Microsoft and IRONSCALES Crack Down on the Direct Send Exploit
None
<p>Back in <a href="https://ironscales.com/blog/inside-job-attackers-are-spoofing-emails-with-m365s-direct-send">Part 1</a>, we walked through how attackers are using <span style="font-weight: bold;">Microsoft 365’s Direct Send</span> feature to spoof internal emails, making those messages look like they’re coming from a trusted domain.</p><p>Now, Microsoft is tightening the screws with <em>new controls and clearer guidance</em> on how to shut that door before someone walks through it.</p><p>This post breaks down what’s changed, what you need to do, and how to keep legitimate mail flowing while keeping the bad actors out.</p><div class="code-block code-block-12 ai-track" data-ai="WzEyLCIiLCJCbG9jayAxMiIsIiIsMV0=" style="margin: 8px 0; clear: both;"> <style> .ai-rotate {position: relative;} .ai-rotate-hidden {visibility: hidden;} .ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;} </style> <div class="ai-rotate ai-unprocessed ai-timed-rotation ai-12-1" data-info="WyIxMi0xIiwxXQ==" style="position: relative;"> <div class="ai-rotate-option" style="visibility: hidden;" data-index="1" data-name="VGVjaHN0cm9uZyBHYW5nIFlvdXR1YmU=" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://youtu.be/Fojn5NFwaw8" target="_blank"><img src="https://securityboulevard.com/wp-content/uploads/2024/12/Techstrong-Gang-Youtube-PodcastV2-770.png" alt="Techstrong Gang Youtube"></a></div> <div class="clear-custom-ad"></div> </div></div> </div> </div><h2 style="font-size: 24px;"><strong>What’s New from Microsoft?</strong></h2><ol> <li><strong> New ‘RejectDirectSend’ Feature</strong></li> </ol><p>Microsoft has released a new tenant-wide control (in public preview) called <span style="font-size: 18px; font-family: 'Courier New', Courier, monospace;">RejectDirectSend</span>. When enabled, it blocks unauthenticated emails from your own accepted domains—emails that don’t flow through a trusted connector.</p><p>This is a big deal. Previously, attackers could spoof your domain and send messages straight to Exchange Online using port 25, bypassing SPF, DKIM, and other checks. Now, Exchange will reject that traffic automatically.</p><div class="code-block code-block-15" style="margin: 8px 0; clear: both;"> <script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2091799172090865" crossorigin="anonymous" type="21b6c18c15b7683a4bd4789c-text/javascript"></script> <!-- SB In Article Ad 1 --> <ins class="adsbygoogle" style="display:block" data-ad-client="ca-pub-2091799172090865" data-ad-slot="8723094367" data-ad-format="auto" data-full-width-responsive="true"></ins> <script type="21b6c18c15b7683a4bd4789c-text/javascript"> (adsbygoogle = window.adsbygoogle || []).push({}); </script></div><p>You can turn it on with a single PowerShell command:</p><p style="font-size: 18px;"><span style="background-color: #eeeeee; font-family: 'Courier New', Courier, monospace;">Set-OrganizationConfig -RejectDirectSend $true</span></p><p>Once enabled, Exchange will block unauthenticated internal spoof attempts and return this error to the sender:</p><p style="font-size: 14px;"><span style="background-color: #eeeeee; font-family: 'Courier New', Courier, monospace;"><span style="font-size: 18px; color: #ff9902; background-color: #eeeeee;">550 5.7.68</span> <span style="font-size: 18px; background-color: #eeeeee;">TenantInboundAttribution; Direct Send <span style="color: #9a00ff;">not</span> allowed <span style="color: #9a00ff;">for this</span> organization <span style="color: #9a00ff;">from</span> unauthorized sources</span></span></p><ol start="2"> <li><strong> Connector-Based Exceptions</strong></li> </ol><p>If you have printers, scanners, line-of-business apps, or external services sending mail on your behalf, you’ll need to make sure those senders are authenticated. Microsoft recommends using an <strong>inbound partner connector</strong> with either IP or certificate-based authentication.