Before You Start
Is it safe to do this now?
Before making changes, consider whether the other person might notice. Security changes to your Microsoft account can trigger email notifications about:
- Password changes
- New sign-in locations or devices
- Two-step verification changes
- Recovery information updates
These notifications go to your account’s email address and any recovery email addresses. If someone has access to these, they may see the alerts.
Important: Your Microsoft account controls access to many services beyond email, including:
- OneDrive (files and photos)
- Microsoft 365 (Word, Excel, PowerPoint)
- Xbox and gaming
- Windows devices linked to your account
- Skype
- Teams (personal)
Securing your Microsoft account secures all of these at once.
What you’ll need
- Access to your Outlook.com email or the Outlook app
- Access to the phone number or email currently linked to your account (for verification)
- A safe device that isn’t being monitored
- Approximately 20-30 minutes of uninterrupted time
- A new phone number or email address if your current recovery options are compromised
Consider doing first
- Checking your phone and computer aren’t being monitored
- Having a new, private email address ready as a backup recovery option
- Clearing your browser history after making changes (or use private/incognito mode)
Quick Contacts
| Method | Details | Best for |
|---|---|---|
| Microsoft Support | support.microsoft.com | Account recovery, security issues |
| Account recovery | account.live.com/acsr | Locked out of account |
| Security dashboard | account.microsoft.com/security | Review and manage security |
| Virtual agent | Via support.microsoft.com | Quick questions |
What to say: You don’t have to explain your full situation. You can simply say:
“I need to secure my account because I believe someone else may have access to it.”
Or:
“I need to remove all other devices and sessions from my account for security reasons.”
Microsoft support can help with account recovery and security concerns, though they don’t have a specific domestic abuse support team like some banks do. For sensitive situations, the self-service security tools at account.microsoft.com are often the most private option.
Check Who Has Access
Recent sign-in activity
This is the most important check. Microsoft logs every sign-in attempt to your account.
To review your sign-in history:
- Go to account.microsoft.com/security
- Sign in if prompted
- Click View my sign-in activity (under “Sign-in activity”)
- Review the list of recent sign-ins
What to look for:
- Sign-ins from locations you don’t recognise
- Sign-ins from devices you don’t own
- Sign-ins at times you weren’t using your account
- Multiple failed sign-in attempts (someone trying to guess your password)
- “Successful sign-in” entries you didn’t make
Each entry shows:
- Date and time
- Location (city/country)
- Device and browser type
- IP address
- Whether it was successful
If you see suspicious activity: Don’t panic. Note down the details, then follow the steps in “Remove Unwanted Access” below.
Email forwarding rules
Someone with access to your account may have set up forwarding to secretly receive copies of your emails.
To check forwarding in Outlook.com:
- Go to outlook.live.com and sign in
- Click the Settings gear icon (top right)
- Click View all Outlook settings at the bottom
- Go to Mail → Forwarding
- Check if “Enable forwarding” is turned on
- If it is, note the forwarding address
If you find unexpected forwarding: Turn it off immediately (see “Remove Unwanted Access”).
Inbox rules
More subtle than forwarding, inbox rules can automatically move, delete, or forward specific emails without you noticing.
To check inbox rules:
- Go to outlook.live.com
- Click the Settings gear icon
- Click View all Outlook settings
- Go to Mail → Rules
- Review all rules in the list
Red flags to look for:
- Rules that forward emails to another address
- Rules that delete emails from specific senders
- Rules that mark emails as read automatically
- Rules that move emails to obscure folders
- Rules you don’t remember creating
Connected apps and services
Other apps may have permission to read your emails or access your account.
To check connected apps:
- Go to account.microsoft.com/privacy
- Click Apps and services that can access your data
- Review the list of connected applications
Also check:
- Go to account.microsoft.com/security
- Look for Manage app access or Third-party app access
Remove any apps you don’t recognise or no longer use.
Devices linked to your account
To see all devices:
- Go to account.microsoft.com/devices
- Review all devices listed
- These are devices where you’ve signed in with your Microsoft account
Remove Unwanted Access
Sign out everywhere
This immediately ends all active sessions on all devices.
To sign out of all devices:
- Go to account.microsoft.com/security
- Look for Sign-in activity
- Click Sign out everywhere (or find this option in advanced security settings)
Alternative method:
- Change your password (see below)
- During the password change, tick the box that says “Make me sign in again on all devices”
This forces anyone using your account to sign in again with the new password.
Remove email forwarding
- Go to outlook.live.com
- Click the Settings gear icon
- Click View all Outlook settings
- Go to Mail → Forwarding
- Uncheck “Enable forwarding” or toggle it off
- Click Save
Delete suspicious inbox rules
- Go to Settings → View all Outlook settings
- Go to Mail → Rules
- Click the bin/delete icon next to any suspicious rules
- Click Save
Tip: If you’re unsure about a rule, delete it. You can always recreate rules you actually need later.
Revoke app permissions
- Go to account.microsoft.com/privacy
- Under Apps and services, click Apps and services that can access your data
- Click on any app you want to remove
- Click Remove these permissions or Revoke access
Change your password
This is essential if you suspect someone knows your password.
- Go to account.microsoft.com/security
- Click Change password
- Enter your current password
- Create a new, strong password:
- At least 12 characters
- Mix of letters, numbers, and symbols
- Not based on personal information (birthdays, names, addresses)
- Not used on any other account
- Tick “Make me sign in again on all devices” if offered
- Click Save
Password tips:
- Use a passphrase: random words strung together (e.g., “correct-horse-battery-staple”)
- Consider using a password manager
- Never reuse passwords across accounts
Remove linked devices
- Go to account.microsoft.com/devices
- Click on any device you don’t recognise
- Click Remove device or Unlink
Lock Down Your Account
Enable two-step verification
Two-step verification (also called 2FA or MFA) means even if someone knows your password, they can’t sign in without a second code.
To set up two-step verification:
- Go to account.microsoft.com/security
- Click Advanced security options or Two-step verification
- Click Turn on under Two-step verification
- Follow the setup wizard
Verification methods available:
| Method | How it works | Considerations |
|---|---|---|
| Microsoft Authenticator app | Push notification or 6-digit code | Most secure; requires smartphone |
| Phone (SMS) | Code sent by text message | Convenient but less secure; SIM can be compromised |
| Alternative email | Code sent to another email | Ensure that email is also secure |
| Security key | Physical USB device | Very secure; requires purchasing a key |
Recommended: Use the Microsoft Authenticator app if possible. It’s free and more secure than SMS.
Important for your safety: If someone else has access to your phone or recovery email, they could intercept verification codes. Consider:
- Using a phone only you have access to
- Setting up a new, private recovery email first
- Using the Authenticator app rather than SMS
Review and update recovery options
Recovery options help you get back into your account if you’re locked out. But they can also be used by someone else if they have access to them.
To manage recovery options:
- Go to account.microsoft.com/security
- Click Advanced security options
- Under “Ways to prove who you are,” review:
- Recovery phone numbers
- Recovery email addresses
Check each one:
- Do you still have access to this phone number?
- Do you still have access to this email?
- Could someone else access these?
To add new recovery options:
- Add a phone number only you control
- Add an email address only you can access
To remove compromised options:
- Click Remove next to any phone or email the other person could access
Note: You must have at least one recovery option. Set up a new, safe one before removing compromised options.
Set up a security key (optional)
For maximum security, a physical security key (like a YubiKey) provides strong protection.
- Go to account.microsoft.com/security
- Click Advanced security options
- Under “Ways to sign in,” look for Security key
- Follow the setup instructions
This requires purchasing a security key (approximately GBP 25-50), but it’s the most secure option available.
Review trusted devices
Microsoft may remember certain devices as “trusted” so they don’t require verification each time.
- Go to Advanced security options
- Look for Trusted devices or Remembered devices
- Remove any devices you don’t trust
Enable passwordless sign-in (optional)
Microsoft now offers passwordless sign-in using the Authenticator app. This can be more secure because there’s no password to steal.
- Install the Microsoft Authenticator app
- Go to account.microsoft.com/security
- Look for Passwordless account or find this in Advanced security options
- Follow the setup wizard
Outlook Desktop App vs Outlook.com
There are important differences between the Outlook desktop application and Outlook.com (webmail):
Outlook.com (webmail)
- Accessed at outlook.live.com or outlook.com
- Security settings are managed at account.microsoft.com
- All the steps in this guide apply directly
Outlook desktop app (Windows/Mac)
- The desktop app connects to various email accounts
- If connected to your Microsoft account, the same security steps apply
- If connected to a work email (Microsoft 365/Exchange), your organisation controls security
- Check with your IT department for work accounts
If you use the Outlook desktop app:
- Check which accounts are connected (File → Account Settings)
- For personal Microsoft accounts, use this guide
- For work accounts, contact your IT department
- Consider whether the other person has access to the computer where Outlook is installed
Important: If someone has access to a computer where you’re signed into Outlook, they can read your emails even if your account is secure. Consider:
- Signing out of Outlook on shared computers
- Removing the account from the desktop app
- Changing your password to force a re-sign-in
Get Confidential Support
Microsoft Support
Microsoft doesn’t have a specific domestic abuse support team, but their security team can help with compromised accounts.
