Exchange Online Mail Flow Decision Builder: Rules, Connectors and Sending Patterns for 2026
Exchange Online mail flow is not just about making email work. It is about deciding which messages should be trusted, blocked, routed, modified, quarantined or inspected. This guide gives you an interactive decision builder, recommended patterns for 16 real-world scenarios, a practical SMTP AUTH / HVE / Graph / ACS comparison, dangerous bypass rules to fix, connector review checklists, and the operational advice I use when reviewing mail flow in production tenants.Exchange Online Transport Rules: Real-World Patterns That Actually Work in Production
Transport rules have been in Exchange since the on-prem days. Microsoft keeps adding newer policy engines, but mail flow rules remain the workhorse for anything those engines do not cover. This article covers the baseline rules most tenants need, external sender tagging (custom vs native), disclaimers, security-focused patterns, encryption triggers, the AND/OR condition logic trap, rule priority and stop processing, where transport rules overlap with Purview DLP and Defender, PowerShell management patterns, limits and constraints, and a 14-point audit checklist.Email authentication in Exchange Online in 2026: SPF, DKIM, DMARC, MTA-STS and TLS-RPT done right
SPF, DKIM, DMARC, MTA-STS and TLS-RPT done properly for Exchange Online — the order of operations, the Exchange Online-specific gotchas, and how to get to DMARC p=reject without breaking mail flow.
Exchange Online: Migrate SMTP AUTH from Basic Auth Before It Breaks
SMTP AUTH Basic Authentication in Exchange Online is being phased out. This guide shows how to find every sender still using it, choose the right migration path, and move to OAuth, SMTP Relay, HVE, or Graph API before it breaks production.
Exchange Online High Volume Email (HVE): Configure for Internal Notifications Without Breaking Mail Flow
Exchange Online High Volume Email (HVE) helps organisations send large volumes of internal notifications without hitting standard mailbox limits. This article explains how to configure HVE correctly, avoid common authentication and Conditional Access issues, and keep mail flow under control.