Results for outlook.live.com

Check again 2020-04-10 05:15:02 Etc/UTC

HTTPS by default

outlook.live.com uses HTTPS by default.

Chromium reports the following:

State Title Summary Description
Certificate valid and trusted The connection to this site is using a valid, trusted server certificate issued by DigiCert Cloud Services CA-1.
Connection secure connection settings The connection to this site is encrypted and authenticated using TLS 1.2, ECDHE_RSA with P-384, and AES_256_GCM.
Resources all served securely All resources on this page are served securely.

More information about the site's TLS/SSL configuration:

HTTP Strict Transport Security (HSTS)

HSTS policy for https://outlook.live.com:
max-age=31536000; includeSubDomains max-age=31536000; includeSubDomains

Pass Test
max-age set to at least 6 months
includeSubDomains — policy also applies to subdomains
preload — requests inclusion in preload lists [only relevant for base domain]

HSTS not set on base domain https://live.com.

Content Security Policy

Content Security Policy (CSP) header not implemented.

The Content Security Policy tests are based on the ones from the Mozilla HTTP Observatory scanner/grader project (Mozilla Public License 2.0) by April King, reimplemented by us for Webbkoll. The explanatory texts are from the Observatory by Mozilla website, CC-BY-SA 3.0. Any mistake or inaccuracy in the results is our fault.

Referrer Policy

Referrer Policy not set. This means that the default value no-referrer-when-downgrade, leaking referrers in many situations, is used.

Subresource Integrity (SRI)

Subresource Integrity (SRI) not implemented, but all external resources are loaded over HTTPS

The following third-party resources are not loaded using SRI:

Type URL
css https://ow2.res.office365.com/owalanding/2020.1.16.01/stylesheets/compiled.css
script https://ow2.res.office365.com/owalanding/2020.1.16.01/javascripts/dom-scripts.js
script https://ow2.res.office365.com/owalanding/2020.1.16.01/javascripts/detect-os.js
script https://ow2.res.office365.com/owalanding/2020.1.16.01/javascripts/jquery.onscreen.js
script https://ow2.res.office365.com/owalanding/2020.1.16.01/javascripts/lazyload.min.js
script https://ow2.res.office365.com/owalanding/2020.1.16.01/javascripts/jquery-3.2.1.min.js
script https://ow2.res.office365.com/owalanding/2020.1.16.01/javascripts/vh-check.min.js
script https://uhf.microsoft.com/mscc/statics/mscc-0.4.1.min.js

The Subresource Integrity test is based on the one from the Mozilla HTTP Observatory scanner/grader project (Mozilla Public License 2.0) by April King, reimplemented by us for Webbkoll.

HTTP headers

Pass Header Value Result
X-Content-Type-Options nosniff X-Content-Type-Options header set to "nosniff"
X-Frame-Options X-Frame-Options (XFO) header not implemented
X-XSS-Protection X-XSS-Protection header not implemented

The header tests are based on the ones from the Mozilla HTTP Observatory scanner/grader project (Mozilla Public License 2.0) by April King, reimplemented by us for Webbkoll. The explanatory texts are from the Observatory by Mozilla website, CC-BY-SA 3.0.

Cookies

First-party cookies (3)

Domain Name Value Expires on HttpOnly Secure SameSite
outlook.live.com ClientId 1DD9209447664209899A... 2021-04-10 05:14:51Z (None)
.live.com logonLatency LGN01=63722092490521... session
outlook.live.com OWAPF p:11111111&v:16.3665... session

HttpOnly means that the cookie can only be read by the server, and not by JavaScript on the client. This can mitigate XSS (cross-site scripting) attacks.

Secure means that the cookie will only be sent over a secure channel (HTTPS). This can mitigate MITM (man-in-the-middle) attacks.

SameSite can be used to instruct the browser to only send the cookie when the request is originating from the same site. This can mitigate CSRF (cross-site request forgery) attacks.

