This is what we've done. But in hindsight, we shouldn't have to do this. I shouldn't see attempted messages being quarantined by EOP because some protocol or function was opened and available for an attacker to use which is why I'm stating about the .onmicrosoft.com MX records. We should have control over the 'default inbound connector' and our tenant be treated like it's an on-premise system. From a security standpoint, when things were on-premise we locked up our systems to only allow mail to come through 1 door and 1 door only for protection purposes this way everything is checked. And YES I get that building this connector does help with that, but the fact I still see spoofing attempts in EOP tells me that someone is still able to bypass the correct mail flow.