace content, including calendar and contacts information in addition to
mailbox data, see Perform a Google Workspace migration.
Migrate your IMAP mailboxes to Microsoft 365 or Office 365 gives you an overview of
the migration process. Read it first and when you're familiar with the contents of that
article, return to this topic to learn how to migrate mailboxes from Google Workspace
Gmail to Microsoft 365 or Office 365. You must be a global admin in Microsoft 365 or
Office 365 to complete IMAP migration steps.
Looking for Windows PowerShell commands? See User PowerShell to perform an IMAP
migration to Microsoft 365 or Office 365.
Want to migrate other types of IMAP mailboxes? See Migrate other types of IMAP
mailboxes to Microsoft 365 or Office 365.
) Important
IMAP migration will only migrate emails, not calendar, and contact information.
Users can import their own email, contacts, and other mailbox information to
Microsoft 365 or Office 365. See Migrate email and contacts to Microsoft 365 to
learn how.
Before Microsoft 365 or Office 365 can connect to Gmail or Google Workspace, all
account owners must create an app password to access their account. This is because
Google considers Outlook to be a less secure app and will not allow a connection to it
with a password alone. For instructions, see Prepare your Google Workspace account for
connecting to Outlook and Microsoft 365 or Office 365. You'll also need to make sure
your Google Workspace users can turn on 2-step verification.
7 Note
Domain verification is a task you will go through as you set up Microsoft 365 or Office
365. During setup, the setup wizard provides you with a TXT record you will add at your
domain host provider. See Add a domain to Microsoft 365 for the steps to complete in
Microsoft 365 admin center, and choose a domain registrar from the two following
options to see how to complete add the TXT record that your DNS host provider.
Your current DNS host provider is Google: If you purchased your domain from
Google and they are the DNS hosting provider, follow these instructions: Create
DNS records when your domain is managed by Google (Go Daddy).
You purchased your domain from another domain registrar: If you purchased
your domain from a different company, we provide instructions for many popular
domain hosting providers.
) Important
At this point you have verified that you own the domain and created your Google
Workspace users and mailboxes in Microsoft 365 or Office 365 with your custom
domain. Close the wizard at this step. Do not proceed to Set up domain, until your
Gmail mailboxes are migrated to Microsoft 365 or Office 365. You'll finish the setup
steps in task 7, Step 6: Update your DNS records to route Gmail directly to
Microsoft 365 or Office 365.
When you create the migration file, you need to know the app password of each Gmail
mailbox that you want to migrate. We're assuming you don't know the user passwords,
so you'll probably need to assign temporary passwords (by resetting the passwords) to
all mailboxes during the migration. You must be an administrator in Google Workspace
to reset passwords.
You don't have to migrate all Gmail mailboxes at once. You can do them in batches at
your convenience. You can include up to 50,000 mailboxes (one row for each user) in
your migration file. The file can be as large as 10 MB.
1. Sign in to Google Workspace admin console using your administrator username
and password.
3. Select each user to identify each user's email address. Write down the address.
4. Open the Microsoft 365 admin center , and go to Users > Active users. Keep an
eye on the Username column. You'll use this information in a minute. Keep the
Microsoft 365 admin center window open, too.
5. Start Excel.
6. Use the following screenshot as a template to create the migration file in Excel.
Start with the headings in row 1. Make sure they match the picture exactly and
don't contain spaces. The exact heading names are:
7. Next enter the email address, username, and app password for each mailbox you
want to migrate. Enter one mailbox per row.
Column A is the email address of the Microsoft 365 or Office 365 mailbox.
This is what's shown in the username column in Users > Active users in the
Microsoft 365 admin center.
Column B is the sign-in name for the user's Gmail mailbox (for example,
aaronharper@lemonteatest.com).
Column C is the app password for the user's Gmail mailbox. Creating the app
password is described in Migration from Google Workspace mailboxes using
the Microsoft 365 admin center.
8. Save the file as a CSV file type, and then close Excel.
2. In the EAC, go to Recipients > Migration > More > Migration endpoints.
6. Click Next. The migration service uses the settings to test the connection to Gmail
system. If the connection works, the Enter general information page opens.
7. On the Enter general information page, type a Migration endpoint name, for
example, Test5-endpoint. Leave the other two boxes blank to use the default
values.
7 Note
For new EAC, the Migration endpoints can be created during the creation of a new
migration batch.
7 Note
Tip
It's a good idea to create a test migration batch with a small number of mailboxes
to first test the process. > Use migration files with the same number of rows, and
run the batches at similar times during the day. Then compare the total running
time for each test batch. This helps you estimate how long it could take to migrate
all your mailboxes, how large each migration batch should be, and how many
simultaneous connections to the source email system you should use to balance
migration speed and internet bandwidth.
1. In the Microsoft 365 admin center, navigate to Admin centers > Exchange.
5. On the Select the users page, click Browse to specify the migration file you
created. After you select your migration file, Microsoft 365 or Office 365 checks it
to make sure:
It isn't empty.
It uses comma-separated formatting.
It doesn't contain more than 50,000 rows.
It includes the required attributes in the header row.
It contains rows with the same number of columns as the header row.
If any one of these checks fails, you'll get an error that describes the reason for the
failure. If you get an error, you must fix the migration file and resubmit it to create
a migration batch.
6. After Microsoft 365 or Office 365 validates the migration file, it displays the
number of users listed in the file as the number of Gmail mailboxes to migrate.
7. Click Next.
8. On the Set the migration endpoint page, select the migration endpoint that you
created in the previous step, and click Next.
9. On the IMAP migration configuration page, accept the default values, and click
Next.
10. On the Move configuration page, type the name (no spaces or special characters)
of the migration batch in the box (for example, Test5-migration). The default
migration batch name that's displayed is the name of the migration file that you
specified. The migration batch name is displayed in the list on the migration
dashboard after you create the migration batch.
You can also enter the names of the folders you want to exclude from migration.
For example, Shared, Junk Email, and Deleted. Click Add to add them to the
excluded list. You can also click Edit to change a folder name and Delete to
delete the folder name.
11. Click Next
Choose Automatically start the batch > new. The migration starts
immediately with the status Syncing.
7 Note
If you have large user mailboxes and the status shows Syncing for a long time, you
may be experiencing bandwidth limits set by Google. For more information, see
Bandwidth limits and Sync limits . You can try to unlock the Gmail user or use
alternative method to migrate the users. For more information, see Use network
upload to import your organization PST files to Microsoft 365 or Office 365 and
Third-party tools for Microsoft 365 or Office 365 migrations.
Verify that the migration worked
In the new Exchange admin center, go to Migration > Batch. Verify that the batch
is displayed in the migration dashboard. If the migration completed successfully,
the status is Synced.
In the Classic Exchange admin center, go to Recipients > Migration. Verify that the
batch is displayed in the migration dashboard. If the migration completed
successfully, the status is Synced.
If this task fails, check the associated Mailbox status reports for specific errors, and
double-check that your migration file has the correct Microsoft 365 or Office 365
email address in the EmailAddress column.
When people outside of your organization send you email, their email systems don't
double-check where to send that email every time. Instead, their systems save the
location of your email system based on a setting in your DNS server known as a time-
to-live (TTL). If you change the location of your email system before the TTL expires, the
sender's email system tries to send email to the old location before figuring out that the
location changed. This can result in a mail delivery delay. One way to avoid this is to
lower the TTL that your DNS server gives to servers outside of your organization. This
will make the other organizations refresh the location of your email system more often.
Most email systems ask for an update each hour if a short interval such as 3,600 seconds
(one hour) is set. We recommend that you set the interval at least this low before you
start the email migration. This setting allows all the systems that send you email enough
time to process the change. Then, when you make the final switch over to Microsoft 365
or Office 365, you can change the TTL back to a longer interval.
The place to change the TTL setting is on your email system's mail exchanger record,
also called an MX record. This lives in your public facing DNS. If you have more than one
MX record, you need to change the value on each record to 3,600 seconds or less.
Don't worry if you skip this task. It might take longer for email to start showing up in
your new Microsoft 365 or Office 365 mailboxes, but it will get there.
If you need some help configuring your DNS settings, see Add DNS records to connect
your domain.
For many DNS providers, there are specific instructions to change your MX record, see
Add DNS records to connect your domain for instructions. If your DNS provider isn't
included, or if you want to get a sense of the general directions, general MX record
instructions are provided as well. See Add DNS records to connect your domain for
instructions.
1. Sign in to Microsoft 365 or Office 365 with your work or school account.
The status shows Fix issues because you stopped the wizard partway through so
you could migrate your Gmail email to Microsoft 365 or Office 365 before
switching your MX record.
4. For each DNS record type that you need to add, choose What do I fix?, and follow
the instructions to add the records for Microsoft 365 or Office 365 services.
5. After you've added all the records, you'll see a message that your domain is set up
correctly: Contoso.com is set up correctly. No action is required.
It can take up to 72 hours for the email systems of your customers and partners to
recognize the changed MX record. Wait at least 72 hours before you proceed to
stopping synchronization with Gmail.
Make sure that your users are using Microsoft 365 or Office 365 exclusively for
email. After you delete the migration batch, email that is sent to Gmail mailboxes
isn't copied to Microsoft 365 or Office 365. This means your users can't get that
email, so make sure that all users are on the new system.
Let the migration batch run for at least 72 hours before you delete it. This makes
the following two things more likely:
Your Gmail mailboxes and Microsoft 365 or Office 365 mailboxes have
synchronized at least once (they synchronize once a day).
The email systems of your customers and partners have recognized the changes
to your MX records and are now properly sending email to your Microsoft 365
or Office 365 mailboxes.
When you delete the migration batch, the migration service cleans up any records
related to the migration batch and removes it from the migration dashboard.
Leave us a comment
Were these steps helpful? If so, please let us know at the bottom of this topic. If they
weren't, and you're still having trouble migrating your email, tell us about it and we'll
use your feedback to double-check our steps.
Related Topics
IMAP migration in the Microsoft 365 admin center
As part of the process of deploying Microsoft 365 or Office 365, you can choose to
migrate the contents of user mailboxes from an Internet Mail Access Protocol (IMAP)
email service to Microsoft 365 or Office 365.
Looking for PowerShell commands for general IMAP migrations? See Use PowerShell to
perform an IMAP migration to Microsoft 365 or Office 365.
Notes:
You need to create your users in Microsoft 365 or Office 365 before you migrate
their IMAP mailboxes from the source email environment. Each user must have a
target Microsoft 365 or Office 365 mailbox for the IMAP migration.
If you use an email domain in your IMAP email environment, and you also want to
use the email domain in Microsoft 365 or Office 365, you need to add the domain
to Microsoft 365 or Office 365 as an accepted domain before you create users in
Microsoft 365 or Office 365. For instructions, see Add a domain to Microsoft 365.
If you are using Office 365 operated by 21Vianet in China, see Add a domain to
Microsoft 365.
3. In the Search all settings box, start typing "pop", and in the results, select POP and
IMAP.
4. In POP and IMAP settings, your IMAP server name is listed in the IMAP setting
section.
For more information about IMAP connections in Microsoft 365 or Office 365, see POP
and IMAP account settings .
You either know the password of each user's mailbox, or you need to reset the
passwords to new passwords that you do know. Follow the steps in Create the list
of user mailboxes when you know the user passwords, or you'll reset the
passwords.
Your source email system lets you use mailbox admin credentials to access user
mailboxes, which means you don't need to know the passwords or reset them.
Follow the steps in Create a list of user mailboxes using admin credentials to
access them to learn how to access user mailboxes.
Create the list of user mailboxes when you know the user
passwords, or you'll reset the passwords
For this task, you create a migration file that contains a list of mailboxes to migrate to
Microsoft 365 or Office 365. We use Excel in the instructions because it's the easiest way
to create the migration file. You can use Excel 2013, Excel 2010, or Excel 2007.
When you create the migration file, you must know the password of each mailbox to be
migrated. We're assuming you don't know user passwords, so you'll probably need to
assign temporary passwords (by resetting the passwords) to all mailboxes during the
migration.
You don't have to migrate all mailboxes at once. You can do them in batches at your
convenience. You can include up to 50,000 mailboxes (one row for each user) in your
migration file, which can be as large as 10 MB.
For more information, see CSV files for IMAP migration batches.
1. Go to your source email system (the one you're migrating from), and navigate to
the list of mailboxes you want to migrate.
We'd give you the exact steps if we could, but there are so many different email
systems out there that you need to find this out on your own. When you find the
list of mailboxes, keep this window open.
3. Navigate to Users > Active users. Keep an eye on the username column. You'll use
this information in a minute. Keep the admin center open, too.
4. Start Excel.
5. Use the following screenshot as a template to create the migration file in Excel.
Start with the headings in row 1. Make sure they match the picture exactly and
don't contain spaces. The exact heading names are:
6. Next, enter the email address, username, and password for each mailbox you want
to migrate. Enter one mailbox per row:
Column A is the email address of the Microsoft 365 or Office 365 mailbox.
This is what is shown in the username column under Users > Active users in
the Microsoft 365 admin center.
A lot of email systems use the entire email address as the sign-in name.
Note also, if you are using the same domain in Microsoft 365 or Office
365 and your source email system, the columns A and B can be identical.
If you don't know the users' passwords, you'll need to reset them to
passwords that you do know, and then enter those passwords in the
migration file. This is inconvenient for users, but there's no way around this
unless your source email system supports using superuser credentials.
If you want users to have access to the source email system, you can
distribute new passwords to the source email system after the migration is
finished. We'll deal with getting the new passwords distributed after the
migration is finished.
7. Reset the passwords, and note the new passwords in your migration file. The exact
steps will depend on your source email system. You can probably find the option
to reset a password when you view the user's email account.
When you create a migration file in this task, you type your mailbox admin credentials
and usernames using a special format. This allows you to access user mailboxes without
knowing or resetting the user passwords. We provide the format used by Exchange,
Dovecot, and Mirapoint IMAP servers. If your source email system isn't listed here and
you don't know the correct format, you still have the option of resetting user passwords.
Skip this task and go to Create the list of user mailboxes when you know the user
passwords, or you'll reset the passwords.
You don't have to migrate all mailboxes at once. You can migrate them in batches at
your convenience. You can include up to 50,000 mailboxes (one row for each user) in
your migration file, which can be as large as 10 MB.
1. Go to your source email system (the one you're migrating from), and navigate to
the list of mailboxes you want to migrate. We'd give you the exact steps if we
could, but there are so many different email systems out there that you need to
find out these steps on your own. When you find the list of mailboxes, keep the
window open so you can refer to them.
3. Navigate to Users > Active users. Keep an eye on the username column. You'll use
this information in a minute. Keep the Microsoft 365 admin center page open, too.
4. Start Excel.
5. Use the following screenshot as a template to create the migration file in Excel.
Start with the headings in row 1. Make sure they match the screenshot exactly and
don't contain spaces. The exact heading names are:
6. Next, enter the email address, username, and password for each mailbox you want
to migrate. Enter one mailbox per row.
Column A is the email address of the user's Microsoft 365 or Office 365
mailbox. This is what's shown in the username column under Users > Active
users in the Microsoft 365 admin center.
7. Save the file as a CSV file type, and then close Excel.
Microsoft Exchange
If you're migrating email from the IMAP implementation for Exchange, use the format
Domain/Admin_UserName/User_UserName for the UserName attribute in the
migration file.
Let's say you're migrating email from Exchange for Alberta Greene, Bobby Overby, Irwin
Hume, Katrina Hernandez, and Mathew Slattery. You have a mailbox admin account,
where the username is mailadmin and the password is P@ssw0rd. Here's what your
migration file would look like:
Dovecot
Source email systems such as a Dovecot IMAP server that support Simple Authentication
and Security Layer (SASL), use the format User_UserName*Admin_UserName. Let's say
you're migrating email from a Dovecot IMAP server using the mailbox admin credentials
mailadmin and P@ssw0rd. Here's what your migration file would look like:
Mirapoint
If you're migrating email from Mirapoint Message Server, use the format
#user@domain#Admin_UserName#. Let's say you're migrating email using the mailbox
admin credentials mailadmin and P@ssw0rd. Here's what your migration file would look
like:
Courier IMAP and Oracle IMAP
Some source email systems such as Courier IMAP and Oracle IMAP don't support using
mailbox admin credentials to migrate mailboxes to Microsoft 365 or Office 365. Instead,
you can set up your source email system to use virtual shared folders. Virtual shared
folders allow you to use the mailbox admin credentials to access user mailboxes on the
source email system. For more information about how to configure virtual shared
folders for Courier IMAP, see Shared Folders .
To migrate mailboxes after you set up virtual shared folders on your source email
system, you have to include the optional attribute UserRoot in the migration file. This
attribute specifies the location of each user's mailbox in the virtual shared folder
structure on the source email system. For example, the path to Alberta's mailbox is
/users/alberta.
Leave the remaining information as the default settings; these will work for
most cases.
6. Click Next. The migration service uses the settings to test the connection to your
email server. If the connection works, the Enter general information page appears.
7. On the Enter general information page, type a Migration endpoint name, for
example, Test5-endpoint. Leave the other two boxes blank to use the default
values.
You use a migration batch to migrate groups of email to Microsoft 365 or Office 365
mailboxes at the same time. The batch consists of the mailboxes that you listed in the
migration file in the previous task.
Tip
We recommend that you create a test migration batch with a small number of
mailboxes to first test the process. > Use migration files with the same number of
rows, and run the batches at similar times during the day. Then compare the total
running time for each test batch. This comparison helps you estimate how long it
could take to migrate all your mailboxes, how large each migration batch should
be, and how many simultaneous connections to the source email system you
should use to balance migration speed and internet bandwidth.
4. On the Select the users page, click Browse to specify the migration file you
created. After you select your migration file, Microsoft 365 or Office 365 checks it
to make sure of the following:
It isn't empty.
It contains rows with the same number of columns as the header row.
If any one of these checks fails, you'll get an error that describes the reason
for the failure. If you get an error, you have to fix the migration file and
resubmit it to create a migration batch.
5. After Microsoft 365 or Office 365 validates the migration file, it displays the
number of users listed in the file as the number of mailboxes to migrate.
6. Click Next.
8. On this page, select the migration endpoint that you created in Step 3: Connect
Microsoft 365 or Office 365 to your email system.
9. On the Move configuration page, type the *name (no spaces or special characters)
of the migration batch, for example, Test5-migration, and then click Next.
The default migration batch name that's displayed is the name of the migration file
that you specified. The migration batch name is displayed in the list on the
migration dashboard after you create the migration batch.
You can also optionally enter the names of the folders you want to exclude from
migrating, for example Shared, Junk Email, and Deleted. Click New to add them
to the excluded list. You can also click Edit to change a folder name and Delete
to delete a folder name.
) Important
Choose Automatically start the batch. The migration starts as soon as you
save the new migration batch. The batch status is first Created and changes
to Syncing after the migration starts.
In the Exchange admin center, go to Recipients > Migration. Verify that the batch
is displayed in the migration dashboard. If the migration completed successfully,
the Status is Synced.
If this step task fails, check the associated Mailbox status reports for specific errors,
and double-check that your migration file has the correct Microsoft 365 or Office
365 email address in the EmailAddress column.
Using new EAC
To migrate email successfully, Microsoft 365 or Office 365 needs to connect and
communicate with the source email system. To do this, Microsoft 365 or Office 365 uses
a migration endpoint. This is a technical term that describes the settings that are used to
create the connection. You create the migration endpoint and migration batch in this
task.
2. Go to Migration.
4. On the Add migration batch page, type the name (no spaces or special characters)
of the migration batch in the Give migration batch a unique name field, for
example, Test5-migration.
5. Select Migrate to Exchange Online in the dropdown Select the mailbox migration
path, and then click Next.
6. In the Select the migration type page, select IMAP migration in the Select the
migration type dropdown and then click Next.
7. In the Prerequisites for IMAP migration page, check to see if you completed all
the prerequisites and then click Next.
8. In the Set a migration endpoint, select Create a new migration endpoint and then
click Next.
9. In the Migration endpoint name page , type a Migration endpoint name, for
example, Test5-endpoint. Leave the other two boxes as-is to use the default values
and then click Next.
12. In the Check endpoint setup status, verify that the new endpoint created message
appears and then Click Next.
13. In the Add user mailboxes page, , click Browse to specify the migration file you
created and then Click Next.
15. In the Schedule batch migration page, select the desired options for reporting and
start and end migration batch modes and then click Save , and then click Done.
In the new Exchange admin center, navigate to Migration > Batch, select the
migration batch and then in the details pane, under Migration details, click View
details. For more information, see Migration users status report.
If this step task fails, check the associated Mailbox status reports for specific errors,
and double-check that your migration file has the correct Microsoft 365 or Office
365 email address in the EmailAddress column.
Sign in to Microsoft 365 or Office 365 with your work or school account. Use
your temporary password.
Update your password, and set your time zone. It's important that you select
the correct time zone to make sure your calendar and email settings are correct.
When Outlook on the web opens, send an email message to another Microsoft
365 or Office 365 user to verify that you can send email.
Choose Outlook, and check that your email messages and folders are all there.
When people outside of your organization send you email, their email systems don't
double-check where to send that email every time. Instead, their systems save the
location of your email system based on a setting in your DNS server known as a time-
to-live (TTL). If you change the location of your email system before the TTL expires,
they'll try to send you email at the old location first before figuring out that the location
changed. This can result in a mail delivery delay. One way to avoid this is to lower the
TTL that your DNS server gives to servers outside of your organization. This will make
the other organizations refresh the location of your email system more often.
Using a short interval, such as 3,600 seconds (one hour) or less, means that most email
systems will ask for an updated location every hour. We recommend that you set the
interval at least this low before you start the email migration. This allows all the systems
that send you email enough time to process the change. Then, when you make the final
switch over to Microsoft 365 or Office 365, you can change the TTL back to a longer
interval.
The place to change the TTL setting is on your email system's mail exchanger record,
also called an MX record. This lives on your public facing DNS system. If you have more
than one MX record, you need to change the value on each record to 3,600 or less.
Don't worry if you skip this task. It might take longer for email to start showing up in
your new Microsoft 365 or Office 365 mailboxes, but it will get there.
If you need some help configuring your DNS settings, head over to Add DNS records to
connect your domain. If you are using Office 365 operated by 21Vianet in China, see this
version of the article instead: Create DNS records for Office 365 when you manage your
DNS records.
For many DNS providers, we have specific instructions to change your MX records, see
Add DNS records to connect your domain. If you are using Office 365 operated by
21Vianet in China, see this version of the article instead: Create DNS records for Office
365 when you manage your DNS records. If your DNS provider isn't included, or you
want to get a sense of the general directions, we've provided general MX record
instructions as well, see Add DNS records to connect your domain, or for Office 365 in
China, see this version of the article: Add DNS records to connect your domain.
It can take up to 72 hours for the email systems of your customers and partners to
recognize the changed MX record. Wait at least 72 hours before you proceed to the next
task to stop email synchronization.
Your users are using Microsoft 365 or Office 365 exclusively for email. After you
delete the migration batch, email that is sent to mailboxes on your source email
system isn't copied to Microsoft 365 or Office 365. This means your users can't get
that email, so make sure that users are all on the new system.
Let the migration batch run for at least 72 hours before you delete it. This makes
the following two things much more likely:
Your source email system and Microsoft 365 or Office 365 mailboxes were
synchronized at least once (they synchronize once a day).
The email systems of your customers and partners have recognized the changes
to your MX records and are now properly sending email to your Microsoft 365
or Office 365 mailboxes.
When you delete the migration batch, the migration service cleans up any records
related to the migration batch and removes it from the migration dashboard.
2. On the migration dashboard, select the batch, and then click Delete.
Delete a migration batch using new EAC
2. On the migration dashboard, select the batch, and then click Delete.
In the Exchange admin center, go to Recipients > Migration. Verify that the
migration batch is no longer listed on the migration dashboard.
In the new Exchange admin center, go to Migration > Batch. Verify that the
migration batch is no longer listed on the migration dashboard.
See also
Migrate your IMAP mailboxes to Microsoft 365 or Office 365
After you've added your users to Microsoft 365 or Office 365, you can use Internet
Message Access Protocol (IMAP) to migrate email for those users from their IMAP-
enabled email servers.
) Important
Before you can use an IMAP migration for your users, they must have been first
added to your Microsoft 365 or Office 365 organization. For instructions, see Add
users individually or in bulk.
Before you migrate, read What you need to know about migrating your IMAP mailboxes
to Microsoft 365 or Office 365.
) Important
IMAP migration in the Microsoft 365 admin center has been replaced by IMAP
migration by using the Exchange admin center (EAC). To perform an IMAP
migration by using the EAC, see Migrate other types of IMAP mailboxes to
Microsoft 365 or Office 365.
To migrate Exchange mail to Microsoft 365 or Office 365, see Use express migration to
migrate Exchange mailboxes to Microsoft 365 or Office 365
Related Topics
Prepare your Gmail or Google Apps account for connecting to Outlook and Microsoft
365 or Office 365
To migrate your email by using Internet Message Access Protocol (IMAP) migration,
Microsoft 365 or Office 365 needs to know the name and connection settings of your
IMAP server.
3. In the Search all settings box, start typing "pop", and in the results, select POP and
IMAP.
4. In POP and IMAP settings, your IMAP server name is listed in the IMAP setting
section.
Note: The IMAP server for Gmail is: imap.gmail.com.
For more information about IMAP connections in Microsoft 365 or Office 365, see POP
and IMAP email settings for Outlook .
Security: This is the encryption method used by the IMAP server. The default value
for secure sockets layer (SSL) is appropriate for most IMAP servers.
Port: This is the TCP port number that's used to connect to the IMAP server. In
Microsoft 365 or Office 365, the only available value is 993 for SSL connections.
Port 993 is appropriate for most IMAP servers.
Tips for optimizing IMAP migrations in
Exchange Online
Article • 02/22/2023
When you undertake an Internet Message Access Protocol (IMAP) migration from an
on-premises Exchange Server to Microsoft 365 or Office 365, you have a few choices for
optimizing the migration performance.
Increase the connection limits to your IMAP server: Many firewalls and email
servers have per-user limits, per-IP address limits, and overall connection limits.
Before you migrate mailboxes, make sure that your firewall and IMAP server are
configured to allow a large, or maximum, number of connections for the following
settings:
Run one or more test migration batches: Run a few small IMAP migration batches
before you migrate larger numbers of users. In a test migration, you can do the
following:
Verify that folders you exclude aren't migrated to Microsoft 365 or Office 365
mailboxes.
Use CSV files with the same number of rows and run the batches at similar
times during the day. Then compare the total running time for each test batch.
This comparison will help you estimate how long it will take to migrate all your
mailboxes, how large each migration batch should be, and how many
simultaneous connections to the IMAP server you should use to balance
migration speed and internet bandwidth.
Use administrator credentials in the CSV file to migrate email: This method is the
least disruptive and inconvenient for users, and it will help minimize
synchronization errors caused when users change the password on their on-
premises account. It also saves you from having to obtain or change user
passwords. If you use this method, be sure to verify that the administrator account
you use has the necessary permissions to access the mailboxes you're migrating.
7 Note
If you decide to use user credentials in the CSV file, consider globally
changing users' passwords, and then preventing users from changing their
password on their on-premises account before you migrate their mailboxes. If
users change their password before their mailbox is migrated to the cloud-
based mailbox, the migration will fail. If they change their password after the
mailbox is migrated, new email sent to their mailbox on the IMAP server won't
be migrated to their Microsoft 365 or Office 365 mailbox.
Don't delete mailboxes or change their SMTP addresses during migration: The
migration system will report an error when it can't find a mailbox that's been
migrated. Be sure to complete the migration and delete the migration batch
before you delete or change the SMTP address of a Microsoft 365, Office 365, or
on-premises mailbox that's been migrated.
Communicate with your users: Let users know ahead of time that you'll be
migrating the content of their on-premises mailboxes to your Microsoft 365 or
Office 365 organization. Consider the following:
Tell users that email messages larger than 35 MB won't be migrated. Ask users
to save very large messages and attachments to their local computer or to a
removable USB drive.
Ask users to delete old or unnecessary email messages from their on-premises
mailboxes before migration. This helps reduce the amount of data that has to
be migrated and can help reduce the overall migration time. Or you can clean
up their mailboxes yourself.
Folders with a forward slash ( / ) in the folder name aren't migrated. If users
want to migrate folders that contain forward slashes in their names, they have
to rename the folders or replace the forward slashes with a different character,
such as an underscore character ( _ ) or a dash ( - ).
CSV files for IMAP migration batches in
Exchange Online
Article • 02/22/2023
The comma-separated values (CSV) file that you use to migrate the contents of users'
mailboxes in an IMAP migration contains a row for each user. Each row contains
information about the user's Office 365 mailbox and IMAP mailbox, and Office 365 uses
this information to process the migration.
Required attributes
Here are the required attributes for each user:
EmailAddress specifies the user ID for the user's Office 365 mailbox.
UserName specifies the user logon name for the user's mailbox on the IMAP
server. You can use either the username or domain\username format. For example,
hollyh or contoso\hollyh .
Password is the password for the user's account in the IMAP messaging system.
The migration will fail if any one of these attributes isn't included in the header row of
the CSV file. Also, be sure to type the attributes exactly as they're shown. Attributes can't
contain spaces. They must be a single word. For example, Email Address is invalid. You
must use EmailAddress.
CSV
EmailAddress,UserName,Password
terrya@contoso.edu,contoso\terry.adams,1091990
annb@contoso.edu,contoso\ann.beebe,2111991
paulc@contoso.edu,contoso\paul.cannon,3281986
The first row, or header row, of the CSV file lists the names of the attributes, or fields,
specified in the rows that follow. Each attribute name is separated by a comma.
Each row under the header row represents one user and supplies the information that
will be used to migrate the user's mailbox. The attribute values in each row must be in
the same order as the attribute names in the header row. Each attribute value is
separated by a comma.
Use any text editor, or an application like Microsoft Excel, to create the CSV file. Save the
file as a .csv or .txt file.
Tip
If the CSV file contains non-ASCII or special characters, save the CSV file with UTF-8
or other Unicode encoding. Depending on the application, saving the CSV file with
UTF-8 or other Unicode encoding might be easier when the system locale of the
computer matches the language used in the CSV file.
If you plan to migrate lots of users, decide which ones to include in each batch. For
example, if you have 10,000 accounts to migrate, you could run four batches with 2,500
users each. You could also divide the batches alphabetically; by user type, such as
faculty, students, and alumni; by class, such as freshman, sophomore, junior, and senior;
or in other ways that meet your organization's needs.
Tip
One strategy is to create Office 365 mailboxes and migrate email for the same
group of users. For example, if you import 100 new users to your Microsoft 365 or
Office 365 organization, create a migration batch for those same 100 users. This is
an effective way to organize and manage your migration from an on-premises
messaging system to Office 365.
Tip
If you use this option, prevent users from changing the passwords of their on-
premises accounts. If users change their passwords after the initial migration,
subsequent synchronizations between the mailboxes on the IMAP server and
Office 365 mailboxes will fail.
Use super-user or administrator credentials: This requires that you use an account
in your IMAP messaging system that has the necessary rights to access all user
mailboxes. In the CSV file, you use the credentials for this account for each row. To
learn whether your IMAP server supports this approach and how to enable it, see
the documentation for your IMAP server.
7 Note
7 Note
When you submit a new migration request, the CSV file is uploaded to the
Microsoft datacenter over a Secure Sockets Layer (SSL) connection. The information
from the CSV file is encrypted and stored on the Microsoft Exchange servers at the
Microsoft datacenter.
The following sections explain how to format the administrator credentials in the CSV
file that you use to migrate email from different types of IMAP servers.
Microsoft Exchange
If you're migrating email from the IMAP implementation for Microsoft Exchange, use the
format Domain/Admin_UserName/User_UserName for the UserName attribute in the
CSV file. Let's say you're migrating email from Exchange for Terry Adams, Ann Beebe,
and Paul Cannon. You have a mail administrator account, where the username is
mailadmin and the password is P@ssw0rd. Here's what your CSV file would look like:
CSV
EmailAddress,UserName,Password
terrya@contoso.edu,contoso-students/mailadmin/terry.adams,P@ssw0rd
annb@contoso.edu,contoso-students/mailadmin/ann.beebe,P@ssw0rd
paulc@contoso.edu,contoso-students/mailadmin/paul.cannon,P@ssw0rd
Dovecot
For IMAP servers that support Simple Authentication and Security Layer (SASL), such as
a Dovecot IMAP server, use the format User_UserName*Admin_UserName, where the
asterisk ( * ) is a configurable separator character. Let's say you're migrating those same
users' email from a Dovecot IMAP server using the administrator credentials mailadmin
and P@ssw0rd. Here's what your CSV file would look like:
CSV
EmailAddress,UserName,Password
terrya@contoso.edu,terry.adams*mailadmin,P@ssw0rd
annb@contoso.edu,ann.beebe*mailadmin,P@ssw0rd
paulc@contoso.edu,paul.cannon*mailadmin,P@ssw0rd
Mirapoint
If you're migrating email from Mirapoint Message Server, use the format
#user@domain#Admin_UserName# for the administrator credentials. To migrate email
from Mirapoint using the administrator credentials mailadmin and P@ssw0rd, your CSV
file would look like this:
CSV
EmailAddress,UserName,Password
terrya@contoso.edu,#terry.adams@contoso-students.edu#mailadmin#,P@ssw0rd
annb@contoso.edu,#ann.beebe@contoso-students.edu#mailadmin#,P@ssw0rd
paulc@contoso.edu,#paul.cannon@contoso-students.edu#mailadmin#,P@ssw0rd
To migrate mailboxes after you set up virtual shared folders on your IMAP server, you
have to include the optional attribute UserRoot in the CSV file. This attribute specifies
the location of each user's mailbox in the virtual shared folder structure on the IMAP
server.
EmailAddress,UserName,Password,UserRoot
terrya@contoso.edu,mailadmin,P@ssw0rd,/users/terry.adams
annb@contoso.edu,mailadmin,P@ssw0rd,/users/ann.beebe
paulc@contoso.edu,mailadmin,P@ssw0rd,/users/paul.cannon
Prepare your Gmail or Google
Workspace (formerly G Suite) account
for connecting to Outlook and
Microsoft 365 or Office 365
Article • 02/22/2023
) Important
The ability to add new accounts to Outlook on the web using the Connected
accounts feature was removed in September 2018.
Before you connect to your Gmail account from Outlook on the web, or add a
Gmail account to Outlook, you need to prepare your Gmail account. You need to turn
on 2-step verification for Gmail and then create an app password that Office 365 will use
with your Gmail address to make the connection.
You'll also have to do this if your admin is planning to migrate your Gmail or Google
Workspace Gmail to Microsoft 365 or Office 365.
2. Select the gear icon located at the top right of the screen.
5. Scroll down to the IMAP access, and make sure that Enable IMAP is selected.
4. Under the Password & sign-in method, choose the arrow next to the 2-Step
verification, and provide your password if asked.
7 Note
If you have a google apps account and you can't see this setting, your admin
has to first turn it on. For instructions (for admin), see Enable 2-step
verification for your Google Workspace users.
6. Re-enter your password if asked, and in the Set up your phone step, enter or verify
your cell phone. On the next step, enter the verification number sent to your cell
phone and choose Verify.
7. In the Trust this computer step, choose Next, and in the Turn on 2-step
verification step choose Confirm.
4. Under the Password & sign-in method, choose the arrow next to the App
passwords, and provide your password if asked.
5. On the App passwords page, in the Select app drop-down choose Other (custom
name).
Note the app password under Your app password for your device. You can use
this with your Gmail address in the app you're connecting to your Gmail account
(or adding you Gmail account to). This combination grants complete access to
your Gmail account by the app that is using it.
After you've entered the app password, you don't have to remember it.
) Important
7. Now you're ready to add your Gmail account to Outlook. When you're prompted
for a password, you enter this app password for your Gmail account. Don't enter
your Gmail password. For instructions on adding your Gmail account to Outlook,
see these articles:
4. Under the Password & sign-in method, choose the arrow next to the App
passwords, and provide your password if asked.
5. On the App passwords page, select REVOKE next to the app password you want to
revoke.
Related Topics
Migrate email and contacts to Microsoft 365
Two-step verification helps protect you by making it more difficult for someone else to
sign in to your email account. It uses two different forms of identity: your password, and
a contact method. Even if someone else finds your password, they'll be stopped if they
don't have access to your other devices or accounts.
You set up two-step verification with an email address, phone number, or authenticator
app. When you sign in on a new device or from a new location, we'll send you a security
code that you enter on the sign-in page as a second form of authentication in addition
to your password.
After you have setup two-step verification, you can also obtain an app password that
you will have to use in order to use Internet Message Access Protocol (IMAP) migration
to copy email from your Outlook.com or Hotmail.com account to your Microsoft 365 or
Office 365 for business account. If your Microsoft 365 or Office 365 admin is moving
email messages from your Outlook.com or Hotmail.com account to Microsoft 365 or
Office 365 on your behalf, you'll need to give them your app password.
If you want to navigate to the Security settings page, in Outlook.com click or tap
your profile picture on the upper right > View account and on the Account page,
On your Account page, choose Security on the blue bar and then, more security
options.
3. Scroll down the page and choose Set up two-step verification under Two-step
verification.
4. Choose Next to start the setup wizard.
5. On the Set up your smart phone with an app password page, under the Update
your Windows Phone 8 (or earlier) with an app password list, note the 16-digit
app password in the list:
) Important
Even though the page indicates this is for Windows Phone 8 (or earlier), this
list contains the app password your admin needs to migrate you
hotmail.com or outlook.com email to Office 365 for business. You will need
this app password even if you set up two-step verification by using an
Android or iPhone.
This is also the app password you or your admin will use to migrate your
hotmail.com or outlook.com email to Microsoft 365 or Office 365 for business.
6. On your mobile device, download the Microsoft Authenticator from your app
store.
7. Open the Microsoft Authenticator app on your mobile device, and choose +. Scan
the code on the Set up an authenticator app page.
8. In step 4 on the Set up an authenticator app page, type the six-digit code that's
displayed on your mobile device (for example, 555111; you don't need to include
any spaces).
You don't need to memorize this password; it changes constantly and a new one is
sent to you via the Microsoft Authenticator app. This is why it's so secure.
Whenever you sign in to your email account from a new device or location, look at
your Microsoft Authenticator app and sign in using latest app password that's
been sent to you instead of using your old static password.
9. You'll get a message that two-step verification is turned on. Print your new
recovery code (this isn't your app password). If you ever need to recover, access to
this account, this recovery code will help. It's a good idea to keep it tucked away in
a safe place.
If you want to migrate email for your Google app users to Microsoft 365 or Office 365,
the users need to create an app password that you will use together with their Google
apps password to connect to their Gmail. Before they can create an app password, you
will have to allow them to turn on two-step verification in the Google Admin console.
4. Your users can now turn on two-step verification and create an app password as
described here: Prepare your Gmail account for connecting to Outlook and
Microsoft 365 or Office 365.
Perform a Google Workspace (formerly
G Suite) migration to Microsoft 365 or
Office 365
Article • 06/09/2023
) Important
Effective from December 2022, the classic Exchange Admin Center will be
deprecated for worldwide customers. Microsoft recommends using the new
Exchange Admin Center , if not already doing so.
While most of the features have been migrated to new EAC, some have been
migrated to other admin centers and remaining ones will soon be migrated to New
EAC. Find features that are not yet there in new EAC at Other Features or use
Global Search that will help you navigate across new EAC.
You can migrate the following functionalities from Google Workspace to Microsoft 365
or Office 365:
You can migrate batches of users from Google Workspace to Microsoft 365 or Office
365, allowing a migration project to be done in stages. This migration requires that you
provision all of your users who will be migrated as mail-enabled users outside of the
migration process. You must specify a list of users to migrate for each batch.
All procedures in this article assume that your Microsoft 365 or Office 365 domain is
verified and that your TXT records have been set up. For more information, see Set up
your domain (host-specific instructions).
7 Note
Migration limitations
7 Note
The largest single email message that can be migrated is based on the transport
configuration for your configuration. The default limit is 35 MB. To increase this
limit, see Office 365 now supports larger email messages .
Throughput limitations for contacts and calendars completely depend on the quota
restrictions for your tenant's service account on the Google Workspace side.
Contacts A maximum of three email addresses per contact are migrated over
Contacts Gmail tags, contact URLs, and custom tags will not be migrated
Tip
Rules will be migrated and remain turned off by default. We advise users to verify
the rules on Outlook before enabling them.
If you will be starting your migration batch with Exchange Online Powershell, as
described later in this article, use the -ExcludeFolder parameter to prevent certain
folders from being migrated. This reduces the amount of data in your migration,
and the size of a user's new Exchange Online mailbox. You can identify folders you
don't want to migrate by name, and you can also identify Gmail labels that apply to
multiple messages in order to exclude those messages from the migration. For
more information on using -ExcludeFolder , see New-MigrationBatch.
To skip the migration of Gmail filters, use the -SkipRules parameter to prevent the
migration of Outlook rules. For more information on using -SkipRules , see New-
MigrationBatch.
Prerequisites
Ensure you complete the following prerequisites before initiating either manual or
automated Google Workspace migration:
1. Ensure you have been assigned a project creator role and you are signed into
Google Workspace with the project creator credentials.
2. Ensure you complete the following procedures before initiating the migration
process:
a. Create a subdomain for mail routing to Microsoft 365 or Office 365
b. Create a subdomain for mail routing to your Google Workspace domain
c. Provision users in Microsoft 365 or Office 365
For detailed information on these steps, see Google Workspace migration prerequisites.
Google Workspace migration
prerequisites in Exchange Online
Article • 04/24/2023
7 Note
Before you start the migration to Microsoft 365, ensure that as an administrator, as
minimum privileges, you have the "Recipient Management" role group assigned.
For more information, see Exchange Admin Center > Roles > Admin Roles.
The following procedures must be performed (in the order mentioned) before you start
the process of Google Workspace migration:
7 Note
The option Add a domain won't be available if using the legacy free edition of
G Suite.
3. Enter the domain that you'll use for routing mails to Microsoft 365 or Office 365,
select User alias domain, and then select ADD DOMAIN & START VERIFICATION.
A subdomain of your primary domain is recommended (for example,
"o365.fabrikaminc.net", when "fabrikaminc.net" is your primary domain) so that it
will be automatically verified. If another domain (such as
"fabrikaminc.onmicrosoft.com") is set, Google will send emails to each individual
address with a link to verify the permission to route mail. Migration won't
complete until the verification is completed.
Keep track of the name of the domain you enter because you'll need it for the
subsequent steps, and for using it as the Target Delivery Domain in the process of
Creating a migration batch in Microsoft 365 or Office 365.
7 Note
4. Follow any subsequent steps that are then required to verify your domain till the
status is shown as Active. If you chose a subdomain of your primary domain
(created in step 3), your new domain may have been verified automatically.
5. Sign in to your DNS provider and update your DNS records so that you have an
MX record at the domain you created (in step 3), pointing to Microsoft 365 or
Office 365. Ensure that this domain (created in step 3) is an accepted domain in
Microsoft 365 or Office 365. Follow the instructions in Add a domain to Microsoft
365 to add the Microsoft 365 or Office 365 routing domain
("o365.fabrikaminc.net") to your organization and to configure DNS to route mail
to Microsoft 365 or Office 365.
7 Note
3. Enter the domain that you'll use for routing mails to Google Workspace, select
User alias domain, and then select ADD DOMAIN & START VERIFICATION. A
subdomain of your primary domain is recommended (for example,
"gsuite.fabrikaminc.net", when "fabrikaminc.net" is your primary domain) so that it
will be automatically verified.
4. Follow any subsequent steps that are then required to verify your domain till your
domain's status is shown as Active. If you chose a subdomain of your primary
domain (created in step 3), your new domain may have been verified automatically.
5. Follow Google's instructions to Set up MX records for Google Workspace Gmail
for this domain.
7 Note
It may take up to 24 hours for Google to propagate this setting to all the
users in your organization.
) Important
If you are using non-default Transport settings in your Microsoft 365 or Office
365 organization, you should check whether the mail flow will work from
Office 365 to Google Workspace. Ensure that either your default Remote
Domain ("*") has Automatic Forwarding enabled, or that there is a new
Remote Domain for your Google Workspace routing domain (for example,
"gsuite.fabrikaminc.net") that has Automatic Forwarding enabled.
The Google Migration administrator needs the following permissions to complete these
steps:
resourcemanager.projects.create
iam.ServiceAccounts.create
The most secure way to achieve completion of these four steps is to assign the following
roles to the Google Migration administrator:
Projector Creator
Service Accounts Creator
1. Navigate to https://console.developers.google.com .
5. Select the appropriate resource and in the right-hand pane under the Permissions
tab, select Add Principal.
6. Enter your Google Migration administrator credentials, enter Project Creator in the
filter, and select Project Creator.
7. Select Add Another Role, enter Create Service Accounts in the filter, and select
Create Service Accounts.
8. Select Save.
7 Note
Before proceeding with either method, ensure that Mail Users have been provisioned for
every user in the organization who will be migrated (either now or eventually). If any
users aren't provisioned, provision them using the instructions in Manage mail users.
For more advanced scenarios, you may be able to deploy Azure Active Directory (Azure
AD) Connect to provision your Mail Users. For more information, see Deploy Microsoft
365 Directory Synchronization in Microsoft Azure for an overview, and Set up directory
synchronization for Microsoft 365 for setup instructions. Then, you need to deploy an
Exchange server in your on-premises environment for user management, and mail-
enable your users using this server. For more information, see How and when to
decommission your on-premises Exchange servers in a hybrid deployment and Manage
mail users. Once the Mail Users have been created in Microsoft 365, the Azure AD
Connect may need to be disabled to allow the migration process to convert these users
into mailboxes. For more information, see Turn off directory synchronization for
Microsoft 365.
We recommend that the primary address (sometimes referred to as the "User ID") for
each user be at the primary domain (for example, "will@fabrikaminc.net"). Typically, this
requirement means that the primary email address should match between Microsoft 365
or Office 365 and Google Workspace. If any user is provisioned with a different domain
for their primary address, then that user should atleast have a proxy address at the
primary domain. Each user should have their ExternalEmailAddress point to the user in
their Google Workspace routing domain ("will@gsuite.fabrikaminc.net"). The users
should also have a proxy address that will be used for routing to their Microsoft 365 or
Office 365 routing domain (for example, "will@o365.fabrikaminc.net").
7 Note
We recommend that the Default MRM Policy and Archive policies be disabled for
these users until their migration has been completed. When such features remain
enabled during migration, there is a chance that some messages will end up being
considered "missing" during the content verification process.
Perform an automated Google
Workspace migration to Microsoft 365
or Office 365 in the new EAC in
Exchange Online
Article • 01/26/2023
With the new Exchange admin center (EAC), the migration of mails, contacts, and
calendar from Google Workspace to Microsoft 365 or Office 365 has been automated.
The process has now been simplified to the extent that several of the manual steps that
a user had to perform manually are no longer required.
7 Note
) Important
You have to implement all the steps specified in Google Workspace migration
prerequisites in Exchange Online prior to starting the migration process.
Otherwise, the Google Workspace migration to Microsoft 365 or Office 365 won't
be successful.
Therefore, Microsoft strongly recommends disabling all MRM and archival policies
before attempting any data migration to mailboxes.
When you're finished, select Next. The Select the migration type page appears.
4. Verify that the Automate the configuration of your Google Workspace for
migration section is expanded, and then select Start in that section to automate
the four required prerequisite steps.
5. In the Google sign-in page that appears, sign in to your Google account to validate
your APIs. Once the APIs are successfully validated, the following things happen:
6. Select the API access link. You'll be redirected to Google Admin API Controls page.
7. Select Add new. Copy the ClientID and Scope from the EAC, paste it here, and then
select Authorize.
8. Once the four prerequisites-related steps are completed, select Next. The Set a
migration endpoint page appears.
Select the migration endpoint: Select the existing migration endpoint from
the drop-down list.
Create a new migration endpoint: Select this option if you're a first-time
user.
7 Note
Email address: Enter the email address that you use to sign in to the
Google Workspace.
JSON key: Select Import JSON. In the dialog box that appears, find and
select the downloaded JSON file, and then select Open.
Once the endpoint is successfully created, it will be listed in the Select
migration endpoint drop-down list.
Select the endpoint from the drop-down list, and select Next. The Add
user mailboxes page appears.
10. Select Import CSV file and navigate to the folder where you've saved the CSV file.
If you haven't already saved or created the CSV file, create a CSV file containing the
set of names of the users you want to migrate. You'll need its filename below. The
allowed headers are:
CSV
EmailAddress
will@fabrikaminc.net
user123@fabrikaminc.net
When you're finished, select Next. The Move configuration page appears.
11. From the Target delivery domain drop-down list, select the target delivery domain
(the subdomain) that was created as part of fulfilling the Google Workspace
migration prerequisites in Exchange Online.
7 Note
The target delivery domain (the subdomain) you select in this step can be
either an existing one or the one that you've created in Google Workspace
migration prerequisites in Exchange Online.
If you don't see the target delivery domain that you want to select in the
Target delivery domain drop-down list, you can manually enter the name of
the target delivery domain in the text box.
The text box in which you manually enter the name of the target delivery
domain is Target delivery domain. That is, the text box is effectively the
Target delivery domain drop-down list which is taking the role of a text box
when you manually enter text into it.
Filtering options have been introduced for the migration of Google Workspace to
Microsoft 365 or Office 365. For more information on these filtering options, see
Filtering Options for Google Workspace migration.
12. On the Schedule batch migration page, verify all the details, select Save, and then
select Done.
Once the batch status changes from Syncing to Synced, you need to complete the
batch.
Mail
Calendar
Contacts
Rules
Perform manual migration of Google
Workspace in Exchange Online
Article • 01/26/2023
You can perform manual migration of Google Workspace to Microsoft 365 or Office 365
in new EAC and Classic EAC.
Perform a manual Google Workspace
Migration to Microsoft 365 or Office
365 in the new EAC
Article • 01/26/2023
The migration process takes several steps and can take from several hours to a couple
of days depending on the amount of data you are migrating.
Prerequisites
Before you begin Google Workspace migration:
) Important
Therefore, Microsoft strongly recommends disabling all MRM and archival policies
before attempting any data migration to mailboxes.
3. On the Select the migration type page, select Google Workspace (Gmail)
migration, and then click Next
4. On the Prerequisites for Google Workspace migration page, expand the Manually
configure your Google Workspace for migration. As described in the section,
configure the following steps:
a. Create a Google Service Account
b. Enable API Usage in your project
c. Grant access to the service account for your Google tenant
5. On the Set a migration endpoint page of the wizard, select one of the following
options:
Select the migration endpoint: Select the existing migration endpoint from
the drop down list.
Create a new migration endpoint: Select this option if you're a first-time
user.
7 Note
Email address: Enter the email address that you use to sign in to the
Google Workspace.
JSON key: Click Import JSON. In the dialog that appears, find and select
the downloaded JSON file, and then click Open.
Select the endpoint from the drop-down list, and click Next.
6. On the Add user mailboxes page, click Import CSV file and navigate to the folder
where you have saved the CSV file.
If you haven't already, create a CSV file containing the set of all of the users you
want to migrate. You will need its filename below. The allowed headers are:
CSV
EmailAddress
will@fabrikaminc.net
user123@fabrikaminc.net
7. On the Move configuration page, enter the details and then click Next.
8. On the Schedule batch migration page, verify all the details, click Save, and then
click Done.
Once the batch status changes from Syncing to Synced, you need to complete the
batch.
The migration process takes several steps and can take from several hours to a couple
of days depending on the amount of data you are migrating.
Prerequisites
Before you begin Google Workspace migration:
4. Select + Create service account, enter a name, choose Create and then Done.
5. Open the Actions menu, select Edit, and take note of the Unique ID. You'll need
this ID later in the process.
7. Select Enable G Suite Domain-wide Delegation, enter a product name for the
consent screen, and choose Save.
7 Note
The product name is not used by the migration process, but is needed to save
in the dialog.
9. Choose JSON, then Create. The private key is saved to the download folder on
your device.
1. Go to the Developer page for API Library and sign in as the Google user you
used above in Create a Google Service Account.
3. Search for the following APIs; each one must be enabled. Select Enable to enable
them for your project:
Gmail API
Google Calendar API
Contacts API
People API
4. In Client ID, type the ClientId for the service account you created in the Create a
Google Service Account section above.
https://mail.google.com/,https://www.googleapis.com/auth/calendar,https://www.
google.com/m8/feeds/,https://www.googleapis.com/auth/gmail.settings.sharing,ht
tps://www.googleapis.com/auth/contacts
If the OAuth Scopes are entered incorrectly, the resulting list won't match and the
migration process will fail later, after you start the migration batch.
6. Click Authorize. Verify that the resulting list shows the expected four (4) OAuth
scopes.
) Important
It may take anywhere from 15 minutes to 24 hours for these settings to
propogate.
2. Click "New" to create a new migration batch, and then click Migrate to
Exchange Online.
3. In the New Migration Batch window, select G Suite (Gmail) migration, and then
click Next.
4. Create a CSV file containing the set of all of the users you want to migrate. You will
need its filename below. The allowed headers are:
CSV
EmailAddress
will@fabrikaminc.net
user123@fabrikaminc.net
5. Under Select the users, click Choose File and navigate to the CSV file of all the
users you are migrating in this batch. If your CSV file contains more columns
besides the two mentioned above, click to select Allow unknown columns in the
CSV file.
6. After selecting the CSV file, click Open. Back on the new migration batch page,
click Next.
7. Enter the email address for the super admin within the Google Workspace
environment. This is not the service account you just created, it should be the
email address of the Google Workspace admin. This email address will be used to
test connectivity between Google Workspace and Microsoft 365 or Office 365.
8. Under Specify the service account credentials using the JSON key file, click
Choose File, and then select the JSON file that was downloaded automatically
when you created your service account. This file contains the private key for the
service account. Click Open to select the file, and then, back on the new migration
batch page, click Next.
7 Note
Click to select Skip verification if you don't want to verify the migration
endpoint.
9. In the fields under Move configuration, name your migration batch, and enter the
target delivery domain, which is the domain you created for routing mail to the
Microsoft 365 or Office 365 target organization from the Google Workspace
source organization. Optionally, you can also specify any folders that should be
excluded from the migration. When done, click Next.
7 Note
The target delivery domain you will want to use will not automatically show
up in the dropdown - instead you should click within the text box and type it
in. The target delivery domain must be different from the primary domain of
the users in Google Workspace.
10. Decide how you want to begin and complete the migration batch.
4. Select + Create service account, enter a name, choose Create and then Done.
5. Open the Actions menu, select Edit, and take note of the Unique ID. You'll need
this ID later in the process.
7. Select Enable G Suite Domain-wide Delegation, enter a product name for the
consent screen, and choose Save.
7 Note
The product name is not used by the migration process, but is needed to save
in the dialog.
9. Choose JSON, then Create. The private key is saved to the download folder on
your device.
10. Select Close.
1. Go to the Developer page for API Library and sign in as the Google user you
used above in Create a Google Service Account.
3. Search for the following APIs; each one must be enabled. Select Enable to enable
them for your project:
Gmail API
Google Calendar API
Contacts API
People API
2. Click Security, then click API Controls, and then click Manage Domain Wide
Delegation.
4. In Client ID, type the ClientId for the service account you created in the Create a
Google Service Account section above.
5. In OAuth Scopes, add the required scopes in comma-separated format, with no
spaces in between. For example:
https://mail.google.com/,https://www.googleapis.com/auth/calendar,https://www.
google.com/m8/feeds/,https://www.googleapis.com/auth/gmail.settings.sharing,ht
tps://www.googleapis.com/auth/contacts
If the OAuth Scopes are entered incorrectly, the resulting list won't match and the
migration process will fail later, after you start the migration batch.
6. Click Authorize. Verify that the resulting list shows the expected four (4) OAuth
scopes.
) Important
2. Find the email address for the super admin within the Google Workspace
environment. This email address will be used to test connectivity between Google
Workspace and Microsoft 365 or Office 365. The following steps use 'admin123' as
an example.
PowerShell
PowerShell
CSV
EmailAddress
will@fabrikaminc.net
user123@fabrikaminc.net
PowerShell
Tip
PowerShell
7 Note
When the batch starts, all the users to be migrated will be converted from
MailUsers to Mailboxes. The Microsoft 365 or Office 365 Exchange license
must be assigned only after this moment. You have 30 days to assign the
license.
Based on whether you are using New EAC, Classic EAC, or PowerShell cmdlets to
perform the migration, the completion process differs.
In new EAC, when the migration batch has reached the state of Synced, it needs to be
completed.
7 Note
When the batch starts, all the users to be migrated will be converted from
MailUsers to Mailboxes. The Microsoft 365 or Office 365 Exchange license must be
assigned only after this moment. You have 30 days to assign the license
During completion, another incremental sync is run to copy any changes that have been
made to the Google Workspace mailbox. Additionally, during completion, the
forwarding address that routes mail from Microsoft 365 or Office 365 to Google
Workspace is removed, and a forwarding address that routes mail from Google
Workspace to Microsoft 365 or Office 365 is added. This ensures that any messages
received by migrated users at their Google Workspace mailboxes will be sent to their
new Microsoft 365 or Office 365 address. Similarly, if any user who has not yet been
migrated receives a message at their Microsoft 365 or Office 365 address, the message
will get routed to their Google Workspace mailbox.
Completion of migration batch in
Classic EAC in Exchange Online
Article • 01/26/2023
In Classic EAC, when the migration batch has reached the state of Synced, it needs to be
completed.
7 Note
When the batch starts, all the users to be migrated will be converted from
MailUsers to Mailboxes. The Microsoft 365 or Office 365 Exchange license must be
assigned only after this moment. You have 30 days to assign the license.
1. Under Start the batch, fill in the names or aliases of anyone who should be
notified about the batch progress. Then select how you want to begin and
complete the batch. When done, click new.
2. After the batch status changes from Syncing to Synced, you need to complete the
batch.
During completion, another incremental sync is run to copy any changes that have been
made to the Google Workspace mailbox. Additionally, during completion, the
forwarding address that routes mail from Microsoft 365 or Office 365 to Google
Workspace is removed, and a forwarding address that routes mail from Google
Workspace to Microsoft 365 or Office 365 is added. This ensures that any messages
received by migrated users at their Google Workspace mailboxes will be sent to their
new Microsoft 365 or Office 365 address. Similarly, if any user who has not yet been
migrated receives a message at their Microsoft 365 or Office 365 address, the message
will get routed to their Google Workspace mailbox.
Completion of migration batch in
Exchange Online PowerShell
Article • 01/26/2023
In PowerShell, when the migration batch has reached the state of Synced, it needs to be
completed by running the Complete-MigrationBatch cmdlet.
7 Note
When the batch starts, all the users to be migrated will be converted from
MailUsers to Mailboxes. The Microsoft 365 or Office 365 Exchange license must be
assigned only after this moment. You have 30 days to assign the license.
During completion, another incremental sync is run to copy any changes that have been
made to the Google Workspace mailbox. Additionally, the forwarding address that
routes mail from Office 365 to Google Workspace is removed, and a forwarding address
that routes mail from Google Workspace to Office 365 is added.
7 Note
Forwarding addresses are not needed when doing a cutover migration from
Google Workspace to Exchange Online.
Overview of the G Suite migration
process in Exchange Online
Article • 01/26/2023
Before beginning your migration, review the following diagrams to understand how a
Google Workspace staged migration works. The diagrams show how a fictitious
company named Fabrikam, Inc., with the domain name fabrikaminc.net performed their
migration.
Prior to their migration, the MX record for the base "fabrikaminc.net" domain points to
the Google Workspace tenant or mail server where all or most of Fabrikam, Inc.'s users
are. Note that users have their primary email addresses at that domain.
The MX record for the primary domain "fabrikaminc.net" still points to Google
Workspace, where all the primary mailboxes reside. To prepare for the migration, new
routing domains have been created: the gsuite.fabrikaminc.net domain points to Google
Workspace and the o365.fabrikaminc.net domain points to Microsoft 365 or Office 365.
On the Google Workspace side, aliases have been added for all of the users in the
Google Workspace routing domain. On the Microsoft 365 or Office 365 side, MailUsers
have been provisioned for all of the users from the Google Workspace tenant. The
ExternalEmailAddress field for MailUsers on the Microsoft 365 or Office 365 side were
configured to point back to the primary mailbox using the address at the routing
domain for the Google Workspace side. Additionally, there should be aliases for the user
in the Microsoft 365 or Office 365 routing domain.
The green arrow indicates how, at this point in the migration, User 2 still contacts User 1
through their Google Workspace email addresses.
User 1 and User 2 are part of the first migration batch to Microsoft 365 or Office 365,
while User 3 and User 4 will be part of a later batch. The MX record for the primary
domain "fabrikaminc.net" still points to Google Workspace, where all the primary
mailboxes still reside. Because User 1 and User 2 have had their migrations started,
they've been converted from MailUsers to Mailboxes on the Microsoft 365 or Office 365
side.
) Important
If your organization has disabled a user's ability to set a forwarding address, the
Google Workspace migration tool will also be unable to set the forwarding address.
You must enable permissions to set SMTP forwarding in order for forwarding to be
set successfully during your migration.
Meanwhile, the forwarding address has been removed from the Microsoft 365 or Office
365 user object, so emails will be delivered to that user in the Microsoft 365 or Office
365 routing domain (as shown by the red arrows above).
After all migration batches have been completed, all users can use their migrated
mailboxes on Microsoft 365 or Office 365 as their primary mailbox. A manual MX record
update for the primary domain "fabrikaminc.net" then points to the Microsoft 365 or
Office 365 organization instead of the Google Workspace tenant. The routing domains
and extra aliases can now be removed, as can the Google Workspace tenant. The
migration of mail, calendar, and contacts from Google Workspace to Microsoft 365 or
Office 365 is now complete.
Track and prevent migration data loss in
Exchange Online
Article • 02/22/2023
When migrating to Exchange Online, the migration process might reveal inconsistencies
that pose a risk of data loss. Such inconsistencies can occur during almost any
migration, whether from on-premises Exchange Server, Public Folders, PST file imports,
Google Workspace (formerly G Suite), or third-party IMAP servers. The migration
process tracks and reports on any possible instances of data loss by generating a
DataConsistencyScore.
There are 4 possible grades that are derived from the DataConsistencyScore.
Investigate A small amount of noticeable data loss Approval of skipped items is required for
was detected, caused by some migration types that have a built-in
common inconsistency types. finalization phase, such as Hybrid
migrations or Google Workspace
onboarding.
Poor Major data loss was detected. Contact Microsoft Support for assistance.
Approval of skipped items is required for
migration types that have a built-in
finalization phase.
You can view the DataConsistencyScore for your migration in the classic Exchange
admin center at a per-user and per-batch level. You can also find it using PowerShell
cmdlets; the DataConsistencyScore property exists on MigrationBatch, MigrationUser,
and RequestStatistics objects.
If the migration receives a grade of Investigate, then you can approve skipped items
manually to allow the migration to succeed.
PowerShell
PowerShell
For a batch scored as Investigate, approving the migration allows you to complete all
migrations in the batch with a score of Perfect, Good, or Investigate.
For a batch scored as Poor, approving the migration allows you to complete all
migrations in the batch with a score of Perfect, Good, or Investigate, but won't approve
any migration in the batch with a score of Poor.
If the migration fails with a grade of Poor, you can't force the migration to succeed.
Please contact Microsoft Support for assistance.
2. Select the batch you would like to inspect. Select View details in the information
pane on the right.
3. Select the user you would like to inspect. Select Skipped item details in the
information pane on the right.
PowerShell
) Important
Effective from December 2022, the classic Exchange Admin Center will be
deprecated for worldwide customers. Microsoft recommends using the new
Exchange Admin Center , if not already doing so.
While most of the features have been migrated to new EAC, some have been
migrated to other admin centers and remaining ones will soon be migrated to New
EAC. Find features that are not yet there in new EAC at Other Features or use
Global Search that will help you navigate across new EAC.
7 Note
At this time, we have a Public Preview of the native Cross-tenant mailbox migration
located at https://aka.ms/CrossTenantMailboxMigration
This article explains how to migrate mailboxes and service settings from one Microsoft
365 or Office 365 organization to another Microsoft 365 or Office 365 organization in a
business-merger scenario. If you have more than 500 users to migrate or a large amount
of SharePoint data to migrate, it's a good idea to work with a Microsoft solution
provider .
The scenario in this article is based on two fictional companies - Contoso.com and
Fabrikam.com - using two separate Office 365 organizations. Contoso has purchased
Fabrikam and is moving the Fabrikam users and data to the contoso.com Office 365
organization.
When complete, all Fabrikam accounts will exist in the Contoso.com Office 365
organization, and will all use @fabrikam.com for the UPN. The final addressing scheme
was chosen for simplicity and brevity but can of course be modified to meet your
requirements.
Client considerations
For Outlook 2010 or above, you only need to remove the Outlook user profile and
create it again .
For Outlook 2007 and Outlook 2010, when you are restarting the client, auto-discover
will configure the client and rebuild the .OST file.
For the Skype for Business client, once migration is complete, since the process creates a
new profile, you will need to add contacts .
Tenant preparation and licensing
The source tenant is the Fabrikam Office 365 organization from which you are migrating
users and data. The target tenant is the Contoso Office 365 organization to which you
are migrating.
2. Create Administrator accounts in source and target tenants for use in migrating
from Office 365 to another Office 365. Some migration tools may require more
than one admin account in the source tenant to optimize the data throughput.
1. If the Azure AD Connect tool will be used to sync all objects from the Contoso
Active Directory Domain Services (AD DS), the objects from the source (Fabrikam)
tenant AD DS must be created in the target tenant (Contoso) AD DS through
consolidation.
b. Verify that all new users and groups are synced to the Contoso.com target
tenant via directory synchronization. The objects should appear as
user@contoso.onmicrosoft.com in the new tenant since the Fabrikam domain
has not been moved over at this time. The primary email address for the users
and groups can be updated to @fabrikam.com after the domain move is
complete.
End-user communications
To communicate the migration to the end users in your organization:
1. Create a communication plan and begin to notify users of the upcoming migration
and service changes.
2. After migration, the Auto-Complete List (also known as the nickname cache) will
have to be cleared on all Outlook clients. To remove all recipients from your Auto-
Complete list in Outlook 2010 later, see Manage suggested recipients in the To, Cc,
and Bcc boxes with Auto-Complete .
3. Make users aware of how to connect to Outlook on the web (formerly known as
Outlook Web App) with their new sign on information in case they have a problem
after migration.
Domain preparation
To prepare the domain for migration, complete the following steps.
1. Begin domain verification process on target (Contoso) tenant for the Fabrikam.com
email domain.
2. In the contoso.com Microsoft 365 admin center, add the Fabrikam.com domain
and create TXT records in Domain Name Systems (DNS) for verification.
7 Note
The verification will fail because the domain is still in use in the other tenant.
Performing this step now will allow the DNS record time to propagate as it can
take up to 72 hours. Final validation will occur later in the process.
Migration scheduling
2. Create mailbox mapping .CSV file for the third-party migration tool you are using.
This mapping file will be used by the migration tool to match the source mailbox
with the target tenant mailbox when migration occurs. We recommend that you use
the *.onmicrosoft.com 'initial' domain for mapping the source accounts since the
custom email domain will be constantly changing.
1. In DNS, change the TTL value on the MX record for the primary email domain you
wish to transfer to a small number (i.e. 5 minutes). If the TTL cannot be lowered to
5 minutes, make note of the lowest value. Example, if the lowest value is 4 hours,
the MX record will have to be changed 4 hours before your migration begins.
In the source tenant Microsoft 365 admin center, disable directory sync. This process can
take 24 hours or more so it must be done ahead of the migration. Once disabled in the
portal, any changes to the source tenant AD DS will no longer sync to the Office 365
organization. Adjust your existing user and group provisioning process accordingly.
Tip
If your TTL is short, for example, five minutes, this step can be done at the end of
the work day to cause less disruption. If you have a larger TTL, you must change the
MX record ahead of time to allow the TTL to expire. Example, a four hour TTL must
be changed before 2 PM if you plan to begin migrations at 6 PM.
Verify your MX and DNS changes if necessary. Nslookup or a service like MxToolbox
can be used to verify MX and DNS changes.
The primary email domain, fabrikam.com, must be removed from all objects in the
source tenant before the domain can be moved to the target tenant.
1. If you had also set up your domain with a SharePoint Online public website, then
before you can remove the domain, you first have to set the website's URL back to
the initial domain.
2. Remove all Lync licenses from the users in the source tenant using Lync admin
portal. This will remove the Lync Sip address connected to Fabrikam.com.
3. Reset default email addresses on Office 365 source mailboxes to the initial domain
(fabrikam.onmicrosoft.com).
4. Reset default email addresses on all Distribution Lists, Rooms and Resources to the
initial domain (fabrikam.onmicrosoft.com) in source tenant.
5. Remove all secondary email (proxy addresses) from user objects that are still using
@fabrikam.com.
8. For common domain removal issues, see You get an error message when you try
to remove a domain from Office 365.
Target tenant preparation
Complete the verification of the Fabrikam.com domain in the contoso.com tenant. You
may have to wait one hour after removing the domain from the old tenant.
2. If you are using AD FS, configure the new domain in target tenant for AD FS.
3. Begin mailbox activation in the contoso.com tenant > Assign licenses to all of the
new user accounts.
4. Set the Fabrikam.com email domain as the primary address on the new users. This
can be done by selecting/editing multiple unlicensed users in the portal or by
using Windows PowerShell.
5. If you are not using the password hash sync feature, pass-through authentication
or AD FS, set password on all mailboxes in the target (Contoso) tenant. If you are
not using a common password, notify users of the new password.
6. Once mailboxes are licensed and active, transition the mail routing. Point the
Fabrikam MX record to Office 365 target (Contoso) tenant. When the MX TTL
expires, mail will begin to flow into the new empty mailboxes. If you are using an
MX backup service, you can release the email to the new mailboxes.
7. Perform verification testing of mail flow to/from new mailboxes in the target
tenant.
8. If you are using Exchange Online Protection (EOP): In the target tenant recreate
mail flow rules (also known as transport rules), connectors, block lists, allow lists,
etc. from source tenant.
Begin migration
To minimize downtime and user inconvenience, determine the best method for
migration.
Migration for 500 users or less: Migrate Mail Calendar and contact data to target
tenant mailboxes. Limit mail migration by date if possible; for example, the last 6
months of data.
Migration for more than 500 users: Use a multi-pass approach where you migrate
contacts, calendars and only 1 week of email for all users, then on succeeding days
or weeks, do multiple passes to fill in the mailboxes with older email data.
Start your mail migration via the third-party migration tool.
1. Monitor migration progress with the tools provided by the vendor. Send out
periodic progress reports during migration to management and migration team.
2. Do second or third pass migrations, optional after all migrations are complete.
At the end of migration, Outlook 2007 and 2010 will sync the entire mailbox for each
user, consuming considerable bandwidth depending on how much data you migrated
into each mailbox. Outlook 2013 will only cache 12 months of data by default. This
setting can be configured to more or less data, for example, only 3 months of data,
which can lighten bandwidth usage.
User may receive NDRs when replying to migrated email messages. The Outlook Auto-
Complete List (also known as the nickname cache) needs to be cleared. To remove all
recipients from your Auto-Complete list in Outlook 2010 later, see Manage suggested
recipients in the To, Cc, and Bcc boxes with Auto-Complete . Alternatively, add the old
legacy DN as an x.500 proxy address to all users.
PowerShell
##########################################################################
# Script: showproxies.ps1
# Copies all accounts in Microsoft 365 that contain/don't contain a specific
# proxyaddress to a .CSV file (addresses.csv)
#
# Change the following variable to the proxy address string you want to
find:
# $proxyaddr = "onmicrosoft.com"
############################################################################
####
$proxyaddr = "onmicrosoft.com"
# Create an object to hold the results
$addresses = @()
# Get every mailbox in the Exchange Organization
$Mailboxes = Get-Mailbox -ResultSize Unlimited
# Loop through the mailboxes
ForEach ($mbx in $Mailboxes) {
# Loop through every address assigned to the mailbox
Foreach ($address in $mbx.EmailAddresses) {
# If it contains XXX, Record it
if ($address.ToString().ToLower().contains($proxyaddr)) {
# This is an email address. Add it to the list
$obj = "" | Select-Object Alias,EmailAddress
$obj.Alias = $mbx.Alias
$obj.EmailAddress = $address.ToString() #.SubString(10)
$addresses += $obj
}
}
}
# Export the final object to a csv in the working directory
7 Note
Before you run the following script, you need to install the Exchange Online
PowerShell module. For instructions, see Install and maintain the Exchange
Online PowerShell module. The module uses modern authentication.
Typically, you can use the script as-is if your organization is Microsoft 365 or
Microsoft 365 GCC. If your organization is Office 365 Germany, Microsoft 365
GCC High, or Microsoft 365 DoD, you need to edit the Connect-
ExchangeOnline line in the script. Specifically, you need to use the
PowerShell
############################################################################
####
# Script: create-rooms.ps1
# Description:*** RUN THIS SCRIPT FROM A WINDOWS POWERSHELL SESSION ***
# This script creates room mailboxes in Microsoft 365.
# Syntax:Create-Rooms.ps1 -InputFile "file name.csv"
#
# Dependencies: Input file should contain 3 columns: RoomName,
RoomSMTPAddress, RoomCapacity
#
############################################################################
####
param( $inputFile )
Function Usage
{
$strScriptFileName =
($MyInvocation.ScriptName).substring(($MyInvocation.ScriptName).lastindexofa
ny("\") + 1).ToString()
@"
NAME:
$strScriptFileName
EXAMPLE:
C:\PS> .\$strScriptFileName -InputFile `"file name.csv`"
"@
}
If (-not $InputFile) {Usage;Exit}
7 Note
Before you run the following script, you need to install the Exchange Online
PowerShell module. For instructions, see Install and maintain the Exchange
Online PowerShell module. The module uses modern authentication.
Typically, you can use the script as-is if your organization is Microsoft 365 or
Microsoft 365 GCC. If your organization is Office 365 Germany, Microsoft 365
GCC High, or Microsoft 365 DoD, you need to edit the Connect-
ExchangeOnline line in the script. Specifically, you need to use the
PowerShell
##########################################################################
# Script: remove-proxy.ps1
# Description:*** RUN THIS SCRIPT FROM A WINDOWS POWERSHELL SESSION ***
# This script will remove a secondary email address from many users
#
# Syntax:remove-proxy.ps1 -InputFile "filename.csv"
#
# Dependencies:Input file should contain 2 columns: Username, Emailsuffix
# Example: Username=tim, Emailsuffix=fabrikam.com
# Script will remove the address tim@fabrikam.com from the mailbox for Tim.
# NOTE: Address must be secondary; it will not remove primary email address.
#
############################################################################
####
param( $inputFile )
Function Usage
{
$strScriptFileName =
($MyInvocation.ScriptName).substring(($MyInvocation.ScriptName).lastindexofa
ny
("\") + 1).ToString()
@"
NAME:
$strScriptFileName
EXAMPLE:
C:\PS> .\$strScriptFileName -inputfile `"file name.csv`"
"@
}
If (-not $inputFile) {Usage;Exit}
When planning to migrate email from IBM Lotus Notes to Microsoft 365 or Office 365,
use the Microsoft Online Notes Inspector (MONTI) application. This tool will assist you
in evaluating the amount data to be migrated from a customer's Lotus Notes
environment to Microsoft 365 or Office 365.
It processes mail files to determine the total database size, document count
(calendar, contacts, groups, mail, and tasks), and size by days.
It processes Mail-In Databases to determine the total database size, and Size by
Days.
It posts results under the People, Mail-In Databases, and Logs views. You can
create these reports manually or on a scheduled basis.
The documentation describes how to deploy, configure, and run the MONTI application
in a customer's Domino environment.
Add an SSL certificate to Exchange 2013
for migration to Exchange Online
Article • 02/22/2023
Some services, such as Outlook Anywhere, Cutover migration to Microsoft 365 or Office
365, and Exchange ActiveSync, require certificates to be configured on your Exchange
2013 server. This article shows you how to configure an SSL certificate from a third-party
certificate authority (CA).
1. Open the Exchange admin center (EAC) by browsing to the URL of your Client
Access server, for example, https://Ex2013CAS/ECP.
2. Enter your username and password by using the domain\username format for
username, and choose Sign in.
3. Go to Servers > Certificates. On the Certificates page, make sure your Client
Access server is selected in the Select server field, and then choose New .
4. In the New Exchange certificate wizard, select Create a request for a certificate
from a certification authority and then choose Next.
7. Choose Browse, and specify an Exchange server to store the certificate on. The
server you select should be the internet-facing Client Access server. Choose Next.
8. For each service in the list shown, verify that the external or internal server names
that users will use to connect to the Exchange server are correct. For example:
If you configured your internal and external URLs to be the same, Outlook
Web App (when accessed from the internet) and Outlook Web App (when
accessed from the intranet) should show owa.contoso.com. Offline Address
Book (OAB) (when accessed from the internet) and OAB (when accessed from
the intranet) should show mail.contoso.com.
These domains will be used to create the SSL certificate request. Choose Next.
9. Add any additional domains you want included on the SSL certificate.
10. Select the domain that you want to be the common name for the certificate > Set
as common name. For example, contoso.com. Choose Next.
11. Provide information about your organization. This information will be included
with the SSL certificate. Choose Next.
12. Specify the network location where you want this certificate request to be saved.
Choose Finish.
1. On the Server > Certificates page in the EAC, select the certificate request you
created in the previous steps.
3. On the complete pending request page, specify the path to the SSL certificate file
> OK.
4. Select the new certificate you just added, and then choose Edit .
6. Select the services you want to assign to this certificate. At a minimum, you should
select SMTP and IIS. Choose Save.
7. If you receive the warning Overwrite the existing default SMTP certificate?,
choose Yes.
Add an SSL certificate to Exchange 2010
for migration to Exchange Online
Article • 02/22/2023
Some services, such as Outlook Anywhere, Cutover migration to Microsoft 365 or Office
365, and Exchange ActiveSync, require certificates to be configured on your Exchange
2010 server. This article shows you how to configure an SSL certificate from a third-party
certificate authority (CA).
5. In the Domain Scope page, specify the root domain for all subdomains in the Root
domain field. If you want to request a wildcard, select Enable wildcard certificate.
If you don't want to request a wildcard certificate, you will specify each domain
you want to add to the certificate on the next page. Choose Next.
6. On the Exchange Configuration page for each service in the list shown, verify that
the external or internal server names that users will use to connect to the Exchange
server are correct. For example:
If you configured your internal and external URLs to be the same, Outlook
Web App (when accessed from the internet) and Outlook Web App (when
accessed from the intranet) should show owa.contoso.com. Offline Address
Book (OAB) (when accessed from the internet) and OAB (when accessed from
the intranet) should show mail.contoso.com.
7. These domains will be used to create the SSL certificate request. Choose Next.
8. On the Certificate Domains page, add any additional domains you want included
on the SSL certificate.
Select the domain that you want to be the common name for the certificate > Set
as common name. For example, contoso.com. Choose Next.
Specify the network location where you want this certificate request to be saved.
Choose Next.
10. On the Certificate Configuration page, review the summary information, choose
New to create the certificate, and then choose Finish on the Completion page.
3. In the Exchange Certificates pane, select the request you created earlier, and in
the Actions pane, choose Complete Pending Request.
4. On the Complete Pending Request page, specify the path to the SSL certificate file
you received from your CA > Complete.
6. To assign services to this certificate, on the EMC, select the Exchange server, and
then select the certificate in the Exchange Certificates tab.
7. On the Select Servers page of the Assign Services to Certificate wizard, select the
name of the server to which you're adding the certificate > Next.
8. On the Select Services page, select the services you want to assign to this
certificate. At a minimum, you should select SMTP and IIS. Choose Next.
Some services, such as Outlook Anywhere, Cutover migration to Microsoft 365 or Office
365, and Exchange ActiveSync, require certificates to be configured on your Microsoft
Exchange Server 2007 server. This article shows you how to configure an SSL certificate
from a third-party certificate authority (CA).
PowerShell
New-ExchangeCertificate -DomainName
"owa.servername.contoso.com","mail.servername.contoso.com","autodiscove
r.servername.contoso.com","sts.servername,contoso.com","oos.servername.
contoso.com","mail12.servername.contoso.com","edge.servername.contoso.c
om" -FriendlyName "Exchange 2007 Certificate" -GenerateRequest:$true -
KeySize 2048 -Path "C:\certlocation" -PrivateKeyExportable $true -
SubjectName "c=us, o=ContosoCorporation, cn=servername,contoso.com"
In the command example above, servername is the name of your server,
contoso.com is an example of a domain name, and certlocation is a file path to the
location where you want to store the request once it is generated. Replace all these
placeholders with the information that appropriate for yourMicrosoft Exchange
Server 2007.
In the DomainName parameter, add the domain names for the certificate request.
For example, if you configured your internal and external URLs to be the same, the
domain name for Outlook Web Access when accessed from the internet or intranet
should look like owa.servername.contoso.com.
