Exchange Web Services in Exchange Online is being retired, and the clock is now unmistakably ticking: Microsoft will begin tenant-by-tenant disablement starting October 1, 2026, with a final, irreversible shutdown of EWS in Exchange Online in 2027. This move completes a deprecation that began with a 2018 announcement and accelerates a long-term platform consolidation toward Microsoft Graph and newer admin APIs. The change is strategic — narrowing legacy attack surface and steering customers to a single, modern API surface — but the operational fallout for organizations that still rely on EWS can be material. This article explains what Microsoft announced, verifies the technical specifics, assesses migration options and risks, and provides a practical, prioritized runbook for administrators who must act now.
Exchange Web Services (EWS) is a SOAP-based API set that has powered a huge ecosystem of client apps, connectors, scripts, printers, and vertical solutions for nearly two decades. Microsoft stopped adding new features to EWS in 2018 and has been encouraging migrations to Microsoft Graph ever since. The timeline toward disablement was firmed in 2023 and accelerated by security concerns after the January 2024 “Midnight Blizzard” incident, which highlighted the real-world risk posed by widely available, broad mailbox access surfaces. Microsoft now says EWS will be phased out for Exchange Online beginning October 1, 2026, and fully turned off in 2027.
Why this matters today
Source: Microsoft Exchange Team Blog Exchange Online EWS, Your Time is Almost Up | Microsoft Community Hub
Background and context
Exchange Web Services (EWS) is a SOAP-based API set that has powered a huge ecosystem of client apps, connectors, scripts, printers, and vertical solutions for nearly two decades. Microsoft stopped adding new features to EWS in 2018 and has been encouraging migrations to Microsoft Graph ever since. The timeline toward disablement was firmed in 2023 and accelerated by security concerns after the January 2024 “Midnight Blizzard” incident, which highlighted the real-world risk posed by widely available, broad mailbox access surfaces. Microsoft now says EWS will be phased out for Exchange Online beginning October 1, 2026, and fully turned off in 2027. Why this matters today
- Security and scale: EWS’s design predates modern OAuth and telemetry-first design patterns. Microsoft cites both security incidents and the need to simplify platform behavior as drivers for the retirement.
- Platform parity: Microsoft Graph has reached near-complete parity for most customer scenarios and is the strategic, actively developed API surface for Microsoft 365.
- Ecosystem momentum: Microsoft has accelerated internal migrations away from EWS and is publishing tooling and reporting to help customers find and remediate EWS dependencies.
What Microsoft announced — timelines and control mechanics
Microsoft’s public announcements lay out a three-phase, admin‑controllable plan:- Preparation (now): administrators should inventory EWS usage, run the published usage reports and analyzer tools, and begin migrations to Microsoft Graph or other supported paths. Tools and tutorials (including AI-assisted migration guidance) are available from Microsoft to accelerate this work.
- Initial blocking — starting October 1, 2026: Microsoft will begin tenant-by-tenant disablement using a tenant-level EWSEnabled property. Unless administrators proactively opt in to keep EWS for permitted apps, EWSEnabled will be set to False (blocking all EWS) during the deployment. Tenants with EWSEnabled explicitly set to True and a managed AppID Allow List will be permitted to continue running EWS calls. Tenants with EWSEnabled left as Null will have the flag changed to False as the deployment rolls out.
- Final shutdown — April 1, 2027: Microsoft will remove the EWSEnabled control from tenant admins and permanently disable EWS for Exchange Online. There will be no exceptions past that date.
- The EWSEnabled property supports three values: True, False, and Null. The difference matters because Null behaves as a permissive default before Microsoft flips the value during rollout. Setting EWSEnabled to True requires admins to maintain an AppID Allow List (AppID-based allow list) that controls which service principals can access EWS. Microsoft will provide a feature in early 2026 to manage that Allow List.
- Microsoft will pre-populate an Allow List in September 2026 for tenants that did not create their own list, based on observed usage—but if admins want precise control they should create the list themselves ahead of that auto-population. If a tenant proactively sets EWSEnabled=True and populates an Allow List by the end of August 2026, they will avoid automatic switching to EWSEnabled=False in October. Admins can also temporarily set EWSEnabled back to Null using Exchange Online PowerShell to re-enable EWS without restrictions until the final cutoff, but doing so risks service interruption when Microsoft permanently disables the platform.
- EWS retirement applies only to Exchange Online (Microsoft 365). On-premises Exchange Server installations continue to support EWS; hybrid scenarios require close attention because cloud mailboxes will be affected while on-prem mailboxes are not. Autodiscover helps clients determine mailbox location, but hybrid customers should review architecture choices carefully.
How the EWSEnabled/AppID Allow List model works — and what admins must know
Understanding the new control model is essential because it defines how your tenant can remain operational if you still need EWS functionality.- EWSEnabled = Null: Historically the default; EWS allowed broadly. Microsoft will flip Null tenants to False during the October 2026 rollout unless the tenant has already opted into True with an allow list.