</p><ol start="3"> <li><strong> SPF & DMARC Still Matter</strong></li> </ol><p>Even with the new feature, Microsoft emphasizes continuing to enforce <strong>SPF, DKIM, and DMARC</strong> correctly. Use <span style="font-size: 18px; font-family: 'Courier New', Courier, monospace; background-color: #eeeeee;">~all<span style="background-color: #ffffff;"> </span></span>(soft fail) in your SPF policy if you need flexibility for legitimate third-party senders. Misconfigurations still cause both false positives and missed threats.</p><ol start="4"> <li><strong> Better Logging and Visibility</strong></li> </ol><p>For now, Microsoft’s <span style="font-size: 18px; font-family: 'Courier New', Courier, monospace; background-color: #eeeeee;">RejectDirectSend</span> control doesn’t show up in standard logs unless you’re looking. You’ll need to inspect traffic using Audit Logs or advanced queries (filtering by sender domain, authentication status, etc.). Make sure you have eyes on the metrics so you don’t accidentally block something important.</p><h2><span style="font-size: 24px; font-family: Arial, Helvetica, sans-serif;">What IRONSCALES Has Done to Protect Our Clients</span></h2><p><span style="font-family: Arial, Helvetica, sans-serif;">While Microsoft has tightened Direct Send controls, our team has already deployed targeted updates to protect customers against these attacks and the techniques threat actors rely on to sneak past basic authentication checks.</span></p><p><span style="font-family: Arial, Helvetica, sans-serif;">Here’s what’s new in your IRONSCALES environment:</span></p><ul> <li><span style="font-family: Arial, Helvetica, sans-serif;"><strong>New Detection Logic Deployed</strong> – Covers “Direct Send” impersonation attempts, where attackers bypass traditional relay checks and pose as trusted internal users.</span></li> <li><span style="font-family: Arial, Helvetica, sans-serif;"><strong>Enhanced Attachment Scanning</strong> – Added specific rules for prominent extensions <em>including but not limited</em> to SVG and HTML payloads, which are frequently used to hide phishing links or embedded malicious code.</span></li> <li><span style="font-family: Arial, Helvetica, sans-serif;"><strong>Improved Cross-Module Consistency</strong> – Detection modules now share results more effectively, reducing situations where one module spotted suspicious activity but the verdict wasn’t reflected in the final classification.</span></li> <li><span style="font-family: Arial, Helvetica, sans-serif;"><strong>Ongoing Tuning</strong> – Our Security Research team continuously fine-tunes detection logic to maximize catch rates while keeping false positives low.</span></li> </ul><p><span style="font-family: Arial, Helvetica, sans-serif;"><strong>What this means in practice:</strong></span><br><span style="font-family: Arial, Helvetica, sans-serif;">These updates allow us to automatically detect and remediate emails that previously had a higher chance of slipping through — including <em>internal impersonation attacks via Direct Send</em> and phishing attempts hidden in less common attachment types like SVG or HTML.</span></p><p><span style="font-family: Arial, Helvetica, sans-serif;">You don’t need to take any action — these protections are already live and active across your mailboxes.</span></p><h2 style="font-size: 24px;"><strong>Action Items: What You Should Do Today <p></p></strong></h2><table style="border-collapse: collapse; table-layout: fixed; margin-left: auto; margin-right: auto; border: 1px solid #99acc2; width: 100%; height: 482px;"> <tbody> <tr style="height: 49px;"> <td style="border: 1pt solid windowtext; width: 7.97709%; text-align: center; height: 49px; background-color: #004491;"> </td> <td style="border: 1pt solid windowtext; width: 92.0229%; height: 49px; background-color: #004491; vertical-align: bottom; text-align: center;"><span style="font-family: Arial, Helvetica, sans-serif;"><strong><span style="color: #ffffff;">Steps To Take</span></strong></span></td> </tr> <tr style="height: 77px;"> <td style="border: 1pt solid windowtext; width: 7.97709%; text-align: center; height: 77px;"> <p><span style="font-family: Arial, Helvetica, sans-serif;">1</span></p> </td> <td style="width: 92.0229%; height: 77px;"> <p><span style="font-family: Arial, Helvetica, sans-serif;">Inventory all systems or apps using Direct Send (like printers, email alerts, Azure Comm Services, etc.)