Use the SubjectName parameter to specify the Subject Name on the resulting
certificate. This field is used by DNS-aware services and binds a certificate to a
particular domain name.
You must specify the GenerateRequest parameter as $true . Otherwise, you will
create a self-signed certificate.
3. After you run the above command, a certificate request is saved in the file location
you specified by using the Path parameter.
Import-ExchangeCertificate C:\filepath
The filepath parameter above specifies the location where you saved the certificate
file that was provided by the third-party CA.
When you run this command, it creates a Thumbprint output parameter that you
use to enable to certificate in the next step.
PowerShell
Enable-ExchangeCertificate -Thumbprint
5113ae0233a72fccb75b1d0198628675333d010e -Services iis,smtp,pop,imap
The Thumbprint parameter specifies the one you received as output when you ran
the Import-ExchangeCertificate command.
In the Services parameter, specify the services you want to assign to this certificate.
At a minimum, you should specify SMTP and IIS.
2. If you receive the warning Overwrite the existing default SMTP certificate?, type
in A (yes for all).
See also
Blog article on adding an SSL to Exchange Server 2007
Enable your Gmail account for IMAP in
Exchange Online
Article • 02/22/2023
Internet Message Access Protocol (IMAP) is a protocol that allows you to download
messages from a mail provider's servers, such as those for Gmail, onto your computer so
you can use Microsoft Outlook to view and edit your email, even when aren't connected
to the internet.
There are many paths to migrate email data for an organization hosted on-premises to
Microsoft 365 or Office 365. When planning a migration to Microsoft 365 or Office 365,
a clear understanding of data migration process and velocity helps the admins to plan
better.
For networking and performance related questions on Microsoft 365 or Office 365, see
Network planning and performance tuning for Microsoft 365 or Office 365.
Internet You can use the Exchange admin center or Migrate your IMAP mailboxes
Message Exchange Online PowerShell to migrate the to Microsoft 365 or Office 365
Access contents of users' mailboxes from an IMAP
Protocol messaging system to their Microsoft 365 or
(IMAP) Office 365 mailboxes. This includes migrating
migration your mailboxes from other hosted email services,
such as Gmail or Yahoo Mail. Note that Exchange
Online now offers a highly specialized process in
Modern EAC for migrating emails from an
organizations existing Gmail/G Suite/Google
WorkSpace (GWS) deployment to Exchange
Online.
Migration Description Resources
method
Cutover Use cutover migration to migrate all on-premises Cutover migration to Microsoft
migration mailboxes to Microsoft 365 or Office 365 over a 365 or Office 365
few days. Use cutover migration if you plan to
move your entire email organization to Microsoft
365 or Office 365 and manage user accounts in
Microsoft 365 or Office 365. You can migrate a
maximum of 2,000 mailboxes from your on-
premises Exchange organization to Microsoft 365
or Office 365 using a cutover migration. The
recommended number of mailboxes, however, is
150. Performance may likely degrade with
numbers higher than that. The mail contacts and
distribution groups in your on-premises
Exchange organization are also migrated.
Staged Use Staged migration if you plan to eventually What you need to know about
migration migrate your organization's all mailboxes to a staged email migration to
Microsoft 365 or Office 365, over time. Using a Microsoft 365 or Office 365
staged migration, you migrate batches of on-
premises mailboxes to Microsoft 365 or Office
365 over the course of a few weeks or months.
Hybrid Hybrid deployment offers organizations the Microsoft 365 and Office 365
deployment ability to extend the feature-rich experience and Mail migration advisor
administrative control they have with their
existing on-premises Exchange organization to Exchange Server Hybrid
the cloud. A hybrid deployment provides the Deployments
seamless look and feel of a single Exchange
organization between an on-premises Exchange Mail migration advisor
organization and Exchange Online in Microsoft
365 or Office 365. In addition, a hybrid Exchange Deployment
deployment can serve as an intermediate step to Assistant for Exchange on-
moving completely to a Microsoft 365 or Office premises 2013/2016/2019
365 organization.
Exchange Server 2013 hybrid
deployments
Minimal Hybrid
Configuration
Third-party There are many tools available from third parties. Here are some third-party
migration They use distinctive protocols and approaches to migration tools and partners
conduct email migrations from email platforms that can assist with Exchange
like GWS, GoDaddy, Yahoo, IBM Lotus Notes and migrations from third-party
Novell GroupWise. platforms:
Binary Tree / Quest /
QuadroTech : Binary Tree and
Migration Description Resources
method
CodeTwo : Provider of
Microsoft 365 and Office 365
migration solutions for secure
and automated data
migrations to Microsoft 365
(Office 365) from Exchange
On-Prem, IMAP servers, and
between Microsoft 365
tenants.
SkyKick : Provider of
automated migration solutions
to move from multiple source
Migration Description Resources
method
) Important
Workload Notes
Workload Notes
Onboarding Microsoft offers data migration capability and tools for customers to use to
(Migrating migrate their data from Exchange Server On-premises (via Cutover/Staged/Hybrid)
to or from Gmail/S Suite/GWS aka Google Work Space (via EAC, PowerShell) or from
Microsoft Other IMAP sources(PowerShell, Gmail via IMAP) or Cross Tenant migrations to
365 or Exchange Online in Microsoft 365 or Office 365.
Office 365)
Multi-Geo Multinational companies with offices around the world often have a need to store
their employee data at-rest in specific regions, in order to meet their data
residency requirements. Multi-Geo enables a single Microsoft 365 or Office 365
organization to span across multiple Microsoft 365 or Office 365 datacenter
geographies (geos), which gives you the ability to store Exchange data, at-rest, on a
per-user basis, in your chosen geos. For more details, see Get enterprise-grade
global data location controls with Multi-Geo .
Encryption Service Encryption with Customer Key is a feature that allows a customer to
provision and manage the root keys that are used to encrypt data at-rest at the
application layer in Microsoft 365 or Office 365. For a mailbox to become
encrypted the first time, a mailbox move is required. For more details, see Service
encryption with Microsoft Purview Customer Key.
GoLocal Microsoft continues to open new datacenters in new regions, or geos. Existing
customers, when eligible, can request to have their customer data from their
original datacenter moved to a new geo. The period in which you can make this
request is usually one or two years, depending on the overall demand for the
service. Note that this period during which you can request to have your customer
data moved becomes shorter once a datacenter (DC) for the new geo launches (at
that point you have approximately three to six months to request a move). Details
are available in Moving core data to new Microsoft 365 datacenter geos.
When mailboxes are migrated within Microsoft 365 data centers, every mailbox move or
bulk-mailbox move requires time for the operation to complete. There are a number of
factors, such as Microsoft 365 service activity, that can affect exactly how much time. The
service is designed to throttle discretionary workloads like mailbox moves, to ensure
that the service runs optimally for all users. You can still expect mailbox moves to be
processed, however, depending on the service's discretionary resource availability. More
details about resource throttling can be found in this blog post .
GoLocal/Multi- 0 - 10 1 1
Geo/Encryption
GoLocal/Multi- 10 - 50 2 6
Geo/Encryption
GoLocal/Multi- 50 - 100 4 11
Geo/Encryption
Onboarding from 0 - 10 1 3
On-Premises
Onboarding from 10 - 50 2 6
On-Premises
Cross Tenant Migration to Exchange Online (use Microsoft first party solution or
use Third party solutions).
Workload Mailbox size P50 (50th percentile P90 (90th percentile
(GB) duration) (days) duration) (days)
Cross 0 - 10 1 1
Tenant
Cross 10 - 50 1 2
Tenant
Cross 50 - 100 2 5
Tenant
Specialized Gmail 0 - 10 1 2
Onboarding
Specialized Gmail 10 - 50 1 8
Onboarding
Generic IMAP 0 - 10 1 1
Onboarding
Workload Mailbox P50 (50th percentile P90 (90th percentile
size (GB) duration) (days) duration) (days)
Generic IMAP 10 - 50 1 2
Onboarding
PST 0 - 10 1 1
Import
PST 10 - 50 1 3
Import
PST 50 - 100 2 5
Import
7 Note
Some outlier mailboxes would take longer to complete based on the mailbox
profile. Also, if a tenant has larger mailboxes on average, this can also contribute to
the extended duration of migration.
Data The device or service that hosts the data to be Gmail limits how much data can
source migrated. Many limitations might apply to the be extracted during a specific
data source because of hardware specifications, period of time.
end-user workload, and back-end maintenance
tasks.
Data type Because of the unique nature of a customer's One 4-GB mailbox with 400
and business, the type and mix of mail items within items, each with 10 megabytes
density mailboxes vary greatly. (MB) of attachments, will
migrate faster than one 4-GB
mailbox with 100,000 smaller
items.
Migration Many migration solutions use a "jump box" type Customers often use a low-
server of migration server or workstation to complete performance virtual machine to
the migration. host the MRSProxy service for
hybrid deployments or for
client PC non-hybrid
migrations.
Migration The data migration engine responsible for pulling MRSProxy service has its own
engine data from the source server converts data, if capabilities and limitations.
necessary. The engine then transmits the data
over the network and injects the data into the
Microsoft 365 or Office 365 mailbox. mailbox.
On- The end-to-end network performance (from the Firewall configuration and
premises data source to Exchange Online client access specifications on the on-
network servers) affects migration performance. premises organization.
appliances
Microsoft Microsoft 365 and Office 365 have built-in The user-throttling policy has
365 or support and features to manage the migration default settings and limits the
Office 365 workload. overall maximum data transfer
service rate.
Use the Exchange Analyzer to get a deeper understanding of your network connectivity
with Microsoft 365 or Office 365. To run the Exchange Analyzer tests in Microsoft
Support and Recovery Assistant , go to Advanced Diagnostics > Exchange Online >
Check Exchange Online network connectivity > Yes. Read about the Microsoft Support
and Recovery Assistant to learn more about Microsoft Support and Recovery
Assistant .
Network The amount of time it takes to migrate Identify your available network capacity and
capacity mailboxes to Microsoft 365 or Office determine the maximum upload capacity.
365 is determined by the available and Contact your ISP to confirm your allocated
maximum capacity of your network. bandwidth and to get details about
restrictions, such as the total amount of data
that can be transferred in a specific period of
time.
Use tools to evaluate your actual network
capacity. Make sure you test the end-to-end
flow of data from your on-premises data
source to the Microsoft datacenter gateway
servers.
Identify other loads on your network (for
example, backup utilities and scheduled
maintenance) that can affect your network
capacity.
Network A fast network doesn't always result in Network hardware and driver issues often
stability fast migrations. If the network isn't cause network stability problems. Work with
stable, data transfer takes longer your hardware vendors to understand your
because of error correction. network devices and apply the vendor's
Depending on the migration type, latest recommended drivers and software
error correction can significantly affect updates.
migration performance.
Factor Description Best practices
For a deeper analysis of migrations within your environment, check out our Mailbox
Migration Performance Analysis . The post includes a script to help you analyze move
requests.
User throttling
Migration-service throttling
Resource health-based throttling
7 Note
The three types of Microsoft 365 and Office 365 throttling don't affect all migration
methods.
IMAP migration
Cutover Exchange migration
Staged Exchange migration
Hybrid migrations (MRSProxy service-based moves in a hybrid environment)
) Important
The following shows what the customers will see regarding stall durations using Get –
MoveRequestStatistics - <> -IncludeReport cmdlet :
$R.REPORT.TARGETTHROTTLES
NETWORKTHROTTLE : 00:00:00
CPUTHROTTLE : 00:02:07.6222549
REMOTESERVERTHROTTLE : 00:00:00
MDBREPLICATIONTHROTTLE : 00:38:41.7018480
CONTENTINDEXINGTHROTTLE : 00:00:00
BIGFUNNELTHROTTLE : 00:00:00
MDBAVAILABILITYTHROTTLE : 00:26:34.6588104
DISKLATENCYTHROTTLE : 1.15:45:37.7873632
$R.REPORT.SOURCETHROTTLES
NETWORKTHROTTLE : 00:00:00
CPUTHROTTLE : 3.03:21:07.7192848
REMOTESERVERTHROTTLE : 00:00:00
MDBREPLICATIONTHROTTLE : 00:00:00
CONTENTINDEXINGTHROTTLE : 00:00:00
BIGFUNNELTHROTTLE : 00:00:00
MDBAVAILABILITYTHROTTLE : 00:00:00
DISKLATENCYTHROTTLE : 00:20:47.1101552
MDBMAINTENANCETHROTTLE : 00:00:00
If you experience a comparable situation, wait for the Microsoft 365 or Office 365
resources to become available.
Back-end Other back-end tasks that are Review other system tasks that might be
tasks running during migration time. running during migration. We recommend
Because it's a best practice to that you perform data migration when no
perform migration after business other resource-intensive tasks are running.
hours, it's common that migrations Note: For customers using on-premises
conflict with maintenance tasks (such Exchange, the common back-end tasks are
as data backup) running on your on- backup solutions and Exchange store
premises servers. maintenance (2013, 2016, 2019).
Throttling It is a common practice to protect Verify the throttling policy deployed for
policy email systems with a throttling policy your email system. For example, Google
that sets a specific limit on how fast Mail limits how much data can be
and how much data can be extracted extracted in a certain period. Depending
from the system during a certain on the version, Exchange has policies that
amount of time. restrict IMAP access to the on-premises
mail server (used by IMAP migrations) and
RPC over HTTP Protocol access (used by
cutover Exchange migrations and staged
Exchange migrations).
To check the throttling settings, run the
Get-ThrottlingPolicy cmdlet. For more
information about throttling, see: (2007,
2010, 2013, 2016, 2019).
Customers now can specify migration concurrency (for example, the number of
mailboxes to migrate simultaneously) by using Windows PowerShell. The default is 20
mailboxes. After you create a migration batch, you can use the following Windows
PowerShell cmdlet to increase this to a maximum of 100.
PowerShell
For more information, see Manage migration batches in Microsoft 365 or Office 365.
7 Note
If your data source doesn't have sufficient resources to manage all the connections,
we recommend avoiding high concurrency. Start with a small concurrency value, for
example, 10. Increase this number while monitoring the data source performance
to avoid end-user access issues.
Depending on the migration method, you can try the following verification tests:
IMAP migrations: Prepopulate a source mailbox with sample data. Then from the
internet (outside your on-premises network), connect to the source mailbox by
using a standard IMAP email client such as Microsoft Outlook, and then measure
network performance by determining how long it takes to download all the data
from the source mailbox. The throughput should be similar to what customers can
get by using the IMAP migration tool in Microsoft 365 or Office 365, given that
there are no other constraints.
There is some overhead during an actual IMAP, cutover, or staged Exchange migration.
The actual throughput, however, should be similar to the results of these verification
tests.
Move-Mailbox
[Get-MoveRequestStatistics]](/powershell/module/exchange/get-
moverequeststatistics)
In the Microsoft 365 or Office 365 service the migration queue and the service resources
allocated for migrations are shared among tenants and affects how move requests are
managed in each stage of the move process.
There are two types of move requests in Microsoft 365 and Office 365:
Datacenter internal "move" requests: These are mailbox move requests initiated
by datacenter operation teams. These requests have a lower priority because the
end-user experience isn't affected if the move request is delayed.
Two factors influence which request will be picked up by the Mailbox Replication
Service:
Priority: Queued move requests with a higher priority are picked up before
lower-priority move requests. This helps ensure that customer-migration move
requests always get processed before datacenter internal move requests.
Position in the queue: If move requests have the same priority, the earlier the
request gets into the queue, the earlier it will be picked up by the Mailbox
Replication Service. Because there might be multiple customers performing
mailbox migrations at the same time, it's normal that new move requests
remain in the queue before they're processed.
Often, the time that mailbox requests wait in the queue before being processed isn't
considered during migration planning. This results in customers not being allocated
enough time to complete all planned migrations.
In-progress move requests: This status specifies that the move is still in progress.
If this is an online mailbox move, the user will still be able to access the mailbox.
After the mailbox move request has a status of "In Progress," the priority no longer
matters and a new move request won't be processed until an existing "In Progress"
move request is completed, even if the new move request has a higher priority.
Best practices
Planning: As previously mentioned, because Exchange 2003 users lose access during a
hybrid migration, Exchange 2003 customers are usually more concerned about when to
schedule migrations and how long they will take.
When planning how many mailboxes to migrate during a specific time period, consider
the following:
Include the amount of time the move request waits in the queue. Use the following
to calculate this:
where the migration throughput equals the total number of mailboxes that can be
migrated per hour.
For example, assume you have a six-hour window to migrate mailboxes. If the average
queue time is one hour and you have a migration throughput of 100 mailboxes per
hour, you can migrate 500 mailboxes in the six-hour time frame: 500 = (6 - 1) * 100.
Start the migration sooner than initially planned to mitigate time in the queue.
When mailboxes are queued, Exchange 2003 users can still access their mailboxes.
Determine queue time: The queue time is always changing because Microsoft doesn't
manage customers' migration schedules.
To determine the potential queue time, a customer can try to schedule a test move
several hours before the actual migration starts. Then, based on the observed amount of
time the request is in the queue, the customer can better estimate when to start the
migration and how many mailboxes can be moved in a specific period of time.
For example, if a test migration was completed four hours before the start of a planned
migration. The customer determines the queue time for the test migration was about
one hour. Then, the customer should consider starting the migration one hour earlier
than originally planned to make sure there is enough time to complete all migrations.
) Important
For issues with data consistency or integrity after performing a migration using
third-party tools, please contact the vendor who provided the tool for support.
Back-end Other back-end tasks usually run Review other system tasks that might be
tasks during migration time. Because it's a running during migration. We recommend
best practice to perform migration that you perform data migration when no
after business hours, it's common other resource-intensive tasks are running.
that migrations conflict with other Note: For customers using on-premises
maintenance tasks running on your Exchange, the common back-end tasks are
on-premises servers, such as data backup solutions and Exchange store
backup. maintenance (2013, 2016, 2019).
Throttling It's a common practice to protect Verify the throttling policy deployed for
policy email systems with a throttling your email system. For example, Google
policy, which sets a specific limit on Mail limits how much data can be
how fast and how much data can be extracted in a certain period. Depending
extracted from the system within a on the version, Exchange has policies that
certain amount of time and by using restrict IMAP access to the on-premises
a specific migration method. mail server (used by IMAP migrations) and
RPC over HTTP Protocol access (used by
cutover Exchange migrations and staged
Exchange migrations).
To check the throttling settings, run the
Get-ThrottlingPolicy cmdlet. For more
information about throttling, see: (2007,
2010, 2013, 2016, 2019).
7 Note
To improve migration performance when using a migration server, apply the same best
practices as the ones described in the Factor 1: Data source for third-party tool
migrations section.
Exchange Web Services is the recommended protocol to use for migrating to Microsoft
365 or Office 365 because it supports large data batches and has better service-oriented
throttling. In Microsoft 365 or Office 365, when used in impersonation mode, migrations
using Exchange Web Services don't consume the user's budgeted amount of Microsoft
365 or Office 365 Exchange Web Services resources, consuming instead a copy of the
budgeted resources:
All Exchange Web Services impersonating calls made by the same administrator
account are calculated separately from the budget applied to this administrator
account.
For each impersonation session, a shadow copy of the actual user's budget is
created. All migrations for this particular session will consume this shadow copy.
Exchange Web Services throttling policy can be temporarily changed in the tenant
(for a duration of 30, 60, or 90 days) to allow migration to complete. This can be
requested from the Help section of the Microsoft 365 admin center.
Best practices:
Migration performance for customers using third-party migration tools that use
EWA impersonation competes with Exchange Web Services-based migrations and
service resource usage by other tenants. Therefore, migration performance will
vary.
Whenever possible, customers should use third-party migration tools that use
Exchange Web Services impersonation because it's usually faster and more
efficient than using client protocols such as RPC over HTTP Protocol.
Traditional migration solutions use the RPC over HTTP Protocol. This method is
completely based on a client access model such as that of Outlook, and scalability and
performance are limited because the Microsoft 365 or Office 365 service throttles access
on the assumption that usage is by a user instead of by an application.
Best practices:
For migration tools that use RPC over HTTP Protocol, it's a common practice to
increase migration throughput by adding more migration servers and using
multiple Microsoft 365 or Office 365 administrative user accounts. This practice can
gain data injection parallelism and achieve higher data throughput because each
administrative user is subject to Microsoft 365 and Office 365 user throttling. We
have received reports that many enterprise customers had to set up more than 40
migration servers to obtain 20-30 GB/hour of migration throughput.
In a migration tool development phase, it's critical to consider the number of RPC
operations needed to migrate a message. To illustrate this, we have collected logs
captured by Microsoft 365 or Office 365 services for two third-party migration
solutions (developed by third-party companies) used by customers to migrate
mailboxes to Microsoft 365 or Office 365. We compared two migration solutions
developed by third-party companies. We compared the migration of two
mailboxes for each migration solution, and we also compared them to uploading a
.pst file in Outlook. Here are the results.
7 Note
The client and service process times are similar, but solution A takes a lot more RPC
operations to migrate data. Because each operation consumes client-latency time
and server-process time, solution A is much slower to migrate the same amount of
data compared to Solution B and to Outlook.
For third-party migration solutions that use the RPC over HTTP Protocol, here's a good
way to measure potential migration performance:
1. From the migration server, connect to the Microsoft 365 or Office 365 mailbox with
Outlook by using RPC over HTTP Protocol. Make sure that you aren't connecting
by using cached mode.
2. Import a large .pst file with sample data to the Microsoft 365 or Office 365
mailbox.
3. Measure migration performance by timing how long it takes to upload the .pst file.
The migration throughput should be similar to what customers can get from a
third-party migration tool that uses RPC over HTTP Protocol, given no other
constraints. There's overhead during an actual migration, so the throughput might
be slightly different.
When you migrate on-premises Exchange mailboxes to Microsoft 365 or Office 365,
certain permissions to access and, in some cases, modify those mailboxes, are required.
The user account used to connect to your on-premises Exchange organization during
the migration needs those permissions. Known as the migration administrator, the user
account is used to create a migration endpoint to your on-premises organization.
The migration administrator must have the necessary administrative privileges in your
on-premises Exchange organization to successfully create a migration endpoint. Those
same administrative privileges are required if the migration administrator wants to
create a migration batch if your organization has no migration endpoints. The following
list shows the administrative privileges required for the migration administrator account
to migrate mailboxes to Microsoft 365 or Office 365 by using the different types of
migration:
or
Assigned the FullAccess permission for each on-premises mailbox AND the
WriteProperty permission to modify the TargetAddress property on the on-
premises user account.
or
or
or
For a remote move migration, the migration administrator account must be:
or
or
For an IMAP4 migration, the comma-separated value (.csv) file for the migration
batch must contain:
The username and password for each mailbox that you want to migrate.
or
The username and password for an account in your IMAP4 messaging system
that has the necessary administrative privileges to access all user mailboxes. To
learn whether your IMAP4 server supports this approach and how to enable it,
see the documentation for your IMAP4 server.
You can use Exchange Online PowerShell in your on-premises organization to quickly
assign the necessary permissions to migrate mailboxes to Microsoft 365 or Office 365.
7 Note
Because Exchange Server 2003 doesn't support Exchange Online PowerShell, you
have to use Active Directory Users and Computers to assign the FullAccess
permission and Exchange Server Manager to assign the Receive As permission.
For information about migrating mailboxes to Office 365 by using different migration
types, see Ways to migrate multiple email accounts to Office 365.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Permissions and
delegation" entry in the "Recipient Provisioning Permissions" entry in the Feature
permissions in Exchange Online topic.
Example 1
PowerShell
Example 2
PowerShell
FullAccess permission for all mailboxes that have the value of MigBatch2 for
CustomAttribute10 is assigned to the migration administrator.
PowerShell
Example 4
PowerShell
For detailed syntax and parameter information, see the following topics:
Add-MailboxPermission
PowerShell
PowerShell
PowerShell
Get-Mailbox -ResultSize unlimited -Filter "CustomAttribute10 -eq
'MigBatch2'" | Get-MailboxPermission -User migadmin
PowerShell
PowerShell
PowerShell
Example 1
WriteProperty permission to modify the TargetAddress property for the user account of
Rainer Witte is assigned to the migration administrator account (for example,
migadmin).
PowerShell
Example 2
WriteProperty permission to modify the TargetAddress property for all members of the
distribution group StagedBatch1 is assigned to the migration administrator account.
PowerShell
Example 3
WriteProperty permission to modify the TargetAddress property for all user accounts
that have the value of StagedMigration for CustomAttribute15 is assigned to the
migration administrator account.
PowerShell
Example 4
PowerShell
For detailed syntax and parameter information, see the following topics:
Add-ADPermission
Filterable Properties for the Filter Parameter
PowerShell
PowerShell
PowerShell
PowerShell
You can use the Migration dashboard in the Microsoft 365 or Office 365 Exchange
admin center (EAC) to manage mailbox migration to Microsoft 365 or Office 365 using a
cutover or staged Exchange migration. You can also use the Migration dashboard to
migrate the contents of users' mailboxes from an on-premises IMAP server, or the
contents of Google Workspace (formerly G Suite) users' mailboxes, calendars, and
contacts to existing Microsoft 365 or Office 365 mailboxes. The Migration dashboard
displays statistics about the overall migration in addition to statistics about a specific
migration batch. You can create, start, stop, pause, and edit migration batches.
Migration batches
Migration batches that are created are listed in the migration queue. The following
columns display information about each migration batch.
Column Description
Name The name of the migration batch that was defined when it was created.
Status The status of the migration batch. The following is a list of the different status states
for migration batches, along with what you can do with migration batches in each
of these states:
Stopped: Either the migration batch has been created but hasn't been started, or it
has been stopped after running for some period of time. In this state, you can start,
edit, or delete it.
Syncing: The migration batch has been started, and mailboxes in the migration
batch are being actively migrated. When a migration batch is in this state, you can
stop it.
Synced: The migration batch has completed an initial sync of the data. A migration
batch in this state may contain errors if mailboxes weren't migrated. For most types
of migrations, the remote/on-premises mailboxes and the corresponding Microsoft
365 or Office 365 mailboxes are synchronized every 24 hours during incremental
synchronization.
Synced with errors: The migration batch has completed an initial sync of the data,
but some mailboxes failed migration. Mailboxes that were successfully migrated in
migration batches with errors are still synchronized every 24 hours during
incremental synchronization.
Percentage Indicates the percentage of mailboxes that were successfully migrated in migration
synced batches.
Finalized The number of mailboxes in the migration batch that have been finalized.
Finalization is performed only for migration batches for remote move migrations in
an Exchange hybrid deployment. For more information about the finalization
process, see Complete-MigrationBatch.
Failed The number of mailboxes in the migration batch for which the migration failed. You
can display information about specific mailboxes that have migration errors. For
more information, see Migration users status report.
) Important
The Migration dashboard contains a set of commands that you can use to manage
migration batches. After you create a migration batch, you can select it, and then click
one of the following commands.
Command Description
New Create a new migration batch. Use this command to migrate on-premises mailboxes
migration to Microsoft 365 or Office 365 (also called onboarding) or to migrate Microsoft 365
batch or Office 365 mailboxes back to your on-premises Exchange organization in a hybrid
deployment.
Start Start a migration batch that's been created. After the batch is started, the status is
migration changed to Syncing.
Stop Stop the migration of mailboxes. After the batch is stopped, the status is changed to
migration Stopped.
Delete Delete a migration batch after you verify that all mailboxes in the migration batch
have been successfully migrated. Verify also that mail is being routed directly to
cloud-based mailboxes after you've configured your MX record to point to
Microsoft 365 or Office 365. When you delete a migration batch, Microsoft 365 or
Office 365 cleans up any records related to the migration batch and removes it from
the list.
Edit Batch Edit an existing migration batch. You can change the finalization semantics of
batches that support finalization. You can also change the migration endpoint used
for the migration batch.
Resume Resume the running of a migration batch that was paused and has a status of
migration Stopped. If there are errors for a migration batch, you can restart it with this
command, and Microsoft 365 or Office 365 will attempt to migrate the mailboxes
that failed.
Refresh Refresh the Migration dashboard to update the information displayed for the overall
migration statistics, the list of migration batches, and the statistics for the selected
migration batch.
Field Description
Type Indicates the migration type of the selected migration batch. The value of this field
also denotes the type of migration endpoint associated with the migration batch.
Exchange Outlook Anywhere: The migration batch is either a cutover Exchange
migration or a staged Exchange migration.
Direction Indicates if mailboxes are being migrated to Microsoft 365 or Office 365 or to your
on-premises Exchange organization.
Onboarding: Indicates that mailboxes are being migrated to Microsoft 365 or Office
365. Onboarding migration types are staged migrations, cutover migrations, IMAP
migrations, Google Workspace migrations, and onboarding remote move
migrations.
Offboarding: Indicates that Microsoft 365 or Office 365 mailboxes are being
migrated to your on-premises Exchange organization. Offboarding remote move
migrations are the only type of offboarding migration.
Field Description
Syncing
Stopped
Synced
View Click View details to display status information for each mailbox in the migration
details batch. For more information, see Migration users status report.
Synced The number of mailboxes out of the total number of mailboxes in the migration
mailboxes batch that have successfully completed initial synchronization. This field is updated
during the migration.
Finalized The number of mailboxes out of the total number of mailboxes in the migration
mailboxes batch that have successfully been finalized. Finalization only occurs in onboarding
and offboarding remote move migrations.
Created by The email address of the Microsoft 365 or Office 365 administrator who created the
migration batch.
Created The date and time when the migration batch was created.
time
Start time The date and time when the migration batch was started.
Complete The date and time when the migration batch is completed.
after
Last The last time the migration batch was restarted or the last time that incremental
synced synchronization was performed for the batch. As previously stated, incremental
time synchronization occurs every 24 hours.
Associated The name of the migration endpoint being used by the migration batch. You can
endpoint click View details to view the migration endpoint settings. You can also edit the
settings if none of the migration batches using the endpoint are currently running.
Field Description
Total The total number of mailboxes from all current migration batches.
mailboxes
Synced The number of mailboxes from all migration batches that were successfully migrated.
mailboxes
Finalized The number of mailboxes from all migration batches that have been finalized.
mailboxes Finalization occurs only when you use remote move migrations to migrate mailboxes
between your on-premises Exchange organization and Microsoft 365 or Office 365 in
an Exchange hybrid deployment. Mailboxes can be finalized after the initial
synchronization is successfully completed. For more information about finalizations
in remote move migrations, see Complete-MigrationBatch.
Failed The number of mailboxes from all migration batches for which migration failed.
mailboxes
Migration batches
Migration batches that are created are listed in the migration queue. The following
columns display information about each migration batch.
Column Description
Name The name of the migration batch that was defined when it was created.
Status The status of the migration batch. The following is a list of the different status states
for migration batches, along with what you can do with migration batches in each of
these states:
Stopped: Either the migration batch has been created but hasn't been started, or it
has been stopped after running for some period of time. In this state, you can start,
edit, or delete it.
Syncing: The migration batch has been started, and mailboxes in the migration batch
are being actively migrated. When a migration batch is in this state, you can stop it.
Synced: The migration batch has completed an initial sync of the data. A migration
batch in this state may contain errors if mailboxes weren't migrated. For most types of
migrations, the remote/on-premises mailboxes and the corresponding Microsoft 365
or Office 365 mailboxes are synchronized every 24 hours during incremental
synchronization.
Synced with errors: The migration batch has completed an initial sync of the data, but
some mailboxes failed migration. Mailboxes that were successfully migrated in
migration batches with errors are still synchronized every 24 hours during incremental
synchronization.
Finalized The number of mailboxes in the migration batch that have been finalized. Finalization
is performed only for migration batches for remote move migrations in an Exchange
hybrid deployment. For more information about the finalization process, see
Complete-MigrationBatch.
Failed The number of mailboxes in the migration batch for which the migration failed. You
can display information about specific mailboxes that have migration errors. For more
information, see Migration users status report.
) Important
The Migration dashboard contains a set of commands that you can use to manage
migration batches. After you create a migration batch, you can select it, and then click
one of the following commands. If a migration batch is in a status state that isn't
supported by a command, the command is either dimmed or not displayed because it's
unavailable.
Command Description
New Create a new migration batch. Use this command to migrate on-premises mailboxes
to Microsoft 365 or Office 365 (also called onboarding) or to migrate Microsoft 365
or Office 365 mailboxes back to your on-premises Exchange organization in a hybrid
deployment.
Edit Edit an existing migration batch. You can change the finalization semantics of
batches that support finalization. You can also change the migration endpoint used
for the migration batch.
Start Start a migration batch that's been created. After the batch is started, the status is
changed to Syncing.
Resume Resume the running of a migration batch that was paused and has a status of
Stopped. If there are errors for a migration batch, you can restart it with this
command, and Microsoft 365 or Office 365 will attempt to migrate the mailboxes
that failed.
Pause Stop a migration batch that's currently running or that's been started but has a
status of Queued. You can also stop a migration batch that's completed the
initiation synchronization phase and has a status of Synced. This will stop
incremental synchronizations. You can resume incremental synchronizations by
selecting the migration batch and clicking Resume.
Delete Delete a migration batch after you verify that all mailboxes in the migration batch
have been successfully migrated. Verify also that mail is being routed directly to
cloud-based mailboxes after you've configured your MX record to point to
Microsoft 365 or Office 365. When you delete a migration batch, Microsoft 365 or
Office 365 cleans up any records related to the migration batch and removes it from
the list.
Command Description
More Click this command, and then click Migration endpoints to create new migration
endpoints or view and edit existing migration endpoints.
Refresh Refresh the Migration dashboard to update the information displayed for the overall
migration statistics, the list of migration batches, and the statistics for the selected
migration batch.
Field Description
Type Indicates the migration type of the selected migration batch. The value of this field
also denotes the type of migration endpoint associated with the migration batch.
Exchange Outlook Anywhere: The migration batch is either a cutover Exchange
migration or a staged Exchange migration.
Direction Indicates if mailboxes are being migrated to Microsoft 365 or Office 365 or to your
on-premises Exchange organization.
Onboarding: Indicates that mailboxes are being migrated to Microsoft 365 or Office
365. Onboarding migration types are staged migrations, cutover migrations, IMAP
migrations, Google Workspace migrations, and onboarding remote move
migrations.
Offboarding: Indicates that Microsoft 365 or Office 365 mailboxes are being
migrated to your on-premises Exchange organization. Offboarding remote move
migrations are the only type of offboarding migration.
Field Description
Syncing
Stopped
Synced
Requested The number of mailboxes to be migrated in the migration batch. This number
corresponds to the number of rows in the migration CSV file for IMAP, Google
Workspace, staged, or remote move migrations, or the number of on-premises
mailboxes in a cutover Exchange migration.
Synced The number of mailboxes out of the total number of mailboxes in the migration
mailboxes batch that have successfully completed initial synchronization. This field is updated
during the migration.
Finalized The number of mailboxes out of the total number of mailboxes in the migration
batch that have successfully been finalized. Finalization only occurs in onboarding
and offboarding remote move migrations.
View Click View details to display status information for each mailbox in the migration
details batch. For more information, see Migration users status report.
Created by The email address of the Microsoft 365 or Office 365 administrator who created the
migration batch.
Create The date and time when the migration batch was created.
time
Start time The date and time when the migration batch was started.
Initial sync The date and time when the migration batch completed initial synchronization.
time
Initial sync The amount of time it took to complete the initial synchronization for all mailboxes
duration in the migration batch.
Last sync The last time the migration batch was restarted or the last time that incremental
time synchronization was performed for the batch. As previously stated, incremental
synchronization occurs every 24 hours.
Field Description
Associated The name of the migration endpoint being used by the migration batch. You can
endpoint click View details to view the migration endpoint settings. You can also edit the
settings if none of the migration batches using the endpoint are currently running.
Migration users status report in
Exchange Online
Article • 02/22/2023
You can use the Migration dashboard in the Exchange administration center (EAC) to
display the migration status information for all users in a migration batch. You can also
display detailed migration information for each user in a migration batch. This
information, also called migration user statistics, can help you troubleshoot issues that
might prevent the migration of a user's mailbox or mailbox items. You can display this
migration status information for migration batches that are currently running, that have
been stopped, or that are complete.
You can also use Exchange Online PowerShell to display migration user statistics. For
more information, see:
Get-MigrationUser
Get-MigrationUserStatistics
The name of the migration batch and the following commands are displayed at the top
of the window.
Command Description
Delete Delete the selected user from the list of migration users.
Refresh Refresh the list of migration users to update the information displayed for the users
in the migration batch.
Column Description
Status The user's migration status. See the status descriptions in the table in the next section.
Items The number of items in the user's on-premises mailbox that were successfully
Synced migrated to the Microsoft 365 or Office 365 mailbox.
Items The number of items in the user's on-premises mailbox that weren't migrated to the
Skipped Microsoft 365 or Office 365 mailbox.
Field Description
Field Description
Status Identifies the specific point in the migration process for each mail object in the
migration batch. This status is more specific than the high-level status summary
displayed in the list of migration users. The following list describes each status state.
Completed: The migration process is successfully completed and all mailbox
items were migrated to the cloud-based mailbox.
Queued: The object is in a migration batch that is running, but the migration
of the object hasn't started yet. Objects typically have a status of Queued
when all of the connections in the migration endpoint associated with the
migration batch are being used.
Synced: The migration process successfully provisioned the Microsoft 365 or
Office 365 mailbox and completed the initial synchronization where all mailbox
items were copied to the cloud-based mailbox. For cutover Exchange
migrations and IMAP migrations, this status can also indicate that incremental
synchronization completed successfully.
Failed: The provisioning or the initial synchronization of the mail object failed.
If a Microsoft 365 or Office 365 mailbox is successfully created for a user, but
the migration of mailbox items fails, the status for the user will be Failed.
Skipped Click Skipped item details to display information about each item that was skipped
item for the selected user. The following information about each skipped item is
details displayed:
Data The total amount of data (in bytes and megabytes (MB)) for the mailbox items that
migrated have been migrated to the Microsoft 365 or Office 365 mailbox. This number
includes items migrated in both the initial and incremental synchronizations. This
field doesn't have a value for IMAP migrations.
Migration The average transfer rate (in bytes or MB per minute) of data copied to the Microsoft
rate 365 or Office 365 mailbox. This field doesn't have a value for IMAP migrations.
Error If the migration for the user failed, this field displays a description of the error. This
error description is also included in the Migration Errors report.
Report Click Download the report for this user to open or save a detailed migration report
that contains diagnostic information about the migration status of the user. You or
Microsoft Support can use the information in this report to troubleshoot failed
migrations.
Last The last time that any new items in the on-premises mailbox were copied to the
successful cloud-based mailbox.
sync date
Migration users report in Classic Exchange
admin center (Classic EAC)
To access the migration users report for a migration batch, select Recipients >
Migration, select the migration batch, and then in the details pane, under Mailbox
status, click View details.
The name of the migration batch and the following commands are displayed at the top
of the window.
Command Description
Delete Delete the selected user from the list of migration users.
Refresh Refresh the list of migration users to update the information displayed for the users
in the migration batch.
Column Description
Status The user's migration status. See the status descriptions in the table in the next section.
Column Description
Items The number of items in the user's on-premises mailbox that were successfully
Synced migrated to the Microsoft 365 or Office 365 mailbox.
Items The number of items in the user's on-premises mailbox that weren't migrated to the
Skipped Microsoft 365 or Office 365 mailbox.
Field Description
Status Identifies the specific point in the migration process for each mail object in the
migration batch. This status is more specific than the high-level status summary
displayed in the list of migration users. The following list describes each status state.
Queued: The object is in a migration batch that is running, but the migration
of the object hasn't started yet. Objects typically have a status of Queued
when all of the connections in the migration endpoint associated with the
migration batch are being used.
Provisioning: The migration process has started for the mail object, but it isn't
provisioned yet.
Provision updating: The mail object has been provisioned, but not all the
object's properties were migrated. For example, after a distribution group has
been migrated, this state occurs when members of the group haven't been
migrated yet or there's a problem migrating a user who is a member of the
group. In this case, the status indicates the migration process can't update the
group membership because not all group members have been migrated.
Synced: The migration process successfully provisioned the Microsoft 365 or
Office 365 mailbox and completed the initial synchronization where all mailbox
items were copied to the cloud-based mailbox. For cutover Exchange
migrations and IMAP migrations, this status can also indicate that incremental
synchronization completed successfully.
Failed: The provisioning or the initial synchronization of the mail object failed.
If a Microsoft 365 or Office 365 mailbox is successfully created for a user, but
the migration of mailbox items fails, the status for the user will be Failed.
Field Description
Skipped Click Skipped item details to display information about each item that was skipped
item for the selected user. The following information about each skipped item is
details displayed:
Data The total amount of data (in bytes and megabytes (MB)) for the mailbox items that
migrated have been migrated to the Microsoft 365 or Office 365 mailbox. This number
includes items migrated in both the initial and incremental synchronizations. This
field doesn't have a value for IMAP migrations.
Migration The average transfer rate (in bytes or MB per minute) of data copied to the Microsoft
rate 365 or Office 365 mailbox. This field doesn't have a value for IMAP migrations.
Error If the migration for the user failed, this field displays a description of the error. This
error description is also included in the Migration Errors report.
Report Click Download the report for this user to open or save a detailed migration report
that contains diagnostic information about the migration status of the user. You or
Microsoft Support can use the information in this report to troubleshoot failed
migrations.
Last The last time that any new items in the on-premises mailbox were copied to the
successful cloud-based mailbox.
sync date
Click More details to display the following additional information about the selected
migration user.
Field Description
Queued duration The length of time the user had a status of Queued.
In-progress duration The length of time the user was actively being migrated.
Synced duration The length of time the migration user had a status of Synced.
Stalled duration The length of time the migration process was stalled for the user.
Migration phases
To help you understand the migration status states described in the previous sections,
it's helpful to be familiar with the phases of the migration process. The following table
describes these phases and indicates whether the phase is included in each type of
migration.
Provisioning: The migration process creates the new Yes (includes Yes No
Microsoft 365 or Office 365 mailbox. distribution (includes
groups and mail
mail contacts) contacts)
Initial synchronization: After Microsoft 365 or Office Yes (includes Yes Yes
365 mailboxes are provisioned, the migration calendar times (includes
process migrates mailbox items to the newly and contacts) calendar
provisioned cloud-based mailboxes. times and
contacts)
You can use a comma-separated values (CSV) file to bulk migrate a large number of user
mailboxes. You can specify a CSV file when you use the Exchange admin center (EAC) or
the New-MigrationBatch cmdlet in Exchange Online PowerShell to create a migration
batch. Using a CSV to specify multiple users to migrate in a migration batch is
supported in the following migration scenarios:
7 Note
Staged Exchange migration: You can also migrate a subset of mailboxes from
an on-premises Exchange organization to Microsoft 365 or Office 365. This is
another type of onboarding migration. You can migrate only Exchange 2003
and Exchange 2007 mailboxes using a staged Exchange migration. Migrating
Exchange 2010 and Exchange 2013 mailboxes isn't supported using a staged
migration. Prior to running a staged migration, you have to use directory
synchronization or some other method to provision mail users in your Microsoft
365 or Office 365 organization.
IMAP migration: This onboarding migration type migrates mailbox data from
an IMAP server (including Exchange) to Microsoft 365 or Office 365. For an
IMAP migration, you must provision mailboxes in Microsoft 365 or Office 365
before you can migrate mailbox data.
7 Note
A cutover Exchange migration doesn't support using a CSV file because all on-
premises user mailboxes are migrated to Microsoft 365 or Office 365 in a single
batch.
Attribute values in the CSV file override the value of the corresponding parameter when
that same parameter is used when creating a migration batch with the EAC or Exchange
Online PowerShell. For more information and examples, see the section Attribute values
in the CSV file override the values for the migration batch.
Tip
You can use any text editor to create the CSV file, but using an application like
Microsoft Excel will make it easier to import data and configure and organize CSV
files. Be sure to save CSV files as a .csv or .txt file.
The following sections describe the supported attributes for the header row of a CSV file
for each migration type. Each section includes a table that lists each supported attribute,
whether it's required, an example of a value to use for the attribute, and a description.
7 Note
All mailboxes that are specified in the CSV file will be migrated, even if they
are outside of the RBAC scope (for example, an OU) that gives the admin
permissions to migrate mailboxes.
The following table describes the supported attributes for a CSV file for a staged
Exchange migration.
EmailAddress Required SMTP Specifies the email address for the mail-
address for enabled user (or a mailbox if you're retrying
the user the migration) in Microsoft 365 or Office
365 that corresponds to the on-premises
user mailbox that will be migrated. Mail-
enabled users are created in Microsoft 365
or Office 365 as a result of directory
synchronization or another provisioning
process. The email address of the mail-
enabled user must match the
WindowsEmailAddress property for the
corresponding on-premises mailbox.
Attribute Required Accepted Description
or values
optional
IMAP migrations
A CSV file for an IMAP migration batch can have maximum of 50,000 rows. But it's a
good idea to migrate users in several smaller batches. For more information about IMAP
migrations, see the following topics:
The following table describes the supported attributes for a CSV file for an IMAP
migration.
EmailAddress Required SMTP address Specifies the user ID for the user's Microsoft 365 or
for the user. Office 365 mailbox
UserName Required String that Specifies the logon name for the user's account in
identifies the the IMAP messaging system (the source
user on the environment). In addition to the username, you can
IMAP use the credentials of an account that has been
messaging assigned the necessary permissions to access
system, in a mailboxes on the IMAP server. For more
format information, see CSV files for IMAP migration
supported by batches.
the IMAP
server.
Password Required Password Specifies the password for the user account
string. specified by the UserName attribute.
In this example, let's say you create a batch for an onboarding remote move migration
in a hybrid deployment to move archive mailboxes to Microsoft 365 or Office 365 with
the following New-MigrationBatch command.
PowerShell
But you also want to move the primary mailboxes for selected users, so a portion of the
OnBoarding1.csv file for this migration batch would look like this:
PowerShell
EmailAddress,MailboxType
user1@contoso.com,
user2@contoso.com,
user3@cloud.contoso.com,PrimaryAndArchive
user4@cloud.contoso.com,PrimaryAndArchive
...
Because the value for mailbox type in the CSV file overrides the values for the
MailboxType parameter in the command to create the batch, only the archive mailbox
for user1 and user2 is migrated to Microsoft 365 or Office 365. But the primary and
archive mailboxes for user3 and user4 are moved to Microsoft 365 or Office 365.
Plan for third-party email coexistence
with Microsoft 365 or Office 365 and
Azure Active Directory
Article • 02/22/2023
Most Microsoft email migration information assumes that you're running Exchange
Server in your on-premises organization. This topic is for organizations that use Active
Directory as their on-premises identity platform and a third-party messaging system (for
example, IBM Lotus Notes or Novell GroupWise) for email.
As you plan for this third-party email coexistence, consider the Azure Active Directory
hybrid identity options and the authentication choices for synchronization and end user
authentication options.
Scenario goals:
Mail routing from the cloud to the on-premises organization uses a shared domain
namespace.
Or, as part of a migration strategy, the mail-enabled users in the cloud might be
licensed with Exchange Online mailboxes.
Cross-premises coexistence might last indefinitely. The cloud address list, proper
mail routing, and message format fidelity all meet business-class requirements
Requirements:
Every recipient object from the third-party system needs to have corresponding
user object in local Active Directory. The users will need mail-enabled as part of the
coexistence process.
Technical Overview
To enable any cross-premises messaging scenario, you need to determine how you will
route email between the on-premises organization and the cloud. From an
implementation perspective, the choice comes down to where inbound mail goes first:
to the on-premises messaging system or to the cloud. The one you choose depends on
the goals of the cross-premises deployment.
The process of synchronizing mail-enabled users with the correct target address
requires installing the Azure Active Directory Connect tool in your on-premises Active
Directory. The Azure Active Directory Connect tool synchronizes the on-premises mail-
enabled user in the Active Directory with a target address value that matches the shared
namespace and need to be a verified domain in Microsoft 365 or Office 365.
For example, if you've verified the domain in your Microsoft 365 deployment (for
example, domino.contoso.com), the Azure Active Directory Connect tool synchronizes
mail-enabled user objects in your Active Directory that have a target address with
domino.contoso.com in the target address property. This is used to route email cross
premises. The user's primary SMTP address in this scenario would remain contoso.com,
provided contoso.com is a verified domain in Microsoft 365.
The use of the Exchange admin center and Exchange Management Shell is required to
manage all the Exchange recipient properties in the Active Directory.
Mail formatting
Because you will be configuring Exchange Online to send email to your on-premises
mail system, you'll have to make an additional configuration in the cloud to avoid mail
formatting issues.
By default, Exchange Online sends messages back to the on-premises email system in
rich text or Transport Neutral Encapsulation Format (TNEF), which might result in your
users receiving plain text emails with Winmail.dat attachments. As a result, you need to
configure Exchange Online to send all mail to your on-premises system in non-TNEF
format (HTML or text). To do this, you need to specify the on-premises primary SMTP
domain as a remote domain in Exchange Online. You can then disable TNEF formatting
for all email that is sent to the remote domain.
Implementation
In many cases, the links refer to configuration particulars for an on-premises Exchange
messaging system. You will have to translate the goals of the Exchange Server
configurations to specific configurations of your third-party messaging solution. As an
example, mail-forwarding is a straightforward goal, but it's an area where configuration
differs widely across messaging systems.
The following steps outline the process for implementing third-party messaging
coexistence with Microsoft 365 or Office 365:
Step 5: Install and Configure Azure Active Directory Connect to synchronize mail-
enabled users into Azure Active Directory (Microsoft 365 or Office 365)
When you subscribe, be sure to verify the primary SMTP domain in your organization
with Microsoft 365 or Office 365. The process of verifying a domain proves that you own
the domain. The verified domain is also the domain that the Azure Active Directory Sync
tool uses to provision objects in the cloud. Then add the mail routing domain
representing the third-party system.
4. Configure the Accepted Domains to match the existing SMTP address domains
from the third-party system.
6. Create e-mail address policies to map the existing naming conventions of the
company smtp addresses for primary domains and the mail routing domain.
Step 3: Execute the Exchange Hybrid
Configuration Wizard
1. Use the Exchange Hybrid Configuration Wizard, specifically in Classic mode with
the Hybrid Minimal Configuration. In this topic, only do Step 2: Start express
migration.
2. Complete the Hybrid Configuration Wizard. Do not use the Express Settings option
in the Wizard, AADConnect will be configured later. Do not license the users or
migrate any data.
Using the Exchange Management Shell, run Enable-MailUser for each user that you want
to be displayed in the cloud address book and who has a mailbox in your on-premises
messaging organization.
The Enable-MailUser cmdlet only takes the ExternalEmailAddress parameter. This is also
referred to as the target address of the mail-enabled user object. This parameter updates
the target SMTP address for the mail-enabled user, which enables cross-premises mail
flow.
The ExternalEmailAddress parameter is an email address that you enter for the user. The
email address must meet the following criteria:
It must be the valid primary SMTP email address of the user in your on-premises
organization.
The domain part of the email address (to the right of the @ sign) must match the
verified domain in Microsoft 365.
The domain part of the email address must match the UPN domain for the user in
the on-premises directory.
To learn more about how to install, configure, and run Exchange Management Shell, see
Exchange Management Shell.
If you need to create or modify users in your on-premises Active Directory, see the
following topics:
The Exchange Hybrid Deployment feature allows for the co-existence of Exchange
mailboxes in both on-premises and Microsoft 365 or Office 365. Azure AD Connect is
synchronizing a specific set of attributes from Azure AD back into your on-premises
directory.
In either case, the cloud-based Exchange Online configurations are similar. After you've
configured a shared namespace, you should be able to send email between the two
messaging systems. If free busy is required as part of the coexistence strategy, work with
the software vendor to ensure the namespace planning will work with their free busy
application.
Mailbox migration
This section provides links to more information about migrating mailboxes from your
on-premises organization to the cloud.
For organizations that use Outlook as an email client, you can also use the PST Capture
tool to migrate messaging data to the cloud.
For other messaging migration solutions, you might need to work with a third-party
solution provider.
Here are some third-party migration tools and partners that can assist with Exchange
migrations from third-party platforms:
To provision mailboxes for these users, license them for Exchange Online in the
Microsoft 365 admin console. For more information, see Sync with existing users in
Azure AD.
Collaboration in Exchange Online
Article • 02/22/2023
Microsoft 365 or Office 365 and Exchange Online provide several features that can help
your end users easily collaborate in email.
Each of these features, described in the following sections, has a different user
experience and feature set and should be used based on what your users need to
accomplish and what your organization can provide.
This topic compares these collaboration features to help you decide which features to
offer your users.
Public folders
Public folders are designed for shared access and provide an easy and effective way to
collect, organize, and share information with other people in your workgroup or
organization.
Public folders organize content in a deep hierarchy that's easy to browse. Users discover
interesting and relevant content by browsing through branches of the hierarchy that are
relevant to them. Users always see the full hierarchy in their Outlook folder view. Public
folders are a great technology for distribution group archiving. A public folder can be
mail-enabled and added as a member of the distribution group. Email sent to the
distribution group is automatically added to the public folder for later reference. Public
folders also provide simple document sharing and don't require SharePoint to be
installed in your organization. Finally, end users can use public folders with the following
supported Outlook clients: Outlook 2010 or later and Outlook on the web (formerly
known as Outlook Web App), but with some limitations.
To learn more, see Public folders in Microsoft 365 or Office 365 and Exchange Online.
Shared mailboxes
A shared mailbox is a mailbox that multiple designated users can access to read and
send email messages and to share a common calendar. Shared mailboxes can provide a
generic email address (such as info@contoso.com or sales@contoso.com) that
customers can use to inquire about your company. If the shared mailbox has the Send
As permission assigned when a delegated user responds to the email message, it can
appear as though the mailbox (for example, sales@contoso.com) is responding, not the
actual user.
Groups
Groups (also called distribution groups) are a collection of two or more recipients that
appears in the shared address book. When an email message is sent to a group, it's
received by all members of the group. Distribution groups can be organized by a
particular discussion subject (such as "Dog Lovers") or by users who share a common
work structure that requires them to communicate frequently.
Type of With the proper Delegates working on behalf Users who need to
group permissions, everyone in of a virtual identity, and they send email to a
your organization can can respond to email as that group of recipients
access and search public shared mailbox identity. with a common
folders. Public folders are Example: interest or
ideal for maintaining support@tailspintoys.com characteristic.
history or distribution
group conversations.
Email No. Email arrives in the No. Email arrives in the Inbox Yes. Email arrives in
arrives in public folder. of the shared mailbox. the Inbox of a
user's distribution group
personal member.
Inbox?
7 Note
1 Depending on workload, the ideal group size may be very small (not more than
25). If more than a few users need to access a Shared mailbox at the same time,
consider one of the other options.
Public folders in Microsoft 365, Office
365, and Exchange Online
Article • 02/22/2023
Public folders are designed for shared access and provide an easy and effective way to
collect, organize, and share information with other people in your workgroup or
organization. Public folders help organize content in a deep hierarchy that's easy to
browse. Users will see the full hierarchy in Outlook, which makes it easy for them to
browse for the content they're interested in.
7 Note
Public folders are available in the following Outlook clients: Outlook on the web
(formerly known as Outlook Web App), Outlook 2007 or later, and Outlook for Mac.
Public folders can also be used as an archiving method for distribution groups. When
you mail-enable a public folder and add it as a member of the distribution group, email
sent to the group is automatically added to the public folder for later reference.
7 Note
Data archiving. Users who have mailbox limits sometimes use public folders
instead of mailboxes to archive data. This practice isn't recommended because it
affects storage in public folders and undermines the goal of mailbox limits. Instead,
we recommend that you use In-Place Archiving as your archiving solution.
For more information about public folder quotas in Microsoft 365, Office 365, and
Exchange Online, see the service description articles Sharing and collaboration and
Exchange Online limits.
For a list of public folder management tasks, see Public folder procedures in Microsoft
365, Office 365, and Exchange Online.
For more information about the public folder limits in Microsoft 365, Office 365, and
Exchange Online, see Exchange Online limits.
Looking for the Exchange Server version of this article? See Public folders in Microsoft
365, Office 365, and Exchange Online.
Primary hierarchy mailbox: The primary hierarchy mailbox is the one writable copy
of the public folder hierarchy. The public folder hierarchy is copied to all other
public folder mailboxes, but these will be read-only copies.
There are two ways you can manage public folder mailboxes:
In the Exchange admin center (EAC), navigate to Public folders > Public folder
mailboxes.
The folder's position in the public folder tree, including its parent and child folders
7 Note
The hierarchy doesn't store information about email addresses for mail-enabled
public folders. Email addresses are stored in the directory.
Hierarchy synchronization
The public folder hierarchy synchronization process uses Incremental Change
Synchronization (ICS), which provides a mechanism to monitor and synchronize changes
to an Exchange store hierarchy or content. The changes include creating, modifying, and
deleting folders and messages. When users are connected to and using content
mailboxes, synchronization occurs every 15 minutes. If no users are connected to
content mailbox, synchronization will be triggered less often (every 24 hours). If a write
operation such as a creating a folder is performed on the primary hierarchy,
synchronization is triggered immediately (synchronously) to the content mailbox.
) Important
Because there's only one writeable copy of the hierarchy, folder creation is proxied
to the hierarchy mailbox by the content mailbox users are connected to.
Considerations
Although there are many advantages to using public folders in Microsoft 365, Office
365, and Exchange Online, there are some things to consider before implementing them
in your organization:
Outlook on the web is supported, but with limitations. You can add and remove
favorite public folders and perform item-level operations such as creating, editing,
deleting posts, and replying to posts. However, you can't create or delete public
folders from Outlook on the web.
Although a full text search of public folder content is available, public folder
content isn't searchable across public folders and the content isn't indexed by
Exchange Search.
You must use Exchange Online supported Outlook client or later to access public
folders in Microsoft 365, Office 365, and Exchange Online.
Exchange supports moving your public folders to Microsoft 365 or Office 365 and
Exchange Online from the following legacy versions of Exchange Server:
See Use batch migration to migrate Exchange Server public folders to Exchange Online
to migrate your Exchange Server public folders.
We recommend that you use batch migration instead of Outlook's PST export feature to
migrate public folders to Microsoft 365 or Office 365 and Exchange Online. Microsoft
365 and Office 365 public folder mailbox growth is managed using an auto-split feature
that splits the public folder mailbox when it exceeds size quotas. Auto-split can't handle
the sudden growth of public folder mailboxes when you use PST export to migrate your
public folders and you might have to wait for up to two weeks for auto-split to move
the data from the primary mailbox. We provide batch migration instructions in Use
batch migration to migrate legacy public folders to Microsoft 365 or Office 365 and
Exchange Online and Use batch migration to migrate Exchange Server public folders to
Exchange Online. However, if you've elected to do a PST migration and have run into an
issue where the primary mailbox is full, you have two options for recovering the PST
migration:
1. Wait for the auto-split to move the data from the primary mailbox. This may take
up to two weeks. However, all the public folders in a completely filled public folder
mailbox won't be able to receive new content until the auto-split completes.
2. Create a public folder mailbox and then use the New-PublicFolder cmdlet with the
Mailbox parameter to create the remaining public folders in the secondary public
folder mailbox. This example creates a new public folder named PF201 in the
secondary public folder mailbox.
PowerShell
Use batch migration to migrate legacy public folders to Microsoft 365 or Office 365 and
Exchange Online
Use batch migration to migrate Exchange Server public folders to Exchange Online
Summary: Use these procedures to move your Exchange 2010 public folders to
Microsoft 365 or Office 365.
This topic describes how to migrate your public folders in a cutover or staged migration
from Update Rollup 8 for Exchange Server 2010 Service Pack 3 (SP3) to Microsoft 365 or
Office 365 and Exchange Online.
This topic refers to the Exchange 2010 SP3 RU8 server as the legacy Exchange server.
Also, the steps in this topic apply to both Exchange Online and Microsoft 365 or Office
365. The terms may be used interchangeably in this topic.
We recommend that you don't use Outlook's PST export feature to migrate public
folders to Microsoft 365 or Office 365 or Exchange Online. Microsoft 365, Office 365,
and Exchange Online public folder mailbox growth is managed using an auto-split
feature that splits the public folder mailbox when it exceeds size quotas. Auto-split can't
handle the sudden growth of public folder mailboxes when you use PST export to
migrate your public folders and you may have to wait for up to two weeks for auto-split
to move the data from the primary mailbox. We recommend that you use the cmdlet-
based instructions in this document to migrate public folders to Microsoft 365, Office
365, or Exchange Online. However, if you elect to migrate public folders using PST
export, see the Migrate Public Folders to Microsoft 365 or Office 365 by using Outlook
PST export section later in this topic.
You'll perform the migration using the *-MigrationBatch cmdlets, in addition to the
following PowerShell scripts:
at source and reports issues found along with action to fix the issues. You'll run this
script on the legacy Exchange server On-Premises.
size mapping file. You'll run this script on the legacy Exchange server.
Step 1: Download the migration scripts provides details about where to download these
scripts. Make sure all scripts are downloaded to the same location.
You can't migrate public folders directly from Exchange 2003 or Exchange 2007. If you're
running Exchange 2007 or earlier in your organization, you need to move all public
folder databases and replicas to Exchange 2010 SP3 RU8 or later. No public folder
replicas can remain on Exchange 2007 or earlier. Additionally, mail destined for an
Exchange 2013 or later public folder can't be routed through an Exchange 2003 or
Exchange 2007 server.
In Microsoft 365 or Office 365 and Exchange Online, you need to be a member of
the Organization Management role group. This role group is different from the
permissions assigned to you when you subscribe to Microsoft 365, Office 365, or
Exchange Online. For details about how to enable the Organization Management
role group, see Manage role groups in Exchange Online.
Before you begin the public folder migration, if any single public folder in your
organization is larger than 25 GB, we recommend that you delete content from
that folder to make it smaller. Or, we recommend that you divide the public
folder's content into multiple, smaller public folders. Note that the 25 GB limit cited
here only applies to the public folder and not to any child or sub-folders the folder
in question may have. If neither option is feasible, we recommend that you do not
move your public folders to Exchange Online. See Exchange Online Limits for more
information. Note: If your current public folder quotas in Exchange Online are less
than 25 GB, you can use the Set-OrganizationConfig cmdlet to increase them with
the DefaultPublicFolderIssueWarningQuota and
DefaultPublicFolderProhibitPostQuota parameters.
If you use a firewall and access control lists (ACLs), ensure that the IP ranges used by
Microsoft 365 or Office 365 in your region are permitted through your firewall.
In Microsoft 365, Office 365, and Exchange Online, you can create a maximum of
1,000 public folder mailboxes.
Before you migrate your public folders, we recommend that you first move all user
mailboxes to Microsoft 365 or Office 365 and Exchange Online. For details, see
Ways to migrate multiple email accounts to Microsoft 365 or Office 365. However,
you will still need to keep in the on-premises environment the mailbox for PF
admin performing migration or create new PF admin account and assign a mailbox
hosted on the legacy Exchange server.
Outlook Anywhere needs to be enabled on the legacy Exchange server. For details
about enabling Outlook Anywhere on Exchange 2010 servers, see Enable Outlook
Anywhere.
You can't use the Exchange admin center (EAC) or the Exchange Management
Console (EMC) to perform this procedure. On the legacy Exchange servers, you
need to use the Exchange Management Shell. For Exchange Online, you need to
use Exchange Online PowerShell. For more information, see Connect to Exchange
Online PowerShell.
You must use a single migration batch to migrate all of your public folder data.
Exchange allows creating only one migration batch at a time. If you attempt to
create more than one migration batch simultaneously, the result will be an error.
Before you begin, we recommend that you read this topic in its entirety as
downtime is required for some steps.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
2. Save the scripts to the local computer on which you'll be running PowerShell. For
example, C:\PFScripts. Make sure all scripts are saved in the same location.
3. Download the following files from Mail-enabled Public Folders - directory sync
script :
Sync-MailPublicFolders.ps1
SyncMailPublicFolders.strings.psd1
5. Save the scripts to the same location you did for step 2. For example, C:\PFScripts.
7 Note
We strongly recommend running the Source Side Validation script from an On-
Premises Exchange Server2010 with mailbox role. The script will scan and report
issues that are known to cause migration to be slow, along with guidance to fix
these issues. Please use the examples as documented here .
We strongly recommend running the Source Side Validation script from an On-
Premises Exchange Server2010 with mailbox role. The script will scan and report
issues that are known to cause migration to be slow, along with guidance to fix
these issues. Please use the examples as documented here . The script will
perform all the following prerequisites.
1. On the legacy Exchange server, make sure that routing to the mail-enabled public
folders that will exist in Microsoft 365 or Office 365 or Exchange Online continues
to work until all DNS caches over the internet are updated to point to the
Microsoft 365, Office 365, or Exchange Online DNS where your organization now
resides. To do this, run the following command to configure an accepted domain
with a well-known name that will properly route email messages to the Microsoft
365, Office 365, or Exchange Online domain.
PowerShell
New-AcceptedDomain -Name
"PublicFolderDestination_78c0b207_5ad2_4fee_8cb9_f373175b3f99" -
DomainName <target domain> -DomainType InternalRelay
Example:
PowerShell
New-AcceptedDomain -Name
PublicFolderDestination_78c0b207_5ad2_4fee_8cb9_f373175b3f99 -
DomainName 'contoso.mail.onmicrosoft.com' -DomainType InternalRelay
PowerShell
PowerShell
In Exchange 2010, to locate public folders that have a backslash in the name, run
the following command:
PowerShell
2. If any public folders are returned, you can rename them by running the following
command:
PowerShell
3. Make sure there isn't a previous record of a successful migration. If there is, you'll
need to set that value to $false . If the value is set to $true , the migration request
will fail.
PowerShell
Get-OrganizationConfig | Format-List
PublicFoldersLockedforMigration,PublicFolderMigrationComplete
4. (Note that this step is only necessary if you are re-attempting a migration that
failed previously.) If the status of the PublicFoldersLockedforMigration or
PublicFolderMigrationComplete properties is $true , run the following command to
set the value to $false .
PowerShell
Set-OrganizationConfig -PublicFoldersLockedforMigration:$false -
PublicFolderMigrationComplete:$false
U Caution
After resetting these properties, you need to wait for Exchange to detect the
new settings. This may take up to two hours to complete.
5. For verification purposes at the end of migration, we recommend that you first run
the following Exchange Management Shell commands on the legacy Exchange
server to take snapshots of your current public folder deployment.
Run the following command to take a snapshot of the original source folder
structure.
PowerShell
Run the following command to take a snapshot of public folder statistics such as
item count, size, and owner.
PowerShell
PowerShell
Get-PublicFolder -Recurse -ResultSize Unlimited | Get-
PublicFolderClientPermission | Select-Object Identity,User -
ExpandProperty AccessRights | Export-CliXML
C:\PFMigration\Legacy_PFPerms.xml
Save the information from the preceding commands for comparison at the end of
the migration.
6. If you are using Microsoft Azure Active Directory Connect (Azure AD Connect) to
synchronize your on-premises directories with Azure Active Directory, you need to
do the following (if you are not using Azure AD Connect, you can skip this step):
c. On the Connect to Azure AD screen, enter the appropriate credentials, and then
click Next. Once connected, keep clicking Next until you are on the Optional
Features screen.
d. Make sure that Exchange Mail Public Folders is not selected. If it isn't selected,
you can continue to the next section, Prerequisite steps in Microsoft 365, Office
365, or Exchange Online. If it is selected, click to clear the check box, and then
click Next.
7 Note
7. After you have cleared the Exchange Mail Public Folders selection, keep clicking
Next until you are on the Ready to configure screen, and then click Configure.
For detailed syntax and parameter information, see the following topics:
New-AcceptedDomain
Get-PublicFolder
Get-PublicFolderDatabase
Set-PublicFolder
Get-PublicFolderStatistics
Get-PublicFolderClientPermission
Get-OrganizationConfig
Set-OrganizationConfig
) Important
The following example will discover any existing batch migration requests:
PowerShell
The following example removes any existing public folder batch migration
requests.
PowerShell
2. Make sure no public folders or public folder mailboxes exist in Microsoft 365 or
Office 365.
) Important
If you do see public folders in Microsoft 365, Office 365, or Exchange Online, it
is important to determine why they are there, and who in your organization
started a public folder hierarchy, before you remove the public folders and
public folder mailboxes.
a. In Exchange Online PowerShell, run the following command to see if any public
folders mailboxes exist:
PowerShell
Get-Mailbox -PublicFolder
b. If the command didn't return any public folder mailboxes, continue to Step 3:
Generate the .csv files. If the command returned any public folders mailboxes,
run the following command to see if any public folders exist:
PowerShell
Get-PublicFolder
c. If you have any public folders in Microsoft 365, Office 365, or Exchange Online,
run the following PowerShell command to remove them. Make sure you've
saved any information that was in the public folders in Microsoft 365 or Office
365.
U Caution
PowerShell
d. After the public folders are removed, run the following commands to remove all
public folder mailboxes.
PowerShell
$hierarchyMailboxGuid = $(Get-
OrganizationConfig).RootPublicFolderMailbox.HierarchyMailboxGuid
Get-Mailbox -PublicFolder:$true | Where-Object {$_.ExchangeGuid -ne
$hierarchyMailboxGuid} | Remove-Mailbox -PublicFolder -Confirm:$false
Get-Mailbox -PublicFolder:$true | Where-Object {$_.ExchangeGuid -eq
$hierarchyMailboxGuid} | Remove-Mailbox -PublicFolder -Confirm:$false
For detailed syntax and parameter information, see the following topics:
Get-MigrationBatch
Get-PublicFolderMailboxMigrationRequest
Remove-PublicFolderMailboxMigrationRequest
Get-Mailbox
Get-PublicFolder
get-MailPublicFolder
Disable-MailPublicFolder
remove-PublicFolder
Remove-Mailbox
PowerShell
FQDN of source server equals the fully qualified domain name of the Mailbox
server where the public folder hierarchy is hosted.
Folder to size map path equals the file name and path on a network shared
folder where you want the .csv file saved. Later in this topic, you'll need to use
the Exchange Online PowerShell to access this file. If you specify only the file
name, the file will be generated in the current PowerShell directory on the
local computer.
If necessary, remove any mail-enabled system folders from the script output
before proceeding.
PowerShell
Before you run the script, use the following command to check the current
public folder limits in your Exchange Online tenant. Then, note the current
quota values for public folders.
PowerShell
Maximum mailbox size in bytes equals the maximum size that you want to set
for the new public folder mailboxes. In Exchange Online, the maximum size of
public folder mailboxes is 100 GB. We recommend that you use a setting of
75 GB so that each public folder mailbox has room to grow. Fewer public
folder mailboxes will mean fewer connections for the Outlook clients, which
might help to avoid performance issues; for the users it is transparent where
the information is hosted, as they will further see the same hierarchy on the
client side. Exchange Online has a default public folder "prohibit post" quota
of 2 GB. If you have individual public folders that are larger than 2 GB, you
can use any of the following options to fix this issue:
Before you start the migration batch, increase the default public folder
"prohibit post" quota by running the following command:
PowerShell
Before you start the migration batch, split the public folder into multiple
public folders that are each 2 GB or less.
7 Note
If the public folder is larger than 30 GB, and if it isn't feasible to delete
content or split it into multiple public folders, we recommend that you
don't move your public folders to Exchange Online.
Folder to size map path equals the file path of the .csv file that you created
when you ran the Export-PublicFolderStatistics.ps1 script.
Folder to mailbox map path equals the file name and path of the folder-to-
mailbox .csv file that you create in this step. If you specify only the file name,
the file is generated in the current PowerShell directory on the local
computer.
7 Note
After the scripts are run and the .csv files are generated, any new public folders or
updates to existing public folders will not be collected.
PowerShell
Use Exchange Online PowerShell for running this script. For more information, see
Connect to Exchange Online PowerShell.
b. Install EXO PowerShell. For information on how to install EXO PowerShell, see
here.
PowerShell
e. Once prompted, enter the credentials for your Microsoft 365 tenant
administrator account.
2. On the legacy Exchange server, get the following information that's needed to run
the migration request:
a. Find the LegacyExchangeDN of the user's account who is a member of the Public
Folder Administrator role. This will be the same user whose credentials you need
in step 3 of this procedure.
7 Note
PowerShell
Get-Mailbox <PublicFolder_Administrator_Account> | Select-Object
LegacyExchangeDN
b. Find the LegacyExchangeDN of any Mailbox server that has a public folder
database.
PowerShell
c. Find the FQDN of the Outlook Anywhere host name. If you have multiple
instances of Outlook Anywhere, we recommend that you select the instance
that is either closest to the migration endpoint or the one that is closest to the
public folder replicas in the legacy Exchange organization. The following
command will find all instances of Outlook Anywhere:
PowerShell
a. Pass the credential of a user who has administrative permissions on the legacy
Exchange server into the variable $Source_Credential . The migration request
that's run in Exchange Online will use this credential to gain access to your
legacy Exchange servers to copy the content over.
PowerShell
$Source_Credential = Get-Credential
<source_domain\PublicFolder_Administrator_Account>
b. Use the ExchangeLegacyDN of the migration user on the legacy Exchange server
that you found in step 2a and pass it into the variable
$Source_RemoteMailboxLegacyDN .
PowerShell
PowerShell
d. Use the External Host Name of Outlook Anywhere that you found in step 2c
above and pass it into the variable $Source_OutlookAnywhereExternalHostName .
PowerShell
4. Finally, in Exchange Online PowerShell, run the following commands to create the
migration request.
7 Note
PowerShell
Where folder_mapping.csv is the map file that was generated in Step 3: Generate
the .csv files.
7 Note
You may notice the above command failing with the error "Cannot find a
recipient that has mailbox GUID" error, with the GUID mentioned of public
folder mailbox in EXO. This can happen because of AD replication latency. In
such case, wait for an hour and retry the command again.
PowerShell
Start-MigrationBatch PublicFolderMigration
3. Select the migration request that was just created and then click View Details in
the Details pane.
For detailed syntax and parameter information, see the following topics:
Get-Mailbox
Get-ExchangeServer
Get-OutlookAnywhere
New-MigrationBatch
Get-PublicFolderDatabase
Get-PublicFolderMailboxMigrationRequest
Get-PublicFolderMailboxMigrationRequestStatistics
7 Note
The final sync may take substantial amount of time, depending on the changes
made on the source environment, size of public folder deployment, server capacity
etc. If the folder hierarchy had lots of corrupt ACLs and those were not cleaned up
before starting migration, this can cause significant delay in the completion. It is
recommended to plan for a minimum of 48 hours of downtime for the final sync to
complete.
Ensure the migration batch and individual migration requests have successfully synced.
Run the following commands in Exchange Online PowerShell to get the details:
PowerShell
PowerShell
Get-PublicFolderMailboxMigrationRequest | Get-
PublicFolderMailboxMigrationRequestStatistics | Format-Table
targetmailbox,*last*sync*
Once you have confirmed the batch and all migration requests have successfully synced,
on the legacy Exchange server, run the following command to lock the legacy public
folders for finalization.
PowerShell
Set-OrganizationConfig -PublicFoldersLockedForMigration:$true
For detailed syntax and parameter information, see set-OrganizationConfig.
If your organization has multiple public folder databases, you'll need to wait until public
folder replication is complete to confirm that all public folder databases have picked up
the PublicFoldersLockedForMigration flag and any pending changes users recently
made to folders have converged across the organization. This may take several hours.
PowerShell
Complete-MigrationBatch PublicFolderMigration
) Important
When you complete the migration, Exchange will perform a final synchronization
between the legacy Exchange server and Exchange Online. If the final synchronization is
successful, the public folders in Exchange Online will be unlocked and the status of the
migration batch will change to Completed. It is common for the status of migration
batch to remain on "Synced" for few hours before it switches to Completing. For
migrations involving large number of target mailboxes, it is normal to see the status
remain "Synced" state for more than 24 hours, provided none of underlying public
folder migration requests have Failed or were quarantined.
PowerShell
1. In Exchange Online PowerShell, assign some test mailboxes to use any newly
migrated public folder mailbox as the default public folder mailbox.
PowerShell
2. Log on to Outlook 2010 or later with the test user identified in the previous step,
and then perform the following public folder tests:
3. If you run into any issues, see Roll back the migration later in this article. If the
public folder content and hierarchy is acceptable and functions as expected,
continue to the next step.
4. On the legacy Exchange server, run the following command to indicate that the
public folder migration is complete:
PowerShell
Set-OrganizationConfig -PublicFolderMigrationComplete:$true
5. After you've verified that migration is complete, run the following command in
Exchange Online PowerShell to make sure that the PublicFoldersEnabled parameter
on Set-OrganizationConfig is set to Local :
PowerShell
Set-Mailbox
Get-Mailbox
Set-OrganizationConfig
PowerShell
PowerShell
Get-PublicFolderStatistics | Export-CliXML
C:\PFMigration\Cloud_PFStatistics.xml
PowerShell
) Important
Since all of your mailboxes have been migrated to Microsoft 365 or Office 365 prior
to the public folder migration, we strongly recommend that you route the traffic
through Microsoft 365 or Office 365 (decentralized mail flow) instead of centralized
mail flow through your on-premises environment. If you choose to keep mail flow
centralized, it could cause delivery issues to your public folders, since you've
removed the public folder mailbox databases from your on-premises organization.
For details about how to remove public folder databases from Exchange 2010
servers, see Remove Public Folder Databases.
U Caution
If you roll your migration back to the legacy Exchange servers, you will lose any
email that was sent to mail-enabled public folders or content that was posted to
public folders after the migration. To save this content, you need to export the
public folder content to a .pst file and then import it to the legacy public folders
when the rollback is complete.
1. On the legacy Exchange server, run the following command to unlock the legacy
Exchange public folders. This process may take several hours.
PowerShell
Set-OrganizationConfig -PublicFoldersLockedForMigration:$False
2. In Exchange Online PowerShell, run the following commands to remove all
Exchange Online public folders.
PowerShell
$hierarchyMailboxGuid = $(Get-
OrganizationConfig).RootPublicFolderMailbox.HierarchyMailboxGuid
Get-Mailbox -PublicFolder:$true | Where-Object {$_.ExchangeGuid -ne
$hierarchyMailboxGuid} | Remove-Mailbox -PublicFolder -Confirm:$false -
Force
Get-Mailbox -PublicFolder:$true | Where-Object {$_.ExchangeGuid -eq
$hierarchyMailboxGuid} | Remove-Mailbox -PublicFolder -Confirm:$false -
Force
3. On the legacy Exchange server, run the following command to set the
PublicFolderMigrationComplete flag to $false .
PowerShell
Set-OrganizationConfig -PublicFolderMigrationComplete:$False
Public folder permissions will be lost during this process. Capture the current
permissions before migration and manually add them back once the migration is
completed.
Any item and folder changes made to the source public folders during the PST
export migration will be lost. Therefore, we recommend that you use the cmdlet
method if this export and import process will take a long time to complete.
If you still want to migrate your public folders by using PST files, follow these steps to
ensure a successful migration.
1. Use the instructions in Step 1: Download the migration scripts to download the
migration scripts. You only need to download the
PublicFolderToMailboxMapGenerator.ps1 file.
2. Follow step 2 of Step 3: Generate the .csv files to create the public folder-to-
mailbox mapping file. This file is used to calculate the correct number of public
folder mailboxes in Exchange Online.
3. Create the public folder mailboxes that you'll need based on the mapping file. For
more information, see Create a public folder mailbox.
4. Use the New-PublicFolder cmdlet to create the top-most public folder in each of
the public folder mailboxes by using the Mailbox parameter.
6. Set the permissions on the public folders using the EAC. For more information, see
Step 3: Assign permissions to the public folder.
U Caution
If you've already started a PST migration and have run into an issue where the
primary mailbox is full, you have two options for recovering the PST migration. The
first option is to wait for the auto-split to move the data from the primary mailbox.
This may take up to two weeks. However, all the public folders in a completely filled
public folder mailbox won't be able to receive new content until the auto-split
completes. The other option is to create a public folder mailbox and then use the
New-PublicFolder cmdlet with the Mailbox parameter to create the remaining
public folders in the secondary public folder mailbox.
Applies to: Exchange Server 2013, Exchange Server 2016, and Exchange Server 2019
Migrating your Exchange Server public folders to Exchange Online requires Exchange
Server 2013 CU15 or later, or Exchange Server 2016 CU4 or later, to be running in your
on-premises environment. All versions of Exchange Server 2019 are supported for batch
migrations of public folders.
If you have a mixed environment of both Exchange 2013 and Exchange 2016/2019
public folders in your organization, and you want to move them all to Exchange Online,
the instructions in this article will work for you, provided your Exchange 2013 servers
have CU15 or later installed.
For instructions on migrating Exchange Server 2010 public folders to Exchange Online,
see Use batch migration to migrate legacy public folders to Exchange Online.
When you upgrade to Exchange Server 2013 CU15 or later, or to Exchange Server
2016 CU4 or later, you must also prepare Active Directory or your public folder
migration will fail. This Active Directory preparation ensures that all relevant
PowerShell cmdlets and parameters are available to you for preparing for and
running the migration. See Prepare Active Directory and domains for more
information.
7 Note
If your current public folder quotas in Exchange Online are less than 25 GB,
you can use the Set-OrganizationConfig cmdlet to increase them with the
DefaultPublicFolderIssueWarningQuota and
DefaultPublicFolderProhibitPostQuota parameters.
