Microsoft is enforcing its standard security protections, not acting illegally.
When a sign-in looks unusual (new device, hardware change, or long time since last sign-in), additional verification is required. If the only security info on the account is an old phone number, Microsoft will send the verification code there and block other changes until the security info update completes.
Key points from the documented behavior:
- Verification must go to existing security info
- Microsoft uses the email addresses and phone numbers already on the account to send verification codes and confirm identity.
- If only an old phone number is on file, the code will go there. This is by design to prevent someone else from taking over the account simply by adding a new phone number or email.
- See: “We’ll send a code to the email addresses listed on your account, and when you respond with the code, we know it’s really you.”
- Alternate contact methods can be used, but must be verified
- When prompted with “Let’s protect your account” / “Help us secure your account,” an alternate email or phone can be added, but it must be verified with a code sent to that alternate.
- It does not have to be the user’s own number; any number or email that can be accessed can be used to receive the code.
- Delays and blocks are expected in some scenarios
- If there has been unusual activity, many attempts, or changes that look risky, Microsoft may temporarily block certain verification methods or sign-ins and ask to “Try another verification method.”
- Microsoft explicitly notes that blocks and waiting periods (including up to several days) are normal security responses to protect accounts from takeover.
- Using another phone number is allowed for unlocking
- For some locked-account scenarios, any phone that can receive SMS can be used, even if it is not already associated with the account, and Microsoft states that this does not compromise account security.
These controls exist to protect the account and its contents from unauthorized access. They can be inconvenient—especially after changing phone numbers or devices—but they are consistent with Microsoft’s published security model and are not described as optional or negotiable.
To move forward within these constraints:
- Use any accessible phone or email as an alternate verification method when prompted by “Help us secure your account,” then verify it with the code.
- If blocked with “Try another verification method,” follow the documented guidance: try a different verification method on the account, switch networks, and avoid repeated attempts for 24 hours or more.
- If the account is locked, follow the on-screen aka.ms link and complete the unlock process with a security code sent to a phone that can receive SMS.
The month-long delay for changing primary security info is part of this same protection model: it prevents someone who has just gained partial access from immediately replacing all contact details and locking out the rightful owner.
References: