SMTP Server for Office 365: Setup Guide (2026)

Configure the SMTP server for Office 365 with correct settings, ports, OAuth, and troubleshooting. Step-by-step guide updated for 2026.

8 min readProspeo Team

SMTP Server for Office 365: Complete Setup Guide (2026)

Your Canon printer's scan-to-email stopped working last Tuesday. Nobody changed anything. The ticket says "authentication failed," and now you're hunting for the right SMTP server for Office 365 settings - buried across four different Microsoft Learn pages, two blog posts, and a deprecated TechNet article. This guide puts everything in one place.

Quick-Reference Settings

Here are your copy-paste Office 365 SMTP settings:


Server:     smtp.office365.com

Port:       587

Encryption: STARTTLS (TLS 1.2 or higher)

Auth:       Yes (username + password, or OAuth2/XOAUTH2)

Username:   your-full-email@yourdomain.com

Password:   mailbox password (or OAuth2 access token)

Decision rule: Use SMTP AUTH on port 587 for most use cases. Use SMTP Relay if you send high volume from a static IP. Use Direct Send only for internal-only delivery.

Deprecation alert: Basic auth works through December 2026 with no changes, but plan your OAuth migration now.

Full Settings Reference

Setting Value
SMTP Server smtp.office365.com
Port 587
Encryption STARTTLS
TLS Version 1.2 or 1.3
Authentication Required
Username Full email address
Password Mailbox password

The server address is always smtp.office365.com - not outlook.office365.com, not mail.protection.outlook.com. Those are different services entirely. The username is always your full Microsoft 365 email address, not a short alias or display name.

If you're configuring a shared mailbox, you'll still use the shared mailbox's full email address as the SMTP identity/from address. For OAuth, the userName field in XOAUTH2 must be the shared mailbox address, while the token is obtained on behalf of a licensed user with Send As or Send on Behalf permissions.

Bookmark this table. Every app, printer, and scanner config screen asks for these same six fields.

Which Sending Method Should You Use?

Microsoft supports three distinct methods for sending email through Office 365. They look similar but behave very differently.

Feature SMTP AUTH SMTP Relay Direct Send
Port 587 (or 25) 25 25
TLS Required Yes Optional Optional
Authentication User/pass or OAuth2 Static IP (or TLS cert) None
Send External Yes Yes No
Saves to Sent Yes No No
3rd-Party Host Yes No Yes (with SPF)
Daily Limit 10K recipients/day "Reasonable" Standard throttle

If your device or application authenticates with credentials and needs to send externally, SMTP AUTH is the answer. It's the most flexible option and the only one that saves messages to the Sent Items folder.

For high-volume sending from a server with a static public IP - think transactional emails from an ERP system - SMTP Relay avoids mailbox-based client submission throttling. You'll configure an inbound connector in Exchange Online instead of using credentials.

Direct Send sounds appealing but is a trap for most use cases. It only delivers to internal Microsoft 365 recipients. No external delivery. No Sent Items. No authentication. The moment someone asks "why didn't the client get that email?" you'll regret choosing it.

For the vast majority of printer, scanner, and application configurations, client submission on port 587 is what you want.

How to Enable SMTP AUTH

Microsoft disables SMTP AUTH by default for tenants created after January 2020. This single setting is responsible for more wasted sysadmin hours than any other Exchange Online config, because the error message doesn't say "SMTP AUTH is disabled." It says "authentication unsuccessful," which sends you down a password-reset rabbit hole that leads nowhere.

Security Defaults Warning

Here's the thing: if Entra ID Security Defaults are enabled for your tenant, SMTP AUTH is dead regardless of every other setting on this page. Security Defaults blocks legacy authentication protocols entirely. You'll need to either disable Security Defaults (not recommended) or migrate to OAuth. There's no workaround that preserves both.

Admin Center (Org-Wide)

Navigate to the Exchange admin center: Settings > Mail flow. Look for the toggle labeled "Turn off SMTP AUTH protocol for your organization." If it's on, SMTP AUTH is disabled org-wide. Toggle it off to enable.

We've found the per-mailbox approach causes fewer support tickets than enabling SMTP AUTH org-wide. Microsoft agrees - their own recommendation is to keep it disabled org-wide and enable it only for specific mailboxes.

