Renat Matveev , This hasn't been enabled recently. Direct Send really is how any SMTP server works, it listens on port 25 and accepts messages addressed to recipients within the tenant's accepted domains. However, by design, the basic SMTP protocol is inherently vulnerable to spam and spoofing, as it lacks built-in mechanisms to prevent such abuse. Implementing strong SPF, DKIM, and DMARC policies can significantly reduce the risk of unauthorized emails. That said, when your MX records point to a third-party service, it's always recommended to lock down your Exchange Online (EXO) tenant, as outlined in Step 4 of our documentation - https://learn.microsoft.com/en-us/exchange/mail-flow-best-practices/manage-mail-flow-using-third-party-cloud . With this configured, only mail that passes through an inbound connector is allowed into your tenant, otherwise it will be rejected.
4. Lock down your Exchange Online organization to only accept mail from your third-party service.
Create and configure a Partner inbound connector using either TlsSenderCertificateName (preferred) or SenderIpAddresses parameters, then set the corresponding RestrictDomainsToCertificate or RestrictDomainsToIPAddresses parameters to $True. Any messages that are smart-host routed directly to Exchange Online will be rejected (because they didn't arrive over a connection using specified certificate or from the specified IP addresses).
Microsoft understands the recent concerns around Direct Send, and while the attention is valid, it's important to clarify that SPF validation does occur for Direct Send messages. These emails are also subject to Compauth evaluation, and the final verdict can vary depending on how the domain’s MX records are configured.
So, while the reaction may seem heightened in some cases, it has helped surface scenarios where tenants may not be fully locked down, especially when inbound connectors aren't properly configured. This awareness has led to positive action, with many organizations now taking steps to strengthen their mail flow security. We believe the conversation is valuable and are committed to providing clear guidance to help secure Direct Send paths effectively.