Federal Migration Guide: Exchange Online GCC/GCC-High/DoD¶
Status: Authored 2026-04-30 Audience: Federal IT managers, Exchange administrators, and compliance officers migrating on-premises Exchange to Exchange Online in GCC, GCC-High, or DoD tenants. Scope: Tenant provisioning, compliance boundaries, data residency, FastTrack for government, hybrid configuration in government clouds, and FIPS endpoint requirements.
Overview¶
Exchange Online for US government is available in three cloud environments, each with increasing security and compliance controls:
| Environment | Authorization | Data residency | Isolation | Typical customer |
|---|---|---|---|---|
| GCC (Government Community Cloud) | FedRAMP High | US datacenters | Logical separation from commercial | Federal civilian agencies, state/local government, tribal entities |
| GCC-High | FedRAMP High + DoD SRG IL4 | US sovereign datacenters | Physically separated infrastructure | DoD contractors (ITAR/EAR), CUI, CJIS |
| DoD | FedRAMP High + DoD SRG IL5 | DoD-exclusive datacenters | Dedicated infrastructure | Department of Defense |
1. Tenant provisioning¶
GCC tenant¶
GCC tenants are provisioned through standard Microsoft government sales channels:
- Eligibility verification: Government entity validation required (federal, state, local, tribal).
- Licensing: Microsoft 365 G3 or G5 licenses.
- Provisioning: Standard M365 tenant provisioning with GCC designation.
- Timeline: 1--2 weeks for provisioning after contract execution.
# Verify GCC tenant
Connect-ExchangeOnline -UserPrincipalName admin@domain.us -ExchangeEnvironmentName O365USGovGCCHigh
# For GCC (standard), use default connection:
Connect-ExchangeOnline -UserPrincipalName admin@domain.gov
Get-OrganizationConfig | Select-Object Name, IsGovernmentCloud
GCC-High tenant¶
GCC-High tenants require additional validation and provisioning:
- Eligibility verification: Must handle ITAR, EAR, CUI, or CJIS data.
- Background screening: Microsoft performs additional vetting.
- Licensing: Microsoft 365 G3/G5 GCC-High licenses.
- Domain registration: Domains registered in the
.usgovernment cloud. - Entra ID: Separate GCC-High Entra ID tenant (not connected to commercial Entra).
- Timeline: 4--8 weeks for provisioning.
# Connect to GCC-High Exchange Online
Connect-ExchangeOnline -UserPrincipalName admin@domain.us `
-ExchangeEnvironmentName O365USGovGCCHigh
# Verify GCC-High environment
Get-OrganizationConfig | Select-Object Name
DoD tenant¶
DoD tenants are provisioned through DISA:
- Sponsorship: Must be sponsored by a DoD component.
- DISA approval: Defense Information Systems Agency approves provisioning.
- Licensing: Microsoft 365 G5 DoD licenses.
- Timeline: 8--16 weeks (security review and provisioning).
# Connect to DoD Exchange Online
Connect-ExchangeOnline -UserPrincipalName admin@domain.mil `
-ExchangeEnvironmentName O365USGovDoD
2. Compliance boundaries¶
Data residency¶
| Environment | Mailbox data location | Encryption at rest | Encryption in transit |
|---|---|---|---|
| GCC | US datacenters | AES-256 (Microsoft-managed keys) | TLS 1.2 |
| GCC-High | US sovereign datacenters (isolated) | AES-256 (Microsoft-managed or customer-managed keys) | TLS 1.2 (FIPS 140-2 validated) |
| DoD | DoD-exclusive datacenters | AES-256 (customer-managed keys supported) | TLS 1.2 (FIPS 140-2 validated) |
Feature availability by environment¶
| Feature | Commercial | GCC | GCC-High | DoD |
|---|---|---|---|---|
| Exchange Online Protection (EOP) | Yes | Yes | Yes | Yes |
| Defender for Office 365 P1/P2 | Yes | Yes | Yes | Yes |
| Microsoft Purview DLP | Yes | Yes | Yes | Yes |
| Microsoft Purview eDiscovery | Yes | Yes | Yes | Yes |
| Sensitivity labels | Yes | Yes | Yes | Yes |
| Copilot for M365 | Yes | Yes | Limited | Limited |
| Microsoft Teams integration | Yes | Yes | Yes | Yes |
| Consumer interop (Skype, consumer) | Yes | Yes | No | No |
| Third-party app marketplace | Yes | Yes | Limited | Limited |
| Power Automate connectors | Yes | Yes | Limited | Limited |
| Microsoft Graph API | Yes | Yes | Yes (gov endpoints) | Yes (gov endpoints) |
| Hybrid Configuration Wizard | Yes | Yes | Yes (gov endpoints) | Yes (gov endpoints) |
| FastTrack migration assistance | Yes | Yes | Yes (gov FastTrack) | Limited |
Feature parity delays
GCC-High and DoD environments typically receive new Exchange Online features 3--6 months after commercial availability. Plan for feature parity delays when evaluating migration timelines.