In the Microsoft 365 admin center:

  1. Go to Users > Active users
  2. Select the user or service account
  3. Click Mail > Manage email apps
  4. Check Authenticated SMTP

PowerShell Commands

For org-wide control:

# Enable SMTP AUTH org-wide
Set-TransportConfig -SmtpClientAuthenticationDisabled $false

# Verify current setting
Get-TransportConfig | Format-List SmtpClientAuthenticationDisabled

For per-mailbox overrides:

# Enable for a specific mailbox
Set-CASMailbox -Identity user@domain.com -SmtpClientAuthenticationDisabled $false

# Verify
Get-CASMailbox -Identity user@domain.com | Format-List SmtpClientAuthenticationDisabled

Setting the value to $null makes the mailbox inherit the org-wide setting.

Prospeo

Hitting Office 365's 10,000 recipient daily limit? Every bounce to an invalid address wastes quota and damages your domain reputation. Prospeo's 5-step email verification catches bad addresses before they hit your SMTP pipeline - 98% accuracy, spam-trap removal, and catch-all domain handling included.

Stop wasting SMTP sends on dead addresses. Verify your list first.

Rate Limits and Throttling

Outdated information about Office 365 sending limits is everywhere. Here's what actually applies in 2026.

Limit Value Behavior
Recipients per day 10,000 Rolling 24-hour window
Messages per minute 30 Excess throttled, carried into subsequent minutes
Recipients per message Up to 1,000 Tenant-configurable ceiling

The 30 messages/minute limit is a throttle, not a wall - excess messages get carried into subsequent minutes rather than bouncing. The 10,000 recipient/day limit is harder. Exceed it and you'll get NDRs until the rolling window resets.

Organization-managed distribution lists in the GAL count as a single recipient; personal contact-folder distribution lists count each member individually.

You'll still see references to a 2,000 external recipient/day limit. Microsoft announced this in 2024 but cancelled the implementation in January 2026. It never went into effect. Any guide still citing that limit is outdated.

An Exchange Online Kiosk license runs around $2-$4/user/month. It's a cheap way to isolate your application sending from user mailboxes.

If you're hitting recipient limits on outbound campaigns, check whether bounces to invalid addresses are eating into your daily quota. Running your list through an email verification tool like Prospeo before sending reduces wasted recipients and keeps your domain reputation clean.

If you're scaling outbound, it also helps to track your email velocity so throttles don't surprise you.

Basic Auth Deprecation Timeline

Many guides cite outdated dates for SMTP AUTH Basic auth deprecation. Here's the current timeline from Microsoft's Exchange Team blog:

  1. Now through December 2026 - No change. SMTP AUTH Basic auth works exactly as it does today.
  2. End of December 2026 - Basic auth disabled by default for existing tenants. Admins can re-enable it if needed.
  3. New tenants after December 2026 - Basic auth unavailable by default. OAuth is the supported method.
  4. Second half of 2027 - Microsoft announces the final, permanent removal date.

The key detail most people miss: step 2 isn't a hard cutoff. Admins can still flip the switch back on after December 2026. It's a default change, not a removal. The actual hard removal comes later, and Microsoft hasn't committed to a specific date yet.

Stop disabling MFA on your SMTP service accounts as a workaround. It's a security liability that buys you maybe 18 months. A basic OAuth implementation takes a day. Waiting until December 2026 and scrambling takes a week - plus downtime.

OAuth for SMTP: Future-Proof Setup

OAuth replaces username/password authentication with token-based auth. Register your application in Microsoft Entra and request this scope:

https://outlook.office.com/SMTP.Send

The SMTP session uses SASL XOAUTH2 to pass the token. The token format is a base64-encoded string:

base64("user=" + userName + "\x01auth=Bearer " + accessToken + "\x01\x01")

Where \x01 is the Control+A character, hex %x01.

The SMTP protocol exchange looks like this:


C: AUTH XOAUTH2 <base64 string>

S: 235 2.7.0 Authentication successful

A failed attempt returns 535 5.7.3 Authentication unsuccessful - the same error you'd get from bad credentials, so check your token generation first.

For shared mailboxes, the OAuth token is obtained on behalf of a licensed user, but the userName field in the XOAUTH2 string must be the shared mailbox address. The user needs Send As or Send on Behalf permissions on that shared mailbox.

If you're planning a broader deliverability cleanup alongside OAuth, use an email deliverability guide to avoid fixing auth while ignoring reputation.

Printers, Scanners, and Legacy Devices

Your Canon imageRUNNER from 2018 doesn't support OAuth. That's not your fault. Here are three migration paths, ranked by effort.