In Microsoft 365, Office 365, and Exchange Online, you can create a maximum of
1000 public folder mailboxes. However, a maximum of 100 public folder mailboxes
is supported for migration from Exchange Server.
If you intend to migrate users to Microsoft 365 or Office 365, you should complete
your user migration prior to migrating your public folders. For more information,
see Ways to migrate multiple email accounts to Microsoft 365 or Office 365.
MRS Proxy needs to be enabled on at least one Exchange server, a server that is
also hosting public folder mailboxes. See Enable the MRS Proxy endpoint for
remote moves for details.
To perform the migration procedures in this article, you can't use the Exchange
admin center (EAC). Instead, you need to use the Exchange Management Shell on
your Exchange servers. In Exchange Online, you need to use Exchange Online
PowerShell. For more information, see Connect to Exchange Online PowerShell.
To run the migration scripts in this article, you must use an account that has basic
authentication enabled. Accounts that use multi-factor authentication (MFA) are
currently not supported.
Skipping the migration of deleted items and deleted folders from Exchange Server
to Exchange Online is supported. For more information, see the Exchange Team
blog post about modern public folder migrations without dumpster data .
You must use a single migration batch to migrate all of your public folder data.
Exchange allows creating only one migration batch for public folders migration. If
you attempt to create more than one public folder migration batch simultaneously,
the result will be an error. Also note that once the migration batch has a status of
"Completed," no more data can be copied over from the source environment.
We recommend that you don't use Outlook's PST export feature to migrate public
folders to Microsoft 365, Office 365, or Exchange Online. Public folder mailbox
growth in Exchange Online is managed using an auto-split feature that splits the
public folder mailbox when it exceeds size quotas. Auto-split can't handle the
sudden growth of public folder mailboxes when you use PST export to migrate
your public folders, and you may have to wait for up to two weeks for auto-split to
move the data from the primary mailbox. We recommend that instead you use the
cmdlet-based instructions in this article to migrate your public folders. If you still
decide to migrate public folders using PST export, see Migrate Public Folders to
Office 365 by using Outlook PST export later in this article.
Before you begin, please read this article in its entirety. For some steps there is
downtime required. During this downtime, public folders will not be accessible by
anyone. Please also review the list of known issues. Also, read best practices for
public folder migration to plan your migration.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at:
Exchange Server or Exchange Online .
2. Save the scripts to the local computer on which you'll be running PowerShell. For
example, C:\PFScripts. Make sure all scripts are saved in the same location.
folders at source and reports issues found along with actions required to fix
the issues. You'll run this script on the Exchange server on-premises.
name-to-folder size and deleted item size mapping file. You'll run this script
on an on-premises Exchange server.
We strongly recommend running the Source Side Validation script from an on-
premises Exchange Mailbox server. The script will scan and report issues that are
known to cause migration to be slow, along with guidance to fix these issues. The
script will perform all the following prerequisites.
Perform all prerequisite steps in the following sections before you begin the public
folder migration.
Make sure that there are no orphaned public folder mail objects in Active
Directory. These are objects in Active Directory without a corresponding Exchange
object.
Confirm that the SMTP email addresses configured for public folders in Active
Directory match the SMTP email addresses on the Exchange objects.
Confirm that there are no duplicate public folder objects in Active Directory. This is
necessary to avoid having two or more Active Directory objects that are pointing
to the same mail-enabled public folder.
1. Once your migration is complete, it will take some time for DNS caches across the
Internet to direct messages to your mail-enabled public folders in their new
location in Exchange Online. You can ensure that your newly migrated mail-
enabled public folders receive messages during this DNS transition period by
creating an accepted domain with a well-known name. To do this, run the
following command in your Exchange on-premises environment. In this example,
target domain is your Microsoft 365, Office 365, or Exchange Online domain, for
which a send connector has already been configured by the Hybrid Configuration
Wizard.
PowerShell
New-AcceptedDomain -Name
PublicFolderDestination_78c0b207_5ad2_4fee_8cb9_f373175b3f99 -
DomainName <target domain> -DomainType InternalRelay
Example:
PowerShell
New-AcceptedDomain -Name
PublicFolderDestination_78c0b207_5ad2_4fee_8cb9_f373175b3f99 -
DomainName "contoso.mail.onmicrosoft.com" -DomainType InternalRelay
PowerShell
following:
PowerShell
7 Note
2. If the name of a public folder contains a backslash \ or a forward slash /, it may not
get migrated to its designated mailbox during the migration process. Before you
migrate, rename any such folders to remove these characters.
a. To locate public folders that have a backslash in the name, run the following
command:
PowerShell
b. If any public folders are returned, you can rename them by running the
following command:
PowerShell
3. (This step is only required only if you are re-doing a previous migration attempt for
some reason. If this is not the case, skip to the next step.) Run the following
cmdlets to confirm there isn't a record of a previous, successful migration in your
organization. If there is, you need to set that value to $false .
Before changing the values, please confirm that the previous migration attempt
can be discarded so that you don't accidentally perform a second migration.
a. Run the following command to check for any previous migrations, and the status
of those migrations:
PowerShell
Get-OrganizationConfig | Format-List
PublicFolderMailboxesLockedForNewConnections,
PublicFolderMailboxesMigrationComplete
b. If any of the above is returned with a value set to $true , make them $false by
running:
PowerShell
Set-OrganizationConfig -
PublicFolderMailboxesLockedForNewConnections:$false -
PublicFolderMailboxesMigrationComplete:$false
4. For the purpose of verifying the success of the migration upon its completion, we
recommend that you run the following commands on all appropriate Exchange
2016 or Exchange 2019 servers. This will take snapshots of your current public
folder deployment that you can later use to compare with your newly migrated
public folders.
7 Note
Depending on the size of your Exchange organization, it could take some time
for these commands to run.
Run the following command to take a snapshot of the original source folder
structure.
PowerShell
Run the following command to take a snapshot of public folder statistics such
as item count, size, and owner.
PowerShell
PowerShell
PowerShell
c. On the Connect to Azure AD screen, enter the appropriate credentials, and then
click Next. Once connected, keep clicking Next until you're on the Optional
Features screen.
d. Make sure that Exchange Mail Public Folders is not selected. If it isn't selected,
you can continue to the next section, Prerequisite steps in Exchange Online. If it
is selected, click to clear the check box, and then click Next.
7 Note
e. After you have cleared the Exchange Mail Public Folders selection, keep
clicking Next until you're on the Ready to configure screen, and then click
Configure.
1. Make sure there are no existing public folder migration requests. If there are, clear
them or your own migration request will fail. This step is only required if you think
there may be an existing migration request in the pipeline (one that has failed or
that you wish to abort).
The following example will discover any existing batch migration requests:
PowerShell
The following example removes any existing public folder batch migration
requests:
PowerShell
2. Make sure there aren't any existing public folders or public folder mailboxes in
Exchange Online. If you do discover public folders in Exchange Online after
following the steps below, it's important to determine why they are there and who
in your organization started a public folder hierarchy before you begin removing
any public folders and public folder mailboxes.
a. In Exchange Online PowerShell, run the following command to see if any public
folders mailboxes exist:
PowerShell
Get-Mailbox -PublicFolder
b. If the command doesn't return any public folder mailboxes, continue to Step 3:
Generate the .csv files. If the command does return any public folders mailboxes,
run the following command to see if any public folders exist:
PowerShell
Get-PublicFolder -Recurse
3. If you do have any public folders in Microsoft 365 or Office 365 or Exchange
Online, run the following PowerShell command to remove them (after confirming
that they are not needed). Make sure that you've saved any information within
these public folders before deleting them, because all information will be
permanently deleted when you remove the public folders.
PowerShell
PowerShell
$hierarchyMailboxGuid = $(Get-
OrganizationConfig).RootPublicFolderMailbox.HierarchyMailboxGuid
Get-Mailbox -PublicFolder | Where-Object {$_.ExchangeGuid -ne
$hierarchyMailboxGuid} | Remove-Mailbox -PublicFolder -Confirm:$false -
Force
Get-Mailbox -PublicFolder | Where-Object {$_.ExchangeGuid -eq
$hierarchyMailboxGuid} | Remove-Mailbox -PublicFolder -Confirm:$false -
Force
Get-Mailbox -PublicFolder -SoftDeletedMailbox | % {Remove-Mailbox -
PublicFolder $_.PrimarySmtpAddress -PermanentlyDelete:$true -force -
Confirm:$false}
$soft=Get-Mailbox -PublicFolder -SoftDeletedMailbox; foreach ($mbx in
$soft){if ($mbx.Name -like "*CNF:*" -or $mbx.identity -like "*CNF:*")
{Remove-Mailbox -PublicFolder $mbx.ExchangeGUID.GUID -
RemoveCNFPublicFolderMailboxPermanently -Force -Confirm:$false}}
Repeat the above command block for couple of times, at interval of 5-10 minutes
to ensure the SoftDeletedMailboxes are cleared up and there are no CNF objects
left behind.
7 Note
The above command block may return error like "The operation couldn't be
performed because object <MailboxName> couldn't be found on", which can
be safely ignored because of AD replication latency.
PowerShell
If you see list of soft deleted mailboxes, repeat the command block from step 4,
else proceed to the next step
PowerShell
Example:
PowerShell
.\Export-ModernPublicFolderStatistics.ps1 stats.csv
PowerShell
migrate into any single public folder mailbox in Exchange Online. The maximum
size of this field is currently 100 GB, but we recommend you use a smaller size,
such as 50% of maximum size, to allow for future growth.
Maximum mailbox recoverable items size in bytes is the recoverable items quota
on your Exchange Online mailboxes. The maximum size of public folder mailboxes
In Exchange Online is currently 100 GB. We recommend setting
RecoverableItemsQuota to 15 GB or less.
Folder-to-size map path is the file path of the .csv file you created when you ran
the Export-ModernPublicFolderStatistics.ps1 script.
Folder-to-mailbox map path is the file path of the folder-to-mailbox .csv file that
you're creating in this step. If you only specify a file name, the file will be generated
in the current PowerShell directory on the local computer.
Example:
PowerShell
7 Note
The map.csv generated by the script uses generic names for the target public folder
mailboxes that will be created in EXO during the next step (for example, Mailbox1
and Mailbox2). We encourage you to change the public folder mailbox names in
the map.csv to suit your organization's naming policies. Also, if your on-premises
organization already has mailboxes that match the generic names, you should edit
the map.csv and provide unique names for the target public folder mailboxes in
Exchange Online. Use Notepad or a similar editor to edit the TargetMailbox names
in the map.csv
7 Note
We don't support the migration of public folders to Exchange Online when there
are more than 100 unique public folder mailboxes in Exchange Online. During
migration, you can have up to 100 public folder mailboxes enabled.
Step 4: Create the public folder mailboxes in
Exchange Online
Next, in Exchange Online PowerShell, create the target public folder mailboxes that will
contain your migrated public folders.
Run the following script to create the target public folder mailboxes. The script will
create a target mailbox for each mailbox in the .csv file that you generated previously in
Step 3: Generate the .csv files, when you ran the
ModernPublicFoldertoMailboxMapGenerator.ps1 script.
PowerShell
Folder-to-mailbox map path is the file path of the folder-to-mailbox.csv file that was
1. From any of your Exchange 2016 or Exchange 2019 servers hosting public folder
mailboxes, execute the following script. This script will synchronize mail-enabled
public folders from your local Active Directory to Exchange Online. Make sure that
you have downloaded the latest version of this script and that you're running it
from Exchange Management Shell.
PowerShell
.\Sync-ModernMailPublicFolders.ps1 -CsvSummaryFile:sync_summary.csv
CsvSummaryFile is the file path to where you want your log file of
synchronization operations and errors located. The log will be in .csv format.
7 Note
Use Sync MEPF Script troubleshooting if you see any errors during the Sync-
ModernMailPublicFolders.ps1 script.
2. In Exchange Online PowerShell, pass the credential of a user who has administrator
permissions in the Exchange 2013, Exchange 2016, or Exchange 2019 on-premises
environment into the variable $Source_Credential . The migration request that you
run in Exchange Online will use this credential to gain access to your on-premises
Exchange servers to copy the public folder content over to Exchange Online.
PowerShell
3. In Exchange Online Powershell, pass the Internet routable fully qualified domain
name of your Exchange Mailbox Replication Service (MRS) into the variable
$Source_RemoteServer . The migration request that you run in Exchange Online will
use this remote server to copy the public folder content to Exchange Online.
PowerShell
4. On your on-premises Exchange server, open the Exchange Management Shell and
find the GUID of the primary hierarchy mailbox with the following command:
PowerShell
(Get-
OrganizationConfig).RootPublicFolderMailbox.HierarchyMailboxGuid.GUID
Note the output of this command. You will need it in the next step. For example:
91edc6dd-478a-497c-8731-b0b793f5a986
7 Note
The public folder mailbox GUID mentioned in the previous command must be obtained
from the on-premises server; if it is obtained from Exchange Online, the migration batch
will fail with transient error.
5. In Exchange Online PowerShell, run the following commands to create the public
folder migration endpoint and the public folder migration request:
PowerShell
$bytes = [System.IO.File]::ReadAllBytes('folder_mapping.csv')
$PfEndpoint = New-MigrationEndpoint -PublicFolder -Name
PublicFolderEndpoint -RemoteServer $Source_RemoteServer -Credentials
$Source_Credential
New-MigrationBatch -Name PublicFolderMigration -CSVData $bytes -
SourceEndpoint $PfEndpoint.Identity -SourcePfPrimaryMailboxGuid <guid
you noted from previous step> -NotificationEmails <email addresses for
migration notifications>
Where folder_mapping.csv is the map file that was generated in Step 3: Generate
the .csv files and HierarchyMailboxGUID is the output you noted in the previous
step. Be sure to provide the full file path to folder_mapping.csv . If the map file was
moved for any reason, be sure to use the new location.
7 Note
You may notice the above command failing with the error "Cannot find a recipient that
has mailbox GUID" with the GUID mentioned of public folder mailbox in EXO. This can
happen because of AD replication latency. In such case, wait for an hour and retry the
command again.
6. Finally, start the migration using the following command in Exchange Online
PowerShell:
PowerShell
Start-MigrationBatch PublicFolderMigration
3. Select the migration request that was just created and then, on the Details pane,
select View Details.
Before moving on to Step 6: Lock down the public folders on the Exchange on-premises
server, verify that all data has been copied and that there are no errors in the migration.
Once you have confirmed that the batch has moved to the state of Synced, run the
commands mentioned in Step 2: Prepare for the migration, in the final step under
Prerequisite steps in the Exchange Server on-premises environment, to take a
snapshot of the public folders on-premises.
Once these commands have run, you can proceed to the next step. Note that these
commands could take a while to complete depending on the number of folders you
have. The migration process will synchronize the data from the source (on-premises)
environment once every 24 hours.
Get-PublicFolderMailboxMigrationRequest
Get-PublicFolderMailboxMigrationRequestStatistics
Get-MigrationBatch
The final sync might take a substantial amount of time, depending on the changes
made to the source environment, the size of the public folder deployment, server
capacity, and so on. If the folder hierarchy had many corrupt ACLs that were not
cleaned up before the migration, there might be a significant delay in completion.
It is recommended that you plan for a minimum of 48 hours of downtime for the
final sync to complete.
Ensure the migration batch and individual migration requests have successfully synced.
Get-PublicFolderMailboxMigrationRequest | Get-
After you have confirmed that the batch and all migration requests have successfully
synced, in your on-premises environment, run the following command to lock the
Exchange Server public folders for finalization.
PowerShell
7 Note
Run the following command in your on-premises environment to ensure that public
folders are locked:
PowerShell
Get-PublicFolder \
Couldn't find the public folder mailbox. + CategoryInfo : NotSpecified: (:) [Get-
PublicFolder], ObjectNotFoundException
1. Confirm that there are no other public folder mailbox moves or public folder
moves going on in your on-premises Exchange environment. To do this, use the
Get-MoveRequest and Get-PublicFolderMoveRequest cmdlets to list any existing
public folder moves. If there are any moves in progress, or in the Completed state,
remove them.
2. At this point, we recommend re-running the following script to ensure that any
new mail-enabled public folders are synchronized with Exchange Online:
PowerShell
.\Sync-ModernMailPublicFolders.ps1 -CsvSummaryFile:sync_summary.csv
3. If your environment has multiple active directory domains, ensure the steps in "No
active public folder mailboxes were found" error and migration batch fails at
Complete-MigrationBatch command are followed before initiating completing.
4. To complete the public folder migration, run the following command in Exchange
Online PowerShell:
PowerShell
Complete-MigrationBatch PublicFolderMigration
) Important
It's common for the status of migration batch to remain on Synced for a few hours
before it switches to Completing. For migrations involving a large number of target
mailboxes, it's normal to see the status remain in the Synced state for more than 24
hours, provided none of the underlying public folder migration requests have failed or
were quarantined.
1. In Exchange Online PowerShell, configure some test user mailboxes to use one of
your newly migrated public folder mailboxes as their default public folder mailbox:
PowerShell
2. Log on to Outlook with the test user you designated in the previous step, and then
perform the following public folder tests. Note that it may take 15 to 30 minutes
for changes to take effect. Once Outlook is aware of the changes, it might prompt
you to restart a couple of times.
b. Check permissions.
If you run into any issues and determine you aren't ready to switch your
organization's public folders entirely to Exchange Online, see Roll back a public
folder migration from Exchange Server to Exchange Online.
3. Run the following command in Exchange Online PowerShell to unlock your public
folders in Exchange Online. After you run the command, it may take approximately
15 to 30 minutes for the changes to take effect. Once Outlook is aware of the
changes, it might prompt your users to restart Outlook a couple of times.
PowerShell
PowerShell
2. In your on-premises environment, run the following script to make sure all emails
to mail-enabled public folders are correctly routed to Exchange Online. The script
will stamp mail-enabled public folders with an ExternalEmailAddress that points
them to their Exchange Online counterparts:
PowerShell
.\SetMailPublicFolderExternalAddress.ps1 -
ExecutionSummaryFile:mepf_summary.csv
PowerShell
Set-OrganizationConfig -PublicFolderMailboxesMigrationComplete:$true -
PublicFoldersEnabled Remote
PowerShell
PowerShell
Get-PublicFolder -Recurse -ResultSize Unlimited | Get-
PublicFolderStatistics | Export-CliXML Cloud_PFStatistics.xml
PowerShell
4. Exchange Online PowerShell, run the following command to take a snapshot of the
mail-enabled public folders:
PowerShell
7 Note
Known issues
The following are common public folder migration issues that you may encounter in
your organization.
We don't support the migration of public folders to Exchange Online when there
are more than 100 unique public folder mailboxes in Exchange Online.
Permissions for the root public folder and the EFORMS REGISTRY folder will not be
migrated to Exchange Online, and you will have to manually apply them in
Exchange Online. To do this, run the following command in your Exchange Online
PowerShell. Run the command once for each permission entry that is present on-
premises but missing in Exchange Online:
PowerShell
There is a known issue where some public folder migrations will fail if some public
folder mailboxes are not serving the public folder hierarchy. This means the
IsExcludedFromServingHierarchy parameter on one or more mailboxes is set to
$true . To avoid this, set all mailboxes in Exchange Online to serve the hierarchy.
Send As and Send on Behalf permissions don't get migrated to Exchange Online.
If this happens with your migration, use the following commands in your on-
premises environment to note who has these permissions.
PowerShell
PowerShell
PowerShell
Example:
PowerShell
PowerShell
Example:
PowerShell
PowerShell
Exchange Online does not support more than 10,000 subfolders, which is why
migrations of more than 10,000 folders will fail. We are currently developing a
script to unblock such configurations. In the meantime, we suggest waiting to
migrate your public folders.
Migration jobs are not making progress or are stalled. This can happen if there are
too many jobs running in parallel, causing jobs to fail with intermittent errors. You
can reduce the number of concurrent jobs by modifying MaxConcurrentMigrations
and MaxConcurrentIncrementalSyncs to a smaller number. Use the following
example to set these values:
PowerShell
Migration jobs fail with the error "Error: Dumpster of the Dumpster folder." If you
see this error, it should be resolved if you stop the batch and then restart it.
Migration jobs fail with the error "Request was quarantined because of the
following error: The given key was not present in the dictionary." This happens
when a corrupt item is present in a folder which migration jobs cannot copy. To
work around this:
2. Identify the folder containing the bad item. The migration report should
include references to the folder that was being copied when the error
occurred.
4. Wait for the folder move to complete. After it is complete, remove the move
request. Finally, re-start the migration batch.
Be aware that this step is irreversible, because once public folder mailboxes are deleted,
they cannot be recovered. Therefore we strongly recommend that, in addition to
validating the success of your migration, that you also monitor your Exchange Online
public folders for a few weeks before removing the on-premises public folder mailboxes.
Public folder permissions will be lost during this process. Capture the current
permissions before migration and manually add them back once the migration is
completed.
Any item and folder changes made to the source public folders during the PST
export migration will be lost. Therefore, we recommend that you use the cmdlet
method if this export and import process will take a long time to complete.
If you still want to migrate your public folders by using PST files, follow these steps to
ensure a successful migration.
1. Use the instructions in Step 1: Download the migration scripts to download the
migration scripts. You only need to download the
PublicFolderToMailboxMapGenerator.ps1 file.
2. Follow step number 2 of Step 3: Generate the .csv files to create the public folder-
to-mailbox mapping file. This file is used to calculate the correct number of public
folder mailboxes in Exchange Online.
3. Create the public folder mailboxes that you'll need based on the mapping file. For
more information, see Use the EAC to create a public folder mailbox.
4. Use the New-PublicFolder cmdlet to create the top-most public folder in each of
the public folder mailboxes by using the Mailbox parameter.
6. Set the permissions on the public folders using the EAC. For more information,
follow Step 3: Assign permissions to the public folder in the Set up public folders in
a new organization article.
U Caution
If you've already started a PST migration and have run into an issue where the
primary mailbox is full, you have two options for recovering the PST migration:
The first option is to wait for the auto-split to move the data from the primary
mailbox. This may take up to two weeks. However, all the public folders in a
completely filled public folder mailbox won't be able to receive new content until
the auto-split completes.
Option two is to create a public folder mailbox in Exchange Server and then use
the New-PublicFolder cmdlet with the Mailbox parameter to create the remaining
public folders in the secondary public folder mailbox.
A flyout page opens in the Microsoft 365 admin center, login with your tenant admin
account and select appropriate option
Roll back a public folder migration from
Exchange Server to Exchange Online
Article • 07/13/2023
If you run into issues with your public folder migration to Exchange Online, or for any
other reason need to reactivate your Exchange Server public folders, perform the
following steps:
PowerShell
Set-OrganizationConfig -
PublicFolderMailboxesLockedForNewConnections:$false -
PublicFolderMailboxesMigrationComplete:$false -PublicFoldersEnabled
Local
7 Note
PowerShell
PowerShell
5. See Configure Exchange 2013 public folders for a hybrid deployment for
instructions on reconfiguring access to your on-premises public folders, so that
your Exchange Online users can access them.
Migrate your public folders to Microsoft
365 Groups in Exchange Online
Article • 02/22/2023
Summary: Why you should or shouldn't migrate your public folders to Microsoft 365
Groups.
This article provides a comparison of public folders and Microsoft 365 Groups, and how
one or the other might be the best solution for your organization. Public folders have
been around as long as Exchange, whereas Groups were introduced more recently. If
you want to migrate some or all of your public folders to Groups, this article describes
how the process works, and provides links to the articles that walk you through the
process, step by step.
Archiving data. Users with mailbox limits sometimes use public folders instead of
mailboxes to archive data. This practice isn't recommended because it affects
storage in public folders and undermines the goal of mailbox limits.
For the full Groups story, see Learn about Microsoft 365 Groups .
Should you migrate your public folders to
Microsoft 365 Groups?
Microsoft 365 Groups is the latest collaboration offering from Microsoft, which means
there are many reasons why they would be a preferable solution over public folders, a
much older technology. In Outlook, for example, Groups can replace mail-enabled
public folders altogether. Compiling a list of every scenario in which Microsoft 365
Groups works better than public folders is impossible, but here are the highlights:
Collaboration over documents. In Outlook, Groups has a dedicated Files tab that
displays all files from the group's SharePoint team site, as well as from mail
attachments. You get one view of all the files, so you don't have to go searching
for them like you would in public folders. Co-authoring also becomes easier. If
you're using public folders for storing files meant to be consumed by multiple
people, consider migrating to Groups.
Shared calendar. Upon creation every group gets a shared calendar. Any member
of the group can create events on that calendar. When you favorite a group, that
group's calendar can be displayed alongside your personal calendar. You can also
subscribe to a group's events, in which case events created in that group appear in
your personal calendar. If you're using public folders to host calendars for your
team, such as a schedule or a timetable, Groups would be an improved experience.
Simplified permissions. When you assign users to a group, they immediately get
the permissions they need, whereas with public folders you need to manually
assign the proper permissions. Members can be added as "owners" or "members."
Owners have full rights in the group, including the ability to perform group
management tasks. Members can also create content and edit files like owners, but
members cannot delete content that they have not created. If the public folders'
permissions model is too overwhelming for you and you want something simple
and quick, Microsoft 365 Groups is the way to go.
Mobile and Web presence. Public folders can't be accessed through mobile
devices and have a limited set of functionality on the Web. Microsoft 365 Groups,
on the other hand, is accessible through Outlook mobile apps and has a richer set
of features on the Web. If your team is on the move and requires mobile access,
then you should be using Microsoft 365 Groups.
Access to a wide range of Microsoft 365 or Office 365 apps. When you create a
group, you unlock access to a wide range of apps from the Microsoft 365 or Office
365 suite. You get a SharePoint team site for storing files and a plan on Planner to
track your tasks. Microsoft 365 Groups is the membership service that combines
elements of the entire Microsoft 365 or Office 365 suite.
While Microsoft 365 Groups offers many advantages, you should be aware of a few
major differences that you'll notice after leaving the public folders experience. These are
primarily:
Folder hierarchy. While public folders are often used to organize content in deep
rooted hierarchy, Microsoft 365 Groups has a flat structure. All emails in the group
reside in the Conversations space and all the documents go into the Files tab. Also,
you can't create sub-folders in Microsoft 365 groups.
Granular permission roles. While public folders have a variety of permission roles,
Microsoft 365 Groups only provides two: owner and member.
Before you move to Groups, it's also a good idea to make note of the various limits that
come with creating and maintaining groups. See How do I manage my groups? in Learn
about Microsoft 365 Groups for more information.
7 Note
Supports mail and calendar public folders. Copied emails and posts will appear as
in Groups as group conversations, and copied calendar items will be visible in
group calendars. Other public folder types, such as tasks and contacts, are
currently not supported for this migration.
Not an "all or nothing" migration. You get to choose specific public folders to
migrate to Groups, and only those chosen public folders get migrated.
One-shot data copy. Batch migrations are designed to be a simple one-time data
copy from source public folders to target groups, without the complexities of
incremental synchronization and finalization.
Merges public folder data with existing data in a group. The data copy will merge
the public folder content with the existing group's content, if any. If there is a need
for incremental data copy, you can simply run the data copy as many times as you
need. This will copy incremental data over to the group.
1. Select source: Choose the public folders that you want to migrate. You can choose
any folder containing mail or calendar content.
2. Create target: Create corresponding groups for your folders, with the desired
configurations, such as members, privacy settings, and data classification.
3. Copy data: Use the migration batch cmdlets to copy data from public folders to
Groups.
4. Lock source: Lock the public folders once you have verified the data in Groups.
5. Cutover: Copy any new data that has been created between steps 3 and 4.
Note that your public folders and their corresponding groups will remain online for your
users during steps 1 through 3 above. After step 3, you can evaluate whether or not to
proceed with the rest of the migration, based on the Groups experience and whether or
not it suits your users and your organization. You can roll back your migration and
resume using public folders at that point. If you do proceed with the migration, after
step 5 completes, you can delete the original public folders. Even post-migration it is
possible to roll back to public folders, provided you have saved your backup files from
the migration process and you have not deleted your original public folders.
1. If your public folders are on-premises, your servers need to be running one of the
following versions:
2. If your public folders are on-premises, you must have an Exchange Hybrid
environment set up. See Exchange Server Hybrid Deployments for more
information.
Migration instructions
Select the appropriate link below for step-by-step instructions on running a batch
migration.
Use batch migration to migrate Exchange Online public folders to Microsoft 365
Groups
Use batch migration to migrate Exchange 2010 public folders to Microsoft 365
Groups
Use batch migration to migrate Exchange 2013 public folders to Microsoft 365
Groups
Use batch migration to migrate Exchange 2016 public folders to Microsoft 365
Groups
Use batch migration to migrate
Exchange Online public folders to
Microsoft 365 Groups
Article • 02/22/2023
Summary: How to move your Exchange Online public folders to Microsoft 365 Groups.
Through a process known as batch migration, you can move some or all of your
Exchange Online public folders to Microsoft 365 Groups. Groups is a new collaboration
offering from Microsoft that offers certain advantages over public folders. See Migrate
your public folders to Microsoft 365 Groups for an overview of the differences between
public folders and Groups, and reasons why your organization may or may not benefit
from switching to Groups.
This article contains the step-by-step procedures for performing the actual batch
migration of your Exchange Online public folders.
Only public folders of type calendar and mail can be migrated to Microsoft 365
Groups at this time; migration of other types of public folders is not supported.
Also, the target Microsoft 365 groups are expected to exist prior to the migration.
Microsoft 365 Groups don't support the permission roles and access rights that are
available in public folders. In Microsoft 365 Groups, the users are designated as
either members or owners.
The batch migration process only copies messages and calendar items from public
folders for migration to Microsoft 365 Groups. It doesn't copy other types of public
folder content like rules and permissions, since that type of content is not
supported in Microsoft 365 Groups.
Microsoft 365 Groups come with a 50 GB mailbox. Ensure that the sum of public
folder data that you are migrating totals less than 50 GB. In addition, leave storage
space for future content additions. We recommend migrating public folders no
bigger than 25GB in total size.
This migration is not "all or nothing". You can pick and choose specific public
folders to migrate, and only those public folders will be migrated. If the public
folder being migrated has sub-folders, those sub-folders will not be automatically
included in the migration. If you need to migrate them, you need to explicitly
include them.
The public folders will not be affected in any manner by this migration. However,
once you use our lock-down script to make the migrated public folders read-only,
your users will be forced to use Microsoft 365 Groups instead of public folders.
Use a single migration batch to migrate all of your public folder data. Exchange
allows creating only one migration batch at a time. If you attempt to create more
than one migration batch simultaneously, the result will be an error.
Before you begin, we recommend that you read this article in its entirety, as
downtime is required for some steps.
Before proceeding, verify you have downloaded and saved all of the following scripts
and files:
7 Note
Make sure to save all scripts and files to the same location.
1. Compile a list of public folders (mail and calendar types) that you want to migrate
to Microsoft 365 Groups.
2. Have a list of corresponding target groups for each public folder being migrated.
You can either create a new group in Office 365 for each public folder or use an
existing group. If you're creating a new group, see Learn about Microsoft 365
Groups to understand the settings a group must have. If a public folder that you
are migrating has the default permission set to Author or above, you should create
the corresponding group in Office 365 with the Public privacy setting. However, for
users to see the public group under the Groups node in Outlook, they will still
have to join the group.
3. Rename any public folders that contain a backslash ( \) in their name. Otherwise,
those public folders may not get migrated correctly.
4. The migration feature name PAW must be enabled for your organization. To verify
that PAW is enabled, run the following command in Exchange Online PowerShell:
PowerShell
Get-MigrationConfig
If the output under Features lists PAW, the feature is enabled and you can
continue.
If you have any existing user or public folder migration batches in any state
(including Completed), PAW will not be enabled. Complete any remove any
existing migration batches until no records are returned in the output of Get-
MigrationBatch . After you remove all existing migration batches, PAW should be
Once this step is completed, you can continue creating new batches of user
migrations.
TargetGroupMailbox. SMTP address of the target Microsoft 365 group. You can
run the following command to see the primary SMTP address.
PowerShell
An example .csv:
csv
"FolderPath","TargetGroupMailbox"
"\Sales","sales@contoso.onmicrosoft.com"
"\Sales\EMEA","emeasales@contoso.onmicrosoft.com"
You can merge a mail folder and a calendar folder into a single Microsoft 365 group.
However, any other scenario of multiple public folders merging into one group isn't
supported within a single migration batch. If you need to map multiple public folders to
the same Microsoft 365 group, run separate migration batches consecutively, one after
another. You can have up to 500 entries in each migration batch.
One public folder should be migrated to only one group in one migration batch.
1. In Exchange Online PowerShell, run the following command to create a new public
folder-to-Microsoft 365 group migration batch.
PowerShell
In this command:
CSVData is the .csv file created above in Step 3: Create the .csv file. Be sure to
provide the full path to this file. If the file was moved for any reason, be sure
to verify and use the new location.
AutoStart is an optional switch that starts the migration batch as soon as it's
created.
PublicFolderToUnifiedGroup indicates that this is a public folder to Microsoft
365 Groups migration batch.
2. If you didn't use the AutoStart switch in the first command, start the migration by
running the following command in Exchange Online PowerShell:
PowerShell
Start-MigrationBatch PublicFolderToGroupMigration
3. Select the migration request that was just created and then, on the Details pane,
select View Details.
When the batch status is Completed, you can move on to Step 5: Add members to
Microsoft 365 groups from public folders.
MappingCsv is the .csv file created above in Step 3: Create the .csv file. Be sure to
provide the full path to this file. If the file was moved for any reason, be sure to
verify and use the new location.
BackupDir is the directory where the migration log files will be stored.
PowerShell
Once users have been added to a Microsoft 365 group, they can begin using it.
7 Note
If there are mail-enabled public folders (MEPFs) among the public folders being
migrated, this step will copy some properties of MEPFs, such as SMTP addresses, to
the corresponding Microsoft 365 group and then mail-disable the public folder.
Because the migrating MEPFs will be mail-disabled after the execution of this script,
you will start seeing emails sent to MEPFs instead being received in the
corresponding groups. For details, see the Migration scripts section later in this
article.
MappingCsv is the .csv file created above in Step 3: Create the .csv file. Be sure to
provide the full path to this file. If the file was moved for any reason, be sure to
verify and use the new location.
BackupDir is the directory where the backup files for permission entries, MEPF
properties, and migration log files will be stored. This backup will be useful in case
you need to roll back to public folders.
PowerShell
2. Create a new batch with the same .csv file by running the following command:
PowerShell
In this command:
CSVData is the .csv file created above in Step 3: Create the .csv file. Be sure to
provide the full path to this file. If the file was moved for any reason, be sure
to verify and use the new location.
NotificationEmails is an optional parameter that can be used to set email
addresses that will receive notifications about the status and progress of the
migration.
AutoStart is an optional switch that starts the migration batch as soon as it is
created.
3. If you didn't use the AutoStart switch in the previous command, start the migration
by running the following command in Exchange Online PowerShell:
PowerShell
Start-MigrationBatch PublicFolderToGroupMigration
After you have finished this step (the batch status is Completed), verify that all
data has been copied to Microsoft 365 groups. At that point, provided you are
satisfied with the Groups experience, you can begin deleting the migrated public
folders from your Exchange Online environment.
) Important
While there are supported procedures for rolling back your migration and returning
to public folders, this isn't possible after the source public folders have been
deleted. See How do I roll back to public folders from Microsoft 365 Groups? for
more information.
Known issues
The following issues might occur during a typical public folders to Microsoft 365 Groups
migration:
The script that transfers SMTP address from mail-enabled public folders to
Microsoft 365 groups only adds the addresses as secondary email addresses in
Exchange Online. If you have Exchange Online Protection (EOP) or if you use
Centralized Mail Flow, you'll have issues sending email to the groups (to the
secondary email addresses) after the migration.
If the .csv mapping file has an entry with invalid public folder path, the migration
batch displays as Completed without throwing an error, and no further data is
copied.
Migration scripts
For your reference, this section provides in-depth descriptions for three of the migration
scripts and the tasks they execute in your Exchange environment. You can download all
of the scripts and supporting files from this location .
AddMembersToGroups.ps1
This script will read the permissions of the public folders being migrated and then add
members and owners to Microsoft 365 groups as follows:
Users with the following permission roles will be added as members to a Microsoft
365 group. Permission roles: Owner, PublishingEditor, Editor, PublishingAuthor,
Author
In addition to the above, users with the following minimum access rights will also
be added as members to a Microsoft 365 group. Access rights: ReadItems,
CreateItems, FolderVisible, EditOwnedItems, DeleteOwnedItems
Users with access right "Owner" will be added as owners to a group and users with
other eligible access rights will be added as members.
When users in security groups that have access rights over a public folder have
themselves explicit permissions over the same public folder, explicit permissions
will be given preference. For example, consider a case in which a security group
called "SG1" has members User1 and User2. Permission entries for the public folder
"PF1" are as follows:
In this case, User1 will be added as an owner to the Microsoft 365 group.
This script can be run even after the lock-down of public folders, with parameter
ArePublicFoldersLocked set to $true . In this scenario, the script will read permissions
LockAndSavePublicFolderProperties.ps1
This script makes the public folders that are being migrated read-only. When mail-
enabled public folders are migrated, they will first be mail-disabled and their SMTP
addresses will be added to the respective Microsoft 365 groups. Then the permission
entries will be modified to make them read-only. A backup of the mail properties of
mail-enabled public folders, as well as the permission entries of all the public folders,
will be copied, before performing any modification on them.
If there are multiple migration batches, a separate backup directory should be used with
each mapping .csv file.
The following mail properties will be stored, along with respective mail-enabled public
folders and Microsoft 365 groups:
PrimarySMTPAddress
EmailAddresses
ExternalEmailAddress
EmailAddressPolicyEnabled
GrantSendOnBehalfTo
SendAs Trustee list
The above mail properties will be stored in a .csv file, which can be used in the rollback
process (if you want to return to using public folders, see How do I roll back to public
folders from Microsoft 365 Groups? for more information). A snapshot of the mail-
enabled public folders' properties will also be stored in a file called PfMailProperties.csv.
This file is not necessary for the rollback process, but can still be used for your reference.
The following mail properties will be migrated to target group as part of the lockdown:
PrimarySMTPAddress
EmailAddresses
SendAs Trustee list
GrantSendOnBehalfTo
The script ensures that the PrimarySMTPAddress and EmailAddresses of migrating mail-
enabled public folders will be added as secondary SMTP addresses of the corresponding
Microsoft 365 groups. Also, SendAs and SendOnBehalfTo permissions of users on mail-
enabled public folders will be given equivalent permission in the corresponding target
groups.
ReadItems
CreateSubfolders
FolderContact
FolderVisible
None None
AvailabilityOnly AvailabilityOnly
LimitedDetails LimitedDetails
Contributor FolderVisible
2. Access rights for users without read permissions will be left untouched, and they
will continue to be blocked from read rights.
3. For users with custom roles, all the access rights that are not in
ListOfAccessRightsAllowed will be removed. If users don't have access rights from
the allowed list after filtering, their access right will be set to 'None'.
UnlockAndRestorePublicFolderProperties.ps1
This script will re-assign permissions back to public folders, based on the backup file
that was taken during public folder lock-down. This script will also mail-enable public
folders that had been mail-disabled, after it removes the folders' SMTP addresses from
their respective Microsoft 365 groups. There might be slight downtime during this
process.
BackupDir is the directory where the backup files for permission entries, MEPF
properties, and migration log files will be stored. Make sure you use the same
location you specified in Step 6: Lock down the public folders to cut-over (public
folder downtime required).
Any items added to the Microsoft 365 groups, or any edit operations performed in the
groups, are not copied back to your public folders. Therefore there will be data loss,
assuming new data was added while the public folder was a group.
Note also that it's not possible to restore a subset of public folders, which means all of
the public folders there were migrated should be restored.
The corresponding Microsoft 365 groups won't be deleted as part of the roll back
process. You'll have to clean or delete those groups manually.
Configure legacy on-premises public
folders for a hybrid deployment in
Exchange Online
Article • 02/22/2023
Summary: Use the steps in this article to synchronize public folders between Microsoft
365 or Office 365 and your Exchange Server 2010 on-premises deployment.
This topic describes how to synchronize mail-enabled public folders if your users are in
Microsoft 365 or Office 365 and your Exchange Server 2010 SP3 public folders are on-
premises. However, a Microsoft 365 or Office 365 user who is not represented by a
MailUser object on-premises (local to the target public folder hierarchy) won't be able to
access legacy or modern on-premises public folders.
7 Note
This topic refers to the Exchange Server 2010 SP3 servers as the legacy Exchange
server.
You will sync your mail-enabled public folders by using the following scripts, which are
initiated by a Windows task that runs in the on-premises environment:
When you complete this procedure your on-premises and Microsoft 365 or Office 365
users will be able to access the same on-premises public folder infrastructure.
7 Note
Outlook 2016 does not support accessing Exchange 2007 legacy public folders. If
you have users who are using Outlook 2016, you must move your public folders to
a more recent version of Exchange Server. More information about Outlook 2016
and Office 2016 compatibility with Exchange 2007 and earlier versions can be
found in this article .
These instructions assume that your Exchange Online organization has been
upgraded to a version that supports public folders.
To access public folders cross-premises, users must upgrade their Outlook clients
to the November 2012 Outlook public update or a later version.
1. To download the November 2012 Outlook update for Outlook 2010, see
Update for Microsoft Outlook 2010 (KB2687623) 32-Bit Edition .
2. To download the November 2012 Outlook Update for Outlook 2007, see
Update for Microsoft Office Outlook 2007 (KB2687404) and download in
your preferred language from the dialog box.
Outlook 2016 for Mac (and earlier versions) and Outlook for Mac for Office 365 are
not supported for cross-premises legacy public folders. Users must be in the same
location as the public folders to access them with Outlook for Mac or Outlook for
Mac for Office 365.
Users whose mailboxes are in Exchange Online won't be able to access on-
premises public folders using Outlook on the web.
After you follow the instructions in this article to configure your on-premises
public folders for a hybrid deployment, users who are external to your organization
won't be able to send messages to your on-premises public folders unless you
take additional steps. You can either set the accepted domain for the public folders
to Internal Relay (see Manage accepted domains in Exchange Online) or you can
disable Directory Based Edge Blocking (DBEB) (see Use Directory Based Edge
Blocking to reject messages sent to invalid recipients).
7 Note
This server doesn't have to be part of the Client Access load balancing. For
more information, see Understanding Load Balancing in Exchange 2010.
For Exchange 2010, run the following command. This command excludes the
mailbox database from the mailbox provisioning load balancer. This prevents new
mailboxes from being added automatically to this database.
PowerShell
7 Note
We recommend that the only mailbox that you add to this database is the
proxy mailbox that you'll create in step 3. No other mailboxes should be
created on this mailbox database.
3. Create a proxy mailbox within the new mailbox database, and hide the mailbox
from the address book. The SMTP of this mailbox will be returned by AutoDiscover
as the DefaultPublicFolderMailbox SMTP, so that by resolving this SMTP the client
can reach the legacy exchange server for public folder access.
PowerShell
PowerShell
4. For Exchange 2010, enable AutoDiscover to return the proxy public folder
mailboxes.
PowerShell
5. Repeat the preceding steps for every public folder server in your organization.
Sync-MailPublicFolders.ps1
SyncMailPublicFolders.strings.psd1
2. Save the files to the local computer on which you'll be running PowerShell. For
example, C:\PFScripts.
7 Note
Synchronized mail-enabled public folders will appear as mail contact objects for
mail flow purposes and will not be viewable in the Exchange admin center. See the
Get-MailPublicFolder command. To recreate the SendAs permissions in the cloud,
use the Add-RecipientPermission command.
On the legacy Exchange server, run the following command to synchronize mail-enabled
public folders from your local on-premises Active Directory to Microsoft 365 or Office
365.
PowerShell
Where you're prompted for your Microsoft 365 or Office 365 username and password,
and <sync_summary.csv> is the path to where you would like to log synchronization
operations and errors, in .csv format.
7 Note
Before running the script, we recommend that you first simulate the actions that
the script would take in your environment by running it as described above with
the WhatIf parameter. > We also recommend that you run this script daily to
synchronize your mail-enabled public folders.
Enable the exchange online organization to access the on-premises public folders. You
will point to all of the proxy public folder mailboxes that you created in Step 2: Make
remote public folders discoverable.
PowerShell
) Important
A Microsoft 365 or Office 365 user who is not represented by a MailUser object on-
premises (local to the target public folder hierarchy) won't be able to access legacy
or Exchange 2013 on-premises public folders. See the Knowledge Base article
Exchange Online users can't access legacy on-premises public folders for a
solution.
Check permissions.
Summary: Instructions for enabling Exchange Online users to access on-premises public
folders in your Exchange 2013, Exchange 2016, or Exchange 2019 environment.
7 Note
If you have Exchange 2010 public folders, see Configure legacy on-premises public
folders for a hybrid deployment.
This article describes how to enable your Exchange Online, Microsoft 365, or Office 365
users to access public folders in Exchange 2013, Exchange 2016 and Exchange 2019 (for
the rest of this article, referred to as Exchange Server). To enable on-premises Exchange
Server users to access public folders in Exchange Online, Microsoft 365, or Office 365,
see Configure Exchange Online public folders for a hybrid deployment.
2. These instructions assume that you have used the Hybrid Configuration wizard to
configure and synchronize your on-premises and Exchange Online environments
and that the DNS records used for most users' AutoDiscover references an on-
premises end-point. For more information, see Hybrid Configuration wizard.
3. The public folders in this configuration cannot be accessed using Outlook on the
web (formerly known as Outlook Web App).
5. In order to access public folders cross-premises, users must upgrade their Outlook
clients to the November 2012 Outlook public update or later.
6. To download the November 2012 Outlook update for Outlook 2010, see Update
for Microsoft Outlook 2010 (KB2687623) 32-Bit Edition .
7. Outlook 2016 for Mac (and later versions) is supported for cross-premises public
folders. If clients in your organization use Outlook 2016 for Mac, make sure they
have the April 2016 or higher update installed. For more information, see
Accessing public folders with Outlook 2016 for Mac.
Step 1: Download the scripts
1. Download the following files from Exchange 2013/2016 Public Folders Migration
Scripts :
Sync-ModernMailPublicFolders.ps1
SyncModernMailPublicFolders.strings.psd1
7 Note
The download package at this location contains additional files. To follow the
instructions in this article, you only need the two listed above. These scripts
now support modern authentication.
7 Note
Synchronized mail-enabled public folders will not be visible in the Exchange admin
center (EAC). Instead, use the Get-MailPublicFolder cmdlet. To recreate Send As
permissions in the cloud, use the Add-RecipientPermission cmdlet.
On the Exchange server, run the following command in the Exchange Management Shell
to synchronize mail-enabled public folders from your local on-premises Active Directory
to Office 365:
PowerShell
.\Sync-ModernMailPublicFolders.ps1 -CsvSummaryFile:sync_summary.csv
Where CsvSummaryFile is the path to where you would like to log synchronization
operations and errors, in .csv format.
) Important
Before running the script, we recommend that you first simulate the actions that
the script would take in your environment by running it as described above with
the -WhatIf switch. As part of the sync operation, the script, when appropriate,
could create, update, or delete mail-enabled public folder objects on Exchange
Online.
We also recommend that you run this script daily to synchronize your mail-enabled
public folders.
Use the steps in Troubleshooting mail enabled public folder synchronization failures
when using PowerShell script if you see errors while running the script.
Run the following command in the Exchange Management Shell to identify such
mailboxes:
PowerShell
These users will keep getting credential prompts after public folder mailbox access is
configured. Use one of the following solutions for such users before enabling public
folder access:
1. Link the Exchange Online only mailboxes listed in the previous step to on-premises
users as described in Exchange Online users can't access legacy on-premises public
folders .
2. Use the steps provided in Controlled Connections to Public Folders to enable
public folder access only to mailboxes that have linked users on-premises.
The final step in this process is to configure the Exchange Online organization and to
allow access to the Exchange Server public folders.
Run the following command in Exchange Online PowerShell to enable the Exchange
Online organization to access the on-premises public folders. You'll point to all of your
on-premises public folder mailboxes.
PowerShell
7 Note
You must wait until Azure Active Directory (AAD) synchronization is complete
before you can see the changes. This process can take up to three hours to
complete. If you don't want to wait for the recurring synchronizations that occur
every three hours, you can force directory synchronization at any time. For detailed
steps to do force directory synchronization, see Azure AD Connect sync: Scheduler.
PowerShell
Next, log on to Outlook with the credentials of an Exchange Online user and perform
the following public folder tests:
Summary: How to set up public folders, including assigning permissions to them in the
EAC.
This topic shows you how to get public folders configured and running in a new
organization or in an organization that has never previously had public folders.
7 Note
For more information about the storage quotas and limits for public folders, see
Exchange Online Limits.
OWA for devices refers to the old "OWA for Android" and "OWA for iPhone/iPad"
applications that have since been deprecated. For more details, see Microsoft OWA
mobile apps are being retired .
The procedure in this article guides you through the process of creating public
folders for the first time.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Public folders" entry in the
Feature permissions in Exchange Online topic.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
Step 1: Create the primary public folder
mailbox
The primary public folder mailbox contains a writeable copy of the public folder
hierarchy plus content and is the first public folder mailbox that you create for your
organization. Subsequent public folder mailboxes will be secondary public folder
mailboxes, which will contain a read-only copy of the hierarchy plus content.
1. In the Exchange admin center (EAC), navigate to Public folders > Public folders.
6. In the Permission level list, select a level. At least one user should be an Owner.
7. Click Save.
8. You can add multiple users by clicking Add and assigning the appropriate
permissions using the steps above. You can also customize the permission level by
selecting or clearing the check boxes. When you edit a predefined permission level
such as Owner, the permission level will change to Custom.
For information about how to use Exchange Online PowerShell to assign permissions to
a public folder, see Add-PublicFolderClientPermission.
Step 4 (Optional): Mail-enable the public folder
If you want users to send mail to the public folder, you can mail-enable it. This step is
optional. If you don't mail-enable the public folder, users can post messages to the
public folder by dragging items into it from within Outlook.
2. In the list view, select the public folder you want to mail-enable.
A warning displays asking if you are sure you want to enable mail for the public
folder. Click Yes.
The public folder will be mail-enabled and the name of the public folder will become the
alias of the public folder. If you have multiple recipients with that name, the public
folder's alias will be appended with a number. For example, if you have a distribution
group named SalesTeam and you create a public folder named SalesTeam and then
mail-enable it, the alias of that public folder will be SalesTeam1.
For information about how to use Exchange Online PowerShell to mail-enable a public
folder, see Enable-MailPublicFolder.
7 Note
If you have a hybrid configuration, the public folders created on Exchange Online
are only visible to cloud-based mailboxes. Conversely, public folders created on-
premises are only visible to on-premises mailboxes.
Summary: The most recent supported Exchange topologies that allow users to access
public folders with Outlook 2016 for Mac.
Users of Outlook 2016 for Mac can now access public folders in Exchange Online in a
number of different topologies.
The following table summarizes the supported topologies for users with Outlook 2016
for Mac clients trying to access public folders in Exchange Online.
7 Note
The scenarios shown in the following table assume that the April 2016 update for
Outlook 2016 for Mac has been applied to all clients.
Public folders User mailbox User mailbox is User mailbox is User mailbox is in
are deployed is on Exchange on Exchange on Exchange Microsoft 365, Office
on... 2010 SP3 or 2013 CU13 or 2016 CU2 or 365, or Exchange
later later later Online
The following articles describe how to deploy public folders in your Exchange
organization in a co-existence or hybrid topology. As long as your Outlook 2016 for Mac
clients have installed the April 2016 update, they will be able to access public folders in
the configurations detailed in these articles:
Configure legacy public folders where user mailboxes are on Exchange 2013
servers
Before you can create a public folder, you must first create a public folder mailbox.
Public folder mailboxes contain the hierarchy information plus the content for public
folders. The first public folder mailbox you create will be the primary hierarchy mailbox,
which contains the only writable copy of the hierarchy. Any additional public folder
mailboxes you create will be secondary mailboxes, which contain a read-only copy of
the hierarchy.
7 Note
For more information about the storage quotas and limits for public folders, see
Exchange Online Limits.
For additional management tasks related to public folders in Exchange Online, see
Public folder procedures in Microsoft 365 or Office 365 and Exchange Online.
Exchange Server public folders and public folders on legacy Exchange servers can't
exist in the same organization. If you try to create a public folder mailbox when
you still have legacy public folders, you'll receive the error An existing Public
Folder deployment has been detected. To migrate existing Public Folder data,
create new Public Folder mailbox using -HoldForMigration switch.
Before you can create public folders in Exchange Server, you need to migrate your
legacy public folders to Exchange Server. To do this, follow the steps in Migrate
Public Folders to Exchange 2013 From Previous Versions. These steps will show you
how to create a public folder mailbox that can be used to store your migrated
public folders.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Public folders" entry in the
Feature permissions in Exchange Online topic.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
2. In Public Folder Mailbox, provide a name for the public folder mailbox.
3. Click Save.
PowerShell
This example creates a secondary public folder mailbox. The only difference between
creating the primary hierarchy mailbox and a secondary hierarchy mailbox is that the
primary mailbox is the first one created in the organization. You can create additional
public folder mailboxes for load balancing purposes.
PowerShell
PowerShell
Public folders are designed for shared access and provide an easy and effective way to
collect, organize, and share information with other people in your workgroup or
organization.
By default, a public folder inherits the settings of its parent folder, including the
permissions settings.
7 Note
For more information about the storage quotas and limits for public folders in
Exchange Online, see Exchange Online Limits.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Public folders" entry in the
Feature permissions in Exchange Online topic.
You can't create a public folder unless you've first created a public folder mailbox.
For more information about how to create a public folder mailbox, see Create a
public folder mailbox.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
3. Click New .
) Important
5. In the Path box, verify the path to the public folder. If this isn't the desired path,
click Cancel and follow Step 2 of this procedure.
6. Click Save.
PowerShell
) Important
Don't use a backslash (\) in the name when creating a public folder.
In the EAC, click Refresh to refresh the list of public folders. Your new public folder
should be displayed in the list.
PowerShell
PowerShell
Get-PublicFolder -Recurse
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
Create a Public Folder calendar in
Exchange Online
Article • 02/22/2023
A public folder calendar is a good solution for people looking for only a shared calendar
without having to maintain an additional mailbox along with it. This article explains how
to set up and access public folder calendars in Microsoft Exchange Online.
) Important
You must use the Microsoft Outlook desktop client to create the public folder
calendar.
7 Note
The Calendar type of public folder can be accessed from Outlook Web App and the
Outlook desktop client. Public folders, including calendar, cannot be accessed from
mobile devices.
Prerequisites
Before you create your public folder calendar, follow the prerequisites.
2. Use the following command to see a list of any public folder mailboxes present in
the organization:
PowerShell
Get-Mailbox -PublicFolder
Get-PublicFolder \
3. If you don't see a list of the public folder mailboxes, then follow the steps to create
a public folder mailbox.
4. Verify that you have the necessary access rights to create the public folder.
If you want the user to be able to create a public folder on the root of the
public folder hierarchy, along with all other access rights, run the following
command:
PowerShell
If you want the user to be able to create a public folder under the existing
public folder, such as a folder named Marketing, then run the following
command:
PowerShell
5. Login to the Outlook desktop client and ensure you're able to access the public
folder deployment.
1. Login to the Outlook desktop client with a user account that has the necessary
access rights to create a public folder.
To create a public folder calendar at the top level of the directories, right-click All
Public Folders and select New Folder.
To create a public folder calendar under an existing public folder, right-click the
folder, and select New Folder.
4. Name the new public folder and select Calendar Items from the Folder contains
drop-down list.
5. Click OK.
The calendar public folder shows in Calendar area of the Outlook Web App.
Summary: This article describes how to recover a public folder mailbox in Microsoft 365
or Office 365 that was previously soft-deleted, meaning the mailbox retention period
has not yet elapsed and the recycle bin has not been purged.
You can delete public folder mailboxes either in the EAC or through the Remove-Mailbox
-PublicFolder cmdlet. To delete a primary mailbox, all other mailboxes must be deleted
A public folder mailbox can only be deleted once all folders within that mailbox
have been deleted. However, you can bypass this restriction by using the -Force
switch, as in Remove-Mailbox -PublicFolder -Force .
A deleted public folder mailbox is only recoverable for a period of 90 days after the
mailbox is soft-deleted. The retention period for a soft-deleted mailbox is 90 days,
after which the mailbox is permanently deleted and you won't be able to restore it.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Public folders" entry in the
Feature permissions in Exchange Online topic.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
7 Note
For deleted public folder mailboxes that contain folders, the folders will be
automatically recovered along with the mailbox that contains them when you use
one of the following procedures to recover the mailbox.
Restore a primary mailbox
To restore a primary public folder mailbox:
PowerShell
PowerShell
Undo-SoftDeletedMailbox -PublicFolder
Perform the following steps to restore both a primary public folder mailbox and any
relevant secondary mailboxes.
PowerShell
PowerShell
Undo-SoftDeletedMailbox -PublicFolder
3. Type the following for each secondary public folder mailbox that you want to
restore (once per mailbox).
PowerShell
Undo-SoftDeletedMailbox -PublicFolder
PowerShell
You will be able to distinguish primary from secondary public folder mailboxes by
the information in the Type field.
2. Type the following for each secondary public folder mailbox that you want to
restore (once per mailbox).
PowerShell
Undo-SoftDeletedMailbox -PublicFolder
7 Note
If a primary public folder has been deleted from an organization, any secondary
mailbox associated with it can't be restored.
Assign "Send As" or "Send on Behalf"
permissions for mail-enabled public
folders in Exchange Online
Article • 02/22/2023
You can assign either "Send As" or "Send on Behalf" permissions for mail-enabled public
folders to users in Microsoft Exchange Online.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Public folders" entry in
Sharing and collaboration permissions.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
3. In the list view, select the public folder that requires the permissions, and then click
Edit (the pencil icon).
4. Select delivery options, and then add the user to Send As or Send on Behalf
permissions, as required.
5. Select Save.
Use Exchange Online PowerShell to assign
permissions
The following example assigns "Send on Behalf" permissions for the mail-enabled public
folder NewPF1 to the user Jason.
The following example assigns "Send As" permissions for the mail-enabled public folder
NewPF1 to the user Jason.
For detailed syntax and parameter information, see the following articles:
Set-MailPublicFolder
Add-RecipientPermission
PowerShell
Get-MailPublicFolder <MEPFName>
Example:
PowerShell
Get-MailPublicFolder OnPremPF
If the MEPF from On-Premises are not showing in EXO, use the Sync-
MailPublicFolders.ps1 (for Exchange Server 2010) or Sync-
ModernMailPublicFolders.ps1 (For Exchange 2013/2016/2019) to sync the MEPF's
first.
In the Outlook client, users in your organization can add public folders to their Favorites
folders. Then, depending on your organization's policies, they can use Outlook on the
web or the new Outlook for Windows to add those same public folders to their Favorites
and perform certain functions in Outlook on the web that they use in the Outlook client.
7 Note
For more information about creating and configuring public folders, users in your
organization can see Create a public folder in Outlook .
1. In Outlook, go to the Folders view. Click the three dots on the Navigation Bar, and
the click Folders.
2. If necessary, scroll to the Public Folders node in the Navigation Pane. Click to
expand the All Public Folders folder.
3. Right-click the public folder that you want to add to Favorites, then select Add to
Favorites....
7 Note
By default, the Favorites folder is directly beneath the All Public Folders
folder in the Navigation Bar.
4. In the Add to Favorites dialog, you have the option to rename the folder for your
Favorites only. Click Add to add the folder to Favorites.
) Important
There are several types of public folders. In order for users to be able to work with a
favorite public folder in Outlook on the web, the public folder must be of type Mail
and Post items, Calendar items, or Contact items.
To add a public folder in Outlook on the web or the new Outlook for Windows,
right-click Folders, and then choose Add public folder to Favorites. Locate the
folder and click Add.
Your users can now use Outlook on the web to perform the following tasks in their
favorite Calendar, Contact, or Mail and Post public folders:
Retrieve items
Update items
Delete items
) Important
If you want to remove folders from the Favorites make sure to remove them instead
of deleting them. When you remove a folder from Favorites, the original folder in
the folder list remains. Deleting a folder from Favorites deletes the folder and its
contents from Outlook. More information can be found here .
See also
Create a public folder in Outlook
Mail-enable or mail-disable a public
folder in Exchange Online
Article • 02/22/2023
Public folders are designed for shared access and provide an easy and effective way to
collect, organize, and share information with other people in your workgroup or
organization. Mail-enabling a public folder allows users to post to the public folder by
sending an email message to it. When a public folder is mail-enabled additional settings
become available for the public folder in the Exchange admin center (EAC), such as
email addresses and mail quotas. In Exchange Online PowerShell, before a public folder
is mail-enabled, you use the Set-PublicFolder cmdlet to manage all of its settings. After
the public folder is mail-enabled, you use the Set-PublicFolder and the Set-
MailPublicFolder cmdlets to manage the settings.
If you want users on the internet to send mail to a mail-enabled public folder, you need
to set addition permissions using the Add-PublicFolderClientPermission cmdlet.
For additional management tasks related to public folders, see Public folder procedures
in Microsoft 365 or Office 365 and Exchange Online.
To ensure that users on the internet can send e-mail messages to a mail-enabled
public folder, the public folder needs to have at least the CreateItems access right
granted to the Anonymous account. If you want to learn how to do this, check out
Allow anonymous users to send email to a mail-enabled public folder.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Public folders" entry in the
topic.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
Use the EAC to mail-enable or mail-disable a
public folder
1. Navigate to Public folders > Public folders.
2. In the list view, select the public folder that you want to mail-enable or mail-
disable.
4. A warning box displays asking if you are sure you want to enable or disable email
for the public folder. Click Yes to continue.
If you want external users to send mail to this public folder, make sure you follow the
steps in Allow anonymous users to send email to a mail-enabled public folder.
PowerShell
This example mail-enables the public folder Reports under the Marketing public folder,
but hides the folder from address lists.
PowerShell
If you want external users to send mail to this public folder, make sure you follow the
steps in Allow anonymous users to send email to a mail-enabled public folder.
PowerShell
1. Open Outlook using an account that's been granted Owner permissions on the
email-enabled public folder you want anonymous users to send mail to.
4. Right-click on the public folder, click Properties and then select the Permissions
tab.
5. Select the Anonymous account, select Create items under Write, and then click
OK.
Use Exchange Online PowerShell to set permissions for the Anonymous account
This example sets the CreateItems permission for the Anonymous account on the
"Customer Feedback" mail-enabled public folder.
PowerShell
You only need to update the public folder hierarchy if you want to manually invoke the
hierarchy synchronizer and the mailbox assistant. Both these are invoked at least once
every 24 hours for each public folder mailbox in the organization. The hierarchy
synchronizer is invoked every 15 minutes if any users are logged on to a secondary
mailbox through Microsoft Outlook or a Microsoft Exchange Web Services client.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Public folders" entry in the
Feature permissions in Exchange Online topic.
You can't perform this procedure in the EAC. You must use Exchange Online
PowerShell.
We recommend that when you run this command with the InvokeSynchronizer
parameter, you use the SuppressStatus parameter. If you don't use this parameter
in the command, the output will display status messages every 3 seconds for up to
one minute. Until the minute passes, you can't use that instance of Exchange
Online PowerShell.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
This example updates all public folder mailboxes and suppresses the command's output.
PowerShell
You may need to remove public folders that are no longer being used in your
organization. To help determine which public folders should be removed, see View
statistics for public folders and public folder items.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Public folders" entry in the
Feature permissions in Exchange Online topic.
You can't delete a mail-enabled public folder. Before you can delete it, you must
first disable email for the public folder. For more information, see Mail-enable or
mail-disable a public folder.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
2. In the list view, select the public folder you want to delete. Note that clicking on
the folder name will display sub-folders within that folder, if there are any. At that
point you can click to select a specific sub-folder to remove.
To delete a folder or sub-folder, click anywhere on the folder's row except the
underlined name of the folder, and then click Delete . If you click the underlined
name of the folder, the Delete option will not be available to select.
3. A warning box displays asking if you're sure you want to delete the public folder.
Click Yes to continue.
PowerShell
This example tests the previous command without making any modifications.
PowerShell
This example removes the public folder Marketing and all its subfolders because the
command runs recursively.
PowerShell
This article walks you through the steps to restore a deleted public folder in Exchange
Online.
Public folders that have been deleted by users (using clients like Outlook) or admins
(using administrative tools like PowerShell or the Exchange admin center) are normally
stored in the public folder dumpster located in \NON_IPM_SUBTREE\DUMPSTER_ROOT .
Deleted folders are preserved there until the retention period ends.
For the scenarios where public folder contents are put on hold using retention policies,
the folders that are removed from \NON_IPM_SUBTREE\DUMPSTER_ROOT are preserved under
\NON_IPM_SUBTREE\DiscoveryHolds until the retention hold period ends.
You can restore folders that are preserved in the public folder dumpster or under the
DiscoveryHolds folder using Exchange Online PowerShell. Restoring the public folder will
restore all subfolders and items present in the folder.
7 Note
The folders in the dumpster are permanently deleted after the retention period
ends. After a public folder has been permanently deleted, you can't restore it,
unless the folder is preserved under DiscoveryHolds by a retention policy.
Permissions required
The user restoring the public folder must have the Public Folders role assigned to them.
By default, this role is assigned to users present in the Organization Management role
group.
The following command lists all non-system public folders in the dumpster:
PowerShell
Alternatively, you can search for specific folders. For example, the following
command searches for a deleted public folder named Marketing :
PowerShell
For example, the following command searches for a deleted public folder named
Sales :
PowerShell
PowerShell
For example, run the following command to restore a public folder named PF1 to
the root of the public folder tree:
PowerShell
Set-PublicFolder -Identity
\NON_IPM_SUBTREE\DUMPSTER_ROOT\DUMPSTER_EXTEND\RESERVED_1\RESERVED_1\9f
32c468-4bc2-42aa-b979-16a057394b2f\PF1 -Path \
The following alternate example restores a public folder named Sales to the root
of the public folder tree:
PowerShell
Set-PublicFolder -Identity
\NON_IPM_SUBTREE\DiscoveryHolds\Sales_774d775c-da53-4ee7-869c-
353c8a6e3265 -Path \
If don't know the original path of the deleted folder, you can find the folder's
original path before it was deleted.
For example, the following commands reveal the original path of the deleted
folder named Marketing :
PowerShell
PowerShell
When deleting a public calendar folder, a user sees the following options:
If the user selected "Yes", the items were deleted. In this case, you can restore the public
folder, but the items cannot be recovered.
7 Note
The items deleted from public folders are stored in the recoverable items (dumpster) of
public folder until the retention period is over.
Permissions required
The user restoring items from the public folder must have atleast the Author public
folder client permission assigned. For more information on public folder client
permissions, see Add-PublicFolderClientPermission.
2. Select the item to be restored, ensure Restore Selected Items option is selected
and click Ok.
3. The item is restored.
7 Note
To enable the Recover Deleted Items option for non-mail type (for example:
Calendar, Contact, Tasks) of public folders, see Can't recover deleted items from a
non-mail public folder.
Related articles
Recover a deleted public folder mailbox
This topic explains how to retrieve statistics about a public folder, such as the display
name, creation time, last user modified time, last user access, and item size. You can use
this information to make decisions about deleting or retaining public folders.
7 Note
In the Exchange admin center (EAC), you can view some of the quota and usage
information for public folders by navigating to Public Folders > Edit > Mailbox
usage. However, this information is incomplete, and we recommend that you use
Exchange Online PowerShell to view public folder statistics.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Public folders" entry in the
Feature permissions in Exchange Online topic.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
7 Note
The value for the Identity parameter must include the path to the public folder. For
example, if the public folder Marketing existed under the parent folder Business,
you would provide the following value: \Business\Marketing
Type of item
Subject
Creation time
Attachments
Message size
You can use this information to make decisions about what actions to take for your
public folders, such as which public folders to delete. For example, you may want to
delete a public folder if the items haven't been accessed for over two years, or you may
want to convert a public folder that's being used as a document repository to another
client access application.
This example returns default statistics for all items in the public folder Pamphlets under
the path \Marketing\2013. Default information includes item identity, creation time, and
subject.
PowerShell
Get-PublicFolderItemStatistics -Identity "\Marketing\2013\Pamphlets"
This example returns additional information about the items within the public folder
Pamphlets, such as subject, last modification time, creation time, attachments, message
size, and the type of item. It also includes a piped command to format the list.
PowerShell
Date and time that the item was last modified ( LastModificationTime )
PowerShell
) Important
Effective from December 2022, the classic Exchange Admin Center will be
deprecated for worldwide customers. Microsoft recommends using the new
Exchange Admin Center , if not already doing so.
While most of the features have been migrated to new EAC, some have been
migrated to other admin centers and remaining ones will soon be migrated to New
EAC. Find features that are not yet there in new EAC at Other Features or use
Global Search that will help you navigate across new EAC.
Shared mailboxes make it easy for a group of people in your company to monitor and
send email from a common account, such as info@contoso.com or
support@contoso.com. When a person in the group replies to a message sent to the
shared mailbox, the email looks like it was sent by the shared mailbox, not from the
individual user.
Notes:
You should create your shared mailbox in the Microsoft 365 admin center. For
more information, see Create a shared mailbox.
Creating a shared mailbox in Exchange Online also creates an active user account
with a system-generated (unknown) password. To block sign-in for this account,
see Block sign-in for the shared mailbox account.
If your organization uses a hybrid Exchange environment, you should use the
Exchange admin center (EAC) in your on-premises Exchange organization to create
and manage shared mailboxes. To learn more about shared mailboxes, see Shared
mailboxes.
When users move items from one folder to another in a shared mailbox, a copy of
the item is stored in the Recoverable Items folder.
Name
Email address
Alias
4. Click Create to save your changes and create the shared mailbox.
5. Under the Next steps section, click the Add users to this mailbox link.
6. To grant Full Access or Send As permissions, click the Add users button, and then
select or search the users you want to grant permissions to. Confused about which
permission to use? See Which permissions should you use? later in this topic.
7 Note
The Full Access permission allows a user to open the mailbox as well as create
and modify items in it. The Send As permission allows anyone other than the
mailbox owner to send email from this shared mailbox. Both permissions are
required for successful shared mailbox operation.
7. Click Save to save your changes and create the shared mailbox.
2. To grant or remove Full Access (Read and manage) and Send As permissions, click
Edit next to the permission type.
3. On the Manage mailbox delegation page, you can remove permissions already
added by clicking on the users listed (if any) or grant the permission by clicking
Add permissions and then select the users you want to grant permissions to.
7 Note
The Full Access permission allows a user to open the mailbox as well as create
and modify items in it. The Send As permission allows anyone other than the
mailbox owner to send email from this shared mailbox. Both permissions are
required for successful shared mailbox operation.
This example creates the shared mailbox Sales Department and grants Full Access and
Send on Behalf permissions for the security group MarketingSG. Users who are
members of the security group will be granted the permissions to the mailbox.
7 Note
This example assumes that you've already created the security group MarketingSG
and that security group is mail-enabled. See Manage mail-enabled security
groups.
PowerShell
Full Access: The Full Access permission lets a user open the shared mailbox and act
as the owner of that mailbox. After accessing the shared mailbox, a user can create
calendar items; read, view, delete, and change email messages; create tasks and
calendar contacts. However, a user with Full Access permission can't send email
from the shared mailbox unless they also have Send As or Send on Behalf
permission.
Send As: The Send As permission lets a user impersonate the shared mailbox when
sending mail. For example, if Kweku logs into the shared mailbox Marketing
Department and sends an email, it will look like the Marketing Department sent
the email.
Send on Behalf: The Send on Behalf permission lets a user send email on behalf of
the shared mailbox. For example, if John logs into the shared mailbox Reception
Building 32 and sends an email, it look like the mail was sent by "John on behalf of
Reception Building 32". You can't use the EAC to grant Send on Behalf permissions,
you must use Set-Mailbox cmdlet with the GrantSendonBehalf parameter.
More information
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
Sharing in Exchange Online
Article • 02/22/2023
You may need to coordinate schedules with people in different organizations or with
friends and family members so that you can work together on projects or plan social
events. With Microsoft 365 and Office 365, administrators can set up different levels of
calendar access in Exchange Online to allow businesses to collaborate with other
businesses and to let users share their schedules with others. Business-to-business
calendar sharing is set up by creating organization relationships. User-to-user calendar
sharing is set up by applying sharing policies.
7 Note
Share calendars with an Organization The on-premises Exchange administrator has to set
on-premises Exchange relationships up an authentication relationship with the cloud
organization (also known as "federation") and must meet
minimum software requirements
Share a Microsoft 365 or Sharing The on-premises Exchange administrator has to set
Office 365 user's calendar policies up an authentication relationship with the cloud
with an Exchange on- (also known as "federation") and must meet
premises user minimum software requirements
Sharing documentation
The following table contains links to articles that will help you learn about and manage
sharing in Exchange Online.
Topic Description
Sharing policies in Learn more about the person-to-person policies that enable
Exchange Online calendar sharing.
Organization relationships in Exchange
Online
Article • 02/22/2023
7 Note
For example, a Contoso admin creates an organization relationship with Tailspin Toys,
and a Tailspin Toys admin creates an organization relationship with Contoso. As a result,
Tailsping Toys users will be able to schedule meetings and view the availability of
Contoso users Contoso by adding Contoso email addresses to meeting invitations.
Likewise, Contoso users will also see the availability of Tailspin Toys users when
scheduling meetings.
No access.
Access to availability (free/busy) time only.
Access to free/busy, including time, subject, and location.
7 Note
If users don't want to share their free/busy information with others, they can
change their permissions entry in Outlook. To do this, users go to the Calendar
Properties > Permissions tab, select one or more users/groups, and select any of
the Permissions options.
To completely hide their calendar, they can remove the user/group from the list of
those with which the calendar is shared. Their free/busy information won't be seen
by internal or external users, even if an organization relationship exists. The
permissions set by the user will apply.
The following articles will help you configure and manage organization relationships:
Set up an organization relationship to share calendar information with an external business partner. Microsoft 365 and
Office 365 admins can set up an organization relationship with another Microsoft 365 or Office 365 organization or with
an Exchange on-premises organization.
You need to be assigned permissions before you can perform this procedure or procedures. To see what permissions
you need, see the Permissions in Exchange Online topic.
If you want to share calendars with an on-premises Exchange organization, the on-premises Exchange administrator
has to set up an authentication relationship with the cloud (also known as "federation") and must meet minimum
software requirements.
4. In new organization relationship, in the Relationship name box, type a friendly name for the organization
relationship.
5. In the Domains to share with box, type the domain for the external Microsoft 365, Office 365, or Exchange on-
premises organization you want to let see your calendars. If you need to add more than one domain, you can do it
after you create the organization relationship by editing it.
6. Select the Enable calendar free/busy information sharing check box to turn on calendar sharing with the domains
you listed. Set the sharing level for calendar free/busy information and set which users can share calendar free/busy
information.
To set the free/busy access level, select one of the following values:
To set which users will share calendar free/busy information, select one of the following values:
Click Browse to pick the security group from a list, then click OK.
PowerShell
If you're not sure which domains Contoso has set up for cloud-based authentication, you can run this command to
automatically find the configuration information. The Get-FederationInformation cmdlet is used to find the right
information, which is then passed to the New-OrganizationRelationship cmdlet.
PowerShell
For detailed syntax and parameter information, see Get-FederationInformation and New-OrganizationRelationship.
If you're setting up an organization relationship with an on-premises Exchange organization, you may want to provide the
connection settings. This example creates an organization relationship with Fourth Coffee and specifies the connection
settings to use. The following conditions apply:
PowerShell
You can also run the following command to verify the organization relationship information:
PowerShell
Get-OrganizationRelationship | Format-List
) Important
Organization relationships between the DoD cloud and other clouds is not supported.
This example creates an organization relationship between Contoso, Ltd in the WorldWide cloud and Fourth Coffee in the
GCC-H cloud. with the following conditions:
PowerShell
PowerShell
You can't use the Get-FederationInformation cmdlet to automatically discover the domains and other configurations
needed for cross-cloud organization relationship setup.
The configuration parameters that you need to set are described in the following table:
Parameter OrgRel in WW/GCC for GCC-H Tenant OrgRel in GCC-H for WW/GCC Tenant
DomainNames All the domains for the remote org. You need to collect All the domains for the remote org. You need to collect
and add these manually. and add these manually.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at Exchange Online or Exchange Online
Protection .
Modify an organization relationship in
Exchange Online
Article • 02/22/2023
An organization relationship lets users in your Microsoft 365 or Office 365 organization
share calendar free/busy information with other Microsoft 365, Office 365, or on-
premises Exchange organizations. You may want to change the settings of an
organization relationship, such as changing the name, temporarily disabling calendar
sharing, changing the access level, or changing which security groups will share
calendars.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the Permissions in Exchange
Online topic.
If you want to share calendars with an on-premises Exchange organization, the on-
premises Exchange administrator has to set up an authentication relationship with
the cloud (also known as "federation") and must meet minimum software
requirements.
Change the free/busy access level from Calendar free/busy information with
time, subject, and location to Calendar free/busy information with time only.
4. In organization relationship, general don't change the Name for the organization
relationship.
5. In the Domains to share with box, enter the domain service.contoso.com, then
click Add .
3. In the list view, under Organization Sharing, select the organization relationship
Contoso, and then click Edit .
5. Clear the Enable calendar free/busy information sharing check box to disable
free/busy sharing. The free/busy access level and security group buttons will also
be disabled.
PowerShell
PowerShell
This example enables calendar availability information access for the organization
relationship WoodgroveBank and sets the access level to AvailabilityOnly
(calendar free/busy information with time only).
PowerShell
PowerShell
Get-OrganizationRelationship | format-list
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
Remove an organization relationship in
Exchange Online
Article • 02/22/2023
An organization relationship lets users in your Microsoft 365 or Office 365 organization
share calendar free/busy information with other Microsoft 365, Office 365, or on-
premises Exchange organizations. You can remove an organization relationship to
disable calendar sharing with the other organization.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the Permissions in Exchange
Online topic.
PowerShell
Remove-OrganizationRelationship -Identity "Contoso"
In the Exchange admin center, go to organization > sharing and verify that the
organization relationship isn't displayed in the list view under Organization
Sharing.
PowerShell
Get-OrganizationRelationship | Format-List
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
Sharing policies in Exchange Online
Article • 02/22/2023
People in your organization may want to share calendars with individual business
associates, friends, or family members. Sharing policies control how your users share
their calendars with people outside your organization. The sharing policy that an admin
applies to the user's mailbox determines what level of access a user can share and with
whom. If you don't change anything, then all users can invite anyone with an email
address to view their calendar. You may decide to apply a more restrictive policy.
7 Note
An admin defines the rules that make up a sharing policy. You can specify the domains
that users can share with, and the following levels of access to calendars:
After you create a new sharing policy, you have to apply that policy to mailboxes before
it takes effect. Sharing policies are applied to individual user's mailboxes. An admin can
also disable a user's sharing policy to prevent external access to calendars.
Users share their calendar by sending an email invitation to the external user. Outlook
2010 or later or Outlook on the web (formerly known as Outlook Web App) users can
send this type of invitation. The calendar can be opened through a URL link, or can be
accessed as an additional calendar folder if the external user has Outlook 2010 or later
or is using Outlook on the web.
These articles will help you learn how to manage sharing policies for your Microsoft 365
or Office 365 organization:
Create a new Sharing Policy to change how people in your organization share calendars
with individual business associates, friends, or family members. Sharing policies control
how your users share their calendars with people outside your organization. By default,
all users can invite anyone with an email address to view their calendar. After you create
a new sharing policy, you have to apply that policy to mailboxes before it takes effect. To
apply a specific sharing policy to users, see Apply a sharing policy to mailboxes in
Exchange Online.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the Permissions in Exchange
Online topic.
Only Outlook 2010 or later and Outlook on the web (formerly known as Outlook
Web App) users can create sharing invitations.
4. In new sharing policy, type a friendly name for the sharing policy in the Policy
name box.
6. In sharing rule, select one of the following options to specify the domains you
want to share with:
7. If you select Sharing with a specific domain, type the name of the domain you
want to share with. If you need to enter more than one domain for this sharing
policy, save the settings for the first domain, then edit the sharing rules to add
more domains.
8. To specify the information that can be shared, select the Share your calendar
folder check box, and then select one of the following options:
10. If you want to set this sharing policy as the new default sharing policy for all users
in your Microsoft 365 or Office 365 organization, select the Make this policy my
default sharing policy check box.
PowerShell
This example creates the sharing policy ContosoWoodgrove for two different
domains (contoso.com and woodgrovebank.com) with different sharing settings
configured for each domain. The policy is disabled.