Options:
- Virtual agent: Visit support.microsoft.com, search for “account security,” and use the virtual agent
- Get help app: On Windows 10/11, search for “Get Help” and describe your security concern
- Community forums: answers.microsoft.com (be careful not to share personal details publicly)
What to say:
“I need help securing my account. I believe someone else has gained access and I need to remove them and protect my account.”
Self-service security tools
The most private option is often to use Microsoft’s self-service tools:
- Security dashboard: account.microsoft.com/security
- Privacy dashboard: account.microsoft.com/privacy
- Account recovery: account.live.com/acsr
These don’t require speaking to anyone and leave no record of your conversation.
If You’re Locked Out
If you know your password but can’t complete verification
- Go to account.live.com/acsr
- Enter your email address
- Enter a contact email Microsoft can use to reach you (must be different from the locked account)
- Complete the security check
- Fill in the form with as much detail as possible about your account
- Wait for Microsoft’s response (usually within 24 hours)
Tips for the recovery form:
- Provide previous passwords you’ve used
- List email addresses you’ve contacted
- Mention recent email subjects
- Describe your recent account activity
If someone changed your password
- Go to account.live.com/password/reset
- Enter your email address
- Try using your recovery email or phone
- If you don’t have access to these, use “I don’t have any of these” to start the account recovery process
If your recovery options have been changed
This is more complex. You’ll need to:
- Go to account.live.com/acsr
- Fill out the account recovery form in detail
- Microsoft will review and attempt to verify you’re the rightful owner
- This can take several days
Evidence that helps:
- Previous passwords
- Subject lines of recent emails you sent
- Names of folders you created
- Payment methods linked to the account
- Previous addresses on file
Starting Fresh
Sometimes it’s safer to create a new email account rather than trying to secure a compromised one. Consider this if:
- You can’t verify who has access
- Too many people have the email address
- The account has been severely compromised
- You want a completely fresh start with no connection to the old account
Creating a new Microsoft account
- Go to outlook.live.com
- Click Create free account
- Choose a new email address (doesn’t need to include your real name)
- Use a strong, unique password
- Add recovery options only you control
- Enable two-step verification immediately
Keeping your new account private
- Don’t use your real name in the email address
- Use a phone number only you have access to
- Use a recovery email only you can access
- Don’t link it to your old account
- Be careful about who you share the new address with
- Check your settings for any “import” or “link” options that might connect to old accounts
Transitioning from your old account
If you need to keep access to important emails:
- Forward essential emails to your new account before disconnecting
- Update important accounts (banking, utilities, etc.) to use your new email
- Set an auto-reply on the old account directing trusted contacts to your new address (only if safe)
- Consider deleting the old account entirely once you’ve transitioned
Red Flags That Suggest Compromise
Watch for these warning signs:
In your inbox
- Emails marked as read that you haven’t opened
- Emails in “Sent” that you didn’t send
- Missing emails you’re expecting
- Password reset emails you didn’t request
- “New sign-in” alerts from locations or devices you don’t recognise
- Replies to emails you don’t remember sending
In your account
- Sign-in activity from unfamiliar locations
- Recovery options (phone/email) you didn’t add
- Connected apps you don’t recognise
- Forwarding rules you didn’t create
- Inbox rules that hide, delete, or redirect emails
From other people
- People receiving emails from you that you didn’t send
- Someone knowing the contents of your private emails
- Someone knowing about conversations before you tell them
- Strange replies to emails you didn’t send
On your devices
- Your password suddenly not working
- Being signed out unexpectedly
- The Outlook app behaving strangely
If you notice any of these, follow the steps in this guide immediately to secure your account.
Additional Support
Microsoft support
- Security dashboard: account.microsoft.com/security
- Privacy dashboard: account.microsoft.com/privacy
- Support: support.microsoft.com
- Account recovery: account.live.com/acsr
If you’re in immediate danger
Call 999 if you’re in immediate danger.
External support
- National Domestic Abuse Helpline: 0808 2000 247 (24hr, free, hidden on phone bills)
- Refuge: refuge.org.uk
- Women’s Aid: womensaid.org.uk
- Men’s Advice Line: 0808 801 0327 (for male victims)
- Galop: 0800 999 5428 (for LGBT+ victims)
- Karma Nirvana: 0800 5999 247 (honour-based abuse)
Tech safety resources
- Refuge Tech Safety: refugetechsafety.org
- National Network to End Domestic Violence (Safety Net): Resources on technology safety
Last verified: December 2025
If anything on this page is out of date, please contact us.