Outlook Error: Something went wrong [4usqa]

Outlook Error: Something went wrong [4usqa]

Hi All,

After i solved this Issue, i decided to write this Article to help others solve it too.

Initial situation

My Mailbox is in Exchange Online, but i have Full Access (with Automapping) to a Mailbox OnPrem, that is mapped into my Outlook Profile

About a Month ago, i did get this Error Message in Outlook.

Error
Something went wrong. [4usqa]

Correlation ld: 0f05e4c6-7doa-4e5a-962f-6611 b82fd6e4
Timestamp: 2025-10-22T06:07:14.000Z
DPTI: bbb47eogc0037aadeb4933ca14060b6975dcgc5bg 1 15 If8daOcb
Message: Access denied for the resource.
Tag: 4usqa
Code: 3399614475

I could close the Error Message, but Outlook was not connected to the Mailbox and showed “Need Password”

I could click on the “Need password” and the Mailbox was connected again. After a few Minutes the Error showed again

SignIn Logs

I’ve searched for the Correlation Id in the Entra SignIn Logs and found this

Found the CorrelationID in SignIn Logs
App owner tenant ID: f8cdef31-a31e-4b4a-93e4-5f571e91255a
Application: Microsoft Office
Application ID: d3590ed6-52b3-4102-aeff-aad2292ab01c

Results:

App ID seems to be Microsoft Office
d3590ed6-52b3-4102-aeff-aad2292ab01c (Microsoft Office)
Source: https://learn.microsoft.com/de-de/office/dev/add-ins/develop/register-sso-add-in-aad-v2

Home Tenant ID seems to be
displayName          Microsoft Services
tenantId            f8cdef31-a31e-4b4a-93e4-5f571e91255a
defaultDomainName sharepoint.com

I was using this PowerShell Code to get the Name of the TenantID

$TenantID = "f8cdef31-a31e-4b4a-g3e4-5f571eg1255a"
$Uri = ("https://graph.microsoft.com/V1.0/tenantRelationships/findTenantInformationByTenantId(tenantId='{0}')" -f $TenantID)
$ExternalTenantData = Invoke-mgGraphRequest -Uri $Uri -Method "GET"
$ExternalTenantData

Microsoft Information Protection API

There can be found several Articles like the one below, that suggest to check the Entra Enterprise Application “Microsoft Information Protection API” and set “Enabled for users to sign-in” to “Yes”

In my case the “Enabled for users to sign-in” was already set to “Yes”

Exchange Auth Server

I played around and figured out, when disabling the “IsDefaultAuthorizationEndpoint” in the EVOSTS* AuthServer the Error Message disappeared

Set-AuthServer -Identity evosts* -IsDefaultAuthorizationEndpoint $false

Exchange Hybrid Wizard

Now i did run the Exchange Hybrid Wizard - it finished with an OAuth Warning

So i ran it again, only with the OAuth Setting

This time it completed successfully - but the Error was still there when enabling IsDefaultAuthorizationEndpoint

Set-AuthServer -Identity evosts* -IsDefaultAuthorizationEndpoint $true

Service Principal Name

This leads me to have a look into the Service Principal Names of the Exchange Online Service Principal

Connect-MgGraph -Scopes Application.Read.All, Application.ReadWrite.All -NoWelcome
Get-MgServicePrincipal -Filter "AppId eq '00000002-0000-0ff1-ce00-000000000000'" | select -ExpandProperty ServicePrincipalNames

I found that the “Autodiscover” Entry was missing

# ADD ServicePrincipalName
Connect-MgGraph -Scopes Application.Read.All, Application.ReadWrite.All -NoWelcome
$SP = Get-MgServicePrincipal -Filter "AppId eq '00000002-0000-0ff1-ce00-000000000000'"
$SP.ServicePrincipalNames += "https://autodiscover.icewolf.ch/"
Update-MgServicePrincipal -ServicePrincipalId $SP.Id -ServicePrincipalNames $SP.ServicePrincipalNames

Check the ServicePrincipalNames

Connect-MgGraph -Scopes Application.Read.All, Application.ReadWrite.All -NoWelcome
Get-MgServicePrincipal -Filter "AppId eq '00000002-0000-0ff1-ce00-000000000000'" | select -ExpandProperty ServicePrincipalNames

Again enabled IsDefaultAuthorizationEndpoint on the evosts* AuthServer - the Issue was solved 😎

Get-AuthServer
Set-AuthServer -Identity evosts* -IsDefaultAuthorizationEndpoint $true

In case you need to remove a Service Principal Name (SPN) here is the code

# REMOVE ServicePrincipalName
Connect-MgGraph -Scopes Application.Read.All, Application.ReadWrite.All -NoWelcome
$SP = Get-MgServicePrincipal -Filter "AppId eq '00000002-0000-0ff1-ce00-000000000000'"
$SPN = $SP.ServicePrincipalNames | where {$_ -ne "https://autodiscover.icewolf.ch/"}
Update-MgServicePrincipal -ServicePrincipalId $SP.Id -ServicePrincipalNames $SPN

Summary

I would say, i have some skills to Troubleshoot an Issue. I was able to find the CorrelationID in the Entra SignIn Logs. But the leap from there to the Solution with the ServicePrincipalNames was more of a lucky coincidence, while poking around in the dark. The fun part is, it worked for several months without any issue - so there must have some Change in M365 - Entra, Exchange Online or even the Outlook Client. Anyway - hope this helps someone else to fix this issue and save the day. If so, you might consider to use the “Buy me a coffee” link on this Website.

Regards
Andres Bohren

EntraID Logo

Exchange Logo

PowerShell Logo