PowerShell
New-SharingPolicy -Name "ContosoWoodgrove" -Domains 'contoso.com:
CalendarSharingFreeBusySimple', 'woodgrovebank.com:
CalendarSharingFreeBusyDetail' -Enabled $false
PowerShell
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
Apply a sharing policy to mailboxes in
Exchange Online
Article • 02/22/2023
Sharing policies control how your users share their calendars with people outside your
organization. The sharing policy that an admin applies to the user's mailbox determines
what level of access a user can share and with whom. If you don't change anything, then
all users can invite anyone with an email address to view their calendar. If you create a
new sharing policy, you have to apply that policy to mailboxes before it takes effect.
Sharing policies are applied to individual user's mailboxes. An admin can also disable a
user's sharing policy to prevent external access to calendars.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the Permissions in Exchange
Online topic.
A sharing policy must exist. For details, see Create a sharing policy in Exchange
Online.
3. In the list view, select the mailbox you want, and then click Edit .
5. In the Sharing policy list, select the sharing policy you want to apply to this
mailbox.
3. In the list view, hold the Ctrl key while you select multiple mailboxes.
4. In the details pane, the mailbox properties will be configured for bulk edit. Scroll
down to click More options.
6. In bulk assign sharing policy, select the sharing policy from the list.
PowerShell
This example finds all user mailboxes in the Marketing department and then applies the
sharing policy Contoso Marketing.
PowerShell
This example shows all mailboxes that have the sharing policy Contoso applied, and it
sorts the users into a table that displays only their aliases and email addresses.
PowerShell
In the Exchange admin center, go to recipients > mailboxes, and then select the
mailbox to which you applied the sharing policy. Click Edit , click mailbox
features, and then confirm that the correct sharing policy displays in the Sharing
policy.
Run the following command to verify the sharing policy was assigned to a user
mailbox. Verify that the correct sharing policy is listed for the SharingPolicy
parameter.
PowerShell
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
Modify, disable, or remove a sharing
policy in Exchange Online
Article • 02/22/2023
Sharing policies control how your users share their calendars with people outside your
organization. You may want to change some sharing policy properties, such as changing
sharing rules, changing the free/busy access level, temporarily disabling a sharing policy,
or removing a sharing policy entirely.
For details about how to create a sharing policy, see Create a sharing policy in Exchange
Online
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the Permissions in Exchange
Online topic.
3. Under Individual Sharing, select a sharing a policy, and then click Edit .
5. In sharing rule, change the settings such as the domain you want to share
information with and the sharing level for calendars. Click save to update the rule.
3. Under Individual Sharing, select a sharing a policy, and then click Edit .
4. In sharing policy, select the Make this policy my default sharing policy check box.
4. In the On column, clear the check box for the sharing policy you want to disable.
) Important
Before you remove a sharing policy, the sharing policy must be removed from all
user mailboxes.
1. From the Microsoft 365 admin center dashboard, go to Admin > Exchange.
3. Under Individual Sharing, select a sharing a policy, and then click Delete .
This example adds a second domain to the sharing policy Contoso. When you're
adding a domain to an existing policy, you must include any previously included
domains.
PowerShell
This example sets the sharing policy Contoso as the default sharing policy.
PowerShell
PowerShell
The first example removes the sharing policy Contoso. The second example
removes the sharing policy Contoso and suppresses the confirmation that you
want to remove the policy.
PowerShell
PowerShell
For detailed syntax and parameter information, see Set-SharingPolicy and Remove-
SharingPolicy.
Monitoring, reporting, and message
tracing in Exchange Online
Article • 02/22/2023
Exchange Online offers many different reports that can help you determine the overall
status and health of your organization. There are also tools to help you troubleshoot
specific events (such as a message not arriving to its intended recipients), and auditing
reports to aid with compliance requirements. The following table describes the reports
and troubleshooting tools that are available to Exchange Online administrators.
Reports in Email activity In the Microsoft 365 admin center , go to Show all (if necessary),
the click Reports > Usage, and then select one of the reports on the page:
Microsoft Email app usage
365 admin Email activity
Mailbox usage Active users - Microsoft 365 services > View more:
center
Exchange:
Microsoft 365
Email activity
Groups activity
Email app usage
Mailbox usage
Office 365:
Groups activity
Mailbox usage
reports
Microsoft 365
groups activity
reports
For more
information, see
Reporting Web
Services.
1
DLP is only available in certain Exchange Online subscription plans. For information,
see the Data Loss Prevention entries in the Exchange Online Service Description.
2
Defender for Office 365 is available in Office 365 Enterprise E5, but you can also
purchase Defender for Office 365 as an add-on to other subscription plans. For more
information, see the Microsoft Defender for Office 365 Service Description.
3
Many of the original reporting cmdlets in Exchange Online PowerShell have been
deprecated (the cmdlets are available, but they don't return useful data). For a list of
available and unavailable reporting cmdlets, see Exchange reporting cmdlets.
Mailbox 60 days Message data aggregation is mostly complete within 24-48 hours.
summary Some minor incremental aggregated changes may occur for up to 5
reports days.
Mail 90 days Message data aggregation is mostly complete within 24-48 hours.
protection Some minor incremental aggregated changes may occur for up to 5
summary days.
reports
Mail 90 days For detail data that's less than 7 days old, data should appear within
protection 24 hours but may not be complete until 48 hours. Some minor
detail incremental changes may occur for up to 5 days.
reports To view detail reports for messages that are greater than 7 days old,
results may take up to a few hours.
Report Data Latency
type available for
(look back
period)
Message 90 days When you run a message trace for messages that are less than 7
trace data days old, the messages should appear within 5-30 minutes.
When you run a message trace for messages that are greater than 7
days old, results may take up to a few hours.
7 Note
Data availability and latency doesn't depend on the user interface (it's the same in
the admin centers as in PowerShell).
Use mail protection reports to view data
about malware, spam, and rule
detections in Exchange Online
Article • 02/22/2023
If you're an Exchange Online or Exchange Online Protection (EOP) admin, there's a good
chance you'd like to monitor how much spam and malware is being detected, or how
often your mail flow rules (also known as transport rules) are being matched. With the
interactive mail protection reports in the Microsoft 365 security center, you can quickly
get a visual report of summary data, and drill-down into details about individual
messages, for as far back as 90 days.
7 Note
Reporting overview
The following table describes the types of reports that are available, how to find them,
and where to go to learn more.
Email security reports: Malware, spam, spoof and other protection reports View email security
for all Exchange Online organizations. reports in the
Microsoft 365
Defender portal
Type of information Learn more
View Defender for Office 365 reports in the Microsoft 365 Defender View reports for
portal: Mail latency, threat protection and other reports that are available Microsoft Defender
to organizations with Defender for Office 365 (include in a subscription or for Office 365
as an add-on).
Customize and schedule mail protection
reports to be automatically sent to your
inbox in Exchange Online
Article • 02/22/2023
As an Exchange Online or Exchange Online Protection (EOP) admin, you probably want
to keep an eye on your organization's mail flow, how much spam and malware is being
detected, or how often your rules and policies are being matched. By using mail
protection reports, you'll get a quick summary of the messages that Microsoft 365 or
Office 365 has delivered or rejected based on spam or malware characteristics, rules, or
data loss prevention (DLP) policies.
You can choose to either schedule mail protection reports to be sent to your inbox
automatically, or you can view them any time in the Microsoft 365 Defender portal.
To get started customizing and downloading reports, see the following articles:
Delivery reports in Microsoft 365 and Office 365 allowed users and administrators to
discover and view delivery information about mail messages. Delivery reports for users
have been discontinued and there is currently no direct replacement. Delivery reports
for administrators have been replaced by the Message Trace feature.
7 Note
The Exchange message trace link in the Microsoft 365 Defender portal opens
message trace in the modern EAC.
Delivery reports for users and administrators is still available in on-premises
Exchange environments. For more information, see Track messages with
delivery reports.
Read receipts and delivery notifications are separate from delivery reports and
are still available in Microsoft 365 and Office 365. For more information, see
Add and request read receipts and delivery notifications .
Trace an email message in Exchange
Online
Article • 02/22/2023
Sometimes an email message gets lost in transit, or it can take a lot longer than
expected for delivery, and your users can wonder what happened. As an administrator,
you can use the message trace feature to follow messages as they pass through your
Exchange Online or Exchange Online Protection service. With message trace, you can
determine whether a targeted email message was received, rejected, deferred, or
delivered by the service. It also shows what events have occurred to the message before
reaching its final status. Getting detailed information about a specific message lets you
efficiently answer your user's questions, troubleshoot mail flow issues, validate policy
changes, and alleviates the need to contact technical support for assistance.
Tip
For troubleshooting general issues and trends, use the Reports page in the
Microsoft 365 Defender portal
(https://security.microsoft.com/emailandcollabreport ). For single point specifics
where details are needed about a message, use the message trace tool.
The following topics describe how to run a message trace to narrow down your search
criteria, how to view message trace results, and how to view details about a specific
message:
7 Note
The Exchange message trace link in the Microsoft 365 Defender portal opens
message trace in the modern EAC.
The Message Trace FAQ topic presents common messaging questions that arise and
how to best answer these questions using the message trace tool.
Run a message trace in the classic EAC
in Exchange Online
Article • 02/22/2023
7 Note
Message trace is available in the modern Exchange admin center. For more
information, see Message trace in the modern Exchange admin center. The
Exchange message trace link in the Microsoft 365 Defender portal opens message
trace in the modern EAC.
As an administrator, you can find out what happened to an email message by running a
message trace in the Exchange admin center (EAC). After running the message trace,
you can view the results in a list, and then view the details about a specific message.
Message trace data is available for the past 90 days. If a message is more than 7 days
old, you can only view the results in a downloadable .CSV file.
For a video walkthrough of message trace and other mail flow troubleshooting tools,
see Find and fix email delivery issues as a Microsoft 365 or Office 365 for business
admin.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Message trace" entry in
the Feature permissions in Exchange Online topic.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection . If you're a Microsoft 365 or
Office 365 for business admin, see Contact support for business products - Admin
Help.
Run a message trace
1. In the EAC, go to Mail flow > message trace.
2. Depending on what you're searching for, you can enter values in the following
fields. None of these fields are required for messages that are less than 7 days old.
You can simply click Search to retrieve all message trace data over the default time
period, which is the past 48 hours.
a. Date range: Using the drop-down list, select to search for messages sent or
received within the past 24 hours, 48 hours, or 7 days. You can also select a
custom time frame that includes any range within the past 90 days. For custom
searches you can also change the time zone, in Coordinated Universal Time
(UTC).
b. Delivery status: Using the drop-down list, select the status of the message you
want to view information about. Leave the default value of All to cover all
statuses. Other possible values are:
*
If you're searching for messages that are older than 7 days, you can't select
Pending or Unknown.
c. Message ID: This is the Internet message ID (also known as the Client ID) found
in the message header in the Message-ID: header field. Users can provide you
with this information in order to investigate specific messages.
The form of this ID varies depending on the sending mail system. The following
is an example: <08f1e0f6806a47b4ac103961109ae6ef@server.domain> .
This ID should be unique; however, not all sending mail systems behave the
same way. As a result, there's a possibility that you may get results for multiple
messages when querying upon a single Message ID.
Note: Be sure to include the full Message ID string. This may include angle
brackets (<>).
d. Sender: You can narrow the search for specific senders by clicking the Add
sender button next to the Sender field. In the subsequent dialog box, select one
or more senders from your company from the user picker list and then click
Add. To add senders who aren't on the list, type their email addresses and click
Check names. In this box, wildcards are supported for email addresses in the
format: *@contoso.com. When specifying a wildcard, other addresses can't be
used. When you're done with your selections, click OK.
e. Recipient: You can narrow the search for specific recipients by clicking the Add
recipient button next to the Recipient field. In the subsequent dialog box, select
one or more recipients from your company from the user picker list and then
click Add. To add recipients who aren't on the list, type their email addresses
and click Check names. In this box, wildcards are supported for email addresses
in the format: *@contoso.com. When specifying a wildcard, other addresses
can't be used. When you're done with your selections, click OK.
3. If you're searching for messages that are older than 7 days, configure the following
settings: (otherwise you can skip this step):
a. Include message events and routing details with report: We recommend
selecting this check box only if you're looking for a small number of messages.
Otherwise, the results will take longer to return.
b. Direction: Leave the default All or select Inbound for messages sent to your
organization or Outbound for messages sent from your organization.
d. Report title: Specify the unique identifier for this report. This will also be used as
the subject line text for the email notification. The default is "Message trace
report <day of the week>, <current date> <current time>". For example,
"Message trace report Thursday, October 17, 2018 7:21:09 AM".
e. Notification email address: Specify the email address that you want to receive
the notification when the message trace completes. This address must reside
within your list of accepted domains.
4. Click Search: to run the message trace. You'll be warned if you're nearing the
threshold of the amount of traces you're allowed to run over a 24 hour period.
After running your message trace, proceed to one of the next sections to read about
how to view your results.
Note: To search for a different message, you can click the Clear button and then specify
new search criteria.
Date: The date and time at which the message was received by the service, using
the configured UTC time zone.
Sender: The email address of the sender in the form alias@domain .
Recipient: The email address of the recipient or recipients. For messages sent to
more than one recipient, there is one line per recipient. If the recipient is a
distribution list, the distribution list will be the first recipient, and then each
member of the distribution list will be included on a separate line so that you can
check the status for all recipients.
Subject: The subject line text of the message. If necessary, this is truncated to the
first 256 characters.
Status: This field specifies whether the message was Delivered to the recipient or
the intended destination, Failed to be delivered to the recipient (either because it
failed to reach its destination or because it was filtered), is Pending delivery (it is
either in the process of being delivered or the delivery was deferred but is being
re-attempted), was Expanded (there was no delivery because the message was
sent to a distribution list (DL) that was expanded to the recipients of the DL), or has
a status of None (there is no status of delivery for the message to the recipient
because the message was either rejected or redirected to a different recipient).
7 Note
The message trace can display a maximum of 500 entries. By default, the user
interface displays 50 entries per page, and you can navigate through the pages. You
can also change the entry size of each page up to 500.
Message size: The size of the message, including attachments, in kilobytes (KB), or,
if the message size is greater than 999 KBs, in megabytes (MB).
Message ID: This is the Internet message ID (also known as the Client ID) found in
the header of the message with the "Message-ID:" token. The form of this varies
depending on the sending mail system. The following is an example:
<08f1e0f6806a47b4ac103961109ae6ef@contoso.com> .
This ID should be unique, however, it is dependent on the sending mail system for
generation and not all sending mail systems behave the same way. As a result,
there is a possibility that you may get results for multiple messages when querying
upon a single Message ID.
This is given as output so that trace entries and the messages in question can be
co-related.
To IP: The IP address or addresses to which the service attempted to deliver the
message. If there are multiple recipients, these are displayed. For inbound
messages sent to Exchange Online, this value is blank.
From IP: The IP address of the computer that sent the message. For outbound
messages sent from Exchange Online, this value is blank.
In the events section, the following fields provide information about the events that
occurred to the message as it passed through the messaging pipeline:
Event: This field briefly informs you of what happened, for example if the message
was received by the service, if it was delivered or failed to be delivered to the
intended recipient, and so on. The following are examples of events that may be
listed:
EXPAND: The message was sent to a distribution group that was expanded.
DEFER: The message delivery was postponed and may be re-attempted later.
DLP rule: The message had a DLP rule match in this message.
Sensitivity label: A server-side labeling event occurred. For example, a label was
automatically added to a message that includes an action to encrypt or was
added via the web or mobile client. This action is completed by the Exchange
server and logged. A label added via Outlook will not be included in the event
field.
Tip
Additional events may appear. For more information about these events,
see Event types in the message tracking log.
Action: This field shows the action that was performed if the message was filtered
due to a malware or spam detection or a rule match. For example, it will let you
know if the message was deleted or if it was sent to the quarantine.
Detail: This field provides detailed information that elaborates on what happened.
For example, it may inform you which specific mail flow rule (also known as a
transport rule) was matched, and what happened to the message as a result of that
match. It can also inform you which specific malware was detected in which
specific attachment, or why a message was detected as spam. If the message was
successfully delivered, it can tell you the IP address to which it was delivered.
In the EAC, you can click View pending or completed traces in order to view a list of
traces that were run for items that older than 7 days. In the resulting UI, the list of traces
is sorted based on the date and time that they were submitted, with the most recent
submissions appearing first. In addition to the report title, the date and time the trace
was submitted, and the number of messages in the report, the following status values
are listed:
Not started: The trace was submitted but is not yet running. At this point, you
have the option to cancel the trace.
Cancelled: The trace was submitted but was cancelled.
In progress: The trace is running and you can't cancel the trace or download the
results.
Completed: The trace has completed and you can click Download this report to
retrieve the results in a .CSV file. Note that if your message trace results exceed
100000 messages for a summary report, it will be truncated to the first 100000
messages. If your message trace results exceed 1000 messages for a detailed
report, it will be truncated to the first 1000 messages. If you do not see all the
results that you need, we recommend that break your search out into multiple
queries.
When you select a specific message trace, additional information appears in the right
pane. Depending on what search criteria you specified, this may include details such as
the date range for which the trace was run, and the sender and intended recipients of
the message.
7 Note
Message traces containing data that is more than 7 days old are automatically
deleted in the EAC after 10 days. They can't be manually deleted.
) Important
In order to view the downloaded message trace report, you must have the "View-
Only Recipients" RBAC role assigned to your role group. By default, the following
role groups have this role assigned: Compliance Management, Help Desk, Hygiene
Management, Organization Management, View-Only Organization Management.
origin_timestamp: The date and time at which the message was received by the
service, using the configured UTC time zone.
Recipient_status: The status of the delivery of the message to the recipient. If the
message was sent to multiple recipients, it will show all the recipients and the
corresponding status against each, in the format: <email address>##<status>. For
example, a status of:
##Receive, Send: means that the message was received by the service and sent
to the intended destination.
##Receive, Fail: means that the message was received by the service but failed
to be delivered to the intended destination.
##Receive, Deliver: means that the message was received by the service and
delivered to the recipient's mailbox.
message_id: This is the Internet message ID (also known as the Client ID) found in
the header of the message with the "Message-ID:" token. The form of this varies
depending on the sending mail system. The following is an example:
<*08f1e0f6806a47b4ac103961109ae6ef*@*server*.*domain*> .
This ID should be unique, however, it is dependent on the sending mail system for
generation and not all sending mail systems behave the same way. As a result,
there is a possibility that you may get results for multiple messages when querying
upon a single Message ID.
This is given as output so that trace entries and the messages in question can be
co-related.
delivery_priority: Denotes whether the message was sent with High, Low, or
Normal priority.
Log Description
information
SFV=NSPM The message was marked as non-spam and was sent to the intended recipients.
SFV=BLK Filtering was skipped and the message was blocked because it originated from a
blocked sender.
SFV=SKS The message was marked as spam prior to being processed by the content filter.
This includes messages where the message matched a mail flow rule to
automatically mark it as spam and bypass all additional filtering.
Log Description
information
SCL= For more information about the different SCL values and what they mean, see
<number> Spam Confidence Levels.
PCL= The Phishing Confidence Level (PCL) value of the message. These can be
<number> interpreted the same way as the SCL values documented in Spam Confidence
Levels.
DI=SJ The message was sent to the recipient's Junk Email folder.
DI=SN The message was routed through the higher risk delivery pool. For more
information, see High-risk delivery pool for outbound messages.
DI=SO The message was routed through the normal outbound delivery pool.
IPV=CAL The message was allowed through the spam filters because the IP address was
specified in an IP Allow list in the connection filter.
PTR= The PTR record of the sending IP address, also known as the reverse DNS address.
[ReverseDNS]
When a message is filtered for spam, a sample custom_data entry would look similar to
the following:
S:SFA=SUM|SFV=SPM|IPV=CAL|SRV=BULK|SFS=470454002|SFS=349001|SCL=9|SCORE=-1|LIST=0|D
I=SN|RD=ftmail.inc.com|H=ftmail.inc.com|CIP=98.129.140.74|SFP=1501|ASF=1|CTRY=US|CL
TCTRY=|LANG=en|LAT=287|LAT=260|LAT=18;
A string beginning with S:AMA is an entry from the anti-malware agent and provides the
following key details:
Log Description
Information
AMA=SUM|v=1| The message was determined to contain malware. SUM denotes that the
or malware could've been detected by any number of engines. EV denotes that
the malware was detected by a specific engine. When malware is detected by
AMA=EV|v=1| an engine this triggers the subsequent actions.
When a message contains malware, a sample custom_data entry would look similar to
the following:
S:AMA=SUM|v=1|action=b|error=|atch=1;S:AMA=EV|engine=M|v=1|sig=1.155.974.0|name=DOS
/Test_File|file=filename;S:AMA=EV|engine=A|v=1|sig=201307282038|name=Test_File|file
=filename
St=[datetime] The date and time (in UTC) when the rule match occurred.
Log Information Description
Action= The action that was applied. For a list of available actions, see Mail flow rule
[ActionDefinition] actions in Exchange Online.
When a message matches a mail flow rule, a sample custom_data entry would look
similar to the following:
S:TRA=ETR|ruleId=19a25eb2-3e43-4896-ad9e-47b6c359779d|st=7/17/2013 12:31:25
AM|action=ApplyHtmlDisclaimer|sev=1|mode=Enforce
Can I run a message trace via Exchange Online PowerShell or Exchange Online
Protection PowerShell? What are the cmdlets to use? gives information about the
PowerShell cmdlets that you can use to run a message trace.
Message Trace FAQ in Exchange Online
Article • 02/22/2023
This article presents messaging questions that a user may have, along with possible
answers. It also describes how to use the message trace tool in order to get those
answers and troubleshoot specific mail delivery issues.
When you run a message trace for older messages, the results are returned within a few
hours as a downloadable CSV file.
7 Note
The Exchange message trace link in the Microsoft 365 Defender portal opens
message trace in the modern EAC.
Get-HistoricalSearch: Use this cmdlet to view information about historical searches that
have been performed within the last 10 days.
Start-HistoricalSearch: Start a new historical search for messages that are less than 90
days old.
Stop-HistoricalSearch: Stop queued historical searches that haven't started yet (the
status value is NotStarted ).
The message is still being processed because there was a previous failure and the
service is reattempting delivery.
Run a message trace. Use as many search criteria as possible to narrow down the results.
For example, you should know the sender and the intended recipient or recipients of the
message, and the general time period when the message was sent.
View the results, locate the message, and then view specific details about the message
(see View message trace results for messages less than seven days old or View message
trace results for messages more than seven days old). Look for a delivery status of Failed
or Pending to explain why the message was not received.
Confirm that the message was sent, that it was successfully received by the service, that
it was not filtered, redirected, or sent for moderation, and that it did not experience any
delivery failures or delays.
Run a message trace. Use as many search criteria as possible to narrow down the results.
For example, specify the recipient who received the message, set the delivery status to
Delivered, and set the time period based on when the message was received.
View the results, locate the message, and then view specific details about the message
(see View message trace results for messages less than seven days old or View message
trace results for messages more than seven days old).
The message was sent for moderation and is awaiting approval or was rejected by
the moderator.
The message is still being processed because there was a previous failure and the
service is reattempting delivery.
The message was delivered to the destination but it was deleted before it was
accessed (perhaps because it matched a rule).
View the results, locate the message, and then view specific details about the message
(see View message trace results for messages less than seven days old or View message
trace results for messages more than seven days old).
Look for a delivery status of Failed or Pending to explain why the message wasn't
delivered. Confirm that the message was sent, that it was successfully received by the
service, that it was not filtered, redirected, or sent for moderation, and that it did not
experience any delivery failures or delays. If the destination is not reachable, you can use
the To IP to help troubleshoot connectivity issues.
The intended destination is not responsive. This is the most likely scenario.
It may be a large message that is taking a long time to process
Latency in the service may be causing delays
The message may have been blocked
Run a message trace. Use as many search criteria as possible to narrow down the results.
For example, you should know the sender and the intended recipient or recipients of the
message, and the general time period when the message was sent.
View the results, locate the message, and then view specific details about the message
(see View message trace results for messages less than seven days old or View message
trace results for messages more than seven days old).
The events section will tell you why the message was not yet delivered. When viewing
the events, the timestamp information will let you follow the message through the
messaging pipeline, and tell you how long the service takes to process each event. The
event details will also inform you if the message being delivered is large or if the
destination is not responsive.
Run a message trace, locate the message in the results, and then view specific details
about the message (see View message trace results for messages less than seven days
old or View message trace results for messages more than seven days old).
When the content filter marks a message as spam, if it is sent to the Junk Email folder or
the quarantine, it will have a status of Delivered. You can view the event details in order
to see how the message arrived at its destination. For example, it may inform you that
the message was determined to have a high spam confidence level, or that an advanced
spam filtering option was matched. You will also be informed of the action that occurred
as a result of the message being marked as spam, for example if it was sent to
quarantine, stamped with an X-header, or if it was sent through the high risk delivery
pool.
To find out why a message was detected to contain malware, run a message trace. Use
as many search criteria as possible to narrow down the results. Set the delivery status to
Failed.
View the results, locate the message, and then view specific details about the message
(see View message trace results for messages less than seven days old or View message
trace results for messages more than seven days old).
If the message was not delivered because it was determined to contain malware, this
information will be provided in the events section. For example, the following is a
sample Detail: Malware: "ZipBomb" was detected in attachment file.zip. You will also be
informed of the action that occurred as a result of the message containing malware, for
example if the entire message was blocked or if all attachments were deleted and
replaced with an alert text file.
View the results, locate the message, and then view specific details about the message
(see View message trace results for messages less than seven days old or View message
trace results for messages more than seven days old).
If the message was not delivered because its contents matched a rule, the events section
will let you know the name of the mail flow rule that was matched. You will also be
informed of the action that occurred as a result of the mail flow rule match, for example
if the message was quarantined, rejected, redirected, sent for moderation, decrypted, or
any number of other possible options. For information about how to create Exchange
mail flow rules and set actions for them, see Mail flow rules (transport rules) in Exchange
Online.
MAIL FROM: The message trace tool uses the MAIL FROM value presented at the
initiation of the SMTP conversation as the Sender in a search, regardless of what
the DATA section of the message shows. The message may show a Reply-to
address or different From: or Sender values. If the email message was sent by a
process and not by an email client, there is an increased likelihood that the sender
in the MAIL FROM will not match the sender in the actual message.
Mail flow rule updates: When a message matches a mail flow rule, the rule ID is
stored in the message trace and real time reporting databases. If you trace one of
these messages, or drill down on rule details in a report, the message trace, and
real time reporting user interfaces dynamically pull the current rule information
from the hosted services network based on the rule ID in the reporting database. If
you have changed the attributes of that particular rule since the message was
processed (changed it from Reject to Allow, for example), the rule ID stays the
same in the message trace and real time reporting returned results, but the
Exchange admin center will show the new mail flow rule properties. You can use
the auditing reports feature in order to determine when the rule was changed and
the properties that were changed.
Message trace in the modern Exchange admin center (EAC) follows email messages as
they travel through your Exchange Online organization. You can determine if a message
was received, rejected, deferred, or delivered by the service. Message trace also shows
what actions were taken on the message before it reached its final status.
Message trace in the modern EAC improves upon the original message trace that was
available in the classic EAC. You can use the information from message trace to
efficiently answer user questions about what happened to messages, to troubleshoot
mail flow issues, and to validate policy changes.
For more information, see Manage role groups in Exchange Online and
Permissions in Exchange Online.
The maximum number of messages that are displayed in the results depends on
the report type you selected (For more information, see the Choose report type
section.). The Get-HistoricalSearch cmdlet in Exchange Online PowerShell or
standalone EOP PowerShell returns all messages in the results.
Autosaved queries: The last 10 most recently run queries. This list makes it simple
to pick up from where you left off.
Also on this page is a Downloadable reports section, for the requests you've submitted
and for the reports themselves when they're available for download.
Senders: Click in this box and start typing to enter or select one or more senders
from your organization.
Recipients: Click in this box and start typing to enter or select one or more
recipients in your organization.
7 Note
You can also type the email addresses of external senders and recipients.
Wildcards are supported (for example, *@contoso.com ), but you can't use
multiple wildcard entries in the same field at the same time.
Time range
The default value is 2 days, but you can specify date/time ranges of up to 90 days.
When you use date/time ranges, consider the following issues:
By default, you select the time range in Slider view using a timeline.
But, you can also switch to Custom time range view where you can specify the
Start date and End date values (including times), and you can also select the Time
zone for the date/time range. The Time zone setting applies both to your query
inputs and to your query results.
For 10 days or less, the results are available instantly as a Summary report. If you
specify a time range that's even slightly greater than 10 days, the results are
delayed as they're only available as a downloadable CSV file ( Enhanced summary
or Extended reports).
For more information about the different report types, see Choose report type.
7 Note
Delivery status
Message ID
Network Message ID
Direction
Original client IP address
Delivery status
You can leave the default value All selected, or you can select one of the following
values to filter the results:
Quarantined: The message was quarantined (as spam, bulk mail, or phishing). For
more information, see Quarantined email messages in EOP.
Filtered as spam: The message was identified as spam, and was rejected or
blocked (not quarantined).
Getting status: The message was recently received by Microsoft 365, but no other
status data is yet available. You can check again within a few minutes.
7 Note
The values Pending, Quarantined, and Filter as spam are only available for
searches less than 10 days. Also, there might be a 5-to-10-minute delay between
the actual and reported delivery status.
Message ID
Message ID is the internet message ID (also known as the Client ID) that's found in the
Message-ID header field in the message header. Users can give you this value to
investigate specific messages.
This value is constant for the lifetime of the message. For messages created in Microsoft
365 or Exchange, the Message ID value is in the format <GUID@ServerFQDN> , including
the angled brackets (< >), for example, <d9683b4c-127b-413a-ae2e-
fa7dfb32c69d@DM3NAM06BG401.Eop-nam06.prod.protection.outlook.com> . Other messaging
systems might use different syntaxes or values. This value is supposed to be unique, but
not all email systems strictly follow this requirement. If the Message-ID: header field
doesn't exist or is blank for incoming messages from external sources, an arbitrary value
is assigned.
When you use Message ID to filter the results, ensure that you include the full string,
including any angled brackets.
Network Message ID
Network Message ID is a unique message ID value that prevails across copies of the
message that may be created due to bifurcation, and across the message transport
process. It's dynamic wherein its value differs for even a copy of the message's specific
instance. Therefore, each copied version of the instance has a different Network
Message ID value.
The differences between Network Message ID and Message ID are described in the
following table:
Unique and persists across copies of the message that may be Constant for the lifetime of
created due to bifurcation the message
To trace the Network Message ID value and to use it to trace specific messages in
Exchange Online, use the following message headers:
X-MS-Exchange-Organization-Network-Message-Id , or
X-MS-Exchange-CrossTenant-Network-Message-Id
These message headers enable you to trace the Network Message ID value. You can use
this value to further retrieve specific messages, for example, messages - with the traced
Network Message ID value - sent by a specific sender, addressed to a specific recipient,
or sent during a specific time period.
You can also use the following command to trace the Network Message ID value:
7 Note
The Get-MessageTrace cmdlet then pipes the retrieved trace information to the Get-
MessageTraceDetail cmdlet.
Direction
You can leave the default value All selected, or you can select Inbound (messages sent
to recipients in your organization) or Outbound (messages sent from users in your
organization) to filter the results.
7 Note
The client IP address information is only available for 10 days and in the Enhanced
summary or Extended reports (downloadable CSV files).
Summary: Available if the time range is less than 10 days, and requires no other
filtering options. The results are available almost immediately after you click
Search. The report returns up to 20,000 results.
You can use wildcards for the senders or the recipients (for example,
*@contoso.com). The Enhanced summary report returns up to 100,000 results. The
Extended report returns up to 1,000 results.
7 Note
While you can select an Enhanced summary or Extended report for any
date/time range, commonly the last 24 hours of archived data will not yet be
available for these two types of reports.
The maximum size for a downloadable report is 800 MB. If a downloadable
report exceeds 800 MB, you can't open the report in Excel or Notepad.
When you click Next, you're presented with a summary page that lists the filtering
options that you selected, a unique (editable) title for the report, and the email address
that receives the notification when the message trace completes (also editable, and
must be in one of the accepted domains of your organization). Click Prepare report to
submit the message trace. On the main Message trace page, you can see the status of
the report in the Downloadable reports section.
For more information about the data that's returned in the different report types, see
Message trace results.
Date: The date and time at which the message was received by the service, using
the configured UTC time zone.
Recipient: The email address of the recipient(s). For a message sent to multiple
recipients, there's one line per recipient. If the recipient is a distribution group,
dynamic distribution group, or mail-enabled security group, the group is the first
recipient, and then each member of the group is on a separate line.
You can click on the column headers to sort the results by the values in that column in
ascending or descending order.
You can export the results after you've selected one or more rows by clicking Export
results.
After you select a row's check box, the Find related button appears. You can click this
button to find the related records for the message.
For more information about the Message ID, see Message ID.
In the summary report output, you can view details about a message by selecting the
row (click anywhere in the row but don't check the check box).
The message trace details contain the following additional information that's not
present in the summary report:
Message events: After you expand this section, you can see classifications that
help categorize the actions that the service takes on messages. Some of the more
interesting events that you might encounter are:
Receive: The message was received by the service.
Send: The message was sent by the service.
Fail: The message failed to be delivered.
Deliver: The message was delivered to a mailbox.
Expand: The message was sent to a distribution group that was expanded.
Transfer: Recipients were moved to a bifurcated message because of content
conversion, message recipient limits, or agents.
Defer: The message delivery was postponed and might be reattempted later.
Resolved: The message was redirected to a new recipient address based on an
Active Directory look up. When this event happens, the original recipient
address is listed in a separate row in the message trace along with the final
delivery status for the message.
DLP rule: The message had a DLP rule match.
Sensitivity label: A server-side labeling event occurred. For example, a label was
automatically added to a message that includes an action to encrypt or was
added via the web or mobile client. This action is completed by the Exchange
server and is logged. A label added via Outlook won't be included in the event
field.
Notes:
This list isn't meant to be exhaustive. For descriptions of more events, see Event
types in the message tracking log. This link is an Exchange Server (on-premises
Exchange) topic.
More information: After you expand this section, you can view the following
details:
To IP: The IP address(es) to which the service attempted to deliver the message.
If the message has multiple recipients, these addresses are displayed. For
inbound messages sent to Exchange Online, this value is blank.
7 Note
Under the Downloadable reports tab, you can also view details of Enhanced summary
reports which are yet to be generated. These reports are marked with Not started or In
progress status.
origin_timestamp*: The date and time when the message was initially received by
the service, using the configured UTC time zone.
Recipient_status: The status of the delivery of the message to the recipient. If the
message was sent to multiple recipients, it shows all the recipients and the
corresponding status for each, in the format: <email address>##<status>.
Examples of the recipient statuses are:
##Receive, Send means the message was received by the service and was sent
to the intended destination.
##Receive, Fail means the message was received by the service but delivery to
the intended destination failed.
##Receive, Deliver means the message was received by the service and was
delivered to the recipient's mailbox.
directionality: Indicates whether the message was sent inbound (to your
organization) or outbound (from your organization).
delivery_priority*: Whether the message was sent with High, Low, or Normal
priority.
*
These properties are only available in Enhanced summary reports.
Extended reports
A generated report of the type Extended is available in Downloadable reports at the
beginning of message trace.
7 Note
Under the Downloadable reports tab, you can also view details of Extended reports
which are yet to be generated. These reports are marked with Not started or In
progress status.
client_ip: The IP address of the email server or messaging client that submitted the
message.
client_hostname: The host name or FQDN of the email server or messaging client
that submitted the message.
source_context: Extra information associated with the source field. For example:
Protocol Filter Agent
3489061114359050000
source: The Exchange Online component that's responsible for the event. For
example:
AGENT
MAILBOXRULE
SMTP
event_id: This value corresponds to the Message event values that are explained in
Find related records for this message.
reference: This field contains additional information for specific types of events.
For example:
DSN: Contains the report link, which is the message_id value of the associated
delivery status notification (also known as a DSN, nondelivery report, NDR, or
bounce message) if a DSN is generated subsequent to this event. If this
message is a DSN message, this field contains the message_id value of the
original message that the DSN was generated for.
RECEIVE: Might contain the message_id value of the related message if the
message was generated by other processes (for example, Inbox rules).
SEND: Contains the internal_message_id value of any DSN message.
return_path: The return email address specified by the MAIL FROM command that
sent the message. Although this field is never empty, it can have the null sender
address value represented as <> .
The message origination date-time in UTC for DELIVER and SEND events. The
origination date-time is the time when the message first entered the Exchange
Online organization. The UTC date-time is represented in the ISO 8601 date-
time format: yyyy-mm-ddThh:mm:ss.fffZ , where yyyy = year, mm = month, dd =
day, T indicates the beginning of the time component, hh = hour, mm = minute,
ss = second, fff = fractions of a second, and Z signifies Zulu , which is
Authentication errors. For example, you might see the value 11a and the type of
authentication that was used when the authentication error occurred.
tenant_id: A GUID value that represents the Exchange Online organization (for
example, 39238e87-b5ab-4ef6-a559-af54c6b07b42 ).
custom_data: Contains data related to specific event types. For more information,
see the following sections:
custom_data values
Spam filter agent
Malware filter agent
Transport Rule agent
custom_data values
The custom_data field for an AGENTINFO event is used by various Exchange Online
agents to log message-processing details. Some of the more interesting agents are
described in the following sections.
Spam filter agent
Malware filter agent
Transport Rule agent
An example of a custom_data value for a message that's filtered for spam looks like this:
S:SFA=SUM|SFV=SPM|IPV=CAL|SRV=BULK|SFS=470454002|SFS=349001|SCL=9|SCORE=-1|LIST=0|D
I=SN|RD=ftmail.inc.com|H=ftmail.inc.com|CIP=98.129.140.74|SFP=1501|ASF=1|CTRY=US|CL
TCTRY=|LANG=en|LAT=287|LAT=260|LAT=18;
Value Description
AMA=SUM|v=1| The message was determined to contain malware. SUM indicates the malware
or could have been detected by any number of engines. EV indicates the malware
AMA=EV|v=1 was detected by a specific engine. When malware is detected by an engine, this
detection triggers the subsequent actions.
An example of a custom_data value for a message that contains malware looks like this:
S:AMA=SUM|v=1|action=b|error=|atch=1;S:AMA=EV|engine=M|v=1|sig=1.155.974.0|name=DOS
/Test_File|file=filename;S:AMA=EV|engine=A|v=1|sig=201707282038|name=Test_File|file
=filename
Value Description
St=<datetime> The date and time in UTC when the rule match occurred.
Action= The action that was applied. For a list of available actions, see Mail flow rule
<ActionDefinition> actions in Exchange Online.
An example of a custom_data value for a message that matches the conditions of a mail
flow rule looks like this:
S:TRA=ETR|ruleId=19a25eb2-3e43-4896-ad9e-47b6c359779d|st=7/17/2017 12:31:25
AM|action=ApplyHtmlDisclaimer|sev=1|mode=Enforce
Mail flow reports in the new Exchange
admin center in Exchange Online
Article • 04/04/2023
Administrators can use mail flow reports in the new Exchange admin center (new EAC)
to establish baselines and discover trends to fix issues related to mail flow in their
organization.
7 Note
Mail flow reports are currently not available in the GCC High or DoD environments.
Compliance Administrator
Exchange Administrator
Organization Management
Security Administrator<sup>*
Security Reader*
View-Only Recipients
For more information, see Permissions in Exchange Online and Manage role groups in
Exchange Online.
<sup>* You manage these role groups in the Azure Active Directory admin center
(https://aad.portal.azure.com ).
The Auto-forwarded messages report in the new Exchange admin center (new EAC)
displays information on messages that are automatically forwarded from your
organization to recipients in external domains. You can use this report to look for
potential data leaks.
7 Note
By default, the report shows data for the last 7 days. If the report is empty, try
changing the date range.
The summary page allows you to query up to the last 90 days of data. The new
activity page shows the activity of the last 7 days. The request report feature has a
limit of the last 30 days.
For permissions that are required to use this report, see Permissions required to
view mail flow reports.
If you hover over a specific color in the chart, you'll see the associated numbers for that
specific forwarding type, recipient domain, or forwarding user.
The Auto forwarded message details section shows the following information about
each-specific forwarder (the user account that's doing the forwarding):
Forwarders
Forwarding type
Recipient name
Recipient domain
Details: If the message was auto-forwarded by a Transport rule, the ID of the rule is
shown. Otherwise, this value is blank. In Exchange Online PowerShell, you can use
the Get-TransportRule cmdlet to identify the rule by running the following
command: Get-TransportRule -Identity <RuleIDParameter> . For example, Get-
TransportRule -Identity 8754395095991580000 .
Forward count
First forward date
Insights
Two insights are generated based on the report data: New domains being forwarded
email and New users forwarding email. Each insight provides a summary of the number
of new forwarders or domains with a link back to this report.
See also
For more information about other mail flow reports, see Mail flow reports in the modern
EAC.
Email issues for priority accounts report
in the new EAC in Exchange Online
Article • 01/27/2023
7 Note
The priority accounts report that's described in this topic is available only to
organizations that meet both of the following requirements:
At least 5,000 licenses for one or more of the following products: Office 365
E3, Microsoft 365 E3, Office 365 E5, or Microsoft 365 E5. For example, 3,000
Office 365 E3 licenses and 2,500 Microsoft 365 E5 licenses.
Your organization needs to have at least 50 monthly active users for one or
more core workloads – Teams, One Drive for Business, SharePoint Online,
Exchange Online and Office apps
For permissions that are required to use this report, see Permissions required to
view mail flow reports.
The Email issues for priority accounts report in the new Exchange admin center (new
EAC) allows Exchange Admins and Global admins to view failed events from the last 15
minutes and delayed email messages from last 6 hours that were sent to or sent from
priority accounts. If no issues are found, the report will be empty. Users can configure to
receive email notifications for failed and delayed messages which will provide
information at the time alert is fired.
Priority users are people in your Microsoft 365 organization who have a high business
impact, like your CEO, executives, or other users who have access to sensitive or high
priority information. For more information about priority accounts, see Manage and
monitor priority account. For more reporting for priority accounts, see Exchange Online
monitoring for Microsoft 365.
The Unhealthy email status section shows the following information about messages
where a priority user is a sender or a recipient:
Date
Sender
Recipient
Subject
Status: The value is Failed or Delayed.
To quickly filter the results by recipient, click Search and start typing the recipient's
email address.
For more advanced filters that you can also save and use later, click Filter and select
New filter. In the Custom filter flyout that appears, enter the following information:
Click Add new clause. A clause contains the following elements that you need to
enter:
Field: Select Date, Sender, Recipient, Subject or Status.
Operator: Select starts with or is.
Value: Enter the value you want to search for.
You can click Add new clause as many times as you need. Multiple clauses use
AND logic (<Clause1> AND <Clause2>...).
When you're finished, click Save. The new filter is automatically loaded, and the
results are changed based on the filter. This is the same result as clicking Filter and
selecting the customer filter from the list.
To unload a existing filter (return to the default list), click Filter and select Clear
all filters.
Select an entry in the list to be taken to the message trace search results for the
message. Select the message trace entry to view details about the message and what
happened to it.
7 Note
For the following procedures, you need to be a Security Reader to see the alerts,
and a Security Administrator to edit the policy.
Click Manage priority accounts to add or remove users from the priority accounts list.
You can see alerts for delayed and failed messages under View Alerts. Selecting the alert
will provide details about the messages that were delayed or failed at the time alert is
fired.
The Exchange transport rule report in the new Exchange admin center (new EAC)
displays information on messages that were affected by mail flow rules (also known as
transport rules).
7 Note
By default, the report shows data for the last 7 days. If the report is empty, try
changing the date range. It could take up to 24 hours to reflect the Transport Rule
data in the Transport Rule report. For permissions that are required to use this
report, see Permissions required to view mail flow reports.
By default, Chart breakdown by Severity is selected, and the follow charts are shown:
A line graph that shows the number of inbound and outbound messages per day
that were affected by mail flow rules.*
Message volume by direction: A doughnut graph that shows the total number of
messages and portion of Outbound and Inbound messages that were affected by
mail flow rules.***
Message volume by severity A doughnut graph that shows the total number of
messages and portion of messages that were affected by High severity, Medium
severity, and Low severity mail flow rules.**
*
If you hover over the line on the chart for a specific day, you'll see the number of
messages for that day.
** If you hover over a specific color in the chart, you'll see the total number of messages
in the category for the entire time period.
If you change the chart view to Chart breakdown by severity, the line graph changes to
show the number of messages that were affected by High severity, Medium severity,
and Low severity mail flow rules.
By default, Show data for all transport rules is selected, but if you click on that value,
you can select a specific mail flow rule to show data for.
The following information is shown in the details table below the graph:
Date
Transport rule
Subject
Sender address
Recipient address
Severity
Direction
You can sort the information in the details table by clicking on a column header.
To quickly filter the results by Transport rule or Subject, click Search and start typing
a value.
To filter the results, use the boxes. The following filters are available:
Date: 7 days is selected by default, but you can select 30 days, 90 days or a
Custom start date that's less than 90 days.
Direction: Outbound, Inbound is selected by default, but you can select either
value by itself.
Severity: High severity, Medium severity, Low severity are selected by default, but
you can select one or more severity values.
See also
For more information about other mail flow reports, see Mail flow reports in the new
EAC.
Inbound messages and Outbound
messages reports in the new EAC in
Exchange Online
Article • 01/27/2023
The Inbound messages report and the Outbound messages report in the new
Exchange admin center (new EAC) display information about email entering and leaving
your organization. Specifically, the Inbound messages report shows information about
email coming into your organization from the internet and over connectors. The
Outbound messages report displays information about email leaving your organization
to the internet and over connectors. Both reports also show the TLS encryption level
that's being used.
7 Note
By default, the report shows data for the last 7 days. If the report is empty, try
changing the date range.
For permissions that are required to use this report, see Permissions required to
view mail flow reports.
Messages by TLS used: Shows the TLS encryption level. If you hover over a specific
color in the chart, you'll see the number of messages for that specific version of
TLS.
The Connector report details section shows the following information about each
specific connector or email from the internet:
Date
Connector direction and name
Connector type
Forced TLS?
No TLS
TLS 1.0
TLS 1.1
TLS 1.2
Volume
To quickly filter the results, click Search and start typing a value.
To filter the results by date range or connector name, use the boxes. You can specify a
date range up to 90 days.
For more advanced filters that you can also save and use later, click Filter and select
New filter. In the Custom filter flyout that appears, enter the following information:
Click Add new clause. A clause contains the following elements that you need to
enter:
Field: Select Date, Connector direction, Connector type, Forced TLS, No TLS,
TLS 1.0, TLS 1.1, TLS 1.2, or Volume.
You can click Add new clause as many times as you need. Multiple clauses use
AND logic (<Clause1> AND <Clause2>...).
When you're finished, click Save. The new filter is automatically loaded, and the
results are changed based on the filter. This is the same result as clicking Filter and
selecting the customer filter from the list.
To unload an existing filter (return to the default list), click Filter and select
Clear all filters.
See also
For more information about other mail flow reports, see Mail flow reports in the new
EAC.
Non-accepted domain report in the new
Exchange admin center in Exchange
Online
Article • 07/31/2023
The Non-accepted domain report in the new Exchange admin center (new EAC) displays
information about messages from your on-premises email organization where the
sender's domain isn't configured as an accepted domain in your Microsoft 365
organization.
Microsoft 365 might throttle these messages if we have data to prove that the intent of
these messages is malicious. Therefore, it's important for you to understand what's
happening and to fix the issue.
7 Note
By default, the report shows data for the last 7 days. If the report is empty, try
changing the date range.
For permissions that are required to use this report, see Permissions required to
view mail flow reports.
On Non-accepted domain report page, the overview section contains a chart that
shows the number of messages sent per connector:
Date
Inbound connector name
Sender domain
Count
Sample messages: This field contains the internet message IDs (also known as the
Client IDs) of a sample of the original messages. This value is stored in the
Message-ID header field in the message header and is constant for the lifetime of
the message.
To change the list from normal to compact spacing, select Change view , and then
select Compact list .
Use the 7 days box to filter the results by date. The following values are available in the
dropdown list:
7 days
30 days
90 days
Custom start date. You can specify a start date up to 90 days old.
For more advanced filters that you can also save and use later, select Filter , and then
select New filter . In the Custom filter flyout that opens, enter the following
information:
You can select Add new clause and repeat the previous step as many times as
needed. Multiple clauses use AND logic (<Clause1> AND <Clause2>...).
To unload an existing filter and return to the default information that's shown on
the Non-accepted domain report page, select Filter > Clear all filters .
See also
For more information about other mail flow reports, see Mail flow reports in the new
EAC.
Non-delivery details report in the new
Exchange admin center in Exchange
Online
Article • 01/27/2023
The Non-delivery details report in the new Exchange admin center (new EAC) shows
the most-encountered error codes in non-delivery reports (also known as NDRs or
bounce messages) for users in your organization. This report shows the details of NDRs
so you can troubleshoot email delivery problems.
7 Note
By default, the report shows data for the last 7 days. If the report is empty, try
changing the date range.
For permissions that are required to use this report, see Permissions required to
view mail flow reports.
The chart in the overview section contains the most-encountered NDR error codes for a
given day. If you hover over a specific color in the chart, you'll see the number of
messages for that specific error code.
The Non-delivery details section shows the following information for each date-error
code combination:
Date
Count
Error code
Sample messages: This field contains the internet message IDs (also known as the
Client IDs) of a sample of the original messages. This value is stored in the
Message-ID header field in the message header and is constant for the lifetime of
the message.
To quickly filter the results, click Search and start typing a value.
To filter the results by date range or error code, use the boxes. You can specify a date
range up to 90 days.
For more advanced filters that you can also save and use later, click Filter and select
New filter. In the Custom filter flyout that appears, enter the following information:
Click Add new clause. A clause contains the following elements that you need to
enter:
You can click Add new clause as many times as you need. Multiple clauses use
AND logic (<Clause1> AND <Clause2>...).
When you're finished, click Save. The new filter is automatically loaded, and the
results are changed based on the filter. This is the same result as clicking Filter and
selecting the customer filter from the list.
To unload a existing filter (return to the default list), click Filter and select Clear
all filters.
See also
For more information about other mail flow reports, see Mail flow reports in the new
EAC.
Inbound messages and Outbound
messages reports in the new EAC in
Exchange Online
Article • 01/27/2023
The Inbound messages report and the Outbound messages report in the new
Exchange admin center (new EAC) display information about email entering and leaving
your organization. Specifically, the Inbound messages report shows information about
email coming into your organization from the internet and over connectors. The
Outbound messages report displays information about email leaving your organization
to the internet and over connectors. Both reports also show the TLS encryption level
that's being used.
7 Note
By default, the report shows data for the last 7 days. If the report is empty, try
changing the date range.
For permissions that are required to use this report, see Permissions required to
view mail flow reports.
Messages by TLS used: Shows the TLS encryption level. If you hover over a specific
color in the chart, you'll see the number of messages for that specific version of
TLS.
The Connector report details section shows the following information about each
specific connector or email from the internet:
Date
Connector direction and name
Connector type
Forced TLS?
No TLS
TLS 1.0
TLS 1.1
TLS 1.2
Volume
To quickly filter the results, click Search and start typing a value.
To filter the results by date range or connector name, use the boxes. You can specify a
date range up to 90 days.
For more advanced filters that you can also save and use later, click Filter and select
New filter. In the Custom filter flyout that appears, enter the following information:
Click Add new clause. A clause contains the following elements that you need to
enter:
Field: Select Date, Connector direction, Connector type, Forced TLS, No TLS,
TLS 1.0, TLS 1.1, TLS 1.2, or Volume.
You can click Add new clause as many times as you need. Multiple clauses use
AND logic (<Clause1> AND <Clause2>...).
When you're finished, click Save. The new filter is automatically loaded, and the
results are changed based on the filter. This is the same result as clicking Filter and
selecting the customer filter from the list.
To unload an existing filter (return to the default list), click Filter and select
Clear all filters.
See also
For more information about other mail flow reports, see Mail flow reports in the new
EAC.
Outbound messages in Transit Security
report in the Exchange Admin Center
for Exchange Online
Article • 03/21/2023
The Outbound messages in Transit Security report in the Exchange Admin Center (EAC)
displays information about outbound SMTP DNS-based Authentication of Named
Entities (DANE), MTA-Strict Transport Security (STS), and Opportunistic TLS usage data
when sending from Exchange Online.
7 Note
SMTP DANE with DNSSEC and MTA-STS are both turned on by default on the
outbound path when sending from Exchange Online.
Messages Blocked
The Messages Blocked section will be displayed by default and shows a table with the
following four columns of information:
The table aggregation works over a configurable time-period. Filters can be created
using Starts With or Is operators on the columns:
Recipient Domain
Security Type
Distinct Error Generated for Domain
To search for a specific piece of information, click Search and start typing a value.
To export the report data to a .csv file, you'll have the following three options to choose
from:
Export all results: Exports all messages that were affected by all SMTP DANE with
DNSSEC or MTA-STS errors over the selected time period.
Export loaded results: Exports the rows of aggregated data that are currently
loaded into view.
Export selected: Exports all messages of the selected rows that were affected by all
SMTP DANE with DNSSEC or MTA-STS errors over the selected time period.
To drill into the non-aggregated data live, without having to wait on exporting the data,
click on the domain, such as contoso.com from the row in the Messages Blocked table.
A pop up will immediately appear with a new table consisting a row for each message
that was affected by the selected rows' error. The new pop-up table will include the
following columns:
You can use the Request report to receive the data and can filter based on Security Type
and Error. The Request report will generate a .csv file including the same fields.
Messages Secured
The Messages Secured section can be accessed by clicking Messages Secured. It will
show time series data for messages successfully sent using four methods, such as SMTP
DANE with DNSSEC, MTA-STS, both SMTP DANE with DNSSEC and MTA-STS, or
Opportunistic TLS.
The data will be automatically visualized through a time series chart showing volume of
emails secured by each of the four methods over a configurable time-period. '7 days' is
selected by default, but you can select 14 days, 31 days, 6 months, or custom time spans
with options to filter by security type. The bar chart from the report will show the
summary of the volume of emails secured over the selected time period for an
aggregated view.
Requesting a report will generate a .csv file containing a table with the following fields:
There are options to filter on the security type before exporting the rows or to
customize the date.
Queued messages report in the new
Exchange admin center in Exchange
Online
Article • 01/27/2023
When messages can't be sent from your organization to your on-premises or partner
email servers using connectors, the messages are queued in Microsoft 365. Common
examples that cause this condition are:
Microsoft 365 will continue to retry to delivery for 24 hours. After 24 hours, the
messages will expire and will be returned to the senders in non-delivery reports (also
known as a NDRs or bounce messages).
If the queued email volume exceeds the pre-defined threshold (the default value is 200
messages), the information is available in the following locations:
The Queued messages report report in the new Exchange admin center (new EAC).
For more information, see the Queues section in this topic.
For permissions that are required to use this report, see Permissions required to
view mail flow reports.
An alert is displayed on the Alerts page in the Microsoft 365 Defender portal
(https://security.microsoft.com > Incidents & alerts > Alerts or
https://security.microsoft.com/alerts ).
Admins will receive an email notification based on the configuration of the default
alert policy named Messages have been delayed. To configure the notification
settings for this alert, see the next section.
For more information about alert policies, see Alert policies in the Microsoft
Purview compliance portal.
3. In the Message have been delayed flyout that appears, you can turn the alert on
or off and configure the notification settings.
Queues
Even if the queued message volume hasn't exceeded the threshold and generated an
alert, you can still use the Queued messages report in the new EAC to see messages
that have been queued for more than one hour, and take action before the number of
queued messages becomes too large.
The same information and fix option is displayed after you click View queue in the
details of a Messages have been delayed alert.
See also
For more information about other mail flow reports, see Mail flow reports in the new
EAC.
SMTP AUTH Clients report in the new
Exchange admin center in Exchange
Online
Article • 01/27/2023
The SMTP AUTH Clients report in the new Exchange admin center (new EAC) highlights
the use of the SMTP AUTH client submission protocol by users or system accounts in
your organization. By default, this legacy protocol (which uses the endpoint
smtp.office365.com) supports Basic authentication, and is susceptible to being used to
send email from compromised accounts. This report allows you to check for unusual
activity. It also shows the TLS usage data for clients or devices using SMTP AUTH.
7 Note
By default, the report shows data for the last 7 days. If the report is empty, try
changing the date range.
For permissions that are required to use this report, see Permissions required to
view mail flow reports.
* If you hover over a specific color in the chart, you'll see the number of messages.
The Messages sent using SMTP Auth section shows the following information:
Sender address
Domain
TLS 1.0 (percentage)
TLS 1.1 (percentage)
TLS 1.2 (percentage)
Messages sent
To quickly filter the results, click Search and start typing a value.
To filter the results by a date range, use the box. You can specify a date range up to 90
days.
For more advanced filters that you can also save and use later, click Filter and select
New filter. In the Custom filter flyout that appears, enter the following information:
Click Add new clause. A clause contains the following elements that you need to
enter:
Field: Select Sender address, Domain, TLS 1.0, TLS 1.1, TLS 1.2, or Messages
sent.
Operator: Select starts with or is.
Value: Enter the value you want to search for.
You can click Add new clause as many times as you need. Multiple clauses use
AND logic (<Clause1> AND <Clause2>...).
To unload an existing filter (return to the default list), click Filter and select
Clear all filters.
If you select a row, a details pane for the sender appears that contains the same
information from the main report.
Top domain mailflow status report in
the new Exchange admin center in
Exchange Online
Article • 03/01/2023
The Top domain mailflow status report in the new Exchange Admin Center (EAC)
contains two tabs providing insight into your inbound and outbound mail flow status for
your organization. You can find this report at Reports > Mail Flow in the new EAC.
On the Inbound page, you can find information on whether your email domains
are receiving external messages or not. Typically, these types of issues are related
to MX record problems or an expired domain.
On the Outbound page, the report gives you insights into your outbound mail
flow, for example, which outbound pools are used to send mail out of your
organization.
7 Note
7 Note
For permissions that are required to use this report, see Permissions required to
view mail flow reports.
Inbound page
7 Note
Domain
Domain status: The value is Healthy or Error
Previous MX record
Current MX record
Email received (past 6 hours)
To quickly filter the results, click Search and start typing a value.
For more advanced filters that you can also save and use later, click Filter and select
New filter. In the Custom filter flyout that appears, enter the following information:
Click Add new clause. A clause contains the following elements that you need to
enter information for:
Field: Select Domain, Domain status, Previous MX record, Current MX record,
or Email received (past 6 hours).
Operator: Select starts with or is.
Value: Enter the value you want to search for.
You can click Add new clause as many times as you need. Multiple clauses use
AND logic (<Clause1> AND <Clause2>...).
When you've finished, select Save. The new filter is automatically loaded, and the
results have changed based on the filter. The "filter loading" and "change in
results" are the same result as clicking Filter and selecting the customer filter from
the list.
To clear an existing filter (to return to the default list), click Filter and select
Clear all filters.
If you select a row, a details pane for the domain appears based on the value of Domain
status:
Healthy: An explanation about MX records and the same information from the
main report is displayed.
Error: Additional information about the cause of the error and how to fix it is
available in the Reason and How to fix sections.
Outbound page
The report on the Outbound page shows details of only domains that have sent any
messages using high risk or relay pools or have sent over 20 messages.
7 Note
Domains that either don't use the high risk or relay pools or have sent under 20
messages will be summarized together under "All other domains". For more
information on the summarized domains, use the request report feature.
7 Note
To quickly filter the results, click Search and start typing a value.
Domain
Pie charts:
Total outbound messages sent per domain
Total outbound messages by outbound pool
For more information on the outbound pools, see Outbound delivery pools.
Mailboxes exceeding receiving limits
report in the new EAC in Exchange
Online
Article • 01/27/2023
In the new Exchange Center (EAC), the Mailboxes exceeding receiving limits report
displays information on mailboxes that are receiving large volumes of messages in a
short amount of time.
This report shows details on three categories of the Exchange Online receiving limit (see
Exchange Online limits):
1. Hot limit: The general receiving limit. When a mailbox exceeds the overall
receiving limit, they won't receive any mail from the Internet or on-premises
senders until the limit resets.
2. Sender-recipient pair limit: The receiving limit per sender-recipient pair. When a
mailbox exceeds the SRP limit, they won't receive any mail from that sender, if the
sender is from the Internet or on-premises.
3. Warm limit: The logging-only limit that indicates when messages are 'At risk' of
being blocked, set to 1000 messages per rolling hour. When a mailbox exceeds the
warm limit, they aren't yet impacted but will be displayed in reporting for admin
awareness.
7 Note
For permissions that are required to use this report, see Permissions required to
view mail flow reports.
a. When a mailbox exceeded their receiving limit and can no longer receive mail
until the limit is reset, which occurs 1 hour after the threshold is exceeded.
Hot limit: Mailboxes won't receive any mail from the Internet or on-
premises senders if the overall receiving limit is exceeded.
b. When a mailbox is at risk, which means they've exceeded one or both of the
below limits. This mailbox hasn't exceeded the receiving (Hot) limit yet but is
receiving large volumes of messages regularly.
Sender-recipient pair (SRP) limit: Mailboxes won't receive any mail from a
specific sender if the mailbox has received too many messages from the
sender. High volumes from specific senders should be paid attention to, as
they can put the mailbox at risk of exceeding the receiving (Hot) limit.
Warm limit: When a mailbox hasn't exceeded their limit yet but is
receiving large volumes of messages regularly.
The date
The limit type (Hot, SRP, or Warm) based on the user's filter selection
The report includes a filter on Limit type, allowing the user to display mailboxes that hit
the Hot, SRP, or Warm limit separately.
7 Note
The default view is for the last 24 hours for all types. If no data is showing, that
means you had no mailboxes exceeding the limit (or at risk) in the last 24 hours.
The chart is limited to showing the top 10 mailboxes. If you'd like to see more
mailboxes, you'll have to filter/search differently.
1. Use the Limit type filter to display mailboxes affected by the Hot, SRP, or Warm
limit.
3. Select a mailbox address to view in detail the mailbox owner's contact information.
Contact the mailbox owner to understand why they're receiving so much email, so
they can reduce their mail volume and have a better experience.
Reply-all storm protection report in the
new Exchange admin center in Exchange
Online
Article • 01/27/2023
The Reply-all storm protection report in the new Exchange admin center (new EAC),
Reports > Mail flow section displays information about detected reply-all storms in
your organization and the reply-all messages that were blocked.
7 Note
For more information on permissions that are required to use this report, see
Permissions required to view mail flow reports.
The top of the report shows the current settings used by Reply-all Storm Protection for
detecting and blocking reply-all messages during a reply-all storm.
Status
Minimum recipients
Minimum reply-alls
Block duration hours
To view the current feature settings here on the report, you must have read access to
Transport configuration information (Get-TransportConfig) via the View-Only
Configuration or Organization Transport Settings roles. Both the Organization
Management and View-Only Organization Management role groups include both of
these roles. For more information, see View-only Organization Management.
Note that the current settings shown might not be the same as the settings that were
used for past reply-all storms if they were previously changed. Changing the settings
while a storm is happening might not apply those settings in time to affect the current
storm, but it will apply to future storms.
Beneath the current settings is the time/date range drop-down from which you can
select to view from 3 hours to 30 days of data (with the last 3 hours as the default). All
times shown are based on your local time.
The Detected reply-all storm messages chart shows the number of reply-all messages
that were sent during the preceding time-interval for detected reply-all storms. For
example, in the chart above the five reply-all messages for the "Happy Thanksgiving"
storm shown at 3pm were detected between 2:45 and 3pm. While reply-all messages
sent before a reply-all storm is detected won't get blocked, they're included in the
Detected reply-all storm messages chart values, as are the messages that were blocked.
7 Note
This chart displays data only for declared reply-all storms where at least one reply-
all message has been blocked. It can't be used to track potential storms before
they're declared a reply-all storm.
The Messages blocked chart includes a subset of the messages shown in the Detected
reply-all storm messages chart. It shows the number of reply-all messages blocked
during the Blocked duration hours time frame.
Selecting any one of the reply-all storm names in either chart will pop up a side panel
showing specific details about the selected reply-all storm, as shown below.
The reply-all storm details panel includes the following information about the storm:
Item Description
Total The total number of messages in the conversation thread (includes the first
Messages message).
Blocked The total number of reply-all storm messages blocked by the feature. This is always
Messages lower than the total number of messages in the thread. In some cases it might be
lower than you'd expect based on the feature's Minimum reply-alls setting. It can
take up to a few minutes to synchronize the block enforcement notification to all
relevant servers in the service. During that time, a few reply-alls could still get
through before blocking kicks-in.
Message ID The Message ID of the first message in the conversation thread. Clicking on this
link will open Message Trace in a new tab and run a query for this message.
Reply-all Users who sent (or tried to send) a reply-all to the thread. Includes whether or not
senders the message they sent was allowed through or blocked.
The final section of the main report page, Reply-all storm details, shows a table of all
the reply-all storms shown in the charts for the selected time range. It also includes the
key details about each of the following:
Start Date/Time
End Date/Time
Subject
Original Sender
Total Messages
Blocked Messages
Message ID
See also
For more information about other mail flow reports, see Mail flow reports in the modern
EAC.
Dynamic Distribution Groups report in
the new Exchange admin center in
Exchange Online
Article • 03/13/2023
The Dynamic Distribution Groups report in the new Exchange admin center provides
insight into the usage of dynamic distribution groups for your organization. You can find
this report at Reports > Mail Flow in the new EAC.
7 Note
By default, the report shows data for the last 30 days. If the report is empty, try
changing the date range.
For permissions that are required to use this report, see Permissions required to
view mail flow reports.
By default, the report shows data for "Used" Dynamic Distribution Groups. If the
report is empty, try changing the filter to show "All" or "Unused" Dynamic
Distribution Groups.
The table lists the dynamic distribution groups and the number of times it was used
based on the date filter and the filter that allows you to select All, Used, or Unused. If
you select All, it lists all dynamic distribution groups whether it was used or unused
based on the date filter. If you select Used, it lists only the dynamic distribution groups
that were used based on the date filter. If you select Unused, it lists only the dynamic
distribution groups that were unused based on the date filter.
The dynamic distribution group report details section shows the following information
about each dynamic distribution group:
Group Name
Group Email
Last used on (date)
Number of times used
To quickly filter the results, click Search and start typing a value.
To filter the results by date range, use the date filter. You can specify a date range up to
90 days.
For more advanced filters that you can save and use later, click Filter and select New
filter. In the Custom filter flyout that appears, enter the following information:
You can click Add new clause as many times as you need. Multiple clauses use AND
logic (<Clause1> AND <Clause2>...).
To unload an existing filter (return to the default list), click Filter and select Clear all
filters.
Admins can use the insights dashboard in the new Exchange admin center (new EAC) to
discover issues with mail flow and take corrective action. If an item appears in the mail
flow insights dashboard, you need to investigate and likely fix the issue.
Organization Management
Security Administrator<sup>*
For read only access to the mail flow insights, you need to be a member of one of the
following role groups:
Security Reader*
View-only Organization Management
View-Only Recipients
For more information, see Permissions in Exchange Online and Manage role groups in
Exchange Online.
<sup>* You manage these role groups in the Azure Active Directory admin center .
Alert policies in the new Exchange admin center (EAC) allow you to track events related
to mail flow. They can be created when your organization has fulfilled the Licensing
requirements.
Additionally, certain permissions are required for creating, viewing and managing alert
policies. For more information, see:
Licensing requirements
The alert policies in the new EAC support aggregated alert configurations only. To
configure aggregate alert policies based on a threshold, you must have one of the
following license configurations:
E5/G5 subscription
System policy
System policy is created by the system, by default, hence, it is also referred to as "default
alert policy".
Marked in bold
Labeled as System under Policy type
Available for viewing by an admin
Custom policy
Custom policy is the policy that can be created by the admin.
The following management role groups are associated with alert policies:
Security administrator: This management role group allows admins to create and
manage alert policies.
7 Note
Managing alert policies involve a list of tasks. For more information, see User tasks
on alert policies.
Security reader: This management role group allows admins to only read/view an
alert policy.
Creation: A user with security administrator privileges can create an alert policy,
which is a custom alert policy. For information on how to create an alert policy, see
Create custom policy.
Disable: A user can disable both the system and custom policies. For more
information, see Disable alert policy.
Disable email notifications of alert policies: A user can disable the email
notifications pertaining to both system and custom policies. For more information,
see Disable email notifications.
View: A user can view alert policies (system or custom) on the Alerts screen. For
more information, see View/read alert policy.
2. In the left pane, select Mail flow > Alert policies, and click New alert policy.
3. Provide a name for your policy in the Name box and click Next.
7 Note
7 Note
The Category drop-down list is disabled because Mail flow is the only
category supported in the new EAC.
5. From the Trigger an alert when the following insight is generated drop-down list,
select one from the following types of insights:
Mail loop
Slow transport rule
New users forwarding
New domains being forwarded
Cert expiry
6. Click Next.
7. Provide the name or email address of the alert notification recipients in the Email
recipients box.
8. From the Daily notification limit drop-down list, select daily notification count.
7 Note
9. Click Next.
10. Review the alert-policy settings and click Create. The alert policy is created.
1. In the left navigation pane of the new EAC, select Mail flow > Alert policies. The
Alert policies screen appears.
2. Select the alert policy you want to disable and click on it.
To disable the email notifications of an alert policy, perform the following steps:
1. In the left navigation pane of the new EAC, select Mail flow > Alert policies. The
Alert policies screen appears.
2. Select the alert policy for which you to disable email notifications.
The email notifications for the alert policy are disabled, and the user will no longer
receive email notifications pertaining to the alert policy.
A mail loop is bad because it wastes system resources, consumes your organization's
mail volume quota, and sends confusing non-delivery reports (also known as NDRs or
bounce messages) to the original senders.
The Fix possible mail loop insight in the Insights dashboard in the new Exchange admin
center (new EAC) reports when a mail loop is detected in your organization, the email
domains that are involved in the loop, and the number of messages from the previous
day that were in the loop.
You can click View details to see the details in a flyout where we identify the most
common mail loop scenarios and provide the recommended actions (if available) to fix
the loop.
Related topics
For more information about other mail flow insights in the mail flow dashboard, see
Mail flow insights in the new Exchange admin center.
Fix slow mail flow rules insight in the
new EAC in Exchange Online
Article • 01/27/2023
Inefficient mail flow rules (also known as transport rules) can lead to mail flow delays for
your organization. This insight reports mail flow rules that have an impact on your
organization's mail flow. Examples of these types of rules are:
The Fix slow mail flow rules insight in the Insights dashboard in the new Exchange
admin center (new EAC) will notify you when a mail flow rule is taking too long to
complete. You can use this notification to help you to identify and fine-tune mail flow
rules to help reduce mail flow delays.
When you click View details, a flyout appears where you can review the rule by clicking
View rules. You can also click View sample messages to see what kind of messages are
impacted by the rule.
For more information about conditions and exceptions in mail flow rules in Exchange
Online, see Mail flow rule conditions and exceptions (predicates) in Exchange Online.
Related topics
For more information about other mail flow insights in the mail flow dashboard, see
Mail flow insights in the new Exchange admin center.
New domains being forwarded email
insight in the new EAC in Exchange
Online
Article • 01/27/2023
Although you might have valid business reasons to forward email messages to external
recipients in specific domains, it's suspicious when users in your organization suddenly
start forwarding messages to external domains, and no one in the organization has ever
forwarded messages to those domains (new domains).
The New domains being forwarded email insight in the Insights dashboard in the new
Exchange admin center (new EAC) notifies you when users in your organization are
forwarding messages to new domains.
When you click View details, a flyout appears where you can find more details about the
forwarded messages, including a link to the Auto forwarded messages report for more
information.
To prevent automatic message forwarding to external domains, configure a remote
domain for some or all external domains. For more information, see Manage remote
domains in Exchange Online.
If you suspect the accounts have been compromised, see Responding to a compromised
email account.
Related topics
For more information about other mail flow insights in the mail flow dashboard, see
Mail flow insights in the new Exchange admin center.
New users forwarding email insight in
the new EAC in Exchange Online
Article • 01/27/2023
It's suspicious when new user accounts in your organization suddenly start forwarding
email messages to external domains.
The New users fowarding email insight in the Insights dashboard in the new Exchange
admin center (new EAC) notifies you when new users accounts in your organization are
forwarding messages to external domains.
When you click View details, a flyout appears where you can find more details about the
forwarded messages, including a link to the Auto forwarded messages report for more
information.
If you suspect the accounts have been compromised, see Responding to a compromised
email account.
Related topics
For more information about other mail flow insights in the mail flow dashboard, see
Mail flow insights in the new Exchange admin center.
Domain expiring soon insight in the
new Exchange admin center in Exchange
Online
Article • 01/27/2023
When you add your domain to Microsoft 365 or Office 365, it's called an accepted
domain. Users in this accepted domain can send and receive mails. To keep a healthy
mail flow, domains owned by customers must be active. Once domains expire, users
configured under that domain will no longer receive emails.
The Domain expiring soon insight in the Insights dashboard in the new Exchange
admin center (new EAC) reports the domains that are about to expire and need
necessary action to be taken.
Click View details to see the identified domains that are about to expire.
If a domain is expiring within 90 days, 60 days, or 30 days and less, it triggers an alert. A
single alert could have multiple domains, for example, it may have one domain that is
expiring in 90 days and another one that is expiring in 60, and so forth. These alerts are
sent as email notifications to your registered email IDs.
These notifications list the domains that are expiring and require necessary action to be
taken to avoid disruption in your mail flow. You can ignore the notifications if you've
renewed/deleted the domain.
You can also view these alerts in new EAC , navigate to Mail flow > View alerts.
Related article
Mail flow insights in the modern Exchange admin center
Mailboxes exceeding receiving limits
insight in the new EAC in Exchange
Online
Article • 01/27/2023
Mailboxes that receive large volumes of messages in a short amount of time can lead to
mail flow delays for those mailboxes, and other mailboxes in your organization. The
mailboxes exceeding receiving limits insight in the Insights dashboard in the new
Exchange admin center (new EAC) highlights:
1. Mailboxes that have exceeded their receiving limit (For more information, see
Exchange Online limits), which means they can no longer receive mail until the
limit is reset (which is 1 hour after the threshold is exceeded).
Mailboxes won't receive any mail at all if the overall receiving limit is
exceeded.
Mailboxes won't receive any mail from a specific sender, if the mailbox has
received too many messages from the sender.
2. Mailboxes that are at risk. They haven't exceeded their limit but are receiving large
volumes of messages regularly.
When you click on View details, the following flyout will appear:
1. Select Learn more about receiving limits to view documentation about Exchange's
limits.
2. Select receiving limits report to view a detailed report that shows up to seven
days of data. Each section shows at least 20 mailboxes – if there are more, you may
view them in the report.
3. Mailboxes that appear in the Mailboxes exceeded the receiving limit section are
mailboxes that have exceeded their receiving limit in the past 24 hours (includes
overall receiving limit, and single sender sending too much email).
4. Mailboxes that appear in the Mailboxes at risk now section are mailboxes that
have newly started receiving large volumes of mail.
5. Mailboxes that appear in the Mailboxes repeatedly at risk section are mailboxes
that have received large volumes of mail for > 12 hours of the past 24 hours.
6. Select the email address of the mailbox to view the contact information of the
owner of the mailbox. Contact the mailbox owner to understand why their
receiving so much email, so they can reduce their mail volume and have a better
experience.
Address books in Exchange Online
Article • 02/22/2023
Exchange Online uses address books to organize and store email address information
for recipients in the organization. The topics that will help you learn about and configure
email addresses and address books in Exchange Online are described in the following
table.
Address The global address list (GAL) is the master list of all recipients in Address
book your Exchange Online organization. Address book policies (ABPs) book
policies provide a simpler mechanism for GAL segmentation in policies in
organizations that require multiple GALs. An ABP defines a GAL, an Exchange
offline address book (OAB), a room list, and one or more address Online
lists. You can then assign the ABP to users.
Address lists An address list is a subset of a GAL. Each address list is a dynamic Address
collection of one or more types recipients. You can use address lists lists
to help users find the recipients and resources that they need.
Hierarchical The hierarchical address book (HAB) presents recipients in the GAL Hierarchical
address by using your organization's unique business structure (for address
books example, seniority or management hierarchy), which provides an books
efficient method for locating internal recipients.
Offline An offline address book (OAB) is a collection of address lists that Offline
address can be downloaded and used in Outlook by users that are address
books disconnected from the Exchange Online organization. books in
Exchange
Online
Note: Email address policies are available in Exchange Online, but only for Microsoft 365
groups. For more information, see Choose the domain to use when creating Microsoft
365 Groups.
For help with everyday email tasks, such as organizing your contacts in Outlook, see
Microsoft 365 training . You can find help including:
Address book policies (ABPs) let admins segment users into specific groups to provide
customized views of the organization's global address list (GAL). The goal of an ABP is to
provide a simpler mechanism for GAL segmentation (also known as GAL segregation) in
organizations that require multiple GALs.
One GAL. For more information about GALs, see Default address lists in Exchange
Online.
One offline address book (OAB). For more information about OABs, see Offline
address books in Exchange Online.
One room list. Note that this room list is a custom address list that specifies rooms
(contains the filter RecipientDisplayType -eq 'ConferenceRoomMailbox' ). It's not a
room finder that you create with the RoomList switch on the New-
DistributionGroup or Set-DistributionGroup cmdlet. For more information, see
Managing resource mailboxes.
One or more address lists. For more information about address lists, see Custom
Address Lists in Exchange Online.
For procedures involving ABPs, see Address book policy procedures in Exchange Online.
7 Note
ABPs create only a virtual separation of users from a directory perspective, not
a legal separation.
To turn on ABP email routing in your Exchange Online organization, see Turn on address
book policy routing in Exchange Online.
To assign ABPs to users, see Assign an address book policy to users in Exchange Online.
ABPs take effect when a user connects to their Exchange Online Mailbox. If you change
an ABP, the updated ABP takes effect when a user restarts or reconnects their email
client app.
ABP example
In the following diagram, Fabrikam and Tailspin Toys share the same Exchange Online
organization and the same CEO. The CEO is the only employee common to both
companies.
The suggested configuration includes three ABPs:
One ABP is assigned to Fabrikam employees. The GAL and address lists in the ABP
include Fabrikam employees and the CEO.
One ABP is assigned to Tailspin Toys employees. The GAL and address lists in the
ABP include Tailspin Toys employees and the CEO.
One ABP is assigned to only the CEO. The (default) GAL and address lists in the
ABP include all employees (Fabrikam, Tailspin Toys, and the CEO).
The users in Tailspin Toys can only see Tailspin Toys employees and the CEO when
they browse the GAL.
The users in Fabrikam can only see Fabrikam employees and the CEO when they
browse the GAL.
The CEO can see all Fabrikam and Tailspin Toys employees when she browses the
GAL.
Users who view the CEO's group membership can see only groups that belong to
their company. They can't see groups that belong to the other company.
Address book policy procedures in
Exchange Online
Article • 02/22/2023
Address book policies (ABPs) allow you to segment users into specific groups to give
them customized global address lists (GALs) in Outlook and Outlook on the web
(formerly known as Outlook Web App). For more information about ABPs, see Address
book policies in Exchange Online.
ABP routing creates the virtual organizations within a single Exchange Online
organization. Your virtual organization is determined by the global address list (GAL) you
reside in. When ABP routing is turned on, users that are assigned to different GALs
appear as external recipients and won't be able to view each other's contact cards.
In Exchange Online, you can only turn on ABP routing in Exchange Online PowerShell.
Looking for the Exchange Server version of this topic? See Use the Exchange
Management Shell to install and configure the Address Book Policy Routing Agent.
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
PowerShell
In Exchange Online PowerShell, run the following command to verify that ABP
routing is enabled for the organization:
PowerShell
Have a user that's assigned an ABP send an email message to an user that's
assigned a different ABP, and verify that the sender's email address doesn't resolve
to their display name.
Create an address book policy in
Exchange Online
Article • 02/22/2023
Address book policies (ABPs) allow you to segment users into specific groups to give
them customized global address lists (GALs) in Outlook and Outlook on the web
(formerly known as Outlook Web App). For more information about ABPs, see Address
book policies in Exchange Online.
In Exchange Online, you can only create ABPs in Exchange Online PowerShell.
An ABP requires one global address list (GAL), one offline address book (OAB), one
room list, and one or more address lists. To view the available objects, use the Get-
GlobalAddressList, Get-OfflineAddressBook, and Get-AddressList cmdlets.
7 Note
In Exchange Online, these cmdlets are available only in the Address Lists role,
and by default, the role isn't assigned to any role groups. To use this cmdlet,
add the Address Lists role to a role group (for example, to the Organization
Management role group). For more information, see Modify role groups in
Exchange Online.
The room list that's required for an ABP is an address list that specifies rooms
(contains the filter RecipientDisplayType -eq 'ConferenceRoomMailbox' ). It's
not a room finder distribution group that you create with the RoomList switch
on the New-DistributionGroup or Set-DistributionGroup cmdlets.
By default, the Address List role isn't assigned to any role groups in Exchange
Online. To use any cmdlets or features that require the Address List role, you need
to add the role to a role group. For more information, see Modify role groups.
