<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Exchange Team Blog articles</title>
    <link>https://techcommunity.microsoft.com/t5/exchange-team-blog/bg-p/Exchange</link>
    <description>Exchange Team Blog articles</description>
    <pubDate>Sat, 25 Apr 2026 14:00:59 GMT</pubDate>
    <dc:creator>Exchange</dc:creator>
    <dc:date>2026-04-25T14:00:59Z</dc:date>
    <item>
      <title>Modernizing DNS Security for Exchange Online Mail Flow</title>
      <link>https://techcommunity.microsoft.com/t5/exchange-team-blog/modernizing-dns-security-for-exchange-online-mail-flow/ba-p/4514248</link>
      <description>&lt;P&gt;The Domain Name System (DNS) protocol is used by clients to find mail servers over the internet. DNS is unencrypted and unauthenticated by default, making it vulnerable to spoofing, tampering, and adversary‑in‑the‑middle attacks. As threat actors increasingly target the foundational layers of email delivery, modern DNS security protocols have become essential to protecting organizations.&lt;/P&gt;
&lt;P&gt;To address these gaps, Exchange Online has invested heavily in &lt;STRONG&gt;modern, standards‑based DNS security &lt;/STRONG&gt;– including &lt;STRONG&gt;DNSSEC&lt;/STRONG&gt;, &lt;STRONG&gt;SMTP DANE&lt;/STRONG&gt;, and &lt;STRONG&gt;MTA‑STS&lt;/STRONG&gt; – to ensure mail is delivered over validated, encrypted, and tamper‑resistant channels by default wherever possible.&lt;/P&gt;
&lt;P&gt;In this post, we will provide updates on these efforts and discuss upcoming plans to keep raising the email security bar.&lt;/P&gt;
&lt;H4&gt;DNSSEC Enablement Wizard for Exchange Online&lt;/H4&gt;
&lt;P&gt;To simplify adoption of SMTP DANE with DNSSEC, in Q3 of calendar year 2026 we’re releasing a &lt;STRONG&gt;DNSSEC Enablement Wizard&lt;/STRONG&gt; in the Exchange Admin Center. This guided workflow:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Validates DNS prerequisites&lt;/LI&gt;
&lt;LI&gt;Provisions the customer-specific DNSSEC‑capable mail flow endpoint&lt;/LI&gt;
&lt;LI&gt;Reduces configuration risk during MX transition&lt;/LI&gt;
&lt;LI&gt;Prepares the domain for SMTP DANE adoption&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;For customers who wish to fully enforce SMTP DANE with DNSSEC, PowerShell will remain the option for enabling SMTP DANE once DNSSEC-enablement is complete as per &lt;A href="https://learn.microsoft.com/purview/how-smtp-dane-works#set-up-inbound-smtp-dane-with-dnssec" target="_blank"&gt;Set up inbound SMTP DANE with DNSSEC&lt;/A&gt;.&lt;/P&gt;
&lt;H4&gt;Control Outbound SMTP DANE &amp;amp; MTA‑STS Validation on Connectors&lt;/H4&gt;
&lt;P&gt;With &lt;A href="https://techcommunity.microsoft.com/blog/exchange/announcing-smtp-dane--mta-sts-connector-modes-in-exchange-online/4501005" target="_blank"&gt;rollout started in late Feb 2026&lt;/A&gt;, we introduced a new capability that gives admins &lt;STRONG&gt;explicit control&lt;/STRONG&gt; over SMTP DANE and MTA‑STS validation behavior for messages sent over &lt;STRONG&gt;outbound connectors&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;The MtaStsMode and SmtpDaneMode parameters on New/Set/Get-OutboundConnector lets organizations choose how strictly Exchange Online enforces these security protocols on a per‑connector basis:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Opportunistic (default): &lt;/STRONG&gt;Exchange Online attempts SMTP DANE and/or MTA‑STS validation but still delivers mail if the destination doesn’t support them.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;None&lt;/STRONG&gt;: which applies to both MTA-STS and SMTP DANE and disables the validation entirely, therefore&amp;nbsp;reducing the security of emails sent over that connector&amp;nbsp;by removing MTA-STS and/or SMTP DANE protections designed to prevent downgrade attacks and spoofed MX redirection.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Mandatory (SMTP DANE only): &lt;/STRONG&gt;Enforces full SMTP DANE with DNSSEC validation and queues (then rejects) mail if validation fails or destination domain doesn’t support SMTP DANE with DNSSEC by end of queuing period.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This outbound connector capability makes it easier for customers to adopt stronger DNS‑based protections incrementally while maintaining compatibility with partner ecosystems.&lt;/P&gt;
&lt;H5&gt;What happened to auto-provisioning of DNSSEC-enabled mail flow records (A/AAA)?&lt;/H5&gt;
&lt;P&gt;Due to internal infrastructure projects, we had to delay this DNS provisioning change until second half of calendar year 2026. Gradually switching provisioning of all A records for new Accepted Domains into the new subdomains under mx.microsoft is still a priority for us, but making infrastructure changes is complex. Significant challenges have required us to re-order the work necessary to complete this change while maintaining service health and reliability.&lt;/P&gt;
&lt;P&gt;Original announcement: &lt;A href="https://techcommunity.microsoft.com/blog/exchange/implementing-inbound-smtp-dane-with-dnssec-for-exchange-online-mail-flow/3939694" target="_blank"&gt;Implementing Inbound SMTP DANE with DNSSEC for Exchange Online Mail Flow | Microsoft Community Hub&lt;/A&gt;.&lt;/P&gt;
&lt;H4&gt;Are there any planned updates to mail.protection.outlook.com?&lt;/H4&gt;
&lt;P&gt;Currently, there are no plans to enable DNSSEC on the mail flow domain &lt;STRONG&gt;mail.protection.outlook.com&lt;/STRONG&gt;. Customers who require DNSSEC for inbound mail will continue to need to transition the DNSSEC-capable dedicated subdomains within mx.microsoft. As MX changes can be operationally sensitive, we built the DNSSEC Enablement Wizard to ease the friction of this change.&lt;/P&gt;
&lt;P&gt;In early third quarter of 2026, mail.protection.outlook.com will receive TCP and EDNS support. This modernization improves reliability and enables future security enhancements at cloud scale. &amp;nbsp;&lt;/P&gt;
&lt;H4&gt;Raising the Security Bar – Together&lt;/H4&gt;
&lt;P&gt;Across these investments, our goal is simple: &lt;STRONG&gt;make strong email security the default&lt;/STRONG&gt;, without introducing additional operational complexity or overhead. DNSSEC, SMTP DANE, and MTA‑STS directly address long‑standing weaknesses in the global email ecosystem, and Exchange Online is committed to leading the industry in deploying these foundational protections at scale.&lt;/P&gt;
&lt;P&gt;By modernizing our DNS infrastructure, providing safer tooling for domain transitions, and giving customers finer control over protocol enforcement, we’re continuing to raise the security bar for all Exchange Online customers—and making it easier than ever to adopt modern DNS security.&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-12"&gt;Microsoft 365 Messaging Team&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 21:00:39 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/exchange-team-blog/modernizing-dns-security-for-exchange-online-mail-flow/ba-p/4514248</guid>
      <dc:creator>The_Exchange_Team</dc:creator>
      <dc:date>2026-04-23T21:00:39Z</dc:date>
    </item>
    <item>
      <title>Change Optics Report released into Public Preview to showcase messages impacted by future changes</title>
      <link>https://techcommunity.microsoft.com/t5/exchange-team-blog/change-optics-report-released-into-public-preview-to-showcase/ba-p/4513047</link>
      <description>&lt;P&gt;Change Management is an important part of managing the improvements we make to our service that may sometimes disrupt our customers. The key is empowering customers to identify if they have messages that will be affected when we announce changes to the service. To that end, we’d like to announce the Public Preview for the Change Optics Report. It will be the central location for finding messages that could be affected by future changes to the service.&lt;/P&gt;
&lt;P&gt;As we improve or identify issues in Exchange Online, there is now a report to point customers to when we announce changes that could affect the sending and delivery of certain messages. This report will showcase multiple scenarios of interest and importance to admins preparing for change. It displays a &lt;STRONG&gt;sample&lt;/STRONG&gt; set of messages that have the characteristics that match those expected to be affected.&lt;/P&gt;
&lt;P&gt;These example messages give admins the information necessary to launch investigations that highlight where actions are needed to avoid disruption to their organizations as changes arrive. The report can then be used to observe the progress made to reduce those messages to a point where the risk has been removed ahead of the related change.&lt;/P&gt;
&lt;H4&gt;Initial Scenarios&lt;/H4&gt;
&lt;P&gt;The report is being released with two scenarios already included.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;OMC&lt;/STRONG&gt; represents Onmicrosoft.com traffic being sent externally. This is aimed at customers from large organizations still seeing usage they need to address before the traffic is throttled. &amp;nbsp;For more information, see &lt;A href="https://techcommunity.microsoft.com/blog/exchange/limiting-onmicrosoft-domain-usage-for-sending-emails/4446167" target="_blank"&gt;Limiting Onmicrosoft Domain Usage for Sending Emails | Microsoft Community Hub.&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;DRS&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; represents Direct Send traffic being received by an organization’s tenant. This is useful for customers looking to use the Reject Direct Send setting and needing to first ensure all legitimate traffic is identified and catered for. For more information, see &lt;/SPAN&gt;&lt;A style="font-style: normal; font-weight: 400; background-color: rgb(255, 255, 255);" href="https://techcommunity.microsoft.com/blog/exchange/introducing-more-control-over-direct-send-in-exchange-online/4408790" target="_blank"&gt;Introducing more control over Direct Send in Exchange Online | Microsoft Community Hub.&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;Using the report&lt;/H4&gt;
&lt;P&gt;The report can be found in the Exchange Admin Center (&lt;A href="https://admin.cloud.microsoft/exchange" target="_blank"&gt;https://admin.cloud.microsoft/exchange&lt;/A&gt;) under &lt;STRONG&gt;Reports &lt;/STRONG&gt;&lt;STRONG&gt;&amp;gt; Mail flow &amp;gt;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;Change Optics Report&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Change Optics Report: Use this report to view changes made to your Exchange Online configuration over time. You can filter by date range and change type to find specific changes.&lt;/P&gt;
&lt;P&gt;The report is divided into a Summary page and Details page.&lt;/P&gt;
&lt;H5&gt;Summary Page&lt;/H5&gt;
&lt;P&gt;This provides a summary chart tracking the volume of messages flag by the various scenarios being tracked. &amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;H5&gt;Details Page&lt;/H5&gt;
&lt;P&gt;The Details page allows you to see example messages per scenario. The main message properties are available for use in an investigation, and the table can be exported. Message Trace can be used to retrieve any additional information needed about a message.&lt;/P&gt;
&lt;P&gt;The scenario you are interested in can be selected from the dropdown menu.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;Please provide any feedback in the Comments section. We will update this blog to announce when the report reaches GA.&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-12"&gt;Microsoft 365 Messaging Team&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Apr 2026 16:03:10 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/exchange-team-blog/change-optics-report-released-into-public-preview-to-showcase/ba-p/4513047</guid>
      <dc:creator>The_Exchange_Team</dc:creator>
      <dc:date>2026-04-20T16:03:10Z</dc:date>
    </item>
    <item>
      <title>Announcing Period 2 Exchange 2016/2019 Extended Security Update (ESU) program</title>
      <link>https://techcommunity.microsoft.com/t5/exchange-team-blog/announcing-period-2-exchange-2016-2019-extended-security-update/ba-p/4511603</link>
      <description>&lt;P&gt;While both Exchange 2016 and 2019 are&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/blog/exchange/t-6-months-exchange-server-2016-and-exchange-server-2019-end-of-support/4403017" target="_blank" rel="noopener"&gt;out of support since October 2025&lt;/A&gt;, some of our customers who needed more time to finalize migrations to Exchange Subscription Edition (SE) have opted to enroll into the &lt;A href="https://techcommunity.microsoft.com/blog/exchange/announcing-exchange-2016--2019-extended-security-update-program/4433495" target="_blank" rel="noopener"&gt;Extended Security Update program&lt;/A&gt;. That ESU program started in October 2025 and is ending in April 2026 (“Period 1”).&lt;/P&gt;
&lt;P&gt;As end of April 2026 nears, some of our customers told us that they needed additional time to finalize their Exchange 2016/2019 migrations.&lt;/P&gt;
&lt;P&gt;Today we are announcing that we &lt;STRONG&gt;created a “Period 2” Exchange Server ESU program. This period will last from the start of May 2026 through the end of October 2026 (6 months)&lt;/STRONG&gt;. &lt;EM&gt;There will be no further extensions of this program after that&lt;/EM&gt;.&lt;/P&gt;
&lt;H4&gt;Conditions of Period 2 Exchange ESU program&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;Customers who wish to enroll into Period 2 program &lt;STRONG&gt;will have to re-purchase the Exchange ESU contract even if they were already enrolled into the Period 1 &lt;/STRONG&gt;&lt;A href="https://techcommunity.microsoft.com/blog/exchange/announcing-exchange-2016--2019-extended-security-update-program/4433495" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;ESU program (October 2025 – April 2026)&lt;/STRONG&gt;&lt;/A&gt;. Period 2 is not an “extension” of current Period 1 Exchange ESU program (which ends in April 2026). Your organization does not automatically enroll into Period 2 – you will have to purchase the ESU again for additional 6-month coverage through October 2026 (in the same way that you purchased the original ESU).&lt;/LI&gt;
&lt;LI&gt;In Period 2, we plan to provide security updates for &lt;STRONG&gt;Exchange Server 2016 CU23 and Exchange Server 2019 CU14/CU15&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Any Exchange Server ESUs purchased starting with today’s date (April 15, 2026) will automatically be considered Period 2 and will be valid from May to October 2026. Your organization will receive information on how to download updates released under Period 2 ESU (your original ESU program instructions will not work for ESU updates released after April 2026).&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Starting today, customers can contact their Microsoft account team to get information about and purchase additional Period 2 Extended Security Update (ESU) for their Exchange 2016 CU23 or Exchange 2019 CU14/CU15 servers. Simply purchase the same product after today’s date.&lt;/STRONG&gt;&amp;nbsp;Your account teams will have information related to per server cost and additional details on how to purchase.&lt;/P&gt;
&lt;H4&gt;What does this mean?&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;This ESU is&amp;nbsp;&lt;EM&gt;not&lt;/EM&gt;&amp;nbsp;an “extension of the support lifecycle” (&lt;A href="https://learn.microsoft.com/en-us/lifecycle/" target="_blank" rel="noopener"&gt;Microsoft Lifecycle Policy | Microsoft Learn&lt;/A&gt;) for Exchange 2016 / 2019. Those servers are still out-of-support, and you will not be able to open support cases for them (unless directly related to an issue with an update released to ESU customers during the ESU period).&lt;/LI&gt;
&lt;LI&gt;This Period 2 ESU&amp;nbsp;&lt;EM&gt;is&lt;/EM&gt;&amp;nbsp;a way for customers who might not be able to finalize their Exchange 2016 or 2019 migrations to Exchange SE before the end of October 2026, to receive Critical and Important updates (as currently defined by&amp;nbsp;&lt;A href="https://www.microsoft.com/msrc/security-update-severity-rating-system" target="_blank" rel="noopener"&gt;Microsoft Security Response Center (MSRC) scoring&lt;/A&gt;) as security updates (SUs) that we might release during Period 2. If there are SUs that we need to release, we will&amp;nbsp;&lt;EM&gt;privately&lt;/EM&gt;&amp;nbsp;provide such SUs to ESU customers only.&lt;/LI&gt;
