Share via

Is @security.microsoft a real Microsoft domain?

Eric Pérez 20 Reputation points
2026-02-27T13:35:15.3033333+00:00

Good morning,

I got an email from @security.microsoft and wanted to know if this is a trusted domain.

I'm like 75% sure it's not, considering the subject line OutlookSecurity‑SecurityTrigger [token:‑o365@auth‑node] 9389kr.

Thank you in advance!

— Eric Pérez

Microsoft 365 and Office | Other
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. Marcin Policht 82,360 Reputation points MVP Volunteer Moderator
    2026-02-27T13:52:10.44+00:00

    The domain is valid - that's part of the current trend to consolidate Microsoft domains using the .microsoft top-level domain. More at https://learn.microsoft.com/en-us/microsoft-365/enterprise/cloud-microsoft-domain?view=o365-worldwide

    'Dot brand' top-level domains like .microsoft enhance security, trustworthiness, and integrity. Microsoft has exclusive rights to the .microsoft top-level domain, enabling enhanced security protocols and governance controls to be applied across the entire domain hierarchy, starting from the top level. All experiences on the .microsoft domain are guaranteed to be legitimate and authentic, as Microsoft is the registry operator and sole registrant.

    However, this does NOT imply that the email is legitimate.

    First, Microsoft does not commonly send consumer or business security notifications from a bare security.microsoft address. Official Microsoft emails typically come from domains like microsoft.com, account.microsoft.com, microsoftsupport.com, or other well-established subdomains.

    Second, the subject line you described — “OutlookSecurity-SecurityTrigger [token:-o365@auth-node] 9389kr” — is a major red flag. That format looks machine-generated in a way that mimics internal security systems, but legitimate Microsoft emails do not use random token strings and unusual formatting like that in subject lines. Phishing emails often include technical-sounding strings to appear authentic.

    Third, attackers can spoof the visible “From” address. What you see in your email client is not proof that the message actually originated from Microsoft. Without checking full email headers (SPF, DKIM, DMARC authentication results), you can’t rely on the display address alone.

    Fourth, even though .microsoft is a controlled dot-brand TLD, that does not prevent:

    • Spoofed display names
    • Compromised third-party mail systems
    • Look-alike domains (for example security-microsoft.com)
    • Forwarded phishing emails where the visible sender looks legitimate

    Given the suspicious subject line and the unusual sending domain, your instinct that it’s not legitimate is very reasonable.

    What you should do:

    • Do not click any links in the email.
    • Do not download attachments.
    • Instead, manually go to https://account.microsoft.com or log into Outlook directly through your browser.
    • Check your account activity there.
    • If the email claims account compromise, verify via the official Microsoft Security page, not via the email link.

    If you want to be more certain, you can check the full email headers and look for authentication results showing “SPF: pass,” “DKIM: pass,” and “DMARC: pass” for a Microsoft-controlled domain. If those fail or reference a non-Microsoft sending server, it’s phishing.

    Based on what you’ve described, this strongly looks like a phishing attempt rather than a legitimate Microsoft security alert.


    If the above response helps answer your question, remember to "Accept Answer" so that others in the community facing similar issues can easily find the solution. Your contribution is highly appreciated.

    hth

    Marcin


Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.