
Microsoft 365's Direct Send is a feature in Exchange Online that allows devices, applications, or services (such as multifunction printers, scanners, or legacy applications) to send emails to internal recipients within a Microsoft 365 tenant without requiring authentication. Here’s a breakdown of how it works:
Yes, emails sent via Direct Send are subject to some level of security scanning, but the process has limitations due to the nature of the feature:
To protect against Direct Send abuse and ensure robust virus scanning, organizations can take the following steps:
kql``EmailEvents | where SenderFromDomain == "yourdomain.com" | where SenderMailFromDomain != "yourdomain.com" | where EmailDirection == "Inbound" | project Timestamp, Subject, SenderFromAddress, SenderMailFromAddressReplace yourdomain.com with your organization’s domain to identify mismatched sender domains.User Awareness:Train employees to recognize phishing attempts, especially those mimicking internal communications (e.g., fake HR or IT emails with QR codes or unexpected attachments).
Microsoft Direct Send allows unauthenticated email delivery within a Microsoft 365 tenant, making it convenient for devices like printers but vulnerable to phishing attacks. While Microsoft’s security measures (e.g., SPF validation, CompAuth, and Defender scans) apply to Direct Send emails, their internal routing can bypass external gateways and some authentication checks, creating a potential security gap. To mitigate risks, organizations should monitor Direct Send activity, consider disabling the feature if not needed, and enhance email security with advanced tools and policies.If you have further questions or need help with specific configurations, let me know!
Note April, 8 2025 : " We are working on creating a report for Direct Send traffic that admins can use to get an overview of what traffic will be impacted. " https://techcommunity.microsoft.com/blog/exchange/introducing-more-control-over-direct-send-in-exchange-online/4408790