&lt;LI&gt;We are&amp;nbsp;&lt;EM&gt;not&lt;/EM&gt;&amp;nbsp;committing to actually releasing any SUs during the Period 2 ESU. Exchange Server does&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/exchange/new-features/build-numbers-and-release-dates" target="_blank" rel="noopener"&gt;not necessarily receive SU updates every month&lt;/A&gt;&amp;nbsp;on Patch Tuesday (2&lt;SUP&gt;nd&lt;/SUP&gt;&amp;nbsp;Tuesday of the month) as SUs are released only if there are Critical or Important security product changes. Therefore, if there are no SUs that we need to release during the time of ESU program, there will be no such updates provided. We will, however, confirm with ESU participants each Patch Tuesday whether an SU was provided or not.&lt;/LI&gt;
&lt;LI&gt;This Period 2 Exchange ESU will be valid until end of October 2026.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;Who is Period 2 Exchange ESU for?&lt;/H4&gt;
&lt;P&gt;This program is intended for customers with a &lt;A href="https://www.microsoft.com/en-us/licensing/licensing-programs/enterprise" target="_blank" rel="noopener"&gt;Microsoft Enterprise Agreement (EA)&lt;/A&gt; who are unable to finalize their Exchange 2016 or 2019 migrations to Exchange SE before end of April 2026 and still need Critical and Important security coverage for servers still in operation.&lt;/P&gt;
&lt;H1&gt;FAQs&lt;/H1&gt;
&lt;P&gt;&lt;STRONG&gt;Why does Microsoft require additional contract for Period 2 of Exchange ESU if our organization already has the original Exchange Server ESU?&lt;BR /&gt;&lt;/STRONG&gt;Period 2 is a separate contract that lasts until the end of October 2026. Many of our original ESU customers are finalizing their migrations by end of April 2026. Those few that need additional time have an option of getting a new ESU contract. Our preference is that our customers finalize their migrations instead (honestly – we’d be happy to not sell Period 2 Exchange ESU to anyone; please migrate instead!)&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Our organization did not purchase original Period 1 Exchange ESU (ending with April 2026). Can we purchase Period 2 ESU only?&lt;/STRONG&gt;&lt;BR /&gt;Period 2 ESU is separate from original Period 1 ESU and can be purchased independently. Purchasing the Period 2 ESU does not require purchase of Period 1. But note that purchase of Period 2 ESU will only get you update packages released after Period 2 starts. You will not get access to update packages released during Period 1 ESU. Seeing that&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/exchange/plan-and-deploy/post-installation-tasks/security-best-practices/exchange-server-update-faq" target="_blank" rel="noopener"&gt;all our updates are cumulative&lt;/A&gt;, fixes for issues released during Period 1 ESU will be included in Period 2 updates (when / if released).&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;How is Exchange Server ESU licensed and how are updates distributed?&lt;BR /&gt;&lt;/STRONG&gt;Updates released under Period 2 Exchange ESU will follow the same process as updates released under the Period 1 ESU program: once enrolled, your organization will be provided information on how to access any updates released under Period 2. There will be no special licenses or keys in the Microsoft 365 admin center or Volume Licensing. After purchase of Period 2 SKUs, you will receive a new ESU User Guide which will contain everything you need.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Our Exchange server is getting throttled or blocked when sending email to Exchange Online. How can Microsoft not make ESU updates available to all customers, so they can address this?&lt;BR /&gt;&lt;/STRONG&gt;If your server is currently affected by &lt;A href="https://techcommunity.microsoft.com/blog/exchange/throttling-and-blocking-email-from-persistently-vulnerable-exchange-servers-to-e/3815328" target="_blank" rel="noopener"&gt;Throttling and blocking of persistently vulnerable Exchange servers&lt;/A&gt; that indicates that the &lt;A href="https://learn.microsoft.com/en-us/exchange/new-features/build-numbers-and-release-dates" target="_blank" rel="noopener"&gt;version currently running&lt;/A&gt; in your organization is roughly a year out of date. To resolve the throttling or blocking immediately, please install October 2025 (last publicly available) updates for Exchange 2016 or 2019. &lt;EM&gt;ESU updates are not required&lt;/EM&gt;. There will come a day when October 2025 updates too will be throttled or blocked, but that is not currently the case. But note that even if you update to October 2025 updates your server is still out of support and out of date and you should migrate to a supported version ASAP.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Our organization has Microsoft Volume Licensing. Do we get the Exchange ESU automatically? Where can we buy Exchange ESU?&lt;/STRONG&gt; &lt;BR /&gt;Exchange ESU program is a separate contract that each organization must explicitly purchase via their Microsoft account team (requires &lt;A href="https://www.microsoft.com/en-us/licensing/licensing-programs/enterprise" target="_blank" rel="noopener"&gt;Microsoft Enterprise Agreement&lt;/A&gt;). Exchange ESU is not automatically included in Volume Licensing or Software Assurance.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Help! We purchased the ESU (Period 1 or Period 2) – but we do not know how to access the updates we paid for!&lt;BR /&gt;&lt;/STRONG&gt;&lt;EM&gt;If you have already purchased the ESU&lt;/EM&gt;&amp;nbsp;and need information on accessing the latest Security Updates, please contact us by sending an email to&amp;nbsp;&lt;U&gt;ExchangeandSfBServerESUInquiry@service.microsoft.com&lt;/U&gt;. You are welcome to add your account team to the email also.&lt;/P&gt;
&lt;P&gt;Please continue migrating to Exchange SE instead of taking advantage of this Period 2 ESU program. But if you really must, contact your Microsoft account team for more details on Period 2 ESU.&lt;/P&gt;
&lt;P&gt;A similar program extension is available for our Skype for Business 2015 / 2019 customers. Please read more&amp;nbsp;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/skype_for_business_blog/announcing-%E2%80%9Cperiod-2%E2%80%9D-for-skype-for-business-server-20152019-extended-security-u/4511619" data-lia-auto-title="here" data-lia-auto-title-active="0" target="_blank"&gt;&lt;U&gt;here&lt;/U&gt;&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-12"&gt;The Exchange Server Team&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2026 14:35:11 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/exchange-team-blog/announcing-period-2-exchange-2016-2019-extended-security-update/ba-p/4511603</guid>
      <dc:creator>The_Exchange_Team</dc:creator>
      <dc:date>2026-04-15T14:35:11Z</dc:date>
    </item>
    <item>
      <title>No Exchange Server Security Updates for April 2026</title>
      <link>https://techcommunity.microsoft.com/t5/exchange-team-blog/no-exchange-server-security-updates-for-april-2026/ba-p/4511262</link>
      <description>&lt;P&gt;Although &lt;A href="https://techcommunity.microsoft.com/blog/exchange/support-for-exchange-server-2016-and-exchange-server-2019-ends-today/4461192" target="_blank"&gt;Exchange 2016 and 2019 are now out of support&lt;/A&gt;, some customers have purchased the&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/blog/exchange/announcing-exchange-2016--2019-extended-security-update-program/4433495" target="_blank"&gt;Exchange 2016 and 2019 Extended Security Update (ESU)&lt;/A&gt;. We have therefore decided that until the end of this Exchange 2016 and 2019 ESU period (April 2026) we will make an explicit update related announcement even if we&amp;nbsp;&lt;EM&gt;DO NOT&lt;/EM&gt;&amp;nbsp;release anything for that&amp;nbsp;particular month.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;There are no security releases for any version of Exchange Server in April 2026, for customers with Exchange SE, or Exchange 2016 or 2019 ESU.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Please keep &lt;A href="https://techcommunity.microsoft.com/blog/exchange/upgrading-your-organization-from-current-versions-to-exchange-server-se/4241305" target="_blank"&gt;upgrading your organizations to Exchange SE&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-12"&gt;The Exchange Team&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Apr 2026 16:58:13 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/exchange-team-blog/no-exchange-server-security-updates-for-april-2026/ba-p/4511262</guid>
      <dc:creator>The_Exchange_Team</dc:creator>
      <dc:date>2026-04-14T16:58:13Z</dc:date>
    </item>
    <item>
      <title>High Volume Email reaches General Availability in Exchange Online</title>
      <link>https://techcommunity.microsoft.com/t5/exchange-team-blog/high-volume-email-reaches-general-availability-in-exchange/ba-p/4507353</link>
      <description>&lt;P&gt;As we discussed High Volume Email (HVE) several times since it was in&amp;nbsp;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/exchange/public-preview-high-volume-email-for-microsoft-365/4102271" target="_blank" rel="noopener" data-lia-auto-title="Public Preview" data-lia-auto-title-active="0"&gt;Public Preview&lt;/A&gt;, I wanted to make you aware that Exchange Online HVE now reached General Availability (GA) &lt;SPAN data-teams="true"&gt;in our multi-tenant (WW) service&lt;/SPAN&gt;. The announcement was made on the Microsoft 365 Blog here:&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoft_365blog/high-volume-email-is-now-available-in-exchange-online/4505302" target="_blank" rel="noopener" data-lia-auto-title="High Volume Email Is Now Available in Exchange Online" data-lia-auto-title-active="0"&gt;High Volume Email Is Now Available in Exchange Online&lt;/A&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Pricing is discussed in the announcement above.&lt;/LI&gt;
&lt;LI&gt;HVE documentation can be found &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/exchange/mail-flow-best-practices/high-volume-mails-m365" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-12"&gt;Nino Bilic&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2026 13:25:49 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/exchange-team-blog/high-volume-email-reaches-general-availability-in-exchange/ba-p/4507353</guid>
      <dc:creator>Nino_Bilic</dc:creator>
      <dc:date>2026-04-01T13:25:49Z</dc:date>
    </item>
    <item>
      <title>Upcoming Breaking Changes to Modifying Sensitive Email Properties via Graph API</title>
      <link>https://techcommunity.microsoft.com/t5/exchange-team-blog/upcoming-breaking-changes-to-modifying-sensitive-email/ba-p/4505227</link>
      <description>&lt;P&gt;We are implementing a significant update in our service affecting applications that modify sensitive properties on non-draft email messages. These sensitive properties include the subject, body, recipients, and a number of other properties when changed using any of the &lt;A href="https://learn.microsoft.com/graph/api/message-update?view=graph-rest-1.0&amp;amp;tabs=http" target="_blank"&gt;message update methods on Graph API&lt;/A&gt;.&lt;/P&gt;
&lt;H4&gt;Immutability of Received Email Messages&lt;/H4&gt;
&lt;P&gt;There is a fundamental expectation that once an email message has been received, it should remain unchanged except for specific management-related properties such as read status, flags, and similar attributes. Critical components like the address list, subject, and body text should not be altered unless a new draft message is created. Exceptions to this rule are specialized use-cases, particularly within the security domain, such as identifying suspicious emails and other privileged operations.&lt;/P&gt;
&lt;H4&gt;Required Permissions for Modifying Sensitive Properties&lt;/H4&gt;
&lt;P&gt;To maintain the expected immutability of email messages during standard management operations, we will begin restricting applications from modifying sensitive message properties in non-draft messages unless they possess elevated permissions. Specifically, applications must have one of the following permissions: &lt;A href="https://learn.microsoft.com/graph/permissions-reference#mail-advancedreadwrite" target="_blank"&gt;Mail-Advanced.ReadWrite&lt;/A&gt;, &lt;A href="https://learn.microsoft.com/graph/permissions-reference#mail-advancedreadwriteall" target="_blank"&gt;Mail-Advanced.ReadWrite.All&lt;/A&gt;, or &lt;A href="https://learn.microsoft.com/graph/permissions-reference#mail-advancedreadwriteshared" target="_blank"&gt;Mail-Advanced.ReadWrite.Shared&lt;/A&gt;, depending on the scenario. All these permissions require a tenant administrator consent.&lt;/P&gt;
&lt;P&gt;The &lt;A href="https://learn.microsoft.com/graph/api/message-update?view=graph-rest-1.0&amp;amp;tabs=http" target="_blank"&gt;documentation page&lt;/A&gt; identifies sensitive properties as those that are only updateable if isDraft = true. Once the restriction goes into effect, these properties can only be updated in non-draft messages if the application has Mail-Advanced.ReadWrite permissions. Draft messages will continue to be updateable with the current Mail.ReadWrite permissions.&lt;/P&gt;
&lt;H4&gt;Timeline and Recommendations&lt;/H4&gt;
&lt;P&gt;These required permissions are already available. Enforcement of the new restrictions in our service – blocking Graph API updates to sensitive email properties – will begin on &lt;STRONG&gt;12/31/2026&lt;/STRONG&gt;. If you develop Graph API applications that modify these properties, we strongly recommend updating your applications to request the necessary higher-level permissions as soon as possible. This proactive approach will help ensure a smooth transition and minimize potential disruptions for your customers.&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-12"&gt;The Exchange Team&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2026 16:05:53 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/exchange-team-blog/upcoming-breaking-changes-to-modifying-sensitive-email/ba-p/4505227</guid>
      <dc:creator>The_Exchange_Team</dc:creator>
      <dc:date>2026-03-24T16:05:53Z</dc:date>
    </item>
    <item>
      <title>Celebrating 30 Years of Microsoft Exchange</title>
      <link>https://techcommunity.microsoft.com/t5/exchange-team-blog/celebrating-30-years-of-microsoft-exchange/ba-p/4503439</link>
      <description>&lt;P&gt;It’s hard to believe, but Exchange Server is now 30 years old! A lot has changed since the first release of Exchange Server 4.0 in 1996: protocols, platforms, scale, and even what “email” means in the modern workplace.&lt;/P&gt;
&lt;P&gt;To commemorate this milestone anniversary, we want to pause and reflect on how Exchange has shaped enterprise email as we know it today.&lt;/P&gt;
&lt;H4&gt;The start: email becomes enterprise messaging&lt;/H4&gt;
&lt;P&gt;Back in the mid-1990s, messaging solutions were fragmented, proprietary, and difficult to manage at scale. Businesses looking for a messaging system basically had two choices: host-based systems that were costly and didn’t integrate well with PC-based applications or LAN-based systems that did integrate with PC-based applications but were less scalable and reliable (although there were several companies that made software that allowed different email systems to communicate).&lt;/P&gt;
&lt;P&gt;That changed when, after nearly four years of development, Microsoft Exchange Server 4.0 – “the e-mail server with integrated groupware that makes it easy to communicate” – was released on April 2, 1996. Or, it might have been March 1996. Or maybe June 1996. &lt;A href="https://youtu.be/w_BvYIG1g8c?t=11" target="_blank" rel="noopener"&gt;No one knows for sure&lt;/A&gt; because the first public build that was shipped was not the build on the gold master (the signed-off RTM version).&lt;/P&gt;
&lt;P&gt;Nonetheless, Exchange Server had ambitions! From the start, it combined email and calendaring as well as an integrated centralized directory. Admin controls and native support of Internet standards like SMTP (via Internet Mail Connector) and X.400 kept it “modern.”&lt;/P&gt;