</span></p> </td> </tr> <tr style="height: 79px;"> <td style="border: 1pt solid windowtext; width: 7.97709%; text-align: center; height: 79px;"> <p><span style="font-family: Arial, Helvetica, sans-serif;">2</span></p> </td> <td style="width: 92.0229%; height: 79px;"> <p><span style="font-family: Arial, Helvetica, sans-serif;">Update your SPF record with the IPs of legitimate senders; use soft fail</span> (<span style="font-size: 18px; font-family: 'Courier New', Courier, monospace; background-color: #eeeeee;">~all</span>) <span style="font-family: Arial, Helvetica, sans-serif;">to avoid bouncebacks</span></p> </td> </tr> <tr style="height: 79px;"> <td style="border: 1pt solid windowtext; width: 7.97709%; text-align: center; height: 79px;"> <p><span style="font-family: Arial, Helvetica, sans-serif;">3</span></p> </td> <td style="width: 92.0229%; height: 79px;"> <p><span style="font-family: Arial, Helvetica, sans-serif;">Enable</span> <span style="background-color: #cccccc; font-size: 18px; font-family: 'Courier New', Courier, monospace;"><span style="background-color: #eeeeee;">RejectDirectSend</span><span style="background-color: #fafafa;">: </span><span style="background-color: #eeeeee;">Set-OrganizationConfig -RejectDirectSend $true</span></span></p> </td> </tr> <tr style="height: 49px;"> <td style="border: 1pt solid windowtext; width: 7.97709%; text-align: center; height: 49px;"> <p><span style="font-family: Arial, Helvetica, sans-serif;">4</span></p> </td> <td style="width: 92.0229%; height: 49px;"> <p><span style="font-family: Arial, Helvetica, sans-serif;">Create inbound connectors for authenticated traffic using IP or certificate validation</span></p> </td> </tr> <tr style="height: 51px;"> <td style="border: 1pt solid windowtext; width: 7.97709%; text-align: center; height: 51px;"> <p><span style="font-family: Arial, Helvetica, sans-serif;">5</span></p> </td> <td style="width: 92.0229%; height: 51px;"> <p><span style="font-family: Arial, Helvetica, sans-serif;">Monitor rejected mail for the</span> <span style="font-size: 18px; background-color: #eeeeee; font-family: 'Courier New', Courier, monospace;">550 5.7.68</span> <span style="font-family: Arial, Helvetica, sans-serif;">error to catch misconfigured systems</span></p> </td> </tr> <tr style="height: 49px;"> <td style="border: 1pt solid windowtext; width: 7.97709%; text-align: center; height: 49px;"> <p><span style="font-family: Arial, Helvetica, sans-serif;">6</span></p> </td> <td style="width: 92.0229%; height: 49px;"> <p><span style="font-family: Arial, Helvetica, sans-serif;">Coordinate with <span style="font-weight: bold;">app/device owners</span> to migrate away from anonymous port 25</span></p> </td> </tr> <tr style="height: 49px;"> <td style="border: 1pt solid windowtext; width: 7.97709%; text-align: center; height: 49px;"> <p><span style="font-family: Arial, Helvetica, sans-serif;">7</span></p> </td> <td style="width: 92.0229%; height: 49px;"> <p><span style="font-family: Arial, Helvetica, sans-serif;">Stay ready — Microsoft will eventually enable this control by default for all new tenants</span></p> </td> </tr> </tbody> </table><p style="text-align: left;"><strong style="color: #101828; font-size: 24px; background-color: transparent;"><br>Q&A: What You Need to Know</strong></p><p><strong>Q: What happens if a printer or line-of-business app sends mail after I enable RejectDirectSend?</strong><br><strong>A:</strong> If that traffic isn’t authenticated through a connector, Exchange will block it with the <span style="font-size: 18px; font-family: 'Courier New', Courier, monospace; background-color: #eeeeee;">550 5.7.68</span> error. This means the sender is trying to impersonate your domain without permission. The fix is simple: set up an inbound connector that validates via IP or certificate. You get to define who’s allowed to speak for your domain.</p><p><strong>Q: Is Direct Send the same as regular email delivery?</strong><br><strong>A:</strong> Not quite. Direct Send means sending email <em>from your accepted domain</em> to Microsoft 365 <em>without authentication</em>. Microsoft has clarified that not all unauthenticated mail is Direct Send—but when it comes from your domain, it should be protected. Otherwise, it’s a spoof waiting to happen.