Search

59439 – Exchange: Securing SMTP Authenticated endpoints – Disable by default for organizations without usage (archived)

Microsoft Exchange Logo

check before: 2021-12-01

Product:

Exchange

Platform:

Online, US Instances, World tenant

Status:

Launched

Change type:

Links:

Details:

We're working hard to make our service secure by default. The SMTP AUTH protocol use for client submissions is a common vector for attacks to use compromised credentials to send spam and phishing emails. We plan to disable the protocol for all organizations that we identify as not using the protocol. While off by default, it will still be possible for admins to enable SMTP AUTH for mailboxes that need to send emails from devices or software that require it. You can find out more about the settings involved by visiting the more info link.

Change Category:
XXXXXXX ...

Scope:
XXXXXXX ...

Release Phase:
General Availability

Created:
2019-12-07

updated:
2022-04-15

the free basic plan is required to see all details. Sign up here


A cloudsocut.one plan is required to see all the changed details. If you are already a customer, choose login.
If you are new to cloudscout.one please choose a plan.


changes*

DatePropertyoldnew
2022-04-15RM DescriptionWe're working hard to make our service secure by default. The SMTP AUTH protocol use for client submissions is a common vector for attacks to use compromised credentials to send spam and phishing emails. We plan to disable the protocol for all organizations that we identify as not using the protocol. While off by default, it will still be possible for admins to enable SMTP AUTH for mailboxes that need to send emails from devices or software that require it. You can find out more about the settings involved by visiting the more info link.  thi is no longer a relevant roadmap item and is being removed.We're working hard to make our service secure by default. The SMTP AUTH protocol use for client submissions is a common vector for attacks to use compromised credentials to send spam and phishing emails. We plan to disable the protocol for all organizations that we identify as not using the protocol. While off by default, it will still be possible for admins to enable SMTP AUTH for mailboxes that need to send emails from devices or software that require it. You can find out more about the settings involved by visiting the more info link.
2022-04-15RM StatusCancelledLaunched
2022-04-14RM DescriptionWe're working hard to make our service secure by default. The SMTP AUTH protocol use for client submissions is a common vector for attacks to use compromised credentials to send spam and phishing emails. We plan to disable the protocol for all organizations that we identify as not using the protocol. While off by default, it will still be possible for admins to enable SMTP AUTH for mailboxes that need to send emails from devices or software that require it. You can find out more about the settings involved by visiting the more info link.We're working hard to make our service secure by default. The SMTP AUTH protocol use for client submissions is a common vector for attacks to use compromised credentials to send spam and phishing emails. We plan to disable the protocol for all organizations that we identify as not using the protocol. While off by default, it will still be possible for admins to enable SMTP AUTH for mailboxes that need to send emails from devices or software that require it. You can find out more about the settings involved by visiting the more info link.  thi is no longer a relevant roadmap item and is being removed.
2022-04-14RM StatusIn developmentCancelled

*starting April 2022

Last updated 1 year ago

Share to MS Teams

Login to your account

Welcome Back, We Missed You!