Blog Post

Microsoft Entra Blog
4 MIN READ

Action required: MSOnline and AzureAD PowerShell retirement - 2025 info and resources

krbash's avatar
krbash
Icon for Microsoft rankMicrosoft
Jan 13, 2025

Retirement of MSOnline PowerShell begins in April 2025. Learn about the timeline and required actions.

As announced in Microsoft Entra change announcements and prior blog updates, the MSOnline and Microsoft AzureAD PowerShell modules were deprecated on March 30, 2024. The retirement for MSOnline PowerShell module starts in early April 2025 and ends in late May 2025. You must take action to avoid impact after this date by migrating any use of MSOnline to Microsoft Graph PowerShell SDK or Microsoft Entra PowerShell, which is currently in preview.

Key points 

  • MSOnline PowerShell will retire (and stop working) between early April 2025 and late May 2025.
  • AzureAD PowerShell will no longer be supported after March 30, 2025, but its retirement will happen after July 1, 2025. This postponement is to allow you time to finish MSOnline PowerShell migration.
  • To ensure customer readiness for MSOnline PowerShell retirement, a series of temporary outage tests will occur for all tenants between January and March 2025

You should plan to migrate use of MSOnline to Microsoft Graph PowerShell or Microsoft Entra PowerShell as soon as possible. Migration from AzureAD PowerShell can be prioritized after you have completed migration from MSOnline PowerShell.

Timeline summary

Module 

End of support 

Temporary outage tests

Retirement

MSOnline 

March 30, 2025 

Between January 20, 2025 and March 30, 2025

Early Apr 2025 to late May 2025  

AzureAD  

March 30, 2025 

N/A

After July 1, 2025 

 

March 2025 Updates 

  • Temporary outage tests for January and February are complete. You should expect up to two more temporary outages between March 10 and March 26th as final preparation for retirement of MSOnline PowerShell.
  • The retirement of MSOnline PowerShell will begin in the first week of April, 2025 and roll out incrementally. MSOnline PowerShell will stop working for all tenants and all clouds by late May, 2025.
  • We have released a new Microsoft Entra Recommendations report to help you track usage of the legacy MSOnline and AzureAD PowerShell modules. More information about this recommendation is below.
  • If you are using Microsoft Entra Connect Sync, you should upgrade to the latest version before April 7, 2025. As MSOnline PowerShell is retired, use of the installation wizard in versions older than 2.4.18.0 will be impacted until the Microsoft Entra Connect Sync client is updated. Read more about this here.  

MSOnline PowerShell

As part of our ongoing commitment to your security, the retirement of MSOnline PowerShell is prioritized and will happen between early April 2025 and late May 2025. MSOnline PowerShell will stop working when it is retired.

To ensure that customers are ready for this retirement of MSOnline PowerShell, we’ll be deploying a series of temporary outages from January through March 2025. During these temporary outages, use of MSOnline cmdlets will fail with a message indicating that MS Online PowerShell is disallowed. The projected timeline for these temporary outages is:

  • Between January 20, 2025 and February 28, 2025, tenants will experience at least two (2) temporary outages for MSOnline PowerShell each between 3 to 8 hours in duration and at different times of day.
  • During March 2025, all tenants will experience a temporary out of longer duration for final preparation for retirement of MSOnline PowerShell starting in April 2025.

After each of these temporary outages, functionality will be restored to allow you to continue migration of MSOnline PowerShell usage.

AzureAD PowerShell 

The deprecation notice period for AzureAD PowerShell ends on March 30, 2025. After this date, it will have no further maintenance or support commitments. To allow customers to focus on migration from MSOnline, we are targeting the third quarter of 2025 for its retirement.

Staying informed

We'll continue to update this blog post regularly as we move through 2025 to keep you up to date on the latest in these retirements. Where possible, we'll notify customers of expected impact through the Microsoft 365 Message Center and notifications in the Microsoft Entra admin center.

Identifying use of MSOnline and AzureAD PowerShell modules in your tenant

Entra recommendations

The new Migrate from the retiring MSOnline and AzureAD PowerShell usage to Microsoft Graph PowerShell recommendation, in Microsoft Entra Recommendations, reports on usage of these legacy PowerShell modules in your tenant in the last 30 days. You can access this recommendation in the Microsoft Entra admin center by browsing to: Identity > Overview> Recommendations.

 

Figure 1: Migrate from the retiring MSOnline and AzureAD PowerShell usage to Microsoft Graph PowerShell.Figure 2: More details from Migrate from the retiring MSOnline and AzureAD PowerShell usage to Microsoft Graph PowerShell.

The More details view summarizes the operations being performed, last request time, and number of users using the module.  

Sign-in logs

Microsoft Entra sign-in logs can be used to identify logins from MSOnline and AzureAD PowerShell. These log events provide information about the client and user for the PowerShell session. To use them:   

  • Navigate to the Microsoft Entra Admin Center.
  • Expand Identity and click Show more.
  • Under Monitoring & Health, select Sign-in logs.
  • Select the User sign-ins (non-interactive) tab, then click Add filters to launch the Pick a field object picker.
    • Select Application and click Apply.
    • In the Application prompt, enter Azure Active Directory PowerShell and click Apply.
  • Repeat these steps for user sign-ins (interactive) logs.

Both MSOnline PowerShell and AzureAD PowerShell sign-in events appear with the Application Name Azure Active Directory PowerShell. 

 

Kristopher Bash 

Product Manager, Microsoft Graph 
LinkedIn 

 

 

Read more on this topic

 

Learn more about Microsoft Entra

Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.

Updated Mar 13, 2025
Version 7.0

36 Comments