&lt;P&gt;In addition to user productivity through email, Exchange provided admin controls for monitoring, managing, and troubleshooting messaging across an entire organization from a single system – an idea that now seems obvious, but was far from standard in 1996.&lt;/P&gt;
&lt;img /&gt;
&lt;H4&gt;Exchange shapes the market&lt;/H4&gt;
&lt;P&gt;As Exchange evolved through the late 1990s and early 2000s, it kept raising the bar for business email. It was during this time that several major changes occurred:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Email and user identity became inseparable. This directly influenced the development of Active Directory (Active Directory was the direct descendant of the Exchange Directory Service).&lt;/LI&gt;
&lt;LI&gt;Calendaring and scheduling were first-class workflows and not bolt-on experiences.&lt;/LI&gt;
&lt;LI&gt;Reliability, scale, and disaster recovery became built-in&lt;/LI&gt;
&lt;LI&gt;Administrators came to expect the ability to automate admin tasks.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Exchange Server became one of Microsoft’s first&amp;nbsp;&lt;EM&gt;truly&lt;/EM&gt; &lt;EM&gt;successful&lt;/EM&gt; enterprise server products, helping establish us as a serious enterprise platform provider beyond the desktop.&lt;/P&gt;
&lt;H4&gt;The foundation of Exchange Online&lt;/H4&gt;
&lt;P&gt;When we set out to build Exchange Online (remember &lt;A href="https://techcommunity.microsoft.com/blog/exchange/microsoft-exchange-labs/590838" target="_blank" rel="noopener"&gt;Exchange Labs&lt;/A&gt;?), the goal was to operate enterprise email as a global service.&lt;/P&gt;
&lt;P&gt;Exchange Online inherited many years of lessons from Exchange Server as it &lt;EM&gt;extended&lt;/EM&gt; to the service. That continuity of experience is one reason our customers were able to move from Exchange Server to Exchange Online more confidently as they worked with already familiar tools. Concepts such as mailboxes, the transport pipeline, policy enforcement, and compliance remained familiar, even as the operational model changed. Exchange quite literally became the backbone of Microsoft 365’s compute, routing, and storage (also known as the Substrate).&lt;/P&gt;
&lt;H4&gt;Exchange Server still matters in 2026&lt;/H4&gt;
&lt;P&gt;Three decades later, Exchange Server still matters. Conversations around digital sovereignty, regulatory compliance, and admin control continue. Many organizations like governments, regulated industries, and critical infrastructure providers must make choices about where their data is stored and who operates the infrastructure.&lt;/P&gt;
&lt;P&gt;For customers that need it, Exchange Server remains valuable as an architectural choice. Continued investment in Exchange Server, including &lt;A href="https://techcommunity.microsoft.com/blog/exchange/exchange-server-subscription-edition-se-is-now-available/4424924" target="_blank" rel="noopener"&gt;release&lt;/A&gt; of Exchange Subscription Edition (SE) which we are committed to supporting until &lt;EM&gt;at least&lt;/EM&gt; the &lt;A href="https://learn.microsoft.com/en-us/lifecycle/additional-support-server-modern-lifecycle-policy" target="_blank" rel="noopener"&gt;end of 2035&lt;/A&gt; reflect the reality that enterprise messaging is not one-size-fits-all.&lt;/P&gt;
&lt;P&gt;Cloud-first (where innovation is the fastest) does not need to mean cloud-only. Whether you want to run on-prem, hybrid, or cloud, Exchange is there for you.&lt;/P&gt;
&lt;H4&gt;Through it all, community helped shape Exchange&lt;/H4&gt;
&lt;P&gt;While this is a bit intangible, we want to acknowledge that feedback from Exchange admins, MVPs, partners, and customers influenced (and keep influencing) Exchange in real ways. Feedback via our blog (&lt;A href="https://techcommunity.microsoft.com/blog/exchange/first-post-of-the-microsoft-exchange-team-blog/610912" target="_blank" rel="noopener"&gt;since the first post&lt;/A&gt;, back in 2004), support cases, and feedback given through conferences or &lt;A href="https://feedbackportal.microsoft.com/feedback/forum/778c4eb5-6bd1-ec11-a7b5-0022481f35a4" target="_blank" rel="noopener"&gt;Feedback portal&lt;/A&gt; over the years really matter. Some design changes happened specifically because the community spoke clearly. Our teams staying involved (via, for example, this blog) has been &lt;EM&gt;extremely&lt;/EM&gt; valuable to us. Please keep giving us feedback!&lt;/P&gt;
&lt;H4&gt;How things are changing&lt;/H4&gt;
&lt;P&gt;&lt;STRONG&gt;Exchange backward compatibility was both a gift and a burden.&lt;/STRONG&gt; For many years, we allowed customers to have coexistence of 3 major Exchange versions within the same organization. This helped reduce migration pain. But it also slowed down architectural cleanup and modernization as every version had to play nice with choices made years earlier. We are looking forward to the future in which we support only a single major version inside an organization – Exchange Subscription Edition (SE) – a requirement we are &lt;A href="https://techcommunity.microsoft.com/blog/exchange/upgrading-your-organization-from-current-versions-to-exchange-server-se/4241305" target="_blank" rel="noopener"&gt;adding starting with Exchange SE CU2&lt;/A&gt;!&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Security came into focus over the years. It is still in focus.&lt;/STRONG&gt; Early Exchange was built for connectivity and collaboration. The threat model changed, with threat actors going after organizational email. It is more &lt;A href="https://learn.microsoft.com/en-us/exchange/plan-and-deploy/post-installation-tasks/security-best-practices/exchange-server-update-faq" target="_blank" rel="noopener"&gt;important&lt;/A&gt; than ever to &lt;A href="https://learn.microsoft.com/en-us/exchange/new-features/build-numbers-and-release-dates" target="_blank" rel="noopener"&gt;stay up to date&lt;/A&gt;. We realize that some upcoming security changes mean that admins need to do additional work (for example upcoming &lt;A href="https://techcommunity.microsoft.com/blog/Exchange/exchange-server-security-changes-for-hybrid-deployments/4396833" target="_blank" rel="noopener"&gt;hybrid security improvements&lt;/A&gt;), but the result will be your organization’s improved security posture.&lt;/P&gt;
&lt;P&gt;With all the modes of communication that have become popular in business environments over the last 3 decades, the “end of email” has been predicted many times. Yet, email is still alive. And judging by our inboxes, it’s thriving!&lt;/P&gt;
&lt;P&gt;We want to thank the admins, MVPs, partners, and customers who keep Exchange running and who’ve provided unfiltered feedback along the way. We are excited to continue this journey with you!&lt;/P&gt;
&lt;P&gt;Here are a few fun Exchange historical posts that you might have missed over the years:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/exchange/a-brief-history-of-time---exchange-server-way/589388" target="_blank" rel="noopener"&gt;A brief history of time - Exchange Server way&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/exchange/exchange-is-10-years-old/605347" target="_blank" rel="noopener"&gt;Exchange is 10 years old!&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/exchange/top-10-moments-in-20-years-of-exchange-server/605935" target="_blank" rel="noopener"&gt;Top 10 Moments in 20 Years of Exchange Server&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;And a few technology-specific fun posts related to Exchange history:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/exchange/from-crush-to-product-documentation-the-story-of-squeaky-lobster/604691" target="_blank" rel="noopener"&gt;From crush to product documentation: The story of Squeaky Lobster&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/exchange/me-too/610643" target="_blank" rel="noopener"&gt;Me Too!&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/exchange/why-is-oof-an-oof-and-not-an-ooo/610191" target="_blank" rel="noopener"&gt;Why is OOF an OOF and not an OOO?&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;The &lt;A href="https://techcommunity.microsoft.com/blog/exchange/how-the-m-drive-came-about/610911" target="_blank" rel="noopener"&gt;saga of the M: drive&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;The &lt;A href="https://techcommunity.microsoft.com/blog/exchange/why-we-named-a-bit-in-the-directory-after-billg/610058" target="_blank" rel="noopener"&gt;BillG bit in AD&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;The &lt;A href="https://techcommunity.microsoft.com/blog/exchange/the-autodiscover-song/585066" target="_blank" rel="noopener"&gt;Autodiscover Song&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;How the &lt;A href="https://techcommunity.microsoft.com/blog/exchange/exchange-server-2007---the-making-of-an-icon/599845" target="_blank" rel="noopener"&gt;Exchange 2007 icon was made&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;The excitement of &lt;A href="https://techcommunity.microsoft.com/blog/exchange/dogfood-at-home---living-the-life-/594917" target="_blank" rel="noopener"&gt;dogfooding Exchange at home&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;The &lt;A href="https://techcommunity.microsoft.com/blog/exchange/the-secret-decoder-ring---the-hidden-truth-in-the-exchange-2007-admin-and-routin/604055" target="_blank" rel="noopener"&gt;secret decoder ring&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;The &lt;A href="https://techcommunity.microsoft.com/blog/exchange/decoder-ring-where-are-you/587094" target="_blank" rel="noopener"&gt;other secret decoder ring&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;The &lt;A href="https://techcommunity.microsoft.com/blog/exchange/how-does-your-exchange-garden-grow/609194" target="_blank" rel="noopener"&gt;2.4 GB message successfully delivered by Exchange Server 2003&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;The Exchange Team &lt;A href="https://techcommunity.microsoft.com/blog/exchange/here-is-your-citation-wikipedia/602827" target="_blank" rel="noopener"&gt;answering the citation call from Wikipedia&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/archive/blogs/perryclarke/" target="_blank" rel="noopener"&gt;Ask Perry/Geek Out with Perry&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/exchange/ese-sql-and-your-feedback/600083" target="_blank" rel="noopener"&gt;Investigating replacing ESE with SQL&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-12"&gt;The Exchange Team&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2026 17:00:06 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/exchange-team-blog/celebrating-30-years-of-microsoft-exchange/ba-p/4503439</guid>
      <dc:creator>The_Exchange_Team</dc:creator>
      <dc:date>2026-03-23T17:00:06Z</dc:date>
    </item>
    <item>
      <title>Give Us Feedback on Faster, Simpler Data Purging for Exchange Online</title>
      <link>https://techcommunity.microsoft.com/t5/exchange-team-blog/give-us-feedback-on-faster-simpler-data-purging-for-exchange/ba-p/4503905</link>
      <description>&lt;P&gt;Priority Cleanup (&lt;A href="https://learn.microsoft.com/en-us/purview/priority-cleanup-exchange" target="_blank" rel="noopener"&gt;Use priority cleanup to expedite the permanent deletion of sensitive information from mailboxes | Microsoft Learn)&lt;/A&gt; was introduced to provide administrators with a powerful tool for permanently deleting mailbox content, even when under retention or eDiscovery hold, to address scenarios such as data spillage and urgent removals.&lt;/P&gt;
&lt;P&gt;Purview team is working on &lt;EM&gt;Priority Cleanup V2&lt;/EM&gt; which would bring improvements to deletion speed, approval workflow as well as improvements in admin experience and control. The team is looking for feedback.&lt;/P&gt;
&lt;P&gt;If you use Priority Cleanup today and would like to see what is coming in Priority Cleanup V2 and provide feedback - please head over to Microsoft Purview Blog:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoft-purview-blog/priority-cleanup-v2-faster-simpler-data-purging-for-exchange-online/4503363" target="_blank" rel="noopener"&gt;Priority Cleanup V2: Faster, Simpler Data Purging for Exchange Online | Microsoft Community Hub&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-12"&gt;Nino Bilic&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2026 19:32:01 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/exchange-team-blog/give-us-feedback-on-faster-simpler-data-purging-for-exchange/ba-p/4503905</guid>
      <dc:creator>Nino_Bilic</dc:creator>
      <dc:date>2026-03-19T19:32:01Z</dc:date>
    </item>
    <item>
      <title>AI‑Powered Troubleshooting for Microsoft Purview Data Lifecycle Management now available</title>
      <link>https://techcommunity.microsoft.com/t5/exchange-team-blog/ai-powered-troubleshooting-for-microsoft-purview-data-lifecycle/ba-p/4502744</link>
      <description>&lt;P&gt;A really interesting post is now live on the Microsoft Purview Blog, describing a&amp;nbsp;open‑source release of the DLM Diagnostics Model Context Protocol (MCP) Server – an AI‑powered diagnostic server that allows AI assistants to safely investigate Microsoft Purview DLM issues using read‑only PowerShell diagnostics.&lt;/P&gt;
&lt;P&gt;Microsoft Purview Data Lifecycle Management (DLM) policies are critical for meeting compliance and governance requirements across Microsoft 365 workloads. However, when something goes wrong – such as retention policies not applying, archive mailboxes not expanding, or inactive mailboxes not getting purged – diagnosing the issue can be challenging and time‑consuming.&lt;/P&gt;
&lt;P&gt;That is where this tool comes in!&lt;/P&gt;
&lt;P&gt;If this sounds interesting, check it out here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoft-purview-blog/ai%E2%80%91powered-troubleshooting-for-microsoft-purview-data-lifecycle-management/4502660" target="_blank"&gt;AI‑Powered Troubleshooting for Microsoft Purview Data Lifecycle Management | Microsoft Community Hub&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-12"&gt;Nino Bilic&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Mar 2026 19:07:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/exchange-team-blog/ai-powered-troubleshooting-for-microsoft-purview-data-lifecycle/ba-p/4502744</guid>
      <dc:creator>Nino_Bilic</dc:creator>
      <dc:date>2026-03-16T19:07:00Z</dc:date>
    </item>
    <item>
      <title>Announcing SMTP DANE &amp; MTA STS Connector Modes in Exchange Online</title>
      <link>https://techcommunity.microsoft.com/t5/exchange-team-blog/announcing-smtp-dane-mta-sts-connector-modes-in-exchange-online/ba-p/4501005</link>
      <description>&lt;P&gt;We’re excited to announce the release of &lt;STRONG&gt;SMTP DANE and MTA‑STS connector modes&lt;/STRONG&gt; in Exchange Online. This update gives administrators &lt;STRONG&gt;explicit control over how strictly Exchange Online enforces modern mail flow security standards&lt;/STRONG&gt; when sending email over outbound connectors.&lt;/P&gt;
&lt;P&gt;This capability builds on our offerings for &lt;A href="https://learn.microsoft.com/purview/how-smtp-dane-works" target="_blank"&gt;SMTP DANE with DNSSEC&lt;/A&gt; and &lt;A href="https://learn.microsoft.com/purview/enhancing-mail-flow-with-mta-sts" target="_blank"&gt;MTA‑STS&lt;/A&gt; and addresses customer feedback around balancing &lt;STRONG&gt;security posture, reliability, and partner interoperability&lt;/STRONG&gt; on critical mail paths.&lt;/P&gt;
&lt;H4&gt;What’s new&lt;/H4&gt;
&lt;P&gt;Exchange Online outbound connectors now support configurable &lt;STRONG&gt;SMTP DANE and MTA‑STS modes&lt;/STRONG&gt;, allowing customers to choose the validation behavior that best fits each mail flow scenario.&lt;/P&gt;
&lt;P&gt;Admins can now configure:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Opportunistic (default): &lt;/STRONG&gt;Exchange Online attempts SMTP DANE and MTA‑STS validation when available but continues delivery if the destination does not support them.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Mandatory (SMTP DANE only): &lt;/STRONG&gt;Enforces full SMTP DANE with DNSSEC validation. Mail is queued if validation fails or the destination does not support SMTP DANE.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;None: &lt;/STRONG&gt;Disables SMTP DANE and/or MTA‑STS validation for the connector, reducing security in favor of compatibility for specific partner scenarios.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These settings apply &lt;STRONG&gt;per connector&lt;/STRONG&gt;, enabling granular control without impacting the tenant’s broader outbound mail flow behavior.&lt;/P&gt;
