For many enterprise IT leaders, the intersection of security and high-volume email workflows within Microsoft 365 represents a challenging balancing act. On one hand, organizations demand robust communications infrastructure for both internal and external use. On the other, the growing threat landscape has forced Microsoft to accelerate the adoption of modern security standards—sometimes faster than legacy workflows can adapt. Recent announcements from Microsoft reveal a recalibration of its approach, particularly concerning High Volume Email (HVE) features and the timeline for Basic Authentication deprecation. For IT administrators, compliance managers, and decision makers, understanding these changes is essential to maintaining both operational efficiency and security.
High Volume Email has long served as a specialized feature within the Microsoft 365 ecosystem, designed to facilitate bulk internal messaging—for example, for HR notifications, system alerts, or departmental newsletters. Traditionally, HVE could also reach external recipients, supporting certain third-party workflows and integrations. This flexibility, however, brought with it added complexity around authentication and policy enforcement, especially as security models shifted toward zero trust and cloud-native paradigms.
This is a significant development because Basic Authentication—which transmits credentials in plain text and has long been a favorite target for credential harvesting attacks—has been widely deprecated across cloud email services. For instance, Microsoft previously set aggressive timelines for disabling Basic Authentication in Exchange Online, citing both internal analysis and CISA advisories that linked basic auth to numerous breaches and credential stuffing attempts. According to Microsoft’s roadmap and corroborated by independent security advisories, most other Microsoft 365 services have already phased out basic auth in favor of OAuth or similar token-based mechanisms.
Microsoft addresses this shift by advocating for Azure Communication Services (ACS) Email for any bulk external delivery requirements. ACS is a separately licensed platform emphasizing compliance, deliverability, and programmable workflows. The decision to push external high-volume traffic to ACS is described as intended “to simplify our email offerings and clearly define HVE’s purpose within the Microsoft 365 ecosystem.” This move may also help Microsoft draw clearer boundaries for support and compliance scalability, and ensure that security controls for outbound messaging meet constantly evolving standards.
By extending basic auth support until 2028, Microsoft risks enabling a "security debt" whereby less proactive organizations postpone critical upgrades even longer. Some top information security specialists argue that “extensions like these create inertia and increase the long-tail of at-risk environments,” while defenders of the move, including some enterprise IT managers, counter that forced, poorly planned migration efforts can break mission-critical legacy workflows. In such environments—especially healthcare, government, and manufacturing—custom software developed years ago may not be OAuth-compatible without significant refactoring.
Microsoft’s position aims to strike a balance, explicitly “encouraging anyone concerned to get switched over to modern authentication as soon as possible to boost their security,” while conceding that the scale and complexity of the installed base preclude an outright mandate in the immediate future.
Whether this will result in unintended consequences (such as increased “notification fatigue” among end-users, or the risk of internal spamming) is an open question. Administrators are advised to pair newly enhanced delivery flexibility with robust governance and auditing practices, leveraging DLP (Data Loss Prevention), mail flow rules, and monitored distribution lists.
Furthermore, ACS is a separately billed Azure service, whereas HVE usage within Microsoft 365 was bundled at no extra cost for internal traffic. Organizations with tight IT budgets or fixed licensing agreements may need to reevaluate cost projections and vendor management strategies. Security-wise, however, this does provide a firmer assurance that modern auth and improved monitoring will be part of every external high-volume interaction, presumably leading to fewer exposure points for bulk phishing or outbound spam.
All sources corroborate the headline points:
Ultimately, the responsibility for timely and secure modernization rests with organizational IT leadership. Those who successfully navigate this transition—embracing secure authentication, modern outbound delivery services, and evolving governance practices—stand to benefit from both the flexibility and security a cloud-first, modern email strategy provides.
The clear takeaway for every Microsoft 365 customer is to regard this reprieve not as an indefinite extension, but as a final window for strategic transition. Organizations that move quickly and deliberately now will likely avoid rushed, reactive migrations in the years ahead—and place themselves on firmer security footing for whatever comes next in the Microsoft 365 ecosystem.
