Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
The Engineering Direct Portal is a new feature within the Microsoft 365 admin center designed to provide Office Engineering Direct (OED) customers with an enhanced engineering experience. This article provides an overview of the portal's features, how to access it, and its functionality.
The Engineering Direct Portal offers:
- Delivery metrics to help highlight what OED provides and how you use the service
- Insight into support tickets that have been raised to the product group
- Self-service diagnostics to empower you with immediate insights and resolutions
- Features and diagnostics suggested by our OED customers
Note
The portal is available to all OED customers and their in-scope tenants at no additional charge. Permissions are currently granted to anyone within your tenant with an RBAC (role-based access control) support role.
Accessing the Engineering Direct Portal
The Engineering Direct Portal is located under Support within the Microsoft 365 admin center. To access the portal, follow these steps:
- Navigate to the Microsoft 365 admin center.
- Select Support.
- Select Engineering Direct to enter the portal.
Overview Page
Once in the portal, you'll see the Overview page. This page contains several key elements:
- ACE Contact: If you have an Advanced Cloud Engineer (ACE) assigned, you'll see an ACE tile with primary contact information. This lists your ACE email address with a clickable option to start an email. The tile won't be visible to customers without an ACE.
- Insights: Key Metrics: This tile lists both your engineering escalations and those escalations that have been resolved for the last six months. An issue is considered an 'engineering escalation' once it has been raised to and assigned to a Microsoft Engineering team member (either through our support organization, or through your usage of the "Escalate to Engineering" feature).
- Total escalations include open or closed tickets
- Active escalations include only those tickets that are open
- Customer Advisory Board (CAB): The CAB tile will list the last and next CAB events as well as the last and next community calls. This is informational only; registrations and calendar blockers will continue to be provided separately through existing process channels.
- Insights: Escalation Trend Per Week by Status: A monthly view of escalations by open and closed for the last six months. This is a focused view of all reactive issues, filtered by all issues that have a Microsoft engineering element.
- Request A Feature: Allows you to submit feedback or a request to the Engineering Direct Portal team. Feedback can be both related to the portal itself and its functionality, and any broader engineering features you would like to see in Engineering Direct. Feature requests submitted via this method are visible to users in your private MyFeedback section of the feedback portal.
Insights Page
The Insights page provides detailed metrics, visuals, and lists on both your current engineering tickets and those that have been resolved within the last six months. This could be through support or through the "Escalate to Engineering" feature. The layout of this page might differ from the screenshot. This page contains:
Total escalation metrics – Cumulative total of tickets escalated to product groups in the last six months.
Escalate to Engineering - Cumulative total of tickets using the Escalate to Engineering feature in the last six months.
Escalations by product – Active engineering tickets to the product groups by service product.
Escalation trend per week by status – Monthly view of open or closed tickets escalated to the product groups.
Support vs. Escalate to Engineering – Visual showcasing active tickets escalated to engineering either via support or the Escalate to Engineering feature. The number in the center represents the current total active tickets.
Distribution of escalation severity – Visual of tickets escalated to the product groups by severity.
Service Requests Escalated to engineering – List view with filters of tickets that have been escalated to product groups:
- Title – support ticket title
- Created By – individual who opened the support ticket
- Ticket # – support ticket number
- Severity – ticket severity
- Escalation date – date the issue was first escalated to the product groups
- Status – status of the ticket escalated to the product groups. Status lists open or closed to start.
- Escalate to Engineering – true or false - represents whether the customer raised the issue directly to engineering
- Product – service product
Diagnostics Page
The Diagnostics page hosts diagnostic tools for self-service issue resolution within your environment.
In this section:
- Visual Mail Flow
- Validate DKIM Signing Configuration
- Auto Archive Detection
- Remediate a Compromised Account
- Audit Log Summary
- Issues with Guest Access in Teams
- Teams PSTN Calling Diagnostic
Visual Mail Flow
Visual Mail Flow enables you to examine issues related to mail flow, such as email submission, group expansion, processing by transport agents (such as AntiSpam, mail flow rules, Data Loss Prevention), and delivery.