&lt;H4&gt;Why this matters&lt;/H4&gt;
&lt;P&gt;SMTP DANE with DNSSEC and MTA‑STS significantly raise the bar for transport‑level email security by protecting against downgrade attacks and malicious MX redirection. However, customers have told us that &lt;STRONG&gt;one‑size‑fits‑all enforcement can be challenging&lt;/STRONG&gt; when sending mail to partners with inconsistent or misconfigured implementations.&lt;/P&gt;
&lt;P&gt;Connector‑level modes allow customers to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Enforce &lt;STRONG&gt;strict security&lt;/STRONG&gt; where partners are fully compliant&lt;/LI&gt;
&lt;LI&gt;Maintain &lt;STRONG&gt;reliable delivery&lt;/STRONG&gt; for business‑critical partners still modernizing&lt;/LI&gt;
&lt;LI&gt;Gradually &lt;STRONG&gt;increase security posture over time&lt;/STRONG&gt;, without operational disruption&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;Learn More&lt;/H5&gt;
&lt;UL&gt;
&lt;LI&gt;Documentation updates and admin guidance are available in Microsoft Learn: &lt;A href="https://learn.microsoft.com/powershell/module/exchangepowershell/set-outboundconnector?view=exchange-ps" target="_blank"&gt;Set-OutboundConnector (ExchangePowerShell) | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;We’re excited to see customers adopt these controls as part of their broader email security journey.&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-12"&gt;Microsoft 365 Messaging Team&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2026 20:19:01 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/exchange-team-blog/announcing-smtp-dane-mta-sts-connector-modes-in-exchange-online/ba-p/4501005</guid>
      <dc:creator>The_Exchange_Team</dc:creator>
      <dc:date>2026-03-10T20:19:01Z</dc:date>
    </item>
    <item>
      <title>No Exchange Server Security Updates for March 2026</title>
      <link>https://techcommunity.microsoft.com/t5/exchange-team-blog/no-exchange-server-security-updates-for-march-2026/ba-p/4500410</link>
      <description>&lt;P&gt;Although&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/blog/exchange/support-for-exchange-server-2016-and-exchange-server-2019-ends-today/4461192" target="_blank" rel="noopener"&gt;Exchange 2016 and 2019 are now out of support&lt;/A&gt;, some customers have purchased the&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/blog/exchange/announcing-exchange-2016--2019-extended-security-update-program/4433495" target="_blank" rel="noopener"&gt;Exchange 2016 and 2019 Extended Security Update (ESU)&lt;/A&gt;. We have therefore decided that until the end of this Exchange 2016 and 2019 ESU period (April 2026) we will make an explicit update related announcement even if we&amp;nbsp;&lt;EM&gt;DO NOT&lt;/EM&gt;&amp;nbsp;release anything for that&amp;nbsp;particular month.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;There are no security releases for any version of Exchange Server in March 2026, for customers with Exchange SE, or Exchange 2016 or 2019 ESU.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Please keep&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/blog/exchange/upgrading-your-organization-from-current-versions-to-exchange-server-se/4241305" target="_blank" rel="noopener"&gt;upgrading your organizations to Exchange SE&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-12"&gt;The Exchange Team&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2026 18:12:38 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/exchange-team-blog/no-exchange-server-security-updates-for-march-2026/ba-p/4500410</guid>
      <dc:creator>The_Exchange_Team</dc:creator>
      <dc:date>2026-03-10T18:12:38Z</dc:date>
    </item>
    <item>
      <title>Notes From the Field: Finding and Remediating EWS App Usage Before Retirement</title>
      <link>https://techcommunity.microsoft.com/t5/exchange-team-blog/notes-from-the-field-finding-and-remediating-ews-app-usage/ba-p/4496469</link>
      <description>&lt;P&gt;In this post, we wanted to share a practical walk-through of discovering which Azure AD app registrations are still using Exchange Web Services (EWS), plus what the Kiosk/Frontline license changes mean as you plan your move to Microsoft Graph.&lt;/P&gt;
&lt;P&gt;Microsoft has announced that Exchange Online EWS blocking with start on October 1, 2026. If you have line-of-business apps, third-party tools, or automation that still depends on EWS, you need two things: (1) an inventory of what’s using EWS today, and (2) a migration plan to supported alternatives – typically Microsoft Graph.&lt;/P&gt;
&lt;H3&gt;What’s changing (and why you should care now)&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/exchange/retirement-of-exchange-web-services-in-exchange-online/3924440" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;EWS retirement in Exchange Online&lt;/STRONG&gt;&lt;/A&gt;: Microsoft will start blocking EWS requests to Exchange Online on &lt;STRONG&gt;October 1, 2026&lt;/STRONG&gt;. The guidance is to migrate integrations to &lt;STRONG&gt;Microsoft Graph&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/exchange/update-to-ews-access-for-kiosk--frontline-worker-licensed-users/4474299" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;EWS access changes for Kiosk / Frontline licenses&lt;/STRONG&gt;&lt;/A&gt;: Starting at the &lt;STRONG&gt;end of June 2026&lt;/STRONG&gt;, Microsoft will start blocking EWS access for users &lt;STRONG&gt;without license rights to EWS&lt;/STRONG&gt; (for example, certain Kiosk and Frontline Worker license types). This can cause EWS-based integrations for such licensed users to fail &lt;EM&gt;before&lt;/EM&gt; the broader October retirement date.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Even if you plan to complete your Graph migration well ahead of October 2026, the end-of-June 2026 licensing-related blocks mean you should validate whether any users with those licenses assigned use EWS. That’s where the &lt;A href="https://github.com/jmartinmsft/Exchange-App-Usage-Reporting" target="_blank" rel="noopener"&gt;Exchange-App-Usage-Reporting&lt;/A&gt; script is useful: it helps you find app registrations with EWS permissions and correlate them with recent sign-in activity so you can prioritize remediation.&lt;/P&gt;
&lt;H4&gt;Start here: check your Message Center first&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-ogsc="rgb(36, 36, 36)"&gt;The first thing you can do is to check your tenant &lt;/SPAN&gt;&lt;SPAN data-ogsc="rgb(0, 120, 215)"&gt;&lt;A href="https://go.microsoft.com/fwlink/p/?linkid=2070717" target="_blank" rel="noopener" data-outlook-id="2caf9581-3d88-449d-9d8b-b13052e2ad6e" data-ogsc="rgb(0, 120, 215)"&gt;Message Center&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN data-ogsc="rgb(36, 36, 36)"&gt; (you need either Global Admin or Privacy Reader roles) and search for "Update active Exchange Web Services Applications" in Inbox or Archive. If you do not have such messages, you &lt;EM&gt;likely&lt;/EM&gt; do not have EWS usage in your tenant and are not impacted by this deprecation. We started to send EWS usage messages to all tenants in late December 2025.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;What the Exchange-App-Usage-Reporting script does&lt;/H3&gt;
&lt;P&gt;The script is designed to answer a practical question: &lt;EM&gt;Which Azure AD app registrations in my tenant have EWS permissions, and are they still being used?&lt;/EM&gt; At a high level, it:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Discovers application registrations that have permissions associated with Exchange/EWS-related access.&lt;/LI&gt;
&lt;LI&gt;Queries sign-in activity for those applications to determine active applications.&lt;/LI&gt;
&lt;LI&gt;Queries audit logs for EWS activity within the tenant.&lt;/LI&gt;
&lt;LI&gt;Outputs report files that you can sort and share with app owners.&lt;/LI&gt;
&lt;LI&gt;Outputs a user license report to help identify kiosk or frontline workers.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H4&gt;How the script complements the Microsoft 365 admin center EWS usage report&lt;/H4&gt;
&lt;P&gt;For customers in our WW service, the &lt;A href="https://learn.microsoft.com/microsoft-365/admin/activity-reports/ews-usage?view=o365-worldwide" target="_blank" rel="noopener"&gt;Microsoft 365 admin center EWS usage report&lt;/A&gt; is a great starting point because it summarizes EWS activity across your tenant and breaks down which EWS SOAP actions are being called and their volumes over time. That helps you quantify overall EWS dependency and spot the heaviest EWS workloads.&lt;/P&gt;
&lt;P&gt;Where teams often get stuck is turning that usage signal into an actionable remediation plan (for example, identifying the exact Entra ID app registration/service principal, determining whether it is still actively used, and finding the people and mailboxes affected). Exchange-App-Usage-Reporting script is intended to bridge that gap by adding identity and operational context around EWS usage by:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;App registration and ownership context: identifies Entra ID app registrations/service principals with EWS-related permissions so you can immediately pivot from “an app is calling EWS” to “this is the app object to remediate,” then route it to the right owner/team.&lt;/LI&gt;
&lt;LI&gt;Recency and “is it still used?” signals: correlates apps to sign-in activity so you can prioritize the apps that are actively authenticating today versus stale registrations that may be safe to validate/decommission.&lt;/LI&gt;
&lt;LI&gt;Authentication + permission model visibility: helps you distinguish whether usage is tied to application permissions versus delegated patterns, which matters for choosing the right Microsoft Graph migration approach and designing least-privilege access.&lt;/LI&gt;
&lt;LI&gt;Mailbox population risk (Kiosk/Frontline): adds a user license report so you can quickly identify whether the EWS-dependent workflow touches mailboxes that may lose EWS access earlier (end of June 2026).&lt;/LI&gt;
&lt;LI&gt;Exportable, app-centric worklists: produces CSVs you can sort/share (for example, by last sign-in) to drive an engineering backlog: confirm owner, confirm scenario, map EWS operations to Graph endpoints, and track progress to zero.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;In practice, use the admin center report to understand &lt;EM&gt;what&lt;/EM&gt; EWS operations are happening and at what scale, then use this script to determine &lt;EM&gt;which&lt;/EM&gt; app registrations are responsible, &lt;EM&gt;who&lt;/EM&gt; owns them, &lt;EM&gt;whether&lt;/EM&gt; they’re still active, and &lt;EM&gt;which&lt;/EM&gt; mailbox/license populations are most likely to experience impact first.&lt;/P&gt;
&lt;P&gt;Customers with tenants that are not in our WW cloud should rely heavily on the script as admin center reports are not available.&lt;/P&gt;
&lt;H3&gt;Step-by-step: run the script and generate the report&lt;/H3&gt;
&lt;H4&gt;1) Download the code&lt;/H4&gt;
&lt;P&gt;The repository for this solution can be found &lt;A href="https://github.com/jmartinmsft/Exchange-App-Usage-Reporting/archive/refs/heads/main.zip" target="_blank" rel="noopener"&gt;here&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Note: The following permissions are required for the application:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;AuditLogsQuery.ReadAll&lt;/STRONG&gt; to query the audit logs for EWS activity&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Application.Read.All&lt;/STRONG&gt; to locate app registrations&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;AuditLogs.Read.All&lt;/STRONG&gt; to query sign-in activity&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Directory.Read.All&lt;/STRONG&gt; to query user license information&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;To add those permissions, please see the &lt;A class="lia-external-url" href="https://github.com/jmartinmsft/Exchange-App-Usage-Reporting/blob/main/Create%20an%20App%20registration.md" target="_blank"&gt;Create app registration readme file&lt;/A&gt;.&lt;/P&gt;
&lt;H4&gt;2) Get active applications&lt;/H4&gt;
&lt;P&gt;Open a PowerShell session and change to the folder where you downloaded the script. You may need to unblock the files (for example, by using &lt;EM&gt;Unblock-File&lt;/EM&gt;) before execution. Run the script with the following example syntax:&lt;/P&gt;
&lt;PRE&gt;.\Find-EwsUsage.ps1 -OutputPath C:\Temp\Output -OAuthCertificate 8865BEC624B02FA0DE9586D13186ABC8BE265917 -CertificateStore CurrentUser -OAuthClientId 7a305061-1343-49c3-a469-378de4dbd90d -OAuthTenantId 9101fc97-5be5-4438-a1d7-83e051e52057 -PermissionType Application -Operation GetEwsActivity&lt;/PRE&gt;
&lt;P&gt;The output provides a list of applications with EWS permissions and the last sign-in for the associated service principal. A CSV file called App-SignInActivity-yyyyMMddhhmm will be created in the specified output path.&lt;/P&gt;
&lt;H4&gt;3) Get sign-in activity report for an application&lt;/H4&gt;
&lt;P&gt;Use the output from the previous step to get the sign-in activity for an application (you need to run this step for each application). Depending on the size of your tenant, you may also need to adjust the StartDate, EndDate, and have the Interval be 1 hour.&lt;/P&gt;
&lt;PRE&gt;.\Find-EwsUsage.ps1 -OutputPath C:\Temp\Output -OAuthCertificate 8865BEC624B02FA0DE9586D13186ABC8BE265917 -CertificateStore CurrentUser -OAuthClientId 7a305061-1343-49c3-a469-378de4dbd90d&amp;nbsp; -OAuthTenantId 9101fc97-5be5-4438-a1d7-83e051e52057 -PermissionType Application -Operation GetAppUsage -QueryType SignInLogs -Name TJM-EWS-SoftDelete-Script -AppId 86277a5c-d649-46fc-8bf6-48e2a684624b -StartDate (Get-Date).AddDays(-30) -EndDate (Get-Date).AddDays(-14) -Interval 8&lt;/PRE&gt;
&lt;P&gt;The output provides a list of users that have signed into the application in the specified period requested. A CSV file called &amp;lt;AppId&amp;gt;-SignInEvents-yyyyMMddhhmm will be created in the specified output path.&lt;/P&gt;
&lt;H4&gt;4) Get user license information (Kiosk and Frontline identification)&lt;/H4&gt;
&lt;P&gt;For those organizations that have users with licenses that may be impacted by the upcoming enforcement in June, a report of user licenses can also be generated to help identify potential impact. The output from the previous step can be used to generate this license report. A single CSV file with the results from each application can also be merged into a single user license report.&lt;/P&gt;
&lt;PRE&gt;.\Find-EwsUsage.ps1 -OutputPath C:\Temp\Output -OAuthCertificate 8865BEC624B02FA0DE9586D13186ABC8BE265917 -CertificateStore CurrentUser -OAuthClientId 7a305061-1343-49c3-a469-378de4dbd90d&amp;nbsp; -OAuthTenantId 9101fc97-5be5-4438-a1d7-83e051e52057 -PermissionType Application -Operation GetUserLicenses -AppUsageSignInCsv C:\Temp\Output\86277a5c-d649-46fc-8bf6-48e2a684624b-SignInEvents-20260203122538.csv&lt;/PRE&gt;
&lt;H4&gt;How to interpret the output (and prioritize fixes)&lt;/H4&gt;
&lt;P&gt;Once you have the output files, sort by “last sign-in”. Apps with recent activity are your highest priority because they’re more likely to break production workloads when EWS is blocked. Apps with no sign-in data may be dormant, misconfigured, or retired—treat these as “needs validation,” not automatically “safe to ignore.”&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Identify the owner&lt;/STRONG&gt; of each app registration (or the business system it belongs to).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Confirm the workload&lt;/STRONG&gt;: mailbox access patterns (read, send, calendar, contacts, etc.) and whether it uses application or delegated access.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Check mailbox populations&lt;/STRONG&gt; the app touches—especially if any are assigned Kiosk / Frontline licenses that may lose EWS access at the end of June 2026.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Choose the migration target&lt;/STRONG&gt;: Microsoft Graph API equivalents, supported Exchange Online features, or a vendor upgrade that removes EWS dependency.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H3&gt;Don’t miss the Kiosk / Frontline Worker EWS blocks (end of June 2026)&lt;/H3&gt;
