cant get webservicesvirtual direcoty
Hi there,
I wanted to setup autodiscover on SBS 2008 because I can not set out of office reply in outlook. now when i want to run Get-WebServicesVirtualDirectory, I get this messeg: unable to create Ineternet information service (IIS) directory entery. Error messege
is : Access denied.
-HResult: -2147024891
has anybody got experinence on this issue. please share with me.
Many thanks in advance
September 17th, 2010 8:27pm
Hello,
What is user account you using ?
http://premnair.wordpress.com/2010/07/03/configure-ews-autodiscover-owa-oab-ecp-on-exchange-server-2010/
check this article to verify autodiscovery and you have to use SAN certificate to avoid certificate warnings.
Thanks
Mhussain
Thanks Mhussain
Free Windows Admin Tool Kit Click here and download it now
September 18th, 2010 2:32am
Hi Mhussian,
Thanks for your reply, however, the link you sent is what I have already done, I checked Test Email Autoconfiguration in outlook and it fails. to check external URL for the EWS, i run Get-WebServicesVirtualDirectory, which is what my orignal question is
that it fails.
I am runing it from Admin account.
Just to let you know this exchange server is on SBS 2008.
September 18th, 2010 2:04pm
Hi
Does the OOO works from OWA?
Have you purchased a 3rd part certificate?
Jonas Andersson MCTS: Microsoft Exchange Server 2007/2010 | MCITP: EMA 2007/2010 | MCSE/MCSA Blog:
http://www.testlabs.se/blog
Free Windows Admin Tool Kit Click here and download it now
September 18th, 2010 5:08pm
Hi Jonas,
Out office auto reply is working from OWA. but its just now working from outlook. We are using self-generated certificate.
September 18th, 2010 7:25pm
Hi Jonas,
Out office auto reply is working from OWA. but its just now working from outlook. We are using self-generated certificate.
Hi Ali
Are you using Self Signed SSL for exchange ? you need to use SAN (Subject Alternate Name) certificate for Exchange 2010 which is recommended by microsoft .
By default, when you install Exchange 2010, client communications are encrypted using SSL when you use Microsoft Office Outlook Web App, Exchange ActiveSync, and Outlook Anywhere.
Best Practice: Use SAN Certificates
http://technet.microsoft.com/en-us/library/dd351044.aspx#digitalcertificatesbestpractices
Thanks
MHussain
Depending on how you configure the service names in your Exchange deployment, your Exchange server may require a certificate that can represent multiple domain names. Although a wildcard certificate, such as one for *.contoso.com, can resolve this problem,
many customers are uncomfortable with the security implications of maintaining a certificate that can be used for any sub-domain. A more secure alternative is to list each of the required domains as SANs in the certificate. By default, this approach is used
when certificate requests are generated by Exchange.
Thanks Mhussain
Free Windows Admin Tool Kit Click here and download it now
September 19th, 2010 3:55am
I agree with Hussain, best practice is to use SAN/UCC cert
Check this one for creating CSR
https://www.digicert.com/easy-csr/exchange2007.htm
Installation of the cert
http://www.digicert.com/ssl-certificate-installation-microsoft-unified-communications.htmJonas Andersson MCTS: Microsoft Exchange Server 2007/2010 | MCITP: EMA 2007/2010 | MCSE/MCSA Blog:
http://www.testlabs.se/blog
September 19th, 2010 4:19am
Hi All,
I understand that I need to use SNA certificate to for outlook client to work perfectly, however, if i dont use at least I should be able to run the command, "Get-WebServiceVirtualDirectory" and get some out put.
I can not run this command on SBS 2008 server. I have another standard Server 2008 using self signed certificate and its working fine.
Also, I think for internal use we dont need to have a trusted certificate from external authority. we have been using for a year almost and works fine. but its just this SBS which I think keeps the virtual director in "SBS Web Applications" rather than "Default
Web Sites" in IIS.
Free Windows Admin Tool Kit Click here and download it now
September 19th, 2010 5:31am
Hi,
Have you applied any update for your Exchange Server?
