Exchange Online uses opportunistic TLS which works as follows:
By default, Exchange Online always uses opportunistic TLS. This means Exchange Online always tries to encrypt connections with the most secure version of TLS first, then works its way down the list of TLS ciphers until it finds one on which both parties can agree. Unless you have configured Exchange Online to ensure that messages to that recipient are only sent through secure connections, then by default the message will be sent unencrypted if the recipient organization doesn’t support TLS encryption.
As a non privileged user (e.g. someone without admin privileges), is there a way to determine if a particular partner organization is configured such that TLS encryption is forced? This is important in my current situation as our company must adhere to some governmental controls when sending certain data and would prefer forced TLS encryption over having to encrypt every attachment by some other means such as GPG:
Opportunistic TLS is sufficient for most businesses. However, for business that have compliance requirements such as medical, banking, or government organizations, you can configure Exchange Online to require, or force, TLS.
An admin account can quickly look at what mail flow connectors are configured to determine this setting, but is there a location or method that a non-privileged user has available to see if TLS encryption is forced or not?