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
PowerShell
OAB: Fabrikam-All-OAB
Address lists: All Fabrikam, All Fabrikam Mailboxes, All Fabrikam DLs, and All
Fabrikam Contacts
PowerShell
PowerShell
Get-AddressBookPolicy
Replace <ABPName> with the name of the ABP, and run the following command
to verify the property values:
PowerShell
Address book policies (ABPs) allow you to segment users into specific groups to give
them customized global address lists (GALs) in Outlook and Outlook on the web
(formerly known as Outlook Web App). For more information about ABPs, see Address
book policies in Exchange Online.
Users aren't automatically assigned an ABP when you create mailboxes. If you don't
assign an ABP to a mailbox, the GAL for your entire organization is visible to the user in
Outlook and Outlook on the web. Furthermore, a user that's assigned an ABP needs to
exist in the GAL that's specified for the ABP. For more information, see Considerations
and best practices for address book policies.
To identify your virtual organizations for ABPs, we recommend that you use the
CustomAttribute1 to CustomAttribute15 attributes on mailboxes, contacts, and groups,
because these attributes are the most widely available and manageable for all recipient
types.
To assign ABPs to mailboxes, you select the ABP in Exchange admin center (EAC), or
specify the ABP in Exchange Online PowerShell.
By default, the Address List role isn't assigned to any role groups in Exchange
Online. To use any cmdlets or features that require the Address List role, you need
to add the role to a role group. For more information, see Modify role groups.
To open the Exchange admin center (EAC), see Exchange admin center in Exchange
Online. To connect to Exchange Online PowerShell, see Connect to Exchange
Online PowerShell.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
2. In the list of mailboxes, find the mailbox that you want to modify. You can:
Click Search and enter part of the user's name, email address, or alias.
Once you've found the mailbox that you want to modify, select it, and then click
Edit .
4. Click the drop-down arrow in Address book policy, and select the ADP that you
want to apply.
2. In the list of mailboxes, find the mailboxes that you want to modify. For example:
b. In the Advanced search window that opens, select Recipient types and verify
the default value User mailbox.
d. In the Select one drop-down box that appears, select the appropriate Custom
attribute 1 to Custom attribute 15 values that defines your virtual organizations.
e. In the Specify words or phrases dialog that appears, enter the value that you
want to search for, and then click OK.
f. Back on the Advanced search window, click OK. In the EAC at Recipients >
Mailboxes, click More options > Advanced search to find user mailboxes.
3. In the list of mailboxes, select multiple mailboxes of the same type (for example,
User) from the list. For example:
Select a mailbox, hold down the Shift key, and select another mailbox that's
farther down in the list.
After you select multiple mailboxes of the same type, the title of the details pane
changes to Bulk Edit.
4. In the details pane, scroll down and click More options, scroll down to Address
Book Policy, and then click Update.
5. In the Bulk assign address book policy window that opens, select the ABP by
clicking the drop-down arrow in Select Address Book Policy, and then click Save.
PowerShell
This example assigns the ABP named All Fabrikam to the mailbox
joe@fabrikam.com.
PowerShell
Filter mailboxes by attributes: This method uses the unique filterable attribute that
defines the virtual organization (for example, the CustomAttribute1 through
CustomAttribute15 attribute value).
The syntax uses the following two commands (one to identify the mailboxes, and
the other to apply the ABP to the mailboxes):
PowerShell
PowerShell
This example assigns the ABP named All Fabrikam to all mailbox users whose
CustomAttribute15 value is FAB .
PowerShell
PowerShell
Use a list of specific mailboxes: This method requires a text file to identify the
mailboxes. Values that don't contain spaces (for example, the user account) work
best. The text file must contain one user account on each line like this:
akol@contoso.com
tjohnston@contoso.com
kakers@contoso.com
The syntax uses the following two commands (one to identify the user accounts,
and the other to apply the policy to those users):
PowerShell
PowerShell
PowerShell
PowerShell
For detailed syntax and parameter information, see Set-Mailbox and Get-Mailbox.
In the EAC, go to Recipients > Mailboxes, select the mailbox, and click Edit . In
the properties of the mailbox window that opens, click Mailbox features, and verify
the ABP in the Address book policy field.
PowerShell
In Exchange Online PowerShell, run the following command to verify the value of
the AddressBookPolicy property:
PowerShell
More information
To remove the ABP assignment from a mailbox, you select the value [No Policy] in the
EAC, or use the value $null for the AddressBookPolicy parameter in Exchange Online
PowerShell.
Change the settings of an address book
policy in Exchange Online
Article • 02/22/2023
Address book policies (ABPs) allow you to segment users into specific groups to give
them customized global address lists (GALs) in Outlook and Outlook on the web
(formerly known as Outlook Web App). For more information about ABPs, see Address
book policies in Exchange Online.
After you create an ABP, you can view or modify the name and the assigned address
lists: the global address list (GAL), offline address book (OAB), room list, and other
address lists.
In Exchange Online, you can only modify ABPs in Exchange Online PowerShell.
For additional management tasks related to ABPs, see Address book policy procedures
in Exchange Online.
By default, the Address List role isn't assigned to any role groups in Exchange
Online. To use any cmdlets or features that require the Address List role, you need
to add the role to a role group. For more information, see Modify role groups.
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
PowerShell
This example modifies the ABP named "All Fabrikam ABP" by replacing the OAB
with the specified OAB.
PowerShell
The AddressLists parameter takes multiple values, so you need to decide whether
you want to replace the existing address lists in the ABP, or add and remove
address lists without affecting the other address lists in the ABP.
This example replaces the existing address lists in the ABP named Government
Agency A with the specified address lists.
PowerShell
To add address lists to an ABP, you need to specify the new address lists and any
existing address lists that you want to keep.
This example adds the address list named Contoso-Chicago to the ABP named ABP
Contoso, which is already configured to use the address list named Contoso-
Seattle.
PowerShell
To remove address lists from an ABP, you need to specify the existing address lists
that you want to keep, and omit the address lists that you want to remove.
For example, the ABP named ABP Fabrikam uses the address lists named Fabrikam-
HR and Fabrikam-Finance. To remove the Fabrikam-HR address list, specify only
the Fabrikam-Finance address list.
PowerShell
PowerShell
Address book policies (ABPs) allow you to segment users into specific groups to give
them customized global address lists (GALs) in Outlook and Outlook on the web
(formerly known as Outlook Web App). For more information about ABPs, see Address
book policies in Exchange Online.
You can only remove ABPs from your Exchange Online organization using Exchange
Online PowerShell, and only if the ABP isn't assigned to a mailbox (active mailboxes or
soft-deleted mailboxes that are still recoverable).
By default, the Address List role isn't assigned to any role groups in Exchange
Online. To use any cmdlets or features that require the Address List role, you need
to add the role to a role group. For more information, see Modify role groups.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
PowerShell
Get-AddressBookPolicy -Identity "<ABPName>" | Format-List
DistinguishedName
PowerShell
To remove the ABP assignment from any active mailboxes that you find, replace
<ABPDistinguishedName> with the DN of the ABP and run the following
commands:
PowerShell
PowerShell
PowerShell
To remove the ABP assignment from any soft-deleted mailboxes that you find,
replace <ABPDistinguishedName> with the DN of the ABP and run the following
commands:
PowerShell
Note: If you don't assign an ABP to a mailbox, the GAL for your entire organization will
be visible to the user in Outlook and Outlook on the web. Instead of using the value
$null , you can specify the name of a different ABP (enclosed in quotation marks if the
PowerShell
PowerShell
Run the following command to verify that the ABP isn't listed:
PowerShell
Get-AddressBookPolicy
Replace <ABPName> with the name of the ABP, and run the following command
to confirm that an error is returned:
PowerShell
Global address lists (GALs): The built-in GAL that's automatically created by
Exchange Online includes every mail-enabled object in the organization. You can
create additional GALs to separate users by organization or location, but a user can
only see and use one GAL.
Address lists: Address lists are subsets of recipients that are grouped together in
one list, which makes them easier to find by users. Exchange Online comes with
several built-in address lists, and you can create more based on you organization's
needs.
Offline address books (OABs): OABs contain address lists and GALs. OABs are used
by Outlook clients in cached Exchange mode to provide local access to address
lists and GALs for recipient look-ups. For more information, see [Offline address
books in Exchange Online].
Users in your organization use address lists and the GAL to find recipients for email
messages. Here's an example of what address lists look like in Outlook 2016:
For procedures related to address lists, see Address list procedures in Exchange Online.
Notes:
By default, the Address List role isn't assigned to any role groups in Exchange
Online. To use any cmdlets or features that require the Address List role, you need
to add the role to a role group. For more information, see Modify role groups.
Precanned recipient filters or custom recipient filters identify the recipients that are
included in address lists and GALs. For more information, see Recipient filters for
address lists in Exchange Online PowerShell.
You can hide recipients from all address lists and GALs. For more information, see
Hide recipients from address lists.
If a user belongs to multiple GALs, they'll still see only one GAL based on the
following conditions:
The user needs permissions to view the GAL. You assign user permissions to
GALs by using address book policies (ABPs). For more information, see Address
book policies in Exchange Online.
If a user is still eligible to see multiple GALs, only the largest GAL is used (the
GAL that contains the most recipients).
Each GAL needs a corresponding offline address book (OAB) that includes the
GAL. To create OABs, see Create an offline address book in Exchange Online.
The built-in GAL is named Default Global Address List, and any additional GALs
that you create require unique names. Depending on the email client, users might
not see the actual name of the GAL that they're using:
In Outlook on the web, users see the actual name of the GAL that they're using
(for example, Default Global Address List).
In Outlook, the GAL always appears as Global Address List, which likely doesn't
match the actual name.
All Address Includes all mail contacts in "Alias -ne $null -and (ObjectCategory
Contacts list the organization. To learn -like 'person' -and ObjectClass -eq
more about mail contacts, 'contact')"
see Recipients in Exchange
Online.
All Address Includes all distribution "Alias -ne $null -and ObjectCategory -
Distribution list groups and mail-enabled like 'group'"
Lists security groups in the
organization. To learn more
about mail-enabled groups,
see Recipients in Exchange
Online.
Name Type Description Recipient filter used
All Rooms Address Includes all room mailboxes. "Alias -ne $null -and
list Equipment mailboxes aren't (RecipientDisplayType -eq
included. To learn more 'ConferenceRoomMailbox' -or
about room and equipment RecipientDisplayType -eq
(resource) mailboxes, see 'SyncedConferenceRoomMailbox')"
Recipients in Exchange
Online.
All Users Address Includes all user mailboxes, "((Alias -ne $null) -and
list linked mailboxes, remote (((((((ObjectCategory -like 'person') -
mailboxes (Microsoft 365 or and (ObjectClass -eq 'user') -and (-
Office 365 mailboxes), not(Database -ne $null)) -and (-
shared mailboxes, room not(ServerLegacyDN -ne $null)))) -or
mailboxes, equipment (((ObjectCategory -like 'person') -and
mailboxes, and mail users in (ObjectClass -eq 'user') -and
the organization. To learn (((Database -ne $null) -or
more about these recipient (ServerLegacyDN -ne $null))))))) -and
types, see Recipients in (-not(RecipientTypeDetailsValue -eq
Exchange Online.
'GroupMailbox')))))"
Public Address Includes all mail-enabled "Alias -ne $null -and ObjectCategory -
Folders list public folders in your like 'publicFolder'"
organization. Access
permissions determine who
can view and use public
folders. For more
information about public
folders, see Public folders in
Microsoft 365 or Office 365
and Exchange Online.
For most day-to-day activities, employees at Fourth Coffee don't communicate with
employees at Contoso, Ltd. Therefore, to make it easier for employees to find recipients
who exist only in their division, you can create two new custom address lists: one for
Fourth Coffee and one for Contoso, Ltd. However, if an employee is unsure about where
recipient exists, they can search in the GAL, which contains all recipients from both
divisions.
In Exchange Online, you can only use PowerShell to create custom address lists.
For detailed instructions about creating address lists in Exchange Online, see Address list
procedures in Exchange Online.
Address list procedures in Exchange
Online
Article • 02/22/2023
For additional management tasks related to manage address lists, see Address list
procedures in Exchange Online.
Looking for the Exchange Server version of this topic? See Create address lists.
By default, the Address List role isn't assigned to any role groups in Exchange
Online. To use any cmdlets that require the Address List role, you need to add the
role to a role group. For more information, see Modify role groups.
You can only use Exchange Online PowerShell to perform virtually all of the
procedures in this topic (everything except hiding recipients from address lists). To
connect to Exchange Online PowerShell, see Connect to Exchange Online
PowerShell.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
Location: Under the root (" \ ", also known as All Address Lists) because we didn't
use the Container parameter, and the default value is " \ ".
Precanned recipient filter: All users with mailboxes where the State or province
value is GA, AL, or LA (Georgia, Alabama, or Louisiana).
PowerShell
Custom recipient filter: All users with mailboxes where the Title value contains
Director or Manager, and the State or province value is WA, OR, or ID
(Washington, Oregon, or Idaho).
PowerShell
This example creates the address list named Oregon and Washington Users by using the
RecipientFilter parameter and includes recipients that are mailbox users and have
StateOrProvince set to Washington or Oregon .
PowerShell
New-AddressList -Name "Oregon and Washington" -RecipientFilter "
((RecipientType -eq 'UserMailbox') -and ((StateOrProvince -eq 'Washington')
-or (StateOrProvince -eq 'Oregon')))"
This example creates the child address list Building 34 Meeting Rooms in the All Rooms
parent container, using built-in conditions.
PowerShell
PowerShell
PowerShell
This example returns the members of the address list named Southeast Offices.
PowerShell
This example exports the results to the file C:\My Documents\Southeast Offices
Export.csv.
PowerShell
For example, suppose the address list named Oregon and Washington Users uses the
filter "((RecipientType -eq 'UserMailbox') -and ((StateOrProvince -eq 'Washington') -
or (StateOrProvince -eq 'Oregon')))" , but the address list doesn't include everyone
whose StateOrProvince property values are set correctly. To update the address list,
perform the following steps:
1. Use the query from the address list to find all users that should be in the address
list. For example:
PowerShell
PowerShell
PowerShell
3. Find those same users again by using the temporary property values. For example:
PowerShell
4. Change the temporary value back to the required value. For example, change the
StateOrProvince values from OR to Oregon , and WA to Washington :
PowerShell
PowerShell
Notes:
Title, department and address properties require the Get-User and Set-User
cmdlets. CustomAttribute1 through CustomAttribute15 properties require the Get-
Mailbox and Set-Mailbox cmdlets. For more information about what properties
are available on which cmdlet, see the following topics:
Set-User
Set-Mailbox
If a only small number of users don't appear in the address list, you can modify the
required property value for each user. For example:
PowerShell
PowerShell
PowerShell
PowerShell
This example modifies the existing address list named Southeast Offices by adding the
State or province value TX (Texas) to the precanned recipient filter.
PowerShell
PowerShell
PowerShell
This example removes the address list Sales Department, which doesn't contain child
address lists.
PowerShell
PowerShell
Get-AddressList
You can't use the new EAC to hide Microsoft 365 groups from address lists.
1. In the new EAC, go to one of the following locations based on the recipient type:
2. Select the recipient that you want to hide from address lists.
3. The recipient properties window opens. What you do next depends on the
recipient type:
Resources: Click the pencil and select Hide from address lists (GAL).
Public folders: On the General mail properties tab, select Hide from
Exchange address list.
PowerShell
DistributionGroup
DynamicDistributionGroup
Mailbox
MailContact
MailPublicFolder
MailUser
UnifiedGroup
This example hides the distribution group named Internal Affairs from address lists.
PowerShell
PowerShell
Note: To make the recipient visible in address lists again, use the value $false for the
HiddenFromAddressListsEnabled parameter.
In the EAC, select the recipient, click Edit ( ) and verify the hide from address lists
setting is selected.
In Exchange Online PowerShell, run the following command and verify the
recipient is listed:
PowerShell
Open the GAL in Outlook or Outlook on the web (formerly known as Outlook Web
App), and verify the recipient isn't visible.
Recipient filters for address lists in
Exchange Online PowerShell
Article • 02/22/2023
Recipient filters identify the recipients that are included in address lists and GALs. There
are two basic options: precanned recipient filters and custom recipient filters. These
are basically the same recipient filtering options that are used by dynamic distribution
groups and email address policies.
You can also use any of the optional Conditional filter parameters:
ConditionalCompany, ConditionalCustomAttribute[1to15],
ConditionalDepartment, and ConditionalStateOrProvince.
You specify multiple values for a Conditional parameter by using the syntax "
<Value1>","<Value2>"... . Multiple values of the same property implies the or
Double quotation marks " " are required around the whole OPATH filter.
Although the filter is a string (not a system block), you can also use braces { } ,
but only if the filter doesn't contain variables that require expansion.
Hyphens ( - ) are required before all operators. Here are some of the most
frequently used operators:
each individual statement enclosed in parentheses, but you don't need to enter
them that way.
For more information about address lists, see Address lists in Exchange Online.
For address list procedures that use recipient filters, see Address list procedures in
Exchange Online.
Remove a global address list in
Exchange Online
Article • 02/22/2023
The built-in global address list (GAL) that's automatically created by Exchange Online
includes every mail-enabled object in the organization. You can create additional GALs
to separate users by organization or location, but a user can only see and use one GAL.
For more information about address lists, see Address lists in Exchange Online.
You can use the procedures in this topic to remove any custom GALs that you've
created. You can't remove:
The GAL named Default Offline Address Book, which is the built-in GAL that's
available in Exchange Online, and the only GAL that has the
IsDefaultGlobalAddressList property value True .
A GAL that's defined in an offline address book (OAB). For OAB procedures, see
Offline address book procedures.
For additional GAL management tasks, see Address list procedures in Exchange Online.
By default, the Address List role isn't assigned to any role groups in Exchange
Online. To use any cmdlets that require the Address List role, you need to add the
role to a role group. For more information, see Modify role groups.
You can only use Exchange Online PowerShell to perform the procedures in this
topic. To connect to Exchange Online PowerShell, see Connect to Exchange Online
PowerShell.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
Use Exchange Online PowerShell to remove a
GAL
To remove a GAL, use the following syntax:
PowerShell
PowerShell
PowerShell
Get-GlobalAddressList
Configure global address list properties
in Exchange Online
Article • 02/22/2023
The built-in global address list (GAL) that's automatically created by Exchange Online
includes every mail-enabled object in the organization. You can create additional GALs
to separate users by organization or location, but a user can only see and use one GAL.
For more information about address lists, see Address lists in Exchange Online.
The same settings to configure a GAL are available as when you created the GAL. For
more information, see Create a global address list in Exchange Online. For additional
GAL management tasks, see Address list procedures in Exchange Online.
By default, the Address List role isn't assigned to any role groups in Exchange
Online. To use any cmdlets that require the Address List role, you need to add the
role to a role group. For more information, see Modify role groups.
You can't modify the GAL named Default Global Address List, the built-in GAL
that's available in Exchange Online, and the only GAL that has the
IsDefaultGlobalAddressList property value True .
You can't replace a custom recipient filter with a precanned recipient filter or vice-
versa in an existing GAL.
You can only use Exchange Online PowerShell to perform the procedures in this
topic. To connect to Exchange Online PowerShell, see Connect to Exchange Online
PowerShell.
For details about recipient filters in the Exchange Online PowerShell, see Recipient
filters for address lists in Exchange Online PowerShell.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
Use the Exchange Online PowerShell to modify
global address lists
To modify a GAL, use the following syntax:
PowerShell
When you modify the precanned Conditional parameter values, you can use the
following syntax to add or remove values without affecting other existing values:
@{Add="<Value1>","<Value2>"...; Remove="<Value1>","<Value2>"...} .
This example modifies the existing GAL named Contoso GAL by adding the Company
value Fabrikam to the precanned recipient filter.
PowerShell
To verify that you've successfully modified a GAL, replace <GAL Name> with the name
of the GAL and run the following command in Exchange Online PowerShell to verify the
property values:
PowerShell
The built-in global address list (GAL) that's automatically created by Exchange Online
includes every mail-enabled object in the organization. You can create additional GALs
to separate users by organization or location, but a user can only see and use one GAL.
For more information about address lists, see Address lists in Exchange Online.
If your organization uses address book policies (ABPs), you'll need to create additional
GALs. To learn more, see Address book policies in Exchange Online.
For additional GAL management tasks, see Address list procedures in Exchange Online.
By default, the Address List role isn't assigned to any role groups in Exchange
Online. To use any cmdlets that require the Address List role, you need to add the
role to a role group. For more information, see Modify role groups.
You can only use Exchange Online PowerShell to perform the procedures in this
topic. To connect to Exchange Online PowerShell, see Connect to Exchange Online
PowerShell.
For details about recipient filters in the Exchange Online PowerShell, see Recipient
filters for address lists in Exchange Online PowerShell.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
Precanned recipient filter: All recipient types where the Company value is
Contoso.
PowerShell
Custom recipient filter: All recipient types where the CustomAttribute15 property
contains the value AgencyA.
PowerShell
PowerShell
The hierarchical address book (HAB) allows users to look for recipients in their address
book using an organizational hierarchy. Normally, users are limited to the default global
address list (GAL) and its recipient properties and the structure of the GAL often doesn't
reflect the management or seniority relationships of recipients in your organization.
Being able to customize an HAB that maps to your organization's unique business
structure provides your users with an efficient method for locating internal recipients.
The second-level child tiers represent the business divisions within Contoso, Ltd:
Corporate Office, Product Support Organization, and Sales & Marketing
Organization.
The third-level child tiers represent departments within the Corporate Office
division: Human Resources, Accounting Group, and Administration Group.
You can provide an additional level of hierarchical structure by using the SeniorityIndex
parameter. When creating an HAB, use the SeniorityIndex parameter to rank individual
recipients or organizational groups by seniority within these organizational tiers. This
ranking specifies the order in which the recipients or groups are displayed in the HAB.
For example, in the preceding example, the SeniorityIndex parameter for the recipients
in the Corporate Office division is set to the following:
7 Note
If the SeniorityIndex parameter isn't set or is equal for two or more users, the HAB
sorting order uses the PhoneticDisplayName parameter value to list the users in
ascending alphabetical order. If the PhoneticDisplayName parameter value isn't set,
the HAB defaults to the DisplayName parameter value and lists the users in
ascending alphabetical order.
2. Create distribution groups for the child tiers and designate them as members of
the HAB. Modify the SeniorityIndex parameter of these groups so they're listed in
the proper hierarchical order within the root organization.
4. For accessibility purposes, you can use the PhoneticDisplayName parameter, which
specifies a phonetic pronunciation of the DisplayName parameter, and is also used
for the sort order if the SeniorityIndex parameter value isn't set.
Enable or disable hierarchical address
books in Exchange Online
Article • 02/22/2023
The hierarchical address book (HAB) allows users to look for recipients in their address
book using an organizational hierarchy. For more information, see Hierarchical address
books.
The cmdlets and parameters that you use to configure a HAB are described in the
following table:
After you create the HAB, you can use the EAC to manage the membership of the
groups in the organizational hierarchy. However, you can only use Exchange
Online PowerShell to configure the SeniorityIndex parameter for any new groups or
users that you create.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
PowerShell
PowerShell
PowerShell
PowerShell
PowerShell
PowerShell
Note: If you don't use the Alias parameter when you create a distribution group, the
value of the Name parameter is used with spaces removed.
PowerShell
Set-OrganizationConfig -HierarchicalAddressBookRoot "Contoso,Ltd"
PowerShell
PowerShell
PowerShell
PowerShell
PowerShell
PowerShell
PowerShell
PowerShell
This example adds the groups named Human Resources, Accounting Group, and
Administration Group as members of Corporate Office.
PowerShell
PowerShell
$members=@('aalberts@contoso.com','dhamilton@contoso.com','rmpatel@contoso.c
om')
foreach($member in $members){
Add-DistributionGroupMember -Identity "Corporate Office" -Member $member
}
Human Resources
Accounting Group
Administration Group
PowerShell
PowerShell
PowerShell
The following examples configure the members of the Corporate Office group to display
in the following order:
David Hamilton
Rajesh M. Patel
Amy Alberts
PowerShell
PowerShell
Set-User -Identity RMPatel -SeniorityIndex 50
PowerShell
In Exchange Online PowerShell, run the following commands to verify the property
values:
PowerShell
PowerShell
Get-Group -ResultSize unlimited | where {$_.IsHierarchicalGroup -match
'True'} | Format-Table SeniorityIndex,PhoneticDisplayName,DisplayName -
Auto
PowerShell
PowerShell
In Exchange Online PowerShell, run the following command to verify that the
HierarchicalAddressBookRoot property value is blank:
PowerShell
An offline address book (OAB) is a downloadable address list collection that Outlook
users can access while disconnected from Exchange Online. Admins can decide which
address lists are made available to users who work offline.
For more information about address lists in Exchange Online, see Address lists.
2. On the Offline address book dialog box that's displayed, make the following
selections:
Choose address book: This drop-down list will display the offline address
books that are available to you. Depending on what an admin has configured,
you might see only one value here (for example, the global address list).
There's no OAB on the client computer (for example, this is the first time you've
connected to your Exchange Online mailbox in Outlook on this computer).
The version of the OAB on the server and the client don't match (a more recent
version of the OAB is present on the server).
One or more OAB files are missing from the client computer.
A previous full download failed, and Outlook has to start over.
When a user has multiple MAPI profiles on the same Outlook client computer and
they switch between the two profiles that both use Cached Exchange Mode,
multiple full OAB downloads of the same OAB files will occur.
Offline address book procedures in
Exchange Online
Article • 02/22/2023
Add an address list to or remove an address list from an offline address book
An offline address book (OAB) is a downloadable address list collection that Outlook
users can access while disconnected from Exchange Online. An OAB allows Outlook
users to access the information within the specified address lists while disconnected
from Exchange Online. Admins can decide which address lists are made available to
users who work offline.
For additional management tasks related to OABs, see Offline address book procedures.
By default, the Address List role isn't assigned to any role groups in Exchange
Online. To use any cmdlets that require the Address List role, you need to add the
role to a role group. For more information, see Modify role groups.
You can only use Exchange Online PowerShell to perform the procedures in this
topic. To connect to Exchange Online PowerShell, see Connect to Exchange Online
PowerShell.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
PowerShell
You can use Exchange Online PowerShell to add or remove an address list from an
offline address book (OAB). By default, there is an OAB named the Default Offline
Address Book that contains the global address list (GAL). OABs are generated based on
the address lists that they contain. To create custom OABs that users can download, you
can add or remove address lists from OABs.
For additional management tasks related to OABs, see Offline address book procedures.
Changes to the address list aren't available for client download until after the OAB
in which the address list resides has been generated.
By default, the Address List role isn't assigned to any role groups in Exchange
Online. To use any cmdlets that require the Address List role, you need to add the
role to a role group. For more information, see Modify role groups.
You can only use Exchange Online PowerShell to perform the procedures in this
topic. To connect to Exchange Online PowerShell, see Connect to Exchange Online
PowerShell.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
In this example, the OAB named Marketing OAB is already configured with Address List
1 and Address List 2. To keeps those address lists and add Address List 3, run the
following command:
PowerShell
Similarly, to keep the OAB configured with Address List 1 and Address 2, but remove
Address List 3, run the following command:
PowerShell
PowerShell
By default, the automatically-created OAB named Default Offline Address Book is the
default OAB. You can set any OAB in your Exchange Online organization as the default
OAB. The default OAB is used by:
Mailboxes without an address book policy (ABP) assigned, or where the assigned
ABP policy has no OAB defined (by default, there are no ABPs).
If you delete the default OAB, Exchange Online doesn't automatically assign another
OAB as the default. You need to manually designate another OAB as the default.
For additional management tasks related to OABs, see Offline address book procedures.
By default, the Address List role isn't assigned to any role groups in Exchange
Online. To use any cmdlets that require the Address List role, you need to add the
role to a role group. For more information, see Modify role groups.
You can only use Exchange Online PowerShell to perform the procedures in this
topic. To connect to Exchange Online PowerShell, see Connect to Exchange Online
PowerShell.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
PowerShell
If you use multiple offline address books (OABs) in your organization, you have only one
option for assigning the OAB to users:
Per address book policy: You can assign an address book policy (ABP) to a user,
and the ABP specifies the OAB. If you assign an ABP to a user that already has an
OAB assigned to their mailbox, the OAB that's assigned to the mailbox will take
precedence. For more information, see Assign an address book policy to mail
users.
For additional management tasks related to OABs, see Offline address book procedures.
Remove an offline address book in
Exchange Online
Article • 02/22/2023
This topic explains how to remove an offline address book (OAB) from Exchange Online.
If you remove the default OAB, you must assign a different OAB as the default OAB. For
instructions about how to change the default OAB, see Change the default offline
address book.
For additional management tasks related to OABs, see Offline address book procedures.
By default, the Address List role isn't assigned to any role groups in Exchange
Online. To use any cmdlets that require the Address List role, you need to add the
role to a role group. For more information, see Modify role groups.
You can only use Exchange Online PowerShell to perform the procedures in this
topic. To connect to Exchange Online PowerShell, see Connect to Exchange Online
PowerShell.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
PowerShell
PowerShell
Get-OfflineAddressBook
Voice mail in Exchange Online: Unified
Messaging
Article • 02/22/2023
Unified Messaging (UM) in Exchange Online has been retired. Cloud Voicemail replaces
Exchange UM for providing voice messaging functionality for Teams and Exchange
Online users. For more information, see Set up Cloud Voicemail.
Cloud Voicemail is also the solution for Skype for Business Server 2019 voice users who
have mailboxes on Exchange Server 2019 or Exchange Online. For more information on
setting up Cloud Voicemail for Skype for Business Server 2019, see Plan Cloud Voicemail
service.
Clients and mobile in Exchange Online
Article • 02/22/2023
Many different clients can be used to access information in an Exchange Online mailbox.
These clients include desktop programs such as Microsoft Outlook, Outlook on the web
(formerly known as Outlook Web App), and mobile clients such as phones, tablets, and
other mobile devices. Each of these clients offers a variety of features.
The following table contains links to topics that will help you learn about and manage
some of the clients and client access methods that can be used to access an Office 365
or Microsoft 365 mailbox.
Topic Description
Exchange Learn about Exchange ActiveSync, the protocol that provides connectivity to
ActiveSync in a wide variety of mobile phones and tablets. Using Exchange ActiveSync,
Exchange Online users can access email, calendar, contact, and task information.
Mobile device
mailbox policies in
Exchange Online
POP3 and IMAP4 Learn about how you can use the POP3 and IMAP4 protocols to provide
users access to a number of the features in their Office 365 or Microsoft 365
mailbox. These client protocols can be used on desktop email applications
and on many mobile phones and devices.
Outlook on the Learn about Outlook on the web, which provides users access to their
web in Exchange Exchange Online mailbox through a web browser.
Online
MailTips in Learn about MailTips, the informative messages displayed to users while
Exchange Online they're composing a message.
Add-ins for
Outlook in
Exchange Online
Remote
Connectivity
Analyzer tests for
Exchange Online
Topic Description
Client Access Rules Learn how to use Client Access Rules to control connections to Exchange
in Exchange Online Online.
Disable Basic Learn how to disable Basic auth connections to your Exchange Online
authentication in mailboxes.
Exchange Online
Enable or disable Learn how to require Modern auth connections to your Exchange Online
modern mailboxes.
authentication for
Outlook in
Exchange Online
Deprecation of Basic authentication in
Exchange Online
Article • 02/22/2023
) Important
If Basic authentication was disabled in your tenant and users and apps were unable
to connect, you had until Dec 31 2022, to re-enable the affected protocols. Now that
the date has passed, you (or support) can't re-enable Basic authentication in your
tenant.
Basic authentication is now being disabled in all new tenants, or wherever it is still
enabled.
Read the rest of this article to fully understand the changes we're making and how
these changes might affect you.
For many years, applications have used Basic authentication to connect to servers,
services, and API endpoints. Basic authentication simply means the application sends a
username and password with every request, and those credentials are also often stored
or saved on the device. Traditionally, Basic authentication is enabled by default on most
servers or services, and is simple to set up.
Simplicity isn't at all bad, but Basic authentication makes it easier for attackers to capture
user credentials (particularly if the credentials are not protected by TLS), which increases
the risk of those stolen credentials being reused against other endpoints or services.
Furthermore, the enforcement of multifactor authentication (MFA) is not simple or in
some cases, possible when Basic authentication remains enabled.
We actively recommend that customers adopt security strategies such as Zero Trust
(Never Trust, Always Verify), or apply real-time assessment policies when users and
devices access corporate information. These alternatives allow for intelligent decisions
about who is trying to access what from where on which device rather than simply
trusting an authentication credential that could be a bad actor impersonating a user.
With these threats and risks in mind, we're taking steps to improve data security in
Exchange Online.
7 Note
The deprecation of basic authentication will also prevent the use of app passwords
with apps that don't support two-step verification.
We're also disabling SMTP AUTH in all tenants in which it's not being used.
This decision requires customers to move from apps that use basic authentication to
apps that use Modern authentication. Modern authentication (OAuth 2.0 token-based
authorization) has many benefits and improvements that help mitigate the issues in basic
authentication. For example, OAuth access tokens have a limited usable lifetime, and are
specific to the applications and resources for which they are issued, so they cannot be
reused. Enabling and enforcing multifactor authentication (MFA) is also simple with
Modern authentication.
Beginning in early 2021, we started to disable Basic authentication for existing tenants
with no reported usage.
Beginning in early 2023, we disabled Basic authentication for any tenants who requested
an extension. You can read more about the timing here .
7 Note
Application developers who have built apps that send, read, or otherwise process email
using these protocols will be able to keep the same protocol, but need to implement
secure, Modern authentication experiences for their users. This functionality is built on
top of Microsoft Identity platform v2.0 and supports access to Microsoft 365 email
accounts.
If your in-house application needs to access IMAP, POP and SMTP AUTH protocols in
Exchange Online, follow these step-by-step instructions to implement OAuth 2.0
authentication: Authenticate an IMAP, POP, or SMTP connection using OAuth.
Additionally, use this PowerShell script Get-IMAPAccesstoken.ps1 to test IMAP access
after your OAuth enablement on your own in a simple way including the shared mailbox
use case. If this is successful, just make a confident next step talk to your application
owner of your vendor or internal business partner.
Work with your vendor to update any apps or clients that you use that could be
impacted.
SMTP AUTH will still be available when Basic authentication is permanently disabled on
October 1, 2022. The reason SMTP will still be available is that many multi-function
devices such as printers and scanners can't be updated to use modern authentication.
However, we strongly encourage customers to move away from using Basic
authentication with SMTP AUTH when possible. Other options for sending authenticated
mail include using alternative protocols, such as the Microsoft Graph API.
There are other mobile device email apps that support Modern authentication. The built-
in email apps for all popular platforms typically support Modern authentication, so
sometimes the solution is to verify that your device is running the latest version of the
app. If the email app is current, but is still using Basic authentication, you might need to
remove the account from the device and then add it back.
If you're using Microsoft Intune, you might be able to change the authentication type
using the email profile you push or deploy to your devices. If you are using iOS devices
(iPhones and iPads) you should take a look at Add e-mail settings for iOS and iPadOS
devices in Microsoft Intune
Any iOS device that's managed with Basic Mobility and Security won't be able to access
email if the following conditions are true:
You've configured a device security policy to require a managed email profile for
access.
You haven't modified the policy since November 9, 2021 (which means the policy is
still using Basic authentication).
Policies created or modified after this date have already been updated to use modern
authentication.
To update policies that haven't been modified since November 9, 2021 to use modern
authentication, make a temporary change to the policy's access requirements. We
recommend changing and saving the Require Encrypted backups cloud setting, which
will upgrade the policy to use modern authentication. Once the altered policy has the
status value Turned on, the email profile has been upgraded. You may then revert the
temporary change to the policy.
7 Note
During the upgrade process, the email profile will be updated on the iOS device and
the user will be prompted to enter their username and password.
The Exchange Online PowerShell module can also be used non-interactively, which
enables running unattended scripts. Certificate-based authentication provides admins
the ability to run scripts without the need to create service-accounts or store credentials
locally. To learn more, see: App-only authentication for unattended scripts in the
Exchange Online PowerShell module.
Administrators who still use the old remote PowerShell connection method or the older
Exchange Online Remote PowerShell Module (V1), are encouraged to begin using the
Exchange Online PowerShell module as soon as possible. These older connection
methods will eventually be retired, either through Basic authentication disablement or
the end of support.
) Important
Do not confuse the fact that PowerShell requires Basic authentication enabled for
WinRM (on the local machine where the session is run from). The
username/password isn't sent to the service using Basic, but the Basic Auth header
is required to send the session's OAuth token, because the WinRM client doesn't
support OAuth. We are working on this problem and will have more to announce in
the future. Just know that enabling Basic on WinRM is not using Basic to
authenticate to the service. For more information, see Exchange Online PowerShell:
Turn on Basic authentication in WinRM.
Read more about this situation here: Understanding the Different Versions of
Exchange Online PowerShell Modules and Basic Auth .
For details on moving from the V1 version of the module to the current version, see
this blog post .
Version 3.0.0 of the Exchange Online PowerShell V3 module (Preview versions 2.0.6-
PreviewX) contains REST API backed versions of all Exchange Online cmdlets that
don't require Basic authentication in WinRM. For more information, see Updates for
version 3.0.0.
In 2018, we announced that Exchange Web Services would no longer receive feature
updates and we recommended that application developers switch to using Microsoft
Graph. See Upcoming changes to Exchange Web Services (EWS) API for Office 365 .
Many applications have successfully moved to Graph, but for those applications that
haven't, it's noteworthy that EWS already fully supports Modern authentication. So if you
can't migrate to Graph yet, you can switch to using Modern authentication with EWS,
knowing that EWS will eventually be deprecated.
Outlook 2007 or Outlook 2010 cannot use Modern authentication, and will eventually be
unable to connect. Outlook 2013 requires a setting to enable Modern authentication, but
once you configure the setting, Outlook 2013 can use Modern authentication with no
issues. As announced earlier here, Outlook 2013 requires a minimum update level to
connect to Exchange Online. See: New minimum Outlook for Windows version
requirements for Microsoft 365 .
Outlook for Mac supports Modern Authentication.
For more information about Modern authentication support in Office, see How modern
authentication works for Office client apps.
If you need to migrate Public Folders to Exchange online, see Public Folder Migration
Scripts with Modern Authentication Support .
Autodiscover
In November 2022 we announced we would disable basic authentication for the
Autodiscover protocol once EAS and EWS are disabled in a tenant.
Authentication dialog
A simple way to tell if a client app (for example, Outlook) is using Basic authentication or
Modern authentication is to observe the dialog that's presented when the user logs in.
On a mobile device, you'll see a similar web-based page when you authenticate if the
device is trying to connect using Modern authentication.
You can also check the connection status dialog box, by CTRL + right-clicking the
Outlook icon in the system tray, and choosing Connection Status.
When using Basic authentication, the Authn column in the Outlook Connection Status
dialog shows the value of Clear.
Once you switch to Modern authentication, the Authn column in the Outlook Connection
Status dialog shows the value of Bearer.
If you did get a summary of usage, you'll know how many unique users we saw using
Basic authentication in the previous month, and which protocols they used. These
numbers are indicative only, and do not necessarily reflect successful access to mailboxes
or data. For example, a user may authenticate using IMAP, but be denied access to the
mailbox due to configuration or policy. But the usage summary does indicate that
something or someone is successfully authenticating to your tenant using Basic
authentication. To investigate this usage further, we recommend that you use the Azure
Active Directory Sign-in events report – a report that can provide detailed user, IP, and
client details for these authentication attempts (more details below).
Azure Event Hubs, Azure Storage, or Azure Monitor (best methods): All of these
export pathways are capable of handling the load from even large customers with
hundreds of thousands of users. For more information, see Stream Azure Active
Directory logs to Azure Monitor logs.
Graph APIs: We recommend that you use MS Graph paging logic to ensure you can
pull in all of the logs. For more information, see Access Azure AD logs with the
Microsoft Graph API.
Direct download from web browser: For large customers, the amount of data can
cause browser timeouts.
Client options
Some of the options available for each of the impacted protocols are listed below.
Protocol recommendation
For Exchange Web Services (EWS), Remote PowerShell (RPS), POP and IMAP, and
Exchange ActiveSync (EAS):
If you have written your own code using these protocols, update your code to use
OAuth 2.0 instead of Basic Authentication, or migrate to a newer protocol (Graph
API).
If you or your users are using a 3rd party application which uses these protocols,
reach out to the 3rd party app developer who supplied this application to update it
to support OAuth 2.0 authentication or assist your users to switch to an application
that's built using OAuth 2.0.
Exchange Third-party Modify app to use Follow this article What to do with
Web Services applications not modern auth. to migrate your EWS Managed
(EWS) supporting OAuth Migrate app to use customized API PowerShell
Graph API and Gallatin scripts that use
modern auth. application to use Basic
EWS with OAuth Authentication
Popular Apps: No EWS
Microsoft Teams feature updates
Microsoft Teams
and Cisco Unity starting July
Rooms: Enable
not currently 2018
modern
available in
authentication by
Gallatin
following the steps
in Authentication in
Microsoft Teams
Rooms
Dynamics 365 /
PowerApps: Use of
Basic authentication
with Exchange
Online
Cisco Unity: Cisco
Unity Connection
Service Bulletin for
Unified Messaging
with Microsoft
Office 365 Product
Bulletin
Key Impacted Clients Client Specific Special Other Protocol
Protocol Recommendation Recommendation Info / Notes
Service for Office 365
Operated by
21Vianet
(Gallatin)
POP and Third party mobile Recommendations: Follow this article IMAP is popular
IMAP clients such as Move away from to configure POP for Linux and
Thunderbird first these protocols as and IMAP with education
party clients they don't enable OAuth in Gallatin customers.
configured to use full features. with sample OAuth 2.0
POP or IMAP Move to OAuth 2.0 code support started
for POP/IMAP when rolling out in
your client app April 2020.
supports it.
Authenticate an
IMAP, POP, or
SMTP
connection using
OAuth
Key Impacted Clients Client Specific Special Other Protocol
Protocol Recommendation Recommendation Info / Notes
Service for Office 365
Operated by
21Vianet
(Gallatin)
Exchange Mobile email clients Move to Outlook for Apple's native Mobile devices
ActiveSync from Apple, iOS and Android or mail app on iOS that use a native
(EAS) Samsung etc. another mobile does not currently app to connect
email app that work in Gallatin, to Exchange
supports Modern we recommend Online generally
Auth you use Outlook use this
Update the app mobile protocol.
settings if it can do Windows
OAuth but the 10/11 Mail app is
device is still using not supported
Basic with Gallatin
Switch to Outlook Follow this
on the web or article to
another mobile configure EAS
browser app that with OAuth and
supports modern sample code
auth.
Popular Apps:
Apple
iPhone/iPad/macOS:
All up to date
iOS/macOS devices
are capable of using
modern
authentication, just
remove and add
back the account.
Microsoft Windows
10 Mail client:
Remove and add
back the account,
choosing Office 365
as the account type
Security Defaults - Blocks all legacy - Cannot be used together with Azure AD
authentication at the tenant Conditional Access policies
level for all protocols - Potential other impact such as requiring
- No additional licensing all users to register for and require MFA
required
Exchange Online - Allows for a phased approach Admin UI available to disable basic
Authentication with disablement options per authentication at org-level but exceptions
Policies protocol require PowerShell
- No additional licensing
required
- Blocks basic authentication
pre-auth
Azure AD - Can be used to block all basic - Requires additional licensing (Azure AD
Conditional authentication for all protocols P1)
Access - Can be scoped to users, - Blocks basic authentication post-auth
groups, apps, etc.
- Can be configured to run in
report-only mode for additional
reporting
Resources
To learn more on how to block Basic authentication, check out the following articles:
Security Defaults:
It's recommended that you first investigate the impact on your tenant and users. Look
out for Message Center posts that either summarize your usage or report you don't have
any.
If you have usage, or are unsure, take a look at the Azure AD Sign-In report. More
information can be found here: New tools to block legacy authentication in your
organization - Microsoft Tech Community . The report can help you track down and
identify clients and devices using Basic authentication.
Once you have an idea of the users and clients you know are using Basic authentication,
come up with a remediation plan. That might mean upgrading client software,
reconfiguring apps, updating scripts, or reaching out to third-party app developers to get
updated code or apps.
Disable Basic authentication in
Exchange Online
Article • 02/22/2023
) Important
Effective from December 2022, the classic Exchange Admin Center will be
deprecated for worldwide customers. Microsoft recommends using the new
Exchange Admin Center , if not already doing so.
While most of the features have been migrated to new EAC, some have been
migrated to other admin centers and remaining ones will soon be migrated to New
EAC. Find features that are not yet there in new EAC at Other Features or use
Global Search that will help you navigate across new EAC.
7 Note
If you've reached this page because Basic authentication isn't working in your
tenant, and you haven't set up security defaults or authentication policies, then we
might have disabled Basic authentication in your tenant as part of our wider
program to improve security across Exchange Online. Check your Message Center
for any posts referring to Basic authentication, and read Basic Authentication and
Exchange Online for the latest announcements concerning Basic authentication.
Basic authentication in Exchange Online uses a username and a password for client
access requests. Blocking Basic authentication can help protect your Exchange Online
organization from brute force or password spray attacks. When you disable Basic
authentication for users in Exchange Online, their email clients and apps must support
modern authentication. Those clients are:
Outlook 2013 or later (Outlook 2013 requires a registry key change. For more
information, see Enable Modern Authentication for Office 2013 on Windows
devices.
Outlook 2016 for Mac or later
Outlook for iOS and Android
Mail for iOS 11.3.1 or later
If your organization has no legacy email clients, you can use authentication policies in
Exchange Online to disable Basic authentication requests. Disabling Basic authentication
forces all client access requests to use modern authentication. For more information
about modern authentication, see Using modern authentication with Office clients.
This topic explains how Basic authentication is used and blocked in Exchange Online,
and the corresponding procedures for authentication policies.
These authentication models are described in the following sections. For more
information, see Choose the right authentication method for your Azure Active Directory
hybrid identity solution.
Cloud authentication
The steps in cloud authentication are described in the following diagram:
1. The email client sends the username and password to Exchange Online.
2. Exchange Online sends the username and password to Azure Active Directory.
3. Azure Active Directory returns a user ticket to Exchange Online and the user is
authenticated.
Federated authentication
The steps in federated authentication are described in the following diagram:
1. The email client sends the username and password to Exchange Online.
2. Exchange Online sends the username and password to the on-premises IdP.
5. Azure Active Directory returns a user ticket to Exchange Online and the user is
authenticated.
When it's blocked, Basic authentication in Exchange Online is blocked at the first pre-
authentication step (Step 1 in the previous diagrams) before the request reaches Azure
Active Directory or the on-premises IdP. The benefit of this approach is brute force or
password spray attacks won't reach the IdP (which might trigger account lock-outs due
to incorrect login attempts).
Because authentication policies operate at the user level, Exchange Online can only
block Basic authentication requests for users that exist in the cloud organization. For
federated authentication, if a user doesn't exist in Exchange Online, the username and
password are forwarded to the on-premises IdP. For example, consider the following
scenario:
3. An email client sends a login request to Exchange Online with the username
ian@contoso.com. An authentication policy can't be applied to the user, and the
authentication request for ian@contoso.com is sent to the on-premises AD FS.
4. The on-premises AD FS can either accept or reject the authentication request for
ian@contoso.com. If the request is accepted, a SAML token is returned to
Exchange Online. As long as the SAML token's ImmutableId value matches a user
in Azure Active Directory, Azure AD will issue a user ticket to Exchange Online (the
ImmutableId value is set during Azure Active Directory Connect setup).
Typically, when you block Basic authentication for a user, we recommend that you block
Basic authentication for all protocols. However, you can use the AllowBasicAuth*
parameters (switches) on the New-AuthenticationPolicy and Set-AuthenticationPolicy
cmdlets to selectively allow or block Basic authentication for specific protocols.
For email clients and apps that don't support modern authentication, you need to allow
Basic authentication for the protocols and services that they require. These protocols
and services are described in the following table:
7 Note
Blocking Basic authentication will block app passwords in Exchange Online. For
more information about app passwords, see Create an app password .
What do you need to know before you begin?
Verify that modern authentication is enabled in your Exchange Online organization
(it's enabled by default). For more information, see Enable or disable modern
authentication for Outlook in Exchange Online.
Verify your email clients and apps support modern authentication (see the list at
the beginning of the topic). Also, verify that your Outlook desktop clients are
running the minimum required cumulative updates. For more information, see
Outlook Updates.
3. Wait 24 hours for the policy to be applied to users, or force the policy to be
immediately applied.
To create a policy that blocks Basic authentication for all available client protocols in
Exchange Online (the recommended configuration), use the following syntax:
PowerShell
PowerShell
Notes:
You can't change the name of the policy after you create it (the Name parameter
isn't available on the Set-AuthenticationPolicy cmdlet).
To enable Basic authentication for specific protocols in the policy, see the Modify
authentication policies section later in this topic. The same protocol settings are
available on the New-AuthenticationPolicy and Set-AuthenticationPolicy cmdlets,
and the steps to enable Basic authentication for specific protocols are the same for
both cmdlets.
The methods that you can use to assign authentication policies to users are described in
this section:
PowerShell
This example assigns the policy named Block Basic Auth to the user account
laura@contoso.com.
PowerShell
Filter user accounts by attributes: This method requires that the user accounts all
share a unique filterable attribute (for example, Title or Department) that you can
use to identify the users. The syntax uses the following commands (two to identify
the user accounts, and the other to apply the policy to those users):
PowerShell
PowerShell
Use a list of specific user accounts: This method requires a text file to identify the
user accounts. Values that don't contain spaces (for example, the Office 365 or
Microsoft 365 work or school account) work best. The text file must contain one
user account on each line like this:
akol@contoso.com
tjohnston@contoso.com
kakers@contoso.com
The syntax uses the following two commands (one to identify the user accounts,
and the other to apply the policy to those users):
PowerShell
This example assigns the policy named Block Basic Auth to the user accounts
specified in the file C:\My Documents\BlockBasicAuth.txt.
PowerShell
7 Note
To remove the policy assignment from users, use the value $null for the
AuthenticationPolicy parameter on the Set-User cmdlet.
PowerShell
PowerShell
This example immediately applies the authentication policy to multiple users that were
previously identified by filterable attributes or a text file. This example works if you're
still in the same PowerShell session and you haven't changed the variables you used to
identify the users (you didn't use the same variable name afterwards for some other
purpose). For example:
PowerShell
or
PowerShell
PowerShell
To view detailed information about a specific authentication policy, use this syntax:
PowerShell
This example returns detailed information about the policy named Block Basic Auth.
PowerShell
To enable Basic authentication for a specific protocol that's disabled, specify the
switch without a value.
To disable Basic authentication for a specific protocol that's enabled, you can only
use the value :$false .
You can use the Get-AuthenticationPolicy cmdlet to see the current status of the
AllowBasicAuth* switches in the policy.
This example enables basic authentication for the POP3 protocol and disables basic
authentication for the IMAP4 protocol in the existing authentication policy named Block
Basic Auth.
PowerShell
PowerShell
This example configures the authentication policy named Block Basic Auth as the default
policy.
PowerShell
7 Note
To remove the default authentication policy designation, use the value $null for
the DefaultAuthenticationPolicy parameter.
Use the following example to verify that a default authentication policy is configured.
PowerShell
PowerShell
Remove-AuthenticationPolicy -Identity <PolicyIdentity>
PowerShell
7 Note
Take into account that a default authentication policy could be already configured.
See Configure the default authentication policy for details.
1. Run the following command to find the distinguished name (DN) value of the
authentication policy:
PowerShell
PowerShell
For example:
PowerShell
Output
Behind the scenes, these settings use authentication policies. If authentication policies
were created in the past, modifying any of these selections will automatically create the
first new authentication policy. This policy is visible only through PowerShell. For
advanced customers that may already be using authentication policies, changes in the
Microsoft 365 admin center will modify their existing default policy. Look through Azure
AD Sign-in logs to see which protocols that clients are using before making any
changes.
Turning off Basic authentication in the Microsoft 365 admin center does not turn off the
following legacy services:
AllowBasicAuthOutlookService
AllowBasicAuthReportingWebServices
You can only turn off these settings in Exchange Online PowerShell.
1. Run the following command to find the name of the existing authentication policy:
PowerShell
Get-AuthenticationPolicy
2. Replace <AuthenticationPolicyName> with the value from the previous step, and
then run the following command:
PowerShell
3. The previous command affects any new mailboxes that you'll create, but not
existing mailboxes. To apply the policy to existing mailboxes, use the
<AuthenticationPolicyName> value in the following command:
PowerShell
Throughout this example, we'll use the Department attribute, because it's a common
attribute that identifies users based on their department and role. To see all Active
Directory user extended properties, go to Active Directory: Get-ADUser Default and
Extended Properties .
Step 1: Find the Active Directory users and set the Active
Directory user attributes
Run the following command in Active Directory PowerShell to return all groups in Active
Directory:
PowerShell
After you get the list of groups, you can query which users belong to those groups and
create a list based on any of their attributes. We recommend using the objectGuid
attribute because the value is unique for each user.
PowerShell
This example returns the objectGuid attribute value for the members of the group
named Developers.
PowerShell
After you identify the Active Directory group that contains the users, you need to set the
attribute value that will be synchronized with Exchange Online to filter users (and
ultimately disable Basic authentication for them).
Use the following syntax in Active Directory PowerShell to configure the attribute value
for the members of the group that you identified in the previous step. The first
command identifies the group members based on their objectGuid attribute value. The
second command assigns the Department attribute value to the group members.
PowerShell
This example sets the Department attribute to the value "Developer" for users that
belong to the group named "Developers".
PowerShell
Use the following syntax in Active Directory PowerShell to verify the attribute was
applied to the user accounts (now or in the past):
PowerShell
This example returns all user accounts with the value "Developer" for the Department
attribute.
PowerShell
7 Note
The attribute values for on-premises users are synchronized to Exchange Online
only for users that have a valid Exchange Online license. For more information, see
Add users individually or in bulk.
The Exchange Online PowerShell syntax uses the following commands (two to identify
the user accounts, and the other to apply the policy to those users):
PowerShell
$<VariableName1> = Get-User -ResultSize unlimited -Filter <Filter>
$<VariableName2> = $<VariableName1>.MicrosoftOnlineServicesID
$<VariableName2> | foreach {Set-User -Identity $_ -AuthenticationPolicy
"Block Basic Auth"}
This example assigns the policy named Block Basic Auth to all synchronized user
accounts whose Department attribute contains the value "Developer".
PowerShell
This example creates a new authentication policy named Marketing Policy that disables
Basic authentication for members of the Active Directory group named Marketing
Department for ActiveSync, POP3, authenticated SMTP, and IMAP4 clients.
7 Note
PowerShell
The new Outlook for Windows is enabled by default for all users with an Azure Active
Directory account and Exchange Online account. Following are the two controls in this
article that can be configured to enable or disable employee access to the new Outlook
for Windows.
1. Outlook Desktop registry key to enable or hide the New Outlook toggle.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Outlook on the web
mailbox policies" entry in the Feature permissions in Exchange Online article.
Tip
PowerShell
Name
Alias
Email address
User ID
This example disables the new Outlook for Windows for the specified user.
PowerShell
To enable the new Outlook for Windows for the mailbox, use the value $true for the
OneWinNativeOutlookEnabled parameter.
Filter mailboxes by attributes: This method requires that the mailboxes all share a
unique filterable attribute. For example:
Title, Department, or address information for user accounts as seen by the Get-
User cmdlet.
For more information, see Filterable Properties for the -Filter Parameter and Get-
Mailbox.
The syntax uses the following two commands: one command to identify the
mailboxes, and the other to enable or disable the new Outlook for Windows for
the mailbox:
PowerShell
$<VariableName> = <Get-User | Get-Mailbox> -ResultSize unlimited -
Filter <Filter>
$<VariableName> | foreach {Set-CASMailbox -Identity
$_.MicrosoftOnlineServicesID -OneWinNativeOutlookEnabled <$true |
$false>}
This example disables the new Outlook for Windows for all mailboxes whose Title
attribute contains "Vendor" or "Contractor".
PowerShell
Use a list of specific mailboxes: This method requires a text file to identify the
mailboxes. The text file must contain one mailbox on each line like this:
akol@contoso.com
ljohnston@contoso.com
kakers@contoso.com
The syntax uses the following two commands: one command to identify the
mailboxes, and the other to enable or disable the new Outlook for Windows for
the mailbox:
PowerShell
This example disables the new Outlook for Windows for the mailboxes specified in
the file C:\My Documents\Management.txt.
PowerShell
PowerShell
The value False for the OneWinNativeOutlookEnabled property means the new Outlook
for Windows is disabled for the mailbox. True or absence of value means it's enabled.
To verify if the new Outlook for Windows is enabled or disabled for all mailboxes, run
the following command to verify the value of the OneWinNativeOutlookEnabled property:
PowerShell
PowerShell
This example disables the new Outlook for Windows for all mailboxes within that
organization by setting the OneWinNativeOutlookEnabled flag to false on all OWAMailbox
Policies in the organization.
Enable or disable the Outlook Desktop New
Outlook toggle,
Use a registry key to hide or enable the "Try the new Outlook” toggle:
Registry Key:
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Options\General REG_DWORD
“HideNewOutlookToggle”
0 (default) - "Try the new Outlook” toggle, if available in selected update channel, is
displayed to users.
"Try the new Outlook” toggle is now in Current Channel and Monthly Enterprise
Channel (MEC). We'll update this article as the toggle becomes available in other
channels. The current estimate is SAEC-P in Fall 2023 and SAC January 2024. You can
also hide the toggle by setting the registry key to 1 prior to its availability.
The Outlook Team is implementing the setting as group policy (GPO) to be managed via
Cloud Policy. The policy functionality is expected to go into Current Channel in Version
2306 in the late June 2023 release and then into Monthly Enterprise Channel in the July
2023 timeframe.
FAQ
The user can choose to delete the account and use the new Outlook with another
account. The OneWinNativeOutlookEnabled parameter doesn't impact the "Try the new
Outlook" toggle in classic Outlook for Windows. IT Admins can manage the toggle
separately.
For example, they may want to allow users to try the new Outlook, but not have the
toggle visible in the classic Outlook.
7 Note
If the admin sets OneWinNativeOutlookEnabled to $false and the user toggles "Try
the new Outlook" to enable the New Outlook they will see an error similar to the
following: We ran into and error –
Microsoft.Exchange.Data.Storage.AccountDisabledException .
This depends on how the user is launching the new Outlook. If they're launching the
new Outlook via selecting the classic Outlook app icon, then they would be toggled out
of the new Outlook on next classic Outlook launch, so classic Outlook would start to
launch again.
If they're launching the new Outlook directly via the new Outlook executable (selecting
the new Outlook app icon), then they would continue to launch into the new Outlook
and it would appear that the new Outlook toggle was enabled--this is because we only
run the 'toggle out' logic when the classic Outlook sees the HideNewOutlookToggle
regkey is enabled on boot (the new Outlook is unaware of its existence).
So, it really depends on whether the user is launching classic Outlook as they normally
would or have pinned the new Outlook app icon and launch it from there.
Once the user decides to switch back, the new Outlook closes and the classic Outlook
launches. This happens immediately. These are two separate apps that are installed and
they both remain regardless of what you set the toggle to.
The toggle is used to switch quickly between the two apps and provide the Outlook
Team an opportunity to ask users for their feedback when they're switching back to
classic Outlook.
The reg key is separate from the OwaMailboxPolicy . The reg key is for the appearance of
the "Try the new Outlook" toggle in the classic Outlook, and the OwaMailboxPolicy
parameter OneWinNativeOutlookEnabled is for whether the work or school mailbox is
allowed to use the new Outlook client.
The classic Outlook doesn't have the ability to check the mailbox policy and thus these
are separate. Also, as mentioned above, there may be cases where IT Admins choose to
allow users to try the new Outlook, but don't want the "Try the new Outlook" toggle
itself appearing in the classic Outlook.
Remember there's also a similar toggle in the Windows Mail app (Universal) and soon
users are able to search for the new Outlook in the Microsoft/Windows Store and
download/install the app there.
So, in that sense, the reg key is targeted to classic Outlook, where the mailbox policy is
more focused to capture users who install the new Outlook from any location on any
device (whether personal or work).
Related articles:
Toggling out of the new Outlook for Windows preview
By default, Outlook on the web (formerly known as Outlook Web App) is enabled in
Exchange Online, and lets users access their mailbox from almost any web browser.
For information about client access mailbox methods in Exchange Online, see Clients
and mobile in Exchange Online.
In Exchange Online, Outlook on the web mailbox policies control the availability of
settings and features in Outlook on the web (formerly known as Outlook Web App). A
mailbox can only have one Outlook on the web mailbox policy applied to it. You can
create different policies for different types of users in your Exchange Online
organization.
Every Exchange Online organization has a default Outlook on the web mailbox policy
named OwaMailboxPolicy-Default that's applied to all user mailboxes. You can use this
policy or create additional policies as necessary to meet the needs of your organization.
For the procedures that you can do on Outlook on the web mailbox policies, see
Outlook on the web mailbox policy procedures in Exchange Online.
7 Note
All mailbox policies set for Outlook on the web will also affect new Outlook for
Windows.
Mailbox policy procedures in Exchange
Online for Outlook on the web and the
new Outlook for Windows
Article • 02/22/2023
Create a mailbox policy in Exchange Online for Outlook on the web and the new
Outlook for Windows
Apply or remove a mailbox policy on a mailbox in Exchange Online for Outlook on the
web and the new Outlook for Windows
Remove a mailbox policy from Exchange Online for Outlook on the web and the new
Outlook for Windows
View or configure mailbox policy properties for Outlook on the web and the new
Outlook for Windows
Create a mailbox policy in Exchange
Online for Outlook on the web and the
new Outlook for Windows
Article • 02/22/2023
You can create mailbox policies to apply settings to users in Outlook on the web
(formerly known as Outlook Web App) and the new Outlook for Windows. Outlook on
the web mailbox policies are useful for applying and standardizing settings, for example,
attachment settings, for specific groups of users.
For more information about Outlook on the web mailbox policies, see Outlook on the
web mailbox policies.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Outlook on the web
mailbox policies" entry in the Feature permissions in Exchange Online article.
To open the Exchange admin center (EAC), see Exchange admin center in Exchange
Online. To connect to Exchange Online PowerShell, see Connect to Exchange
Online PowerShell.
For information about keyboard shortcuts that may apply to the procedures in this
article, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
2. In the new policy window that opens, configure the following settings:
Use the check boxes to enable or disable features. By default, the most
common features are displayed. To see all features that can be enabled or
disabled, click More options.
Note: You can configure settings for individual users by using the Set-CASMailbox
cmdlet in Exchange Online PowerShell.
The following list contains the features you can configure when you create a mailbox
policy using the EAC for Outlook on the web and the new Outlook for Windows:
Communication management:
Instant messaging: if enabled, users have access to instant messaging
functionality such as the ability to send and receive instant messages, view
presence information for other users, and change their own presence
information.
Text messaging: when enabled, users can send and receive text messages and
create text message notification rules using Outlook on the web and the new
Outlook for Windows.
Exchange ActiveSync: if enabled, users can manage their linked mobile devices
using Options in Outlook on the web.
Contacts: if Enabled, users can use Contacts in Outlook on the web and the new
Outlook for Windows.
LinkedIn contact sync: if enabled, users will be able to add their LinkedIn
connections to their mailbox as contacts. When a user's connection updates
their information in LinkedIn, the contact will be automatically updated.
Mobile device contact sync: if enabled, users have access to personal contacts on
their devices outside of Outlook on the web.
All address lists: if enabled, users can view all address lists. If it's set to Disabled,
the user can only view the default global address list.
Information management:
Journaling: if enabled, the Journal folder will be visible in Outlook on the web
and the new Outlook for Windows.
Notes: if enabled, the Notes folder will be visible in Outlook on the web and the
new Outlook for Windows.
Inbox Rules: if enabled, a user can create and edit custom rules in Outlook on
the web and the new Outlook for Windows.
Recover deleted items if enabled, users can view items that have been deleted
from the Deleted Items folder and choose whether to recover them to the
Deleted Items folder or to delete them permanently using Outlook on the web
and the new Outlook for Windows.
Security:
Change password: if enabled, people can change their passwords by going to
Options in Outlook on the web and the new Outlook for Windows.
User experience:
Themes: if enabled, users can change the color scheme in Outlook on the web
and the new Outlook for Windows.
Premium client: if enabled, users can use the standard version of Outlook on the
web. If you clear the check box, users will be switched to the light version of
Outlook on the web and get a simplified experience.
Email signature: if enabled, users can create a custom signature and choose
whether to automatically include it in messages they send.
Weather: if enabled, users can see weather information on their calendar.
Places: if enabled, users can see location suggestions for meetings.
Local events: if enabled, users can see the events happening in their area.
Interesting calendars: if enabled, users can browse and add interesting
calendars.
Time management:
Calendar: if enabled, users can use the Calendar in Outlook on the web and the
new Outlook for Windows.
Tasks: if enabled, users can use Tasks in Outlook on the web and the new
Outlook for Windows.
Reminders and notifications: if enabled, users will receive new email notifications
and task and calendar reminders.
Select how users can view and access attachments from public or private
computers:
Public or shared computer - Direct file access: if enabled, users will be able to
open attachments by selecting them and then selecting Open.
Private computer or OWA for Devices - Direct file access: if enabled, users will be
able to open attachments by selecting them and then selecting Open.
Use Exchange Online PowerShell to create a
mailbox policy for Outlook on the web and the
new Outlook for Windows
In Exchange Online PowerShell, creating a mailbox policy for Outlook on the web and
the new Outlook for Windows is a two-step process:
PowerShell
This example creates a mailbox policy for Outlook on the web and the new
Outlook for Windows named Executives.
PowerShell
For more information, see [Use Exchange Online PowerShell to modify mailbox
policies for Outlook on the web and the new Outlook for Windows](configure-
outlook-web-app-mailbox-policy-properties.md#use-exchange-online-powershell-
to-modify-mailbox-policies-for-outlook-on-the web-and-the-new-outlook-for-
windows).
In the EAC, click Permissions > Outlook Web App Policies, and look for your new
mailbox policy.
To verify that you've successfully created a mailbox policy for Outlook on the web and
the new Outlook for Windows, do either of the following steps:
In the EAC, click Permissions > Outlook Web App Policies, and verify the policy is
listed. You can select the policy and click Edit to verify the properties of the
policy.
In Exchange Online PowerShell, run the following command to verify the policy is
listed:
PowerShell
In Exchange Online PowerShell, replace <Policy Name> with the name of the
policy, and run the following command to verify the settings:
PowerShell
Next steps
To modify an existing Outlook on the web mailbox policy, see View or configure Outlook
on the web mailbox policy properties in Exchange Online.
Apply or remove mailbox policy on a
mailbox in Exchange Online for Outlook
on the web and the new Outlook for
Windows
Article • 02/22/2023
Assigning an Outlook on the web mailbox policy to a mailbox controls the Outlook on
the web (formerly known as Outlook Web App) and new Outlook for Windows
experience for the user. You can apply Outlook on the web mailbox policies to one or
more mailboxes or remove the policy assignments in the Exchange admin center (EAC)
or Exchange Online PowerShell.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Outlook on the web
mailbox policies" entry in the Feature permissions in Exchange Online article.
To open the Exchange admin center (EAC), see Exchange admin center in Exchange
Online. To connect to Exchange Online PowerShell, see Connect to Exchange
Online PowerShell.
For information about keyboard shortcuts that may apply to the procedures in this
article, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
c. In the Outlook Web App mailbox policy policy window that opens, click
Browse to find and select the policy to apply, and then click OK when
you're finished. By default, the default policy named OwaMailboxPolicy-
Default is applied.
a. In the Details pane, find Outlook on the web and click Assign a policy.
b. In the bulk assign window that opens, click Browse to find and select the
policy to apply, and then click OK when you're finished.
PowerShell
PowerShell
Filter mailboxes by attributes: This method requires that the mailboxes all share a
unique filterable attribute. For example:
Title, Department, or address information for user accounts as seen by the Get-
User cmdlet.
The syntax uses the following two commands (one to identify the mailboxes, and
the other to apply the policy to the mailboxes):
PowerShell
PowerShell
This example assigns the policy named Managers and Executives to all mailboxes
whose Title attribute contains "Manager" or "Executive".
PowerShell
PowerShell
akol@contoso.com
ljohnston@contoso.com
kakers@contoso.com
The syntax uses the following two commands (one to identify the user accounts,
and the other to apply the policy to those users):
PowerShell
PowerShell
This example assigns the policy named Managers and Executives to the mailboxes
specified in the file C:\My Documents\Management.txt.
PowerShell
PowerShell
In the EAC, go to Recipients > Mailboxes and select the mailbox. In the Details
pane, go to Email Connectivity, click View details, and verify the name of the
policy in the Outlook Web App mailbox policy window that appears.
In the EAC, go to Recipients > Mailboxes, select the mailbox, and click Edit . In
the properties of the mailbox window that opens, click Mailbox features. In the
Email connectivity section under Outlook on the web: Enabled, click View details,
and verify the name of the policy in the Outlook Web App mailbox policy window
that appears.
PowerShell
In Exchange Online PowerShell, run the following command to verify the value of
the OwaMailboxPolicy property for all mailboxes:
PowerShell
2. Scroll down in the details pane to Email Connectivity and click View details.
If a mailbox policy has been assigned, click Clear X to remove the policy
assignment from the mailbox.
PowerShell
This example removes the mailbox policy from mailbox of the user tony@contoso.com
for Outlook on the web and the new Outlook for Windows.
PowerShell
In the EAC, go to Recipients > Mailboxes and select the mailbox. In the Details
pane, go to Email Connectivity, click View details, and verify the policy is blank in
the Outlook Web App mailbox policy window that appears.
In the EAC, go to Recipients > Mailboxes. In the properties of the mailbox window
that opens, click Mailbox features. In the Email connectivity section under
Outlook on the web: Enabled, click View details, and verify the policy is blank in
the Outlook Web App mailbox policy window that appears.
PowerShell
PowerShell
You can remove a mailbox policy from Outlook on the web (formerly known as an
Outlook Web App mailbox policy) and the new Outlook for Windows using either the
Exchange admin center (EAC) or Exchange Online PowerShell.
For additional management tasks related to Outlook on the web mailbox policies, see
Outlook on the web mailbox policies.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Outlook on the web
mailbox policies" entry in the Feature permissions in Exchange Online article.
To open the Exchange admin center (EAC), see Exchange admin center in Exchange
Online. To connect to Exchange Online PowerShell, see Connect to Exchange
Online PowerShell.
For information about keyboard shortcuts that may apply to the procedures in this
article, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
2. In the confirmation window that appears, click Yes to remove the mailbox policy, or
click No to cancel.
PowerShell
This example removes the mailbox policy named Sales Associates from Outlook on the
web and the new Outlook for Windows.
PowerShell
In the EAC, go to Permissions > Outlook Web App policies and verify the policy is
no longer listed.
In Exchange Online PowerShell, run the following command to verify the policy is
no longer listed:
PowerShell
Get-OwaMailboxPolicy
View or configure mailbox policy
properties in Exchange Online for
Outlook on the web and the new
Outlook for Windows
Article • 02/22/2023
After you create a mailbox policy for Outlook on the web and the new Outlook for
Windows, you can configure a variety of options to control the features available to
users in Outlook on the web (formerly known as Outlook Web App) and the new
Outlook for Windows. For example, you can enable or disable Inbox rules or create a list
of allowed file types for attachments.
For more information about mailbox policies for Outlook on the web and the new
Outlook for Windows, see Outlook on the web mailbox policies.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Outlook on the web
mailbox policies" entry in the Feature permissions in Exchange Online article.
To open the Exchange admin center (EAC), see Exchange admin center in Exchange
Online. To connect to Exchange Online PowerShell, see Connect to Exchange
Online PowerShell.
For information about keyboard shortcuts that may apply to the procedures in this
article, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
2. The Details pane shows the enabled features in the policy. To see more
information, click Edit . In the properties window that opens you can view and
configure the following settings:
On the General tab, you can view and edit the name of the policy.
On the Features tab, use the check boxes to enable or disable features. By
default, the most common features are displayed. To see all features that can
be enabled or disabled, click More options.
7 Note
You can configure settings for individual users by using the Set-
CASMailbox cmdlet in Exchange Online PowerShell.
On the File Access tab, use the Direct file access check boxes to configure
the file access and viewing options for users. File access lets a user open or
view the contents of files attached to an email message.
File access can be controlled based on whether a user has signed in on a public or
private computer. The option for users to select private computer access or public
computer access is available only when you're using forms-based authentication.
All other forms of authentication default to private computer access.
On the Offline access tab, use the option buttons to configure offline access
availability.
PowerShell
PowerShell
PowerShell
This example retrieves detailed information for the policy named Executives.
PowerShell
In Exchange Online PowerShell, replace <Policy Name> with the name of the
policy, and run the following command to verify the settings:
PowerShell
The Outlook app for iOS and Android is designed to bring together email, calendar,
contacts, and other files, enabling users in your organization to do more from their
mobile devices. This article provides an overview of the architecture, so that
administrators can deploy and maintain Outlook for iOS and Android in their
organizations.
7 Note
The Outlook for iOS and Android Help Center is available for users, including
help for using the app on specific devices and troubleshooting information.
The Microsoft 365- or Office 365-based architecture provides the following benefits:
1. Data locality: User mailbox data stays in place, and therefore continues to respect
the data locality and regionality promises of Microsoft 365 or Office 365 for data at
rest. In other words, the user's mailbox data is stored within the region in which
the tenant (or mailbox in the case of a Multi-Geo tenant) is located.
2. Device ID: Each Outlook for iOS and Android connection registers in the Microsoft
365 or Office 365 Admin console and is able to be managed as a unique
connection.
3. Modern Authentication (OAuth): Outlook for iOS and Android leverages Modern
Authentication (OAuth) to protect user's credentials. Modern authentication
provides Outlook for iOS and Android with a secure mechanism to access
Microsoft 365 or Office 365 data without ever touching a user's credentials. At sign
in, the user authenticates directly against an identity platform (either Azure AD or
an on-premises identity provider like ADFS) and receives an access token in return,
which grants Outlook for iOS and Android access to the user's mailbox or files. At
no time does the service have access to the user's password in any form.
Within the Microsoft 365- or Office 365-based architecture, Outlook for iOS and
Android uses the native Microsoft sync technology as the protocol for data
synchronization.
1. Eliminates middle tier services: Data synchronization with the native Microsoft
sync technology occurs between the app and Microsoft 365 or Office 365,
eliminating the need for any middle tier services.
2. Latency reduction: By replacing the proprietary Outlook device API and Stateless
Protocol Translator, there is a reduction in end-to-end latency between the app
and Microsoft 365 or Office 365.
5. Unlocking new features: The native Microsoft sync technology will enable Outlook
for iOS and Android to take advantage of native Microsoft 365 or Office 365
features it does not support today, such as S/MIME, sensitivity labels, and shared
mailboxes. These and more Microsoft 365 or Office 365 features will roll out soon
after the architecture update.
How to use Outlook on the web
(formerly know as Outlook Web App)
and the new Outlook for Windows to
remotely wipe an ActiveSync device in
Microsoft 365
Article • 02/22/2023
Introduction
This article describes how to use Outlook on the web (formerly known as Outlook Web
App OWA) and the new Outlook for Windows to remotely wipe a mobile device in
Microsoft 365.
To remotely wipe a mobile device in Outlook on the web or the new Outlook for
Windows, the mobile device must be connected to Exchange Online by using Microsoft
Exchange ActiveSync. If you lose the mobile device, you can use the remote wiping
feature to prevent someone from obtaining your personal information from the device.
Procedure
To remotely wipe a device by using Outlook Web App or Outlook on the web, follow
these steps:
More information
Still need help? Go to Microsoft Community .
Public attachment handling in Exchange
Online
Article • 02/22/2023
As an admin, you can set up both private and public attachment handling in Outlook on
the web (formerly known as Outlook Web App) depending on how you configure your
Outlook on the web mailbox policies. The settings for private (internal) and public
(external) networks define how users can open, view, send, or receive attachments
depending on whether a user is signed in to Outlook on the web on a computer that is
part of a private or of a public network.
The Outlook on the web mailbox policy parameters in the following table should be set
to $true to enable an admin to control attachment handling for public computers and
networks.
Parameter* Description
Verify that cookies have been enabled in the Web browser for all of the users in
your organization.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
Task 1 - Enable public attachment handling for
your organization
Run the following command:
PowerShell
Note: Setting this parameter to $true won't affect the settings for the following
parameters:
ForceWacViewingFirstOnPublicComputers
WSSAccessOnPublicComputersEnabled
UNCAccessOnPublicComputersEnabled
2. In AD FS console tree, under AD FS\Trust Relationships > Relying Party Trusts and
select O365 Identity Platform.
3. In O365 Identity Platform, click Edit Claim Rules > Add Rule > Issuance
Transform Rules.
4. On the Select Rule Template page, under Claim rule template, select Send Claims
Using a Custom Rule from the list, and then click Next.
5. On the Configure Rule page under Claim rule name type the display name for this
rule.
text
exists ([Type ==
"http://schemas.microsoft.com/2012/01/requestcontext/claims/x-ms-
proxy"]) => issue(Type =
"http://schemas.microsoft.com/ws/2012/01/insidecorporatenetwork", Value
= "false");
text
8. Click Finish.
9. In the Edit Claim Rules dialog box, click OK to save the rule.
2. In the result pane, click the mailbox policy you want to view or configure, and click
Edit.
3. On File Access, use the check boxes to configure the file access and viewing
options for users. File access lets a user open or view the contents of files attached
to an email message.
File access can be controlled based on whether a user has logged on to a public or
private computer. The option for users to select private computer access or public
computer access is available only when you're using forms-based authentication.
All other forms of authentication default to private computer access.
Direct file access: Select this check box if you want to enable direct file access.
Direct file access lets users open files attached to email messages.
PowerShell
.avi
.bmp
.doc
.doc
.docm
.docx
.gif
.jpeg
.mp3
.one
.pdf
.png
.ppsm
.ppsx
.ppt
.pptm
.pptx
.pub
.rpmsg
.rtf
.tif
.txt
.vsd
.wav
.wma
.wmv
.xls
.xls
.xlsb
.xlsm
.xlsx
Modify the space used by Inbox rules in
Exchange Online
Article • 02/22/2023
Inbox rules in Outlook on the web (formerly known as Outlook Web App) and the
Outlook desktop apps are limited to 256 KB total for all rules. Each rule you create will
take up space in your mailbox. The actual amount of space a rule uses depends on
several factors, such as how long the name is and how many conditions you've applied.
When you reach the 256 KB limit, you'll be warned that you can't create any more rules
or that you can't update a rule. You can't increase the amount of space that's allocated
to store Inbox rules in Exchange Online, but you can decrease it to suit your business
needs.
Notes:
The valid range for the Inbox rules quota is 32 KB to 256 KB.
The quota for Inbox rules applies only to enabled rules. There's no restriction on
the number of disabled rules that a mailbox can have. However, the total size of
rules that are enabled or active in the mailbox can't exceed the quota value
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Mailbox settings" entry in
the Feature permissions in Exchange Online article.
You can only use Exchange Online PowerShell to perform the procedure in this
article. To connect to Exchange Online PowerShell, see Connect to Exchange Online
PowerShell.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
Use Exchange Online PowerShell to increase
the limit for Inbox rules
There are three basic methods you can use to modify the rules quota for a mailbox:
PowerShell
This example decreases the rules quota to 200 KB for the user
douglas@contoso.com.
PowerShell
Filter mailboxes by attributes: This method requires that the mailboxes all share a
unique filterable attribute. For example:
Title, Department, or address information for user accounts as seen by the Get-
User cmdlet.
The syntax uses the following two commands (one to identify the mailboxes, and
the other to apply the rules quota to the mailboxes):
PowerShell
PowerShell
This example decreases the rules quota to 32 KB to all mailboxes whose Title
attribute contains "Vendor" or "Contractor".
PowerShell
PowerShell
Use a list of specific mailboxes: This method requires a text file to identify the
mailboxes. Values that don't contain spaces (for example, the user account) work
best. The text file must contain one user account on each line like this:
akol@contoso.com
tjohnston@contoso.com
kakers@contoso.com
The syntax uses the following two commands (one to identify the user accounts,
and the other to apply the rules quota to those users):
PowerShell
PowerShell
This example decreases the rules quota to 150 KB to the mailboxes specified in the
file C:\My Documents\Junior Managers.txt.
PowerShell
PowerShell
Replace <MailboxIdentity> with the name, alias, email address, or account name of
the mailbox, and run the following command to verify the value of the RulesQuota
property:
PowerShell
Run the following command to verify the value of the RulesQuota property for all
mailboxes:
PowerShell
When you create a forwarding rule, you can add more than one address to forward
to. The number of addresses you can forward may be limited, depending on the
settings for your account. If you add more addresses than are allowed, your
forwarding rule won't work. If you create a forwarding rule with more than one
address, test it to be sure it works.
