Microsoft is moving to strictly limit outbound email sent from the shared .onmicrosoft.com tenant namespace — commonly called MOERA (Microsoft Online Email Routing Address) — introducing a hard cap that will throttle messages sent from onmicrosoft.com addresses to 100 external recipients per organization in any 24‑hour rolling window, and rolling enforcement out in staged phases beginning with trial tenants on October 15, 2025. y Microsoft 365 tenant receives a default domain that looks like companyname.onmicrosoft.com. That domain was designed for rapid provisioning, testing, and early-stage configuration, not as a production sending identity. Over the years many organizations continued to use their onmicrosoft.com mailbox addresses in production — and attackers repeatedly abused newly created tenants that relied on the shared namespace, causing systemic reputation damage for the entire onmicrosoft.com space. Microsoft’s new policy is a direct attempt to stop that abuse and protect deliverability for legitimate senders.
This policy — whichther Exchange Online outbound and external‑recipient rate controls — is explicitly targeted at the shared onmicrosoft.com namespace. It does not replace tenant‑ or mailbox‑level rate limits already in the Exchange family of protections, but it adds a very low quota specifically for MOERA addresses to make abuse economically and operationally unattractive.
Microsoft’s MOERA throttling directly increases the operational cost and risk of using throwaway tenants for malicious campaigns, nudging organizations toward verified, company‑owned domains where administrators can maintain proper authentication and reputation controls (SPF, DKIM, DMARC). The policy also reduces the noise security teams face from external alerts triggered by onmicrosoft.com‑based abuse.
Administrators should treat MOERA migration as a short, high‑priority program: inventory senders now, validate a custom domain, migrate primary SMTP addresses in a staged manner, and monitor DMARC and the Exchange Admin Center. Where high‑volume external sending is needed, move that traffic to a purpose‑built platform rather than trying to bend Exchange Online’s mailbox model around bulk use cases.
Microsoft’s message is unambiguous: treat onmicrosoft.com as a testing and tenancy namespace, not a production sending domain. The timing and specifics of Microsoft’s MOERA throttling give administrators a clear window to act — and the cost of inaction is immediate and measurable: bounced outbound mail and disrupted business processes.
Source: Petri IT Knowledgebase Microsoft Restricts onmicrosoft.com Email Use in Exchange Online
This policy — whichther Exchange Online outbound and external‑recipient rate controls — is explicitly targeted at the shared onmicrosoft.com namespace. It does not replace tenant‑ or mailbox‑level rate limits already in the Exchange family of protections, but it adds a very low quota specifically for MOERA addresses to make abuse economically and operationally unattractive.
What Microsoft is changing — the
The new MOERA throttle: the hard facts
- Limit: Mail sent from any address in the .onmicrosoft.com namespace will be restricted to 100 external recipients per organization per 24‑hour rolling window. Internal mail (i.e., messages delivered to recipients inside the same tenant) is not counted against this cap.
- How recipients are counted: Recipient counts are calcun*. That means distribution lists, nested groups, and any expansion that increases the number of external recipients will count against the 100‑recipient cap. A single send to a list that expands to 200 external addresses will consume 200 recipient credits.
- Failure mode / error code: When a tenant exceeds the MOERA cap, outgoing atcipients from onmicrosoft.com addresses will be rejected and the sender will receive a non‑delivery report (NDR) with SMTP error code 550 5.7.236 until the rolling window moves past the offending sends.
Rollout timeline and tenant sizes
Microsoft is staging enforcement by tenant size (Exchange seat counts), with Message d one month before each stage. The publicized enforcement calendar begins with trials and small tenants and continues through large enterprise tenants:- Trial tenants: enforcement begins October 15, 2025.
- Tenants with fewer than 3 seats: enforcement begins December 1, 2025.
- The staged rollout continues in waves and reaches very large teats) by June 1, 2026. Administrators will receive Message Center notificati month before their tenant’s enforcement window.
ng this — the rationale
Shared default domains present a classic anti‑abuse problem: creating trial tenants or temporary tenants is cheap and easy, and attackers can weaponize a fnant to send bulk spam or phishing messages with minimal upfront friction. Because the onmicrosoft.com namespace is shared, successful abuse reduces the reputation of the entire namespace and causes collateral deliverability damage to legitimate tenants that continue to use MOERA identities for production mail.Microsoft’s MOERA throttling directly increases the operational cost and risk of using throwaway tenants for malicious campaigns, nudging organizations toward verified, company‑owned domains where administrators can maintain proper authentication and reputation controls (SPF, DKIM, DMARC). The policy also reduces the noise security teams face from external alerts triggered by onmicrosoft.com‑based abuse.