&lt;P&gt;Recommended validation playbook:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Use the script output to build a shortlist of actively used EWS-enabled apps.&lt;/LI&gt;
&lt;LI&gt;For each app, determine which mailboxes it accesses (application access policies, RBAC, service accounts, shared mailboxes, or user populations).&lt;/LI&gt;
&lt;LI&gt;Cross-check those mailboxes’ license assignments for Kiosk / Frontline SKUs that may not include EWS rights.&lt;/LI&gt;
&lt;LI&gt;Run a controlled test (non-production where possible) to confirm whether the integration depends on EWS for those mailboxes and whether the vendor has a Graph-based update available.&lt;/LI&gt;
&lt;LI&gt;Evaluate if adding a different type of license for specific users is needed (for example, adding an Exchange Online Plan 1 or 2, which can still use EWS until October deprecation.)&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;Remediation options (what to do when you find an EWS dependency)&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;Upgrade or reconfigure the product: Many vendors have already moved to Microsoft Graph. Engage the vendor and request their Graph migration guidance and timelines.&lt;/LI&gt;
&lt;LI&gt;Refactor custom code: Map EWS operations (mail, calendar, contacts) to Microsoft Graph endpoints and re-test auth flows, throttling, and permissions. More information on mappings can be found &lt;A href="https://learn.microsoft.com/en-us/graph/migrate-exchange-web-services-api-mapping" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;Reduce blast radius: If an app truly must remain temporarily, scope it tightly using least-privilege permissions and (where applicable) scope the mailbox it has access to using RBAC—then treat it as a short-term exception with an expiration date.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;Quick checklist&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;Run Exchange-App-Usage-Reporting and identify apps with recent EWS sign-in activity.&lt;/LI&gt;
&lt;LI&gt;Track down app owners and document which mailboxes/workloads each app touches.&lt;/LI&gt;
&lt;LI&gt;Assess exposure to the end-of-June 2026 licensing-related EWS blocks (Kiosk/Frontline).&lt;/LI&gt;
&lt;LI&gt;Prioritize migrations to Microsoft Graph and validate functionality end-to-end.&lt;/LI&gt;
&lt;LI&gt;Re-run the report periodically to confirm EWS usage is trending to zero.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Major updates to this post:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;2/26/2026: &lt;/STRONG&gt;Linked to a better version of the Create app registration readme file&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;2/25/2026:&lt;/STRONG&gt; Added details about app registration for the reporting script and information on how to search your tenant Message Center posts for EWS usage.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-12"&gt;Jim Martin (Exchange)&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Feb 2026 21:09:52 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/exchange-team-blog/notes-from-the-field-finding-and-remediating-ews-app-usage/ba-p/4496469</guid>
      <dc:creator>The_Exchange_Team</dc:creator>
      <dc:date>2026-02-26T21:09:52Z</dc:date>
    </item>
    <item>
      <title>Multi-Geo In-Region Routing General Availability</title>
      <link>https://techcommunity.microsoft.com/t5/exchange-team-blog/multi-geo-in-region-routing-general-availability/ba-p/4494860</link>
      <description>&lt;P&gt;We’re excited to share that &lt;A href="https://learn.microsoft.com/microsoft-365/enterprise/configure-multi-geo-in-region-routing?view=o365-worldwide" target="_blank"&gt;&lt;STRONG&gt;Multi-Geo In-Region Routing&lt;/STRONG&gt;&lt;/A&gt; reached &lt;STRONG&gt;General Availability&lt;/STRONG&gt; in December 2025. This new capability extends the value of &lt;A href="https://learn.microsoft.com/microsoft-365/enterprise/microsoft-365-multi-geo?view=o365-worldwide" target="_blank"&gt;Microsoft 365 Multi-Geo Capabilities add-on ("Multi-Geo")&lt;/A&gt; by giving admins of Multi-Geo customers with globally distributed users the ability to configure controls over &lt;STRONG&gt;where a tenant’s inbound anonymous and hybrid email enters Exchange Online&lt;/STRONG&gt;.&lt;/P&gt;
&lt;H4&gt;Why In-Region Routing?&lt;/H4&gt;
&lt;P&gt;By default, all &lt;STRONG&gt;inbound anonymous and hybrid email &lt;/STRONG&gt;to a Microsoft 365 tenant with Multi-Geo enters Exchange Online in the &lt;STRONG&gt;tenant’s region first&lt;/STRONG&gt; and then is relayed within Microsoft’s secure internal network to the email recipient. For customers with users distributed globally, this model may not fully meet their business needs.&lt;/P&gt;
&lt;P&gt;Multi-Geo In-Region Routing was built to help address this challenge.&lt;/P&gt;
&lt;H4&gt;What does Multi-Geo In-Region Routing offer?&lt;/H4&gt;
&lt;P&gt;With In-Region Routing, customers can control the geographic location where inbound email enters Exchange Online for:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Anonymous inbound mail&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Hybrid inbound mail from on premises&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Multi-Geo In-Region Routing helps ensure that anonymous inbound email and hybrid inbound email enters Exchange Online in the same geography as the recipient user – provided the tenant is properly configured.&lt;/P&gt;
&lt;H4&gt;How it works (at a high level)&lt;/H4&gt;
&lt;P&gt;In-Region Routing allows customers to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Associate &lt;STRONG&gt;Accepted Domains&lt;/STRONG&gt; with specific geo‑regions&lt;/LI&gt;
&lt;LI&gt;Align those domains with users located in the same regions&lt;/LI&gt;
&lt;LI&gt;Ensure inbound and hybrid email for those domains enters Exchange Online in the recipient’s region&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;A natural extension of Multi‑Geo&lt;/H4&gt;
&lt;P&gt;In-Region Routing is an included feature in Multi-Geo and builds on existing Multi-Geo Capabilities. When configured properly, inbound email for an In-Region Routing domain will no longer enter Exchange Online in the tenant’s Primary Provisioned Geography region first but instead enter directly in the recipient’s region. It’s another step toward giving customers meaningful, transparent controls over how Microsoft 365 operates in global environments.&lt;/P&gt;
&lt;H4&gt;Get started&lt;/H4&gt;
&lt;P&gt;If you’re already using or planning to use Multi-Geo, now is a great time to review your domain and user alignment and then consider whether In-Region Routing can help meet your regulatory or organizational requirements.&lt;/P&gt;
&lt;P&gt;Learn more: &lt;A href="https://learn.microsoft.com/microsoft-365/enterprise/configure-multi-geo-in-region-routing?view=o365-worldwide" target="_blank"&gt;Configure Multi-Geo In-Region Routing - Microsoft 365 Enterprise | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-12"&gt;Microsoft 365 Messaging Team&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Feb 2026 17:24:15 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/exchange-team-blog/multi-geo-in-region-routing-general-availability/ba-p/4494860</guid>
      <dc:creator>The_Exchange_Team</dc:creator>
      <dc:date>2026-02-13T17:24:15Z</dc:date>
    </item>
    <item>
      <title>Deprecation of the -Credential Parameter in Exchange Online PowerShell</title>
      <link>https://techcommunity.microsoft.com/t5/exchange-team-blog/deprecation-of-the-credential-parameter-in-exchange-online/ba-p/4494584</link>
      <description>&lt;P&gt;As part of our continued commitment to strengthening security across Exchange Online, we want to inform our customers about an important change coming to the Exchange Online PowerShell module.&lt;/P&gt;
&lt;H4&gt;What’s changing and why&lt;/H4&gt;
&lt;P&gt;Microsoft is progressively moving all services toward more secure, modern authentication experiences. As part of this shift, multi-factor authentication (MFA) is being made a mandatory security requirement across Microsoft cloud services. Because the legacy Resource Owner Password Credentials (ROPC) authentication flow does not support MFA, it is on the path toward deprecation as Microsoft strengthens its security baselines. Additionally, the Microsoft Authentication Library (MSAL) that supports authentication across Microsoft services has deprecated ROPC starting with version 4.74.0.&lt;/P&gt;
&lt;P&gt;The &lt;EM&gt;-Credential&lt;/EM&gt; parameter in Exchange Online PowerShell relies on ROPC, and therefore cannot meet MFA or Conditional Access requirements. To align with MFA enforcement, modern authentication principles, and Microsoft’s broader security standards, support for the &lt;EM&gt;-Credential&lt;/EM&gt;&amp;nbsp;parameter will be removed from new Exchange Online PowerShell versions released after &lt;STRONG&gt;June 2026&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P style="background: #F0F0F0; padding: .5em; margin: 1em 0 1em 0;"&gt;This change is applicable to both &lt;EM&gt;Connect-ExchangeOnline&lt;/EM&gt; and &lt;EM&gt;Connect-IppsSession&lt;/EM&gt;.&lt;/P&gt;
&lt;P&gt;While our published timeline extends to June 2026, we strongly recommend that all customers transition away from the&amp;nbsp;&lt;EM&gt;-Credential&lt;/EM&gt;&amp;nbsp;parameter as soon as possible and not wait until the deadline.&lt;/P&gt;
&lt;H4&gt;Alternatives for the -Credential parameter&lt;/H4&gt;
&lt;P&gt;Below is a list of supported alternatives for the -Credential parameter that you should adopt depending on their scenario:&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="border-width: 1px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Scenario / Use Case&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="border-width: 1px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Recommended Authentication Method&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="border-width: 1px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Description&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="border-width: 1px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Documentation&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style="border-width: 1px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Admins connecting interactively&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="border-width: 1px;"&gt;
&lt;P&gt;&lt;EM&gt;Interactive Sign‑In (Modern Auth + MFA)&lt;/EM&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="border-width: 1px;"&gt;
&lt;P&gt;Secure sign-in for human administrators; supports MFA and Conditional Access.&lt;/P&gt;
&lt;/td&gt;&lt;td style="border-width: 1px;"&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/powershell/exchange/connect-to-exchange-online-powershell?view=exchange-ps" target="_blank" rel="noopener"&gt;Connect to Exchange Online PowerShell | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style="border-width: 1px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Automation running outside Azure&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="border-width: 1px;"&gt;
&lt;P&gt;&lt;EM&gt;App‑Only Authentication&lt;/EM&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="border-width: 1px;"&gt;
&lt;P&gt;Certificate‑based app registration for non‑interactive automation.&lt;/P&gt;
&lt;/td&gt;&lt;td style="border-width: 1px;"&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/powershell/exchange/app-only-auth-powershell-v2?view=exchange-ps" target="_blank" rel="noopener"&gt;App-only authentication in Exchange Online PowerShell and Security &amp;amp; Compliance PowerShell | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style="border-width: 1px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Automation running in Azure services&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="border-width: 1px;"&gt;
&lt;P&gt;&lt;EM&gt;Managed Identity Authentication&lt;/EM&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="border-width: 1px;"&gt;
&lt;P&gt;Ideal for Functions, Automation Accounts, and cloud-native tasks. Eliminates secrets entirely.&lt;/P&gt;
&lt;/td&gt;&lt;td style="border-width: 1px;"&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/powershell/exchange/connect-exo-powershell-managed-identity?view=exchange-ps" target="_blank" rel="noopener"&gt;Use Azure managed identities to connect to Exchange Online PowerShell | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 25.00%" /&gt;&lt;col style="width: 25.00%" /&gt;&lt;col style="width: 25.00%" /&gt;&lt;col style="width: 25.00%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;H4&gt;Timeline&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Current state: &lt;/STRONG&gt;&lt;STRONG&gt;t&lt;/STRONG&gt;he &lt;EM&gt;-Credential&lt;/EM&gt;&amp;nbsp;parameter continues to function today and will continue to function in all modules released till end of June 2026.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Recommended action (effective immediately): &lt;/STRONG&gt;you should &lt;EM&gt;begin migrating away from the -Credential parameter use while connecting to Exchange Online using the Connect-ExchangeOnline or Connect-IppsSession cmdlets&lt;/EM&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;After June 2026:&lt;/STRONG&gt;&lt;STRONG&gt; n&lt;/STRONG&gt;ew versions of the Exchange Online PowerShell modules released post 2026 will no longer include support for the -Credential parameter.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If you encounter any gaps or unsupported scenarios with the alternative authentication flows, please share them in the Comments section so we can prioritize addressing them in future updates.&lt;/P&gt;
&lt;P&gt;Major changes to this post:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;3/18/2026: Removed the reference to "secret-based" registration for app-only authentication because it is not a recommended path.&lt;/LI&gt;
&lt;LI&gt;2/17/2026: Added a note that this change applies to both&amp;nbsp;&lt;EM&gt;Connect-ExchangeOnline&lt;/EM&gt; and &lt;EM&gt;Connect-IppsSession&lt;/EM&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-12"&gt;Exchange Online Management Team&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Mar 2026 16:39:40 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/exchange-team-blog/deprecation-of-the-credential-parameter-in-exchange-online/ba-p/4494584</guid>
      <dc:creator>The_Exchange_Team</dc:creator>
      <dc:date>2026-03-18T16:39:40Z</dc:date>
    </item>
    <item>
      <title>Released: February 2026 Exchange Server Security Updates</title>
      <link>https://techcommunity.microsoft.com/t5/exchange-team-blog/released-february-2026-exchange-server-security-updates/ba-p/4494076</link>
      <description>&lt;P&gt;Microsoft has released Security Updates (SUs) for vulnerabilities found in:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Exchange Server Subscription Edition (SE)&lt;/LI&gt;
&lt;LI&gt;Exchange Server 2019&lt;/LI&gt;
&lt;LI&gt;Exchange Server 2016&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;SUs are available for the following specific versions of Exchange Server:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/download/details.aspx?id=108556" target="_blank" rel="noopener"&gt;Exchange SE RTM&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Exchange Server 2019 CU14 and CU15 (to access, you must be enrolled into the &lt;A href="https://techcommunity.microsoft.com/blog/exchange/announcing-exchange-2016--2019-extended-security-update-program/4433495" target="_blank" rel="noopener"&gt;ESU program&lt;/A&gt;)&lt;/LI&gt;
&lt;LI&gt;Exchange Server 2016 CU23 (to access, you must be enrolled into the &lt;A href="https://techcommunity.microsoft.com/blog/exchange/announcing-exchange-2016--2019-extended-security-update-program/4433495" target="_blank" rel="noopener"&gt;ESU program&lt;/A&gt;)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The February 2026 SUs address vulnerabilities responsibly reported to Microsoft by security partners and found through Microsoft’s internal processes. Although we are not aware of any active exploits in the wild, our recommendation is to immediately install these updates to protect your environment.&lt;/P&gt;