- EWSEnabled = False: EWS blocked for all apps and users in the tenant.
- EWSEnabled = True: EWS allowed, but only for applications explicitly listed in the new AppID Allow List. Admins must maintain that allow list; Microsoft will provide UI and PowerShell management tools.
- The new AppID Allow List takes precedence over older EWSApplicationAccessPolicy settings. To gain EWS access, an app must pass both checks where both apply. That means relying on legacy policies only is not sufficient — admins must adopt the new AppID Allow List semantics.
- If you don’t create an Allow List before September 2026, Microsoft will auto-populate one for you based on observed usage. That may include apps you didn’t intend to allow; creating your own list is the safest option to control exactly what remains authorized. (learn.microsoft.com)
- Microsoft will allow re-enablement in October 2026 if admins discover missed dependencies, but that will incur service interruptions and is not a guaranteed long-term workaround. Final shutdown in April 2027 is non-negotiable.
- Create and maintain a precise AppID Allow List well before September 2026.
- Set EWSEnabled to True to avoid the automatic flip to False in October.
- Migrate remaining apps as a priority, treating the Allow List as a temporary, audited bridge only.
Tools, parity gaps, and migration helpers
Microsoft ships several tools and guidance assets intended to reduce migration friction:- EWS Usage Reports and EWS Analyzer: Admin center reports and the EWS Analyzer help you identify what apps and operations are using EWS and which mailboxes or service principals are active callers. Use these reports to create an inventory and to build a migration priority list.
- EWS Code Analyzer and AI-assisted migration tutorials: Microsoft published tools and step-by-step tutorials including examples that use GitHub Copilot to help refactor legacy EWS code to Microsoft Graph equivalents. These are practical for in-house scripts and small custom apps.
- Exchange Online Admin API (Public Preview): To fill some admin-oriented parity gaps (folder permissions, mailbox properties, delegation, MailTips, distribution membership), Microsoft released a cmdlet-style Admin API preview that maps familiar cmdlets to REST endpoints. This API is a pragmatic bridge for automation that previously relied on EWS. It is not a universal replacement for every EWS scenario, but it covers many admin workflows.
- Microsoft documents remaining gaps where Graph does not yet cover specific EWS features (for example: mailbox import/export workflows, some public folder operatieatures, and advanced delta semantics for recurring events). Microsoft is actively tracking and addressing many of these gaps, but some workloads will require re-architecture or interim compensating controls. Treat parity gaps as a planning input rather than a blocker: many migrations are possible today with modest engineering work.
Real-world impact — vendors, devices, and common failure modes
Who is most likely to break when EWS is blocked?- Third‑party SaaS vendors and ISVs that still rely on EWS (calendar sync tools, CRM connectors, room‑booking systems, and enterprise sync platforms).
- In‑house scripts and legacy automation that use EWS for mailbox access, folder operations, delegated access, or service account impersonation.
- Legacy devices and appliances (multifunction printers, embedded scanners) that use EWS for scan-to-mail workflows.
- Any workflows that use frontline or kiosk mailboxes in unconventional ways — note that Microsoft has tightened licensing enforcement for kiosk/F1/F3 SKUs and similar controls have been rolled out earlier in 2026 in some cases, producing 403s when the mailbox license does not permit EWS access.
- Many ISVs have been migrating or have announced Graph-based connectors; high-volume vendors (email sync/sales tools) often publish migration paths. But timelines vary — you must confirm with each vendor whether and when they will support Graph and what migration steps they require from your tenant. If a vendor has not committed, plan workarounds such as re-architecting the integration, moving the workload to an intermediary service that speaks Graph, or replacing the vendor.
- If your organization used frontline/Kiosk (F1/F3) mailboxes for automation to save ensing semantics earlier in 2026 show the practical cost of continuing that approach. Restoring EWS behavior for such mailboxes often requires adding an Exchange Plan or upgrading the user SKU — that increases license spend and should be weighed against migration or consolidation options. Microsoft’s enforcement moves mean license-driven breakages may appear long before the October 2026 disablement window.
Prioritized runbook for administrators — what to do this week, this month, and this quarter
Immediate (this week)- Run tenant EWS usage reports and export a full inventory of calling apps, appIDs, service principals, and mailbox targets. Use the EWS Analyzer where available. This is non-negotiable — you cannot plan migration without data.
- Identify high‑risk service accounts and undocumented automation (scripts, tenants’ service principals). Flag any appIDs that must remain functional for business continuity.
- Prioritize critical workloads by business impact (mailflow-affecting tocheduled jobs).
- Pilot migration of one small but representative app to Microsoft Graph or the Admin API; validate authentication, scopes, and RBAC behavior.
- If you absolutely must continue EWS after October 1, 2026, build an AppID Allow List and set EWSEnabled=True — but treat this as temporary and audit the list continuously. If you do nothing, Microsoft will set EWSEnabled=False for Null tenants during the October rollout.
