Security teams face four primary challenges when relying on native M365 protections: configuration complexity, Direct Send vulnerabilities, authentication failures, and advanced evasion techniques.
Configuration complexity remains a significant hurdle. Many protective features require manual enablement and ongoing tuning. Organizations that assume default settings provide comprehensive protection often discover gaps when targeted by sophisticated attacks.
Direct Send vulnerabilities represent a particularly concerning gap. This Microsoft feature allows emails to be sent directly to mailboxes without authentication, bypassing both third-party SEGs and many EOP protections. As Jesus Garcia, Solutions Architect at Abnormal, explained in the webinar: "The Microsoft tenant is configured to accept emails via this smart host. Direct send traffic never gets inspected by the third party secure email gateway." What makes this vulnerability especially dangerous is the low barrier to exploitation. Attackers only need a target's email address to derive the predictable smart host format and weaponize it using PowerShell or Python scripts.
Some organizations attempt to address Direct Send risks manually. Garcia noted that security teams share workarounds on forums, creating transport rules and PowerShell commands to block Direct Send traffic. While these DIY approaches can help, they require ongoing maintenance and may break legitimate use cases. Manual rules also lack the contextual awareness to distinguish between malicious Direct Send abuse and legitimate internal traffic.
Authentication failures present another challenge. When SPF and DMARC checks fail but mail still delivers, it indicates misconfigured policies or legitimate use cases that create security blind spots. Attackers specifically target these authentication gaps.
Advanced evasion techniques continue evolving. Native tools may struggle with sophisticated BEC attacks, credential phishing campaigns, and emerging threats like QR code attacks. Traditional URL analysis tools cannot interact with CAPTCHAs that hide malicious payloads from automated scanning.