Some common situations where Visual Mail Flow can be useful:
- Checking the delivery status of recipients
- Determining reasons for nonreceipt of emails by certain recipients
- Understanding variations in email delivery between recipients
- Identifying mail flow rules applied to an email and their actions
- Identifying Data Loss Prevention rules applied to an email and their actions
Input Requirements
To use Visual Mail Flow, you need either the email's Message ID or the Network Message ID. You can locate either the message ID or the network message ID by opening the email in question, go to File -> Properties -> Internet headers. You can parse through the headers to find either the message ID or network ID. Alternatively, you can copy/paste the entire internet header box and use a tool like Message Header Analyzer to parse this information for you.
Note
Ensure the submitted messages are within the age range of 1 to 90 days.
- Message ID: Found in the email header with the "Message-ID:" token. Users can provide this information to help investigate specific messages. Be sure to include the full message ID. This might include angle brackets (<>). Although the form varies depending on the email system, here's an example of what a message ID would look like:
<08f1e0f806a47b4ac109109ae6ef@server.domain>
. - Network Message ID: Found in the email header with the "X-MS-Exchange-Organization-Network-Message-Id:" token. An example of a network message ID is
4d4c1224-7398-4e8e-949f-ce1932c4ab9d
.
Running the Diagnostic
Enter either the Message ID or Network Message ID, then select Troubleshoot to start the diagnosis. Results are generated in approximately 30 seconds.
Understanding the Results
The Visual Mail Flow diagnostic result includes:
- Summary: General conclusion on the mail flow.
- Highlights: List of outstanding info and detected issues.
- Recommendations: Intelligent recommendations for resolving detected issues.
The Visual Mail Flow Tree is an interactive display showing the stages an email went through, with the ability to zoom, drag, and view detailed node information. By examining the tree, you can gain a detailed understanding of how Exchange Online processed the email. In some cases, you might notice that the tree node is split into multiple child nodes. This is due to Exchange Online's bifurcation feature, which separates recipients into multiple sets to process them separately during mail flow.
Investigating Further
Select a tree node to view a flyout with other details, including recipients processed and node-specific properties for troubleshooting mail flow issues. The flyout contains other details for you to review and investigate. It contains a common “Recipients” property to show which recipients this node processed, and more node-specific properties that vary between nodes to help better troubleshoot mail flow issues.
Tip
Emails sent to many recipients or large groups will take a longer time to query or could time out. Querying emails with fewer recipients could improve your experience.
If Visual Mail Flow can’t help you resolve the issue, contact Microsoft Support for further help.
Validate DKIM Signing Configuration
The Validate DKIM (DomainKeys Identified Mail) Signing Configuration tool in Microsoft Admin Center is designed to help administrators verify and troubleshoot DKIM configurations for their domain. DKIM is an email authentication method that enhances email security by allowing receiving mail servers to verify the authenticity of the sender's email through a digital signature. This verification process helps prevent email spoofing and ensures the integrity of the message.
The Validate DKIM Signing Configuration tool is used to:
- Validate the DKIM signing configuration for a domain.
- Identify issues with DKIM setup, such as missing, incorrect, or improperly enabled configurations.
- Provide actionable insights to help resolve configuration issues and ensure email messages are properly authenticated and trusted by recipient systems.
Scenarios for Use
This diagnostic tool is particularly useful in the following scenarios:
- Initial Setup: After configuring DKIM for a new domain, use the tool to verify that the setup is complete and correct.
- Troubleshooting: If emails from your domain are being marked as spam or aren't passing DKIM validation, use the tool to diagnose potential configuration issues.
- Configuration Updates: When updating DKIM settings or DNS records, use the tool to confirm that changes have been applied correctly.
Steps and Outputs
Step 1: Access the Validate DKIM Signing Configuration Tool
Navigate to Microsoft Admin Center:
- Sign in to the Microsoft Admin Center.
- Go to the Diagnostics section.
Select Validate DKIM Signing Configuration:
- Choose the Validate DKIM Signing Configuration tool from the list of available diagnostics.