Understanding High Volume Email (HVE) in Microsoft 365
High Volume Email has long served as a specialized feature within the Microsoft 365 ecosystem, designed to facilitate bulk internal messaging—for example, for HR notifications, system alerts, or departmental newsletters. Traditionally, HVE could also reach external recipients, supporting certain third-party workflows and integrations. This flexibility, however, brought with it added complexity around authentication and policy enforcement, especially as security models shifted toward zero trust and cloud-native paradigms.Summary of the Latest Microsoft 365 Changes
Extension of Basic Authentication Support
In a move that directly impacts thousands of organizations, Microsoft has formally extended support for Basic Authentication with HVE until September 2028. This extension, three years beyond what many had anticipated, is framed as a concession to enterprises not yet prepared to fully adopt newer, more secure authentication protocols like OAuth 2.0. Microsoft’s official statement makes it clear: the goal remains to transition every tenant to modern auth, but the realities of legacy system dependencies and complex migration cycles necessitate added flexibility.This is a significant development because Basic Authentication—which transmits credentials in plain text and has long been a favorite target for credential harvesting attacks—has been widely deprecated across cloud email services. For instance, Microsoft previously set aggressive timelines for disabling Basic Authentication in Exchange Online, citing both internal analysis and CISA advisories that linked basic auth to numerous breaches and credential stuffing attempts. According to Microsoft’s roadmap and corroborated by independent security advisories, most other Microsoft 365 services have already phased out basic auth in favor of OAuth or similar token-based mechanisms.
Major Functionality Change: HVE Now Internal-Only
Beginning next month, HVE will lose the ability to deliver email to external recipients. Going forward, its scope is strictly limited to intra-tenant communications—meaning messages can only be sent to users within the same Microsoft 365 domain (tenant). This marks a departure from past practice, where some organizations leveraged HVE for targeted outreach to customers or partners not part of their own tenant.Microsoft addresses this shift by advocating for Azure Communication Services (ACS) Email for any bulk external delivery requirements. ACS is a separately licensed platform emphasizing compliance, deliverability, and programmable workflows. The decision to push external high-volume traffic to ACS is described as intended “to simplify our email offerings and clearly define HVE’s purpose within the Microsoft 365 ecosystem.” This move may also help Microsoft draw clearer boundaries for support and compliance scalability, and ensure that security controls for outbound messaging meet constantly evolving standards.
Other Key Adjustments: Limits, Rates, and Account Provisioning
Further updates will be welcomed by IT departments tasked with managing internal communications at scale. Firstly, Microsoft is raising the hard limit on the number of supported HVE accounts per tenant—from initial pilot restrictions up to 100 HVE accounts. Secondly, the recipient rate limits that previously throttled the number of emails per unit time have been removed for internal messages sent via HVE. Both of these changes are positioned as ways to make HVE more usable for legitimate, high-volume internal broadcast scenarios. For organizations with large workforces or complex notification requirements, these lifted limits may reduce operational friction and the need for workarounds.Critical Analysis: Security, Usability, and The Path Forward
Security Ramifications: Extending Basic Authentication
The primary criticism of extending Basic Authentication support centers on security. Leading industry analysts remain unified in their assessment: Basic Authentication represents a material risk to organizational security postures, largely due to weak credential transmission and the prevalence of automated attacks. Microsoft itself has outlined in multiple security whitepapers and support articles that attackers regularly exploit basic auth endpoints for “password spray” and “brute-force” campaigns.By extending basic auth support until 2028, Microsoft risks enabling a "security debt" whereby less proactive organizations postpone critical upgrades even longer. Some top information security specialists argue that “extensions like these create inertia and increase the long-tail of at-risk environments,” while defenders of the move, including some enterprise IT managers, counter that forced, poorly planned migration efforts can break mission-critical legacy workflows. In such environments—especially healthcare, government, and manufacturing—custom software developed years ago may not be OAuth-compatible without significant refactoring.
Microsoft’s position aims to strike a balance, explicitly “encouraging anyone concerned to get switched over to modern authentication as soon as possible to boost their security,” while conceding that the scale and complexity of the installed base preclude an outright mandate in the immediate future.
Operational Impact: Removal of External Sending from HVE
Moving external high-volume communications out of the main Microsoft 365 channel and into Azure Communication Services will have direct and indirect effects on customers.- For smaller businesses and non-profits: The need to adopt and potentially license a separate service for what may be occasional bulk external mailings represents new cost and integration considerations.
- For regulated or compliance-focused industries: The clearer delineation of “internal” versus “external” messaging could help with reporting, audit, and access controls, reducing unintentional data leakage or cross-tenant misdelivery.
- For ISVs and MSPs: Those who have built tools or workflows around broad use of HVE for both internal and external recipients will need to adapt. There may be a temporary spike in demand for migration tooling, integration consulting, and compliance analysis as customers scramble to adjust ahead of any hard cutover dates.