</p><p><strong>Q: Can SPF or DMARC catch this kind of spoofing without the new control?</strong><br><strong>A:</strong> Sometimes—but not always. SPF only works if the receiving server checks it <em>and</em> the sending IP is on your allowlist. DMARC depends on SPF/DKIM passing and domain alignment. If an attacker sends mail directly via port 25 with a forged header, SPF and DKIM checks often aren’t enforced. That’s why Microsoft introduced RejectDirectSend—to cut this loophole off entirely.</p><p><strong>Q: I’m not sure what’s using Direct Send in our environment. How do I avoid breaking things?</strong><br><strong>A:</strong> Start with monitoring. Look for emails coming from your domain without authentication or connector attribution. Microsoft recommends auditing sender traffic by IP and filtering on the <span style="font-size: 18px; font-family: 'Courier New', Courier, monospace; background-color: #eeeeee;">SenderMailFromAddress</span> field. Once you’ve identified your legit sources, build connectors and test before flipping the switch.</p><h2 style="font-size: 24px;"><strong>Final Thoughts</strong></h2><p><span style="font-family: Arial, Helvetica, sans-serif;">Microsoft’s new <strong>RejectDirectSend</strong> feature is an important step toward closing a loophole that attackers have exploited for years. But it’s only part of the picture. Threat actors move fast, and no single control — whether SPF, DMARC, or tenant-wide settings — is enough to keep pace on its own.</span></p><p><span style="font-family: Arial, Helvetica, sans-serif;">That’s why IRONSCALES has already gone further. With new detection logic, enhanced attachment scanning, and continuous tuning from our security research team, we’re making sure these same tactics are detected and remediated automatically at the inbox level. You don’t need to wait for policies to roll out either. This protection is already live and active.</span></p><p><span style="font-family: Arial, Helvetica, sans-serif;">We’re here to help if you want to talk through how these changes impact your environment, or if you’d like a deeper look at how IRONSCALES complements Microsoft 365 to shut down advanced impersonation and phishing techniques before they reach your users.</span></p><p><img decoding="async" src="https://track.hubspot.com/__ptq.gif?a=20641927&k=14&r=https%3A%2F%2Fironscales.com%2Fblog%2Fpart-2-microsoft-cracks-down-on-direct-send-spoofing&bu=https%253A%252F%252Fironscales.com%252Fblog&bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "></p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/08/microsoft-and-ironscales-crack-down-on-the-direct-send-exploit/" data-a2a-title="Microsoft and IRONSCALES Crack Down on the Direct Send Exploit"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fmicrosoft-and-ironscales-crack-down-on-the-direct-send-exploit%2F&linkname=Microsoft%20and%20IRONSCALES%20Crack%20Down%20on%20the%20Direct%20Send%20Exploit" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fmicrosoft-and-ironscales-crack-down-on-the-direct-send-exploit%2F&linkname=Microsoft%20and%20IRONSCALES%20Crack%20Down%20on%20the%20Direct%20Send%20Exploit" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fmicrosoft-and-ironscales-crack-down-on-the-direct-send-exploit%2F&linkname=Microsoft%20and%20IRONSCALES%20Crack%20Down%20on%20the%20Direct%20Send%20Exploit" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fmicrosoft-and-ironscales-crack-down-on-the-direct-send-exploit%2F&linkname=Microsoft%20and%20IRONSCALES%20Crack%20Down%20on%20the%20Direct%20Send%20Exploit" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fmicrosoft-and-ironscales-crack-down-on-the-direct-send-exploit%2F&linkname=Microsoft%20and%20IRONSCALES%20Crack%20Down%20on%20the%20Direct%20Send%20Exploit" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://ironscales.com/blog">Blog</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by James Savard">James Savard</a>. Read the original post at: <a href="https://ironscales.com/blog/part-2-microsoft-cracks-down-on-direct-send-spoofing">https://ironscales.com/blog/part-2-microsoft-cracks-down-on-direct-send-spoofing</a> </p>