- Finalize Allow Lists for any tenants that need to delay migration; proactively set EWSEnabled=True and confirm your Allow List contents. If you skip this step, expect the tenant to be flipped to False during October’s rollout. If you rely on Microsoft’s automatic pre-population, be prepared for apps to be included you might not want.
- Execute phased migrations: move delegations, permission workflows and admin automations first (these often have Admin API or PowerShell replacements), then migrate content sync, calendars, and other mailbox operations to Graph.
- Remove temporary Allow List entries and validate that business workflows continue to function on Graph or su- Prepare to enforce and document any governance or security changes introduced by the OAuth/RBAC model (SIEM ingestion of Graph/Admin API logs, certificate rotation for app-only auth, least-privilege RBACtional safety nets
- Keep a tested, auditable rollback plan (timed re-enablement via PowerShell if a critical workflow fails during the October rollout), but remember this is a short-term mitigation only — final shutdown in April 2027 is final.
Technical deep dive: authentication, impersonation, and admin automation
Authentication model changes- Microsoft Graph and Admin API both use OAuth 2.0 and support app-only auth via certificates or client secrets. This is a security improvement over many legacy EWS patterns where long-lived credentials or delegated service accounts were common. Plan to move to certificate-based app-only auth where possible and to implement strict audit and rotation practices.
- ApplicationImpersonation and other RBAC scopes were historically used with EWS for automation. Microsoft has been deprecating some impersonation flows and recommending app-only patterns secured by RBAC roles and least-privilege assignments. If your automation uses impersonation, map current permissions to Graph scopes or Admin API scopes and test the new flow early.
- The Exchange Online Admin API offers a cmdlet-style REST model for common administrative tasks (Get-Mailbox, MailboxFolderPermission, distribution memberships). This API is a useful migration path for many scripts that historically used EWS as a management surface, but you should treat the Admin API as a stepping stone: it helps rework automation quickly, but long-term tooling should consolidate on Graph + Exchange Online PowerShell for completeness.
Risk analysis — what can go wrong and how to mitigate it
Major risks- Untracked dependencies: The most common operational failure is undiscovered applications and scripts calling EWS. These create last-minsoft flips EWSEnabled to False. Avoid this by exhaustive inventory and by using granular telemetry from Microsoft’s usage reports.
- Vendor gaps: Some vendors may not ship Graph support in time. For such vendors, you will need interim compensations: deploy an intermediary translation service, relicense mailbox accounts to retain EWS access temporarily, or replace the vendor. Confirm timelines with key vendors now and escalate commercial commitments where necessary.
- Licensing shock: Reassigning frontline or kiosk users to licenses that include EWS can be costly. Consider consolidation of automation onto a smaller set of licensed service accounts, or accelerate migrations to Graph to avoid license spend.
- Audit and compliance gaps: Moving to OAuth/RBAC changes your audit model. Ensure SIEM ingestion of Graph/Admin API logs and retention policy updates before decommissioning legacy logging patterns.
- Start with admin and automation migration first (Admin API/PowerShell), then tackle client integrations.
- Use staged pilots and canary groups to validate behavior under load and to surface parity gaps early.
- Leverage Microsoft’s code analysis tools and AI-assisted tutorials to accelerate refactoring of in-house codebases.
Quick FAQ clarifications (short, precise answers)
- Is on-premises Exchange affected? No. EWS in Exchange Server remains supported; the retirement applies to Exchange Online only. Hybrid scenarios require careful review.
- Can I get an extension past April 1, 2027? Microsoft’s policy is unequivocal: there will be no exceptions past the final shutdown date. Plan accordingly.
- What if I set EWSEnabled=True without creating an Allow List? Microsoft will populate an Allow List for you in September 2026, but it may include apps you didn’t intend to allow. Creating your own list is recommended.
- How will this interact with existing EWSApplicationAccessPolicy rules? The AppID Allow List takes precedence and an app will need to pass both checks where both mechanisms are in effect.
Conclusion — the practical bottom line for Windows admins
Microsoft’s retirement of EWS in Exchange Online is a decisive step toward modernizing the platform and reducing legacy attack surface. The dates are firm and the mechanics are explicit: prepare now, inventory comprehensively, migrate high-impact and admin-oriented automations first, and use the AppID Allow List only as a temporary bridge. Use the EWS usage reports, EWS Analyzer, the Admin API preview, and Microsoft’s AI-assisted migration guides to accelerate work — but don’t mistake available tooling for a substitute for careful planning and testing. The window to act is finite; October 1, 2026 starts the tenant-by-tenant blocking, and April 1, 2027 ends the debate: EWS in Exchange Online will be gone. Act early, audit everything, and migrate with security and observability as first-class objectives.Source: Microsoft Exchange Team Blog Exchange Online EWS, Your Time is Almost Up | Microsoft Community Hub