GDPR: Rec. 60, Rec. 61, Rec. 69, Rec. 70, Rec. 75, Rec. 78, Art. 5.1.a, Art. 5.1.c, Art. 5.1.e, Art. 21, Art. 22, Art. 32.

e-PD (2002/58/EC). Rec. 24, 25, Art. 5.2.

e-PD revised (2009/136/EC). Rec. 65, 66.

More information

localStorage

localStorage not used.

Third-party requests

48 requests (48 secure, 0 insecure) to 4 unique hosts.

A third-party request is a request to a domain that's not live.com or one of its subdomains.

Host IP Country Classification URLs
ow2.res.office365.com 23.57.80.121 US Show (38)
r4.res.office365.com 23.57.80.121 US Show (7)
uhf.microsoft.com 23.57.81.25 US Content (Microsoft) Show (2)
www.outlook.com 52.97.179.242 GB Content (Microsoft) Show (1)

We use Disconnect's open source list of trackers to classify hosts.

GDPR: Rec. 69, Rec. 70, Art. 5.1.b-c, Art. 25.

Server location

The server outlook.live.com (13.107.42.11) appears to have been located in United States of America during our test.

See more information (e.g., provider) about this IP address using KeyCDN's tool.

Raw headers

Header Value
cache-control private
content-encoding gzip
content-type text/html; charset=utf-8
date Fri, 10 Apr 2020 05:14:50 GMT
request-id b29a517c-0a7b-4b1e-b536-44d9b07c21f0
set-cookie ClientId=1DD9209447664209899AE7352FC4BBB0; expires=Sat, 10-Apr-2021 05:14:50 GMT; path=/;SameSite=None; secure ClientId=1DD9209447664209899AE7352FC4BBB0; expires=Sat, 10-Apr-2021 05:14:50 GMT; path=/;SameSite=None; secure RoutingKeyCookie=; expires=Tue, 10-Apr-1990 05:14:50 GMT; path=/; secure HostSwitchPrg=; expires=Tue, 10-Apr-1990 05:14:50 GMT; path=/; secure OptInPrg=; expires=Tue, 10-Apr-1990 05:14:50 GMT; path=/; secure logonLatency=LGN01=637220924905219425; domain=live.com; path=/; secure; HttpOnly O365Consumer=; expires=Tue, 10-Apr-1990 05:14:50 GMT; path=/; secure
status 200
strict-transport-security max-age=31536000; includeSubDomains max-age=31536000; includeSubDomains
vary Accept-Encoding
x-backend-begin 2020-04-10T05:14:50.520
x-backend-end 2020-04-10T05:14:50.532
x-backendhttpstatus 200 200
x-beserver DB6P193MB0021
x-besku Gen9
x-calculatedbetarget DB6P193MB0021.EURP193.PROD.OUTLOOK.COM
x-calculatedfetarget DB8PR06CU001.internal.outlook.com
x-content-type-options nosniff
x-diaginfo DB6P193MB0021
x-feproxyinfo DB8PR06CA0004.EURPRD06.PROD.OUTLOOK.COM
x-feserver DB8PR06CA0004 PR3P193CA0040
x-msedge-ref Ref A: 87BCEC08C84C48D1A2C8D22E42890E2C Ref B: PRAEDGE1106 Ref C: 2020-04-10T05:14:50Z
x-proxy-backendserverstatus 200
x-proxy-routingcorrectness 1
x-rum-validated 1
x-ua-compatible IE=EmulateIE7

What this tool checks (and doesn't check)

This tool attempts to simulate what happens when a user visits a specified page with a typical browser. The browser has no addons/extensions installed, and Do Not Track (DNT) is not enabled, since this is the default setting in most browsers.

External files such as images, scripts and CSS are loaded, but the tool performs no interactions with the page — no links are clicked, no forms are submitted.

Disclaimer: The results presented here might not be 100% correct. Bugs happen. This tool is meant to be used by site owners as a starting point for improvements, not as a rigorous analysis.

Text about HTTPS partly adapted from the CIO Council's The HTTPS-Only Standard (public domain). MaxMind's GeoLite2 country database (CC-BY-SA 4.0) is used for GeoIP lookups. See here for more information.