Outlook for iOS and Android in
Exchange Online
Article • 02/22/2023
The Outlook app for iOS and Android is designed to bring together email, calendar,
contacts, and other files, enabling users in your organization to do more from their
mobile devices. This article provides an overview of the architecture, so that
administrators can deploy and maintain Outlook for iOS and Android in their
organizations.
7 Note
The Outlook for iOS and Android Help Center is available for users, including
help for using the app on specific devices and troubleshooting information.
The Microsoft 365- or Office 365-based architecture provides the following benefits:
1. Data locality: User mailbox data stays in place, and therefore continues to respect
the data locality and regionality promises of Microsoft 365 or Office 365 for data at
rest. In other words, the user's mailbox data is stored within the region in which
the tenant (or mailbox in the case of a Multi-Geo tenant) is located.
2. Device ID: Each Outlook for iOS and Android connection registers in the Microsoft
365 or Office 365 Admin console and is able to be managed as a unique
connection.
3. Modern Authentication (OAuth): Outlook for iOS and Android leverages Modern
Authentication (OAuth) to protect user's credentials. Modern authentication
provides Outlook for iOS and Android with a secure mechanism to access
Microsoft 365 or Office 365 data without ever touching a user's credentials. At sign
in, the user authenticates directly against an identity platform (either Azure AD or
an on-premises identity provider like ADFS) and receives an access token in return,
which grants Outlook for iOS and Android access to the user's mailbox or files. At
no time does the service have access to the user's password in any form.
Within the Microsoft 365- or Office 365-based architecture, Outlook for iOS and
Android uses the native Microsoft sync technology as the protocol for data
synchronization.
1. Eliminates middle tier services: Data synchronization with the native Microsoft
sync technology occurs between the app and Microsoft 365 or Office 365,
eliminating the need for any middle tier services.
2. Latency reduction: By replacing the proprietary Outlook device API and Stateless
Protocol Translator, there is a reduction in end-to-end latency between the app
and Microsoft 365 or Office 365.
5. Unlocking new features: The native Microsoft sync technology will enable Outlook
for iOS and Android to take advantage of native Microsoft 365 or Office 365
features it does not support today, such as S/MIME, sensitivity labels, and shared
mailboxes. These and more Microsoft 365 or Office 365 features will roll out soon
after the architecture update.
Outlook for iOS and Android in
Exchange Online: FAQ
Article • 02/22/2023
) Important
Effective from December 2022, the classic Exchange Admin Center will be
deprecated for worldwide customers. Microsoft recommends using the new
Exchange Admin Center , if not already doing so.
While most of the features have been migrated to new EAC, some have been
migrated to other admin centers and remaining ones will soon be migrated to New
EAC. Find features that are not yet there in new EAC at Other Features or use
Global Search that will help you navigate across new EAC.
Summary: This article covers the most common questions asked by customers and
administrators about using Outlook for iOS and Android with Exchange Online and
Microsoft 365 or Office 365.
The Outlook for iOS and Android app is designed to enable users in your organization
to do more from their mobile devices, by bringing together email, calendar, contacts,
and other files. The following sections highlight the most common questions we receive,
across three key areas:
Managing and maintaining Outlook for iOS and Android in your Exchange
organization after it has been deployed
Common questions from end users who access information in your Exchange
organization with the Outlook for iOS and Android app on their mobile devices
Background synchronization in Outlook for iOS and Android can also be temporarily
disabled by the following actions:
Not opening the app for a given period of time. iOS will automatically freeze third-
party apps , like Outlook, based on usage patterns. Android doze mode and app
standby features can also prevent background updates to the app while those
features are active.
On some Android devices, you can also restrict background processing or network
access per-app. In these cases, Outlook for Android will not be able to process
updates in the background. Android device manufacturers can modify the way you
can interact with settings, therefore it is not possible to document every device
scenario, but in general, the following steps can be followed to remove battery
optimization:
1. Open Settings.
2. Tap Battery.
5. For the Microsoft Authenticator, Intune Company Portal and Outlook apps,
tap Not optimized to turn off battery optimization.
New mail notifications will continue to be delivered, however, upon launching the
app, the new messages will have to be downloaded.
Calendar reminders will fire for appointments that have been canceled because the
app was unable to download and process the meeting cancellation.
7 Note
Apple allows its native Mail and Calendar apps to do background refreshes without
any restrictions. Therefore, users may notice a difference in the background
synchronization experience between the apps. However, this also results in
improved battery life and less data consumption with Outlook for iOS.
Intune uses a different device ID. The basic workflow for how Intune assigns a device ID
is described in App-based conditional access with Intune. In Intune, the device ID is
assigned when the device workplace joins for all device-conditional access scenarios.
This ID is an AAD-generated unique ID for the device. Intune uses that unique ID when
sending compliance information, and ADAL uses that unique ID when authenticating to
services.
In cases where Outlook for iOS and Android receives protected messages and prompts
end users to use an RM client to open the file, it means that Exchange hasn't decrypted
the message, which is due to an issue on the Exchange side.
7 Note
Outlook for iOS uses iOS's native preview technology to quickly expose
attachments to end users. iOS's preview technology does not support rights
management and will report error "The operation couldn't be completed.
(OfficeImportErrorDomain error 912)" when a user attempts to open a rights-
protected attachment. Users will need to tap the respective Word, Excel, or
PowerPoint app icon to open the rights-protected attachment in the native app.
In addition, for users using the native Microsoft sync technology, a Teams Join button is
available in calendar events. This provision makes it easy to Join a Teams meeting and
will be available for all coexistence modes. Users who are not using the native Microsoft
sync technology will be able to join Teams Meetings using the weblink in the meeting
description.
For more information on the Teams coexistence modes, see Choose your upgrade
journey from Skype from Business to Teams.
Q: What ports and end points does Outlook for iOS and
Android use?
Outlook for iOS and Android communicates via TCP port 443. The app accesses various
end points, depending on the activities of the user. Complete information is available in
URLs and IP address ranges.
Outlook for iOS and Android will consume the proxy configuration as defined by the
platform operating system. Typically, this configuration information is deployed via a
PAC file. The PAC file must be configured to use hostnames instead of protocol; no extra
custom settings are supported. For a list of hostnames that Outlook for iOS and Android
accesses, see URLs and IP address ranges.
For tenants that have not been migrated to the native Microsoft sync technology, the
following extra requirement applies:
Supports and has SOCKS proxy capability enabled. The Outlook for iOS and
Android client utilizes TCP connections to our Microsoft 365- or Office 365-based
architecture. The IP ranges for the SOCKS connections are not restricted to a
subset of Azure IP ranges, which means that customers cannot define an allowlist
range. The PAC must be configured to use hostnames instead of protocol and
return the SOCKS proxy information given the host URL; no extra custom settings
are supported.
A shared mailbox is a special mailbox type that is created using the -Shared parameter.
Access to the shared mailbox by a user is obtained via permissions and not by using
alternate credentials. For more information, see Shared mailboxes in Exchange Online.
For information on consumer accounts, see Outlook's in-app support FAQ on People .
By enabling contact synchronization between Outlook and the native contacts app,
users receive the rich experience that the native operating system provides (for example,
inbound and outbound caller-ID, text messaging name resolution, and so on). Only
Outlook for iOS should be used for managing contact data and not the native iOS
Contacts app. With Outlook for Android, users can utilize either the native Contacts app
or Outlook for managing contact data, as contact changes are synchronized bi-
directionally.
7 Note
In order to manage contacts (add/edit/delete) in Outlook for Android, contact sync
must be enabled. This is because Outlook for Android delegates CRUD operations
to the native Contacts app.
The Google Play Store is not available in China. However, Microsoft has distributed the
Outlook for Android app in the following third-party app stores that are available in
China:
Baidu
Xiaomi
Tencent (QQ)
Huawei
Lenovo
Wandoujia
Once your tenant is migrated, a user will not switch to the native Microsoft sync
technology, until after they launch/resume Outlook for iOS and Android.
PowerShell
The ClientType property indicates which data sync protocol is in use. If the value is
REST, then the client is utilizing the REST API. If the value is Outlook, then the client is
using the native Microsoft sync technology.
Alternatively, a user can log in to Outlook on the web and, from within Options, select
Mobile Devices to view the details of a mobile device. Like the cmdlet, the user can see
the value for the ClientType property.
Administrating and monitoring Outlook for iOS
and Android in your organization
The following questions are about managing and monitoring the Outlook for iOS and
Android app within your organization after the app has been deployed.
Customers with a Microsoft Premier agreement can open support cases with Customer
Service & Support (CSS). Instead of having the user initiate an in-app support ticket, the
user can use Collect Diagnostics to upload the logs and share the incident ID with
CSS/Premier. Collect Diagnostics will capture data from Outlook for iOS and Android,
Authenticator, and the Company Portal and upload all the relevant logs to Microsoft.
Microsoft Support Escalation Engineers can use the incident ID to access the diagnostic
logs and troubleshoot the user's issue.
1. Within Outlook for iOS and Android's settings, tap Help & Feedback.
1. Check whether you have an EWS application policy that restricts which client
applications can connect.
2. Check whether you have EWS enabled for the account.
For more information, see Securing Outlook for iOS and Android in Exchange Online. If
one of the above checks doesn't resolve the issue, open an in-app support ticket.
If you are seeing an inconsistency and it has not been resolved after a short period of
time, wait for 24 hours and then restart the app to trigger the reconciliation process. If
that does not work, perform the following steps:
Unlike iOS, Android uses an accessible file system, so when Outlook for Android
downloads an attachment, it doesn't go into the database, rather it is stored as a
temporary file.
The list of people displayed as part of the Other Colleagues list under Show
Organization is based on common email distribution lists, group memberships, and
degrees of separation in the Organization structure defined in Azure Active Directory.
If you do not have organization chart data exposed in the app, consult with your
directory administrator. There are two main scenarios to consider:
2. Your company only uses Azure Active Directory for directory management. You will
need to update Azure Active Directory with the organization chart information,
either directly in the directory or via your Human Resources system. This data will
be accessible via the Global Address List in Exchange Online.
Q: Why are tasks and notes not available with Outlook for
iOS and Android?
Microsoft's strategic direction for task management and note taking on mobile devices
is the To-Do and OneNote apps, respectively. OneNote provides access to notes stored
in an Exchange Online mailbox with Sticky Notes. To-Do provides integration with the
tasks stored in Exchange Online mailboxes; however, Outlook for iOS and Android
provides users the ability to create tasks from messages and exposes top tasks in the
Zero Query search pane.
Summary: How users with modern authentication-enabled accounts can quickly set up
their Outlook for iOS and Android accounts in Exchange Online.
Modern authentication
Modern authentication is an umbrella term for a combination of authentication and
authorization methods that include:
For information on token lifetimes, see Configurable token lifetimes in Microsoft identity
platform. Token lifetime values can be adjusted; for more information, see Configure
authentication session management with conditional access. If you choose to reduce
token lifetimes, you can also reduce the performance of Outlook for iOS and Android,
because a smaller lifetime increases the number of times the application must acquire a
fresh access token.
A previously granted access token is valid until it expires. The identity model being
utilized for authentication will have an impact on how password expiration is handled.
There are three scenarios:
1. For a federated identity model, the on-premises identity provider needs to send
password expiry claims to Azure Active Directory, otherwise, Azure Active Directory
will not be able to act on the password expiration. For more information, see
Configure AD FS to Send Password Expiry Claims.
Upon token expiration, the client will attempt to use the refresh token to obtain a new
access token, but because the user's password has changed, the refresh token will be
invalidated (assuming directory synchronization has occurred between on-premises and
Azure Active Directory). The invalidated refresh token will force the user to
reauthenticate in order to obtain a new access token and refresh token pair.
AutoDetect
Outlook for iOS and Android offers a solution called AutoDetect that helps end-users
quickly setup their accounts. AutoDetect will first determine which type of account a
user has, based on the SMTP domain. Account types that are covered by this service
include Microsoft 365, Office 365, Outlook.com, Google, Yahoo, and iCloud. Next,
AutoDetect will make the appropriate configurations to the app on the user's device
based on that account type. This solution saves time for users and eliminates the need
for manual input of configuration settings like hostname and port number.
For modern authentication, which is used by all Microsoft 365 or Office 365 accounts
and on-premises accounts using hybrid modern authentication, AutoDetect queries
Exchange Online for a user's account information and then configures Outlook for iOS
and Android on the user's device so that the app can connect to Exchange Online.
During this process, the only information required from the user is their SMTP address
and credentials.
If AutoDetect fails for a user, the following images show an alternative account
configuration path using manual configuration:
Single sign-on
All Microsoft apps that use the Microsoft Authentication Library (MSAL) support single
sign-on. In addition, single sign-on is also supported when the apps are used with either
the Microsoft Authenticator or Microsoft Company Portal apps.
Tokens can be shared and reused by other Microsoft apps (such as Word mobile) under
the following scenarios:
1. When the apps are signed by the same signing certificate, and use the same
service endpoint or audience URL (such as the Microsoft 365 or Office 365 URL). In
this case, the token is stored in app shared storage.
2. When the apps use or support single sign-on with a broker app, and the tokens
are stored within the broker app. Microsoft Authenticator is an example of a broker
app. In the broker app scenario, after you attempt to sign in to Outlook for iOS
and Android, MSAL will launch the Microsoft Authenticator app, which will make a
connection to Azure Active Directory to obtain the token. It will then hold on to
the token and reuse it for authentication requests from other apps, for as long as
the configured token lifetime allows.
If a user is already signed in to another Microsoft app on their device, like Word or
Company Portal, Outlook for iOS and Android will detect that token and use it for its
own authentication. When such a token is detected, users adding an account in Outlook
for iOS and Android will see the discovered account available as "Found" under
Accounts on the Settings menu. New users will see their account in the initial account
setup screen.
The following images show an example of account configuration via single sign-on for a
first-time user:
If a user already has Outlook for iOS and Android, such as for a personal account, but a
Microsoft 365 or Office 365 account is detected because they recently enrolled, the
single-sign on path will look as follows:
For users enrolled in Microsoft Intune, you can deploy the account configuration
settings using Intune in the Azure portal.
Once account setup configuration has been set up in the UEM provider and the user
enrolls their device, Outlook for iOS and Android will detect that an account is "Found"
and will then prompt the user to add the account. The only information the user needs
to enter to complete the setup process is their password. Then, the user's mailbox
content will load and the user can begin using the app.
For more information on the account setup configuration keys needed to enable this
functionality, see the Account setup configuration section in Deploying Outlook for iOS
and Android App Configuration Settings.
For more information on the settings that need to be configured to deploy Organization
Allowed Accounts mode, see the Organization allowed accounts mode section in
Deploying Outlook for iOS and Android App Configuration Settings.
7 Note
) Important
1. The first policy allows Outlook for iOS and Android, and it blocks OAuth capable
Exchange ActiveSync clients from connecting to Exchange Online. See "Step 1 -
Configure an Azure AD conditional access policy for Exchange Online", but for the
fifth step, select "Require device to be marked as compliant", "Require approved
client app", and "Require all the selected controls".
2. The second policy prevents Exchange ActiveSync clients using basic authentication
from connecting to Exchange Online. See "Step 2 - Configure an Azure AD
conditional access policy for Exchange Online with Active Sync (EAS)."
Managing Outlook for iOS and Android
in Exchange Online
Article • 02/22/2023
Summary: This article describes best practices for managing mobile devices with
Outlook for iOS and Android in Exchange Online.
Outlook for iOS and Android provides users the fast, intuitive email and calendar
experience users expect from a modern mobile app, while being the only app to provide
support for the best features of Microsoft 365 and Office 365. In addition, Microsoft
provides a number of utilities for managing and protecting company data on mobile
devices in your Exchange Online organization.
7 Note
For implementation details on each of these three options, see Securing Outlook
for iOS and Android in Exchange Online.
Microsoft recommends that customers use the features of the Enterprise Mobility +
Security suite to protect corporate data on mobile devices, due to the advanced
capabilities provided by these services.
) Important
When the user authenticates in Outlook for iOS and Android, Exchange Online
mobile device access rules (allow, block, or quarantine) are skipped if there are any
Azure Active Directory conditional access policies applied to the user that include:
Cloud app condition: Exchange Online or Office 365
Device platform condition: iOS and/or Android
Client apps condition: Mobile apps and desktop client
One of the following Grant access controls: Require device to be marked as
compliant, Require approved client app or Require app protection policy
7 Note
When using mobile device cmdlets such as Get-MobileDevice to check the status of
a device, the timestamp for Outlook for iOS and Android synchronization, indicated
by the LastSyncTime property, may be up to 15 minutes behind the actual time of
synchronization. While device synchronization does occur in real time, the returned
time stamp may lag behind.
7 Note
While the Enterprise Mobility + Security suite subscription includes licenses for
both Microsoft Intune and Azure Active Directory, customers can purchase
Microsoft Intune licenses and Azure Active Directory Premium licenses separately.
All users must be licensed to leverage the conditional access and Intune app
protection policies discussed in this article.
Conditional access is a capability of Azure Active Directory that enables you to enforce
controls on the access to apps in your environment based on specific conditions from a
central location. By using conditional access policies, you can apply the right access
controls under the required conditions. Azure Active Directory conditional access
provides you with added security when such security is needed, and it stays out of your
users' way when it isn't.
Key features of the Enterprise Mobility + Security suite with Outlook for iOS and
Android:
Conditional access. Azure Active Directory ensures that Exchange Online email can
be accessed only when the conditional access requirements are met. For more
information on device enrollment, see Conditional access in Azure Active Directory.
Intune app protection. Outlook for iOS and Android allows you to protect your
corporate data with Intune app protection policies. This is a great option for "bring
your own device" (BYOD) scenarios where you want to keep corporate data safe
without managing a user's devices. For more information on Intune app protection
policies, see Protect app data using mobile app management policies with
Microsoft Intune.
Device enrollment. Intune lets you manage your workforce's devices and apps,
and how they access your company data. In this model, Outlook for iOS and
Android ensures that Exchange Online email can be accessed only on phones and
tablets that are managed by your company and are compliant with your
organization's policy. When users log on to the Outlook app on an unmanaged
mobile device, Outlook prompts users to enroll the device in Intune by leveraging
the Azure conditional access policy, and then validates that the device meets
organizational standards of device compliance.
Selective wipe. Microsoft Intune can remove email data from Outlook for iOS and
Android, while leaving any personal email accounts intact (whether the device is
enrolled or not). This is an increasingly important requirement as more businesses
adopt a "bring your own device" approach to phones and tablets.
Outlook for iOS and Android fully supports the capabilities provided by Basic Mobility
and Security for Microsoft 365.
Manage settings and features on your devices with Microsoft Intune policies
Instructions for your end-users to enroll a device in Basic Mobility and Security:
Enroll your mobile device using Basic Mobility and Security
Third-party providers can also deploy certain app configuration settings, like account
setup, organization allowed accounts mode, and general app configuration settings, to
Outlook for iOS and Android; for more information, please see Deploying Outlook for
iOS and Android app configuration settings.
In order to manage and protect corporate data within the app (such as restricting
actions with corporate data like cut, copy, paste, and "save as"), customers will need to
use Microsoft's Enterprise Mobility + Security suite.
Using Mobile Device Access and Mobile Device Mailbox
Policies
Microsoft recommends that customers use either the Enterprise Mobility + Security
suite or the built-in Basic Mobility and Security for Microsoft 365 to manage company
data on mobile devices, due to the advanced capabilities provided by those services.
Outlook for iOS and Android does support mobile device access and mobile device
mailbox policies (formerly known as Exchange Active Sync policies), which are available
through the Exchange admin center.
Outlook for iOS and Android supports the following Exchange mobile device mailbox
policy settings:
Password enabled
Allow Bluetooth (used to manage the Outlook for Android wearable app when
Intune App Protection Policies are not in use)
For information on how to create or modify an existing mobile device mailbox policy,
see Mobile device mailbox policies in Exchange Online.
Exchange administrators can also initiate a remote device wipe against Outlook for iOS
and Android using Exchange admin center. Upon receiving the remote wipe request, the
app will remove the Outlook profile and all data associated with it.
7 Note
Outlook for iOS and Android only supports the Wipe Data remote wipe command
and does not support Account Only Remote Wipe Device as defined in the
Exchange admin center. For more information on how to perform a remote wipe,
see Perform a remote wipe on a mobile phone.
For more about Microsoft Intune see Documentation for Microsoft Intune.
Securing Outlook for iOS and Android in
Exchange Online
Article • 02/22/2023
Outlook for iOS and Android provides users the fast, intuitive email and calendar
experience that users expect from a modern mobile app, while being the only app to
provide support for the best features of Microsoft 365 or Office 365.
If, on the other hand, you don't want to use Outlook for iOS and Android in your
organization, see Blocking Outlook for iOS and Android.
7 Note
See Exchange Web Services (EWS) application policies later in this article if you'd
rather implement an EWS application policy to manage mobile device access in
your organization.
For devices that are not enrolled in an UEM solution, users need to install:
Outlook for iOS and Android via the Apple App Store or Google Play Store
Microsoft Authenticator app via the Apple App Store or Google Play Store
Intune Company Portal app via Apple App Store or Google Play Store
Once the app is installed, users can follow these steps to add their corporate email
account and configure basic app settings:
Optimizing the Outlook mobile app for your iOS or Android phone
) Important
) Important
7 Note
While the Enterprise Mobility + Security suite subscription includes both Microsoft
Intune and Azure Active Directory Premium, customers can purchase Microsoft
Intune licenses and Azure Active Directory Premium licenses separately. All users
must be licensed in order to leverage the conditional access and Intune app
protection policies that are discussed in this article.
Block all email apps except Outlook for iOS and Android
using conditional access
When an organization decides to standardize how users access Exchange data, using
Outlook for iOS and Android as the only email app for end users, they can configure a
conditional access policy that blocks other mobile access methods. To do this, you will
need several conditional access policies, with each policy targeting all potential users.
These policies are described in Conditional Access: Require approved client apps or app
protection policy.
1. Follow the steps in Require approved client apps or app protection policy with
mobile devices. This policy allows Outlook for iOS and Android, but blocks OAuth
and basic authentication capable Exchange ActiveSync mobile clients from
connecting to Exchange Online.
7 Note
This policy ensures mobile users can access all Microsoft 365 endpoints using
the applicable apps.
2. Follow the steps in Block Exchange ActiveSync on all devices, which prevents
Exchange ActiveSync clients using basic authentication on non-mobile devices
from connecting to Exchange Online.
The above policies leverages the grant access control Require app protection
policy, which ensures that an Intune App Protection Policy is applied to the
associated account within Outlook for iOS and Android prior to granting access. If
the user isn't assigned to an Intune App Protection Policy, isn't licensed for Intune,
or the app isn't included in the Intune App Protection Policy, then the policy
prevents the user from obtaining an access token and gaining access to messaging
data.
3. Follow the steps in How to: Block legacy authentication to Azure AD with
Conditional Access to block legacy authentication for other Exchange protocols on
iOS and Android devices; this policy should target only Office 365 Exchange Online
cloud app and iOS and Android device platforms. This ensures mobile apps using
Exchange Web Services, IMAP4, or POP3 protocols with basic authentication
cannot connect to Exchange Online.
7 Note
After the conditional access policies are enabled, it may take up to 6 hours for any
previously connected mobile device to become blocked.
When the user authenticates in Outlook for iOS and Android, Exchange Online
mobile device access rules (allow, block, or quarantine) are skipped if there are any
Azure Active Directory conditional access policies applied to the user that include:
The APP data protection framework is organized into three distinct configuration levels,
with each level building off the previous level:
Enterprise basic data protection (Level 1) ensures that apps are protected with a
PIN and encrypted and performs selective wipe operations. For Android devices,
this level validates Android device attestation. This is an entry level configuration
that provides similar data protection control in Exchange Online mailbox policies
and introduces IT and the user population to APP.
Enterprise enhanced data protection (Level 2) introduces APP data leakage
prevention mechanisms and minimum OS requirements. This is the configuration
that is applicable to most mobile users accessing work or school data.
Enterprise high data protection (Level 3) introduces advanced data protection
mechanisms, enhanced PIN configuration, and APP Mobile Threat Defense. This
configuration is desirable for users that are accessing high risk data.
To see the specific recommendations for each configuration level and the minimum
apps that must be protected, review Data protection framework using app protection
policies.
1. They include all Microsoft mobile applications, such as Edge, OneDrive, Office, or
Teams, as this will ensure that users can access and manipulate work or school data
within any Microsoft app in a secure fashion.
2. They are assigned to all users. This ensures that all users are protected, regardless
of whether they use Outlook for iOS or Android.
For more information on the available settings, see Android app protection policy
settings in Microsoft Intune and iOS app protection policy settings.
) Important
To apply Intune app protection policies against apps on Android devices that are
not enrolled in Intune, the user must also install the Intune Company Portal. For
more information, see What to expect when your Android app is managed by app
protection policies.
A global admin must complete the following steps to activate and set up enrollment.
See Set up Basic Mobility and Security for complete steps. In summary, these steps
include:
1. Activating Basic Mobility and Security by following the steps in the Microsoft 365
Security Center.
3. Creating device policies and apply them to groups of users. When you do this,
your users will get an enrollment message on their device. And when they've
completed enrollment, their devices will be restricted by the policies you've set up
for them.
7 Note
Policies and access rules created in Basic Mobility and Security will override both
Exchange mobile device mailbox policies and device access rules created in the
Exchange admin center. After a device is enrolled in Basic Mobility and Security, any
Exchange mobile device mailbox policy or device access rule that is applied to that
device will be ignored.
Password enabled
Allow Bluetooth (used to manage the Outlook for Android wearable app)
For information on how to create or modify an existing mobile device mailbox policy,
see Mobile device mailbox policies in Exchange Online.
In addition, Outlook for iOS and Android supports Exchange Online's device-wipe
capability. With Outlook, a remote wipe only wipes data within the Outlook app itself
and does not trigger a full device wipe. For more information on how to perform a
remote wipe, see Perform a remote wipe on a mobile phone in Exchange Online.
Device access policy
Outlook for iOS and Android should be enabled by default, but in some existing
Exchange Online environments the app may be blocked for a variety of reasons. Once
an organization decides to standardize how users access Exchange data and use
Outlook for iOS and Android as the only email app for end users, you can configure
blocks for other email apps running on users' iOS and Android devices. You have two
options for instituting these blocks within Exchange Online: the first option blocks all
devices and only allows usage of Outlook for iOS and Android; the second option allows
you to block individual devices from using the native Exchange ActiveSync apps.
7 Note
Because device IDs are not governed by any physical device ID, they can change
without notice. When this happens, it can cause unintended consequences when
device IDs are used for managing user devices, as existing 'allowed' devices may be
unexpectedly blocked or quarantined by Exchange. Therefore, we recommend
administrators only set mobile device access policies that allow/block devices
based on device type or device model.
Option 1: Block all email apps except Outlook for iOS and Android
You can define a default block rule and then configure an allow rule for Outlook for iOS
and Android, and for Windows devices, using the following Exchange Online PowerShell
commands. This configuration will prevent any Exchange ActiveSync native app from
connecting, and will only allow Outlook for iOS and Android.
PowerShell
PowerShell
Alternatively, you can block native Exchange ActiveSync apps on specific Android and
iOS devices or other types of devices.
1. Confirm that there are no Exchange ActiveSync device access rules in place that
block Outlook for iOS and Android:
PowerShell
If any device access rules that block Outlook for iOS and Android are found, type
the following to remove them:
PowerShell
2. You can block most Android and iOS devices with the following commands:
PowerShell
PowerShell
Get-MobileDevice | Select-Object DeviceOS,DeviceModel,DeviceType |
Export-CSV c:\temp\easdevices.csv
4. Create additional block rules, depending on your results from Step 3. For example,
if you find your environment has a high usage of HTCOne Android devices, you can
create an Exchange ActiveSync device access rule that blocks that particular device,
forcing the users to use Outlook for iOS and Android. In this example, you would
type:
PowerShell
7 Note
Additional resources:
New-ActiveSyncDeviceAccessRule
Get-MobileDevice
Set-ActiveSyncOrganizationSettings
Option A: Block mobile device access on both the iOS and Android platforms
Option B: Block mobile device access on a specific mobile device platform
Option A: Block mobile device access on both the iOS and Android
platforms
If you want to prevent mobile device access for all users, or a subset of users, using
conditional access, follow these steps.
Create conditional access policies, with each policy either targeting all users or a subset
of users via a security group. Details are in Azure Active Directory app-based conditional
access.
1. The first policy blocks Outlook for iOS and Android and other OAuth capable
Exchange ActiveSync clients from connecting to Exchange Online. See "Step 1 -
Configure an Azure AD conditional access policy for Exchange Online," but for the
fifth step, choose Block access.
If you want to prevent a specific mobile device platform from connecting to Exchange
Online, while allowing Outlook for iOS and Android to connect using that platform,
create the following conditional access policies, with each policy targeting all users.
Details are in Azure Active Directory app-based conditional access.
1. The first policy allows Outlook for iOS and Android on the specific mobile device
platform and blocks other OAuth capable Exchange ActiveSync clients from
connecting to Exchange Online. See "Step 1 - Configure an Azure AD conditional
access policy for Exchange Online," but for step 4a, select only the desired mobile
device platform (such as iOS) to which you want to allow access.
2. The second policy blocks the app on the specific mobile device platform and other
OAuth capable Exchange ActiveSync clients from connecting to Exchange Online.
See "Step 1 - Configure an Azure AD conditional access policy for Exchange
Online," but for step 4a, select only the desired mobile device platform (such as
Android) to which you want to block access, and for step 5, choose Block access.
Option A: Block Outlook for iOS and Android on both the iOS and Android
platforms
Option B: Block Outlook for iOS and Android on a specific mobile device platform
Every Exchange organization has different policies regarding security and device
management. If an organization decides that Outlook for iOS and Android doesn't meet
their needs or is not the best solution for them, administrators have the ability to block
the app. Once the app is blocked, mobile Exchange users in your organization can
continue accessing their mailboxes by using the built-in mail applications on iOS and
Android.
The values for each characteristic are displayed in the following table:
DeviceModel Outlook for iOS and Android Outlook for iOS and Android
Option A: Block Outlook for iOS and Android on both the iOS and
Android platforms
With the New-ActiveSyncDeviceAccessRule cmdlet, you can define a device access rule,
using either the DeviceModel or DeviceType characteristic. In both cases, the access rule
blocks Outlook for iOS and Android across all platforms, and will prevent any device, on
both the iOS platform and Android platform, from accessing an Exchange mailbox via
the app.
The following are two examples of a device access rule. The first example uses the
DeviceModel characteristic; the second example uses the DeviceType characteristic.
PowerShell
PowerShell
PowerShell
PowerShell
The following example shows how to add the user-agent strings to the EWS allow list:
PowerShell
PowerShell
Managing add-ins
Outlook for iOS and Android lets users integrate popular apps and services with the
email client. Add-ins for Outlook are available on the web, Windows, Mac, and mobile.
Since add-ins are managed via Microsoft 365 or Office 365, users are able to share data
and messages between Outlook for iOS and Android and the unmanaged add-in (even
when the account is managed by an Intune App Protection policy), unless add-ins are
turned off for the user within the Microsoft 365 admin center.
If you want to stop your end users from accessing and installing Outlook add-ins (which
affects all Outlook clients), execute the following changes to roles in the Microsoft 365
admin center:
To prevent users from installing Office Store add-ins, remove the My Marketplace
role from them.
To prevent users from side loading add-ins, remove the My Custom Apps role from
them.
To prevent users from installing all add-ins, remove both, My Custom Apps and My
Marketplace roles from them.
For more information, please see Add-ins for Outlook and how to Manage deployment
of add-ins in the Microsoft 365 admin center.
Deploying Outlook for iOS and Android app configuration
settings in Exchange Online
Article • 05/23/2023
Summary: How to customize the behavior of Outlook for iOS and Android in your Exchange organization.
Outlook for iOS and Android supports app settings that allow unified endpoint management (UEM) administrators (using tools such as
Microsoft Endpoint Manager) and Microsoft 365 or Office 365 administrators to customize the behavior of the app.
App configuration can be delivered either through the mobile device management OS channel on enrolled devices (Managed App
Configuration channel for iOS or the Android in the Enterprise channel for Android or through the Intune App Protection Policy
(APP) channel. Outlook for iOS and Android supports the following configuration scenarios:
) Important
For configuration scenarios that require device enrollment on Android, the devices must be enrolled in Android Enterprise, and
Outlook for Android must be deployed via the managed Google Play store. For more information, see Set up enrollment of
Android work profile devices and Add app configuration policies for managed Android devices.
Each configuration scenario highlights its specific requirements for example, whether the configuration scenario requires device
enrollment, and thus works with any UEM provider, or requires Intune App Protection Policies. The following flowchart outlines which
channel needs to be used for the above configuration scenarios:
7 Note
With Microsoft Endpoint Manager, app configuration delivered through the mobile device management OS channel is referred to as
a Managed Devices App Configuration Policy (ACP); app configuration delivered through the App Protection Policy (APP) channel is
referred to as a Managed Apps App Configuration Policy.
Account configuration scenarios
Outlook for iOS and Android offers administrators the following app configuration scenarios with enrolled devices:
These configuration scenarios only work with enrolled devices. However, any UEM provider is supported. If you aren't using Microsoft
Endpoint Manager, you need to refer your UEM documentation on how to deploy these settings. For more information on the
configuration keys, see Configuration keys.
7 Note
If an App Protection Policy is targeted to the users, the recommendation is to deploy the general app configuration settings in a
Managed Apps device enrollment model. This deployment ensures the App Configuration Policy is deployed to both enrolled
devices and unenrolled devices.
Open Links in Edge On Users will be prompted to open links in Edge. Admins now have the option to disable this feature App Default
for their company.
Focused Inbox On Focused Inbox separates your inbox into two tabs, Focused and Other. Your most important App default
emails are on the Focused tab while the rest remains easily accessible (but out of the way) on the
Other tab.
Require Biometrics Off Biometrics, such as TouchID or FaceID, can be required for users to access the app on their device. Disable
to access the app When required, biometrics is used in addition to the authentication method selected in this
profile.
This setting is only available for Outlook for iOS.
If using App Protection Policies, Microsoft recommends disabling this setting to prevent dual
access prompts.
Save (or Sync) Off Saving contacts to the mobile device's native address book allows new calls and text messages to Enable
Contacts be linked with the user's existing Outlook contacts.
The user must grant access to the native Contacts app for contact synchronization to occur.
Sync Calendars Off Outlook for Android provides users the ability to synchronize Outlook calendar data with the App default
native Calendar app.
The user must grant access to the native Calendar app for calendar synchronization to occur.
External Recipients On p>If the sender adds a recipient that's external or adds a distribution group that contains external App default
MailTip recipients, the External Recipients MailTip is displayed. This MailTip informs senders if a message
they're composing will leave the organization, helping them make the correct decisions about
wording, tone, and content.
Exchange Online MailTipsExternalRecipientsTipsEnabled parameter must be set to $true for
Outlook for iOS and Android to see the External Recipients MailTip. For more information, see
MailTips.
Block external Off When Block external images is enabled, the app prevents the download of images hosted on the Enable
images Internet which are embedded in the message body by default (The user can still choose to
download the images.).
Default app On Indicates whether the app uses its default signature, "Get Outlook for [OS]", during message App default
signature composition, if a custom signature isn't defined. Users can add their own signatures even when
the default signature is disabled.
Suggested replies On By default, Outlook for iOS and Android suggests replies in the quick reply compose window. If App default
you select a suggested reply, you can edit the reply before sending it.
Recommendations On The Recommendations feed is powered by Microsoft Graph and provides a feed of your App default
feed organization's Office files connected to the people in your organization. This feature is located in
the Recommended section within the Search experience and only shows documents to which the
user has access. Recommendations based on insights from other users in the organization can be
controlled through the itemInsights setting.
Organize mail by On By default, Outlook for iOS and Android collates related emails into a single threaded App default
thread conversation view.
Play My Emails On By default, Play My Emails is promoted to eligible users via a banner in the inbox. App default
Text Predictions On By default, Outlook for iOS and Android can suggest words and phrases as you compose App default
messages.
Themes On By default, Outlook for iOS and Android supports visual themes that can be enabled for certain App default
beliefs or events.
Louder Mandatory Off Organizations have mandatory labeling enabled without default labeling, and would like to have App default
labeling the label selection first before going to compose the email. Then when the users click Send, the
email could just be sent without any forgotten labeling pop ups. Outlook mobile will introduce a
new MDM setting (com.microsoft.outlook.Mail.LouderMandatoryLabelEnabled) to allow admins
Setting Default Notes Recommended
app configuration
behavior
to enable this louder mandatory configuration for Outlook mobile clients (iOS and Android)
specifically.
Settings that are security-related in nature have an additional option, Allow user to change setting. For these settings (Save Contacts,
Block external images, and Require Biometrics to access the app), organizations can prevent the user from changing the app's
configuration. The organization's configuration can't be overridden.
Allow user to change setting doesn't change the app's behavior. For example, if the admin enables Block external images and prevents a
user change, then by default, external images aren't downloaded in messages; however, the user can manually download the images for
that message body.
The following conditions describe Outlook's behavior when implementing various app configurations:
If the admin configures a setting with its default value, and the app is configured with the default value, then the admin's
configuration doesn't have any effect. For example, if the admin sets External recipients MailTip=on, the default value is also on, so
Outlook's configuration doesn't change.
If the admin configures a setting with the non-default value and the app is configured with the default value, then the admin's
configuration is applied. For example, the admin sets Focused Inbox=off, but app default value is on, so Outlook's configuration for
Focused Inbox is off.
If the user has configured a non-default value, but the admin has configured a default value and allows user choice, then Outlook
retains the user's configured value. For example, the user has enabled contact synchronization, but the admin sets Save
Contacts=off and allows user choice, so Outlook keeps contact synchronization on and doesn't break caller-ID for user.
If the admin disables user choice, Outlook always enforces the admin-defined configuration, regardless of the user's configuration
or default app configuration. For example, the user has enabled contact synchronization, but the admin sets Save Contacts=off and
disables user choice, so contact synchronization gets disabled and the user is prevented from enabling it.
After the app configuration is applied, if the user changes the setting value to not match the admin desired value (and user choice
is allowed), then the user's configuration is retained. For example, Block external images is off by default, admin set Block external
images=on, but afterwards, user changes Block external images back to off. In this scenario, Block external images remains off the
next time the policy is applied.
Users are alerted to configuration changes via a notification toast in the app:
This notification toast will automatically dismiss after 10 seconds. There are two scenarios where this notification toast won't appear:
If the app has previously shown the notification in the last hour.
If the app has been installed in less than 24 hours.
Save Contacts
The Save Contacts setting is a special case scenario because unlike the other settings, this setting requires user interaction: the user
needs to grant Outlook permissions to access the native Contacts app and the data stored within. If the user doesn't grant access, then
contact synchronization can't be enabled.
7 Note
With Android Enterprise, administrators can configure the default permissions assigned to the managed app. Within the policy, you
can define that Outlook for Android is granted READ_CONTACTS and WRITE_CONTACTS within the work profile; for more
information on how to assign permissions, see Add app configuration policies for managed Android devices. When assigning
default permissions, it's important to understand which Android Enterprise deployment models are in use, as the permissions
may grant access to personal data.
When enabling Outlook for Android's Save Contacts within Android Enterprise's work profile, Outlook for Android is limited in only
being able to access the native Contacts app within the work profile context; this limitation in accessibility provides a clear
separation between work and personal profile data. However, Android Enterprise allows for the dialer and messaging apps within
the personal profile to access the local contacts within the work profile. This behavior is enabled by default, but can be controlled
via device restrictions; for more information, see Android Enterprise device settings to allow or restrict features using Intune. It's
possible that some dialer or messaging apps, whether pre-installed by the device manufacturer or installed from the Play Store,
don't properly support this capability.
The workflow for enabling Save Contacts is the same for new accounts and existing accounts.
1. The user is notified that the administrator has enabled contact synchronization. In Outlook for iOS, the notification occurs within
the app, whereas in Outlook for Android, a persistent notification is delivered via the Android notification center.
2. If the user taps on the notification, the user is prompted to grant access:
3. If the user allows Outlook to access the native Contacts app, access is granted, and contact synchronization is enabled. If the user
denies Outlook access to the native Contacts app, then the user is prompted to go into the OS settings and enable contact
synchronization:
4. In the event the user denies Outlook access to the native Contacts app and dismisses the previous prompt, the user may later
enable access by navigating to the account configuration within Outlook and tapping Open Settings:
Calendar Sync
7 Note
Calendar sync enables users to synchronize their Outlook for Android calendar data with the native Android Calendar app. Calendar sync
is off by default and requires user participation. ] Like Save Contacts, the Sync Calendars setting is another special case scenario because
this setting requires user interaction: the user needs to grant Outlook permissions to access the native Calendar app and the data stored
within. If the user doesn't grant access, then calendar synchronization can't be enabled.
7 Note
With Android Enterprise, administrators can configure the default permissions assigned to the managed app. Within the policy, you
can define that Outlook for Android is granted READ_CALENDAR and WRITE_CALENDAR within the work profile; for more
information on how to assign permissions, see Add app configuration policies for managed Android devices. When assigning
default permissions, it's important to understand which Android Enterprise deployment models are in use, as the permissions
may grant access to personal data.
When enabling Outlook for Android's Sync Calendar within Android Enterprise's work profile, Outlook for Android is limited in only
being able to access the native Calendar app within the work profile context; this limitation in accessibility provides a clear
separation between work and personal profile data.
S/MIME scenarios
On enrolled devices, Outlook for iOS and Android supports automated certificate delivery. Outlook for iOS and Android also supports
app configuration settings that enable or disable S/MIME in the app, as well as the user's ability to change the setting. For more
information on how to deploy these settings via Microsoft Endpoint Manager, see Understanding S/MIME. For more information on the
configuration keys, see Configuration keys.
These settings can be deployed to the app regardless of device enrollment status. For more information on the configuration keys, see
Configuration keys.
Outlook for iOS and Android has designed its notifications to enable users to triage email and alert users to upcoming meetings,
including incorporating Time to Leave suggestions. Mail notifications include the sender's address, the subject of the message, and a
short message preview of the message body. Calendar reminders include the subject, location, and start time of the meeting.
Recognizing that these notifications may include sensitive data, organizations can use an Intune App Protection Policy setting, Org Data
Notifications to remove the sensitive data. As this is an App Protection Policy setting, it applies on all devices (phones, tablets, and
wearables) of the user for the apps that support the setting. For more information on the setting, see iOS App Protection Policy settings
and Android App Protection Policy settings.
In addition to the App Protection Policy setting, Outlook for iOS and Android has a data protection App Configuration Policy setting,
Calendar Notifications that provides additional flexibility with calendar notifications – organizations can block sensitive information in
mail notifications, while allowing sensitive information in calendar notifications. After all, users might just need to know where they're
going and when they should leave, at a glance.
The following table outlines the notification experience in Outlook for iOS and Android based on the combination of the App Protection
and App Configuration policy settings:
Allow (default) Not Configured (default) Default client behavior where sensitive data is exposed in mail and calendar notifications
Block Not Configured Sensitive data is exposed in mail and calendar notifications as Outlook ignores the block
setting
Org Data Notifications Calendar Notifications Notification behavior
value value
Block Org Data Not Configured Sensitive data isn't available in mail or calendar notifications
Block Org Data Allowed Sensitive data isn't available in mail notifications
Calendar notifications expose sensitive data
Configure Contact Field Sync to native Contacts for Outlook for iOS and Android
The settings allow organizations to control the contact fields that synchronize between Outlook on iOS and Android and the native
Contacts apps.
7 Note
Outlook for Android supports bi-directional contact synchronization. However, if a user edits a field in the native contacts app that
is restricted (such as the Notes field), then that data won't synchronize back into Outlook for Android.
With Intune App Protection Policies, the setting Sync policy managed app data with native apps or add-ins defines whether Save
Contacts, Sync Calendars, and Add-ins are available for use within the work or school account. By default, this setting is set to Allow.
If this setting is set to Block, Save Contacts, Sync Calendars, and Add-ins are disabled for the work or school account and their
associated App Configuration Policy settings are ignored.
When the Intune App Protection Policy setting Sync policy managed app data with native apps or add-ins is set to Allow,
organizations can also choose to define the availability of Sync Calendars through a managed apps App Configuration Policy. This
flexibility allows for feature granularity control from a data protection perspective; for example, organizations can enable Save
Contacts (by setting Sync policy managed app data with native apps or add-ins to Allow) but disable Sync Calendars (by setting
the Allow Calendar Sync setting within a managed apps App Configuration Policy to Off).
Finally, if organizations allow the availability of Sync Calendars, through an App Configuration Policy setting Sync Calendars,
organizations can define the default sync state of calendar sync. This setting removes the need for the user to enable calendar
synchronization manually.
With Intune App Protection Policies, the setting Sync policy managed app data with native apps or add-ins defines whether Save
Contacts, Sync Calendars, and Add-ins are available for use within the work or school account. By default, this setting is set to Allow.
If this setting is set to Block, Save Contacts, Sync Calendars, and Add-ins are disabled for the work or school account and their
associated App Configuration Policy settings are ignored.
When the Intune App Protection Policy setting Sync policy managed app data with native apps or add-ins is set to Allow,
organizations can also choose to define the availability of Add-ins through a managed apps App Configuration Policy. This flexibility
allows for feature granularity control from a data protection perspective; for example, organizations can enable Save Contacts (by
setting Sync policy managed app data with native apps to Allow) but disable Add-ins (by setting the Allow Add-ins setting within
a managed apps App Configuration Policy to Off).
) Important
When configuring add-ins for your users, issues can occur when add-in policies are set in both Microsoft Intune and the Microsoft
365 Admin Center. We recommend choosing between add-in policy in Microsoft Intune or the Microsoft 365 Admin Center but not
both at the same time. For granular add-in control, the Microsoft 365 Admin Center provides more specific configurations than
Microsoft Intune, so you can choose which solution best fits your organization needs.
Deploying configuration scenarios with Microsoft Endpoint Manager for
enrolled devices
Microsoft Endpoint Manager enables administrators to easily deploy these settings to Outlook for iOS and Android via App
Configuration Policies.
The following steps allow you to create an app configuration policy. After the configuration policy is created, you can assign its settings
to groups of users.
7 Note
Intune notifies the enrolled device to check in with the Intune service for policy changes. The notification times vary, including
immediately up to a few hours. For more information, see Common questions, issues, and resolutions with device policies and
profiles in Microsoft Intune.
) Important
When deploying app configuration policies to managed devices, issues can occur when multiple policies have different values for
the same configuration key and are targeted for the same app and user. These issues are due to the lack of a conflict resolution
mechanism for resolving the differing values. You can prevent these issues by ensuring that only a single app configuration policy
for managed devices is defined and targeted for the same app and user.
Create a managed devices app configuration policy for Outlook for iOS and Android
1. Log in to Microsoft Endpoint Manager .
3. On the App Configuration policies blade, choose Add and select Managed devices to start the app configuration policy creation
flow.
4. On the Basics section, enter a Name, and optional Description, for the app configuration settings.
6. If Android Enterprise is selected as the platform, for Profile Type, choose All Profile Types.
7. For Targeted app, choose Select app, and then, on the Associated app blade, choose Microsoft Outlook. Click OK.
7 Note
If Outlook isn't listed as an available app, then you must add it by following the instructions in Assign apps to Android work
profile devices with Intune and Add iOS store apps to Microsoft Intune.
8. Click Next to complete the basic settings of the app configuration policy.
9. On the Settings section, select Use configuration designer for the Configuration settings format.
10. If you want to deploy account setup configuration, select Yes for Configure email account settings and configure appropriately:
7 Note
If an App Protection Policy is targeted to the users, the recommendation is to deploy the general app configuration settings in
a Managed Apps device enrollment model instead of using Managed devices. This method ensures the App Configuration
Policy is deployed to both enrolled devices and unenrolled devices.
For Authentication type, select Modern authentication. This setting is required for Microsoft 365 or Office 365 accounts or
on-premises accounts using hybrid modern authentication.
For Username attribute from AAD, select User Principal Name.
For Email address attribute from AAD, select Primary SMTP Address.
If you want to configure Outlook for iOS and Android such that only the work or school account can be used, select Require
for Allow only work or school accounts. This configuration will only allow a single corporate account to be added to Outlook
for iOS and Android.
11. If you want to deploy general app configuration settings, configure the desired settings accordingly:
For Focused Inbox, choose from the available options: Not configured (default), On (app default), and Off.
For Require Biometrics to access the app, choose from the available options: Not configured (default), On, and Off (app
default). When selecting On or Off, administrators can choose to allow the user to change the app setting's value. Select Yes
(app default) to allow the user to change the setting or select No if you want to prevent the user from changing the setting's
value. This setting is only available in Outlook for iOS.
) Important
If the account is protected by an Intune App Protection Policy that requires a PIN to access the protected account, then
the Require Biometrics to access the app setting should be disabled, otherwise the user is prompted with multiple
authentication prompts when accessing the app.
For Save Contacts, choose from the available options: Not configured (default), On, and Off (app default). When selecting On
or Off, administrators can choose to allow the user to change the app setting's value. Select Yes (app default) to allow the user
to change the setting or select No if you want to prevent the user from changing the setting's value.
For Suggested Replies, choose from the available options: Not configured (default), On (app default), and Off. When
selecting On or Off, administrators can choose to allow the user to change the app setting's value. Select Yes (app default) to
allow the user to change the setting or select No if you want to prevent the user from changing the setting's value.
For Recommendations feed, choose from the available options: Not configured (default), On (app default), and Off.
For External recipients MailTip, choose from the available options: Not configured (default), On (app default), and Off.
For Default app signature, choose from the available options: Not configured (default), On (app default), and Off.
For Block external images, choose from the available options: Not configured (default), On, and Off (app default). When
selecting On or Off, administrators can choose to allow the user to change the app setting's value. Select Yes (app default) to
allow the user to change the setting or select No if you want to prevent the user from changing the setting's value.
For Organize mail by thread, choose from the available options: Not configured (default), On (app default), and Off.
For Play My Emails, choose from the available options: Not configured (default), On (app default), and Off.
For Themes, choose from the available options: Not configured (default), On (app default), and Off.
For Sync Calendars, choose from the available options: Not configured (default), On (app default), and Off. When selecting
On or Off, administrators can choose to allow the user to change the app setting's value. Select Yes (app default) to allow the
user to change the setting or select No if you want to prevent the user from changing the setting's value. This feature is only
available in Outlook for Android.
For Text Predictions, choose from the available options: Not configured (default), On (app default), and Off. When selecting
On or Off, administrators can choose to allow the user to change the app setting's value. Select Yes (app default) to allow the
user to change the setting or select No if you want to prevent the user from changing the setting's value.
12. If you want to configure S/MIME settings, see Outlook for iOS automated certificate delivery or Outlook for Android automated
certificate delivery.
14. On the Assignments section, select Select groups to include. Select the Azure AD group to which you want to assign the app
configuration policy, and then select Select.
16. On the Review + Create section, review the settings configured and select Create.
The newly created configuration policy is displayed on the App configuration blade.
7 Note
For Managed devices, you will need to create a separate app configuration policy for each platform. Also, Outlook will need to be
installed from the Company Portal for the configuration settings to take effect.
7 Note
Microsoft Endpoint Manager managed apps will check-in with an interval of 30 minutes for Intune App Configuration Policy status,
when deployed in conjunction with an Intune App Protection Policy. If an Intune App Protection Policy isn't assigned to the user,
then the Intune App Configuration Policy check-in interval is set to 720 minutes.
Create a managed apps app configuration policy for Outlook for iOS and Android
1. Log in to Microsoft Endpoint Manager .
3. On the App Configuration policies blade, choose Add and select Managed apps.
4. On the Basics section, enter a Name, and optional Description, for the app configuration settings.
5. For Public apps, choose Select public apps, and then, on the Targeted apps blade, choose Outlook by selecting both the iOS and
Android platform apps. Click Select to save the selected public apps.
6. Click Next to complete the basic settings of the app configuration policy.
8. If you want to deploy general app configuration settings, configure the desired settings accordingly:
For Focused Inbox, choose from the available options: Not configured (default), Yes (app default), and No.
For Require Biometrics to access the app, choose from the available options: Not configured (default), Yes, and No (app
default). When selecting Yes or No, administrators can choose to allow the user to change the app setting's value. Select Yes
(app default) to allow the user to change the setting or select No if you want to prevent the user from changing the setting's
value. This setting is only available in Outlook for iOS.
) Important
If the account is protected by an Intune App Protection Policy that requires a PIN to access the protected account, then
the Require Biometrics to access the app setting should be disabled, otherwise the user is prompted with multiple
authentication prompts when accessing the app.
For Save Contacts, choose from the available options: Not configured (default), Yes, and No (app default). When selecting Yes
or No, administrators can choose to allow the user to change the app setting's value. Select Yes (app default) to allow the user
to change the setting or select No if you want to prevent the user from changing the setting's value.
For External recipients MailTip, choose from the available options: Not configured (default), Yes (app default), and No.
For Block external images, choose from the available options: Not configured (default), Yes, and No (app default). When
selecting Yes or No, administrators can choose to allow the user to change the app setting's value. Select Yes (app default) to
allow the user to change the setting or select No if you want to prevent the user from changing the setting's value.
For Default app signature, choose from the available options: Not configured (default), Yes (app default), and No.
For Suggested Replies, choose from the available options: Not configured (default), Yes (app default), and No. When
selecting Yes or No, administrators can choose to allow the user to change the app setting's value. Select Yes (app default) to
allow the user to change the setting or select No if you want to prevent the user from changing the setting's value.
For Organize mail by thread, choose from the available options: Not configured (default), Yes (app default), and No.
For Recommendations feed, choose from the available options: Not configured (default), Yes (app default), and No.
For Play My Emails, choose from the available options: Not configured (default), Yes (app default), and No.
For Sync Calendars, choose from the available options: Not configured (default), Yes (app default), and No. When selecting
Yes or No, administrators can choose to allow the user to change the app setting's value. Select Yes (app default) to allow the
user to change the setting or select No if you want to prevent the user from changing the setting's value. This feature is
available only in Outlook for Android.
For Text Predictions, choose from the available options: Not configured (default), Yes (app default), and No. When selecting
Yes or No, administrators can choose to allow the user to change the app setting's value. Select Yes (app default) to allow the
user to change the setting or select No if you want to prevent the user from changing the setting's value.
9. If you want to manage the data protection settings, configure the desired settings accordingly:
For Org data on wearables, choose from the available options: Not configured (default), Yes (app default), and No.
For Calendar Notifications, choose from the available options: Not configured (default) and Allowed. By default, calendar
notifications are allowed within the app and display sensitive information. Allowed only takes effect when the App Protection
Policy setting Org Data Notifications is set to Block org data.
For Allow Add-ins, choose from the available options: Not configured (default), Yes (app default), and No. For more
information on the setting choices, see Add-ins.
For Allow Calendar Sync, choose from the available options: Not configured (default), Yes (app default), and No. For more
information on the setting choices, see Calendar Sync.
If you want to manage which contact fields sync with the native contacts apps, configure the desired Sync contact fields to
native contacts app configuration settings accordingly. For each contact field setting, choose from the available options: Not
configured (default), Yes (app default), No.
10. If you want to manage the app's S/MIME configuration, configure the desired settings accordingly:
For Enable S/MIME, choose from the available options: Not configured (default), Yes, and No (app default). When selecting
Yes or No, administrators can choose to allow the user to change the app setting's value. Select Yes (app default) to allow the
user to change the setting or select No if you want to prevent the user from changing the setting's value.
) Important
S/MIME certificates must be available within Outlook for iOS and Android for the user sign or encrypt messages. For more
information, see S/MIME for Outlook for iOS and Android.
Choose whether to Encrypt all emails by selecting Yes or No. When selecting Yes or No, administrators can choose to allow
the user to change the app setting's value. Select Yes (app default) to allow the user to change the setting or select No if you
want to prevent the user from changing the setting's value.
Choose whether to Sign all emails by selecting Yes or No. When selecting Yes or No, administrators can choose to allow the
user to change the app setting's value. Select Yes (app default) to allow the user to change the setting or select No if you want
to prevent the user from changing the setting's value.
If needed, deploy a LDAP URL for recipient certificate lookup. For more information on the URL format, see LDAP support for
certificate lookup.
12. On the Assignments section, choose Select groups to include. Select the Azure AD group to which you want to assign the app
configuration policy, and then select Select.
14. On the Create app configuration policy Review + Create blade, review the settings configured and select Create.
The newly created configuration policy is displayed on the App configuration blade.
Configuration keys
The following sections outline the app configuration keys and their supported values. Configuration keys identified with the Managed
apps device enrollment type are delivered through the App Protection Policy channel. Configuration keys identified with the Managed
devices device enrollment type are delivered through the mobile device management OS channel. If a configuration key is listed with
both device enrollment types, the key can be delivered through either channel; for more information, see General app configuration
scenarios.
) Important
App configuration keys are case sensitive. Use the proper casing to ensure the configuration takes effect.
The exact syntax of the key/value pair may differ based on the third-party UEM provider used. The following table shows examples of
some third-party UEM providers and the exact values for the key/value pair:
com.microsoft.outlook.Settings.OpenLinks.UseSystemDefaultBrowser This new app config policy disables Open Links feature and Managed
always uses system default browser. devices
com.microsoft.outlook.Settings.OpenLinks.UserChangeAllowed This new app config policy hides settings page for Open Links. Managed
devices
com.microsoft.outlook.EmailProfile.EmailAddress This key specifies the email address to be used for sending Managed
and receiving mail. devices
Value type: String
Required: Yes
Example: user@companyname.com
com.microsoft.outlook.EmailProfile.EmailUPN This key specifies the User Principal Name or username for the Managed
email profile that is used to authenticate the account. devices
Value type: String
Required: Yes
Example: userupn@companyname.com
com.microsoft.outlook.EmailProfile.AccountType This key specifies the account type being configured based on Managed
the authentication model. devices
Key Value Device
Enrollment
Type
Required: Yes
Example: ModernAuth
IntuneMAMAllowedAccountsOnly This key specifies whether organization allowed account mode is iOS Managed devices
active.
Value type: String
Required: Yes
Value: Enabled
IntuneMAMUPN This key specifies the User Principal Name for the account. iOS Managed devices
Value type: String
Required: Yes
Example: userupn@companyname.com
com.microsoft.intune.mam.AllowedAccountUPNs This key specifies the UPNs allowed for organization allowed Android Managed devices
account mode.
Accepted values: UPN Address
Required: Yes
Example: userupn@companyname.com
Required: No
Example: false
Required: No
Example: false
com.microsoft.outlook.Auth.Biometric.UserChangeAllowed This key specifies whether the biometric setting can be Managed
changed by the end user. This key is only supported with Devices,
Outlook for iOS. Managed
Value type: Boolean Apps
Accepted values:
true, false
Required: No
Example: false
com.microsoft.outlook.Contacts.LocalSyncEnabled By default, Outlook doesn't sync contact data with the Managed
native Contacts app. This key defines the default sync Devices,
state behavior. Setting the value to true will enable Managed
contact sync. Apps
Required: No
Example: false
com.microsoft.outlook.Contacts.LocalSyncEnabled.UserChangeAllowed This key specifies whether the contact sync state can be Managed
changed by the end user. Devices,
Value type: Boolean Managed
Apps
Accepted values: true, false
Required: No
Example: false
Required: No
Example: false
com.microsoft.outlook.Mail.BlockExternalImagesEnabled This key specifies whether external images are blocked Managed
by default. Setting the value to true will enable blocking Devices,
external images. Managed
Apps
Value type: Boolean
Required: No
Key Value Device
Enrollment
Type
Example: false
com.microsoft.outlook.Mail.BlockExternalImagesEnabled.UserChangeAllowed This key specifies whether the Block External Images Managed
setting can be changed by the end user. Devices,
Managed
Value type: Boolean Apps
Required: No
Example: false
com.microsoft.outlook.Mail.DefaultSignatureEnabled This key specifies whether the app uses its default Managed
signature. Setting the value to false will disable the app's Devices,
default signature. Managed
Apps
Value type: Boolean
Required: No
Example: false
com.microsoft.outlook.Mail.SuggestedRepliesEnabled This key specifies whether the app enables Suggested Managed
Replies. Setting the value to false will disable the app's Devices,
ability to suggest replies. Managed
Apps
Value type: Boolean
Required: No
Example: false
com.microsoft.outlook.Mail.SuggestedRepliesEnabled.UserChangeAllowed This key specifies whether the Suggested Replies setting Managed
can be changed by the end user. Devices,
Value type: Boolean Managed
Apps
Accepted values: true, false
Required: No
Example: false
com.microsoft.outlook.Mail.OfficeFeedEnabled This key specifies whether the app enables the Discover Managed
Feed which shows the user's and the user's coworkers Devices,
Office files. Setting the value to false will disable the Managed
Discover Feed. Apps
Required: No
Example: false
com.microsoft.outlook.Mail.OrganizeByThreadEnabled This key specifies whether the app enables Organize by Managed
thread view. Setting the value to false will disable mail Devices,
threaded conversation view. Managed
Apps
Value type: Boolean
Required: No
Example: false
com.microsoft.outlook.Mail.PlayMyEmailsEnabled This key specifies whether the Play My Emails feature is Managed
promoted to eligible users via a banner in the inbox. Devices,
When set to Off, this feature won't be promoted to Managed
eligible users in the app. Users can choose to manually Apps
enable Play My Emails from within the app, even when
this feature is set to Off. When set as not configured, the
default app setting is On and the feature will be
promoted to eligible users.
Required: No
Example: false
Required: No
Example: false
com.microsoft.outlook.Calendar.NativeSyncEnabled.UserChangeAllowed This key specifies whether the calendar sync state can be Managed
changed by the end user. This key is only supported with Devices,
Outlook for Android. Managed
Value type: Boolean Apps
Required: No
Example: false
com.microsoft.outlook.Mail.TextPredictionsEnabled Outlook can suggest words and phrases as you compose Managed
messages. When set as not configured, the default app Devices,
setting is set to On. Managed
Apps
Value type: Boolean
Required: No
Example: false
Required: No
Example: false
com.microsoft.outlook.Settings.ThemesEnabled Outlook supports custom visual themes. When set as not Managed
configured, the default app setting is set to On. Devices,
Managed
Value type: Boolean Apps
Required: No
Example: false
com.microsoft.outlook.Mail.Blocksharing This key specifies whether the app enables the block Managed
sharing experience. Setting the value to true will block Devices,
sharing of the inbox in the app. Managed
Apps
Value type: Boolean
Required: No
Example: false
com.microsoft.outlook.Calendar.Blocksharing This key specifies whether the app enables the block Managed
sharing experience. Setting the value to true will block Devices,
sharing of the calendar in the app. Managed
Apps
Value type: Boolean
Required: No
Example: false
S/MIME settings
Outlook for iOS offers administrators the ability to customize the default S/MIME configuration in Outlook for iOS and Android.
com.microsoft.outlook.Mail.SMIMEEnabled This key specifies whether the app enables S/MIME. Managed
Use of S/MIME requires certificates available to Devices,
Outlook for iOS and Android. Setting the value to true Managed
will enable S/MIME support in the app. Apps
Required: No
Example: false
com.microsoft.outlook.Mail.SMIMEEnabled.UserChangeAllowed This key specifies whether the S/MIME setting can be Managed
changed by the end user. Devices,
Value type: Boolean Managed
Apps
Key Value Device
Enrollment
Type
Required: No
Example: false
Required: No
Example: false
com.microsoft.outlook.Mail.SMIMEEnabled.EncryptAllMail.UserChangeAllowed This key specifies whether the S/MIME setting can be Managed
changed by the end user. Devices,
Value type: Boolean Managed
Apps
Accepted values: true, false
Required: No
Example: false
Required: No
Example: false
com.microsoft.outlook.Mail.SMIMEEnabled.SignAllMail.UserChangeAllowed This key specifies whether the S/MIME setting can be Managed
changed by the end user. Devices,
Value type: Boolean Managed
Apps
Accepted values: true, false
Required: No
Example: false
Required: No
Example: ldap://contoso.com
ldaps://contoso.com
contoso.com
ldaps://contoso.com:636
Key Value Device
Enrollment
Type
contoso.com:636
Example: false
com.microsoft.outlook.AddinsAvailable.IntuneMAMOnly By default, an App Protection Policy allows users to utilize third- Managed
party add-ins but can be used to block add-ins with the Sync apps
policy managed app data with native apps or add-ins setting.
Configuring this setting to false will block add-ins when the App
Protection Policy setting is set to Allowed.
Example: false
If the app config value is set to null (doesn't exist), all sensitive data
properties are removed.
If the app config value is set to 0, all sensitive data are exposed.
If the app config value is set to 1, only the subject (and meeting
time) is exposed.
Example: false
com.microsoft.outlook.ContactSync.AddressAllowed This key specifies if the contact's address should be synchronized Managed
with native contacts. apps
Accepted values: true, false
Key Value Device
Enrollment
Type
Example: true
com.microsoft.outlook.ContactSync.BirthdayAllowed This value specifies if the contact's birthday should be synchronized Managed
with native contacts. apps
Accepted values: true, false
Example: true
com.microsoft.outlook.ContactSync.CompanyAllowed This key specifies if the contact's company name should be Managed
synchronized with native contacts. apps
Accepted values: true, false
Example: true
Example: true
com.microsoft.outlook.ContactSync.EmailAllowed This key specifies if the contact's email address should be Managed
synchronized with native contacts. apps
Accepted values: true, false
Example: true
com.microsoft.outlook.ContactSync.InstantMessageAllowed This key specifies if the contact's instant messaging address should Managed
be synchronized with native contacts. apps
Accepted values: true, false
Example: true
com.microsoft.outlook.ContactSync.JobTitleAllowed This key specifies if the contact's job title should be synchronized Managed
to native contacts. apps
Accepted values: true, false
Example: true
com.microsoft.outlook.ContactSync.NicknameAllowed This key specifies if the contact's nickname should be synchronized Managed
with native contacts. apps
Accepted values: true, false
Example: true
com.microsoft.outlook.ContactSync.NotesAllowed This key specifies if the contact's notes should be synchronized Managed
with native contacts. apps
Accepted values: true, false
Example: true
com.microsoft.outlook.ContactSync.PhoneHomeAllowed This key specifies if the contact's home phone number should be Managed
synchronized with native contacts. apps
Accepted values: true, false
Example: true
Key Value Device
Enrollment
Type
com.microsoft.outlook.ContactSync.PhoneHomeFaxAllowed This key specifies if the contact's home fax number should be Managed
synchronized with native contacts. apps
Accepted values: true, false
Example: true
com.microsoft.outlook.ContactSync.PhoneMobileAllowed This key specifies if the contact's mobile phone number should be Managed
synchronized with native contacts. apps
Accepted values: true, false
Example: true
com.microsoft.outlook.ContactSync.PhoneOtherAllowed This key specifies if the contact's other phone number should be Managed
synchronized with native contacts. apps
Accepted values: true, false
Example: true
com.microsoft.outlook.ContactSync.PhonePagerAllowed This key specifies if the contact's pager phone number should be Managed
synchronized with native contacts. apps
Accepted values: true, false
Example: true
com.microsoft.outlook.ContactSync.PhoneWorkAllowed This key specifies if the work phone number should be Managed
synchronized with native contacts. apps
Accepted values: true, false
Example: true
com.microsoft.outlook.ContactSync.PhoneWorkFaxAllowed This key specifies if the contact's work fax number should be Managed
synchronized with native contacts. apps
Accepted values: true, false
Example: true
com.microsoft.outlook.ContactSync.PrefixAllowed This key specifies if the contact's name prefix should be Managed
synchronized with native contacts. apps
Accepted values: true, false
Example: true
com.microsoft.outlook.ContactSync.SuffixAllowed This key specifies if the contact's name suffix should be Managed
synchronized with native contacts. apps
Accepted values: true, false
Example: true
com.microsoft.outlook.WidgetsAvailable.IntuneMAMOnly By default, an App Protection Policy allows for the widget to sync Managed
with the Outlook app but can be used to block widget sync apps
availability with the Sync policy managed app data with native
apps or add-ins setting. Configuring this setting to false blocks the
widget synchronization when the App Protection Policy setting is
set to Allowed.
Sync policy managed app data with native apps or add-ins == allow
com.microsoft.outlook.WidgetsAvailable.IntuneMAMOnly = false
Sync policy managed app data with native apps or add-ins == block
And another example that blocks calendar sync but allows widget
sync:
Sync policy managed app data with native apps or add-ins == allow
com.microsoft.outlook.WidgetsAvailable.IntuneMAMOnly = true
com.microsoft.outlook.Calendar.NativeSyncAvailable.IntuneMAMOnly
= false
com.microsoft.outlook.Mail.VideoMessages.VideoCaptureAndUploadEnabled This key specifies if video capture and upload to OneDrive for Managed
Business is enabled. apps
Accepted values: true, false
Summary: How to classify and/or protect messages when using Outlook for iOS and
Android.
Protecting company or organizational data is extremely important. Outlook for iOS and
Android supports two scenarios for classifying and/or protecting content:
Sensitivity labeling
Secure/Multipurpose Internet Mail Extension (S/MIME)
Sensitivity labeling and S/MIME in Outlook for iOS and Android are supported with
Microsoft 365 or Office 365 accounts using the native Microsoft sync technology.
Sensitivity labels can also be configured to protect messages with access restrictions or
encryption. Access restrictions include ensuring only users within the organization can
open the message, restricting editing rights, preventing forwarding, printing, or copying
the contents of the message. Encryption provides at-rest encryption and ensures only
authorized users can decrypt the message.
When a sensitivity label is configured with encryption, the encryption process depends
on the client platform. With Outlook for iOS and Android, encryption occurs within
Exchange Online transport after the message is sent from the sender, prior to recipient
delivery. Encryption does not occur within the app. For more information, see Manage
sensitivity labels in Office apps.
Likewise, Outlook for iOS and Android does not perform decryption of received
messages, either. Exchange Online performs the decryption prior to delivering the
message to Outlook for iOS and Android. For more information, see Outlook for iOS and
Android in Exchange Online: FAQ.
) Important
Understanding S/MIME
S/MIME provides encryption, which protects the content of email messages, and it
provides digital signatures, which verify the identity of the sender of an email message.
S/MIME in Outlook for iOS and Android is supported with Microsoft 365 or Office 365
accounts using the native Microsoft sync technology. For a general overview of S/MIME,
see S/MIME in Exchange Online.
Deploying and using S/MIME with Outlook for
iOS and Android
See S/MIME for Outlook for iOS and Android.
S/MIME for Outlook for iOS and
Android in Exchange Online
Article • 02/22/2023
To leverage S/MIME in Outlook for iOS and Android, you need to configure specific
S/MIME prerequisite in Exchange Online. After you have completed those steps, you can
deploy S/MIME certificates to Outlook for iOS and Android using the following
methods:
This article describes how to configure Exchange Online for S/MIME using Outlook for
iOS and Android, and how to use S/MIME in Outlook for iOS and Android.
S/MIME prerequisites
Ensure S/MIME has been properly configured in Exchange Online by following the steps
outlined in Configure S/MIME in Exchange Online. Specifically, this includes:
In manual and automated certificate delivery solutions, it's expected that the certificate's
trusted root chain is available and discoverable within your Exchange Online tenant's
virtual certificate collection. Trust verification is performed on all digital certificates.
Exchange Online validates the certificate by validating each certificate in the certificate
chain until it reaches a trusted root certificate. This verification is done by obtaining the
intermediate certificates through the authority information access attribute in the
certificate until a trusted root certificate is located. Intermediate certificates can also be
included with digitally signed email messages. If Exchange Online locates a trusted root
certificate and can query the certificate revocation list for the certificate authority, the
digital certificate's chain for that digital certificate is considered valid and trusted and
can be used. If Exchange Online fails to locate a trusted root certificate or fails to contact
the certificate revocation list for the certificate authority, that certificate is considered
invalid and is not trusted.
Outlook for iOS and Android leverages the user's primary SMTP address for mail flow
activities, which is configured during account profile setup. The S/MIME certificate used
by Outlook for iOS and Android is calculated by comparing the user's primary SMTP
address as defined in the account profile with the certificate's subject value or the
subject alternative name value; if these do not match, then Outlook for iOS and Android
will report that a certificate is not available (see Figure 7) and will not allow the user to
sign and/or encrypt messages.
A user can export their own certificate and mail it to themselves using Outlook. For
more information, see Exporting a digital certificate .
) Important
When exporting the certificate, ensure that the exported certificate is password-
protected with a strong password.
Outlook for iOS and Android only supports automated certificate delivery
when Microsoft Endpoint Manager is the enrollment provider.
For Outlook for iOS, this is due to the iOS keychain architecture. iOS offers a
system keychain and publisher keychains. iOS prevents third-party apps from
accessing the system keychain (only first-party apps and the Safari webview
controller can access the system keychain). In order to deliver certificates that
can be accessed by Outlook for iOS, the certificates must reside in the
Microsoft publisher keychain to which Outlook for iOS has access. Only
Microsoft published apps, like the Company Portal, can place certificates into
the Microsoft publisher keychain.
Outlook for Android relies on Endpoint Manager to deliver and approve the
S/MIME certificates. Automatic certificate delivery is supported with Android
enrollment scenarios: device administrator, Android Enterprise work profile,
and Android Enterprise fully managed.
With Endpoint Manager, organizations can import encryption certificate histories from
any Certification Authority. Endpoint Manager will then automatically deliver those
certificates to any device that the user enrolls. Generally, Simple Certificate Enrollment
Protocol (SCEP) is used for signing certificates. With SCEP, the private key is generated
and stored on the enrolled device and a unique certificate is delivered to each device
that a user enrolls, which can be used for non-repudiation. Lastly, Endpoint Manager
supports derived credentials for customers who need support for the NIST 800-157
standard. The Company Portal is used to retrieve signing and encryption certificates
from Intune.
In order to deliver certificates to Outlook for iOS and Android, you must complete the
following prerequisites:
Deploy trusted root certificates via Endpoint Manager. For more information, see
Create trusted certificate profiles.
Encryption certificates must be imported into Endpoint Manager. For more
information, see Configure and use imported PKCS certificates with Intune.
Install and Configure the PFX Connector for Microsoft Intune. For more
information, see Download, install, and configure the PFX Certificate Connector for
Microsoft Intune.
Devices must be enrolled to receive trusted root and S/MIME certificates
automatically from Endpoint Manager.
3. On the App Configuration policies blade, choose Add and select Managed
devices to start the app configuration policy creation flow.
4. On the Basics section, enter a Name, and optional Description for the app
configuration settings.
6. For Targeted app, choose Select app, and then, on the Associated app blade,
choose Microsoft Outlook. Click OK.
7 Note
If Outlook is not listed as an available app, then you must add it by following
the instructions in Assign apps to Android work profile devices with Intune
and Add iOS store apps to Microsoft Intune.
9. Set Enable S/MIME to Yes. When selecting Yes or No, administrators can choose to
allow the user to change the app setting's value. Select Yes (app default) to allow
the user to change the setting or choose No if you want to prevent the user from
changing the setting's value.
10. Choose whether to Encrypt all emails by selecting Yes or No. When selecting Yes
or No, administrators can choose to allow the user to change the app setting's
value. Select Yes (app default) to allow the user to change the setting or choose
No if you want to prevent the user from changing the setting's value.
11. Choose whether to Sign all emails by selecting Yes or No. When selecting Yes or
No, administrators can choose to allow the user to change the app setting's value.
Select Yes (app default) to allow the user to change the setting or choose No if you
want to prevent the user from changing the setting's value.
12. If needed, deploy a LDAP URL for recipient certificate lookup. For more
information on the URL format, see LDAP support for certificate lookup.
SCEP: Creates a certificate that is unique for the device and user that can be
used by Microsoft Outlook for signing. For information on what is required to
use SCEP certificate profiles, see Configure infrastructure to support SCEP
with Intune.
PKCS imported certificates: Uses a certificate that is unique to the user, but
may be shared across devices and has been imported to Endpoint Manager
by the administrator on behalf of the user. The certificate is delivered to any
device that a user enrolls. Endpoint Manager will automatically pick the
imported certificate that supports signing to deliver to the device that
corresponds to the enrolled user. For information on what is required to use
PKCS imported certificates, see Configure and use PKCS certificates with
Intune.
Derived credentials: Uses a certificate that is already on the device that can
be used for signing. The certificate must be retrieved on the device using the
derived credentials flows in Intune.
15. Under Encryption certificates next to Certificate profile type, choose one of the
following options:
16. Next to End-user notifications, choose how to notify end users to retrieve the
certificates by selecting Company Portal or Email.
On iOS, users must use the Company Portal app to retrieve their S/MIME
certificates. Endpoint Manager will inform the user that they need to launch the
Company Portal to retrieve their S/MIME certificates via the Notifications section of
Company Portal, a push notification, and/or an email. Clicking one of the
notifications will take the user to a landing page that informs them of progress
retrieving the certificates. Once the certificates are retrieved, the user can use
S/MIME from within Microsoft Outlook for iOS to sign and encrypt email.
End-users will see an experience similar to the following for automated certificate
delivery:
17. Select Assignments to assign the app configuration policy to the Azure AD groups.
For more information, see Assign apps to groups with Microsoft Intune.
2. Create a SCEP certificate profile or PKCS certificate profile and assign it to your
mobile users.
4. On the App Configuration policies blade, choose Add and select Managed
devices to start the app configuration policy creation flow.
5. On the Basics section, enter a Name, and optional Description for the app
configuration settings.
6. For Platform, choose Android Enterprise and for Profile Type, choose All Profile
Types.
7. For Targeted app, choose Select app, and then, on the Associated app blade,
choose Microsoft Outlook. Click OK.
7 Note
If Outlook is not listed as an available app, then you must add it by following
the instructions in Assign apps to Android work profile devices with Intune
and Add iOS store apps to Microsoft Intune.
10. Set Enable S/MIME to Yes. When selecting Yes or No, administrators can choose to
allow the user to change the app setting's value. Select Yes (app default) to allow
the user to change the setting or choose No if you want to prevent the user from
changing the setting's value.
11. Choose whether to Encrypt all emails by selecting Yes or No. When selecting Yes
or No, administrators can choose to allow the user to change the app setting's
value. Select Yes (app default) to allow the user to change the setting or choose
No if you want to prevent the user from changing the setting's value.
12. Choose whether to Sign all emails by selecting Yes or No. When selecting Yes or
No, administrators can choose to allow the user to change the app setting's value.
Select Yes (app default) to allow the user to change the setting or choose No if you
want to prevent the user from changing the setting's value.
13. Select Assignments to assign the app configuration policy to the Azure AD groups.
For more information, see Assign apps to groups with Microsoft Intune.
End users will need to enable S/MIME functionality manually by accessing their account
settings, tapping Security, and tapping the S/MIME control, which is off by default. The
Outlook for iOS S/MIME security setting looks like the following:
When the S/MIME setting is enabled, Outlook for iOS and Android will automatically
disable the Organize By Thread setting. This is because S/MIME encryption becomes
more complex as a conversation thread grows. By removing the threaded conversation
view, Outlook for iOS and Android reduces the opportunity for issues with certificates
across recipients during signing and encryption. As this is an app-level setting, this
change affects all accounts added to the app. This threaded conversation dialog is
rendered in iOS as follows:
Once S/MIME is enabled and the S/MIME certificates are installed, users can view the
installed certificates by accessing their account settings and tapping Security.
Furthermore, users can tap on each individual S/MIME certificate and view the
certificate's details, including information like key usage and the validity period.
Users can configure Outlook to automatically sign or encrypt messages. This allows
users to save time sending email while being confident that their emails are being
signed/encrypted.
ldap://contoso.com
ldap://contoso.com:389
ldaps://contoso.com:636
contoso.com
contoso.com:389
contoso.com:636
When Outlook for iOS and Android performs a certificate lookup for a recipient, the app
will search the local device first, then query Azure Active Directory, and then evaluate
any LDAP directory endpoint. When Outlook for iOS and Android connects to the LDAP
directory endpoint to search for a recipient's public certificate, certificate validation is
performed to ensure that the certificate is not revoked. The certificate is only considered
valid by the app if certificate validation completes successfully.
) Important
In order to read an encrypted message, the recipient's private certificate key must
be available on the device.
Users can install a sender's public certificate key by tapping the S/MIME status bar. The
certificate will be installed on the user's device, specifically in the Microsoft publisher
keychain in iOS or the system KeyStore in Android . The Android version appears
similar to the following:
If there are certificate errors, Outlook for iOS and Android will warn the user. The user
can tap the S/MIME status bar notification to view more information about the
certificate error, such as in the following example.
Outlook for iOS and Android can send S/MIME signed and encrypted messages to
distribution groups. Outlook for iOS and Android enumerates the certificates for the
users defined in the distribution group, including those in nested distribution groups,
though care should be taken on limiting the number of nested distribution groups to
minimize the processing impact.
) Important
Outlook for iOS and Android only supports sending clear-signed messages.
