This is a setup recommendations article for the Authenticated SMTP Connector EAP (outbound version) for use with Microsoft cloud-based email services. If these do not work for you, you may need to open a ticket with Microsoft for more specific recommendations.
What we refer to as the “outbound” portion SMTP Relay is compatible with Exchange/Outlook 365. However, MS email services do not appear to allow the addition of SMTP AUTH credentials with what we’d consider to be the “inbound” half of the SMTP Relay.
Accounts wishing to use Microsoft cloud-based email services should employ the version of the feature described in this setup article, which allows for standard auto-forwarding into Zendesk (see last paragraph) but can create an authenticated connection for outbound sending.
Prior to setup in Zendesk, you’ll need to enable SMTP AUTH for the address in Outlook. See Enable SMTP AUTH for specific mailboxes for more info. This is likely a missing step for many customers, and you may need to work with your Office 365 Admins to enable the setting.
The following example details come from How to set up SMTP AUTH client submission:
Device or Application setting | Value |
Server/smart host | smtp.office365.com |
Port | Port 587 (recommended) or port 25 |
Username/email address and password | Enter the sign-in credentials of the hosted mailbox being used |
Another consideration is an administrative page in Microsoft cloud-based email services that should be examined. It is called "Block access for unknown or unsupported device platform." Even though you may have enabled SMTP AUTH, that alone might not automatically allow you to use this integration. You may want to ensure that Linux is not excluded from access as a device platform:
In addition to enabling the feature for outbound from Zendesk, you must set up auto-forwarding into Zendesk so that both the initial support requests and ticket updates can be forwarded to Zendesk for the purpose of creating and updating tickets.
Setting up only the outbound portion of an existing address is not possible. You must delete the existing address and follow the setup process to establish the outbound connection. This MS article describes that process, though we have received feedback that Microsoft might also require the enabling of an outbound spam policy rule before auto-forwarding will function correctly. If we are able to obtain more specific information about that spam policy we will post it here.
0 comments