Microsoft's 550 5.7.520 error is a permanent rejection — Microsoft is refusing to deliver your message and will not retry. It means your sending IP has been blocked by Microsoft's real-time reputation system, Sender Policy Framework evaluation has failed in a way that triggers policy enforcement, or your domain or IP has been added to a Microsoft-specific blocklist. Unlike Yahoo's temporary TS codes, a 550 is a hard bounce: the message is lost, and your MTA should not retry.

550
Permanent rejection — message not queued for retry
5.7.520
Microsoft-specific: "Service unavailable. Access denied"
SNDS
Smart Network Data Services — Microsoft's reputation tool
JMRP
Junk Mail Reporting Program — Microsoft FBL equivalent

Microsoft 550 Error Code Reference

Microsoft uses a structured taxonomy of enhanced status codes. Each 5.7.XXX code has a specific meaning. Treating them as equivalent and applying a single fix is the most common mistake — different codes require different remediation approaches.

CodeError textRoot causeFix approach
550 5.7.1Service unavailable; client host blockedIP on Microsoft block listSNDS registration + delist request
550 5.7.350Remote server returned message not acceptedDomain/IP not authorized to sendFix SPF record; register JMRP
550 5.7.520Access denied, banned senderIP blocked — sender policy violationSNDS delist + authentication audit
550 5.7.515Access denied, domain does not matchDMARC enforcement failure (from May 2025)Fix DKIM alignment to From: domain
550 5.7.708Service unavailable. Access denied (IP)Sending limit exceeded for IPRate reduction + reputation rebuild
421 4.7.650Connection refused — new domainNew domain, no reputation (temporary)Gradual volume increase, wait
451 4.7.650Temporary service unavailableRate limiting (not a block)Reduce rate, retry exponentially

Diagnosing a 550 5.7.520 Block

The first step is checking Microsoft SNDS (Smart Network Data Services) at sendersupport.olc.protection.outlook.com. SNDS shows the reputation status of each of your sending IPs: green (good), yellow (investigate), or red (blocked). A 550 5.7.520 almost always corresponds to a red status in SNDS. SNDS also shows trap hit data — the number of spam trap addresses your IP hit in the past 30 days — which is the primary cause of Microsoft blocks.

Raw 550 5.7.520 rejection from Microsoft (annotated)
Final-Recipient: rfc822; user@outlook.com
Action: failed
Status: 5.7.520
Diagnostic-Code: smtp; 550 5.7.520 Access denied, banned sender[COL0NAM10FT065.eop-nam10.prod.protection.outlook.com]

# Breakdown:
# 550 = permanent rejection (hard bounce)
# 5.7.520 = Microsoft policy block on your sending IP
# COL0NAM10FT065 = the specific Microsoft MTA that rejected you
# eop-nam10 = Exchange Online Protection datacenter (North America region)
# This is NOT a content filter — it is an IP-level block

# Check which IP was blocked:
# Look at the Received: headers above this bounce — the IP listed
# in the first Received: line is your sending IP that was blocked.

# Check SNDS immediately:
# https://sendersupport.olc.protection.outlook.com/snds/

SNDS Registration and Delist Request

SNDS is the primary tool for resolving Microsoft blocks. Registration is free at sendersupport.olc.protection.outlook.com. Once registered with your sending IPs, SNDS shows complaint rate, spam trap hit data, and current IP reputation status. The delist request portal — also at SNDS — submits a manual review request to Microsoft's postmaster team.

▶ Microsoft 550 5.7.520 resolution workflow
1
Identify the blocked IP from bounce headers — Extract the sending IP from your MTA logs or the Received: headers in the NDR. Confirm it is the correct IP before submitting a delist request.
2
Check SNDS for trap hits and complaint data — Log into SNDS. If your IP shows red status with trap hits, the root cause is spam trap addresses in your list. Fix the list before requesting delisting.
3
Audit and clean your Microsoft recipient segments — Pull all Outlook.com, Hotmail.com, and Live.com addresses. Run through email verification. Suppress any address with no open in 90 days. Remove all hard bounces immediately.
4
Fix authentication if 5.7.515 also appears — If you are also seeing 5.7.515 (DMARC failure), fix DKIM alignment first. Submitting a delist request without fixing authentication delays resolution.
5
Submit delist request through SNDS portal — Navigate to the IP in SNDS, select "Request Delist," and complete the form. Provide your sending IP, your postmaster contact email, and a brief description of the remediation you took.
6
Monitor SNDS daily after delist approval — Microsoft typically responds within 24–48 hours. After approval, start with a small test send (500 messages) to verify delivery before resuming full volume.

JMRP — Microsoft Feedback Loop Setup

JMRP (Junk Mail Reporting Program) is Microsoft's complaint feedback loop — the equivalent of Yahoo's FBL. When a recipient clicks "This is junk" in Outlook or Hotmail, JMRP sends a complaint report to your designated mailbox. Without JMRP registration, Microsoft blocks accumulate silently.

Register at sendersupport.olc.protection.outlook.com/snds/JMRP.aspx. You will need to verify ownership of your sending IP via a confirmation email to the postmaster@ address for the domain in your MAIL FROM (envelope sender). JMRP reports arrive as ARF-format emails — configure your MTA or ESP to automatically suppress the complainant's address upon receipt.

📋 Client case — B2B software company, 240K Microsoft subscribers

Situation: 100% of sends to Outlook.com and Hotmail.com returning 550 5.7.520. SNDS showed red status with 12 spam trap hits in the previous 7 days. Sending IP not registered with SNDS or JMRP.
Actions: Registered SNDS and JMRP immediately. SNDS data revealed trap hits concentrated on 3,200 addresses imported from a trade show list 8 months prior. Suppressed the entire trade show import globally. Ran remaining Microsoft addresses through email verification — suppressed 8,400 additional invalid addresses. Submitted delist request with remediation documentation.
Outcome: Delist approved in 31 hours. Resumed with 2,000-message test. SNDS showed green within 5 days. Full Microsoft delivery restored at week 2. No re-blocking in 90-day follow-up period.

Microsoft May 2025 Enforcement — What Changed

In May 2025, Microsoft began enforcing stricter authentication requirements for consumer domains (outlook.com, hotmail.com, live.com). Senders without SPF, DKIM, and DMARC alignment began receiving 550 5.7.515 rejections in addition to any existing blocks. This is separate from the 5.7.520 IP block but often appears simultaneously if authentication was not previously configured.

The May 2025 enforcement means that even senders with clean IP reputations started receiving 550 errors if their email authentication was not aligned. The fix requires the same authentication stack as Gmail's February 2024 requirements: SPF covering all sending IPs, DKIM signed with the From: domain (not an ESP subdomain), and DMARC published at minimum p=none with rua= reporting enabled.