In order to compose an encrypted message, the target recipient's public
certificate key must be available either in the Global Address List or stored on
the local device. In order to compose a signed message, the sender's private
certificate key must be available on the device.
Summary: How organizations in the Office 365 U.S. Government Community Cloud
(GCC) can enable Outlook for iOS and Android for their Exchange Online users.
Outlook for iOS and Android is fully architected in the Microsoft Cloud and meets the
security and compliance requirements needs of all United States Government customers
when the mailboxes reside in Exchange Online.
For more information, please see the Office 365 FedRAMP System Security plan located
in the FedRAMP Audit Reports section of the Microsoft Service Trust Portal .
) Important
Enable Outlook for iOS and Android for Office 365 GCC customers.
Unlock non-FedRAMP compliant features, if needed.
Enabling Outlook for iOS and Android for
Office 365 GCC customers
GCC (Moderate, High, and Department of Defense) customers can leverage Outlook for
iOS and Android without any special configuration.
For Office 365 GCC customers who are not currently using Outlook for iOS and Android,
enabling the app requires unblocking Outlook for iOS and Android in the organization,
downloading the app on users' devices, and having end users add their account on their
devices.
7 Note
In-app support: Users are not able to submit support tickets from within the app
or upload diagnostic data using Collect Diagnostics. They should contact their
internal help desk and provide logs (via the Share Diagnostics Logs option in
Setting -> Help). If necessary, the organization's IT department can then contact
Microsoft Support directly.
) Important
In-app feature requests: Users are not able to submit in-app feature requests.
Multiple accounts: Only the user's Office 365 GCC account and OneDrive for
Business account can be added to a single device. Personal accounts cannot be
added. Customers can use another device for personal accounts, or an Exchange
ActiveSync client from another provider.
Calendar Apps: Calendar apps (Facebook, Wunderlist, Evernote, Meetup) are not
available with GCC accounts.
Storage Providers: Only the GCC account's OneDrive for Business storage account
can be added within Outlook for iOS and Android. Third-party storage accounts
(for example, Dropbox, Box) cannot be added.
Office Lens: Office Lens technology (for example, scanning business cards and
taking pictures) included in Outlook for iOS and Android is not available with GCC
accounts.
File picker: The file picker used for adding attachments during email composition
is limited to email attachments, iCloud & Device, OneDrive for Business files, and
SharePoint sites. The Recent Files list is limited to email attachments.
TestFlight: GCC accounts are not able to access pre-release features when using
the TestFlight version of Outlook for iOS.
Executing the below Exchange Online cmdlet enables GCC users using Outlook for iOS
and Android access to the above features and services that are not FedRAMP compliant:
PowerShell
At any time, access to the above features can be revoked by resetting the parameter
back to the default value:
PowerShell
Changing this setting typically takes effect within 48 hours. As this setting is a tenant-
based change, all Outlook for iOS and Android users in the GCC organization are
affected.
Location services: Bing location services are not available with GCC accounts.
Features that rely on location services, like Cortana Time To Leave, are also
unavailable.
Privacy settings: Privacy settings cannot be configured through the Office cloud
policy service.
Play My Emails: Play My Emails is not available for GCC accounts.
To Do: To Do is currently not available for GCC accounts.
Exchange ActiveSync is a client protocol that lets you synchronize a mobile device with
your mailbox.
Remote wipe: If a mobile device is lost, stolen, or otherwise compromised, you can
issue a remote wipe command from the Exchange Server computer or from any
web browser by using Outlook on the web (formerly known as Outlook Web App).
This command erases all data from the mobile device.
Device password policies: Exchange ActiveSync lets you configure several options
for device passwords. These options include the following:
Minimum password length (characters): This option specifies the length of the
password for the mobile device. The default length is 4 characters, but as many
as 18 can be included.
Minimum number of character sets: Use this text box to specify the complexity
of the alphanumeric password and force users to use a number of different sets
of characters from among the following: lowercase letters, uppercase letters,
symbols, and numbers.
Require alphanumeric password: This option determines password strength.
You can enforce the usage of a character or symbol in the password in addition
to numbers.
Inactivity time (seconds): This option determines how long the mobile device
must be inactive before the user is prompted for a password to unlock the
mobile device.
Enforce password history: Select this check box to force the mobile phone to
prevent the user from reusing their previous passwords. The number that you
set determines the number of past passwords that the user won't be allowed to
reuse.
Enable password recovery: Select this check box to enable password recovery
for the mobile device. Users can use Outlook on the web to look up their
recovery password and unlock their mobile device. Administrators can use the
Exchange admin center to look up a user's recovery password.
Wipe device after failed (attempts): This option lets you specify whether you
want the phone's memory to be wiped after multiple failed password attempts.
) Important
Although the Exchange ActiveSync protocol provides support for the different
features listed above, it is up to the mobile device operating system and
manufacturers (OEMs) to build support for these features in their mobile operating
system and email apps (default or third-party). Not all EAS features listed above are
supported by third-party mobile devices such as iOS and Android. Microsoft has no
control over which EAS features are supported by these third-party mobile device
manufacturers. Contact the manufactures directly for help with EAS features on
third-party mobile devices.
Mobile device mailbox policies in
Exchange Online
Article • 02/22/2023
In Microsoft 365 or Office 365, you can create mobile device mailbox policies to apply a
common set of policies or security settings to a collection of users. A default mobile
device mailbox policy is created in every Microsoft 365 or Office 365 organization.
Require a password
Specify the minimum password length
Allow a numeric PIN or require special characters in the password
Designate how long a device can be inactive before requiring the user to re-enter
a password
Wipe a device after a specific number of failed password attempts
Customers that need advanced control over the use of biometrics should consider
device enrollment solutions such as Microsoft Intune. See Deploying Outlook for iOS
and Android app configuration settings for more information.
Low Password can be a pattern or a PIN with either repeating (4444) or ordered
(1234, 4321, 2468) sequences
Android's password complexity levels are mapped to the following Exchange mobile
device mailbox policy settings:
Setting Description
Allow This setting specifies whether a mobile device allows Bluetooth connections.
Bluetooth The available options are Disable, HandsFree Only, and Allow. The default value
is Allow.
Allow Browser This setting specifies whether Pocket Internet Explorer is allowed on the mobile
device. This setting doesn't affect third-party browsers installed on the mobile
device. The default value is $true .
Allow Camera This setting specifies whether the mobile device camera can be used. The
default value is $true .
Allow This setting specifies whether the mobile device user can configure a personal
Consumer email account (either POP3 or IMAP4) on the mobile device. The default value
EMail is $true . This setting doesn't control access to email accounts that are using
third-party mobile device email programs.
Allow Desktop This setting specifies whether the mobile device can synchronize with a
Sync computer through a cable, Bluetooth, or IrDA connection. The default value is
$true .
Allow External This setting specifies whether an external device management program is
Device allowed to manage the mobile device.
Management
Setting Description
Allow HTML This setting specifies whether email synchronized to the mobile device can be
Email in HTML format. If this setting is set to $false , all email is converted to plain
text.
Allow Internet This setting specifies whether the mobile device can be used as a modem for a
Sharing desktop or a portable computer. The default value is $true .
AllowIrDA This setting specifies whether infrared connections are allowed to and from the
mobile device.
Allow Mobile This setting specifies whether the mobile device mailbox policy settings can be
OTA Update sent to the mobile device over a cellular data connection. The default value is
true .
Allow non- This setting specifies whether mobile devices that may not support application
provisionable of all policy settings are allowed to connect to Office 365 by using Exchange
devices ActiveSync. Allowing non-provisionable mobile devices has security
implications. For example, some non-provisionable devices may not be able to
implement an organization's password requirements.
Allow This setting specifies whether the user can configure a POP3 or an IMAP4 email
POPIMAPEmail account on the mobile device. The default value is $true . This setting doesn't
control access by third-party email programs.
Allow Remote This setting specifies whether the mobile device can initiate a remote desktop
Desktop connection. The default value is $true .
Allow simple This setting enables or disables the ability to use a simple password such as
password 1111 or 1234. The default value is $true .
Allow S/MIME This setting specifies whether the messaging application on the mobile device
encryption can negotiate the encryption algorithm if a recipient's certificate doesn't
algorithm support the specified encryption algorithm.
negotiation
Allow S/MIME This setting specifies whether S/MIME software certificates are allowed on the
software mobile device.
certificates
Allow storage This setting specifies whether the mobile device can access information that's
card stored on a storage card.
Allow text This setting specifies whether text messaging is allowed from the mobile
messaging device. The default value is $true .
Allow unsigned This setting specifies whether unsigned applications can be installed on the
applications mobile device. The default value is $true .
Setting Description
Allow unsigned This setting specifies whether an unsigned installation package can be run on
installation the mobile device. The default value is $true .
packages
Allow Wi-Fi This setting specifies whether wireless Internet access is allowed on the mobile
device. The default value is $true .
Alphanumeric This setting requires that a password contains numeric and non-numeric
password characters. The default value is $true .
required
Approved This setting stores a list of approved applications that can be run on the mobile
Application List device.
Attachments This setting enables attachments to be downloaded to the mobile device. The
enabled default value is $true .
Device This setting enables encryption on the mobile device. Not all mobile devices
encryption can enforce encryption. For more information, see the device and mobile
enabled operating system documentation.
Device policy This setting specifies how often the mobile device mailbox policy is sent from
refresh interval the server to the mobile device.
IRM enabled This setting specifies whether Information Rights Management (IRM) is enabled
on the mobile device.
Max This setting controls the maximum size of attachments that can be downloaded
attachment size to the mobile device. The default value is Unlimited.
Max calendar This setting specifies the maximum range of calendar days that can be
age filter synchronized to the mobile device. The following values are accepted:
All
TwoWeeks
OneMonth
ThreeMonths
SixMonths
Setting Description
Max email age This setting specifies the maximum number of days of email items to
filter synchronize to the mobile device. The following values are accepted:
All
OneDay
ThreeDays
OneWeek
TwoWeeks
OneMonth
Max email This setting specifies the maximum size at which email messages are truncated
body when synchronized to the mobile device. The value is in kilobytes (KB).
truncation size
Max email This setting specifies the maximum size at which HTML email messages are
HTML body truncated when synchronized to the mobile device. The value is in kilobytes
truncation size (KB).
Max inactivity This value specifies the length of time that the mobile device can be inactive
time lock before a password is required to reactivate it. You can enter any interval
between 30 seconds and 1 hour. The default value is 15 minutes.
Max password This setting specifies the number of attempts a user can make to enter the
failed attempts correct password for the mobile device. You can enter any number from 4
through 16. The default value is 8.
Min password This setting specifies the minimum number of complex characters required in
complex the mobile device's password. A complex character is a character that is not a
characters letter.
Min password This setting specifies the minimum number of characters in the mobile device
length password. You can enter any number from 1 through 16. The default value is 4.
Password This setting enables the administrator to configure a length of time after which
expiration a mobile device password must be changed.
Password This setting specifies the number of past passwords that can be stored in a
history user's mailbox. A user can't reuse a stored password.
Setting Description
Password When this setting is enabled, the mobile device generates a recovery password
recovery that's sent to the server. If the user forgets their mobile device password, the
enabled recovery password can be used to unlock the mobile device and enable the
user to create a new mobile device password.
Require device This setting specifies whether device encryption is required. If set to $true , the
encryption mobile device must be able to support and implement encryption to
synchronize with the server.
Require This setting specifies whether S/MIME messages must be encrypted. The
encrypted default value is $false .
S/MIME
messages
Require This setting specifies what required algorithm must be used when encrypting
encryption S/MIME messages.
S/MIME
algorithm
Require manual This setting specifies whether the mobile device must synchronize manually
synchronization while roaming. Allowing automatic synchronization while roaming will
while roaming frequently lead to larger-than-expected data costs for the mobile device data
plan.
Require signed This setting specifies what required algorithm must be used when signing a
S/MIME message.
algorithm
Require signed This setting specifies whether the mobile device must send signed S/MIME
S/MIME messages.
messages
Require storage This setting specifies whether the storage card must be encrypted. Not all
card encryption mobile device operating systems support storage card encryption. For more
information, see your mobile device and mobile operating system
documentation.
Unapproved This setting specifies a list of applications that cannot be run in ROM.
InROM
application list
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Mobile devices" feature in
the Feature permissions in Exchange Online topic.
To open the Exchange admin center (EAC), see Exchange admin center in Exchange
Online. To connect to Exchange Online PowerShell, see Connect to Exchange
Online PowerShell.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online .
7 Note
You can only set a subset of mobile device mailbox policy settings in the EAC. To set
all the mobile device mailbox policy settings, you need to use the Exchange Online
PowerShell.
1. In the EAC, click Mobile > Mobile Device Mailbox Policies, and then click Add .
2. Use the various check boxes and drop-down lists to configure the settings for the
mobile device mailbox policy.
2 Warning
Select This is the default policy to make the new mobile mailbox policy the
default mobile mailbox policy. After you make a mobile mailbox policy the
default policy, all new users will be assigned this policy automatically when
they are created.
3. Click Save.
You create a new mobile device mailbox policy using the New-
MobileDeviceMailboxPolicy cmdlet.
PowerShell
1. In the EAC, click Mobile > Mobile Device mailbox policies, and verify that your
new policy is displayed in the List view.
PowerShell
7 Note
You can only edit a subset of mobile device mailbox policy settings in the EAC. To
edit all the mobile device mailbox policy settings, you need to use the Exchange
Online PowerShell.
2. Select a policy from the List view and then click Edit .
3. Use the General and Security tabs to edit the mobile device mailbox policy
settings.
4. Click Save to update the policy.
PowerShell
1. In the EAC, click Mobile > Mobile Device Mailbox Policy, and then choose a
specific policy. In the Details pane, you'll see a number of the policy settings listed.
PowerShell
You can configure a mobile phone to use Microsoft Exchange ActiveSync. You should
perform this procedure on each mobile phone in your organization.
Prerequisites
You've reviewed the manufacturer's documentation for the mobile phone you want
to configure.
Exchange ActiveSync is enabled in your organization.
7 Note
If the mobile phone is unable to contact the Exchange server automatically through
Autodiscover, you'll need to set up the mobile phone manually. Manual setup requires
the user's email address and password, as well as the Exchange ActiveSync server name.
In most organizations, the Exchange ActiveSync server name is the same as the Outlook
on the web (formerly known as Outlook Web App) server name without the /owa, for
example, mail.contoso.com.
Perform a remote wipe on a mobile
phone in Exchange Online
Article • 02/22/2023
Your users carry sensitive corporate information in their pockets every day. If one of
them loses their mobile phone, your data can end up in the hands of another person. If
one of your users loses their mobile phone, you can use the Exchange admin center
(EAC) or Exchange Online PowerShell to wipe their phone clean of all corporate and user
information.
7 Note
This topic also provides instructions for how to use Outlook on the web (formerly
known as Outlook Web App) to perform a remote wipe on a phone. The user must
be signed in to Outlook on the web to perform a remote wipe.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Mobile devices" entry in
the Feature permissions in Exchange Online topic.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
7 Note
Prior to EAS v16.1, remote wipe would perform a device-level wipe, restoring the
device to factory conditions. With EAS v16.1 and later, EAS also supports account-
only remote wipe. In order for this to work, the client must support the EAS v16.1
protocol. If the client doesn't support v16.1, the wipe will fail and an error will be
given.
U Caution
Exchange ActiveSync v16.1 supports two different remote wipe processes: A Wipe
Data remote wipe and also an Account Only Remote Wipe Device remote wipe.
There are important differences between how Outlook responds and how native
mail apps on iOS and Android respond to these different wipe commands.
Outlook for iOS and Outlook for Android support only the Wipe Data command,
which wipes only data within Outlook. The Outlook app will reset and all Outlook
email, calendar, contacts, and file data will be removed, but no other data is wiped
from the device. The Account Only Remote Wipe Device command is therefore
redundant and is not supported by Outlook for iOS or Android.
However, if a native iOS or Android mail app is connected to Exchange and receives
a Wipe Data command from Exchange ActiveSync, all data on the device will be
wiped, including photos, personal files, and so on.
These commands are designed to destroy data. Exercise caution when using them.
After the remote wipe command is requested by the administrator, the wipe happens
within seconds of the Outlook app's next connection to Exchange.
Since Outlook for iOS and Android appears as a single mobile device association under
a user's mobile devices in Exchange, a remote wipe command will remove data and
delete sync relationships from all devices running Outlook (iPhone, iPad, Android)
associated with that user.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
7 Note
The classic EAC will be fully deprecated by September 2022. For more information,
see Deprecation of the classic Exchange admin center in WW service .
You can use the classic EAC to wipe a user's phone or cancel a remote wipe that has not
yet completed.
2. Select the user, and under Mobile Devices, choose View details.
3. On the Mobile Device Details page, select the lost mobile device, and then select
Wipe Data (or Account Only Remote Wipe Device if desired).
4. Select Save.
The following command wipes the device named WM_TonySmith and sends a
confirmation message to admin@contoso.com.
PowerShell
If the device connects to Exchange using a mail app other than Outlook, you can use the
following command to wipe only the mail app's Exchange ActiveSync mail, calendar, and
account data and leave all other data on the device intact:
PowerShell
5. Click or tap the Wipe Device icon (or the Account Only Remote Wipe Device icon
if desired).
In the EAC, check the status of the mobile device. The status will change from Wipe
Pending to Wipe Successful.
In Outlook on the web, check the status of the mobile device. The status will
change from Wipe Pending to Wipe Successful.
POP3 and IMAP4 in Exchange Online
Article • 02/22/2023
) Important
Effective from December 2022, the classic Exchange Admin Center will be
deprecated for worldwide customers. Microsoft recommends using the new
Exchange Admin Center , if not already doing so.
While most of the features have been migrated to new EAC, some have been
migrated to other admin centers and remaining ones will soon be migrated to New
EAC. Find features that are not yet there in new EAC at Other Features or use
Global Search that will help you navigate across new EAC.
By default, POP3 and IMAP4 are enabled for all users in Exchange Online.
To enable or disable POP3 and IMAP4 for individual users, see Enable or Disable
POP3 or IMAP4 access for a user.
To customize the POP3 or IMAP4 settings for a user, see Set POP3 or IMAP4
settings for a user.
7 Note
If you've enabled security defaults in your organization, POP3 and IMAP4 are
automatically disabled in Exchange Online. For more information, see What are
security defaults?.
To protect your Exchange Online tenant from brute force or password spray attacks,
your organization will need to Disable Basic authentication in Exchange Online
and only use Modern authentication for Outlook in Exchange Online. Disabling
Basic authentication will block legacy protocols, such as POP and IMAP.
Users can use any email programs that support POP3 and IMAP4 to connect to
Exchange Online (for example, Outlook, Windows Mail, and Mozilla Thunderbird). The
features supported by each email client programs vary. For information about features
offered by specific POP3 and IMAP4 client programs, see the documentation that's
included with each application.
POP3 and IMAP4 provide access to the basic email features of Exchange Online and
allow for offline email access, but don't offer rich email, calendaring, and contact
management, or other features that are available when users connect with Outlook,
Exchange ActiveSync, Outlook on the web (formerly known as Outlook Web App), or
Outlook Voice Access.
7 Note
POP3 and IMAP4 email programs don't use POP3 and IMAP4 to send messages to the
email server. Email programs that use POP3 and IMAP4 rely on SMTP to send messages.
POP3 client programs download messages to a single folder on the client computer
(typically, the Inbox). POP3 can't synchronize multiple folders on the email server with
multiple folders on the client computer. POP3 also doesn't support public folder access.
IMAP4 clients are much more flexible and generally offer more features than POP3
clients. By default, IMAP4 clients don't remove downloaded messages from the email
server. This behavior makes it easy to access email message from multiple computers.
IMAP4 clients support creating and accessing multiple email folders on the email server.
For example, most IMAP4 clients can be configured to keep a copy of sent items on the
server so these messages are accessible from any computer.
IMAP4 supports additional features that are supported by most IMAP4 clients (for
example, viewing message senders and subjects before downloading the entire
message).
To send and receive messages every time the email application is started. When
this option is used, mail is sent and received only on starting the email application.
To send and receive messages manually. When this option is used, messages are
sent and received only when the user clicks a send-and-receive option in the client
user interface.
To send and receive messages every set number of minutes. When this option is
used, the client application connects to the server every set number of minutes to
send messages and download any new messages.
For information about how to configure these settings for the email application that you
use, see the Help documentation that's provided with the email application.
For always-connected clients, the user might configure the email application to send
and receive messages every set number of minutes. Connecting to the email server at
frequent intervals lets the user keep the email application up-to-date with the most
current information on the server.
However, if the client isn't always connected to the internet, the user might configure
the email application to send and receive messages manually.
7 Note
If the IMAP4 client supports the IMAP4 IDLE command, email transfers to and from
the Exchange Online mailbox might occur in nearly real time.
Enable or Disable POP3 or IMAP4 access
for a user in Exchange Online
Article • 02/22/2023
By default, POP3 and IMAP4 are enabled for all users in Exchange Online. You can
disable them for individual users. For additional information related to POP3 and IMAP4,
see POP3 and IMAP4.
If you've enabled security defaults in your organization, POP3 and IMAP4 are
already disabled in Exchange Online. For more information, see What are security
defaults?.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "POP3 and IMAP4 settings"
section in the Feature permissions in Exchange Online topic.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
2. In the result pane, select the user for which you want to enable or disable POP3,
and then select Edit .
3. In the User Mailbox dialog box, in the console tree, select Mailbox Features.
To enable IMAP4 for the user, under IMAP4: Disabled, select Enable.
To disable POP3 for the user, under POP3: Enabled, select Disable.
To disable IMAP4 for the user, under IMAP4: Enabled, select Disable.
5. Select Save.
PowerShell
PowerShell
PowerShell
PowerShell
3. In the User Mailbox dialog box, in the console tree, select Mailbox Features.
5. Select Save.
Set POP3 or IMAP4 settings for a user in
Exchange Online
Article • 02/22/2023
You use the Set-CASMailbox cmdlet to configure the PO3 and IMAP4 options for each
user. The configuration options are described in the following table.
For additional information related to POP3 and IMAP4, see POP3 and IMAP4.
You can only use Exchange Online PowerShell to perform this procedure. To learn
how to use Windows PowerShell to connect to Exchange Online, see Connect to
Exchange Online PowerShell.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "POP3 and IMAP4 settings"
entry in the Feature permissions in Exchange Online topic.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
PowerShell
The following example sets all meeting requests in incoming mail to USER01 to iCal
format for an IMAP4 user.
PowerShell
PowerShell
PowerShell
PowerShell
PowerShell
PowerShell
The following example sets the message retrieval format to text only for IMAP4 access
for USER01 .
PowerShell
PowerShell
) Important
PowerShell
This example calculates the exact size of IMAP messages for USER01.
) Important
PowerShell
PowerShell
Set-CASMailbox
Opt in to the Exchange Online endpoint
for legacy TLS clients using POP3 or
IMAP4
Article • 01/26/2023
Exchange Online no longer supports use of TLS1.0 and TLS1.1 in the service as of
October 2020. This change is due to security and compliance requirements for our
service. While no longer supported, our servers still allow clients to use those older
versions of TLS when connecting to the POP3/IMAP4 endpoint (outlook.office365.com).
In 2022, we plan to completely disable those older TLS versions to secure our customers,
and meet those security and compliance requirements. However, due to significant
usage, we've created an opt-in endpoint that legacy clients can use with TLS1.0 and
TLS1.1.
7 Note
This opt-in endpoint isn't available in GCC, GCC-High, or DoD environments that
have legacy TLS permanently turned off.
pop-legacy.office365.com
imap-legacy.office365.com
Customers who use Microsoft 365 operated by 21 Vianet need to configure their clients
to use the endpoint:
pop-legacy.partner.outlook.cn
imap-legacy.partner.outlook.cn
Consumer users can use these less secure endpoints directly. For Enterprise users, tenant
admins need to enable the following setting:
To opt in with the new EAC, go to the Mail Flow settings page under Settings and
toggle the setting labeled Turn on use of legacy TLS clients.
PowerShell
To view the current status of the property, run the following command in Exchange
Online PowerShell:
PowerShell
See also
Enable or Disable POP3 or IMAP4 access for a user in Exchange Online
POP3 or IMAP4 settings
Opt in to the Exchange Online endpoint for legacy TLS clients using SMTP AUTH
Enable or disable authenticated client
SMTP submission (SMTP AUTH) in
Exchange Online
Article • 02/22/2023
) Important
Effective from December 2022, the classic Exchange Admin Center will be
deprecated for worldwide customers. Microsoft recommends using the new
Exchange Admin Center , if not already doing so.
While most of the features have been migrated to new EAC, some have been
migrated to other admin centers and remaining ones will soon be migrated to New
EAC. Find features that are not yet there in new EAC at Other Features or use
Global Search that will help you navigate across new EAC.
SMTP client email submissions (also known as authenticated SMTP submissions or SMTP
AUTH) are used in the following scenarios in Office 365 and Microsoft 365:
POP3 and IMAP4 clients. These protocols only allow clients to receive email
messages, so they need to use authenticated SMTP to send email messages.
Applications, reporting servers, and multifunction devices that generate and send
email messages.
The SMTP AUTH protocol is used for SMTP client email submissions, typically on TCP
port 587. SMTP AUTH supports modern authentication (Modern Auth) through OAuth in
addition to basic authentication. For more information, see Authenticate an IMAP, POP
or SMTP connection using OAuth.
Virtually all modern email clients that connect to Exchange Online mailboxes in Office
365 or Microsoft 365 (for example, Outlook, Outlook on the web, iOS Mail, Outlook for
iOS and Android, etc.) don't use SMTP AUTH to send email messages.
Therefore, we highly recommend that you disable SMTP AUTH in your Exchange Online
organization, and enable it only for the accounts (that is, mailboxes) that still require it.
There are two settings that can help you do this:
7 Note
To disable SMTP AUTH globally in your organization in the new EAC, go to the Mail
Flow settings page under Settings and toggle the setting labeled "Turn off SMTP
AUTH protocol for your organization"
To disable SMTP AUTH globally in your organization with PowerShell, run the following
command:
PowerShell
Note: To enable SMTP AUTH if it's already disabled, use the value $false .
PowerShell
2. Select the user, and in the flyout that appears, click Mail.
PowerShell
The value $null indicates the setting for the mailbox is controlled by the global setting
on the organization. You use the values $true (disabled) or $false (enabled) to override
the organization setting. The mailbox setting takes precedence over the organization
setting.
PowerShell
PowerShell
Set-CASMailbox -Identity chris@contoso.com -SmtpClientAuthenticationDisabled
$true
akol@contoso.com
tjohnston@contoso.com
kakers@contoso.com
The syntax uses the following two commands (one to identify the mailboxes, and the
other to enable SMTP AUTH for those mailboxes):
PowerShell
This example enables SMTP AUTH for the mailboxes specified in the file C:\My
Documents\Allow SMTP AUTH.txt.
PowerShell
7 Note
To disable SMTP AUTH for the mailboxes, use the value $true . To return control to
the organization setting, use the value $null .
Individual mailboxes in the Microsoft 365 admin center: Go to Users > Active
users > select the user > click Mail > click Manage email apps and verify the value
of Authenticated SMTP (checked = enabled, unchecked = disabled).
PowerShell
All mailboxes where SMTP AUTH is disabled: Run the following command:
PowerShell
All mailboxes where SMTP AUTH is enabled: Run the following command:
PowerShell
All mailboxes where SMTP AUTH is controlled by the organization setting: Run
the following command:
PowerShell
7 Note
We have already disabled TLS 1.0 and 1.1 for most Microsoft 365 services in the
world wide environment. For Microsoft 365 operated by 21 Vianet, TLS1.0 and
TLS1.1 will be disabled on June 30, 2023.
Exchange Online no longer supports use of TLS1.0 and TLS1.1 in the service as of
October 2020. This change is due to security and compliance requirements for our
service. While no longer supported, our servers still allow clients to use those older
versions of TLS when connecting to the SMTP AUTH endpoint (smtp.office365.com).
In 2022, we plan to completely disable those older TLS versions to secure our customers
and meet those security and compliance requirements. However, due to significant
usage, we've created an opt-in endpoint that legacy clients can use with TLS1.0 and
TLS1.1. Note that this endpoint is not available in GCC, GCC-High, or DoD environments
that have legacy TLS permanently turned off.
smtp-legacy.office365.com
Customers who use Microsoft 365 operated by 21 Vianet need to configure their clients
to use the endpoint
smtp-legacy.partner.outlook.cn
To use this less secure endpoint, admins need to enable the following setting:
Make sure that the mailbox is configured to allow sending using SMTP AUTH. For more
info, visit: Enable or disable authenticated client SMTP submission (SMTP AUTH) in
Exchange Online
To opt in with the new EAC, go to the Mail Flow settings page under Settings and
toggle the setting labeled "Turn on use of legacy TLS clients"
PowerShell
To view the current status of the property, run the following command in Exchange
Online PowerShell:
PowerShell
All of these scenarios involve the user sending a message, expecting it to be delivered,
and instead receiving a response stating that the message isn't delivered. Even in the
best-case scenario, like the automatic reply, these events result in lost productivity. In
the case of an NDR, this scenario could result in a costly call to the help desk.
There are also several scenarios where sending a message won't result in an error, but
can have undesirable, even embarrassing consequences:
All of these problematic scenarios can be mitigated by informing users of the possible
outcome of sending the message as they're composing the message. For example, if
senders are notified that the size of their message will exceed the maximum allowed
value, they won't attempt to send the message. Similarly, if senders are notified that
their message will be delivered to people outside the organization, they're more likely to
ensure that the content and the tone of the message are appropriate.
Invalid Outlook The sender adds an internal recipient that doesn't exist. For example:
Internal The non-existent recipient resolves due to an entry in the
Recipient sender's Auto-Complete List (also known as the nickname
cache) or an entry in the sender's Contacts folder.
The sender types a non-existent internal email address, and the
email address is in an accepted domain (an authoritative
domain) for the Exchange organization.
The MailTip indicates the invalid recipient and gives the sender the
option to remove the recipient from the message.
Mailbox Outlook The sender adds an internal recipient whose mailbox exceeds the
Full Outlook on maximum mailbox size (the ProhibitSendReceive quota on the
the web mailbox or organization).
The MailTip indicates the recipient whose mailbox is full and gives the
sender the option to remove the recipient from the message.
Automatic Outlook The sender adds an internal recipient* who has turned on Automatic
Replies Outlook on Replies.
the web
The MailTip indicates the recipient has Automatic Replies turned on
and also displays the first 175 characters of the automatic reply text.
Custom Outlook The sender adds an internal recipient that has a custom MailTip
Outlook on configured.
the web
A custom MailTip can be useful for providing specific information
about a recipient. For example, you can create a custom MailTip for a
distribution group explaining its purpose to reduce its misuse. For
more information, see Configure custom MailTips for recipients.
Restricted Outlook The sender adds a recipient that they're not allowed to send
Recipient Outlook on messages to (delivery restrictions are configured between the sender
the web and the recipient).
The MailTip indicates the prohibited recipient and gives the sender
the option to remove the recipient from the message. It also clearly
informs the sender that the message can't be delivered to the
restricted recipient.
Automatic Replies
Mailbox Full
Custom MailTip
Moderated Recipient
Oversize Message
External Outlook The sender adds an external recipient* or a distribution group that
Recipients Outlook on contains external recipients.
the web
The MailTip informs the sender that the message will leave the
Outlook organization, which can help them make the correct decisions about
Mobile wording, tone, and content.
By default, this MailTip is turned off. You can turn it on using the Set-
OrganizationConfig cmdlet. For details, see MailTips over
organization relationships.
Large Outlook The sender adds a distribution group that has more members than
Audience Outlook on the configured large audience size (the default size is more than 25
the web members). For details, see Configure the large audience size for your
organization.
Moderated Outlook The sender adds a moderated recipient (a recipient that requires
Recipient Outlook on message approval).
the web The MailTip identifies the moderated recipient and informs the
sender that moderation might result in delayed delivery.
Reply-All Outlook on A Bcc recipient selects Reply All a message. The MailTip appears in
on Bcc the web the reply message.
Oversize Outlook The message is larger than the maximum allowed message size.
Message
The MailTip is displayed if the message size violates one of the
following message size restrictions:
MailTip restrictions
MailTips are subject to the following restrictions:
While older versions of Exchange Server would populate MailTips in their entirety,
Exchange Online will only display up to 1000 characters.
If the sender starts composing a message and leaves it open for an extended
period of time, the Automatic Replies and Mailbox Full MailTips are evaluated
every two hours.
You can use Exchange Online PowerShell to configure various settings that define how
you use MailTips in your organization.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "MailTips" entry in the
Feature permissions in Exchange Online topic.
You can only use Exchange Online PowerShell to perform this procedure.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
Set-OrganizationConfig
Set-OrganizationConfig -MailTipsLargeAudienceThreshold 50
MailTips are informative messages displayed to users in the InfoBar in Outlook on the
web (formerly known as Outlook Web App) and Microsoft Outlook 2010 or later when a
user does any of the following while composing an e-mail message:
Add a recipient
Add an attachment
Open a message from the Drafts folder that's already addressed to recipients
In addition to the built-in MailTips that are available, you can create custom MailTips for
all types of recipients. For more information about the built-in MailTips, see MailTips.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "MailTips" entry in the
Feature permissions in Exchange Online topic.
You can configure the primary MailTip in the Exchange admin center (EAC) or in
Exchange Online PowerShell. However, you can only configure additional MailTip
translations in Exchange Online PowerShell.
HTML tags are automatically added to the text. For example, if you enter the
text: This mailbox is not monitored , the MailTip automatically becomes: <html>
<body>This mailbox is not monitored</body></html> . Additional HTML tags in
the MailTip aren't supported.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
2. Select any of the following recipient tabs based on the recipient type:
Mailboxes
Groups
Resources
Contacts
Shared
3. On the recipient tab, select the recipient you want to modify, and click Edit .
5. Enter the text for the MailTip. When you are finished, click Save.
PowerShell
For example, suppose you have a mailbox named "Help Desk" for users to submit
support requests, and the promised response time is two hours. To configure a custom
MailTip that explains this, run the following command:
PowerShell
Set-Mailbox "Help Desk" -MailTip "A Help Desk representative will contact
you within 2 hours."
PowerShell
<culture> is a valid ISO 639 two-letter culture code associated with the language.
For example, suppose the mailbox named Notifications currently has the MailTip: "This
mailbox is not monitored." To add the Spanish translation, run the following command:
PowerShell
Exchange Online allows you to configure organization relationships with other Exchange
organizations. Establishing an organization relationship allows you to enhance the user
experience when dealing with the other organization. For example, you can share free or
busy data, configure secure message flow, and enable message tracking across both
organizations.
MailTip Is the MailTip available when the access Is the MailTip available when the
level is set to All? access level is set to Limited?
Large Yes No
Audience
Moderated Yes No
Recipient
Mailbox Yes No
Full
Custom Yes No
MailTips
MailTip Is the MailTip available when the access Is the MailTip available when the
level is set to All? access level is set to Limited?
For detailed steps about how to configure MailTips access levels, see Manage MailTips
for organization relationships.
To achieve this, you need to first create a group and add all users for whom you want to
share recipient-specific MailTips to that group. You can then specify that group on the
organization relationship.
After you implement this restriction, your Client Access servers will first verify whether
the recipient for whom they received a MailTips query is part of this group. If the
recipient is a member of this group, the Client Access servers will proxy back all MailTips
including the recipient-specific MailTips. Otherwise they won't include the recipient-
specific MailTips in their response.
For detailed steps about how to configure MailTips access levels, see Manage MailTips
for organization relationships.
Manage MailTips for organization
relationships in Exchange Online
Article • 02/22/2023
You can use Exchange Online PowerShell to configure custom settings for MailTips
between various organizations.
By establishing an organizational relationship, you can enhance the user experience for
both organizations by sharing free/busy data, configuring secure message flow, and
enabling message tracking. For more information about organizational relationships, see
MailTips over organization relationships.
You can use various settings to control how MailTips are used between two
organizations that have established an organizational relationship. The procedures in
this section illustrate these various controls. In all examples, the on-premises
organization is contoso.com, the remote organization is online.contoso.com, and the
organizational relationship is named Contoso Online.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "MailTips" entry in the
Feature permissions in Exchange Online topic.
You can only use Exchange Online PowerShell to perform this procedure.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
Use Exchange Online PowerShell to enable or
disable MailTips between two organizations
This example configures the organizational relationship so that MailTips are returned to
senders in the remote organization when composing messages to recipients in your
organization.
PowerShell
This example configures the organizational relationship to prevent MailTips from being
returned to senders in the remote organization when composing messages to recipients
in your organization.
PowerShell
PowerShell
This example configures the organizational relationship so that only the Automatic
Replies, Oversize Message, Restricted Recipient, and Mailbox Full MailTips are returned.
PowerShell
7 Note
Don't use this method to disable MailTips for this relationship. To disable MailTips,
set the MailTipsAccessEnabled parameter to $false .
PowerShell
Automatic Replies
Mailbox Full
Custom MailTip
You can specify a MailTips access group on the organizational relationship. After you
specify a group, the recipient-specific MailTips are returned only for mailboxes, mail
contacts, and mail users that are members of that group. This example configures the
organizational relationship to return recipient-specific MailTips only for members of the
ShareMailTips@contoso.com group.
PowerShell
Add-ins for Outlook are applications that extend the usefulness of Outlook clients by
adding information or tools that your users can use without having to leave Outlook.
Add-ins are built by third-party developers and can be installed either from a file or URL
or from the Office Store. By default, all users can install add-ins. Exchange Online admins
can control whether users can install add-ins for Office.
Tip
For information about add-ins for Outlook from an end-user perspective, check out
Installed add-ins . The topic provides an overview of the add-ins and also shows
you some of the add-ins for Outlook that might be installed by default.
7 Note
The UI support for managing add-ins for Outlook in EAC will be discontinued.
However, you can still install them using the Powershell cmdlets mentioned here.
Notes:
Access to the Office Store isn't supported for mailboxes or organizations in specific
regions. For more information, contact your service provider.
URLs with redirections aren't supported in Exchange Server 2016, Exchange Server
2019, and Exchange Online. Use a direct URL to the manifest.
Some add-ins for Outlook are installed by default. Default add-ins for Outlook only
activate on English language content. For example, German postal addresses in the
message body won't activate the Bing Maps add-in.
To install add-ins for some or all users in your organization, see Get started with
Integrated apps.
The following cmdlets are a part of ExchangePowerShell module and are available in on-
premise Exchange and in the cloud-based service. Some parameters and settings might
be exclusive to one environment or the other, and details for the same can be found in
respective documentation for each section.
Updating an app
Use the Set-App cmdlet to modify the availability of organization apps. The Set-App
cmdlet can only be used when configuring the availability of an organization app. This
task requires that the specified app has either been installed using New-App cmdlet or is
a default app for Outlook.
Default apps in Outlook on the web and apps that you've installed for use by users in
your organization are known as organization apps. End users cannot remove
organization apps, but can enable or disable them. If an app is an organization app
(scope - default or organization), the delete control on the toolbar is disabled for end
users. Administrators can remove organization apps. They can't remove default apps but
can disable them for the entire organization.
Enabling an app
Use the Enable-App cmdlet to enable (turn on) a specific app for a specific user. The
Enable-App cmdlet requires that the specified app has already been installed (for
example, that it has been installed with the New-App cmdlet, or that it's a default app for
Microsoft Outlook).
Disabling an app
Use the Disable-App cmdlet to disable (turn off) a specific app for a specific user. The
Disable-App cmdlet requires that the specified app is an app that has either been
installed using New-app cmdlet or is a default app for Microsoft Outlook.
You can specify which administrators in your organization have permissions to install
and manage add-ins for Outlook. You can also specify which users in your organization
have permission to install and manage add-ins for their own use.
This is done by assigning or removing management roles specific to add-ins. There are
five built-in roles you can use.
Administrative roles
Org Marketplace Apps: Enables an administrator to install and manage add-ins
that are available from the Office Store for their organization.
Org Custom Apps: Enables an administrator to install and manage custom add-ins
for their organization.
By default, all administrators who are in the Organization Management role group have
both of the above administrative roles enabled.
User roles
My Marketplace Apps: Enables a user to install and manage Office Store add-ins
for their own use.
My Custom Apps: Enables a user to install and manage custom add-ins for their
own use.
My ReadWriteMailbox Apps: Enables a user to install and manage add-ins that
request the ReadWriteMailbox permission level in their manifest.
By default, all end users have all of the above user roles enabled.
7 Note
If you are testing Outlook add-ins and none are showing up, then as a first
troubleshooting step, use the Get-OrganizationConfig PowerShell cmdlet to query
the AppsForOfficeEnabled parameter. If the query returns a value of False, set this
parameter to True using the Set-OrganizationConfig cmdlet and then add-ins
should appear as expected.
You need to be assigned permissions before you can run this cmdlet. Although all
parameters for this cmdlet are listed in this topic, you may not have access to
some parameters if they're not included in the permissions assigned to you. To see
what permissions you need, see the "Role assignments" entry in the Feature
permissions in Exchange Online topic.
Access to the Office Store isn't supported for mailboxes or organizations in specific
regions. If you don't see Add from the Office Store as an option in the Exchange
admin center under Organization > Add-ins > New , you may be able to install
an add-in for Outlook from a URL or file location. For more information, contact
your service provider.
7 Note
URLs with redirections are not supported in Exchange Server 2016, Exchange
Server 2019, and Exchange Online. Use a direct URL to the manifest.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
Assign administrators the permissions required
to install and manage add-ins for your
organization
For detailed information about how to do this, see Manage role groups in Exchange
Online.
For detailed information about how to do this, see Manage role groups in Exchange
Online.
Prevent add-in downloads by turning off the
Office Store across Outlook
The following steps will ensure that all end users with the default policy will no longer
be able to install or manage Add-ins for Outlook.
7 Note
If a user is assigned a single admin role (for example, Security Reader), removing
the user roles My Custom Apps, My MarketPlace Apps, and My
ReadWriteMailbox Apps will not prevent add-in downloads for the user. Our
recommendedation is to have a separate accounts for admin privileges and end-
user day-to-day use.
PowerShell
This example shows you how to verify whom you've assigned permissions to install add-
ins from the Office Store for the organization.
PowerShell
Setting up an online meeting is a core experience for Outlook users. To meet the needs
of an increasing number of remote workers and students, Outlook for iOS and Android
has enabled add-ins to provide online meetings from third-party providers such as
Zoom, BlueJeans, and Webex (among others). End-users in your organization will be
able to use these add-ins to set up online meetings on third-party platforms.
7 Note
Both Outlook for iOS and Android support joining meetings from third-party online
meeting providers. In addition, Outlook for Android also supports creating meeting
requests for third-party online meeting providers.
7 Note
Add-ins installed by your end users will not override the default Teams or Skype
functionality.
If all users are Microsoft 365 or Office 365 users, then use the centralized
deployment portal. Centralized deployment provides the capability to install add-
ins more granularly, such as to sub-groups within a given organization.
If a tenant has users' mailboxes in on-premises Exchange Server, then use the
ECP/EAC portal. More information is available here.
Users cannot save the meeting until the online meeting details have been retrieved.
Meeting providers displayed in the New Event
screen
On a user's New Event screen, only a single meeting provider will be shown. If there are
multiple options, the logic to select which provider is displayed is as follows:
Priority 1: Any custom online meeting add-ins that are installed (this is a developer
scenario also known as "side loading").
Priority 2: An online meeting add-in that was installed by an administrator.
Default selection: If there are no admin-installed online Web conferencing add-ins,
the default option of Teams and Skype will be shown, as described in this article.
7 Note
Installing multiple add-in providers for online meetings on a user's device isn't
supported and may result in unexpected behavior.
Information for add-in developers is available in Create an Outlook mobile add-in for an
online-meeting provider.
UI-less command. Online meeting add-ins can only run in a UI-less mode, which
means the add-ins don't have the capability to launch a task pane.
Display dialogue. Login flow can be handled using full-screen dialog.
The specific APIs that are exposed are listed here.
Note that recipients of meeting invitations don't need to have the add-in for the
corresponding third-party meeting provider installed on their devices in order to join
the meeting.
Remote Connectivity Analyzer tests for
Exchange Online
Article • 02/22/2023
The Microsoft Exchange Remote Connectivity Analyzer (ExRCA) helps you make sure
that connectivity for your Exchange service is set up correctly. If you're having problems,
it can also help you find and fix these problems. The ExRCA website can run tests to
check for Microsoft Exchange ActiveSync, Exchange Web Services, Microsoft Outlook,
and internet email connectivity.
Exchange ActiveSync
Outlook
Internet email
Help Identify My Issue with Exchange DNS (only available in the Office 365 tab):
This test will check the external domain name settings for your verified domain in
Office 365. The test will look for issues with mail delivery such as not receiving
incoming email from the Internet and Outlook client connectivity issues that
involve connecting to Outlook and Exchange Online.
Exchange ActiveSync: This test simulates the steps that a mobile device uses to
connect to an Exchange server using Exchange ActiveSync.
Exchange Web Services connectivity tests
The Exchange Web Services tests check the settings for many of the Exchange Web
Services. You can run the following tests for Exchange Web Services:
Service Account Access (Developers): This test verifies a service account's ability
to access a specified mailbox, create and delete items in it, and access it via
Exchange impersonation. This test is primarily used by application developers to
test the ability to access mailboxes with alternate credentials.
Free/Busy (only available in the Office 365 tab): This test verifies that an Office
365 mailbox can access the free/busy information of an on-premises mailbox, and
vice versa (one direction per test run).
Outlook Connectivity: This test walks through the steps Outlook uses to connect
from the internet. It tests connectivity using both the RPC over HTTP and the MAPI
over HTTP protocols.
Inbound SMTP E-Mail: This test walks through the steps an internet email server
uses to send inbound SMTP email to your domain.
Outbound SMTP E-Mail: This test checks your outbound IP address for certain
requirements. This includes Reverse DNS, Sender ID, and RBL checks.
POP Email: This test walks through the steps an email client uses to connect to a
mailbox using POP3.
IMAP Email: This test walks through the steps an email client uses to connect to a
mailbox using IMAP.
Client Access Rules in Exchange Online
Article • 03/17/2023
Summary: Learn how administrators can use Client Access Rules to allow or block different types of client connections to Exchange
Online.
Client Access Rules help you control access to your Exchange Online organization based on client properties or client access requests.
Client Access Rules are like mail flow rules (also known as transport rules) for client connections to your Exchange Online organization.
You can prevent clients from connecting to Exchange Online based on their IP address (IPv4 and IPv6), authentication type, and user
property values, and the protocol, application, service, or resource that they're using to connect. For example:
Allow access to Exchange ActiveSync clients from specific IP addresses, and block all other ActiveSync clients.
Block access to Exchange Web Services (EWS) for users in specific departments, cities, or countries/regions.
Block access to an offline address book (OAB) for specific users based on their usernames.
Prevent client access using federated authentication.
Prevent client access using Exchange Online PowerShell.
Block access to the classic Exchange admin center (EAC) for users in a specific country or region.
For Client Access Rule procedures, see Procedures for Client Access Rules in Exchange Online.
7 Note
Block service account access when using EWS impersonation is not supported with Client Access Rules.
Beginning in October 2022, we've disabled access to client access rules for all existing Exchange Online organizations that weren't
using them. In October 2023, support for client access rules will end for all Exchange Online organizations. For more information,
see Deprecation of Client Access Rules in Exchange Online .
Conditions: Identify the client connections to apply the action to. For a complete list of conditions, see the Client Access Rule
conditions and exceptions section later in this topic. When a client connection matches the conditions of a rule, the action is
applied to the client connection, and rule evaluation stops (no more Rules are applied to the connection).
Exceptions: Optionally identify the client connections that the action shouldn't apply to. Exceptions override conditions and
prevent the rule action from being applied to a connection, even if the connection matches all of the configured conditions. Rule
evaluation continues for client connections that are allowed by the exception, but a subsequent rule could still affect the
connection.
Action: Specifies what to do to client connections that match the conditions in the rule, and don't match any of the exceptions.
Valid actions are:
Allow the connection (the AllowAccess value for the Action parameter).
Block the connection (the DenyAccess value for the Action parameter).
Note: When you block connections for a specific protocol, other applications that rely on the same protocol might also be
affected.
Priority: Indicates the order that the rules are applied to client connections (a lower number indicates a higher priority). The
default priority is based on when the rule is created (older rules have a higher priority than newer rules), and higher priority rules
are processed before lower priority rules. Remember, rule processing stops once the client connection matches the conditions in
the rule.
For more information about setting the priority value on rules, see Use Exchange Online PowerShell to set the priority of Client
Access Rules.
Multiple rules that The first rule is For example, if your highest priority rule blocks Outlook on the web connections, and you create another
contain the same applied, and rule that allows Outlook on the web connections for a specific IP address range, all Outlook on the web
condition subsequent rules are connections are still blocked by the first rule. Instead of creating another rule for Outlook on the web,
ignored you need to add an exception to the existing Outlook on the web rule to allow connections from the
specified IP address range.
Multiple conditions AND A client connection must match all conditions in the rule. For example, EWS connections from users in
in one rule the Accounting department.
One condition with OR For conditions that allow more than one value, the connection must match any one (not all) of the
multiple values in a specified conditions. For example, EWS or IMAP4 connections.
rule
Multiple exceptions OR If a client connection matches any one of the exceptions, the actions are not applied to the client
in one rule connection. The connection doesn't have to match all the exceptions. For example, IP address
19.2.168.1.1 or Basic authentication.
You can test how a specific client connection would be affected by Client Access Rules (which rules would match and therefore affect
the connection). For more information, see Use Exchange Online PowerShell to test Client Access Rules.
7 Note
Client Access Rules are evaluated after authentication and cannot be used to block raw connection or authentication attempts.
Important notes
Connections from your local network aren't automatically allowed to bypass Client Access Rules. Therefore, when you create Client
Access Rules that block client connections to Exchange Online, you need to consider how connections from your internal network
might be affected. The preferred method to allow internal client connections to bypass Client Access Rules is to create a highest
priority rule that allows client connections from your internal network (all or specific IP addresses). That way, the client connections are
always allowed, regardless of any other blocking rules that you create in the future.
Middle-tier applications owned by Microsoft (for example, Outlook for iOS and Android) will bypass blocking by Client Access Rules,
and will always be allowed. To provide additional control over these applications, you need to use the control capabilities that are
available in the applications.
Administration
You can only use PowerShell to manage Client Access Rules, so you need to be careful about rules that block your access to remote
PowerShell. If you create a rule that blocks your access to remote PowerShell, or if you create a rule that blocks all protocols for
everyone, you'll lose the ability to fix the rules yourself. You'll need to call Microsoft Customer Service and Support, and they will create
a rule that gives you remote PowerShell access from anywhere so you can fix your own rules. Note that it can take up to one hour for
this new rule to take effect.
As a best practice, create a Client Access Rule with the highest priority to preserve your access to remote PowerShell. For example:
PowerShell
New-ClientAccessRule -Name "Always Allow Remote PowerShell" -Action Allow -AnyOfProtocols RemotePowerShell -Priority 1
1
This protocol only applies to the classic Exchange admin center (EAC).
This table describes the conditions and exceptions that are available in Client Access Rules:
You can specify multiple values separated by commas. You can use
quotation marks around each individual value ("value1","value2"), but
not around all values (don't use "value1,value2").
Note: If specifying ExceptAnyOfAuthenticationTypes ,
AnyOfAuthenticationTypes must also be specified.
AnyOfClientIPAddressesOrRanges ExceptAnyOfClientIPAddressesOrRanges IPv4 and IPv6 addresses are supported. Valid values are:
A single IP address: For example, 192.168.1.1 or
2001:DB8::2AA:FF:C0A8:640A.
An IP address range: For example, 192.168.0.1-192.168.0.254
or 2001:DB8::2AA:FF:C0A8:640A-2001:DB8::2AA:FF:C0A8:6414.
Classless Inter-Domain Routing (CIDR) IP: For example,
192.168.3.1/24 or 2001:DB8::2AA:FF:C0A8:640A/64.
For more information about IPv6 addresses and syntax, see this
Exchange 2013 topic: IPv6 address basics.
IMAP4
OfflineAddressBook
OutlookAnywhere (includes MAPI over HTTP)
OutlookWebApp (Outlook on the web)
POP3
PowerShellWebServices
RemotePowerShell
REST
You can specify multiple values separated by commas. You can use
quotation marks around each individual value (" value1","value2"),
but not around all values (don't use "value1,value2").
Note: If you don't use this condition in a rule, the rule is applied to all
protocols.
Scope n/a Specifies the type of connections that the rule applies to. Valid values
are:
Users : The rule only applies to end-user connections.
All : The rule applies to all types of connections (end-users and
middle-tier apps).
UsernameMatchesAnyOfPatterns ExceptUsernameMatchesAnyOfPatterns Accepts text and the wildcard character (*) to identify the user's
account name in the format <Domain>\<UserName> (for example,
contoso.com\jeff or *jeff* , but not jeff* ). Non-alphanumeric
characters don't require an escape character.
You can specify multiple values separated by commas.
UserRecipientFilter n/a Uses OPath filter syntax to identify the user that the rule applies to.
For example, "City -eq 'Redmond'" . The filterable attributes are:
City
Company
CountryOrRegion
CustomAttribute1 to CustomAttribute15
Department
Office
PostalCode
StateOrProvince
StreetAddress
The search criteria uses the syntax "<Property> -<Comparison
operator> '<Value>'" .
<Property> is a filterable property.
-<Comparison Operator> is an OPATH comparison operator. For
example -eq for exact matches (wildcards are not supported)
and -like for string comparison (which requires at least one
wildcard in the property value). For more information about
comparison operators, see about_Comparison_Operators.
<Value> is the property value. Text values with or without
spaces or values with wildcards (*) need to be enclosed in
quotation marks (for example, '<Value>' or '*<Value>' ). Don't
use quotation marks with the system value $null (for blank
values).
You can chain multiple search criteria together using the logical
operators -and and -or . For example, "<Criteria1> -and
<Criteria2>" or "(<Criteria1> -and <Criteria2>) -or <Criteria3>" .
For more information about OPATH filter syntax, see Additional
OPATH syntax information.
1
This protocol only applies to the classic Exchange admin center (EAC).
Procedures for Client Access Rules in
Exchange Online
Article • 03/17/2023
Summary: Learn how to view, create, modify, delete, and test Client Access Rules in
Exchange Online.
Client Access Rules allow or block client connections to your Exchange Online
organization based on the properties of the connection. For more information about
Client Access Rules, see Client Access Rules in Exchange Online.
7 Note
Beginning in October 2022, we've disabled access to client access rules for all
existing Exchange Online organizations that weren't using them. In October 2023,
support for client access rules will end for all Exchange Online organizations. For
more information, see Deprecation of Client Access Rules in Exchange Online .
Verify that your rules work the way you expect. Be sure to thoroughly test each rule
and the interactions between rules. For more information, see the Use Exchange
Online PowerShell to test Client Access Rules section later in this topic.
The procedures in this topic are only available in Exchange Online PowerShell. To
learn how to use Windows PowerShell to connect to Exchange Online, see Connect
to Exchange Online PowerShell.
Client Access Rules support IPv4 and IPv6 addresses. For more information about
IPv6 addresses and syntax, see this Exchange 2013 topic: IPv6 address basics.
You need to be assigned permissions before you can perform this procedure or
procedures. To see what permissions you need, see the "Mail flow" entry in Feature
permissions in Exchange Online.
For information about keyboard shortcuts that may apply to the procedures in this
topic, see Keyboard shortcuts for the Exchange admin center.
Tip
Having problems? Ask for help in the Exchange forums. Visit the forums at
Exchange Online or Exchange Online Protection .
PowerShell
Get-ClientAccessRule
PowerShell
This example returns all the property values for the rule named "Block Client
Connections from 192.168.1.0/24".
PowerShell
This example returns only the specified properties for the same rule.
PowerShell
PowerShell
This example creates a new Client Access Rule named Block ActiveSync that blocks
access for Exchange ActiveSync clients, except for clients in the IP address range
192.168.10.1/24.
PowerShell
Notes:
As a best practice, create a Client Access Rule with the highest priority to preserve
your administrator access to remote PowerShell. For example: New-
ClientAccessRule -Name "Always Allow Remote PowerShell" -Action Allow -
This example creates a new Client Access Rule named Restrict EAC Access that blocks
access for the Classic Exchange admin center, except if the client is coming from an IP
address in the 192.168.10.1/24 range or if the user account name contains "tanyas".
PowerShell
Run this command in Exchange Online PowerShell to see the new rule in the list of
rules:
PowerShell
Get-ClientAccessRule
Replace <RuleName> with the name of the rule, and run this command to see the
details of the rule:
PowerShell
See which Client Access Rules would affect a specific client connection to Exchange
Online by using the Test-ClientAccessRule cmdlet. For more information, see the
Use Exchange Online PowerShell to test Client Access Rules section later in this
topic.
To modify a Client Access Rule in Exchange Online PowerShell, use this syntax:
PowerShell
This example disables the existing Client Access Rule named Allow IMAP4.
PowerShell
The values that you specify will replace any existing values.
To add or remove values without affecting other existing values, use this syntax:
@{Add="<Value1>","<Value2>"...; Remove="<Value1>","<Value2>"...}
This example adds the IP address range 172.17.17.27/16 to the existing Client Access
Rule named Allow IMAP4 without affecting the existing IP address values.
PowerShell
Replace <RuleName> with the name of the rule, and run this command to see the
details of the rule:
PowerShell
See which Client Access Rules would affect a specific client connection to Exchange
Online by using the Test-ClientAccessRule cmdlet. For more information, see the
Use Exchange Online PowerShell to test Client Access Rules section later in this
topic.
To set the priority of a Client Access Rule in Exchange Online PowerShell, use this syntax:
PowerShell
This example sets the priority of the rule named Disable IMAP4 to 2. All existing rules
that have a priority less than or equal to 2 are decreased by 1 (their priority numbers are
increased by 1).
PowerShell
Note: To set the priority of a new rule when you create it, use the Priority parameter on
the New-ClientAccessRule cmdlet.
Run the this command in Exchange Online PowerShell to see the list of rules and
their Priority values:
PowerShell
Get-ClientAccessRule
Replace <RuleName> with the name of the rule, and run this command:
PowerShell
PowerShell
This example removes the Client Access Rule named Block POP3.
PowerShell
Note: To disable a Client Access Rule without deleting it, use the Enabled parameter with
the value $false on the Set-ClientAccessRule cmdlet.
PowerShell
Get-ClientAccessRule
PowerShell
PowerShell
Archive features
The following sections describe the archive features of Microsoft Exchange Online
Archiving.
Archive mailbox
Exchange Online Archiving offers users advanced archiving capabilities with the
archive mailbox feature. An archive mailbox is a specialized mailbox that appears
alongside the users' primary mailbox folders in Outlook or Outlook on the web.
Users can access the archive in the same way that they access their primary
mailboxes. In addition, they can search both their archives and primary mailboxes.
Administrators can use the Exchange admin center (EAC) or remote Windows
PowerShell to enable the archive feature for specific users. For more information,
see Enable or disable archive mailboxes in Exchange Online.
) Important
A user's archive mailbox is intended for just that user. Microsoft reserves the
right to deny additional archive storage space in instances where a user's
archive mailbox is used to store archive data for other users or in other cases
of inappropriate use.
Import data from a .pst file using Outlook's Import and Export wizard.
Drag email messages from the primary mailbox into the archive.
Let archive policies automatically move email messages from the primary
mailbox, based on the age of the messages. For more information, see
Retention Tags and Retention Policies.
7 Note
Administrators can also use Office 365 Import service to import .pst files to
users' cloud-based archive mailboxes. For more information, see Use network
upload to import PST files to Office 365.
After an item has been removed from the archive's Deleted Items folder, the item is
kept in the archive's Recoverable Items folder for an additional 14 days before
being permanently removed. Users can recover these items using the Recover
Deleted Items feature in Microsoft Outlook or Outlook on the web.
If a user has manually purged an item from the Recoverable Items folder, an
administrator can recover the item within the same 14 day window, through a
feature called Single Item Recovery. This feature allows administrators to conduct a
multi-mailbox search to find purged items and then use the Search-Mailbox
Windows PowerShell cmdlet to move the items from the discovery mailbox to users'
mailboxes. For more information, see Enable or disable single item recovery for a
mailbox.
7 Note
The Single Item Recovery period is 14 days by default, but it can be customized
in some circumstances.
) Important
Feature availability
To view feature availability across plans, standalone options, and on-premises
solutions, see Exchange Online Archiving service description.
Enable or disable modern
authentication for Outlook in Exchange
Online
Article • 02/22/2023
) Important
Effective from December 2022, the classic Exchange Admin Center will be
deprecated for worldwide customers. Microsoft recommends using the new
Exchange Admin Center , if not already doing so.
While most of the features have been migrated to new EAC, some have been
migrated to other admin centers and remaining ones will soon be migrated to New
EAC. Find features that are not yet there in new EAC at Other Features or use
Global Search that will help you navigate across new EAC.
Notes:
7 Note
For tenants created before August 1, 2017, modern authentication is turned off by
default for Exchange Online and Skype for Business Online.
Enabling or disabling modern authentication in Exchange Online as described in
this topic only affects modern authentication connections by Windows-based
Outlook clients that support modern authentication (Outlook 2013 or later).
A user with multiple accounts configured in their Outlook profile might receive an
error when they try to connect to their mailbox. For more information, see KB
4516672
PowerShell
Note that the previous command does not block or prevent Outlook 2013 or
later clients from using basic authentication connections.
PowerShell
3. To verify that the change was successful, run the following command:
PowerShell
See also
How modern authentication works for Office 2013 and Office 2016 client apps
One of the questions we often hear is "How does Exchange Online back up my data?"
You may be asking this because you're concerned about how to recover your data if
there is a failure. Alternatively, you may be wondering how to recover your data if it gets
accidentally deleted. This topic answers these questions.
As a result, you can readily access up-to-date mailbox data in the event of a failure that
affects one of the database copies. In addition to having multiple copies of each mailbox
database, the different datacenters enforce the data using replication (data resiliency). If
one fails, the affected data are transferred to another data center with limited service
interruption, and users experience seamless connectivity.
7 Note
You can get the latest information related to a service interrupting event by logging
into the Service Health Dashboard. For more information, see How to check
Microsoft 365 service health.
Change how long permanently deleted items are kept for an Exchange Online
mailbox.
7 Note
Point in time restoration of mailbox items is out of scope for the Exchange Online
service, though there might be third-party solutions available that provide this
functionality. Exchange Online offers great retention and recovery support for your
organization's email infrastructure, and your mailbox data is available when you
need it, no matter what happens. For more information about additional options,
see the following topics:
However, if you need to provide additional storage for user emails, the best way is to
use Exchange Online Archiving. Using Outlook to backup data into PST files isn't
recommended due to the loss of discoverability and control of the content.
To learn how to restore deleted items in Outlook on the web (formerly known as
Outlook Web App), see Recover deleted items or email in Outlook on the web .
Microsoft wants to provide the best possible experience for all customers, including
customers with disabilities. This article contains links to articles written for people who
use the screen reader JAWS from Freedom Scientific or who use Narrator, the screen
reader built-in to Windows 10.
These articles provide help that depends only on specified keyboard shortcuts and a
screen reader.
The Disability Answer Desk support team is trained in using many popular assistive
technologies and can offer assistance in English, Spanish, French, and American Sign
Language. Please visit the Microsoft Disability Answer Desk site to find out the contact
details for your region.
Get started using a screen reader in the Exchange admin center in Exchange Online
Use a screen reader to open the Exchange admin center in Exchange Online
Use a screen reader to identify your admin role in the Exchange admin center in
Exchange Online
Use a screen reader to add a new room mailbox in the Exchange admin center in
Exchange Online
Use a screen reader to add a new shared mailbox in the Exchange admin center in
Exchange Online
Use a screen reader to edit the mailbox display name in the Exchange admin
center in Exchange Online
Use a screen reader to archive mailbox items in the Exchange admin center in
Exchange Online
Configure features
Use a screen reader to add a new mail contact in the Exchange admin center in
Exchange Online
Use a screen reader to work with mobile clients in the Exchange admin center in
Exchange Online
Use a screen reader to define rules that encrypt or decrypt email messages in the
Exchange admin center in Exchange Online
Use a screen reader to configure mail flow rule rules in the Exchange admin center
in Exchange Online
Use a screen reader to trace an email message in the Exchange admin center in
Exchange Online
Accessibility in the Exchange admin
center in Exchange Online
Article • 02/22/2023
The Exchange admin center (EAC) in Exchange Online includes accessibility features that
make it easy for users with limited dexterity, low vision, or other disabilities to work with
files. This means you can use keyboard shortcuts, a screen reader, or a speech
recognition tool to work with the EAC.
Get started
Navigate with Internet Explorer and keyboard shortcuts, and make sure that you have
the appropriate Office 365 or Microsoft 365 subscription and admin role to work in the
EAC. Then, open the EAC and get started. For more information about the EAC, see
Exchange admin center in Exchange Online.
For best results when working in the EAC in Exchange Online, use Internet Explorer as
your browser. Learn more about Internet Explorer keyboard shortcuts .
Many tasks in the EAC require the use of pop-up windows. In your browser, be sure to
enable pop-up windows for Microsoft 365 or Office 365.
For more information about the Exchange Online capabilities in your subscription plan,
go to What Microsoft 365 or Office 365 business product or license do I have? and
Exchange Online Service Description.
Under the title bar is the name, "Exchange admin center." The left pane lists about a
dozen Exchange administrative categories, for example, dashboard, permissions, and
mail flow. By default, dashboard has the focus.
The administrative category selected in the left feature pane affects the content of the
main window to its right. For example, when you select dashboard in the left pane, all
administrative categories display in the main window list view, along with their
subcategories. Likewise, when you select recipients in the left feature pane, a list of all
user mailbox names and addresses appears in the main window list view.
When you select an item in the main window list view, often a right pane presents a
details view about that item. For example, when you select the permissions
administrative category in the left features pane, a list of admin roles appears in the
main window list view, and the first admin role, Compliance Management, has the
focus. Information about Compliance Management appears in the right pane details
view.
Across the top of the main window list view, a set of menu tabs appears which lists
subcategories for the administrative category that has the focus. For example, when you
select protection in the left feature pane, menu tabs, such as malware filter and spam
filter, appear across the top of the main window. In addition, sometimes a toolbar
appears, with commands such as New, Edit, Delete, and Refresh.
The bottom of the main window is a status bar which indicates how many records are
selected.
Use a screen reader and keyboard shortcuts
The EAC includes accessible names that can be read by a screen reader as you work in
the application. You can use Narrator, the built-in screen reader in Windows, or a third-
party screen reader, such as JAWS . For more information, refer to Get started using a
screen reader in the Exchange admin center. You can also use Windows Speech
Recognition or a third-party speech tool to give voice commands to the EAC.
To navigate in the EAC and to cycle through groups of screen elements, press Ctrl+F6
(forward) or Ctrl+Shift+F6 (backward). To cycle through screen elements, including lists
of items, press the Tab key (forward) or Shift+Tab (backward). To select an item, press
Enter. To browse within menus or lists, press the Up Arrow key or the Down Arrow key,
and then, to make a selection, press Enter. To exit a menu or mode, press Esc. For more
details, go to Keyboard shortcuts for the Exchange admin center.
As you move around the areas of the EAC, your screen reader provides information
about the area that has the focus, whether it's the left feature pane (you hear "Primary
navigation, Link"), menu tabs, toolbar, main window list view (you hear "Secondary
navigation"), or details view in the right pane (in Narrator, you hear the contents of the
pane).
The Disability Answer Desk support team is trained in using many popular assistive
technologies and can offer assistance in English, Spanish, French, and American Sign
Language. Please visit the Microsoft Disability Answer Desk site to find the contact
details for your region.
Get started using a screen reader in the
Classic Exchange admin center in
Exchange Online
Article • 02/22/2023
You can use a screen reader with the Classic Exchange admin center (Classic EAC) in
Exchange Online to carry out administrative tasks. The EAC works with Narrator, the
built-in screen reader in Windows, or JAWS, a third-party screen reader. These screen
readers convert text to speech to read the contents of the EAC window.
Get started
Navigate with Internet Explorer and keyboard shortcuts, and make sure that you have
the appropriate Office 365 or Microsoft 365 subscription and admin role to work in the
EAC. Then, open the EAC and get started. For more information about the EAC, see
Exchange admin center in Exchange Online.
For best results when working in the EAC in Exchange Online, use Internet Explorer as
your browser. Learn more about Internet Explorer keyboard shortcuts .
Many tasks in the EAC require the use of pop-up windows. In your browser, be sure to
enable pop-up windows for Microsoft 365 or Office 365.
For more information about the Exchange Online capabilities in your subscription plan,
go to What Office 365 business product or license do I have? and Exchange Online
Service Description.
If Narrator doesn't read a newly opened window, press F5. Refreshing the browser
window resets the focus and Narrator reads the window.
If your screen reader stops reading, press Alt+Tab to leave the current window, and
then press Alt+Tab again to return to it. This resets the focus on the current
window to get your screen reader to read the window properly.
For more information about Narrator, refer to Hear text read aloud with Narrator . For
more information about JAWS, refer to the JAWS Screen Reader documentation .
Use a screen reader to open the Exchange admin center in Exchange Online
Work with mailboxes and recipients
Use a screen reader to edit the mailbox display name in the Exchange admin
center in Exchange Online
Use a screen reader to add a new mail contact in the Exchange admin center in
Exchange Online
Use a screen reader to add a new room mailbox in the Exchange admin center in
Exchange Online
Use a screen reader to add a new equipment mailbox in the Exchange admin
center in Exchange Online
Use a screen reader to add a new shared mailbox in the Exchange admin center
2016
Use a screen reader to define rules that encrypt or decrypt email messages in the
Exchange admin center 2016
Use a screen reader to work with mobile clients in the Exchange admin center in
Exchange Online
Use a screen reader to trace an email message in the Exchange admin center in
Exchange Online
Use a screen reader to export and review audit logs in the Exchange admin center
in Exchange Online
The Disability Answer Desk support team is trained in using many popular assistive
technologies and can offer assistance in English, Spanish, French, and American Sign
Language. Please visit the Microsoft Disability Answer Desk site to find the contact
details for your region.
Keyboard shortcuts for the Exchange
admin center in Exchange Online
Article • 02/22/2023
Many users find that keyboard shortcuts for the Exchange admin center (EAC) in
Exchange Online help them work more efficiently. For users with impaired mobility or
vision, keyboard shortcuts are an essential alternative to using the mouse.
Get started
Navigate with Internet Explorer and keyboard shortcuts, and make sure that you have
the appropriate Office 365 or Microsoft 365 subscription and admin role to work in the
EAC. Then, open the EAC and get started. For more information about the EAC, see
Exchange admin center in Exchange Online.
For best results when working in the EAC in Exchange Online, use Internet Explorer as
your browser. Learn more about Internet Explorer keyboard shortcuts .
Many tasks in the EAC require the use of pop-up windows. In your browser, be sure to
enable pop-up windows for Microsoft 365 or Office 365.
For more information about the Exchange Online capabilities in your subscription plan,
go to What Office 365 business product or license do I have? and Exchange Online
Service Description.
Use keyboard shortcuts
Notes:
The shortcuts in this topic refer to the US keyboard layout. Keys for other layouts
might not correspond exactly to the keys on a US keyboard.
If a shortcut requires pressing two or more keys at the same time, this topic
separates the keys with a plus sign (+). If you have to press one key immediately
after another, the keys are separated by a comma (,).
The EAC runs in your web browser, so it does not use accelerator keys or KeyTips.
For example, pressing Alt moves the focus to the browser menu bar, and familiar
shortcuts, like Ctrl+P (Print) and F1 (Help), run browser commands rather than EAC
commands.
Move within lists The Up Arrow key, the Down Arrow key, Home, End, Page Up, or Page Down
from one item to Note: You can also use the Up Arrow key, the Down Arrow key, the Left
another Arrow key, or the Right Arrow key to move between option buttons or within
a group of check boxes.
The Classic Exchange admin center (Classic EAC) is a web-based app that lets you
manage your Exchange Online organization in a web browser. Using a screen reader and
keyboard shortcuts, you can open the EAC and perform administrative tasks (based on
your permissions).
7 Note
When you work in the EAC, we recommend that you use Internet Explorer as your
web browser. For more information about the keyboard shortcuts you can use to
navigate the EAC and about other accessibility features that are available for
Exchange Online, see Learn more about Internet Explorer keyboard shortcuts
and Accessibility in Exchange Online.
1. Sign in to your organization's Microsoft 365 or Office 365 account. In the App
launcher, move the focus to the Admin app. You hear "Go to the Microsoft 365
admin center, Link." Press Enter.
Tip
If you use the My apps page to open your apps, to quickly move to the
Admin app (sometimes one of the last apps on the list), move the focus to the
Search apps box (one of the first elements on the page). In JAWS, you hear
"Leaving menus, My apps, Edit, Type text." In Narrator, you hear "Search apps,
Editing." Type admin, and then move the focus to the only search result on
the page: Admin app. You hear "Admin link." Press Enter.
2. As the Microsoft 365 admin center opens, in JAWS, you hear "Office 365,
Microsoft admin center, Home." In Narrator, you hear "Office 365, Editing..
3. To move the focus to the Expand link in the navigation pane, press the Tab key
until you hear one of the following two options.
"Expand navigation menu button." To expand the navigation pane, press
Spacebar.
4. To move the focus to Admin centers (the last item in the navigation pane), press
the Tab key until you hear "Admin centers..
5. To ensure that the Admin centers list is expanded so that you can access the items
in it, press the Tab key. Then, based on the audible feedback you hear, perform one
of the following two actions.
If you hear "Exchange link, Open Exchange admin center in a new tab," the
list is already expanded and you've selected Exchange.
If you hear something other than "Exchange link, Open Exchange admin
center in a new tab," the list is collapsed. To move the focus back to the
Admin centers list, press Shift+Tab. To expand the list, press Enter. In the
expanded Admin centers list, to select Exchange, press the Tab key until you
hear "Exchange link, Open Exchange admin center in a new tab..
6. To open the Exchange admin center, press Enter. As the Exchange admin center
opens in a new tab in your web browser, in JAWS, you hear "Exchange admin
center." In Narrator, you hear "Microsoft Exchange..
7. To move the focus to Dashboard (the first link), in the navigation pane of the
Exchange admin center, press Ctrl+F6 twice. In Narrator, you hear "Dashboard,
Primary navigation link..
Tip
To move to the rest of the items in the navigation pane, press the Tab key. To
open an item, press Enter. After you've opened an item, to move directly to
one of its elements in the content area on a page, press Ctrl+F6. To identify
the admin role groups to which you've been assigned, which determine the
tasks you can perform in the EAC, refer to Use a screen reader to identify
your admin role in the Exchange admin center.
Use a screen reader to add a new
equipment mailbox in the Classic
Exchange admin center in Exchange
Online
Article • 02/22/2023
Create mailboxes in the Classic Exchange admin center (Classic EAC) for any printer,
projector, or other device that's attached to your corporate network by using your
keyboard and any screen reader.
Get started
Navigate with Internet Explorer and keyboard shortcuts, and make sure that you have
the appropriate Office 365 or Microsoft 365 subscription plan and admin role to work in
the EAC. Then, open the EAC and get started.
For best results when working in the EAC in Exchange Online, use Internet Explorer as
your browser. Learn more about Internet Explorer keyboard shortcuts .
Many tasks in the EAC require the use of pop-up windows. In your browser, be sure to
enable pop-up windows for Microsoft 365 or Office 365.
For more information about the Exchange Online capabilities in your subscription plan,
go to What Office 365 business product or license do I have? and Exchange Online
Service Description..
Open the EAC, and confirm your admin role
To add a new equipment mailbox, Use a screen reader to open the Exchange admin
center and check that your global administrator has assigned you to the Organization
Management admin role group. Learn how to Use a screen reader to identify your
admin role in the Exchange admin center
2. Press the Tab key until you hear "Resources," which is the second link after
"Recipients."
3. To go to the Resources tab on the Mailboxes page, press Enter. The focus is on the
Resources tab.
4. To get to the New button in the Resources pane, press Ctrl+F6. You hear "New
button..
6. To go to the Equipment Mailbox option, press the Down Arrow key. You hear
"Equipment mailbox." (Narrator says, "Blank line.".
7. To open a New Equipment Mailbox form in a pop-up window, press Enter. You
hear the URL of the pop-up window and, eventually, "Equipment name." The focus
is in the Equipment Name box.
Tip
There are only three boxes on this form: Equipment Name, Email Address,
and Domain. All three are required.
8. Type in the name of the device and, to move to the Email Address box, press the
Tab key. You hear "Email address..
Tip
This name will appear in users' Outlook Address Book. To make rooms easier
for users to find, use a consistent naming convention within your
organization.
9. The email address is also required. Type in the first portion of the email address
(before the at sign) and, to get to the domain drop-down list, press the Tab key.
You hear the selected domain option.
10. If the default selection in the domain drop-down menu is not the domain you want
to choose, to access other available domains, press the Down Arrow key. As you
move through the available options, you hear the domain name and suffix. When
you find the domain you want to use, to select it, press Enter.
Tip
You cannot type any values into the domain box. It is a prepopulated drop-
down list. To add domains to that drop-down list, contact your Office admin.
11. To go to the Save button, press the Tab key. You hear "Save..
12. Press Enter. This saves the mailbox you created with the values you assigned, and
the pop-up window closes, returning you to the Resources list on the Resources
tab. The focus is on the New Mailbox button. You hear "New mailbox..
Tip
It may take a few minutes to save the new mailbox and close the pop-up window.
You do not hear any additional feedback during this wait time.
If you want to add additional information to your new room mailbox, learn about all the
options available in Use a screen reader to use mailbox properties and options in EAC
on Exchange Online.
The Disability Answer Desk support team is trained in using many popular assistive
technologies and can offer assistance in English, Spanish, French, and American Sign
Language. Please visit the Microsoft Disability Answer Desk site to find the contact
details for your region.
Use a screen reader to add a new mail
contact in the Classic Exchange admin
center in Exchange Online
Article • 02/22/2023
Using a screen reader with Exchange Online, you can use the Classic Exchange admin
center (Classic EAC) to set up a mail contact: a mail-enabled directory service object
containing information about a person or entity that exists outside of your Exchange
Online organization. Each mail contact has an external email address. For more
information about mail contacts, refer to the Recipients in Exchange Online article.
Get started
Navigate with Internet Explorer and keyboard shortcuts, and make sure that you have
the appropriate Microsoft 365 or Office 365 subscription plan and admin role to work in
the EAC. Then, open the EAC and get started.
For best results when working in the EAC in Exchange Online, use Internet Explorer as
your browser. Learn more about Internet Explorer keyboard shortcuts .
Many tasks in the EAC require the use of pop-up windows. In your browser, be sure to
enable pop-up windows for Microsoft 365 or Office 365.
For more information about the Exchange Online capabilities in your subscription plan,
go to What Office 365 business product or license do I have? and Exchange Online
Service Description..
2. To move the focus to the menu bar, press Ctrl+F6. You hear "Mailboxes, Secondary
navigation."
3. Press the Left Arrow key until you hear "Contacts, Secondary navigation," and then
press Enter. A table listing mail contacts appears.
4. To move the focus to the contacts menu bar, press Ctrl+F6 until you hear "New
button menu."
5. Press Spacebar, and then press the Down Arrow key until you hear "Mail contact."
Then, press Enter. The new mail contact window opens.
Note: In Narrator, if the menu options for the New button are not read, you hear
"Empty line." Mail contact is the first option. Mail user is the second option. When
you select Mail contact, if Narrator doesn't announce the name of the new mail
contact window or the First name box, to refresh the window and reestablish the
focus, press F5.
Note: Required boxes are designated with an asterisk. In screen readers, you hear
"star" or "asterisk" before the label. For example, in the required Display Name
box, you hear "Star display name" or "Asterisk display name.
*Alias. Type a unique alias (64 characters or less) for the contact.
*External email address. Type the contact's email address that is outside of
your organization. Email sent to the contact is forwarded to this email
address.
7. When you're finished, tab to the Save button. The new mail contact window
closes, and the contact is added to the table in the contacts window.
Use a screen reader to add a new room
mailbox in the Classic Exchange admin
center in Exchange Online
Article • 02/22/2023
Add a mailbox for conference rooms in the Exchange admin center (Classic EAC) in
Exchange Online by using keyboard shortcuts and your screen reader.
Get started
Navigate with Internet Explorer and keyboard shortcuts, and make sure that you have
the appropriate Microsoft 365 or Office 365 subscription plan and admin role to work in
the EAC. Then, open the EAC and get started.
For best results when working in the EAC in Exchange Online, use Internet Explorer as
your browser. Learn more about Internet Explorer keyboard shortcuts .
Many tasks in the EAC require the use of pop-up windows. In your browser, be sure to
enable pop-up windows for Microsoft 365 or Office 365.
For more information about the Exchange Online capabilities in your subscription plan,
go to What Office 365 business product or license do I have? and Exchange Online
Service Description..
