Skip to content
Home » Manage or block Direct Send on M365

Manage or block Direct Send on M365

This article explains how to manage or block Direct Send. But what is “Direct Send” ?

Microsoft 365 allows you to receive emails from any email address, including messages sent from addresses within your own tenant. We refer to this type of email as “Direct Send,” and many people may perceive it as a form of spoofing.

The MX servers (Exchange Online Protection) receive these emails without requiring authentication. By default, Exchange Online accepts any email that appears to come from your domain or from an existing mailbox within it. It then delivers the message to the user’s junk email folder. This type of email typically receives a spam score of 5.

Direct Send email spam score

If you want to manage or block these Direct Send messages to avoid any confusion for your users, two solutions are now available:

  • Add a transport rule in Exchange Online. This method allows you to manage Direct Send granularly with the quarantine usage.
  • Use the RejectDirectSend option in Exchange Online to globally block Direct Send.

Use transport rule and quarantine to manage Direct Send

Start to create an Exchange online transport rule.

Transport rule for antispoofing and direct send

Specify that the sender is located outside your organization:

Transport rule for antispoofing and direct send

Specify that the sender has an email address with one of your different domain names declared in your tenant:

Transport rule for antispoofing and direct send

You must choose the actions that apply to this type of email.

A safe option may be not to delete this type of email but to send them to the MS365 quarantine:

  • Add a prefix to the message such as [antispoofing]
  • Raise the SPAM level from 5 to 7 in order to send the email to the MS365 quarantine and no longer to the user’s mailbox
Transport rule for antispoofing and direct send
Transport rule for antispoofing and direct send

Overall, the transport rule will include 2 criteria and 2 actions.

You can also add exceptions. For example, if you want that your scanners & printers are able to send emails without authentication (see the related article for more details).

Transport rule for antispoofing and direct send

You can also choose to configure this transport rule via powershell commands:

Transport rule for antispoofing and direct send

Once this rule is in place, if a “spoofing direct send” email arrives on your MS365 tenant, it will go directly to the MS365 quarantine and you can access it via the security administration tool. The blocked “spoofing” emails will only be accessible inside the quarantine:

Microsoft 365 quarantine

By default, the system keeps these emails in quarantine for 30 days.

You will also be able to list these emails using the powershell command “get-quarantinemessage”:

Block Direct Send with OrganizationConfig parameter

Starting in 2025, Microsoft 365 introduces a new mail flow control parameter called RejectDirectSend. This feature allows administrators to block the reception of emails sent using the “Direct Send” method, which is commonly used by devices or applications that send mail without authentication. You can block Direct Send on the organization level with the Exchange powershell command Set-OrganizationConfig

Set-OrganizationConfig -RejectDirectSend $true

You can also check the value with a Get-OrganizationConfig command.

Configure RejectDirectSend status

Once Direct Send is blocked at the tenant level, you will see a new error message if you attempt to send emails using Direct Send: 5.7.68 TenantInboundAttribution; Direct Send not allowed for this organization from unauthorized sources.

Error message when you try to use Direct Send after disable it.


By Lionel TRAVERSE
Microsoft 365 Certified Administrator Expert / Microsoft Certified Trainer