&lt;P&gt;These vulnerabilities affect Exchange Server. Exchange Online customers are already protected from the vulnerabilities addressed by these SUs and do not need to take any action other than updating any Exchange servers or Exchange Management tools workstations in their environment.&lt;/P&gt;
&lt;P&gt;More details about specific CVEs can be found in the&amp;nbsp;&lt;A href="https://msrc.microsoft.com/update-guide/" target="_blank" rel="noopener"&gt;Security Update Guide&lt;/A&gt;&amp;nbsp;(filter on ‘Server Software’ under Product Family for Exchange SE and ‘ESU’ under Product Family for Exchange 2016 and 2019).&lt;/P&gt;
&lt;H4&gt;Exchange 2016 and 2019 updates are available &lt;EM&gt;only&lt;/EM&gt; under the ESU program&lt;/H4&gt;
&lt;P&gt;Exchange Server 2016 and 2019 are &lt;A href="https://techcommunity.microsoft.com/blog/exchange/support-for-exchange-server-2016-and-exchange-server-2019-ends-today/4461192" target="_blank" rel="noopener"&gt;out of support&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Customers who enrolled in the &lt;A href="https://techcommunity.microsoft.com/blog/exchange/announcing-exchange-2016--2019-extended-security-update-program/4433495" target="_blank" rel="noopener"&gt;Extended Security Update (ESU) program&lt;/A&gt; are eligible to receive the February 2026 security updates for Exchange Server 2016 and 2019.&lt;/P&gt;
&lt;P&gt;If you are not part of the ESU program, &lt;A href="https://techcommunity.microsoft.com/blog/exchange/upgrading-your-organization-from-current-versions-to-exchange-server-se/4241305" target="_blank" rel="noopener"&gt;migrate to Exchange Server Subscription Edition (SE)&lt;/A&gt; to keep receiving the latest security updates.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;If you have already purchased the ESU&lt;/EM&gt; and need information on accessing the latest Security Updates, please contact us by sending an email to &lt;A href="mailto:ExchangeandSfBServerESUInquiry@service.microsoft.com?subject=We%20purchased%20Exchange%20ESU%20need%20access" target="_blank" rel="noopener"&gt;ExchangeandSfBServerESUInquiry@service.microsoft.com&lt;/A&gt;.&lt;/P&gt;
&lt;H4&gt;Update installation&lt;/H4&gt;
&lt;P&gt;The following update paths are available:&lt;/P&gt;
&lt;img /&gt;
&lt;UL&gt;
&lt;LI&gt;Inventory your Exchange Servers to determine which updates are needed using the &lt;A href="https://aka.ms/ExchangeHealthChecker" target="_blank" rel="noopener"&gt;Exchange Server Health Checker script&lt;/A&gt;. Running this script will tell you if any of your Exchange Servers are behind on updates (CUs, SUs, or manual actions).&lt;/LI&gt;
&lt;LI&gt;Install the latest CU. Use the &lt;A href="https://aka.ms/ExchangeUpdateWizard" target="_blank" rel="noopener"&gt;Exchange Update Wizard&lt;/A&gt; to choose your current CU and your target CU to get directions.&lt;/LI&gt;
&lt;LI&gt;Re-run the Health Checker after you install an update to see if any further actions are needed.&lt;/LI&gt;
&lt;LI&gt;After setup is completed, please reboot the server and check that all Exchange services have started properly. If some services are in a disabled state, that indicates that something interrupted installation of the update. Please see the Workaround 1 in &lt;A class="lia-external-url" href="https://support.microsoft.com/en-us/topic/file-version-error-when-you-try-to-install-exchange-server-november-2024-su-a650da30-f8fb-469d-a449-47396cab0a15" target="_blank"&gt;this article&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;If you encounter errors during or after installation of Exchange Server, run the &lt;A href="https://aka.ms/ExSetupAssist" target="_blank" rel="noopener"&gt;SetupAssist script&lt;/A&gt;. If something does not work properly after updates, see &lt;A href="https://aka.ms/ExchangeFAQ" target="_blank" rel="noopener"&gt;Repair failed installations of Exchange Cumulative and Security updates&lt;/A&gt;. Also please see &lt;A href="https://support.microsoft.com/topic/file-version-error-when-you-try-to-install-exchange-server-november-2024-su-a650da30-f8fb-469d-a449-47396cab0a15" target="_blank" rel="noopener"&gt;File version error when you try to install Exchange Server updates&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;FAQs&lt;/H4&gt;
&lt;P&gt;&lt;STRONG&gt;Our organization is in Hybrid mode with Exchange Online. Do we need to do anything?&lt;/STRONG&gt;&lt;BR /&gt;Exchange Online is already protected, but this SU needs to be installed on your Exchange servers, even if they are used only for management purposes. If you change the auth certificate after installing an SU, you should re-run the Hybrid Configuration Wizard.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The last SU/HU we installed is a few months old. Do we need to install all SUs in order to install the latest one?&lt;/STRONG&gt;&lt;BR /&gt;SUs are cumulative. If you are running a CU supported by the SU, you do not need to install all SUs or HUs in sequential order; simply install the latest SU. Please see&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/exchange-team-blog/why-exchange-server-updates-matter/ba-p/2280770" target="_blank" rel="noopener"&gt;this blog post&lt;/A&gt;&amp;nbsp;for more information.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Do we need to install SUs on all Exchange Servers within our organization? What about ‘Management Tools only’&amp;nbsp;machines?&lt;/STRONG&gt;&lt;BR /&gt;Our recommendation is to install SUs on&amp;nbsp;&lt;U&gt;all&lt;/U&gt;&amp;nbsp;Exchange Servers and all servers and workstations running the Exchange Management Tools to ensure compatibility between management tools clients and servers. If you are trying to update the Exchange Management Tools in the environment with no running Exchange servers, please see&amp;nbsp;&lt;A href="https://learn.microsoft.com/exchange/manage-hybrid-exchange-recipients-with-management-tools#update-the-exchange-server-management-tools-only-role-with-no-running-exchange-server-to-a-newer-cumulative-or-security-update" target="_blank" rel="noopener"&gt;this&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Our organization does not have the Exchange 2016 and 2019 ESU. How can we get current Exchange 2016 or 2019 updates?&lt;/STRONG&gt;&lt;BR /&gt;Since Exchange 2016 and 2019 are now &lt;A href="https://techcommunity.microsoft.com/blog/exchange/support-for-exchange-server-2016-and-exchange-server-2019-ends-today/4461192" target="_blank" rel="noopener"&gt;out of support&lt;/A&gt;, only customers who have &lt;A href="https://techcommunity.microsoft.com/blog/exchange/announcing-exchange-2016--2019-extended-security-update-program/4433495" target="_blank" rel="noopener"&gt;enrolled into the ESU program&lt;/A&gt; (which is valid until April 2026) can obtain Exchange 2016 or 2019 updates released under the ESU. For all customers still running Exchange 2016 or 2019, we recommend that you &lt;A href="https://techcommunity.microsoft.com/blog/exchange/upgrading-your-organization-from-current-versions-to-exchange-server-se/4241305" target="_blank" rel="noopener"&gt;upgrade your organization to Exchange SE&lt;/A&gt; as soon as possible.&lt;/P&gt;
&lt;P style="background: #F0F0F0; padding: .5em; margin: 1em 0 1em 0;"&gt;Documentation may not be fully available at the time this post is published.&lt;/P&gt;
&lt;P&gt;This post might receive future updates; they will be listed here (if available).&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-12"&gt;The Exchange Server Team&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Feb 2026 15:00:32 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/exchange-team-blog/released-february-2026-exchange-server-security-updates/ba-p/4494076</guid>
      <dc:creator>The_Exchange_Team</dc:creator>
      <dc:date>2026-02-13T15:00:32Z</dc:date>
    </item>
    <item>
      <title>Exchange Online EWS, Your Time is Almost Up</title>
      <link>https://techcommunity.microsoft.com/t5/exchange-team-blog/exchange-online-ews-your-time-is-almost-up/ba-p/4492361</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Exchange Web Services (EWS) is approaching end of service in Exchange Online.&lt;/STRONG&gt; We first announced this change was coming in 2018, when we announced that&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/blog/exchange/upcoming-changes-to-exchange-web-services-ews-api-for-office-365/608055" target="_blank" rel="noopener"&gt;Exchange Web Services (EWS) will no longer receive functionality updates&lt;/A&gt;. In 2023, we announced that&amp;nbsp;&lt;A href="https://devblogs.microsoft.com/microsoft365dev/retirement-of-exchange-web-services-in-exchange-online/" target="_blank" rel="noopener"&gt;EWS will be disabled in Exchange Online in October 2026&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Today we’re announcing we will use a phased, admin controllable disablement plan that &lt;STRONG&gt;starts in October 2026&lt;/STRONG&gt; and concludes with a &lt;STRONG&gt;complete shutdown of EWS in 2027&lt;/STRONG&gt;. This post explains what’s happening, when, and what administrators should be doing &lt;EM&gt;now&lt;/EM&gt;.&lt;/P&gt;
&lt;P&gt;Today’s announcement and the retirement of EWS&amp;nbsp;&lt;STRONG&gt;apply only to Microsoft 365 and Exchange Online (all environments)&lt;/STRONG&gt;;&amp;nbsp;there are&amp;nbsp;&lt;STRONG&gt;no changes to&amp;nbsp;EWS&amp;nbsp;in Exchange Server.&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;H3&gt;Why is EWS being retired?&lt;/H3&gt;
&lt;P&gt;EWS was built nearly 20 years ago, and while it served the ecosystem well, it no longer aligns with today’s security, scale, or reliability requirements. Over the past several years:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Microsoft Graph has reached &lt;A href="https://learn.microsoft.com/exchange/clients-and-mobile-in-exchange-online/deprecation-of-ews-exchange-online#roadmap-for-parity-gaps" target="_blank" rel="noopener"&gt;near‑complete feature parity&lt;/A&gt; for the vast majority of EWS scenarios.&lt;/LI&gt;
&lt;LI&gt;Microsoft’s own applications have either migrated from EWS or are nearing completion.&lt;/LI&gt;
&lt;LI&gt;Many third-party vendors have already transitioned or are actively doing so.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Retiring EWS lets us reduce legacy surface area, simplify platform behavior, and deliver a more consistent, modern experience for everyone.&lt;/P&gt;
&lt;H3&gt;How will EWS be disabled?&lt;/H3&gt;
&lt;P&gt;We’ll disable EWS &lt;STRONG&gt;tenant-by-tenant&lt;/STRONG&gt; using the &lt;A href="https://learn.microsoft.com/en-us/exchange/client-developer/exchange-web-services/how-to-control-access-to-ews-in-exchange" target="_blank" rel="noopener"&gt;&lt;EM&gt;EWSEnabled&lt;/EM&gt; property&lt;/A&gt;, which supports three values: &lt;STRONG&gt;True, False,&lt;/STRONG&gt; and &lt;STRONG&gt;Null&lt;/STRONG&gt; (the default today). A new feature arriving in early 2026 will allow admins to define an &lt;STRONG&gt;AppID Allow List&lt;/STRONG&gt;. When enabled, only apps on that list can access EWS.&lt;/P&gt;
&lt;P&gt;The &lt;EM&gt;EWSEnabled&lt;/EM&gt; property in your tenant will change on (or soon after) Oct 1, 2026, as follows:&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="border-width: 1px;"&gt;
&lt;P&gt;&lt;STRONG&gt;EWSEnabled value&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="border-width: 1px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Before Oct 2026&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="border-width: 1px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Starting Oct 2026&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style="border-width: 1px;"&gt;
&lt;P&gt;&lt;STRONG&gt;True&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="border-width: 1px;"&gt;
&lt;P&gt;All EWS Allowed&lt;/P&gt;
&lt;/td&gt;&lt;td style="border-width: 1px;"&gt;
&lt;P&gt;Only Apps in the Allow List Allowed&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style="border-width: 1px;"&gt;
&lt;P&gt;&lt;STRONG&gt;False&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="border-width: 1px;"&gt;
&lt;P&gt;All EWS Blocked&lt;/P&gt;
&lt;/td&gt;&lt;td style="border-width: 1px;"&gt;
&lt;P&gt;All EWS Blocked&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style="border-width: 1px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Null&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="border-width: 1px;"&gt;
&lt;P&gt;All EWS Allowed&lt;/P&gt;
&lt;/td&gt;&lt;td style="border-width: 1px;"&gt;
&lt;P&gt;All EWS Allowed (allow list ignored)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;Any tenant with &lt;EM&gt;EWSEnabled&lt;/EM&gt; still set to &lt;STRONG&gt;Null&lt;/STRONG&gt; on October 1, 2026, will see the value changed to &lt;STRONG&gt;False&lt;/STRONG&gt; as the deployment rolls out. That will block EWS for all applications in the tenant at that time.&lt;/P&gt;
&lt;P&gt;If you want to keep EWS blocked, you can simply leave it that way.&lt;/P&gt;
&lt;P&gt;But if you still need to use EWS, you will have two choices:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Set &lt;EM&gt;EWSEnabled&lt;/EM&gt; to &lt;STRONG&gt;True&lt;/STRONG&gt; and maintain an Allow List (via &lt;A href="https://learn.microsoft.com/en-us/microsoft-365/baseline-security-mode/baseline-security-mode-settings?view=o365-worldwide" target="_blank" rel="noopener"&gt;Baseline Security Mode&lt;/A&gt; or Exchange Online PowerShell).&lt;/LI&gt;
&lt;LI&gt;Set &lt;EM&gt;EWSEnabled&lt;/EM&gt; back to &lt;STRONG&gt;Null&lt;/STRONG&gt;, which re-enables EWS without restrictions until the final deprecation occurs. This will have to be done using Exchange Online PowerShell.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Additionally, if you proactively configure an Allow List and set&amp;nbsp;&lt;EM&gt;EWSEnabled&lt;/EM&gt; to True &lt;SPAN class="lia-text-color-11"&gt;&lt;STRONG&gt;by the end of August 2026&lt;/STRONG&gt;&lt;/SPAN&gt;, your tenant &lt;U&gt;will be excluded from the October 1 automatic change to EWSEnabled=False&lt;/U&gt;.&lt;/P&gt;
&lt;P&gt;To help you during this transition, we will pre-populate the Allow List for customers who have not created one before September 2026, based on each tenants own usage. If in October 2026 you realize that you still need EWS, the admin can re-enable EWS (by setting &lt;EM&gt;EWSEnabled&lt;/EM&gt; to &lt;STRONG&gt;True&lt;/STRONG&gt;) after we block it. But note that there will be a service interruption in this case.&lt;/P&gt;
&lt;H3&gt;Key dates&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;Preparation (starting now)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;During this phase, EWS remains available, but admins are encouraged to prepare:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Review &lt;A href="https://learn.microsoft.com/microsoft-365/admin/activity-reports/ews-usage?view=o365-worldwide" target="_blank" rel="noopener"&gt;EWS usage reports&lt;/A&gt; in the Microsoft 365 admin center, and consider the published scripts if you need more information. See&amp;nbsp;
&lt;P&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/exchange/notes-from-the-field-finding-and-remediating-ews-app-usage-before-retirement/4496469" data-lia-auto-title="Notes From the Field: Finding and Remediating EWS App Usage Before Retirement" data-lia-auto-title-active="0" target="_blank"&gt;Notes From the Field: Finding and Remediating EWS App Usage Before Retirement&lt;/A&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;Optional: by end of August 2026, populate your Allow List and set EWSEnabled=True&lt;/LI&gt;
&lt;LI&gt;Begin migrating applications to Microsoft Graph.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Initial blocking for tenants who still use EWS – starting October 1, 2026&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;EWS will be &lt;STRONG&gt;disabled by default&lt;/STRONG&gt; (EWSEnabled=False) in Exchange Online tenants that have not explicitly chosen to keep it enabled with an Allow List and setting EWSEnabled to True in August 2026. At this point:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;EWS calls will be blocked unless the tenant has already taken admin action.&lt;/LI&gt;
