

We will do this based on examining recorded usage of these protocols by your tenant, and we will send Message Center posts providing 30 days notice of the change to your tenant. We plan to disable Basic Auth for these unused protocols to prevent potential mis-use.

Many customers don’t know that unneeded legacy protocols remain enabled in their tenant ( Security Defaults takes care of this for newly created tenants now). We will continue with our plan to disable Basic Auth for protocols that your tenant is not using. When we resume this program, we will provide a minimum of twelve months notice before we block the use of Basic Auth on any protocol being used in your tenant. The first change is that until further notice, we will not be disabling Basic Auth for any protocols that your tenant is using. Please read this post carefully, as there’s a lot of detail. Due to the pandemic and the effect it has on priorities and work patterns, we are announcing some important changes to our plan to disable Basic Auth in Exchange Online. We previously announced we would begin to disable Basic Auth for five Exchange Online protocols in the second half of 2021. Update: The full timeline for retirement of Basic Authentication in Exchange Online is now published in Basic Authentication Deprecation in Exchange Online – September 2022 Update.