3. Hybrid configuration in government clouds¶
GCC hybrid¶
GCC hybrid configuration uses the standard Hybrid Configuration Wizard with GCC-specific service endpoints:
# GCC hybrid uses standard HCW
# Download from https://aka.ms/HybridWizard
# Key differences from commercial:
# - EOP endpoints: *.protection.outlook.com (same as commercial for GCC)
# - Autodiscover: autodiscover.outlook.com (same as commercial for GCC)
# - MX record: domain-com.mail.protection.outlook.com
# Verify hybrid configuration
Get-OrganizationRelationship | Format-List Name, DomainNames, TargetAutodiscoverEpr
Get-IntraOrganizationConfiguration | Format-List
GCC-High hybrid¶
GCC-High hybrid requires government-specific endpoints:
# GCC-High HCW differences:
# - Download HCW for GCC-High (same installer, detects environment)
# - EOP endpoint: *.protection.office365.us
# - Autodiscover: autodiscover.office365.us
# - MX record: domain-com.mail.protection.office365.us
# - OAuth endpoints: login.microsoftonline.us
# GCC-High MX record:
# @ MX 0 domain-com.mail.protection.office365.us
# GCC-High SPF:
# @ TXT "v=spf1 include:spf.protection.office365.us -all"
# GCC-High Autodiscover:
# autodiscover CNAME autodiscover.office365.us
# Connect to GCC-High for hybrid validation
Connect-ExchangeOnline -UserPrincipalName admin@domain.us `
-ExchangeEnvironmentName O365USGovGCCHigh
Get-OrganizationRelationship | Format-List
Test-OAuthConnectivity -Service EWS `
-TargetUri https://outlook.office365.us/ews/exchange.asmx `
-Mailbox admin@domain.us
DoD hybrid¶
DoD hybrid uses DoD-exclusive endpoints:
# DoD endpoints:
# - EOP: *.protection.office365.us (DoD-specific infrastructure)
# - Autodiscover: autodiscover.office365.us
# - OAuth: login.microsoftonline.us
# - FIPS 140-2 validated TLS required end-to-end
# Connect to DoD environment
Connect-ExchangeOnline -UserPrincipalName admin@domain.mil `
-ExchangeEnvironmentName O365USGovDoD
4. FastTrack for government¶
GCC FastTrack¶
- Availability: Full FastTrack services available for GCC tenants with 150+ seats.
- Engagement: Standard FastTrack request process via FastTrack portal.
- Services: Migration planning, hybrid configuration, mailbox migration, DNS guidance.
- Cost: Included with M365 G3/G5 licenses.
GCC-High FastTrack¶
- Availability: FastTrack available through government-specific engagement model.
- Engagement: Requires pre-authorization; contact your Microsoft government account team.
- Services: Same as GCC but with security-cleared engineers.
- Restrictions: FastTrack engineers must have appropriate clearances.
DoD FastTrack¶
- Availability: Limited FastTrack availability.
- Engagement: Coordinated through DISA and Microsoft DoD account team.
- Services: Planning and configuration guidance; migration execution may be customer-responsible.
- Restrictions: Cleared personnel required for all interactions.
5. FIPS 140-2 requirements¶
GCC-High and DoD FIPS compliance¶
GCC-High and DoD environments require FIPS 140-2 validated cryptographic modules for all data encryption in transit and at rest:
| Component | FIPS requirement | Implementation |
|---|---|---|
| TLS for mail flow | FIPS 140-2 validated | TLS 1.2 with FIPS-validated cipher suites |
| TLS for client connections | FIPS 140-2 validated | Outlook, OWA, ActiveSync use FIPS-validated TLS |
| Encryption at rest | FIPS 140-2 validated | AES-256 with FIPS-validated key management |
| S/MIME | FIPS 140-2 validated | Certificate-based encryption |
| Azure RMS (sensitivity labels) | FIPS 140-2 validated | Azure RMS uses FIPS-validated modules |
Connector TLS configuration¶
# GCC-High outbound connector with FIPS-validated TLS
New-OutboundConnector -Name "Partner - GCC-High" `
-RecipientDomains "partner.gov" `
-SmartHosts "mail.partner.gov" `
-TlsSettings CertificateValidation `
-TlsDomain "mail.partner.gov" `
-Enabled $true
# Verify TLS version on connectors
Get-InboundConnector | Format-List Name, TlsSenderCertificateName, RequireTls
Get-OutboundConnector | Format-List Name, TlsSettings, TlsDomain
6. Cross-premises in government¶
GCC-to-commercial interop¶
GCC tenants can exchange email with commercial M365 tenants and external organizations. Free/busy sharing with commercial tenants requires explicit organization relationship configuration.
