This is the Trace Id: 00908fc0ae59e37df1251f3279f4816a
Skip to main content
MSRC

Secure research starts with responsible testing.

Bounty Programs

Partner with Microsoft to strengthen our products and services by identifying and reporting security vulnerabilities that could impact our customers. 
 

IMPORTANT: The Microsoft Bounty Program is subject to these terms and those outlined in the Microsoft Bounty Terms and Conditions, Microsoft Bounty Legal Safe Harbor, Rules of Engagement, Coordinated Vulnerability Disclosure (CVD), Bounty Program Guidelines, and the Microsoft Bounty Program page.

CLOUD PROGRAMS

ProgramDescriptionAward Range
Microsoft IdentityVulnerability reports on Identity services, including Microsoft Account, Azure Active Directory, or select OpenID standards.Up to $100,000 USD
Microsoft AzureVulnerability reports on Microsoft Azure cloud servicesUp to $60,000 USD
Microsoft CopilotVulnerability reports on the Copilot AI experienceUp to $30,000 USD
XboxVulnerability reports on the Xbox Live network and servicesUp to $20,000 USD
Microsoft Azure DevOps ServicesVulnerability reports on applicable Microsoft Azure DevOps ServicesUp to $20,000 USD
Microsoft Dynamics 365 and Power PlatformVulnerability reports on applicable Microsoft Dynamics 365 and Power Platform applicationsUp to $20,000 USD
Microsoft DefenderVulnerability reports on Microsoft Defender for Endpoint APIsUp to $20,000 USD
M365Vulnerability reports on applicable Microsoft cloud services, including Office 365Up to $19,500 USD
Microsoft .NETVulnerability reports on .NET Core and ASP.NET Core RTM and future builds (see link for program details)Up to $15,000 USD
Open SourceVulnerability reports in select Microsoft owned open-source repositoriesUp to $15,000 USD

ENDPOINT & ON-PREM PROGRAMS

ProgramDescriptionAward Range
Microsoft Hyper-VCritical remote code execution, information disclosure and denial of services vulnerabilities in Hyper-VUp to $250,000 USD
Microsoft Windows Insider PreviewCritical and important vulnerabilities in Windows Insider PreviewUp to $100,000 USD
Microsoft Applications and On-Premises ServersCritical and important vulnerabilities in Microsoft Applications and On-Premises ServersUp to $30,000 USD
Microsoft Edge (Chromium-based)Critical, important, and moderate vulnerabilities in Microsoft Edge (Chromium-based) Dev, Beta, and Stable channelsUp to $30,000 USD
Microsoft 365 InsiderVulnerabilities on Microsoft 365 InsiderUp to $15,000 USD

ZERO DAY QUEST

OVERVIEW

As announced in the MSRC blogMicrosoft Zero Day Quest invites security researchers to discover and report high-impact vulnerabilities in Microsoft AzureMicrosoft CopilotMicrosoft Dynamics 365 and Power PlatformMicrosoft Identity, and M365 Bounty Programs. Zero Day Quest provides new opportunities for the security community to work hand in hand with Microsoft engineers and security researchers to share, learn, and build community as we work to keep everyone safe.

This challenge has two distinct opportunities:

Zero Day Quest will be subject to the terms of our bounty program, as outlined in the Microsoft Bounty Terms and Conditions and our bounty Safe Harbor policy, the applicable bounty program, and additional terms and conditions for the Research Challenge and Live Hacking Event.

 

HOW TO SUBMIT

Visit the MSRC Researcher Portal and follow the instructions to submit your reports.

Microsoft is not responsible for excess, lost, late, or incomplete submissions. If disputed, submissions will be deemed submitted by the “authorized account holder” of the email address used to enter. The “authorized account holder” is the natural person assigned to an email address by an internet or online service provider, or other organization responsible for assigning email addresses.

 

RESEARCH RULES OF ENGAGEMENT

To maintain the security and integrity of our services, all participants in Microsoft's bounty programs must strictly adhere to the Microsoft Security Testing Rules of Engagement (ROE). These guidelines are crafted to enable security researchers to assess the security of Microsoft Online Assets effectively while ensuring that other customers and infrastructure remain unaffected. For comprehensive details about these rules, please consult the Microsoft ROE website.

If you accidentally access unauthorized data, stop immediately. Notify MSRC with the details, delete the data, and acknowledge this in any bug bounty report. Do not share the accessed information.

 

RESOURCES FOR PROGRAM PARTICIPANTS

To help you with your Zero Day Quest submissions, check out sessions from the AI Red Team, Microsoft Security Response Center, and Dynamics teams:

 

PAST EVENTS

 

REVISION HISTORY

  • March 3, 2025: The Zero Day Quest Live Hacking Event launched. 
  • March 20, 2025: Added Flash Challenges for SharePoint Online and Exchange Online.
  • March 26, 2025: Added Flash Challenge for Copilot.
  • August 4, 2025: Published updates to the Zero Day Quest, Research Challenge, and Live Hacking Event pages.