Exchange Online Incident: When URL Filtering Rules Go Wrong
Microsoft is currently investigating a widespread Exchange Online disruption that began on February 5, 2026, where legitimate emails are being mistakenly flagged as phishing attempts and quarantined. This incident highlights the delicate balance between security heuristics and false positives in enterprise email filtering.
What Happened
Exchange Online relies on a layered defense model:
- Content scanning (keywords, attachments, payloads)
- URL reputation checks (real-time lookups against threat intelligence feeds)
- Machine learning classifiers (patterns of sender behavior, message metadata)
In this case, a newly deployed URL rule—intended to catch increasingly sophisticated phishing campaigns—has backfired. The rule incorrectly categorizes certain benign URLs as malicious, causing entire emails to be quarantined.
Microsoft confirmed that:
- The rule was part of an adaptive filtering update to strengthen detection against evolving spam/phishing tactics.
- The misclassification is systemic, not isolated to a single tenant or region.
- Impacted users are unable to send or receive affected emails until remediation occurs.
Why URL Rules Are Tricky
URL-based detection is one of the most volatile components of modern email security. Attackers frequently use:
- Redirect chains (legitimate domains masking malicious endpoints)
- Compromised but reputable sites (e.g., hacked WordPress blogs)
- Dynamic shorteners and obfuscation (Bitly, custom redirects)
To counter this, Microsoft continuously updates its Safe Links and Advanced Threat Protection (ATP) policies. However, overly aggressive rules can lead to false positives, especially when legitimate services share characteristics with malicious ones.
Microsoft’s Response
As of now, Microsoft has:
- Classified the issue as a service incident (meaning noticeable user impact).
- Begun releasing quarantined emails back into inboxes.
- Started reviewing and unblocking legitimate URLs from the faulty rule set.
- Promised to provide an estimated resolution timeline once remediation is confirmed.
Some users have already reported seeing previously quarantined messages successfully delivered, but full remediation is still pending.
Historical Context
This is not the first time Exchange Online has faced similar challenges:
- March 2025: An anti-spam bug quarantined legitimate emails.
- May 2025: A machine learning model incorrectly flagged Gmail-originated emails as spam.
These recurring incidents underscore the trade-off between precision and recall in email security. Tightening filters reduces risk but increases false positives; loosening them improves usability but risks exposure.
Takeaway for IT Admins
While Microsoft works on remediation, administrators should:
- Monitor the Microsoft 365 Service Health Dashboard for updates.
- Advise users to check their Quarantine portal for missing emails.
- Consider temporary adjustments to Safe Links policies if business-critical URLs are being blocked.
- Document the incident’s impact for compliance and audit purposes.
Final Thoughts
This Exchange Online incident is a textbook example of how security automation can inadvertently disrupt productivity. As phishing campaigns grow more sophisticated, the margin for error in detection systems narrows. The challenge for Microsoft—and for all enterprise security vendors—is to evolve defenses without undermining trust in the very communication channels they protect.
Follow Us On – X.com, Telegram, LinkedIN, Discord Server,
For The Latest Updates, Vulnerability Insights, Security News, Cyberattack Scoops And Cybersecurity Best Practices Delivered Straight To Your Inbox – Subscribe To Our Newsletter