Step 2: Input Required Information
Tenant:
- The tool will automatically pull the default tenant information from the HTML.
Vanity Domain:
- Select the domain you want to test from the dropdown list of available domains.
Step 3: Review Diagnostic Results
After running the diagnostic, you'll receive one of the following results, depending on the status of your DKIM configuration:
Slide 1: No Configuration Created nor Enabled
- Description: DKIM signing configuration for the domain hasn't been created. Emails might use default domain settings.
- Action Required: Create the necessary DKIM signing configuration. Follow the PowerShell link provided in the diagnostic output to create the configuration. Then, configure DKIM using the steps outlined in the Set up DKIM to sign mail from your Microsoft 365 domain article.
Slide 2: Configured but Possibly Published Incorrectly
- Description: DKIM configuration entries for the domain are either not published or published incorrectly.
- Action Required: Check the DNS entries for errors. Ensure that CNAME records correctly point to the Microsoft published public key entry as specified in the DKIM configuration. Correct any issues with the CNAME publishing and refer to the Set up DKIM to sign mail from your Microsoft 365 domain article for further instructions.
Slide 3: Created but Not Enabled
- Description: DKIM signing configuration for the domain has been created but not yet enabled.
- Action Required: Enable DKIM signing for the domain. Follow the steps in the Set up DKIM to sign mail from your Microsoft 365 domain article to enable and validate the configuration.
Slide 4: Properly Created and Correct DNS Entries Enabled
- Description: DKIM signing configuration is correctly created and enabled with accurate DNS entries.
- Action Required: No further action is required. Your DKIM configuration is properly set up, and your emails should be authenticated correctly by recipient systems.
Troubleshooting and Support
If you encounter issues with the Validate DKIM Signing Configuration tool or need further assistance, consider the following steps:
- The diagnostic output includes specific details about configuration errors. Use these details to pinpoint and correct issues.
- Refer to the Set up DKIM to sign mail from your Microsoft 365 domain article for comprehensive guidance on DKIM configuration.
- If issues persist, contact Microsoft support for further assistance.
By using the Validate DKIM Signing Configuration tool effectively, you can ensure that your email authentication is robust and that your messages are protected from spoofing and tampering.
Auto Archive Detection
Auto Archive Detection helps manage your mailbox by automatically archiving or deleting old items. This feature can be configured differently in Outlook Desktop and Outlook on the Web (OWA). Editing Auto Archive settings in Outlook can help you effectively manage your mailbox, keeping it organized and free of clutter. Whether you're using Outlook Desktop or Outlook on the Web, the steps provided will guide you through the process of configuring Auto Archive to suit your needs.
Follow the following steps to enable and customize Auto Archive settings based on your version of Outlook.
For Outlook Desktop
Launch the Outlook application on your computer.
Click on the File tab located in the top left corner of the window.
From the menu that appears, select Options.
In the Outlook Options window, click on Advanced found in the left sidebar.
Under the "AutoArchive" section, click on AutoArchive Settings.
Configure AutoArchive:
- Run AutoArchive every X days: Check this box and set the frequency for how often you want Auto Archive to run.
- Prompt before AutoArchive runs: If you wish to receive a reminder before Auto Archive runs, check this option.
- Delete expired items: Check this box if you want to permanently delete old items.
Choose Actions: Decide what actions you want Auto Archive to take:
- Move items to the archive folder: Archives items in a designated folder.
- Permanently delete old items: Removes items without archiving.
- Archive items older than a specific number of months: Specify the age of items to be archived.
Set Archive Folder: Specify the folder where you want archived items to be stored.
After making your selections, click OK to save your settings. Click OK again to exit the Options window.
For Outlook on the Web (OWA)
Navigate to your Outlook on the web and sign in with your credentials.
Click on the gear icon in the top right corner to open the settings menu.
At the bottom of the settings panel, click on View all Outlook settings.
In the settings window, select Mail, then go to Cleanup.
Locate the Auto Archive settings and configure them according to your preferences.
Save your changes to apply the new settings.
