Ews Deprecation And 10003 Error Troubleshooting - Spanning 365 Backup

Overview

Microsoft has announced the deprecation of Exchange Web Services (EWS) for Exchange Online. Tenants may gradually experience EWS being disabled by default, with complete retirement scheduled for April 1, 2027.

Microsoft is transitioning functionality to Microsoft Graph APIs; however, not all required Graph capabilities are currently available to fully replace EWS in production environments. While Spanning 365 Backup has already migrated a significant portion of its core functionality to Microsoft Graph, certain Mail and Calendar backup and restore operations still depend on legacy Exchange Online (EWS) permissions.

Reference: http://techcommunity.microsoft.com/blog/exchange/exchange-online-ews-your-time-is-almost-up/4492361


Issue

Customers may encounter a 403 Forbidden error when the backup application attempts to access Exchange Web Services (EWS).

Cause

A 403 error typically indicates that:

  • The application is allowed at the tenant level, but access is restricted or blocked at the user/mailbox level or by policy.

Resolution

Follow the steps below to identify and resolve the issue:

Using Exchange Admin Center (EAC):

  • Sign in to the Exchange Admin Center as an Exchange administrator.
  • Go to Recipients > Mailboxes.
  • Select the required user’s mailbox.
  • In the mailbox details pane, under the General tab, click on Manage email apps settings.
  • Enable Exchange Web Services (EWS).
image

Using Exchange Online PowerShell:

1. Check Mailbox-Level EWS Access

Run the following command in Exchange Online PowerShell:

Get-CASMailbox user@domain.com | Select EwsEnabled
  • If the value is False, enable it using:
Set-CASMailbox user@domain.com -EwsEnabled $true
  • If any changes are made to the above settings, we recommend reauthorizing the Spanning application and waiting 24 hours for Microsoft’s updates to fully propagate. This allows Spanning to detect and apply those changes.
     
  • After reauthorization and the 24-hour period, please monitor the next scheduled backup for the affected user(s). Alternatively, you may initiate a manual backup for a specific user to confirm the updates have taken effect.

If the tenant-level value is False, we recommend enabling this setting organization-wide with assistance from Microsoft Support.

2. Verify Application Access Policy

Run the following command:

Get-OrganizationConfig | Select EwsApplicationAccessPolicy, EwsAllowList, EwsBlockList
 
  • If the policy is set to EnforceAllowList, ensure the backup application is included in the EwsAllowList

3. Check for Per-User Overrides

Run: 

Get-CASMailbox user@domain.com | Select EwsApplicationAccessPolicy
 
  • This confirms whether mailbox-level policies are overriding organization-wide settings

4. Review Conditional Access Policies

Navigate to:

  • Microsoft Entra Admin Center → Security → Conditional Access

Verify whether any policies are blocking:

  • Legacy authentication
  • Exchange Web Services (EWS)
  • Specific users or groups

5. Review Sign-in Logs

Navigate to:

  • Microsoft Entra Admin Center → Monitoring → Sign-in logs

Steps:

  • Filter logs for the affected user
  • Check for failed sign-ins

Look for:

  • 403 errors
  • Access blocked by Conditional Access policies

6. Check Security Defaults

Navigate to:

  • Microsoft Entra Admin Center → Properties → Manage Security Defaults
  • If enabled, Security Defaults may block legacy authentication used by EWS

Additional Notes

  • As Microsoft continues to phase out EWS, it is recommended to monitor updates regarding Microsoft Graph API capabilities
  • Ensure that your environment is prepared for the transition before the EWS retirement deadline
  • Spanning will continue to enhance Graph-based functionality to minimize dependency on EWS

Summary

EWS deprecation is an ongoing transition, and interim configurations may cause access issues such as 403 errors. By validating mailbox settings, application policies, and security configurations, administrators can restore functionality for affected users while preparing for the long-term shift to Microsoft Graph APIs.

Have more questions?

Contact us

Was this article helpful?
0 out of 0 found this helpful

Provide feedback for the Documentation team!

Browse this section