Hi,@Ella Taylor
This NDR is generated in the following scenarios:
Exchange Online connects to a remote email server, also known as a remote message transfer agent (MTA), to send an email message to an external recipient. During the TLS handshake, the remote MTA sends only a leaf certificate to Exchange Online without including the certificates of the intermediate certification authorities (CAs). If Exchange Online can't validate the authenticity of the certificate by building the chain to a Microsoft-trusted root CA, it generates an NDR for the sender.
A remote MTA connects to Exchange Online to send an email message to an Exchange Online recipient. During the TLS handshake, the remote MTA sends only a leaf certificate to Exchange Online without including the certificates of the intermediate CAs. If Exchange Online can't validate the authenticity of the certificate by building the chain to a Microsoft-trusted root CA, it rejects the email message. The remote MTA then generates an NDR for the sender.
You can refer to the solution below:
If you're an email admin in the remote MTA organization, configure your remote MTA to provide the full certificate chain.
If you're an email admin in the Exchange Online organization, notify an email admin in the remote MTA organization about the NDR.
If the answer is helpful, please click "Accept Answer" and kindly upvote it. If you have extra questions about this answer, please click "Comment".
Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.