Remediate a Compromised Account
If you or your user suspects an account has been accessed by someone who shouldn’t have access, it may be compromised. The Remediate a Compromised Account diagnostic will help you check different aspects of the affected mailbox and guide you through the steps to recover the account. Please use this diagnostic if you or your user notice any signs that one of your user's accounts may have been compromised.
This diagnostic is split into multiple sections that detail steps to remediate the account. Each step lists the actions required or links to an article that can be explained in more detail. Furthermore, there will be additional account details for each step, such as when the user last reset the password, what MFA is enabled on the account, and which IP addresses have accessed the mailbox.
Inputs
- Email Address of Compromised Account
Steps and Output
Force Sign Out - First, it is important to force a user to sign out of all sessions:
Go to the Microsoft 365 admin center.
Navigate to Users > Active users.
Click on the desired user.
On the Account Tab, under Sign-out, select Sign out of all sessions.
Reset Password - Reset the password. Don't send the new password to the user through email, because the attacker may still have access to the mailbox. Be sure to use a strong and unique password: upper and lowercase letters, at least one number, and at least one special character.
- The last time a user reset the password will be displayed.
Enable multifactor authentication - Multi-Factor Authentication (MFA) is crucial for enhancing security and protecting user accounts. Enable MFA.
- A list of types of MFA enabled on the user will be displayed.
Block Suspicious IP Addresses - Blocking suspicious or harmful IP addresses is an essential cybersecurity measure. Review the IP Addresses that have activity on this account and block any that are suspicious.
- A list of IP addresses that performed actions on the account will be displayed.
Remove Account from Administrative Roles - To ensure that the attacker can't perform administrative actions, remove compromised account from any administrative roles. You can restore the user's membership once the account is secured.
Enable Mailbox Logging - Mailbox logging is the capability of capturing and analyzing audit logs related to security, compliance, and other activities within Microsoft 365 or Office 365. Enable mailbox logging.
- The status of logging on the mailbox will be shown (Enabled or Disabled).
Remove Unusual Mailbox Delegates - A mailbox delegate is someone you authorize to manage your email and calendar on your behalf. Displayed below are all the delegates that aren't the mailbox owner. Delete any unknown users.
- Users who have delegate permission will be displayed with the fields
user (email)
,isinherited
, andaccess rights
.
- Users who have delegate permission will be displayed with the fields
Remove Unusual Inbox Rules - Inbox rules are often used by attackers to forward emails to themselves. Check if there are any unusual rules and delete them.
- The inbox rules registered on the mailbox will be displayed with the identity, name, description,
forwardto
address, and enabled status.
- The inbox rules registered on the mailbox will be displayed with the identity, name, description,
Remove Unusual SMTP Forwarding - Simple Mail Transfer Protocol (SMTP) is the protocol responsible for sending emails from the sender's email client to the email server. Check if there is SMTP forwarding.
- SMTP forwarding registered on the mailbox will be displayed.
Remove Unusual Accepted Domains - An accepted domain in a mailbox allows users in a domain to send and receive mail. Delete any unusual domains.
- Accepted domains registered on the tenant will be displayed.
Remove Unusual Inbound and Outbound Connectors - Inbound connectors manage email traffic coming into your organization, while outbound connectors control the flow of emails leaving your organization. Check if there are any unusual connectors and delete them.
- Connectors registered on the tenant will be displayed.
Further Steps
If the user still shows signs of being compromised, reach out to Microsoft Support for further help.
Audit Log Summary
The audit log summary provides a comprehensive overview or count of the activities tracked within your tenant’s audit log. This diagnostic tool is useful for reviewing admin actions, identifying unusual administrative activity, or investigating potential rogue administrators.
Inputs
Search the number of days prior to the current date (max 30 days)
If you enter 10, the diagnostic will review the log for up to 10 days prior to the current date
If left blank, the diagnostic will run with the value of 7 days
Outputs
The output is split into two sections:
Users with High Activity – Users who have performed a specific action at a much higher rate than the average user will be listed here, along with the count of each action they have taken.
