Senders should not use namespace mining tactics in opposition to Outlook.com inbound electronic mail servers. Here is the exercise of verifying e-mail addresses without sending (or seeking to send) emails to Those people addresses. This technique is commonly used by destructive senders to create lists of legitimate e-mail addresses which they can d