Who is affected — practical impact
Beneficiaries
- Organizations already using a verified custom domain for production mail should see minimal direct impact, provided their outbound mail does not use onmicrosoft a custom domain enables full control over DKIM/SPF/DMARC and avoids the MOERA quota.
At‑risk groups
- Small businesses, nonprofits, hobbyist projects, and trial tenants that never set up a custom domain and rely on onmicrosoft.com for day‑to‑day sending will be directly impacted. Once a tenant using MOERA identities exceeds 100 n 24 hours, outbound messages to external recipients will bounce until the quota window clears.
- Applications, automation, and third‑party services that are hard‑coded to send from @yourtenant.onmicrosoft.com addresses (service accounts, monitoring alerts, support ticket emailers, embedded OTP systems) will fail if they send to more than 100 external recipients i Administrators who use distribution lists, nested groups, or connectors that expand recipients post‑send are particularly vulnerable because expansion counts toward the quota and can unexpectedly exhaust the 100 recipients.
Hybrid and edge cases
Organizations with hybrid setups, leomplex routing should be careful: the MOERA policy counts recipients destined to domains not on the tenant’s accepted domain list, regardless of the routing path. Hybrid mail flow that ultimately delivers externally can be counteuld test flows and review connector behavior to determine how expansion and routing are accounted for.Operational consequences and migration pain points
Shifting away from onmicrosoft.com in production is straightforward in principle but touches many moving parts. Expect the following operational work:- Primary SMTP / UPN changes: Updating mailboxes so that a custom domain is the primary SMTP address may require alignes (UPN). Changing UPNs can force re‑authentication on devices, affect OneDrive profiles, and require users to update credentials in apps. Plan for friction and a post‑cutover support window.
- Applications & connectors: Scripts, SMTP connectors, third‑party services, and in‑app mailers that send from onmicrosoft.com must be reconfigured to use the custom domain. Where reconfiguration isn’t possible, route those flows through authenticated connectors or a dedicated transactional email service.
- Authentication and deliverability: lity when moving to a new domain, publish and verify SPF, enable DKIM signing for the domain, and implement DMARC in a phased manner (p=none → quarantine → reject). Leaving these incomplete will create deliverability issues after migration.
- Distribution list auditing: Because recipients are c a single send to a complex distribution list can consume the entire 100‑recipient quota. Split lists, move external recipients into a marketing platform, or switch high‑volume sends to an ESP.
A practical 30/60/90 migration plan
Organizations should treat MOERA migration as a short, discrete program. Below administrators can adopt immediately.- 0–30 days (Immediate)
- Audit all senders that use @*.onmicrosoft.com addresses: mailboxes, shared mailboxes, service accounts, connectors, scheduled tasks, and applications. Use Exchange Admin Center and PowerShell reports to locnal senders.
- Acquire and validate a custom domain in Microsoft 365 / Entra. Add the domain and complete DNS verification records.
- Communicate the plan to stakeholders and schedule pilot windows.
- 30–60 days (Plan & Test)
- Pilot migration with a representative set of users and automation. Update primary SMTP addresses and, where needed, align UPNs to avoid login confusion. Test OneDrive/Teams sign‑in behavior post‑change.
- Pub DKIM for the custom domain; start DMARC in p=none and monitor aggregate reports for anomalies.
- Reconfigure connectorices to use the custom domain or authenticated relay.
- 60–90+ days ( - Complete the migration and retain onmicrosoft.com addresses only as secondary aliases when necessary for legacy logins.
- Monitor Exchange Admin Center, Message Center, and DMARC reports for deliverability issues. Consider moving hids to a specialist ESP or Azure Communication Services for Email.