Usability Enhancements: Higher HVE Account Limits & No Internal Rate Limits
With expanded HVE account provisioning and the removal of internal rate limits, orchestrating bulk communications within organizations—such as urgent safety alerts, benefit notifications, or IT policy updates—becomes logistically simpler. Overprovisioning bottlenecks historically forced administrators to either stagger messages or develop complex conditional logic to ensure delivery without triggering limits. This friction is significantly reduced under the new model.Whether this will result in unintended consequences (such as increased “notification fatigue” among end-users, or the risk of internal spamming) is an open question. Administrators are advised to pair newly enhanced delivery flexibility with robust governance and auditing practices, leveraging DLP (Data Loss Prevention), mail flow rules, and monitored distribution lists.
Migration Path: Azure Communication Services for External Delivery
Microsoft’s recommendation to use Azure Communication Services for external high-volume email is not without its critiques. ACS is technically robust, built with compliance and deliverability in mind, and supports modern authentication out-of-the-box. However, migrating existing HVE workflows—especially those interleaved with on-premises or legacy cloud setups—to ACS will require integration effort, possible staff retraining, and additional ongoing expense.Furthermore, ACS is a separately billed Azure service, whereas HVE usage within Microsoft 365 was bundled at no extra cost for internal traffic. Organizations with tight IT budgets or fixed licensing agreements may need to reevaluate cost projections and vendor management strategies. Security-wise, however, this does provide a firmer assurance that modern auth and improved monitoring will be part of every external high-volume interaction, presumably leading to fewer exposure points for bulk phishing or outbound spam.
Independent Verification and Conflicting Reports
To ensure the accuracy of these developments, we cross-checked Microsoft’s public roadmap, updated support documents, and multiple independent news reports including Neowin, ZDNet, and Microsoft Learn documentation on HVE, Basic Authentication deprecation, and ACS Email.All sources corroborate the headline points:
- Basic Authentication for HVE will remain supported through September 2028.
- HVE will no longer permit sending to external recipients, becoming an internal-only feature within Microsoft 365 tenants.
- Administrators are urged to transition bulk external delivery to Azure Communication Services for enhanced security and compliance.
- Increases in the number of supported HVE accounts and the removal of internal recipient caps are officially confirmed.
Best Practices for Organizations Adapting to these Changes
1. Assess Legacy Dependencies Urgently
Organizations relying on HVE—especially for external communications—should undertake a comprehensive audit of their current workflows. Identify any applications, scripts, or integrations relying on HVE with Basic Authentication and document all dependencies.2. Accelerate Modern Authentication Adoption
While Microsoft has delayed the Basic Auth cutoff, the security landscape continues to shift rapidly. Begin testing and pilot migrations to OAuth or certificate-based auth for any in-house or third-party tools that can support it. Track Microsoft 365 roadmap updates and subscribe to service health advisories.3. Plan and Budget for Azure Communication Services
For scenarios where bulk outbound email to external recipients remains business-critical, initiate planning and budgeting for a transition to ACS Email. Reach out to your account manager for volume-based pricing and technical workshops to identify integration gaps early.4. Update Internal Communication Policies
With the recipient rate limits on HVE lifted, review and update internal approval workflows for mass communications. Consider implementing secondary reviews or governance-based “throttles” to avoid overwhelming users with unnecessary broadcast email.5. Engage with Microsoft and Community Forums
Microsoft provides regular updates through the Microsoft 365 Message Center, Tech Community, and main documentation sites. Engage with these channels, as well as third-party forums such as WindowsForum.com and Neowin, to keep abreast of real-world migration strategies and edge-case scenarios.Conclusion: Strategic Flexibility with Measured Caution
Microsoft's recalibration of HVE capabilities in Microsoft 365, including the extension of Basic Authentication support and the pivot to internal-only use, is both a nod to the practical realities of enterprise IT and a subtle push for organizations to modernize. While the longer runway should alleviate short-term migration pain, it also extends exposure to the risks inherent in legacy security protocols.Ultimately, the responsibility for timely and secure modernization rests with organizational IT leadership. Those who successfully navigate this transition—embracing secure authentication, modern outbound delivery services, and evolving governance practices—stand to benefit from both the flexibility and security a cloud-first, modern email strategy provides.
The clear takeaway for every Microsoft 365 customer is to regard this reprieve not as an indefinite extension, but as a final window for strategic transition. Organizations that move quickly and deliberately now will likely avoid rushed, reactive migrations in the years ahead—and place themselves on firmer security footing for whatever comes next in the Microsoft 365 ecosystem.