
Do you have questions about migrating to Exchange Server SE?
Contact us. We’ll be happy to support you.
Do you have questions about migrating to Exchange Server SE?
Contact us. We’ll be happy to support you.
Microsoft has broadly activated its transport enforcement system in Exchange Online (EXO). Emails sent from outdated or unpatched on premises Exchange Servers to Exchange Online are now first throttled and subsequently blocked. This behavior is visible, among other places, in the new Mail Flow Report in the Exchange Admin Center (EAC). For affected organizations, there is no realistic alternative to a rapid move to Exchange Server Subscription Edition (SE).
In this blog post, you’ll learn about the technical background, how to check whether your organization is affected using the new Mail Flow Report, and what concrete steps you should take now.
For some time now, Microsoft has been protecting Exchange Online with a transport based enforcement system. This system evaluates incoming connections from on premises Exchange Servers based on their support status and patch level. Servers that are out of support or significantly behind on updates are classified as persistently vulnerable.
Mail flow from these sources is initially throttled and, if remediation does not occur, ultimately blocked. The background is Microsoft’s Zero Trust strategy and the well documented risks associated with unpatched systems.
Important: Microsoft has gradually expanded the rollout and explicitly states that throttling and blocking can now apply to all Exchange versions, including Exchange Server 2019, if they are significantly outdated (for example, missing CUs or SUs).
Microsoft’s goal is not to disrupt legitimate email traffic, but to prevent insecure connections into the cloud and to enable administrators to remediate vulnerabilities.
Analysis is handled conveniently in the new Exchange Admin Center (EAC) under Reports → Mail flow. These Mail Flow Reports provide visibility into trends and help identify delivery issues. For this topic, the most relevant report is “Out of date connecting on premises Exchange servers.” It shows which on premises servers (including version and patch level) are being captured by the enforcement logic and to what extent throttling or blocking is applied.
How to access it:
When a persistently vulnerable Exchange Server sends mail to EXO, the system responds with progressively stricter measures:
If you are under immediate operational pressure (for example, due to critical business processes or migration windows), enforcement can be paused per tenant for up to 90 days per calendar year, either in one block or split into multiple periods. Important: Unused days from a requested pause are not refunded.
Two ways to pause enforcement:
This pause is not a substitute for an upgrade; it simply gives you time to reach a supported state in a controlled manner.
In light of the enforcement measures and end of support risks, Microsoft clearly recommends moving to Exchange Server Subscription Edition (SE). SE is the evergreen generation of Exchange Server under the Modern Lifecycle Policy, with no fixed end date, as long as the system remains up to date.
Microsoft has refined the roadmap and upgrade approach multiple times, including milestones such as Exchange 2019 CU15 as a bridge, SE RTM, SE CU1/CU2, and clear coexistence rules.
Microsoft documents this in detail in the SE upgrade guide on Microsoft Learn and in TechCommunity post, including coexistence restrictions (e.g., no coexistence with Exchange 2013) and best practices.
The transport enforcement system is active and is already throttling and blocking emails from outdated on premises Exchange Servers to Exchange Online. Check your Mail Flow Reports in the EAC immediately.
Use the maximum 90 day enforcement pause only to implement remediation promptly, not as a long term solution.
Plan the migration to Exchange Server SE as a top priority:
Further information and indepth guidance can be found in Microsoft Learn (including “Upgrading to Exchange Server Subscription Edition (SE)”) and in Microsoft TechCommunity posts (including “Throttling and Blocking Email from Persistently Vulnerable Exchange Servers to Exchange Online”).

Contact us. We’ll be happy to support you.
Contact us. We’ll be happy to support you.