If not, I recommend you to apply the latest update for Exchange and then check the issue again.
If yes, then please try to right-click the powershell.exe and choose run-as-admin and then check the issue.
Also please verify if "Microsoft Exchange Security Groups\ Exchange Trusted Subsystem" group is a member of local admin group of all Exchange 2007 server.
Regards,
Xiu
September 20th, 2010 4:57am
Hi Xiu,
Thanks for your messege, it seems that I can run the command "get-webservicesVirtualDirecotry" at least by right click on shell and open as administrator. and I can change Autodiscover url too, but dont know what should change it to coz i tried all url and
out of office not working, Outlook Test Email Autoconfiguration fails too. Any idea how to fix or least find what are the actaul virtual directory are?
Just to mention this on SBS 2008 server.
Free Windows Admin Tool Kit Click here and download it now
September 20th, 2010 5:06pm
Hi,
Please try to use get-exchangecertificate |fl and then post the result here.
We need to match the certificate with the autodiscover URL domain name.
Also please post the result of "Test E-mail autoconfiguration" here with detail error information.
We need to verify what URL that Outlook try to use to retrive the OOF information.
Regards,
Xiu
September 20th, 2010 11:14pm
Hi Xiu,
Please find get-cer and Test email result
AccessRules : {System.Security.AccessControl.CryptoKeyAccessRule, System
.Security.AccessControl.CryptoKeyAccessRule, System.Securi
ty.AccessControl.CryptoKeyAccessRule}
CertificateDomains : {computerangels.dyndns.org, dyndns.org, ANGEL01.angels.loc
al}
HasPrivateKey : True
IsSelfSigned : False
Issuer : CN=angels-ANGEL01-CA
NotAfter : 18/09/2012 23:24:52
NotBefore : 19/09/2010 23:24:52
PublicKeySize : 2048
RootCAType : Registry
SerialNumber : 4B50620A00000000000F
Services : IMAP, POP, IIS, SMTP
Status : Valid
Subject : CN=computerangels.dyndns.org
Thumbprint : 5E3577A67E5B41A090B03C78DEFD53151E166414
AccessRules : {System.Security.AccessControl.CryptoKeyAccessRule, System
.Security.AccessControl.CryptoKeyAccessRule, System.Securi
ty.AccessControl.CryptoKeyAccessRule}
CertificateDomains : {computerangels.dyndns.org, dyndns.org, ANGEL01.angels.loc
al}
HasPrivateKey : True
IsSelfSigned : False
Issuer : CN=angels-ANGEL01-CA
NotAfter : 18/09/2012 23:22:57
NotBefore : 19/09/2010 23:22:57
PublicKeySize : 2048
RootCAType : Registry
SerialNumber : 4B4EA64A00000000000E
Services : IMAP, POP, SMTP
Status : Valid
Subject : CN=computerangels.dyndns.org
Thumbprint : 5FFE8F79C9A09DE2F9FB6439B8A92954DFCBC7CF
AccessRules : {System.Security.AccessControl.CryptoKeyAccessRule, System
.Security.AccessControl.CryptoKeyAccessRule, System.Securi
ty.AccessControl.CryptoKeyAccessRule}
CertificateDomains : {computerangels.dyndns.org, dyndns.org, ANGEL01.angels.loc
al}
HasPrivateKey : True
IsSelfSigned : False
Issuer : CN=angels-ANGEL01-CA
NotAfter : 05/04/2012 15:41:41
NotBefore : 06/04/2010 15:41:41
PublicKeySize : 2048
RootCAType : Registry
SerialNumber : 22CC043B000000000008
Services : IMAP, POP, SMTP
Status : Valid
Subject : CN=computerangels.dyndns.org
Thumbprint : 73FEE24BA8F2899549FD11480B910D4CE10D3633
AccessRules : {System.Security.AccessControl.CryptoKeyAccessRule, System
.Security.AccessControl.CryptoKeyAccessRule, System.Securi
ty.AccessControl.CryptoKeyAccessRule}
CertificateDomains : {remote.abc.co.uk, abc.co.uk, ANGEL0
1.angels.local}
HasPrivateKey : True
IsSelfSigned : False
Issuer : CN=angels-ANGEL01-CA
NotAfter : 05/04/2012 15:10:46
NotBefore : 06/04/2010 15:10:46
PublicKeySize : 2048
RootCAType : Registry
SerialNumber : 22AFB1A8000000000007
Services : IMAP, POP, SMTP
Status : Valid
Subject : CN=remote.abc.co.uk
Thumbprint : 91FE0150F12D459444F239C43D10A6A4AB663BD9
AccessRules : {System.Security.AccessControl.CryptoKeyAccessRule, System
.Security.AccessControl.CryptoKeyAccessRule, System.Securi
ty.AccessControl.CryptoKeyAccessRule}
CertificateDomains : {remote.computerangels.dyndns.org, computerangels.dyndns.o
rg, ANGEL01.angels.local}
HasPrivateKey : True
IsSelfSigned : False
Issuer : CN=angels-ANGEL01-CA
NotAfter : 05/04/2012 15:09:59
NotBefore : 06/04/2010 15:09:59
PublicKeySize : 2048
RootCAType : Registry
SerialNumber : 22AEFCDA000000000006
Services : IMAP, POP, SMTP
Status : Valid
Subject : CN=remote.computerangels.dyndns.org
Thumbprint : 67D4BAE1688EC496EC7B97439234468A3721B908
AccessRules : {System.Security.AccessControl.CryptoKeyAccessRule, System
.Security.AccessControl.CryptoKeyAccessRule, System.Securi
ty.AccessControl.CryptoKeyAccessRule}
CertificateDomains : {remote.abc.co.uk, abc.co.uk, ANGEL0
1.angels.local}
HasPrivateKey : True
IsSelfSigned : False
Issuer : CN=angels-ANGEL01-CA
NotAfter : 26/03/2012 16:44:20
NotBefore : 27/03/2010 15:44:20
PublicKeySize : 2048
RootCAType : Registry
SerialNumber : 61052EBD000000000004
Services : IMAP, POP, SMTP
Status : Valid
Subject : CN=remote.abc.co.uk
Thumbprint : 5FB0392FCB6A8DE8AD658C77EAE574999D8DA8E9
AccessRules : {System.Security.AccessControl.CryptoKeyAccessRule, System
.Security.AccessControl.CryptoKeyAccessRule}
CertificateDomains : {ANGEL01.angels.local}
HasPrivateKey : True
IsSelfSigned : False
Issuer : CN=angels-ANGEL01-CA
NotAfter : 27/03/2011 16:27:45
NotBefore : 27/03/2010 15:27:45
PublicKeySize : 2048
RootCAType : Registry
SerialNumber : 61074098000000000003
Services : IMAP, POP
Status : Valid
Subject : CN=ANGEL01.angels.local
Thumbprint : F94F12B4C9DF5CABCC1EA60DECF6AD78D60F3C26
AccessRules : {System.Security.AccessControl.CryptoKeyAccessRule, System
.Security.AccessControl.CryptoKeyAccessRule, System.Securi
ty.AccessControl.CryptoKeyAccessRule}
CertificateDomains : {Sites, ANGEL01.angels.local}
HasPrivateKey : True
IsSelfSigned : False
Issuer : CN=angels-ANGEL01-CA
NotAfter : 26/03/2012 16:24:10
NotBefore : 27/03/2010 15:24:10
PublicKeySize : 2048
RootCAType : Registry
SerialNumber : 6103F8FE000000000002
Services : IMAP, POP, SMTP
Status : Valid
Subject : CN=Sites
Thumbprint : 968B4A7EF1009F059C7263541FE66BCE3EA2ED6E
AccessRules : {System.Security.AccessControl.CryptoKeyAccessRule, System
.Security.AccessControl.CryptoKeyAccessRule}
CertificateDomains : {angels-ANGEL01-CA}
HasPrivateKey : True
IsSelfSigned : True
Issuer : CN=angels-ANGEL01-CA
NotAfter : 27/03/2015 15:33:40
NotBefore : 27/03/2010 15:23:41
PublicKeySize : 2048
RootCAType : Registry
SerialNumber : 78E34014B49930AB42F996F8330A5098
Services : None
Status : Valid