Full User List – All users, along with a list of their activities and corresponding counts, will be displayed here in alphabetical order. Actions performed by apps will be grouped together.
Issues with Guest Access in Teams
The Microsoft Teams Guest Access Diagnostic is designed to resolve issues that might prevent guests from joining a team. It covers potential problems related to inviting guests, accessing team content, and using certain guest features. Since guest settings are controlled both at the organizational and team levels, the diagnostic identifies any misconfigurations that could affect guest access. It consolidates all these issues into a single report, where each misconfiguration is accompanied by administrative guidance. Moreover, it reviews how guest user accounts are provisioned and accepts optional inputs at the organization, team, and user levels, allowing you to tailor the output to your needs.
Org-level settings
These settings at the organization-level are evaluated to check for misconfiguration.
Setting | Where it is located | Setting values considered “misconfigured” |
---|---|---|
External collaboration setting’s guest invite setting | Microsoft Entra Admin Center | "No one in this organization can invite guest users including admins (most restrictive)" "Only users assigned to specific admin roles can invite guests" |
M365 group guest settings | Microsoft Admin Center | Either one or both settings are turned off: "Let group owners add people outside your organization to Microsoft 365 Groups as guests" "Let guest group members access group content" |
SharePoint External Sharing settings | SharePoint Admin Center | "Only people in your organization" Existing guests only" |
Guest Access setting | Teams Admin Center | Off |
User-level Setup
If a guest user is supplied as an input, the diagnostic verifies their account provisioning in both Entra and Teams. Furthermore, if a Teams team is also provided, it checks whether that guest is a member of the specified team.
Additional Settings
In addition, this diagnostic also displays some settings that could affect your guest access experience. These settings are not evaluated for misconfiguration.
External collaboration’s collaboration restriction setting and guest user access restriction setting in Microsoft Entra Admin Center
Guest feature settings in Teams Admin Center
Teams guest permissions in Teams app
We aim for this diagnostic to resolve your guest access issues and provide a seamless guest experience in Teams. If problems persist, please reach out to Microsoft support for assistance.
Teams PSTN Calling Diagnostic
Microsoft Teams Phone uses the Public Switched Telephone Network (PSTN) when a user places an external call outside of their organization. The PSTN is essential for connecting Teams with traditional telephone networks, and its functionality is critical for organizations relying on Teams for comprehensive communication, both domestically and internationally.
To place external calls, users have several PSTN connectivity options available under Microsoft Teams (more here: Microsoft Teams add-on licenses - Microsoft Teams | Microsoft Learn). One prevalent option is the Calling Plan, which accommodates both domestic and international PSTN calling. Understanding these PSTN connections is crucial because any issues can directly impact an organization's communication capabilities, potentially hindering business operations and external engagement.
This diagnostic tool assists administrators in identifying and resolving issues with PSTN calling through the Calling Plan feature in Teams. This comprehensive diagnostic process ensures that both the technical configuration and licensing prerequisites for PSTN connectivity via Microsoft Teams are thoroughly evaluated, helping organizations maintain reliable external communication.
Running the Diagnostic
The diagnostic requires the affected user’s organizational email address. With a simple selection of the ‘Troubleshoot’ option, the tool starts analyzing the configuration, with results available in approximately 30 seconds.
Interpreting Diagnostic Results
The diagnostic performs a series of configuration checks related to Teams Phone settings, with a particular focus on verifying whether the user has been assigned a domestic or international Calling Plan license. This verification is key in determining if the user can successfully make or receive PSTN calls outside the organization. By highlighting any discrepancies or license issues, the diagnostic assists administrators in pinpointing problems that might cause call failures or connectivity issues.
Investigating Further
If the troubleshooting process does not resolve the PSTN calling issue, administrators are advised to contact Microsoft Support for more specialized assistance.
More information
As we roll out new features, your experience might change.
If you would like to get help or have questions, reach out to edfeedback@microsoft.com or use the feedback mechanism within the Engineering Direct Portal page. If you're encountering any technical issues, open a support ticket via your normal support channel.