table of contents
are you looking for a talent to recruit?

discover how we help you!

A quiet forwarding rule can move sensitive mail out of your tenant in seconds. That makes Microsoft 365 mail forwarding one of the easiest places for attackers, careless admins, and well-meaning users to create risk.

The hard part is that forwarding can hide in more than one place. You need to check mailbox settings, inbox rules, mail flow rules, and audit logs together, or you may miss the real path.

Table of contents

Why Microsoft 365 mail forwarding is a real risk

Forwarding is popular because it feels harmless. Someone wants mail in a personal inbox, a shared mailbox, or a new vendor system, so they add a rule and move on.

That convenience is the problem. Attackers love forwarding because it gives them a quiet copy of email, often including password resets, invoice threads, and internal alerts. Microsoft documents this in its guide on identifying who modified mailbox rules, which is a good starting point when you need to trace a change back to a person or event.

If forwarding reaches an external mailbox, treat it like an unapproved data path until you confirm the owner, purpose, and destination.

You should also watch for mail flow rules. Microsoft explains how to manage mail flow rules in Exchange Online, and those rules can route or rewrite mail outside normal mailbox settings.

Tools and access you’ll need before you audit

As of 2026, the main places to check are still the Exchange admin center, Microsoft 365 Defender, and Microsoft Purview. You need the right roles before you start, or you will only see part of the picture.

Modern illustration of an IT admin at a workspace with a laptop screen showing the blurred Microsoft 365 Exchange admin center focused on mail flow rules list, desk with coffee mug and notebook, clean design with green accents.

The table below shows the core review points.

Check pointWhere to lookWhy it matters
Mailbox forwardingMicrosoft 365 admin center, user mailbox settingsReveals direct forwarding to an external address
Inbox rulesOutlook on the web, Exchange Online PowerShellCatches hidden forwards, redirects, and move rules
Mail flow rulesExchange admin centerFinds tenant-wide rules that send mail out of the org
Audit logMicrosoft Purview AuditShows who changed a rule and when
Outbound forwarding policyMicrosoft 365 DefenderConfirms whether external auto-forwarding is allowed

If you need a bulk first pass, PowerShell is still the fastest route. Scripts such as Identify and Block External Email Forwarding Using PowerShell can help you find risky patterns across many mailboxes.

A practical audit workflow for admins

Start with the most direct path, then move outward. That keeps the review fast and makes it easier to explain later.

Modern illustration of a flowchart depicting the steps to audit Microsoft 365 mail forwarding rules, including connecting to Exchange Online PowerShell, retrieving inbox rules, filtering for forwards, reviewing external targets, and blocking risky ones. Features clean shapes, controlled colors with green accents on arrows, horizontal landscape composition, no text or people.
  1. List mailboxes with forwarding enabled. Check for any mailbox that sends mail to another address, especially outside your tenant.
  2. Review inbox rules for forward, redirect, or hidden actions. Get-InboxRule can expose rules that users do not see easily in Outlook.
  3. Check mail flow rules and remote domain settings. These can allow or block external forwarding at the tenant level.
  4. Search the audit log for rule creation or edits. Compare the timestamp with sign-in logs, password changes, and help desk tickets.
  5. Confirm the business reason. If nobody owns the rule, disable it first and ask questions second.

Microsoft 365 alerts can also help. Keep an eye on alert names like Creation of forwarding/redirect rule and Suspicious Email Forwarding Activity. They often show the difference between a normal admin change and a hidden attack.

Which forwarding rules to keep, block, or investigate

Not every forward is bad. Some are legitimate, but they need a clear owner and a documented reason.

Modern illustration featuring icons for Microsoft 365 mail forwarding risks like external email arrows, multiple forwards, hidden rules, and unlimited recipients, arranged in a clean checklist layout on a light background.

Use this simple filter:

  • Keep it if the destination is internal, the owner can explain it, and the rule is tied to a real process.
  • Block it if it forwards to a personal mailbox, an unknown external address, or a domain you do not trust.
  • Investigate it if the rule appeared after a suspicious sign-in, a password reset, or a help desk scam.
  • Escalate it if mail is missing, alerts are firing, or the rule hides mail instead of forwarding it.

That last point matters. Some rules do not forward messages at all. They move them to deleted items, archive folders, or obscure subfolders. Those rules can be just as damaging, because they hide evidence and delay response.

If your team wants a second set of eyes on forwarding risk across tenants, Book a Discovery Call with Bud Consulting.

FAQs

How often should Microsoft 365 mail forwarding be audited?

Monthly is a good baseline. High-risk tenants, regulated teams, and recent incident survivors should review forwarding weekly.

What is the difference between mailbox forwarding and inbox rules?

Mailbox forwarding happens at the mailbox level and sends mail elsewhere. Inbox rules live inside the mailbox and can forward, redirect, move, or hide messages. Audit both.

Can Microsoft 365 block external forwarding?

Yes. Microsoft 365 Defender outbound spam policies can block or restrict automatic external forwarding, and Exchange settings can limit which remote domains are allowed.

What should I do first if I find suspicious forwarding?

Disable the rule, preserve the audit evidence, check recent sign-ins, and review whether other mailbox settings changed at the same time.

A forwarding rule is small, but the damage can be large. The safest audit looks at the mailbox, the inbox, the transport layer, and the audit trail together.

If those four pieces do not match, treat the rule as a risk until proven otherwise.

post tags :

Leave A Comment