Updated February 4, 2026: We have updated the content. Thank you for your patience.
Original: Please do not paste images here. Attach your high-resolution PNGs to the No Reply confirmation email. Thank you!
We are reiterating the guidance for connector settings to ensure customers are using healthy configurations. The key problematic configurations we are seeing are:
- When a tenant has an Inbound connector of type OnPremises and the connector does certificate-based authentication using a certificate with a subject/SAN for a domain that is NOT an Accepted Domain of the tenant.
- When a tenant has an Inbound connector of type OnPremises and the connector does IP-based authentication, but the IP is used by other tenants On-Premises servers to connect to Exchange Online.
These anti-patterns typically occur when you are using a 3rd party service to relay email through Exchange Online but could also occur if your organization has a single on-premises Exchange Server connecting to multiple Exchange Online tenants.
These configurations can cause incorrect mail flow because Exchange Online is a multi tenant service and relies on message attribution to determine which tenant an incoming message belongs to. When messages are received through an Inbound connector of type OnPremises, attribution is determined using the following priority order:
- The domain on the TLS certificate presented by the sending server
- The P1 MailFrom (envelope sender) domain
- The P1 RcptTo (recipient) domain
[How this will affect your organization:]
We may perform internal changes, such as tenant moves, without notice, which can impact mail flow if a tenant has a bad connector configuration. This means a misconfigured connector that works today may unexpectedly stop working.
[What you need to do to prepare:]
If you have a single on-premises Exchange Server connecting to multiple Exchange Online tenants, your on-premises Exchange environment must use a unique client certificate to send to each unique Exchange Online tenant belonging to your organization. You must configure a unique Send Connector on-premises for each unique tenant in Exchange Online that you want to route on-premises traffic to: Send connectors in Exchange Server | Microsoft Learn. You should also prioritize configuring Inbound connectors of type OnPremises in Exchange Online to use certificate-based authentication, rather than IP based . For best performance, Exchange Online tenants Inbound connector’s should reference the unique client certificate dedicated for that connector path.
If you need to use a third-party add-on service to process email messages sent from your organization and then relay through Exchange Online, the third-party service must support a unique certificate for your organization, and the certificate domain (in Subject name or SAN) must be an accepted domain of your organization. In addition, you must update your Inbound connector of OnPremises type to use the unique certificate domain, via property TlsSenderCertificateName. An example of this scenario is your organization using a third-party CRM cloud service to send emails on behalf your organization to mailboxes of your company or other external users. To learn more, see Scenario: Integrate Exchange Online with an email add-on service.
Source: Microsoft
<<< [MC1226222] Archive
Tooltip: View earlier revisions of this post
Latest Posts
- (Updated) Prevent/Fix: Guidance for On-Premises Connectors Configuration [MC1226222]
![(Updated) Prevent/Fix: Guidance for On-Premises Connectors Configuration [MC1226222] 2 pexels sohelpatel 1804035](data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==)
- (Updated) Microsoft Teams: Chat with anyone with an email address [MC1182004]
![(Updated) Microsoft Teams: Chat with anyone with an email address [MC1182004] 3 pexels jplenio 1119973](data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==)
- Microsoft Purview compliance portal: Purview Information Protection | Classifier Simulation Mode (Health Monitoring) [MC1185445]
![Microsoft Purview compliance portal: Purview Information Protection | Classifier Simulation Mode (Health Monitoring) [MC1185445] 4 pexels stasknop 1298601](data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==)
- (Updated) Microsoft Purview | Role group changes in Microsoft Purview [MC1226226]
![(Updated) Microsoft Purview | Role group changes in Microsoft Purview [MC1226226] 5 woman 9189442 1920](data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==)
![(Updated) Prevent/Fix: Guidance for On-Premises Connectors Configuration [MC1226222] 1 (Updated) Prevent/Fix: Guidance for On-Premises Connectors Configuration [MC1226222]](https://mwpro.co.uk/wp-content/uploads/2024/08/pexels-sohelpatel-1804035-1024x683.webp)
![(Updated) Prevent/Fix: Guidance for On-Premises Connectors Configuration [MC1226222] 2 pexels sohelpatel 1804035](https://mwpro.co.uk/wp-content/uploads/2024/08/pexels-sohelpatel-1804035-150x150.webp)
![(Updated) Microsoft Teams: Chat with anyone with an email address [MC1182004] 3 pexels jplenio 1119973](https://mwpro.co.uk/wp-content/uploads/2024/08/pexels-jplenio-1119973-150x150.webp)
![Microsoft Purview compliance portal: Purview Information Protection | Classifier Simulation Mode (Health Monitoring) [MC1185445] 4 pexels stasknop 1298601](https://mwpro.co.uk/wp-content/uploads/2024/08/pexels-stasknop-1298601-150x150.webp)
![(Updated) Microsoft Purview | Role group changes in Microsoft Purview [MC1226226] 5 woman 9189442 1920](https://mwpro.co.uk/wp-content/uploads/2025/06/woman-9189442_1920-150x150.webp)