Microsoft 365 Admin Center Outage According to the company's service health dashboard, Microsoft 365 administrators in North America are experiencing widespread problems gaining access to the Microsoft 365 admin center. Critical management tasks like user provisioning, security configurations, and compliance monitoring are disrupted by the service degradation identified by Issue ID MO1230320, which affects the core Microsoft 365 suite. Thousands of enterprise users are unable to log in or carry out administrative tasks as a result of the outage, which was initially reported at 8:20 PM GMT+5:30 (10:50 AM ET).
The impact's scope is mainly North America, and telemetry shows sporadic failures in the admin portal's API calls and authentication endpoints. When trying to access admin.microsoft.com, users report HTTP 5xx errors, long loading times, and complete session timeouts.
According to Microsoft's most recent update, which was posted at 9:18 PM GMT+5:30, the team is "continuing to review telemetry related to Microsoft 365 admin center access to isolate the source of the issue." Although timelines have slipped due to ongoing diagnostics, a follow-up is promised by 8:48 PM GMT+5:30. Although the exact cause is unknown, preliminary findings point to either backend scaling problems with the Azure Active Directory (AAD) integration or an increase in API traffic that is overwhelming regional data centers.
The admin center is not the only place affected by this disruption. Routine operations are delayed for administrators in charge of Teams governance, SharePoint, Exchange Online, and Intune device policies. Bulk user license assignments, for example, stop, putting compliance with HIPAA or GDPR deadlines at risk.
Because self-service recovery options like PowerShell cmdlets circumvent the portal and necessitate sophisticated scripting skills, small to mid-sized businesses that depend on delegated admin roles express the most frustration. Workarounds include reverting to legacy portals like the original Exchange admin center or using Microsoft Graph API endpoints for urgent tasks like POST /users via delegated permissions. Microsoft suggests using the Microsoft 365 admin mobile app to enable proactive alerts and keep an eye on the admin center's service health page.
Similar incidents in the past have been caused by misconfigured load balancers in Azure's global network, certificate rotations, or false positives from DDoS mitigation. Microsoft encourages impacted users to provide diagnostic information via the admin center's "Run tests" feature while investigations are ongoing.
X, LinkedIn, and X for daily updates on cybersecurity. To have your stories featured, get in touch with us.












.webp%3Fw%3D1068%26resize%3D1068%2C0%26ssl%3D1&w=3840&q=75)