&lt;LI&gt;Admins can temporarily enable EWS if critical workflows are affected (EWSEnabled=True)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Final EWS shutdown – April 1, 2027&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Starting with &lt;STRONG&gt;April 1, 2027&lt;/STRONG&gt;, EWS will be &lt;STRONG&gt;fully and permanently disabled&lt;/STRONG&gt;:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;The ability to control &lt;EM&gt;EWSEnabled&lt;/EM&gt; will be removed from tenant admins.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Here is a graphical representation of timelines:&lt;/P&gt;
&lt;img /&gt;
&lt;H3&gt;Ongoing communication and monitoring&lt;/H3&gt;
&lt;P&gt;To keep admins informed and avoid surprises we will send &lt;STRONG&gt;monthly Message Center posts&lt;/STRONG&gt; to provide tenant specific EWS usage summaries and reminders.&lt;/P&gt;
&lt;P&gt;We &lt;EM&gt;may&lt;/EM&gt; perform &lt;STRONG&gt;temporary “scream tests”&lt;/STRONG&gt; (shorter periods of time when we turn EWS off and then back on) which can help expose hidden dependencies before the final cutoff. We will provide more information in the coming weeks. If your organization sets &lt;EM&gt;EWSEnabled&lt;/EM&gt; = True now, you will not be impacted by any "scream tests" that we might conduct.&lt;/P&gt;
&lt;H3&gt;The bottom line&lt;/H3&gt;
&lt;P&gt;Now is the right time to evaluate your environment, talk with application owners, and plan your move to Microsoft Graph. Early action avoids last‑minute surprises and gives you the smoothest possible transition path.&lt;/P&gt;
&lt;H3&gt;FAQs&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;We already configured EWS blocking using the EWSApplicationAccessPolicy settings – how will this new Allow List and the list we have work together?&lt;BR /&gt;&lt;/STRONG&gt;The new AppID Allow List takes precedence. An app will have to pass both checks to gain access.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;We have all kinds of apps still using EWS. We have no idea how much work it’s going to take to migrate them – help!&lt;BR /&gt;&lt;/STRONG&gt;Start with the usage tools we’ve published (WW tenants see &lt;A href="https://learn.microsoft.com/microsoft-365/admin/activity-reports/ews-usage?view=o365-worldwide" target="_blank" rel="noopener"&gt;this&lt;/A&gt; and government and sovereign clouds see &lt;A href="https://aka.ms/ewsToolsBlog" target="_blank" rel="noopener"&gt;this&lt;/A&gt;). Most apps use only a handful of EWS actions, and with modern tooling (including AI-assisted migrations), many can be converted more easily than expected.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;There are parity gaps in the Graph API. How can we possibly migrate to Graph from EWS?&lt;BR /&gt;&lt;/STRONG&gt;We actively track and publish the remaining gaps. Most EWS-based workloads can migrate now. The best place to see the current status of the remaining parity gaps is here: &lt;A href="https://learn.microsoft.com/exchange/clients-and-mobile-in-exchange-online/deprecation-of-ews-exchange-online#roadmap-for-parity-gaps" target="_blank" rel="noopener"&gt;Deprecation of Exchange Web Services in Exchange Online | Microsoft Learn&lt;/A&gt;. We keep this up to date and link to more information as it becomes available.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What about on-prem Exchange, and hybrid scenarios? &lt;BR /&gt;&lt;/STRONG&gt;EWS is not being retired on-prem. Hybrid scenarios vary depending on how apps access data. On-prem mailboxes may continue using EWS; cloud mailboxes must move to Graph. Autodiscover will help apps determine mailbox location automatically. But note that only Exchange SE will support Graph for calls to Exchange Online, so hybrid customers will &lt;EM&gt;have to&lt;/EM&gt; use Exchange SE to host on-premises mailboxes. Read more &lt;A href="https://techcommunity.microsoft.com/blog/Exchange/exchange-server-security-changes-for-hybrid-deployments/4396833" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;We will not be ready by April 2027. How do we get an extension?&lt;BR /&gt;&lt;/STRONG&gt;There will be &lt;EM&gt;&lt;STRONG&gt;no exceptions past April 2027&lt;/STRONG&gt;&lt;/EM&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Can we set EWSEnabled=True in August without creating our own Allow List?&lt;/STRONG&gt;&lt;BR /&gt;Yes, but we’d rather your tenant admin creates it, to ensure it’s exactly meeting your needs. In September 2026, we will be populating Allow Lists for our customers automatically (based on each tenant’s usage). If you only set EWSEnabled=True in August and we will populate your Allow List for you, we might also include apps in there you weren’t aware of (if they show usage). We recommend that admins create their own Allow Lists to control exactly which EWS applications they want to allow after October 2026.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;If we create our own Allow List before August 2026, will Microsoft change it in September 2026 during automatic Allow List processing for all tenants?&lt;/STRONG&gt;&lt;BR /&gt;No. If you create your own Allow List, our automated process will not change your already created Allow Lists. Your Allow List will stay unchanged.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Changes to this post:&lt;/EM&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;3/17/2026: &lt;/STRONG&gt;Added a link to&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/blog/exchange/notes-from-the-field-finding-and-remediating-ews-app-usage-before-retirement/4496469" data-lia-auto-title="Notes From the Field: Finding and Remediating EWS App Usage Before Retirement" data-lia-auto-title-active="0" target="_blank"&gt;Notes From the Field: Finding and Remediating EWS App Usage Before Retirement&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;2/9/2026:&lt;/STRONG&gt; Added a note that setting &lt;EM&gt;EWSEnabled&lt;/EM&gt; = True starting now would exclude the organization from any future "scream tests"&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-12"&gt;The Exchange Team&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Mar 2026 15:04:01 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/exchange-team-blog/exchange-online-ews-your-time-is-almost-up/ba-p/4492361</guid>
      <dc:creator>The_Exchange_Team</dc:creator>
      <dc:date>2026-03-17T15:04:01Z</dc:date>
    </item>
    <item>
      <title>Streamlined Moderation Approvals, Now in All Outlook Clients</title>
      <link>https://techcommunity.microsoft.com/t5/exchange-team-blog/streamlined-moderation-approvals-now-in-all-outlook-clients/ba-p/4491618</link>
      <description>&lt;H4&gt;Introduction&lt;/H4&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/exchange/recipients-in-exchange-online/moderated-recipients-exo/moderated-recipients-exo" target="_blank" rel="noopener"&gt;Email Moderation in Exchange Online&lt;/A&gt; ensures messages that need human review don’t slip through. Today’s workflow, however, can be constraining and confusing: To approve or reject messages moderators must use Outlook clients that support voting buttons (not all of them do, e.g. Outlook Mobile), and they may receive multiple approval requests when a message is split or forked.&lt;/P&gt;
&lt;P&gt;To address these concerns, we're pleased to announce we're now rolling out support for two updates: m&lt;EM&gt;oderation approval across all Outlook clients&lt;/EM&gt;, and &lt;EM&gt;approval message consolidation&lt;/EM&gt;. With these updates moderators will experience greater moderation approval flexibility and can act faster, with less noise.&lt;/P&gt;
&lt;H4&gt;What’s new&lt;/H4&gt;
&lt;H6&gt;&lt;STRONG&gt;Approve or reject from any Outlook client&lt;/STRONG&gt;&lt;/H6&gt;
&lt;P&gt;For moderation approval messages, we’re moving from using Outlook's voting buttons feature to Actionable Messages adaptive cards, which put the&amp;nbsp;&lt;STRONG&gt;Approve | Reject&lt;/STRONG&gt; buttons directly in the message body. Unlike voting buttons, Actionable Messages adaptive cards work across all Outlook clients – Windows, Mac, web, and mobile – so moderators can now approve or reject from whichever client and device works best for them.&lt;/P&gt;
&lt;H6&gt;&lt;STRONG&gt;Fewer approval messages&lt;/STRONG&gt;&lt;/H6&gt;
&lt;P&gt;When a moderated message goes to a very large Distribution List (DL) or group, to reduce latency Exchange Online may split it into multiple copies (aka&amp;nbsp;&lt;A href="https://learn.microsoft.com/exchange/reference/bifurcation" target="_blank" rel="noopener"&gt;bifurcation&lt;/A&gt;) – each copy can trigger its own approval request. The same can happen when a message is forked by transport or policy, creating duplicate approval requests for the same content. We’ve streamlined the flow so moderators will now typically see one approval request per moderated message, even when it’s forked or processed along multiple paths. If a message truly requires multiple approvals, each path still must be approved to release the message to all recipients.&lt;/P&gt;
&lt;H4&gt;How these updates help your organization&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Faster, more flexible approvals:&lt;/STRONG&gt; Moderators can act from their preferred device – no need to switch clients.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Consistent experience:&lt;/STRONG&gt; Same UI and actions across Windows, Mac, web, and mobile.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Less noise:&lt;/STRONG&gt; One approval request per message in most cases, reducing moderation notification fatigue while keeping all delivery paths correct.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;When these will be available&lt;/H4&gt;
&lt;P&gt;Actionable Messages adaptive cards for moderation approvals will roll out starting early March 2026 and should finish by late April 2026 (for Worldwide and GCC environments). Actionable Messages isn't yet supported in GCC High or DoD environments so the moderation approval experience will continue to use the legacy voting buttons method in those environments for the foreseeable future.&lt;/P&gt;
&lt;P&gt;The rollout of approval message consolidation will also occur in the same early March to late April timeframe, across all environments (Worldwide, GCC, GCC High, and DoD).&lt;/P&gt;
&lt;H4&gt;What admins should know&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;The Actionable Messages feature must be enabled for email in your tenant to take advantage of the new moderation approval experience across all Outlook clients. If Actionable Messages has been disabled (it's enabled by default), you can enable it via PowerShell:&lt;/LI&gt;
&lt;/UL&gt;
&lt;PRE class="lia-indent-padding-left-60px"&gt;Set-OrganizationConfig -SmtpActionableMessagesEnabled $true&lt;BR /&gt;Set-OrganizationConfig -ConnectorsActionableMessagesEnabled $true&lt;/PRE&gt;
&lt;UL&gt;
&lt;LI&gt;The Actionable Messages feature is only supported in Microsoft 365 and not on-premises, so in Exchange hybrid organizations on-prem moderators will not see the approval buttons rendered inline. To ease the transition to the Actionable Messages we'll support both the legacy voting buttons and adaptive cards experiences until July 31, 2026. After that, only the new Actionable Messages adaptive cards method will be supported, and moderators will thereafter have to have their mailboxes hosted in Microsoft 365.&lt;/LI&gt;
&lt;LI&gt;During the dual-mode period (end of July), moderators may see approval messages rendered in a variety of ways: with legacy voting buttons only, with adaptive card inline buttons only, or both. All of them will be supported and work until end of July. After that, approval via voting buttons will be deprecated and only the Actionable Messages adaptive card approval buttons will be supported and rendered.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/exchange/recipients-in-exchange-online/moderated-recipients-exo/moderated-recipients-exo" target="_blank" rel="noopener"&gt;Manage message approval in Exchange Online | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/exchange/reference/bifurcation" target="_blank" rel="noopener"&gt;Bifurcation and its technicalities with implications | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/powershell/module/exchangepowershell/set-organizationconfig?view=exchange-ps" target="_blank" rel="noopener"&gt;Set-OrganizationConfig (ExchangePowerShell) | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;FAQs&lt;/H4&gt;
&lt;P&gt;&lt;STRONG&gt;Q: I see both the voting buttons and the new inline buttons in approval messages. Which should I use to approve the message?&lt;BR /&gt;&lt;/STRONG&gt;A: Either one will work.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q: What if my organization uses custom transport rules that cause message forking?&lt;BR /&gt;&lt;/STRONG&gt;A: In forked scenarios, you may still see more than one approval request – each path must be approved to release the message to all intended recipients. This preserves correctness for all delivery paths. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-12"&gt;Microsoft 365 Messaging Team&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Feb 2026 15:53:35 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/exchange-team-blog/streamlined-moderation-approvals-now-in-all-outlook-clients/ba-p/4491618</guid>
      <dc:creator>The_Exchange_Team</dc:creator>
      <dc:date>2026-02-24T15:53:35Z</dc:date>
    </item>
    <item>
      <title>Microsoft Graph User Configuration API (preview) - now available</title>
      <link>https://techcommunity.microsoft.com/t5/exchange-team-blog/microsoft-graph-user-configuration-api-preview-now-available/ba-p/4490465</link>
      <description>&lt;P&gt;We wanted to post a quick note that on the Microsoft 365 Developer Blog, a new post was published discussing availability of the preview of&amp;nbsp;&lt;EM&gt;Microsoft Graph User Configuration API&lt;/EM&gt;.&lt;/P&gt;
&lt;P&gt;This is important to all of our customers and partners utilizing Exchange Web Services (EWS) in Exchange Online today. As we have mentioned previously, EWS in Exchange Online is&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/blog/exchange/retirement-of-exchange-web-services-in-exchange-online/3924440" target="_blank"&gt;being deprecated&lt;/A&gt;. You can read the developer post here:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://devblogs.microsoft.com/microsoft365dev/introducing-the-microsoft-graph-user-configuration-api-preview/" target="_blank"&gt;Introducing the Microsoft Graph User Configuration API (preview) - Microsoft 365 Developer Blog&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-12"&gt;The Exchange Team&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2026 15:34:24 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/exchange-team-blog/microsoft-graph-user-configuration-api-preview-now-available/ba-p/4490465</guid>
      <dc:creator>The_Exchange_Team</dc:creator>
      <dc:date>2026-01-29T15:34:24Z</dc:date>
    </item>
    <item>
      <title>Trust DigiCert Global Root G2 Certificate Authority to Avoid Exchange Online Email Disruption</title>
      <link>https://techcommunity.microsoft.com/t5/exchange-team-blog/trust-digicert-global-root-g2-certificate-authority-to-avoid/ba-p/4488311</link>
