Fix CloudM Migration Dates in Microsoft 365

Why CloudM Migrations Corrupt Dates in Microsoft 365

CloudM Migrate is a go-to tool for organizations moving mailboxes from Google Workspace, on-premises Exchange, or other platforms into Microsoft 365. The migration itself usually goes smoothly. Then someone opens Outlook and notices something alarming: every single email - thousands of them - shows the same received date.

What happened? During upload, Exchange Online's transport pipeline treats each migrated message as a fresh delivery. It stamps a new Received header with the current processing timestamp and sets the PR_MESSAGE_DELIVERY_TIME property accordingly. This property is what Outlook desktop, Outlook on the web, Outlook mobile, and even Microsoft's Copilot features all reference when displaying dates. Unlike Google Workspace (where the web client can mask the problem), Microsoft 365 shows the wrong date consistently everywhere.

That consistency is actually what makes the M365 version of this problem so visible. There is no "it works fine in the browser" escape hatch. Every user, on every device, in every Microsoft 365 application sees the migration date. IT teams typically discover the issue within hours of completing the CloudM migration, but by then the damage is already embedded in the message metadata at the server level.

How Wrong Dates Disrupt Microsoft 365 Environments

The impact ripples through the entire M365 ecosystem. Outlook desktop, OWA, Outlook mobile, Teams email integration, Microsoft Search - all show the migration timestamp. Users cannot escape the incorrect dates by switching applications. Imagine an attorney searching for "emails received between January and March 2023" in preparation for litigation. The search returns nothing, or returns everything, depending on when the migration happened. That is not a minor inconvenience; it is a potential discovery failure.

Microsoft Purview (formerly Compliance Center) and eDiscovery Premium index messages by the corrupted delivery date. Content searches based on date ranges produce unreliable results. Retention labels applied automatically based on message age operate on the wrong timeline, which means some messages get deleted too early while others are retained indefinitely. Auto-archive policies in Outlook miscalculate message age across the board. For any organization subject to regulatory email retention requirements, this creates a compliance gap that persists until the dates are corrected.

Frequently Asked Questions

Does CloudM offer any option to prevent date corruption during M365 migration?

CloudM preserves the original Date header in the message body, but Exchange Online's transport pipeline adds its own Received header during message processing. This is a server-side behavior that no migration tool can override. The only path to correct dates is post-migration correction.

Can Microsoft 365 admin tools fix the dates natively?

No. Microsoft 365 provides no built-in mechanism to modify the delivery time or Received headers of existing messages. PowerShell, the Exchange Admin Center, and Purview all lack this capability. Redate.io was built specifically to solve this problem through its pattern-matching correction engine.

Is the fix permanent in Microsoft 365?

Yes. Once Redate.io applies the correction, the original message is moved to a dedicated backup folder and the corrected message carries the proper date metadata. Microsoft 365 indexes the corrected date from that point forward across all clients and compliance tools.

How many mailboxes can Redate.io process in a Microsoft 365 tenant?

Redate.io can process mailboxes across an entire M365 tenant through Azure AD app registration with admin consent. There is no per-mailbox limit. Administrators manage the entire correction process from a single dashboard, and processing runs in the background without disrupting users.

Related fix guides

Free Scan