GCC-High isolation¶
GCC-High tenants are isolated from commercial Microsoft 365:
- No consumer interop: Cannot federate with consumer Skype or Teams.
- No commercial tenant federation by default: Cross-tenant federation requires explicit configuration.
- GCC-High to GCC-High: Federation between GCC-High tenants is supported.
- GCC-High to commercial: Requires explicit external domain configuration and may not support all coexistence features.
DoD isolation¶
DoD tenants have the strictest isolation:
- DoD-to-DoD: Full interop between DoD tenants.
- DoD-to-GCC-High: Limited interop; requires explicit configuration.
- DoD-to-commercial: Not supported for most scenarios.
7. Migration timeline for government¶
gantt
title Federal Exchange Migration (GCC-High, 24 weeks)
dateFormat YYYY-MM-DD
section Pre-migration
Tenant provisioning (GCC-High) :a0, 2026-01-05, 6w
Security review & ATO update :a1, 2026-01-05, 4w
section Assessment
Environment assessment :b1, after a0, 2w
Identity & licensing readiness :b2, after b1, 1w
section Hybrid
Hybrid Configuration Wizard (Gov) :c1, after b2, 1w
OAuth & mail routing (Gov endpoints) :c2, after c1, 1w
Free/busy validation :c3, after c2, 1w
section Migration
Pilot migration (25 users) :d1, after c3, 2w
Wave 1 (100 users) :d2, after d1, 2w
Wave 2 (250 users) :d3, after d2, 2w
Wave 3 (remaining users) :d4, after d3, 3w
section Cutover
DNS cutover :e1, after d4, 1w
Monitoring & validation :e2, after e1, 2w
ATO documentation update :e3, after e2, 2w 8. ATO (Authority to Operate) considerations¶
Moving to Exchange Online changes the ATO boundary:
| ATO component | On-premises | Exchange Online (GCC/GCC-High) |
|---|---|---|
| System boundary | On-prem servers, network, facilities | Microsoft cloud + customer configuration |
| Inherited controls | None (all customer-managed) | FedRAMP High (inherited from Microsoft) |
| Customer-managed controls | All 325+ NIST 800-53 controls | ~50--80 customer-responsible controls |
| Assessment scope | Full stack (hardware through application) | Customer configuration, identity, policies |
| POAM items | Patching, vulnerability management, physical security | Configuration management, identity management |
| Continuous monitoring | Customer-managed vulnerability scanning | Microsoft continuous monitoring + customer config audit |
ATO documentation updates¶
After migration, update your System Security Plan (SSP) to reflect:
- System boundary change: Exchange servers removed from boundary; Exchange Online added as external cloud service.
- Inherited controls: Document FedRAMP High inherited controls from Microsoft.
- Customer-responsible controls: Document configuration controls (DLP, retention, access policies).
- Interconnection Security Agreement (ISA): Update ISAs for the Exchange Online connection.
- POAM updates: Remove on-prem Exchange patching POAMs; add cloud configuration management POAMs.
9. CSA-in-a-Box federal integration¶
CSA-in-a-Box extends Exchange Online migration value for federal organizations:
- Purview compliance: Same Purview instance governs email (Exchange Online) and data platform (CSA-in-a-Box). Single compliance boundary for both workloads.
- FedRAMP evidence: CSA-in-a-Box ships FedRAMP High control mappings in
csa_platform/csa_platform/governance/compliance/nist-800-53-rev5.yaml. Email compliance integrates with these control mappings. - Audit consolidation: Exchange Online audit logs and CSA-in-a-Box audit logs flow to Azure Monitor, providing a unified audit trail for FedRAMP continuous monitoring.
- CMMC alignment: Email DLP and sensitivity labels satisfy CMMC 2.0 Level 2 controls for CUI protection. CSA-in-a-Box maps these controls in
csa_platform/csa_platform/governance/compliance/cmmc-2.0-l2.yaml.
10. Government-specific troubleshooting¶
| Issue | Environment | Resolution |
|---|---|---|
| HCW fails to connect to GCC-High | GCC-High | Verify HCW is targeting .office365.us endpoints |
| OAuth test fails in GCC-High | GCC-High | Verify auth server uses login.microsoftonline.us |
| DKIM setup fails in GCC-High | GCC-High | Use GCC-High specific CNAME records (.office365.us) |
| FastTrack engagement delayed | GCC-High/DoD | Contact Microsoft government account team directly |
| Feature not available in GCC-High | GCC-High | Check Microsoft 365 Government service description |
| TLS cipher suite mismatch | GCC-High/DoD | Ensure FIPS 140-2 validated cipher suites on on-prem connectors |
| Entra Connect sync issues in GCC-High | GCC-High | Verify Entra Connect targets GCC-High Entra endpoint |
Maintainers: csa-inabox core team Last updated: 2026-04-30