Subject : CN=angels-ANGEL01-CA
Thumbprint : 2BFEB1A563053139AE8F31BFA396F75EFD671CE3
AccessRules : {System.Security.AccessControl.CryptoKeyAccessRule, System
.Security.AccessControl.CryptoKeyAccessRule}
CertificateDomains : {WMSvc-WIN-QI4ZZU918FQ}
HasPrivateKey : True
IsSelfSigned : True
Issuer : CN=WMSvc-WIN-QI4ZZU918FQ
NotAfter : 24/03/2020 15:12:53
NotBefore : 27/03/2010 15:12:53
PublicKeySize : 2048
RootCAType : Registry
SerialNumber : D8FD3C683158B1BE4F2A62FA7EEFA4EA
Services : None
Status : Valid
Subject : CN=WMSvc-WIN-QI4ZZU918FQ
Thumbprint : E05868F462743B471CD50C417D2DDF71B873E8F3
Test E-mail AutoConfiguration
Attempting URL
https://remote.abc.co.uk/autodiscoveer/autodiscover.xml found through SCP
Autodiscover to
https://remote.abc.co.uk/autodiscoveer/autodiscover.xml starting
Autodiscover to
https://remote.abc.co.uk/autodiscoveer/autodiscover.xml FAILED (0x80072F0C)
Autodiscover to https://abc.co.uk/autodiscoveer/autodiscover.xml starting
Autodiscover to https://abc.co.uk/autodiscoveer/autodiscover.xml FAILED (0x800C8203)
Autodiscover to
https://autodiscover.abc.co.uk/autodiscoveer/autodiscover.xml starting
Autodiscover to
https://autodiscover.abc.co.uk/autodiscoveer/autodiscover.xml FIALES (0x80072F0C)
Local autodiscover for abc.co.uk starting
Local autodiscover for abc.co.uk FIALED (0x8004010F)
Redirect check to
http://autodiscover.abc.co.uk/autodiscoveer/autodiscover.xml starting
Redirect check to
http://autodiscover.abc.co.uk/autodiscoveer/autodiscover.xml FIALED (0x8004005)
Srv Record lookup for abc.co.uk stating
Srv Record lookup for abc.co.uk Failed (0x8007251D)
Free Windows Admin Tool Kit Click here and download it now
September 21st, 2010 5:51am
Hi,
First I’d like to know if you have rename your autodiscover virtual directory. I noted that from the URL it is
autodiscoveer.
Please let me know if you have modified the SCP manually.
The certificate which thumbprint is 5E3577A67E5B41A090B03C78DEFD53151E166414 should be the correct certificate for the Exchange Server, But I found
that it do not have remote.abc.co.uk/abc.co.uk/autodiscover.abc.co.uk in the certificatedomains list. It just has
computerangels.dyndns.org, dyndns.org, ANGEL01.angels.local
For error 0x80072F0C, please try the following steps.
1. Highlight the virtual directory (AutoDiscover/EWS/OAB) and double-click on Authentication.
2. Click on Windows Authentication to highlight it, and then click on Advanced Settings.
3. Uncheck “Enable Kernel-mode Authentication” to remove the setting.
4. Click OK to save the setting.
5. Do an IISreset /noforce
Note:
We should set to ignore Client certificate on Autodiscover/EWS/OAB for the IIS SSL settings.
After that, please try to use Get-ClientAccessServer <CASname> |fl
and then verify if the AutodiscoverServiceInternalUri is point to correct url, it should be the SCP.
Also, you can try to browse the autodiscover internal URL and external URL from IE and then check the result.
Besides, please try to use
https://www.testexchangeconnectivity.com/ to have a check.
More information to share with you:
Configure Exchange Services for the Autodiscover Service
http://technet.microsoft.com/en-us/library/bb201695.aspx
Regards,
Xiu
September 21st, 2010 11:26pm