      <description>&lt;P style="background: #FFFF99; padding: .5em; margin: 1em 0 1em 0;"&gt;&lt;STRONG&gt;UPDATE 3/16/2026:&amp;nbsp;&lt;/STRONG&gt;We worked with the partner team to republish the Microsoft 365 Root Certificate Chain Bundles for Worldwide (WWMT) and GCC High / DoD (ITAR) after identifying that the previously published bundles were missing the intermediate certificate. If your organization needed to install the certificate bundle, you must re-download the updated bundle (released on 3/16) to get the new intermediate certificate and complete the certificate trust steps again as soon as possible (&lt;SPAN class="lia-text-color-8"&gt;&lt;STRONG&gt;by March 22, 2026&lt;/STRONG&gt;&lt;SPAN class="lia-text-color-21"&gt;)&lt;/SPAN&gt;&lt;/SPAN&gt;. Failure to trust the updated DigiCert Global Root G2 chain and its intermediates may result in mail flow disruption once providers begin distrusting the DigiCert G1 root.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To avoid mail flow disruption between your organization and Exchange Online, organizations that send or receive email to or from Exchange Online &lt;SPAN class="lia-text-color-8"&gt;over SMTP&lt;/SPAN&gt; must ensure that their servers and clients trust the&amp;nbsp;&lt;STRONG&gt;DigiCert Global Root G2 Certificate Authority and its subordinate CAs &lt;/STRONG&gt;before&lt;STRONG&gt; March 22, 2026&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;You can find a comprehensive list of the root and subordinate certificate authority chain in the &lt;A href="https://learn.microsoft.com/azure/security/fundamentals/azure-certificate-authority-details?tabs=certificate-authority-chains#root-and-subordinate-certificate-authority-chains" target="_blank" rel="noopener"&gt;Azure Certificate Authority Details&lt;/A&gt; documentation and in the &lt;A href="https://knowledge.digicert.com/general-information/digicert-trusted-root-authority-certificates#otherroots" target="_blank" rel="noopener"&gt;DigiCert Knowledge Base&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;The following information can help you identify the &lt;STRONG&gt;DigiCert Global Root G2&lt;/STRONG&gt; &lt;STRONG&gt;Certificate&lt;/STRONG&gt;:&lt;/P&gt;
&lt;PRE&gt;&lt;STRONG&gt;SHA1 Thumbprint&lt;/STRONG&gt;:&lt;BR /&gt;DF3C24F9BFD666761B268073FE06D1CC8D4F82A4&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Serial Number&lt;/STRONG&gt;:&lt;BR /&gt;03:3A:F1:E6:A7:11:A9:A0:BB:28:64:B1:1D:09:FA:E5&lt;/PRE&gt;
&lt;H4&gt;Who needs to take action&lt;/H4&gt;
&lt;P style="background: #66FF99; padding: .5em; margin: 1em 0 1em 0;"&gt;&lt;STRONG&gt;NOTE: &lt;/STRONG&gt;Windows operating system handles updating certificate trusts automatically by default. Customers running email workloads on Windows (e.g. on-premises Exchange Server) who never disabled this Windows feature &lt;EM&gt;do not need to take any action.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;However, if your organization sends or receives email to or from Exchange Online over SMTP and meets either of the following two criteria, you may need to complete the installation steps in “&lt;STRONG&gt;What you must do&lt;/STRONG&gt;”:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;1.&lt;/STRONG&gt; Your organization has disabled the Windows CTL Updater feature that by default downloads the&amp;nbsp;&lt;A href="https://learn.microsoft.com/windows-server/identity/ad-cs/certificate-trust" target="_blank" rel="noopener"&gt;Certificate Trust List (CTL)&lt;/A&gt;, which contains trusted and untrusted root certificates. This could be the case if your organizations maintain their own set of trusted Root and Intermediate Certificates via Group Policy or via &lt;A href="https://learn.microsoft.com/windows-server/identity/ad-cs/configure-trusted-roots-disallowed-certificates" target="_blank" rel="noopener"&gt;redirected Microsoft Automatic Update URL&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;You can check the last sync state for the trusted and untrusted root certificates by running the following commands from Windows Command prompt (note that running these commands will trigger an on-demand synchronization of the Microsoft trusted root list, if the feature is not explicitly disabled and if Windows determines that the local AuthRoot CTL is stale or incomplete):&lt;/P&gt;
&lt;PRE&gt;certutil -verifyctl AuthRoot | findstr /i "lastsynctime"&lt;BR /&gt;certutil -verifyctl Disallowed | findstr /i "lastsynctime"&lt;/PRE&gt;
&lt;P&gt;If the time returned is recent – Windows CTL Updater feature is working. Most of our customers do &lt;EM&gt;not&lt;/EM&gt; disable this.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;2.&lt;/STRONG&gt; You use older application runtime environments like legacy Java runtimes (e.g., legacy JDK/JRE versions), embedded systems and appliances, custom or outdated Linux images or air-gapped environments to connect or receive email from Exchange Online.&lt;/P&gt;
&lt;P&gt;This change applies &lt;STRONG&gt;to any system performing full certificate chain validation against Exchange Online&lt;/STRONG&gt;, including Exchange Server, security appliances, and third-party email gateways. If you use third-party email appliances, please contact the vendor directly for support.&lt;/P&gt;
&lt;H4&gt;Why this matters&lt;/H4&gt;
&lt;P&gt;Root Certificate Authorities (CAs) form the foundation of public certificate trust, as operating systems, browsers, and applications rely on their root certificates in trust stores. CAs use these root certificates to issue Intermediate CA certificates, which then issue TLS and other digital certificates.&lt;/P&gt;
&lt;P&gt;If a Root CA certificate becomes invalid or untrusted, all certificates issued by its Intermediates lose trust as well. That also implies that if a Root CA is not explicitly trusted, then the certificates issued by its Intermediate CAs are not valid either.&lt;/P&gt;
&lt;P&gt;Microsoft uses multiple intermediate certificate authorities that are issued by the DigiCert Global Root G2 root certificate authority to sign TLS certificates for its services (e.g., Exchange Online). For this trust chain to work, the DigiCert Global Root G2 root certificate must be present and trusted in the client’s trust store; otherwise, TLS connections will fail.&lt;/P&gt;
&lt;P&gt;If the DigiCert Global Root G2 root certificate is &lt;STRONG&gt;not installed &lt;/STRONG&gt;or if the client&lt;STRONG&gt; cannot obtain the intermediate CA certificate from the server during the TLS handshake or retrieve it via the Authority Information Access (AIA) extension&lt;/STRONG&gt;, you may see:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;The client may refuse to send email if strict certificate verification is enabled, or it may fall back to unencrypted SMTP if allowed&lt;/LI&gt;
&lt;LI&gt;The client may refuse to accept incoming connections from Exchange Online, resulting in failed or delayed email retrieval&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If the email client cannot trust the server, a secure communication is blocked.&lt;/P&gt;
&lt;H4&gt;What you must do&lt;/H4&gt;
&lt;P&gt;&lt;STRONG&gt;Check to see whether your machines have the DigiCert Global Root G2 certificate installed&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;You can use the following PowerShell command to validate if the DigiCert root certificate is trusted:&lt;/P&gt;
&lt;PRE&gt;Get-ChildItem -Path Cert:\LocalMachine\Root\ | Where-Object { $_.Thumbprint -eq "DF3C24F9BFD666761B268073FE06D1CC8D4F82A4" }&lt;/PRE&gt;
&lt;P&gt;If this command returns a certificate (the output shows the thumbprint and subject), you should be good and &lt;EM&gt;no further actions are required&lt;/EM&gt;:&lt;/P&gt;
&lt;img&gt;Result indicating the required certificate is already trusted on the local Windows machine.&lt;/img&gt;
&lt;P&gt;In addition to the Root certificate, there are several related Intermediate certificates.&lt;/P&gt;
&lt;P&gt;If no result is returned, and you do not want to re-enable the Windows CTL Updater feature you must act by doing the following:&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Manually download and import the latest Microsoft 365 Root Certificate Chain bundles&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Microsoft supplies a collection of root certificates that are required to be trusted, as their associated Intermediate Certificate Authorities issue certificates essential for Microsoft 365 services.&lt;/P&gt;
&lt;P&gt;You can download the certificate bundles (&lt;STRONG&gt;.p7b / PKCS #7&lt;/STRONG&gt; file format) from here (use the latest download):&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/download/details.aspx?id=102267" target="_blank" rel="noopener"&gt;Microsoft 365 Root Certificate Chain Bundle – Worldwide&lt;/A&gt;
&lt;UL&gt;
&lt;LI&gt;Microsoft 365 operated by 21Vianet customers should use the Worldwide bundle&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/download/details.aspx?id=100934" target="_blank" rel="noopener"&gt;Microsoft 365 Certificate Bundle - DoD/GCC High&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;After downloading, open an elevated PowerShell window and execute the following command. Ensure that you update the path and file name to correspond to the actual .p7b bundle you have obtained:&lt;/P&gt;
&lt;LI-CODE lang="powershell"&gt;$p7bPath = "C:\path\to\m365_root_certs_20260316.p7b"

$certCollection = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2Collection
$certCollection.Import($p7bPath)

foreach ($cert in $certCollection) {
    $storeName = if ($cert.Subject -eq $cert.Issuer) { "Root" } else { "CA" }
    $store = New-Object System.Security.Cryptography.X509Certificates.X509Store($storeName, "LocalMachine")
    $store.Open("ReadWrite")
    $store.Add($cert)
    $store.Close()
    Write-Host "Imported: $($cert.Subject) to store: LocalMachine\$storeName"
}&lt;/LI-CODE&gt;
&lt;P&gt;Confirm the import worked by running the command mentioned in step 1 above.&lt;/P&gt;
&lt;H4&gt;What would the error look like, if this is not addressed?&lt;/H4&gt;
&lt;P&gt;If you don't install the DigiCert Global Root G2 root certificate and your systems rely on old root certificates for validation, your mail flow could be disrupted after March 22, 2026. The specific issues you encounter will depend on your operating system and application configuration. Here are some possible examples:&lt;/P&gt;
&lt;P&gt;If Exchange Online can't connect to your on-premises Exchange Server, you may see the following when running a message trace in the Exchange Online Admin Center:&lt;/P&gt;
&lt;PRE&gt;Reason: &lt;SPAN class="lia-text-color-8"&gt;[{LED=&lt;/SPAN&gt;&lt;SPAN class="lia-text-color-8"&gt;450 4.4.317 Cannot establish session with remote server [Message=451 5.7.3 STARTTLS is required to send mail]&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;img&gt;How Exchange Online Message Tracking might show the error if the receiving server does not trust the certificate.&lt;/img&gt;
&lt;P&gt;The issue could also be present if your on-premises environment tries to connect to Exchange Online. The error in your on-premises protocol log would be similar to:&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN class="lia-text-color-8"&gt;451 5.7.3 STARTTLS is required,&amp;nbsp;5.7.0 Must issue a STARTTLS command first&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;When using OpenSSL to connect (for example, on a machine which is running a Linux operating system or an application that makes use of OpenSSL), it can’t retrieve the local issuer:&lt;/P&gt;
&lt;PRE&gt;OpenSSL s_client -starttls smtp -connect &amp;lt;tenant&amp;gt;.mail.protection.outlook.com:25 -showcerts&lt;/PRE&gt;
&lt;img&gt;An error that (for example) a Linux system could show if it does not trust the certificate when trying to connect to Exchange Online.&lt;/img&gt;
&lt;H4&gt;Summary&lt;/H4&gt;
&lt;P&gt;It is crucial to complete the steps outlined in this blog post &lt;STRONG&gt;&lt;U&gt;before March 22, 2026&lt;/U&gt;&lt;/STRONG&gt;. Failing to perform these updates may result in significant disruptions to your organization's mail flow with Exchange Online.&lt;/P&gt;
&lt;P&gt;By ensuring that the necessary certificates are installed and up to date, you help maintain secure and uninterrupted communication between your systems and Microsoft 365. Please prioritize these actions to avoid any potential issues with email delivery after the deadline.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Note: &lt;/STRONG&gt;our Exchange Online customers have now received a Message Center (MC) post on this, MC1224565.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Significant changes to this post:&lt;/EM&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;3/18/2026: &lt;/STRONG&gt;Added a script sample that will import appropriate certificate into the appropriate certificate store (Root vs. Intermediate)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;3/17/2026: &lt;/STRONG&gt;Removed the mention of a single older Intermediate certificate from instructions. The new Certificate bundle contains multiple Internediate certificates needed.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;3/16/2026:&lt;/STRONG&gt; Removed Option 2 (manually downloading the intermediate certificate) as the new intermediate certificate is now included in the certificate bundle.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;3/16/2026:&lt;/STRONG&gt; Latest update to timeline, now set to March 22. Mentioned that the certificate bundle was republished.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;3/12/2026:&amp;nbsp;&lt;/STRONG&gt;Added a clarification in few places that this change applies to customers/systems that send email over SMTP.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;2/23/2026:&amp;nbsp;&lt;/STRONG&gt;Added more detail about importing and validation of intermediate certificate.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;2/10/2026:&lt;/STRONG&gt; Added a note about intermediate certificates (this is very infrequent).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;2/4/2026:&lt;/STRONG&gt; Changed the deadline to March 15 due to speed of overall industry deprecation.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-12"&gt;Microsoft 365 Messaging Team&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Mar 2026 15:01:57 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/exchange-team-blog/trust-digicert-global-root-g2-certificate-authority-to-avoid/ba-p/4488311</guid>
      <dc:creator>The_Exchange_Team</dc:creator>
      <dc:date>2026-03-18T15:01:57Z</dc:date>
    </item>
    <item>
      <title>Updated Exchange Online SMTP AUTH Basic Authentication Deprecation Timeline</title>
      <link>https://techcommunity.microsoft.com/t5/exchange-team-blog/updated-exchange-online-smtp-auth-basic-authentication/ba-p/4489835</link>
      <description>&lt;P data-ogsc="black" data-ogsb="rgb(255, 255, 255)"&gt;We understand that many customers continue to face real challenges modernizing legacy email workflows and need sufficient time to adopt viable, secure alternatives. Based on customer feedback and visibility into adoption progress, we are refining the &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/exchange/exchange-online-to-retire-basic-auth-for-client-submission-smtp-auth/4114750" target="_blank" rel="noopener" data-lia-auto-title="Exchange Online SMTP AUTH Basic Authentication Deprecation" data-lia-auto-title-active="0"&gt;Exchange Online SMTP AUTH Basic Authentication Deprecation&lt;/A&gt; timeline to provide clearer milestones and additional runway.&lt;/P&gt;
&lt;UL data-ogsb="rgb(255, 255, 255)"&gt;
&lt;LI data-ogsc="black"&gt;&lt;STRONG&gt;Now to December 2026: &lt;/STRONG&gt;SMTP AUTH Basic Authentication behavior remains unchanged.&lt;/LI&gt;
&lt;LI data-ogsc="black"&gt;&lt;STRONG&gt;End of December 2026:&amp;nbsp;&lt;/STRONG&gt;SMTP AUTH Basic Authentication will be&amp;nbsp;&lt;STRONG&gt;disabled by default for existing tenants&lt;/STRONG&gt;. Administrators will still be able to enable it if needed.&lt;/LI&gt;
&lt;LI data-ogsc="black"&gt;&lt;STRONG&gt;New tenants created after December 2026:&amp;nbsp;&lt;/STRONG&gt;SMTP AUTH Basic Authentication will be&amp;nbsp;&lt;STRONG&gt;unavailable by default&lt;/STRONG&gt;. OAuth will be the supported authentication method.&lt;/LI&gt;
&lt;LI data-ogsc="black"&gt;&lt;STRONG&gt;Second half of 2027:&amp;nbsp;&lt;/STRONG&gt;Microsoft will announce the&amp;nbsp;&lt;STRONG&gt;final removal date&lt;/STRONG&gt;&amp;nbsp;for SMTP AUTH Basic Authentication.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These updates are intended to give customers with tenants in our service (all cloud environments) more time to plan, validate, and deploy modern authentication alternatives, while maintaining a clear path toward stronger default security.&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-12"&gt;Microsoft 365 Messaging Team&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2026 21:05:48 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/exchange-team-blog/updated-exchange-online-smtp-auth-basic-authentication/ba-p/4489835</guid>
      <dc:creator>The_Exchange_Team</dc:creator>
      <dc:date>2026-01-29T21:05:48Z</dc:date>
    </item>
  </channel>
</rss>