2. Press the Tab key until you hear "Resources," which is the second link after
"Recipients."
3. To go to the Resources tab on the Mailboxes page, press Enter. The focus is on the
Resources tab.
4. To get to the New button on the Resources pane, press Ctrl+F6. You hear "New
button..
6. To go to the Room Mailbox option, press the Down Arrow key. You hear "Room
mailbox." (Narrator says, "Blank line.".
7. To open a New Room Mailbox form in a pop-up window, press Enter. You hear the
URL of the pop-up window and, eventually, "Room Name." The focus is in the
Room Name box. This is a required box.
8. Type in the name of the room and, to move into the Email Address box, press the
Tab key.
Tip
This name will appear in users' Outlook Address Books. To make rooms easier
for users to find, use a consistent naming convention within your
organization.
9. The email address is also required. Type in the first portion of the email address
(before the at sign) and, to get to the domain drop-down list, press the Tab key.
You hear the selected domain option.
10. If the default selection in the domain drop-down menu is not the domain you want
to choose, to access other available domains, press the Down Arrow key. As you
move through the available options, you hear the domain name and suffix. When
you find the domain you want to use, to select it, press Enter.
Tip
You cannot type any values into the domain box. It is a prepopulated drop-down
list. To add domains to that drop-down list, contact your Office admin.
11. To go to the Save button, press the Tab key. You hear "Save..
12. Press Enter. This saves the mailbox you created with the values you assigned, and
the pop-up window closes, returning you to the Resources list on the Resources
tab. The focus is on the New Mailbox button. You hear "New mailbox..
Tip
It may take a few minutes to save the new mailbox and close the pop-up window.
You do not hear any additional feedback during this wait time.
If you want to add additional information to your new room mailbox, learn about all the
options available in Use a screen reader to use mailbox properties and options in EAC
on Exchange Online.
The Disability Answer Desk support team is trained in using many popular assistive
technologies and can offer assistance in English, Spanish, French, and American Sign
Language. Please visit the Microsoft Disability Answer Desk site to find the contact
details for your region.
Use a screen reader to add a new shared
mailbox in the Classic Exchange admin
center in Exchange Online
Article • 02/22/2023
You can use your screen reader to create a shared mailbox in the Classic Exchange
admin center (Classic EAC) in Exchange Online. Shared mailboxes make it easy for a
group of people in your organization to monitor and send email from a common
account, such as info@contoso.com or support@contoso.com. When a person in the
group replies to a message sent to the shared mailbox, the email looks like it was sent
by the shared mailbox, not from the individual user. Learn more about shared
mailboxes.
Get started
Navigate with Internet Explorer and keyboard shortcuts, and make sure that you have
the appropriate Microsoft 365 or Office 365 subscription plan and admin role to work in
the EAC. Then, open the EAC and get started.
For best results when working in the EAC in Exchange Online, use Internet Explorer as
your browser. Learn more about Internet Explorer keyboard shortcuts .
Many tasks in the EAC require the use of pop-up windows. In your browser, be sure to
enable pop-up windows for Microsoft 365 or Office 365.
3. To move to the menu bar, press Ctrl+F6. You hear "Region mailboxes, secondary
navigation." (In Narrator, you hear "Mailboxes, secondary navigation link.")
4. Tab to Shared. You hear "Shared, secondary navigation link." Press Enter.
5. To move to the toolbar, press Ctrl+F6. You hear "New button." Press Enter.
6. In the Shared Mailbox dialog box which opens, the Display name text box has the
focus, and you hear "Type in text." (In Narrator, you hear "Display name, editing.")
Type the display name for the shared mailbox you're creating.
7. Tab to the Email address text box, and type the email address for the new shared
mailbox.
8. To select the users who can view and send mail from this new shared mailbox, tab
to and select the Add button.
9. When the Select Shared Mailbox Users dialog box opens, the Search box has the
focus. You hear "Filter or search edit." Type all or part of the name of the first user
you want to add to the shared mailbox and then, to search for the name, press
Enter.
10. Press the Tab key four times until you hear the name of the user in the search
results list. The name is selected.
11. Tab to the Add button, and press Enter or Spacebar. The selected name is added to
the list of users for the new shared mailbox.
12. To add a second user, tab several times until you hear "Filter or search edit." Type
all or part of the name of the next user you want to add, and press Enter. Repeat
steps 10 and 11. Do this for all users you want to add to the new shared mailbox.
13. When you finish adding users, tab to the OK button, and press Enter. The Shared
Mailbox dialog box has the focus again, and the selected users are listed in the
Shared Mailbox Users box.
14. Tab to the Save button, and press Enter. An alert says "Please wait." After the
shared mailbox is created, you hear another alert that says the mailbox will be
available in approximately 15 minutes.
15. With the focus on the OK button, press Enter. The new shared mailbox display
name and email address are listed in the shared list view, and it has the focus.
Details about the new shared mailbox are listed in the details pane on the right. To
review these details, press Ctrl+F6 or the Tab key until the details pane has the
focus.
Use a screen reader to add members to
a distribution group in the Classic
Exchange admin center in Exchange
Online
Article • 02/22/2023
Using a screen reader with the Classic Exchange admin center (Classic EAC) in Exchange
Online, you can add and remove members of a distribution group.
Get started
Navigate with Internet Explorer and keyboard shortcuts, and make sure that you have
the appropriate Microsoft 365 or Office 365 subscription plan and admin role to work in
the EAC. Then, open the EAC and get started.
For best results when working in the EAC in Exchange Online, use Internet Explorer as
your browser. Learn more about Internet Explorer keyboard shortcuts .
Many tasks in the EAC require the use of pop-up windows. In your browser, be sure to
enable pop-up windows for Microsoft 365 or Office 365.
For more information about the Exchange Online capabilities in your subscription plan,
go to What Office 365 business product or license do I have? and Exchange Online
Service Description..
Open the EAC, and confirm your admin role
To complete the tasks covered in this topic, Use a screen reader to open the Exchange
admin center and check that your global administrator has assigned you to the
Organization Management and Records Management admin role groups. Use a screen
reader to identify your admin role in the Exchange admin center.
2. To move the focus to the menu bar, press Ctrl+F6. You hear, "Mailboxes, Secondary
navigation."
3. Press the Left Arrow key until you hear "Groups, Secondary navigation," and then
press Enter. Options for distribution groups appear.
4. Press the Left Arrow key until you hear "Groups, Secondary navigation," and then
press Enter. Options for distribution groups appear.
5. To locate the distribution group you want to edit, use the Up Arrow and Down
Arrow keys and then press Enter. The Distribution Group window opens for the
group you selected. You hear "General tab..
6. Press the Down Arrow key until you hear "Membership tab." A list of members
appears with two controls: Add and Remove.
7. To add a member:
a. Tab to the Add button, and press Enter. The Select Members window opens and
lists all users in your organization. The focus is on the Search button.
b. Press Spacebar, and type all or part of a name. Users with that name appear in
the Display Name table.
c. Tab until you hear the first name listed, if any. (In JAWS, you hear "Out of table"
and the name of the first user, if any were found. In Narrator, if you hear
"Button" with no label, to move the focus into the table and hear the names,
press Spacebar.) Select the user you want, tab until you hear "Add button," and
then press Spacebar. You can add more names in this way.
d. When you're finished, tab to the OK button and press Enter. The Select Member
window closes.
9. When you are finished, tab to the Save button and press Enter.
The Disability Answer Desk support team is trained in using many popular assistive
technologies and can offer assistance in English, Spanish, French, and American Sign
Language. Please visit the Microsoft Disability Answer Desk site to find the contact
details for your region.
Use a screen reader to archive mailbox
items in the Classic Exchange admin
center in Exchange Online
Article • 02/22/2023
You can use your screen reader in the Classic Exchange admin center (Classic EAC) to
enable or disable archiving of items in an Exchange Online mailbox. You can also use
your screen reader in the EAC to apply retention policies to mailboxes. Learn more
about the archive mailboxes in Exchange Online.
Get started
Navigate with Internet Explorer and keyboard shortcuts, and make sure that you have
the appropriate Microsoft 365 or Office 365 subscription plan and admin role to work in
the EAC. Then, open the EAC and get started.
For more information about creating distribution groups, refer to Use a screen reader to
create a new distribution group in the Exchange admin center.
For best results when working in the EAC in Exchange Online, use Internet Explorer as
your browser. Learn more about Internet Explorer keyboard shortcuts .
Many tasks in the EAC require the use of pop-up windows. In your browser, be sure to
enable pop-up windows for Microsoft 365 or Office 365.
1. In the EAC, press Ctrl+F6 until the primary navigation pane has the focus and you
hear "Dashboard, Primary navigation link."
3. To move to the menu bar, press Ctrl+F6. You hear "Mailboxes, Secondary
navigation link." To select the mailboxes link, press Enter.
4. To search for the user for whom you want to enable archiving, press Ctrl+F6 and
then press the Tab key until you hear "Search button." Press Enter.
6. Press Ctrl+F6 until you hear the name of the user in the search results list. If the
search results list includes multiple names, press the Down Arrow key or the Up
Arrow key until you hear the name you want.
7. To move to the details pane, press Ctrl+F6. You hear "Unified Messaging link."
8. Press the Tab key about six times until you hear "Archiving link, Enable..
Tip: If the user is already enabled for archiving, you hear "Archiving link, Disable".
9. Press Enter. You hear "Are you sure you want to enable the archive?" With the
focus on the Yes button, press Enter.
Tip
If you want to enable archiving for additional users, move the focus back
to the list of mailboxes by pressing Ctrl+Shift+F6. Select the name you
want by pressing the Down Arrow key or the Up Arrow key, and repeat
steps 7 through 9.
1. In the EAC, press Ctrl+F6 until the primary navigation pane has the focus and you
hear "Dashboard, Primary navigation link."
3. To move to the menu bar, press Ctrl+F6. You hear "Mailboxes, Secondary
navigation link." To select the mailboxes link, press Enter.
4. To search for the user for whom you want to enable archiving, press Ctrl+F6 and
then press the Tab key until you hear "Search button." Press Enter.
6. Press Ctrl+F6 until you hear the name of the user whose mailbox archiving you
want to disable in the search results list. If the search results list includes multiple
names, press the Down Arrow key or the Up Arrow key until you hear the name
you want.
7. To move to the details pane, press Ctrl+F6. You hear "Unified Messaging link."
8. Press the Tab key about six times until you hear "Archiving link, Disable..
9. Press Enter. You hear "Are you sure you want to disable this archive?" With the
focus on the Yes button, press Enter.
Apply a retention policy to a user
The messaging records management (MRM) feature in Exchange Online helps you
manage the life cycle of your organization's email; it allows you to set retention policies.
Retention policies specify when certain types of mailbox items (including regular email
messages, deleted items, and junk mail) should be moved, archived, or deleted.
Exchange Online automatically applies the Default MRM Policy when you create a new
mailbox with an archive or when you enable an archive for an existing mailbox user.
Note: You can customize the Default MRM Policy by adding or removing retention tags
or by modifying tag settings. You can also replace the default policy with any retention
policies you create. To view, edit, or create a retention policy, on the EAC primary
navigation pane, select the compliance management link and then, on the menu bar,
select the retention policies link. Learn more about retention policies.
You can apply the same retention policy to all users, or you can apply different policies
to certain users.
1. In the EAC, press Ctrl+F6 until the primary navigation pane has the focus and you
hear "Dashboard, Primary navigation link."
3. To move to the menu bar, press Ctrl+F6. You hear "Mailboxes, Secondary
navigation link." To select the mailboxes link, press Enter.
4. To search for the user for whom you want to enable archiving, press Ctrl+F6 and
then press the Tab key until you hear "Search button." Press Enter.
6. Press Ctrl+F6 until you hear the name of the user in the search results list. If the
search results list includes multiple names, press the Down Arrow key or the Up
Arrow key until you hear the name you want. Press Enter.
7. In the Edit User Mailbox dialog box which opens, with the focus on the tab names,
press the Down Arrow key until the focus is on the mailbox features tab.
8. Tab to the Retention policy combo box. Default MRM Policy is the default entry.
Press the Down Arrow key or the Up Arrow key to move through the available
policies. Select the policy you want for this user.
9. Tab to the Save button and press Enter. The mailboxes list view has the focus
again.
Accessibility information
The Microsoft Accessibility website provides more information about assistive
technology.
The Disability Answer Desk support team is trained in using many popular assistive
technologies and can offer assistance in English, Spanish, French, and American Sign
Language. Please visit the Microsoft Disability Answer Desk site to find the contact
details for your region.
Use a screen reader to configure
collaboration in the Classic Exchange
admin center in Exchange Online
Article • 02/22/2023
You can use your screen reader in the Classic Exchange admin center (Classic EAC) in
Exchange Online to configure different methods of collaboration. These methods might
include public folders, distribution groups, or shared mailboxes.
Get started
Navigate with Internet Explorer and keyboard shortcuts, and make sure that you have
the appropriate Microsoft 365 or Office 365 subscription plan and admin role to work in
the EAC. Then, open the EAC and get started.
For best results when working in the EAC in Exchange Online, use Internet Explorer as
your browser. Learn more about Internet Explorer keyboard shortcuts .
Many tasks in the EAC require the use of pop-up windows. In your browser, be sure to
enable pop-up windows for Microsoft 365 or Office 365.
For more information about the Exchange Online capabilities in your subscription plan,
go to What Office 365 business product or license do I have? and Exchange Online
Service Description.
Open the EAC, and confirm your admin role
To complete the tasks covered in this topic, Use a screen reader to open the Exchange
admin center and check that your global administrator has assigned you to the
Organization Management and Records Management admin role groups. Use a screen
reader to identify your admin role in the Exchange admin center.
Public folders organize content in a hierarchy that's easy to browse. Users can discover
useful content by browsing through branches of the hierarchy that are relevant to their
work. The full hierarchy is visible to users in their Outlook folder view. Public folders can
be used for distribution group archiving. A public folder can be mail-enabled and added
as a member of the distribution group, so that email sent to the distribution group is
then automatically added to the public folder. Public folders also allow for simple
document sharing.
1. In the EAC, press Ctrl+F6 until the primary navigation pane has the focus and you
hear "Dashboard, Primary navigation link."
3. To move to the menu bar, press Ctrl+F6. You hear "Public folders, Secondary
navigation link..
5. To move to the toolbar, press Ctrl+F6. You hear "New public folder mailbox
button." Press Enter.
6. In the Public Folder Mailbox dialog box which opens, the Name text box has the
focus. Type the name for your public folder mailbox.
Tip
Public folder mailboxes contain the hierarchy information plus the content for
public folders. The first public folder mailbox you create becomes the primary
mailbox, which contains the one writable copy of the public folder hierarchy.
Any additional public folder mailboxes you create will be secondary
mailboxes, which contain a read-only copy of the hierarchy.
7. Tab to the Save button and press Enter. It might take up to a minute for the public
folder mailbox to be created, after which you hear an alert that says the mailbox
will be available in approximately 15 minutes.
8. With the focus on the OK button, press Enter. The new public folder mailbox is
added to the public folder mailboxes list view.
1. With the focus in the public folder mailboxes list view, to move to the menu bar,
press Ctrl+Shift+F6 twice. You hear "Public folders, Secondary navigation link."
Press Enter.
2. To move to the toolbar, press Ctrl+F6. You hear "New public folder button." Press
Enter. This creates a public folder at the root level in the public folder's hierarchy.
Tip
You can create a subfolder within an existing public folder. First, with the focus
in the public folders list view, to select the parent folder, press the Down
Arrow key or the Up Arrow key, and then press the Tab key. To open the
folder, press Enter. Then, to move to the toolbar, press Ctrl+Shift+F6. Select
the New public folder button, which has the focus, press Enter, and then go
on to Step 3. (If you want to move back to the parent folder, on the toolbar,
tab to the Go to the parent folder button and press Enter..
3. In the Public Folder dialog box which opens, the Name text box has the focus.
Type the name for your public folder.
4. To move to the Path text box, press the Tab key. In this read-only text box, you
hear the path for the public folder. For example, if you're creating a public folder at
the root level, you hear "Backslash..
5. Tab to the Save button and press Enter. The name of the new public folder is
added to the public folders list view.
1. With the focus in the public folders list view, to select the public folder you want to
add users to, press the Up Arrow key or the Down Arrow key.
2. To move to the details pane, press Ctrl+F6. The mail settings Enable link has the
focus.
3. To move to the folder permissions Manage link, press the Tab key and then press
Enter.
4. In the Public Folder Permissions dialog box which opens, the Add button has the
focus. Press Enter.
5. In the dialog box which opens, the Browse button has the focus. Press Enter.
6. In the Select Recipient dialog box which opens, the Search text box has the focus.
You hear "Filter or search edit." Type all or part of the name of the first user you
want to add to the shared mailbox and then, to search for the name, press Enter.
7. Press the Tab key about six times until you hear the name of the user in the search
results list. Press Enter.
Tip
If the search results list includes multiple names, press the Up Arrow key or
the Down Arrow key until you hear the name you want. Press Enter.
8. Tab to the Permission level combo box. The default permission level is Publishing
Editor, which allows selected users to create items and subfolders, read items, and
edit or delete all items. Other permission levels include Reviewer, Contributor,
Non Editing Author, Author, Editor, Publishing Author, and Owner. You can also
create a custom permission level.
9. To select the permission level for the selected user, press the Up Arrow key or the
Down Arrow key.
Tip
To review the rights allowed for a permission level, press the Tab key through
the 10 check boxes that specify the rights for the selected permission level. If
you change a check box setting, the permission level changes to Custom. If
you select the Custom permission level, all check boxes are cleared for you to
select what you want.
10. Tab to the Save button and press Enter. The user and associated permission level
are saved and added to the table of users in the Public Folder Permissions dialog
box.
11. To add another user, activate the Add button, which has the focus, by pressing
Enter. Repeat steps 5 through 10. Do this for all users you want to add to the new
public folder.
12. When you finish adding users, in the Public Folder Permissions dialog box, tab to
the Save button and press Enter. Wait several seconds for the information to be
saved. An alert specifies that the save operation is complete, and you hear "Close
button." To close the alert, press Enter. The public folders main page view has the
focus again.
7 Note
Public folders have size limits, and subfolders inherit permission settings from
parent folders in specific ways. In addition, you can enable mail settings for a public
folder. Learn more about creating public folders.
Accessibility Information
The Microsoft Accessibility website provides more information about assistive
technology.
The Disability Answer Desk support team is trained in using many popular assistive
technologies and can offer assistance in English, Spanish, French, and American Sign
Language. Please visit the Microsoft Disability Answer Desk site to find the contact
details for your region.
Use a screen reader to create a new
distribution group in the Classic
Exchange admin center in Exchange
Online
Article • 02/22/2023
Using a screen reader and keyboard shortcuts, you can create a new distribution group
in the Classic Exchange admin center (Classic EAC) in Exchange Online. This topic
explains how to create a new distribution group in your Exchange organization and how
to mail-enable an existing group in Active Directory.
Get started
Navigate with Internet Explorer and keyboard shortcuts, and make sure that you have
the appropriate Microsoft 365 or Office 365 subscription plan and admin role to work in
the EAC. Then, open the EAC and get started.
Notes:
The different types of groups that are covered in this topic are::
For more information, see Create and manage distribution groups in Exchange
Online.
If your organization has a group naming policy, it's applied only to groups created
by users (not admins). For more information, see Create a distribution group
naming policy in Exchange Online and Override the distribution group naming
policy in Exchange Online.
For best results when working in the EAC in Exchange Online, use Internet Explorer as
your browser. Learn more about Internet Explorer keyboard shortcuts .
Many tasks in the EAC require the use of pop-up windows. In your browser, be sure to
enable pop-up windows for Microsoft 365 or Office 365.
For more information about the Exchange Online capabilities in your subscription plan,
go to What Microsoft 365 Apps for business product or license do I have? and
Exchange Online Service Description..
2. To move the focus to the menu bar, press Ctrl+F6. You hear, "Mailboxes, Secondary
navigation link..
3. Press the Left Arrow key until you hear "Groups, Secondary navigation link..
4. Press Enter. You hear "Groups options." A list of distribution groups appears.
5. To move the focus to the distribution group menu, press Ctrl+F6. You hear " New,"
which is the first button.
Tip
The new distribution group window includes two buttons named Add and
two named Remove. The first set of Add and Remove buttons affects the
Select Owners box. The second set applies to the Select Members box.
Tip
Required boxes are designated with an asterisk. In screen readers, you hear
"Star" or "Asterisk" before the label. For example, for the required Display
name box, you hear "Star display name" or "Asterisk display name." You also
hear the text of a tool tip that appears when you move the focus to an option.
*Display name. Type the name you want to appear in your organization's
address book. This name appears on the To: line when email is sent to this
group and in the Groups list in the EAC. The display name is required. Make it
recognizable for users and unique in the forest.
*Alias. Type a name of 64 characters or less for the group's alias. Make it
unique in the forest. When a user types the alias in the To: line of an email
message, it resolves to the group's display name.
*Email address. If you want to change the default name used for this group's
email address, type the name you want. The default is the alias you specified.
Notes. If you want to add a description for this distribution group, type a
note. The text you type appears on the group's contact card and in the
address book.
Add. To open the Select Owners window, where you can add owners to the
distribution group, select Add. By default, the person who creates a group is
the owner and is listed in the Owners box. All groups must have at least one
owner. For help using the Select Owners window, refer to Use a screen
reader in the Select Owners window later in this topic.
Remove. To remove a selected name from the Owners box, use this option.
*Owners. This option lists the names of the distribution group's owners.
Screen readers read the selected name, not the label. For example, you hear
"Sara Davis, Button..
Add. To add members to the distribution group, select this option. By default,
the group owners are members and are listed in the Members box. When
you select the Add button, the Select Members window opens and you can
search for or select the names you want. To return to the new distribution
group window, select the OK button. For detailed steps, refer to Use a screen
reader to add a member to a distribution group.
Remove. Use to remove the selected name from the Members box.
Members. This option lists the names of the distribution group's members. In
Narrator, you may hear "Please wait" or nothing, when this list is empty.
Choose whether the group is open to leave. Screen readers read the
selected option. The default is Open. To require approval for people to leave
the group, use an arrow key to select Closed.
9. When you've finished, tab to the Save button and press Enter.
7 Note
3. Press the Left Arrow key until you hear "Groups, Secondary navigation," and then
press Enter. The table of current distribution groups appear.
4. Press Ctrl+F6 until you hear the name of a distribution group, indicating that the
focus is on the table of distribution groups.
5. To locate the distribution group you just created, use the Up Arrow and Down
Arrow keys. The screen reader reads the display name, group type, and e-mail
address.
1. In the new distribution group window, tab to the Add button and press Enter. The
Select Owner window opens, and the focus is on a search box.
2. Type all or part of the name of the user you want to add, and then press Enter. A
list of names appears in the Display Name table. If there are no names, press
Shift+Tab until you hear "Filter or search edit" or the text of your previous search
and then type new search text.
3. To select a name, tab until you hear a name, indicating that the focus is on the
names in the Display Name table. (In JAWS, you hear "Out of table" and the name
of the first user listed..
5. Tab until you hear "Add button" and then press Spacebar. The name is added to a
text box. Each name you add includes a Remove link.
6. To add more names, tab to the Search button and repeat the previous steps.
7. When complete, tab to the OK button and press Enter. The Select Owner window
closes, and the focus is in the Owners box in the new distribution group window.
The Disability Answer Desk support team is trained in using many popular assistive
technologies and can offer assistance in English, Spanish, French, and American Sign
Language. Please visit the Microsoft Disability Answer Desk site to find the contact
details for your region.
Use a screen reader to configure mail
flow rules in the Classic Exchange admin
center in Exchange Online
Article • 02/22/2023
Using a screen reader and keyboard shortcuts, you can create mail flow rules (also
known as transport rules) in Exchange Online in the Classic Exchange admin center (
Classic EAC) to look for specific conditions in messages that pass through your
organization and take action on them. The main difference between mail flow rules and
Inbox rules you would set up in an email client application (such as Outlook) is that mail
flow rules take action on messages while they're in transit as opposed to after the
message is delivered. Mail flow rules also contain a richer set of conditions, exceptions,
and actions, which provides you with the flexibility to implement many types of
messaging policies.
Note: To learn more about mail flow rules, see Mail flow rules (transport rules) in
Exchange Online.
Get started
Navigate with Internet Explorer and keyboard shortcuts, and make sure that you have
the appropriate Office 365 or Microsoft 365 subscription plan and admin role to
perform this task. Then, open the EAC and get started.
For best results when working in the EAC in Exchange Online, use Internet Explorer as
your browser. Learn more about Internet Explorer keyboard shortcuts .
Many tasks in the EAC require the use of pop-up windows. In your browser, be sure to
enable pop-up windows for Microsoft 365 or Office 365.
For more information about the Exchange Online capabilities in your subscription plan,
go to What Office 365 business product or license do I have? and Exchange Online
Service Description.
2. To move the focus to the mail flow link in the navigation pane, press the Tab key
until you hear "Mail flow, Primary navigation link." Press Enter.
3. To move the focus to the mail flow settings in the content area of the page, the
first of which is the rules link, press Ctrl+F6. You hear "Rules, Secondary navigation
link..
4. To create a new rule, move the focus to the New button by pressing the Tab key
until you hear "New button." Press Enter. You hear "Menu." To select the Create a
new rule option from the list of options that opens for the button, press the Down
Arrow key. You hear "Create a new rule." Press Enter.
5. As the focus moves to the Name text box in the new rule pop-up window, you
hear "New rule, Name, Edit." Type the name of the new rule. To move to the next
option in the window, press the Tab key.
6. As the focus moves to the Apply this rule if drop-down box, you hear "Apply this
rule if, Combo box." Press the Down Arrow or Up Arrow key until you hear the
condition you want to select. Press Enter. As the focus moves to the first user
interface (UI) element in the pop-up window that opens for the selected condition,
you hear the name of the pop-up window followed by the name of the first UI
element in the window. The following table gives you an overview of the UI
elements in each condition's pop-up window. .
The recipient is a member Add button and text box that includes the selected names.
of
Check names button and text box in which you type the name
you want to check.
Tip
To move the focus to each setting that's listed in a pop-up window, press the
Tab key. As you select each setting, you hear information about it. To open
drop-down box lists, press Spacebar. To move between and select options in
drop-down box lists, press the Down Arrow and Up Arrow keys. To choose an
option, press Enter. You can also use the Spacebar to select or clear the
selection for check boxes.
7. After you've accepted your condition settings in the appropriate pop-up window,
move to the next option in the new rule pop-up window by pressing the Tab key.
8. As the focus moves to the Do the following drop-down box, you hear "Do the
following, Combo box." Press the Down Arrow or Up Arrow key until you hear the
action you want to select. Press Enter. As the focus moves to the first UI element in
the pop-up window that opens for the selected action, you hear the name of the
pop-up window followed by the name of the first UI element in the window. The
following table gives you an overview of the UI elements in each action's pop-up
window.
Append the No pop-up window opens, but an Enter text link and a Select one link are
disclaimer inserted in the window after the drop-down box.
If you select the Enter text link, a pop-up window opens that
includes a text box in which you type the disclaimer, and the OK
and Cancel buttons.
If you select the Select one link, a pop-up window opens that
includes a drop-down box that opens a list of fallback actions in
case the disclaimer can't be inserted, and the OK and Cancel
buttons.
9. After you've accepted your action settings in the appropriate pop-up window,
move to the next option in the new rule pop-up window by pressing the Tab key.
10. As the focus moves to the Audit this rule with severity level check box, you hear
"Checked" or "Unchecked" depending on whether the box is selected or not,
followed by "Audit this rule with severity level, Check box." To select or clear the
selection for the check box, press Spacebar. You hear "Checked" or "Unchecked."
Do either of the following two actions.
If you selected the Audit this rule with severity level check box, when you
press the Tab key, the focus moves to a drop-down box that lists severity
levels ( Low, Medium, or High ). To move between severity levels in the list,
press the Up Arrow or Down Arrow key. You hear the name of each severity
level. To select a severity level, press Enter. To move to the next option in the
window, press the Tab key.
If you didn't select the Audit this rule with severity level check box, to move
to the next available option in the window, press the Tab key.
11. As the focus moves to the first of three available modes for the rule, you hear the
name of the first mode ( Enforce ) followed by "Radio button." Do any of the
following three actions.
The Enforce mode is selected by default. To move to and select the next
mode, press the Down Arrow key. After you've selected the mode you want,
to move to the next area of options in the window, press the Tab key.
To select the Test with Policy Tips mode, press the Down Arrow key. You hear
"Test with Policy Tips" followed by "Radio button." To move to and select the
next mode, press the Down Arrow key. After you've selected the mode you
want, to move to the next area of options in the window, press the Tab key.
To select the Test without Policy Tips mode, press the Down Arrow key. You
hear "Test without Policy Tips" followed by "Radio button." To move to and
select the next mode, press the Down Arrow key. After you've selected the
mode you want, to move to the next area of options in the window, press the
Tab key.
12. As the focus moves to the More options link, you hear "More options link." If you
want to add more options for the rule, press Enter. The following nine UI elements
are added to the window.
After the Apply this rule if drop-down box, an add condition button is
added.
After the Do the following drop-down box, an add action button is added.
After the add action button, an add exception button is added.
After the options for the modes for the rule, the following UI elements are
added:
Activate this rule on the following date check box, followed by a date drop-
down box and a time drop-down bo.
Deactivate this rule on the following date check box, followed by a date
drop-down box and a time drop-down bo.
13. To save the new rule, move the focus to the Save button by pressing the Tab key
until you hear "Save button." Press Enter.
14. As the focus moves back to the New button on the rules content area of the page,
you hear "Rules, New button." The new rule is turned on by default.
Tip
To turn off a new rule, press the Tab key to tab through the elements of the rules
content area of the page, use the Up Arrow and Down Arrow keys to select a rule,
and then press Spacebar. To hear the settings for a selected rule, press the Tab key
until the focus moves to the details pane for the selected rule, and you hear the
details for the rule.
Use a screen reader to define rules that
encrypt or decrypt email messages in
the Classic Exchange admin center in
Exchange Online
Article • 02/22/2023
In the Classic Exchange admin center (Classic EAC) in Exchange Online, you can create
mail flow rules (also known as transport rules) to enable or disable Microsoft Purview
Message Encryption. This lets you encrypt outgoing email messages and remove
encryption from encrypted messages coming from inside your organization or from
replies to encrypted messages sent from your organization.
Get started
Navigate with Internet Explorer and keyboard shortcuts, and make sure that you have
the appropriate Microsoft 365 or Office 365 subscription plan and admin role to
perform this task. Then, open the EAC and get started.
For best results when working in the EAC in Exchange Online, use Internet Explorer as
your browser. Learn more about Internet Explorer keyboard shortcuts .
Many tasks in the EAC require the use of pop-up windows. In your browser, be sure to
enable pop-up windows for Microsoft 365 or Office 365.
For more information about the Exchange Online capabilities in your subscription plan,
go to What Microsoft 365 Apps for business product or license do I have? and
Exchange Online Service Description..
2. To move the focus to the mail flow link in the navigation pane, press the Tab key
until you hear "Mail flow, Primary navigation link." Press Enter.
3. To move the focus to the mail flow settings in the content area of the page, the
first of which is the rules link, press Ctrl+F6. You hear "Rules, Secondary navigation
link..
4. To create a new rule, move the focus to the New button by pressing the Tab key
until you hear "New button." Press Enter. You hear "Menu." To select the Create a
new rule option from the list of options that opens for the button, press the Down
Arrow key. You hear "Create a new rule." Press Enter.
5. As the focus moves to the Name text box in the new rule pop-up window, you
hear "New rule, Name, Edit." Type the name of the new rule (such as Encrypt email
for email address). To move to the next option in the window, press the Tab key.
6. As the focus moves to the Apply this rule if drop-down box, you hear "Apply this
rule if, Combo box." Press the Down Arrow or Up Arrow key until you hear the
condition you want to select. Press Enter. For example, if you want to encrypt
messages for a particular email address, perform the following five steps.
a. In the Apply this rule if drop-down box, press the Down Arrow key until you
hear "The recipient is." Press Enter.
b. As the focus moves to the Search button in the Select Members pop-up
window that opens, you hear "Select Members, Search..
c. To move the focus to each of the following three elements of the user interface,
press the Tab key:
i. The Display Name column. You hear "Display Name, Column header..
ii. The list of names of each person in your organization in the Name column.
You hear the name of the first person followed by "Button..
iii. The first person in the list. You hear the name of the first person followed by
"Row."
d. The first person in the list. You hear the name of the first person followed by
"Row."
e. To accept your changes, move the focus to the OK button by pressing the Tab
key until you hear "Okay button." Press Enter.
7. As the focus moves back to the new rule pop-up window, you hear "New rule..
8. To move the focus to the More options link in the new rule pop-up window, press
the Tab key until you hear "More options link." Press Enter.
Tip
When you select the More options link, more user interface (UI) elements are
added to the page and more options are added to the combo boxes. To have
access to the Modify the message security option that you need to select in
the next step, you must select the More options link.
9. To move the focus back to the Do the following drop-down box in the new rule
pop-up window, press Shift+Tab until you hear "Do the following, Combo box."
Perform the following two steps.
a. In the Do the following drop-down box, to select the Modify the message
security option, press the Down Arrow key until you hear "Modify the message
security." Press Enter.
b. As the focus moves to a list of message security options, you hear the first
option in the list, "Apply rights protection." To select the Apply Office 365
Message Encryption option, press the Down Arrow key until you hear "Apply
Office 365 Message Encryption." Press Enter.
10. To save the new rule, move the focus to the Save button by pressing the Tab key
until you hear "Save button." Press Enter.
11. As the focus moves back to the New button on the rules content area of the page,
you hear "Rules, New button." The new rule is turned on by default.
Tip
To turn off a new rule, press the Tab key to tab through the elements of the rules
content area of the page, use the Up Arrow and Down Arrow keys to select a rule,
and then press Spacebar. To hear the settings for a selected rule, press the Tab key
until the focus moves to the details pane for the selected rule, and you hear the
details for the rule.
2. To move the focus to the mail flow link in the navigation pane, press the Tab key
until you hear "Mail flow, Primary navigation link." Press Enter.
3. To move the focus to the mail flow settings in the content area of the page, the
first of which is the rules link, press Ctrl+F6. You hear "Rules, Secondary navigation
link..
4. To create a new rule, move the focus to the New button by pressing the Tab key
until you hear "New button." Press Enter. You hear "Menu." To select the Create a
new rule option from the list of options that opens for the button, press the Down
Arrow key. You hear "Create a new rule." Press Enter.
5. As the focus moves to the Name text box in the new rule pop-up window, you
hear "New rule, Name, Edit." Type the name of the new rule (such as Remove
encryption from incoming mail). To move to the next option in the window, press
the Tab key.
6. As the focus moves to the Apply this rule if drop-down box, you hear "Apply this
rule if, Combo box." Press the Down Arrow or Up Arrow key until you hear the
condition you want to select. Press Enter. For example, if you want to decrypt all
incoming messages for your organization, perform the following four steps.
a. In the Apply this rule if drop-down box, press the Down Arrow key until you
hear "The recipient is located." Press Enter.
b. As the focus moves to a list of locations in the select recipient location pop-up
window that opens, you hear "Select recipient location..
c. To move between and select a location in the list, press the Down Arrow and Up
Arrow keys. You hear the name of each location. For example, to select the
Inside the organization location, press the Down Arrow key until you hear
"Inside the organization..
d. To accept your changes, move the focus to the OK button by pressing the Tab
key until you hear "Okay button." Press Enter.
7. As the focus moves back to the new rule pop-up window, you hear "New rule..
8. To move the focus to the More options link in the new rule pop-up window, press
the Tab key until you hear "More options link." Press Enter.
Tip
When you select the More options link, more user interface (UI) elements are
added to the page and more options are added to the combo boxes. To have
access to the Modify the message security option that you need to select in
the next step, you must select the More options link.
9. To move the focus back to the Do the following drop-down box in the new rule
pop-up window, press Shift+Tab until you hear "Do the following, Combo box."
Perform the following two steps.
a. In the Do the following drop-down box, to select the Modify the message
security option, press the Down Arrow key until you hear "Modify the message
security." Press Enter.
b. As the focus moves to a list of message security options, you hear the first
option in the list, "Apply rights protection." To select the Remove Office 365
Message Encryption option, press the Down Arrow key until you hear "Remove
Office 365 Message Encryption." Press Enter.
10. To save the new rule, move the focus to the Save button by pressing the Tab key
until you hear "Save button." Press Enter.
11. As the focus moves back to the New button on the rules content area of the page,
you hear "Rules, New button." The new rule is turned on by default.
Tip
To turn off a new rule, press the Tab key to tab through the elements of the rules
content area of the page, use the Up Arrow and Down Arrow keys to select a rule,
and then press Spacebar. To hear the settings for a selected rule, press the Tab key
until the focus moves to the details pane for the selected rule, and you hear the
details for the rule.
Use a screen reader to edit the mailbox
display name in the Classic Exchange
admin center in Exchange Online
Article • 02/22/2023
Use keyboard shortcuts and your screen reader to add or edit a mailbox's display name
in the Classic Exchange admin center (Classic EAC) in Exchange Online.
Get started
Navigate with Internet Explorer and keyboard shortcuts, and make sure that you have
the appropriate Microsoft 365 or Office 365 subscription plan and admin role to
perform this task. Then, open the EAC and get started.
For best results, when working in the EAC in Exchange Online, use Internet Explorer as
your browser. Learn more about Internet Explorer keyboard shortcuts .
Many tasks in the EAC require the use of pop-up windows. In your browser, be sure to
enable pop-up windows for Microsoft 365 or Office 365.
For more information on the Exchange Online capabilities in your subscription plan, go
to What Microsoft 365 Apps for business product or license do I have? and Exchange
Online Service Description.
2. Press the Tab key until you hear "Mailboxes." This is the first link after "Recipients."
3. To select the link and go to the Mailboxes page, press Enter. This takes you to the
Mailboxes tab on the Mailboxes page. The focus is on the Mailboxes tab.
4. To get to the Mailbox pane, press Ctrl+F6 twice. You hear the first name in the list
of mailboxes.
5. Use the arrow keys to select the mailbox you want to update. You hear each
mailbox user's name as that listing is selected.
6. When you have found the mailbox you want to edit, press Enter. This opens a pop-
up window. You hear the URL of that pop-up window. The focus is on the General
tab within the Edit Mailbox page.
7. To get to the Display Name field on the General tab, press the Tab key. You hear
"Display name..
9. To get to the Save button, press the Tab key (you hear "Save button"), and press
Enter. This returns you to the Mailbox List tab. The focus will be on the name you
just edited.
Tip
It may take a few minutes to save the new mailbox and close the pop-up
window. There is no additional feedback to provide during this wait time.
Use a screen reader to export and
review audit logs in the Classic
Exchange admin center in Exchange
Online
Article • 02/22/2023
You can export and review mailbox audit logs by using your screen reader in the Classic
Exchange admin center (Classic EAC) in Exchange Online. When enabled, Exchange
mailbox auditing logs information in the mailbox audit log whenever a user other than
the owner accesses the mailbox. Each log entry includes information about who
accessed the mailbox and the actions performed.
Get started
Navigate with Internet Explorer and keyboard shortcuts, and make sure that you have
the appropriate Microsoft 365 or Office 365 subscription plan and admin role to
perform this task. Then, open the EAC and get started.
For best results when working in the EAC in Exchange Online, use Internet Explorer as
your browser. Learn more about Internet Explorer keyboard shortcuts .
Many tasks in the EAC require the use of pop-up windows. In your browser, be sure to
enable pop-up windows for Microsoft 365 or Office 365.
4. Tab to auditing. You hear "Auditing, Secondary navigation link." Press Enter.
5. To access the main window list view, press Ctrl+F6. You hear "Audit reports..
6. Press the Tab key about six times until you hear " Export mailbox audit logs," and
press Enter.
7. In the Export Mailbox Audit Logs dialog box which opens, the Start date year
combo box has the focus, and you hear "Year of Start date combo box..
Tip
By default, the start date is set to two weeks before yesterday's date. When
enabled, the mailbox audit log typically stores entries for 90 days.
a. If necessary, type the start date year for the audit logs. You can also select the
start date year by pressing the Up Arrow key or the Down Arrow key.
b. Tab to the month text box, and type or select the start date month.
c. Tab to the day text box, and type or select the start date day.
8. Tab to the End date year combo box. You hear "Year of End date combo box..
Tip
a. If necessary, type the end date year for the audit logs. You can also select the
end date year by pressing the Up Arrow key or the Down Arrow key.
b. Tab to the month text box, and type or select the end date month.
c. Tab to the day text box, and type or select the end date day.
9. To access the select users button, press the Tab key twice. You hear "Search these
mailboxes or leave blank to find all mailboxes accessed by non-owners..
Tip
If you want to export audit logs for all mailboxes, don't select any users, and
go on to step 10. When the Search these users box is blank, the search
includes all mailboxes.
a. To open the Select Mailbox dialog box, with the focus on the select users
button, press Enter. The Search box has the focus, and you hear "Filter or search
edit." Type all or part of the name of the first mailbox whose audit logs you
want to export and then, to search for the name, press Enter.
b. To select a mailbox, press the Tab key four times until you hear the name of the
mailbox owner in the search results list. If there are multiple mailboxes in the
search results list, press the Down Arrow or Up Arrow key until you hear the
name of the mailbox owner.
Tip
You can select multiple consecutive mailboxes. To work with all mailboxes,
leave the Search box blank, or enter all or part of the mailbox names you
want to add. Tab to the search results. Press the Down Arrow key to hear
each name. To add them all, press Ctrl+A. To add several mailboxes listed
consecutively, press the Down Arrow key or the Up Arrow key until you
hear the first mailbox name you want to add, hold down the Shift key,
press the Down Arrow key or the Up Arrow key until you hear the last
mailbox name you want to add, and then release the Shift key. All
mailboxes between the first and last mailbox names are selected.
c. To add the selected mailbox(es) to the list to be included in the audit log export,
press Enter. The list of mailboxes retains the focus, so you can continue to add
more mailboxes by selecting them and pressing Enter.
Tip
To check the mailboxes you've added, tab to the Add button. To hear the
list of mailboxes, press the Tab key again. You hear the first mailbox name
in the list. To hear the second mailbox name in the list, press the Tab key
one more time. Continue pressing the Tab key until you hear the names of
all the mailboxes you've added. To delete a mailbox from the list, activate
the Remove link by pressing Enter when you hear the mailbox name.
d. To search for another mailbox or set of mailboxes, tab several times until you
hear "Filter or search edit." Type all or part of the name of the next mailboxes
you want to add, and press Enter. Repeat steps b and c. Do this for all mailboxes
you want to add.
e. To add an external mailbox, press the Tab key until you hear "Check names edit,
Type in text." (In Narrator, you hear "Editing.") Type the email address of the
external recipient, press Shift+Tab to select the Check names button, and then
press Enter. This verifies the email address and adds it to the list of mailboxes.
Tip
Be aware that if you type an external email address and press Enter, this
adds the address to the list and then closes the dialog box. If you're not
finished, use the Check names button to add it instead.
f. When you finish adding mailboxes, tab to the OK button and press Enter. The
Export Mailbox Audit Logs dialog box has the focus again, and the Search
these mailboxes text box lists the selected mailboxes.
10. Tab to the Search for access by combo box. This specifies which types of mailbox
non-owners you want the audit logs to show.
To have the audit logs show all non-owners, you don't need to do anything,
as this is the default.
To specify a certain group of non-owners, like External users (Microsoft
datacenter administrators), Administrators and delegated users, or
Administrators, press the Down Arrow key to move to the user type you
want, and then press Enter.
11. Press the Tab key twice to access the next select users button. You hear "Send the
audit report to picker button." To open the Select Members dialog box, press
Enter. The Search button has the focus.
a. To search for a user within your organization, press Enter, type all or part of the
name of the first audit log recipient, and then press Enter.
b. Press the Tab key several times until you hear the name of the user in the search
results list.
c. To add the user to the list of audit log recipients, press the Down Arrow key
until you hear the user's name, and then press Enter. The list of users retains the
focus, so you can continue to add more recipients by selecting their mailboxes
and pressing Enter.
Tip
To check the recipients you've added, tab to the Add button. To hear the
list of recipients, press the Tab key again. The first name is read. To hear the
second name in the list, press the Tab key one more time. Continue
pressing the Tab key until you hear the names of all the recipients you've
added. To delete a recipient from the list, activate the Remove link by
pressing Enter when you hear the username.
d. To search for another name or set of names from within your organization, tab
several times until you hear "Filter or search edit." Type all or part of the name
of the next user you want to add, and press Enter. Repeat steps b and c. Do this
for all audit report recipients in your organization.
e. To add an external recipient, press the Tab key until you hear "Check names edit,
Type in text." (In Narrator, you hear "Editing.") Type the email address of the
external recipient, press Shift+Tab to select the Check names button, and then
press Enter. This verified the email address and adds it to the list of recipients.
Tip
Be aware that if you type an external email address and press Enter, this
adds the recipient to the list and then closes the dialog box. If you're not
finished, use the Check names button to add it instead.
f. When you finish adding users, tab to the OK button and press Enter. The Export
Mailbox Audit Logs dialog box has the focus again, and the Send the audit
report to text box lists the audit log recipients.
12. Tab to the export button and press Enter. Exchange retrieves entries in the mailbox
audit log that meet your search criteria, saves them to a file named
SearchResult.xml, and then attaches the XML file to an email message sent within
24 hours to your selected audit log recipients.
Tip
If you hear an error message that says the items you're trying to open
couldn't be found, check that audit logging is enabled for the selected
mailboxes. Also check that the selected dates are within range. The dates
need to be after the date audit logging was enabled, and, by default, within
the past 90 days.
2. In the Inbox, find and open the message sent by Exchange or Outlook with a
subject including "Mailbox Audit Log Search" and an XML file attachment named
SearchResult.xml. The body of the email message contains the search criteria for
this exported audit log.
Tip
If Outlook is not configured to allow XML attachments, you might receive the
email message but not be able to open the XML attachment. Also, if you can't
find the message, you might need to wait longer. Recipients typically receive
the exported audit log within 24 hours, but in some cases it might take a few
days.
3. Select the message attachment and specify that you want to download the XML
file.
4. Open the SearchResult.xml file in Excel. Each log entry includes information about
non-owners of the mailbox who accessed the mailbox and the actions performed.
The following fields are included, among others, in the audit log:
LastAccessed The date and time of the most recent mailbox access
ClientIPAddress The IP address of the computer used by the non-owner to access the
mailbox
To complete administrative tasks in the Classic Exchange admin center (Classic EAC) in
Exchange Online, you need the appropriate administrative permissions, which are
grouped and assigned by role. By using a screen reader and keyboard shortcuts, you
can identify your admin role, in addition to the role you must be assigned to complete
particular tasks.
7 Note
To learn how to open the EAC, refer to Use a screen reader to open the Exchange
admin center. To learn more admin role groups, go to Manage role groups in
Exchange Online.
1. In the EAC, to move the focus to Dashboard, which is the first link in the navigation
pane, press Ctrl+F6 twice. You hear "Dashboard, Primary navigation link..
2. In the navigation pane, to move the focus to the Permissions link, press the Tab
key until you hear "Permissions, Primary navigation link." Press Enter.
3. To move the focus to the admin roles link on the content area of the page, press
Crtl+F6. You hear "Admin roles, Secondary navigation link."
4. To move the focus to each of the following three elements of the user interface,
press the Tab key for each element:
a. The main content for admin roles. You hear "Role groups."
c. The list of admin role groups in the Name column. You hear the name of the
first role group, which is Compliance Management, followed by "Row..
5. In the list of admin role groups, to move between and select the name of a group,
use the Up Arrow and Down Arrow keys. As you select each group, you hear its
name, followed by "Row."
6. Select the admin role group that includes the role you need to complete a task.
Tip
If you don't know the role required for a particular task, select the admin role
group that you think might include roles related to your task, perform step 6,
and pay particular attention to the assigned roles.
7. To move the focus to the details pane for the admin role group, press Ctrl+F6.
If you're using Narrator, you hear all the details for the admin role group,
including a description of the group, assigned roles, members, managed by,
and write scope.
If you're using JAWS, to hear the description of the admin role group, press
the Down Arrow key, and then, to hear the rest of the text in the details pane,
press Alt+Down Arrow.
8. If you do not hear your name among the members, you have not been assigned
the appropriate role to complete your task. Contact your Microsoft 365 or Office
365 administrator.
Use a screen reader to run an audit
report in the Classic Exchange admin
center in Exchange Online
Article • 02/22/2023
You can run audit reports and search for audit information by using your screen reader
in the Classic Exchange admin center (Classic EAC) in Exchange Online. Certain audit
reports can help you troubleshoot configuration issues by tracking specific changes
made by administrators. Other audit reports can help you monitor regulatory,
compliance, and litigation requirements.
Get started
Navigate with Internet Explorer and keyboard shortcuts, and make sure that you have
the appropriate Microsoft 365 or Office 365 subscription plan and admin role to work in
the EAC. Then, open the EAC and get started.
For best results when working in the EAC in Exchange Online, use Internet Explorer as
your browser. Learn more about Internet Explorer keyboard shortcuts .
Many tasks in the EAC require the use of pop-up windows. In your browser, be sure to
enable pop-up windows for Microsoft 365 or Office 365.
7 Note
Before you can search for non-owner mailbox access, you or another Admin must
enable mailbox audit logging, which is done in Exchange Online PowerShell. Learn
more about running a non-owner mailbox access report.
1. In the EAC, press Ctrl+F6 until the primary navigation pane has the focus and you
hear "Dashboard, Primary navigation link."
4. Tab to auditing. You hear "Auditing, Secondary navigation link." Press Enter.
5. To access the main window list view, press Ctrl+F6. You hear "Audit reports..
6. Press the Tab key about three times until you hear "Run a non-owner mailbox
access report." Press Enter.
7. In the Search for Mailboxes Accessed by Non-Owners dialog box which opens,
the Start date year combo box has the focus, and you hear "Year of Start date
combo box..
Tip
By default, the start date is set to two weeks before yesterday's date. When
enabled, the mailbox audit log typically stores entries for 90 days.
a. If necessary, type the start date year for your administrator configuration
change search. You can also select the start date year by pressing the Up Arrow
key or the Down Arrow key.
b. Tab to the month text box, and type or select the start date month.
c. Tab to the day text box, and type or select the start date day.
8. Tab to the End date year combo box. You hear "Year of End date combo box..
Tip
a. If necessary, type the end date year for your administrator configuration change
search. You can also select the end date year by pressing the Up Arrow key or
the Down Arrow key.
b. Tab to the month text box, and type or select the end date month.
c. Tab to the day text box, and type or select the end date day.
9. Press the Tab key to access the search button, and press Enter.
Tip
If you want to search all mailboxes for non-owner access, don't select any
specific mailboxes, and go on to step 10. When the Search these mailboxes
box is blank, the search includes all mailboxes.
a. To open the Select Mailbox dialog box, with the focus on the select mailboxes
button, press Enter. The Search box has the focus, and you hear "Filter or search
edit." Type all or part of the name of the first mailbox you want to include in the
non-owner mailbox access search and then, to search for the name, press Enter.
b. To select a mailbox, press the Tab key about four times until you hear the name
of the mailbox owner in the search results list. If there are multiple mailboxes in
the search results list, press the Down Arrow key or Up Arrow key until you hear
the name of the mailbox owner.
Tip
You can select multiple consecutive mailboxes. To work with all mailboxes,
leave the Search box blank, or enter all or part of the mailbox names you
want to add. Tab to the search results. Press the Down Arrow key to hear
each name. To add them all, press Ctrl+A. To add several mailboxes listed
consecutively, press the Down Arrow key or the Up Arrow key until you
hear the first mailbox name you want to add, hold down the Shift key,
press the Down Arrow key or the Up Arrow key until you hear the last
mailbox name you want to add, and then release the Shift key. All
mailboxes between the first and last mailbox names are selected.
Tip
To check the mailboxes you've added, tab to the Add button. To hear the
list of mailboxes, press the Tab key again. You hear the first mailbox name
in the list. To hear the second mailbox name in the list, press the Tab key
once more. Continue pressing the Tab key until you hear the names of all
the mailboxes you've added. To delete a mailbox from the list, activate the
Remove link by pressing Enter when you hear the mailbox name.
d. To search for another mailbox or set of mailboxes, tab several times until you
hear "Filter or search edit." Type all or part of the name of the next mailboxes
you want to add, and press Enter. Repeat steps b and c. Do this for all mailboxes
you want to add.
e. To add an external mailbox, press the Tab key until you hear "Check names edit,
Type in text." (In Narrator, you hear "Editing.") Type the email address of the
external recipient, press Shift+Tab to select the Check names button, and then
press Enter. This verifies the email address and adds it to the list of mailboxes.
Tip
Be aware that if you type an external email address and press Enter, this
adds the address to the list and then closes the dialog box. If you're not
finished, use the Check names button to add it instead.
f. When you finish adding mailboxes, tab to the OK button and press Enter. The
Search for Mailboxes Accessed by Non-Owners dialog box has the focus again,
and the Search these mailboxes text box lists the selected mailboxes.
10. Tab to the Search for access by combo box. This specifies which types of mailbox
non-owners you want the non-owner mailbox report to show.
To search the audit logs for administrator access, you don't need to do
anything, as this is the default.
To search the audit logs for another group of non-owners, like All non-
owners, External users (Microsoft datacenter administrators), or
Administrators and delegated users, press the Up Arrow key to move to the
user type you want.
11. Press the Tab key to access the Search button, and press Enter.
12. Press the Tab key about four times to access the search results. If any mailboxes
were accessed by a non-owner of the type you specified in the time period you
selected, you hear the name of the mailbox owner and the date the mailbox was
accessed by a non-owner. If none of the mailboxes were accessed by a non-owner,
you hear "There are no items to show in this view." (In Narrator, you hear "Contains
0 items.")
13. For more details about a non-owner mailbox access, with the item selected in the
search results list, press the Tab key to move to the details pane. To print the
contents of the details pane, press Enter. To hear the contents of the details pane,
press Tab again.
14. To close the dialog box, tab to the Close button and press Enter.
Tip
You can also export the log of non-owner access of mailboxes and review it in
an XML file. Learn more in Use a screen reader to export and review audit
logs in the Exchange admin center.
1. In the EAC, press Ctrl+F6 until the primary navigation pane has the focus and you
hear "Dashboard, Primary navigation link."
4. Tab to auditing. You hear "Auditing, Secondary navigation link." Press Enter.
5. To access the main window list view, press Ctrl+F6. You hear "Audit reports..
6. Press the Tab key about 12 times until you hear "Run the admin audit log report."
Press Enter.
7. In the View the Administrator Audit Log dialog box which opens, the Start date
year combo box has the focus, and you hear "Year of Start date combo box..
Tip
By default, the start date is set to two weeks before yesterday's date. The
administrator audit log typically stores entries for 90 days.
a. If necessary, type the start date year for your administrator configuration
change search. You can also select the start date year by pressing the Up Arrow
key or the Down Arrow key.
b. Tab to the month text box, and type or select the start date month.
c. Tab to the day text box, and type or select the start date day.
8. Tab to the End date year combo box. You hear "Year of End date combo box..
Tip
a. If necessary, type the start date year for your administrator configuration
change search. You can also select the end date year by pressing the Up Arrow
key or the Down Arrow key.
b. Tab to the month text box, and type or select the end date month.
c. Tab to the day text box, and type or select the end date day.
9. Press the Tab key to access the search button, and press Enter.
10. Press the Tab key about five times to access the search results. Press the Down
Arrow key or the Up Arrow key to hear the list of configuration changes made in
the time period you specified. For each item, you hear the date of the change, the
type of configuration change made, and the name of the Administrator who made
the change. If there were no configuration changes, you hear "There are no items
to show in this view." (In Narrator, you hear "Contains 0 items.")
11. For more details about a configuration change, with the change selected in the
search results list, press the Tab key to move to the details pane. To print the
contents of the details pane, press Enter. To hear the contents of the details pane,
press Tab again.
12. To close the dialog box, tab to the Close button and press Enter.
Tip
You can also export the admin audit log to an XML file and email it to specified
recipients. On the auditing page, press the Tab key until you hear "Export the admin
audit log." Press Enter and work through the Export the Administrator Audit Log
dialog box which appears. For more information, go to Use a screen reader to
export and review audit logs in the Exchange admin center.
1. In the EAC, press Ctrl+F6 until the primary navigation pane has the focus and you
hear "Dashboard, Primary navigation link."
4. Tab to auditing. You hear "Auditing, Secondary navigation link." Press Enter.
5. To access the main window list view, press Ctrl+F6. You hear "Audit reports..
6. Press the Tab key about nine times until you hear "Run an administrator role group
report." Press Enter.
7. In the Search for Changes to Administrative Role Groups dialog box which opens,
the Start date year combo box has the focus, and you hear "Year of Start date
combo box..
Tip
By default, the start date is set to two weeks before yesterday's date. The
administrator audit log typically stores entries for 90 days.
a. If necessary, type the start date year for your administrator role group change
search. You can also select the start date year by pressing the Up Arrow key or
the Down Arrow key.
b. Tab to the month text box, and type or select the start date month.
c. Tab to the day text box, and type or select the start date day.
8. Tab to the End date year combo box. You hear "Year of End date combo box..
Tip
a. If necessary, type the start date year for your administrator role group change
search. You can also select the end date year by pressing the Up Arrow key or
the Down Arrow key.
b. Tab to the month text box, and type or select the end date month.
c. Tab to the day text box, and type or select the end date day.
9. To access the select role groups button, press the Tab key twice. You hear "Search
these role groups or leave this box blank to find all changed role groups..
Tip
If you want to search all role groups for changes, don't select any specific role
groups, and go on to step 10. When the Search these role groups box is
blank, the search includes all role groups.
a. To open the Select a Role dialog box, with the focus on the select role groups
button, press Enter. The Search box has the focus, and you hear "Filter or search
edit." Type all or part of the name of the first role group you want to include in
the search and then, to search for the role group, press Enter.
b. To select a role group, press the Tab key about three times until you hear the
name of the role group in the search results list. If there are role groups in the
search results list, press the Down Arrow key or Up Arrow key until you hear the
name of the role group.
Tip
You can select multiple consecutive role groups. To work with all role groups,
leave the Search box blank, or enter all or part of the role group names you
want to add. Tab to the search results. Press the Down Arrow key to hear each
name. To add them all, press Ctrl+A. To add several role groups listed
consecutively, press the Down Arrow key or the Up Arrow key until you hear
the first role group name you want to add, hold down the Shift key, press the
Down Arrow key or the Up Arrow key until you hear the last role group name
you want to add, and then release the Shift key. All role groups between the
first and last names are selected.
c. To add the selected role group(s) to the list to be included in the role group
change search, press Enter. The list of role groups retains the focus, so you can
continue to add more role groups by selecting them and pressing Enter.
Tip
To check the role groups you've added, tab to the Add button. To hear the list
of role groups, press the Tab key again. You hear the first role group name in
the list. To hear the second role group name in the list, press the Tab key once
more. Continue pressing the Tab key until you hear the names of all the role
groups you've added. To delete a role group from the list, activate the
Remove link by pressing Enter when you hear the role group name.
d. When you finish adding role groups, tab to the OK button and press Enter. The
Search for Changes to Administrator Role Groups dialog box has the focus
again, and the Search these role groups text box lists your selected role groups.
10. Press the Tab key to access the Search button, and press Enter.
11. Press the Tab key about four times to access the search results. If any of your
selected role groups were changed in the time period you selected, you hear the
name of the role group and the date of the change. If none of the role groups
were changed, you hear "There are no items to show in this view." (In Narrator, you
hear "Contains 0 items.")
12. For more details about a role group change, with the change selected in the search
results list, press the Tab key to move to the details pane. To print the contents of
the details pane, press Enter. To hear the contents of the details pane, press Tab
again.
13. To close the dialog box, tab to the Close button and press Enter.
4. Tab to auditing. You hear "Auditing, Secondary navigation link." Press Enter.
5. To access the main window list view, press Ctrl+F6. You hear "Audit reports..
6. Press the Tab key about 15 times until you hear "Run an In-Place eDiscovery and
Hold report." Press Enter.
7. In the Search for changes to In-Place eDiscovery & Hold dialog box which opens,
the Start date year combo box has the focus, and you hear "Year of Start date
combo box..
Tip
By default, the start date is set to two weeks before yesterday's date. The
administrator audit log typically stores entries for 90 days.
a. If necessary, type the start date year for the eDiscovery and Hold change search.
You can also select the start date year by pressing the Up Arrow key or the
Down Arrow key.
b. Tab to the month text box, and type or select the start date month.
c. Tab to the day text box, and type or select the start date day.
8. Tab to the End date year combo box. You hear "Year of End date combo box..
Tip
a. If necessary, type the end date year for your eDiscovery and Hold change
search. You can also select the end date year by pressing the Up Arrow key or
the Down Arrow key.
b. Tab to the month text box, and type or select the end date month.
c. Tab to the day text box, and type or select the end date day.
9. Press the Tab key to access the Search button, and press Enter.
10. Press the Tab key about three times to access the search results. If any eDiscovery
or Holds were changed in the time period you selected, you hear their names. If
none have been changed, you hear "There are no items to show in this view." (In
Narrator, you hear "Contains 0 items.")
11. For more details about an eDiscovery or Hold change, with the change selected in
the search results list, press the Tab key to move to the details pane. To print the
contents of the details pane, press Enter. To hear the contents of the details pane,
press Tab again.
12. To close the dialog box, tab to the Close button and press Enter.
1. In the EAC, press Ctrl+F6 until the primary navigation pane has the focus and you
hear "Dashboard, Primary navigation link."
4. Tab to auditing. You hear "Auditing, Secondary navigation link." Press Enter.
5. To access the main window list view, press Ctrl+F6. You hear "Audit reports..
6. Press the Tab key about 21 times until you hear "Run a per-mailbox Litigation Hold
report." Press Enter.
7. In the Search for Changes to Per-Mailbox Litigation Hold dialog box which opens,
the Start date year combo box has the focus, and you hear "Year of Start date
combo box..
Tip
By default, the start date is set to two weeks before yesterday's date. The
administrator audit log typically stores entries for 90 days.
a. If necessary, type the start date year for your litigation hold change search. You
can also select the start date year by pressing the Up Arrow key or the Down
Arrow key.
b. Tab to the month text box, and type or select the start date month.
c. Tab to the day text box, and type or select the start date day.
8. Tab to the End date year combo box. You hear "Year of End date combo box..
Tip
a. If necessary, type the end date year for your litigation hold change search. You
can also select the end date year by pressing the Up Arrow key or the Down
Arrow key.
b. Tab to the month text box, and type or select the end date month.
c. Tab to the day text box, and type or select the end date day.
9. To access the select users button, press the Tab key twice. You hear "Search these
mailboxes or leave blank to find all mailboxes with litigation hold changes..
Tip
If you want to search all mailboxes for litigation hold changes, don't select any
specific mailboxes, and go on to step 10. When the Search these mailboxes
box is blank, the search includes all mailboxes.
a. To open the Select Members dialog box, with the focus on the select users
button, press Enter. The Search button has the focus. To search for a user within
your organization, press the Spacebar, type all or part of the name of the user,
and then press Enter.
b. Press the Tab key about seven times until you hear the name of the user in the
search results list.
c. To add the user to the list of mailboxes in the litigation hold search, press the
Down Arrow key until you hear the user's name, and then press Enter. The list of
users retains the focus, so you can continue to add more users by selecting their
mailboxes and pressing Enter.
Tip
To check the users you've added, tab to the Add button. To hear the list of
users, press the Tab key again. The first name is read. To hear the second
name in the list, press the Tab key once more. Continue pressing the Tab key
until you hear the names of all the users you've added. To delete a user from
the list, activate the Remove link by pressing Enter when you hear the
username.
d. To add an external user, press the Tab key until you hear "Check names edit,
Type in text." (In Narrator, you hear "Editing.") Type the email address of the
external user, press Shift+Tab to select the Check names button, and then press
Enter. This verifies the email address and adds it to the list of users.
Tip
Be aware that if you type an external email address and press Enter, this adds
the user to the list and then closes the dialog box. If you're not finished, use
the Check names button to add it instead.
e. When you finish adding users, tab to the OK button and press Enter. The Search
for Changes to Per-Mailbox Litigation Hold dialog box has the focus again, and
the Search these mailboxes text box lists the mailboxes to be searched for
litigation hold changes.
10. Press the Tab key to access the Search button, and press Enter.
11. Press the Tab key about three times to access the search results. If any mailboxes
had a change to its litigation hold status in the time period you selected, you hear
the name of the mailbox owner. If none of the mailboxes were accessed by a non-
owner, you hear "There are no items to show in this view." (In Narrator, you hear
"Contains 0 items.")
12. For more details about a litigation hold change, with the change selected in the
search results list, press the Tab key to move to the details pane. To print the
contents of the details pane, press Enter. To hear the contents of the details pane,
press Tab again.
13. To close the dialog box, tab to the Close button and press Enter.
Use a screen reader to trace an email
message in the Classic Exchange admin
center in Exchange Online
Article • 02/22/2023
You can trace email messages by using your screen reader in the Classic Exchange
admin center (Classic EAC) in Exchange Online. This is helpful if users are wondering
whether their messages are delayed or possibly lost in delivery. With message tracing,
you can follow messages as they pass through Exchange Online and determine whether
a targeted email message was received, rejected, deferred, or delivered.
Get started
Navigate with Internet Explorer and keyboard shortcuts, and make sure that you have
the appropriate Microsoft 365 or Office 365 subscription plan and admin role to
perform this task. Then, open the EAC and get started.
For best results when working in the EAC in Exchange Online, use Internet Explorer as
your browser. Learn more about Internet Explorer keyboard shortcuts .
Many tasks in the EAC require the use of pop-up windows. In your browser, be sure to
enable pop-up windows for Microsoft 365 or Office 365.
For more information about the Exchange Online capabilities in your subscription plan,
go to What Office 365 business product or license do I have? and Exchange Online
Service Description.
1. In the EAC, press Ctrl+F6 until the primary navigation pane has the focus and you
hear "Dashboard, Primary navigation link."
4. Tab to message trace. You hear "Message trace, Secondary navigation link." Press
Enter.
5. To access the main window list view, press Ctrl+F6. You hear "Message was sent or
received combo box, Past 48 hours."
6. The Date range combo box has the focus, and the default setting is Past 48 hours.
To cycle through the other choices, including Past 24 hours, Past 7 Days, and
Custom, press the Up Arrow or Down Arrow key.
Tip
If you select Custom, you can tab to and enter the time zone, start date and
time, and end date and time. These fields are not available unless you select
Custom in the Date range combo box. Note that there might not be any data
for messages that are less than four hours old. You cannot run a message
trace on a message more than 90 days old.
7. Tab to the Delivery status combo box. Choices are All (the default setting),
Delivered, Failed, Pending, Expanded, Quarantined, Filtered as spam, and
Unknown. Press the Down Arrow or Up Arrow key until the delivery status you
want is selected.
8. Tab to the Message ID text box. This is an optional field, but it can help narrow the
search results. The Message ID or Client ID is generated by the sending system and
can be found in the header of the message with the Message-ID: token. The
Message ID might include angle brackets (< >).
9. To specify senders (one or more) in the message trace, tab to the add sender
button and press Enter. In the Select Members dialog box, the Search button has
the focus.
a. To search for a user within your organization, press Enter, type all or part of the
name of the user, and then press Enter.
b. Press the Tab key about seven times until you hear the name of the user in the
search results list.
c. To add the user to the list of senders for the message trace, press the Down
Arrow key until you hear the user's name and then press Enter. The list of users
retains the focus, so you can continue to add more users by selecting their
mailboxes and pressing Enter.
Tip
To check the users you've added, tab to the Add button. To hear the list of
users, press the Tab key again. The first name is read. To hear the second
name in the list, press the Tab key one more time. Continue pressing the Tab
key until you hear the names of all the users you've added. To delete a user
from the list, activate the Remove link by pressing Enter when you hear the
username.
Tip
When you specify a wildcard, you cannot also add full email addresses to the
message trace. > Be aware that if you type an external email address and
press Enter, this adds the user to the list and then closes the dialog box. If
you're not finished, use the Check names button to add it instead.
e. When you finish adding users, tab to the OK button and press Enter. The
message trace page has the focus again, and the Sender text box lists the
senders you specified for the message trace.
10. To add a recipient to the message trace instead of or in addition to the senders,
tab to the add recipient button and press Enter. In the Select Members dialog box,
the Search button has the focus. To add one or more recipients to the message
trace, repeat step 9.
11. On the message trace page, tab to the search button and press Enter. The
Message Trace Results page opens and shows the date, sender, recipient, subject,
and status of the message(s) that are a result of the message trace.
Tip
When you run a trace for messages that are less than seven days old, the messages
should appear within 5-30 minutes. When you run a message trace for messages
that are more than seven days old, results may take up to a few hours. So if the
Message Trace Results page appears empty at first, check again later. An easy way
to do this is to keep this page open, and, on the toolbar, periodically tab to the
Refresh button and then press Enter.
12. To close the Message Trace Results page, tab to the Close button and press Enter.
1. In the EAC, press Ctrl+F6 until the primary navigation pane has the focus and you
hear "Dashboard, Primary navigation link."
5. To access the main window list view, press Ctrl+F6. You hear "Message was sent or
received combo box..
6. The Date range combo box has the focus. To move to the View pending or
completed traces link, press Shift+Tab. Press Enter. The pending or completed
traces page opens and shows the report title, date submitted, report status, and
messages.
7. To refresh the page, make sure that the Refresh button has the focus (this is the
default setting) and then press Enter.
8. To close the pending or completed traces page, tab to the Close button and press
Enter.
7 Note
You can use your screen reader in the Classic Exchange admin center (Classic EAC) to
enable the use of mobile devices for users of Exchange Online, who can then access
information in their Microsoft 365 or Office 365 mailboxes through mobile phones and
tablets. Learn more about clients and mobile in Exchange Online.
Get started
Navigate with Internet Explorer and keyboard shortcuts, and make sure that you have
the appropriate Microsoft 365 or Office 365 subscription plan and admin role to work in
the EAC. Then, open the EAC and get started.
For best results when working in the EAC in Exchange Online, use Internet Explorer as
your browser. Learn more about Internet Explorer keyboard shortcuts .
Many tasks in the EAC require the use of pop-up windows. In your browser, be sure to
enable pop-up windows for Microsoft 365 or Office 365.
For more information about the Exchange Online capabilities in your subscription plan,
go to What Microsoft 365 Apps for business product or license do I have? and
Exchange Online Service Description..
Open the EAC, and confirm your admin role
To complete the tasks covered in this topic, Use a screen reader to open the Exchange
admin center and check that your global administrator has assigned you to the
Organization Management and Records Management admin role groups. Use a screen
reader to identify your admin role in the Exchange admin center.
Outlook Web App (OWA) for Devices supports all password policies and won't
block any devices.
A password is optional.
To view, edit, or create a mobile device mailbox policy, on the EAC primary navigation
pane, select the mobile link and then, on the menu bar, select the mobile device
mailbox policies link. Learn more about the options you can set for mobile device
mailbox policies.
You can also specify Exchange ActiveSync access settings, maintain a list of quarantined
mobile devices, and set up device access rules. To do this, on the EAC primary navigation
pane, select the mobile link and then, on the menu bar, select the mobile device access
link.
With Outlook on the web (formerly known as Outlook Web App), users can access their
Exchange mailbox from almost any web browser, including from a browser on their
mobile devices. Learn more about Outlook on the web.
3. To move to the menu bar, press Ctrl+F6. You hear "Mailboxes, Secondary
navigation link." To select the mailboxes link, press Enter.
4. To search for the user for whom you want to enable Exchange ActiveSync, press
Ctrl+F6 and then press the Tab key until you hear "Search button." Press Enter.
6. Press Ctrl+F6 until you hear the name of the user in the search results list. If the
search results list includes multiple names, press the Down Arrow key or the Up
Arrow key until you hear the name you want.
7. To move to the details pane, press Ctrl+F6. You hear "Unified Messaging link,
Enable."
8. Press the Tab key. You hear "Mobile devices link, Enable Exchange ActiveSync..
Tip
If the user is already enabled for Exchange ActiveSync, you hear "Disable
Exchange ActiveSync..
9. Press Enter. You hear "Are you sure you want to enable Exchange ActiveSync?"
With the focus on the Yes button, press Enter.
10. Press the Tab key. You hear "Mobile devices link, Enable OWA for Devices."
Tip
If the user is already enabled for OWA for Devices, you hear "Disable OWA for
Devices..
11. Press Enter. You hear "Are you sure you want to enable OWA for Devices?" With
the focus on the Yes button, press Enter.
Tip
If you want to enable Exchange ActiveSync and Outlook on the web for
additional users, press Ctrl+Shift+F6 to move the focus back to the list of
users. Press the Down Arrow key or the Up Arrow key until you hear the name
you want, and repeat steps 7 through 11.
3. To move to the menu bar, press Ctrl+F6. You hear "Mailboxes, Secondary
navigation link." To select the mailboxes link, press Enter.
4. Press Ctrl+F6 twice to move to the list of users. Press the Down Arrow key or the
Up Arrow key to move to the first adjacent user. Hold down the Shift key and press
the Down Arrow key or the Up Arrow key to select more adjacent users.
Tip
5. Repeatedly press the Tab key until the Bulk Edit details pane has the focus and you
hear "Bulk Edit..
6. Press the Tab key until you hear "Enable link." Press Enter.
7. An alert asks "Are you sure you want to enable Outlook on the web for all the
selected recipients?" With the focus on the OK button, press Enter.
8. Press the Tab key about 10 times until you hear "Show link." Press the Tab key once
more. You hear "Enable link." Press Enter.
9. An alert asks "Are you sure you want to enable Exchange ActiveSync for all the
selected recipients?" With the focus on the OK button, press Enter.
Multi-Geo Capabilities in Exchange
Online
Article • 06/20/2023
In a multi-geo environment, you can select the location of Exchange Online mailbox
content (data at rest) on a per-user basis.
7 Note
7 Note
Multi-geo capabilities and Microsoft Teams regionally hosted meetings both use
the PreferredDataLocation property on user objects to locate services. If you
configure PreferredDataLocation values on user objects for regionally hosted
meetings, the mailbox for those users will be automatically moved to the specified
geo location after multi-geo is enabled on the Microsoft 365 tenant.
Users can't share mailbox folders across geo locations in Outlook on the web
(formerly known as Outlook Web App or OWA). For example, a user in the
European Union can't use Outlook on the web to open a shared folder in a mailbox
that's located in the United States. However, Outlook on the Web users can open
other mailboxes in different geo locations by using a separate browser window as
described in Open another person's mailbox in a separate browser window in
Outlook Web App .
Bifurcation (also known as forking) refers to the process of creating multiple copies of a
given message. All these copies will have the same message content, but different
envelopes.
Why bifurcation?
There are different purposes for which bifurcation can occur to a message in transit,
such as (including but not limited) recipient-based customization, routing, security, and
performance.
Recipient-based customization
Bifurcation enables customization of the message based on the recipient. Specifically,
the need for the occurrence of bifurcation to customize the message is created by the
following scenarios:
Routing
Bifurcation enables routing, and the need for the occurrence of bifurcation to route the
message is created by the following scenarios:
When mail flow rules (also known as Transport Rules) are applicable to only a
subset of recipients.
When the recipients have different next hop domains.
Security
Features such as anti-spam and other security-related ones might perform forking for
security and threat protection purposes.
Performance
Bifurcation facilitates good performance, and the need for the occurrence of bifurcation
to optimize performance is created by the following scenario:
A few implications of the occurrence of bifurcation are described in the following table:
It can How?
affect
It can How?
affect
Mail flow Rule conditions (or exceptions) that are met/fulfilled by the original message might
rules (also not be met/fulfilled by some of the forks. Rule actions will be executed
known as independently for all the forks (for example, generating a notification or incident
Transport report for each copy of the message).
Rules)
Moderation Each copy of the message will result in a separate approval request.
Journaling Multiple copies of a message will be archived, leading to increased storage costs.
Data Loss Policies that might have applied to the original message might no longer apply to
Prevention some of the forks. Rule actions will be executed independently for all the forks (for
(DLP) example, generating a notification or incident report for each copy of the
Policies message).
Sender Rewriting Scheme (SRS) in
Microsoft 365
Article • 07/19/2023
7 Note
The relay pool feature has been introduced in Microsoft 365 which affects SRS
rewriting behavior. Messages that qualify for this relay pool skip being rewritten by
SRS and are sent out of IPs that aren't part of the Microsoft 365 SPF record. This
mainly affects messages that fail SPF checks when they are entering Exchange
Online so that SRS does not fix these failures. For more information, see the relay
pool documentation here: Outbound delivery pools.
The Sender Rewriting Scheme (SRS) functionality was added to Microsoft 365 to resolve
a problem in which autoforwarding was incompatible with SPF. The SRS feature rewrites
the P1 From address (also known as the Envelope From address) for all applicable
messages that are sent externally from Microsoft 365.
7 Note
The From header, also known as the Display From address or P2 From address, that
is displayed by email clients remains unchanged.
The SRS functionality improves the delivery of applicable messages that pass Sender
Policy Framework (SPF) checks when they arrive from the original sender but fail SPF
checks at the final external destination after they're forwarded.
It's important to note that SRS rewriting is used to prevent spoofing of unverified
domains. You should send messages only from domains that you own and for which
you've verified your ownership through the Accepted Domains list. For more
information about Accepted Domains in Microsoft 365, see Manage accepted domains
in Exchange Online.
7 Note
SRS rewriting does not fix the issue of DMARC passing for forwarded messages.
Although an SPF check will now pass by using a rewritten P1 From address, DMARC
also requires an alignment check for the message to pass. For forwarded messages,
DKIM always fails because the signed DKIM domain does not match the From
header domain. If an original sender sets their DMARC policy to reject forwarded
messages, the forwarded messages are rejected by Message Transfer Agents
(MTAs) that honor DMARC policies.
PowerShell
When SRS rewrites the P1 From address, it increases the length of the username portion
of the email address. However, the email address has a limit of 64 characters. So if the
length of the rewritten email address exceeds 64 characters, it will take the following
form:
PowerShell
where <Default Accepted Domain> is the name of the default Accepted Domain set up
for the tenant.
PowerShell
bounces+SRS=<Hash>=<Timestamp>@<Default Accepted Domain>
In some situations, the relayed messages that are rewritten by SRS might not get
delivered, and a Non Delivery Report (NDR) might be generated.
To receive those NDRs, the tenant administrator must create a mailbox named
"bounces" that is hosted either on Exchange Online or on-premises. The domain for this
mailbox must be set to the default Accepted Domain for the tenant.
Use this article to understand the behavior of Exchange Online email items when they're
moved to the Deleted Items folder and retention tags from messaging records
management (MRM) or retention labels from Microsoft Purview are used for compliance
requirements.
There was a change of behavior in June 2023 that completes rollout in August 2023 for
items with retention tags or retention labels that are moved to the Deleted Items folder
and either of the following scenarios apply:
A retention tag or retention label was originally inherited from a parent folder
A retention label was autoapplied
These items with a retention tag or retention label applied in the ways listed are affected
when moved to the Deleted Items folder by drag & drop or manual deletion.
7 Note
This change doesn't affect the behavior for items that are permanently deleted by a
user (for example, using SHIFT+DEL), items that have no retention labels applied, or
items that have a retention label or retention tag manually applied by a user. It also
doesn't affect the behaviors of any other folders within the mailbox.
A retention label or retention tag that was inherited from a parent folder isn't
persisted when the item is moved to the Deleted Items folder.
A retention label that was autoapplied is replaced with a retention policy tag (RPT)
if one exists, after the item is moved to the Deleted Items folder.
After the change for the listed scenarios, the Deleted Items folder honors the principles
of retention. This means:
Any retention label, regardless of how it's applied, remains applied to the item and
is enforced if its settings are configured to retain the item when it's moved to the
Deleted Items folder, even if the Deleted Items folder has a retention policy tag
(RPT) applied.
When the Deleted Items folder doesn't have a retention policy tag (RPT) applied,
any retention label or retention tag, regardless of how it's applied, remains applied
to the item and is enforced.
For retention labels or retention tags that are configured for deletion-only rather
than retention-only or retention and then delete, and the Deleted Items folder has
a retention policy tag (RPT) applied:
An autoapplied retention label remains applied to the item and the deletion
settings from the retention label are enforced.
When an inherited retention label or inherited retention tag is applied to an
item, the item is deleted according to the shortest deletion period.
About Exchange Online documentation
Article • 02/22/2023
The Exchange Team Blog contains technical articles written by the Exchange Team, as
well as product announcements and updates. The blog is an excellent way to interact
with the Exchange Team. We read and respond to your feedback and comments.
If you're an admin for an Exchange hybrid or Exchange Online deployment, you may
also be interested in Manage Microsoft 365 and Office 365.
Additional resources
Looking for more than just documentation? Check out these other Exchange resources:
Exchange Online Forums: The forum provides a place to discuss Exchange Online
with users and Exchange Team members.