Senders have to not use namespace mining tactics from Outlook.com inbound email servers. Here is the exercise of verifying e-mail addresses with no sending (or attempting to ship) e-mails to All those addresses. This technique is often used by destructive senders to make lists of valid e-mail addresses they can deliver spam, phishing email messages