Update 8/12/2025: Added the FAQ to the post. Also, to help shed more light on the Direct Send feature, we published a newer post called Direct Send vs sending directly to an Exchange Online tenant.
...
If the email is blocked by Direct Send control, you won't be able to trace the message, because it will be blocked at the protocol layer with the following error-
The server response was: 5.7.68 TenantInboundAttribution; Direct Send not allowed for this organization from unauthorized sources. The fact that you are able to run message trace for the message means it is not blocked by the Direct Send control.
Having said that, to see the connector data, you can run the following command (give it some time after sending the email so that the data is populated) > Get-MessageTrace -MessageId "your message ID here" | Get-MessageTraceDetail | fl
In the output, you should be able to see the connector name like following-
You can also see the connector name under Email entity page (it will show the GUID of the connector)
How do we handle external sources that can send email in name of accepted domains (covered by SPF, DKIM and DMARC), but for which a connector is not possible or difficult to achieve? I am talking about third party platforms that are using cloud/hosted email services for distribution of email. I do not deem it to be wise to define connectors for these type of mails, for it will allow uncontrolled inbound traffic from these services going unchecked by DMARC coverage (namely DKIM, as SPF would be equally flawed for these types of setups)? I guess this is expected behavior given what is outlined in the blogpost, but is there really no way for Microsoft to achieve this on Exchange Online side by for example having the protocol layer pass on an 'evaluation' to an intermediate layer which dictates the mail was received via Direct-Send or not. Then DMARC compliance should be evaluated and determine whether the email should be delivered to the inbox or not? We are seeing this phenomenon with multiple of our clients who are taking the step to disabling Direct-Send.
Such services generally provide DKIM alignment capability now. DMARC authentication would suffice in such instances, though we do recommend use of inbound connectors where high volume traffic is expected inbound to the tenant from such services. Direct Send is really just sending directly to the mail server (in this instance, the mail server being O365), so essentially disabling direct send is saying "don't allow O365 to accept emails from my accepted domainsunless it is via an authorized route.
Thank you for your reply, but unfortunately this is not what we are seeing with our customers.
- DMARC passing mails, be it via SPF, DKIM or both are still being rejected once Direct-Send has been disabled. - We are able to resolve this by introducing a connector for the source IP's, but this brings me back to my original issue/question.
If you are interested, I have mail headers to illustrate the problem and an environment where we could test.