Firmware update (easiest). Several major manufacturers now support OAuth via firmware: Ricoh, Canon, Kyocera, HP, Toshiba, and Lexmark all have models with OAuth-capable firmware. Check your specific model - this is the cleanest long-term fix.

On-prem SMTP relay (middle ground). Deploy hMailServer or IIS SMTP as a bridge. Your devices authenticate locally with Basic auth; the relay forwards to Microsoft 365 using a connector or OAuth. Your devices don't need to change at all, and you can manage the auth transition in one place instead of reconfiguring every MFP on every floor.

Third-party relay service (zero infrastructure). Services like SMTP2Go, SendGrid, or Mailgun offer free tiers for low volume and paid plans typically starting around $15-$35/month. Your devices point at the relay service instead of smtp.office365.com - completely decoupled from Microsoft's auth changes.

Skip the third-party relay route if you're in a regulated industry that requires all email to flow through your Microsoft 365 tenant for compliance and eDiscovery. In that case, the on-prem relay is your best bet.

Microsoft also offers Azure Communication Services Email for both internal and external delivery - worth evaluating if you're already in the Azure ecosystem.

Troubleshooting Common Errors

Before you blame Microsoft, check your own network.

Code Meaning Fix
550 5.7.30 Basic auth blocked Enable SMTP AUTH or use OAuth
535 5.7.3 Auth failed Check credentials or OAuth token
5.7.57 Client not authenticated SMTP AUTH not enabled for mailbox
421 4.7.0 Throttling/temp rejection Wait and retry; check limits

A recurring theme on r/sysadmin: relay servers send fine, but MFPs on the same network fail intermittently. We've traced this to network-level issues almost every time:

  • IDS/IPS rules - Security appliances selectively block SMTP traffic from devices with different retry behaviors than servers
  • ISP port 25 blocking - Many ISPs block outbound port 25; use port 587 with STARTTLS instead
  • TLS 1.2 support - Older devices only support TLS 1.0/1.1, which Microsoft no longer accepts

The SMTP AUTH clients report in the Exchange admin center shows which accounts are actively using SMTP AUTH and their TLS versions. It's the fastest way to identify devices that'll break when Basic auth goes away.

If you're seeing deliverability issues after you get auth working, check your email bounce rate and whether you need spam trap removal.

Prospeo

You just spent an hour configuring SMTP AUTH so your outbound campaigns actually deliver. Don't waste that effort sending to unverified addresses that spike your bounce rate. Prospeo verifies 143M+ emails at 98% accuracy - for about $0.01 each - so every message you push through smtp.office365.com reaches a real inbox.

Clean data in, clean delivery out. Start with 75 free email verifications.

FAQ

What port does Office 365 SMTP use?

Port 587 with STARTTLS encryption is the standard for SMTP AUTH client submission and works with virtually every device and application. Port 25 is used for SMTP Relay and Direct Send but is frequently blocked by ISPs - avoid it unless you have a specific relay configuration.

Can I still use a password for SMTP AUTH in 2026?

Yes. Basic auth works through December 2026 with no changes. After that, Microsoft disables it by default but admins can temporarily re-enable it. New tenants created after December 2026 won't have the option. Start your OAuth migration now to avoid scrambling.

What if my device doesn't support OAuth?

Deploy an on-prem SMTP relay like hMailServer or IIS SMTP as a bridge between your legacy device and Microsoft 365, or switch to a third-party relay like SMTP2Go or SendGrid. Azure Communication Services Email is another option for teams already in the Azure ecosystem.

How do I configure these settings in WordPress?

Install the WP Mail SMTP or Post SMTP plugin. Use smtp.office365.com, port 587, STARTTLS, and your full Microsoft 365 email as the username. The plugin routes WordPress mail through authenticated SMTP (or OAuth), which improves deliverability versus default PHP mail.

B2B Data Platform

Verified data. Real conversations.Predictable pipeline.

Build targeted lead lists, find verified emails & direct dials, and export to your outreach tools. Self-serve, no contracts.

  • Build targeted lists with 30+ search filters
  • Find verified emails & mobile numbers instantly
  • Export straight to your CRM or outreach tool
  • Free trial — 100 credits/mo, no credit card
Create Free Account100 free credits/mo · No credit card
300M+
Profiles
98%
Email Accuracy
125M+
Mobiles
~$0.01
Per Email