Alternatives for legitimate high‑volume sending
Notould or needs to send high volumes from Exchange Online mailboxes. Consider dedicated or purpose‑built pommunication Services (Email):** Microsoft’s recommended path for high‑volume transactional and B2C messaging when you need first‑party Microsoft platform support.- Dedicated ESPs (SendGrid, Mailgun, Amazon SES, SparkPost, etc.): These services provide reputation management, deliverability tooling, and analytics optimized for marketing and transactional vol Online High Volume Email (HVE):** For internal bulk and large‑scale internal message needs, HVE preview features provide a mailbox type and reporting that are better suited to internal high‑throughput use cases; it is not a workaround for MOERA external sending restrictions. HVE is designed for internal messaging with integrated reporting and security controls.
gths and weaknesses of Microsoft’s approach
Strengths
- Directly targets the abuse vector. By throttling the shared namespace, Microsoft raises the cost of using throwaway tenants for spam and phishie systemic reputation damage for legitimate senders.
- Encourages best practice. The policy nudges tenants to use verified custom domains and implement DKIM/SPF/DMARC, improving long‑term deliverability and brand trust.
- Surgical enforcement. The cap applies only to MOERA identities and leaves normal custom‑domain sending governed by existing controls. This reducn properly configured organizations.
Weaknesses and operational risks
- Collateral disruption for small tenants. Organizations that never set up a custom domain — including legitimate small businesses and nonprofits — risk sudden external mail failures if they exceed 100 external recipients. This is a r organizations with constrained IT capacity.
- Migration complexity. Changing primary SMTP addresses and UPNs across many users and systems is a nontrivial churn events, hard‑coded service addresses, and overlooked automation are the most common causes of post‑migration outages.
- Edge cases in counting and expansion. Because the quota counts recipients after expansion ate across sends, seemingly innocuous sends (to distribution lists or nested groups) can unexpectedly exhaust the quota. Administrators must audit and remediate list composition.
Recommended controls, checks, and quick wins for administrators
- Run an inventory script (PowerShell) to list mailboxes, service accounts, connectors, an.onmicrosoft.com addresses and log their outbound external recipient counts. Prioritize remediation by external send volume.
- Preserve onmicrosoft.com aliases as secondary addresses during cutover to reduce login breakage, migrating the primary SMTP to the custen aligning UPNs where required.
- Audit distribution groups for external membership, split lists that include many external recipients, and move marketing lists to an ESP.
- For automated flows that cannot be reconfigured to use a custom domain, route them through an authenticated SMTP connectorervice to avoid MOERA throttling.
- Monitor Message Center and set up notification alerts for tenant‑targeted notices so the IT team never misses the one‑month pre‑notice Microsoft will send before enforcement for your tenant size.
Caveats and unverifiable claims
The available reporting and communi consistent picture of Microsoft’s intentions and the technical specifics of the MOERA throttle. The enforcement dates and staged schedule cited above come from the same public advisories and ctured in the available briefings, but tenants should treat their Message Center notifications as the definitive source for their tenant’s enf Administrators should not assume the global rollout schedule is immutable; Microsoft has historically adjusted enforcement windows as they refine telemetry and operational readineeviations to the schedule, Microsoft will publish updates in Message Center and on the Microsoft Tech Community channels.Final assessment — what this means for email deliverability and enticrosoft’s MOERA throttling is a targeted, ecosystem‑level intervention designed to stop a persistent abuse vector and protect deliverability for the majority of enterprises that already use custom domains. For responsibly managed tenants, the change should be benign; for those still using onmicrosoft.com addresses for production messages, the change is consequential and requires immediate action.
The policy’s strength is that it applies a simple, low cap to a shared namespace that has chronically attracted abuse. The risk is concentrated on small tenants and the numerous automation paths that organizations historically used on the default MOERA identity. The real value for administrators is that this change provides a clear deadline for completing a migration to a verified domain and implementing robust authentication practices — actions that improve security and deliverability for the long term.Administrators should treat MOERA migration as a short, high‑priority program: inventory senders now, validate a custom domain, migrate primary SMTP addresses in a staged manner, and monitor DMARC and the Exchange Admin Center. Where high‑volume external sending is needed, move that traffic to a purpose‑built platform rather than trying to bend Exchange Online’s mailbox model around bulk use cases.
Microsoft’s message is unambiguous: treat onmicrosoft.com as a testing and tenancy namespace, not a production sending domain. The timing and specifics of Microsoft’s MOERA throttling give administrators a clear window to act — and the cost of inaction is immediate and measurable: bounced outbound mail and disrupted business processes.
Source: Petri IT Knowledgebase Microsoft Restricts onmicrosoft.com Email Use in Exchange Online