Home
%3CLINGO-SUB%20id%3D%22lingo-sub-604329%22%20slang%3D%22en-US%22%3EExchange%20Active%20Directory%20Deployment%20Site%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-604329%22%20slang%3D%22en-US%22%3E%3CP%3E%3C%2FP%3E%3CP%3EWhen%20installing%20a%20brand%20new%20Exchange%20server%2C%20there%20are%20several%20things%20that%20you%20should%20consider.%20One%20of%20them%20is%20that%20things%20will%20go%20smoother%20if%20you%20deploy%20a%20new%20currently%20supported%20version%20of%20Exchange%20server%20into%20a%20live%20production%20environment%20by%20leveraging%20an%20Active%20Directory%20(AD)%20deployment%20site%20design%20option.%3C%2FP%3E%3CP%3EWhenever%20a%20new%20Exchange%20server%20that%20holds%20the%20Client%20Access%20Server%20Role%2C%20or%20any%20Exchange%202016%20server%2C%20is%20installed%20the%20setup%20process%20adds%20a%20new%20%3CA%20href%3D%22https%3A%2F%2Fmsdn.microsoft.com%2Fen-us%2Flibrary%2Foffice%2Fdn467395(v%3Dexchg.150).aspx%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EService%20Connection%20Point%20(SCP)%3C%2FA%3E%20record%20within%20Active%20Directory.%20SCP%20records%20are%20used%20by%20internal%20domain%20joined%20clients%20and%20applications%20to%20locate%20the%20%3CA%20href%3D%22https%3A%2F%2Fmsdn.microsoft.com%2Fen-us%2Flibrary%2Foffice%2Fjj900169(v%3Dexchg.150).aspx%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EAutodiscover%3C%2FA%3E%20service.%20Depending%20on%20your%20environment%E2%80%99s%20configuration%2C%20there%20is%20a%20chance%20clients%20may%20see%20this%20new%20SCP%20record%20and%20begin%20sending%20Autodiscover%20requests%20directly%20to%20the%20new%20server%20before%20you%20have%20had%20a%20chance%20to%20configure%20it.%20However%2C%20since%20the%20default%20self-signed%20certificate%20is%20not%20trusted%20by%20clients%2C%20then%20any%20client%20contacting%20this%20new%20server%20will%20start%20presenting%20certificate%20errors%20to%20end%20users.%20This%20is%20not%20the%20best%20experience%2C%20and%20it%20is%20easily%20preventable!%3C%2FP%3E%3CP%3ETo%20prevent%20clients%20from%20sending%20Autodiscover%20requests%20directly%20to%20this%20new%20server%20you%20may%20already%20be%20%E2%80%9Cnulling%20out%E2%80%9D%20the%20new%20SCP%20record%E2%80%99s%20AutodiscoverServiceInternalUri%20value%20or%20setting%20it%20to%20your%20friendly%20load%20balanced%20URL.%20This%20step%20will%20ensure%20clients%20will%20either%20not%20attempt%20to%20use%20the%20SCP%20at%20all%2C%20or%20if%20they%20do%20they%20will%20be%20sent%20to%20your%20load%20balancer%20with%20valid%20certificates%20already%20in%20place.%20While%20either%20method%20prevents%20clients%20from%20sending%20Autodiscover%20requests%20directly%20to%20the%20new%20server%20until%20you%20have%20had%20a%20chance%20to%20configure%20it%2C%20you%20are%20not%20out%20of%20the%20woods%20just%20yet.%20Clients%20sending%20Autodiscover%20requests%20to%20a%20server%20is%20only%20one%20half%20of%20the%20Autodiscover%20equation.%20We%20must%20also%20consider%20how%20Autodiscover%20responses%20are%20generated%20before%20being%20sent%20back%20to%20the%20clients.%3C%2FP%3E%3CP%3EIt%20is%20important%20to%20understand%20the%20server%20receiving%20the%20Autodiscover%20request%20not%20simply%20use%20its%20own%20settings%20to%20create%20the%20response.%20Instead%2C%20the%20receiving%20server%20identifies%20what%20version%20mailbox%20the%20user%20has%2C%20identifies%20what%20Active%20Directory%20site%20the%20user%E2%80%99s%20mailbox%20is%20currently%20mounted%20in%2C%20identifies%20information%20about%20the%20client%20being%20used%2C%20and%20identifies%20whether%20or%20not%20the%20user%E2%80%99s%20mailbox%20site%20is%20Internet%20facing.%20Once%20the%20receiving%20server%20has%20all%20of%20the%20information%20it%20needs%20it%20will%20then%20determine%20where%20to%20obtain%20the%20values%20it%20will%20use%20to%20create%20the%20Autodiscover%20response.%20Some%20of%20the%20values%20will%20be%20chosen%20from%20a%20%3CU%3Erandom%3C%2FU%3E%20server%20in%20the%20same%20AD%20site%20as%20the%20user%E2%80%99s%20mailbox%2C%20and%20if%20necessary%20due%20to%20the%20mailbox%20site%20being%20non-Internet%20facing%20other%20values%20will%20be%20from%20a%20%3CU%3Erandom%3C%2FU%3E%20server%20in%20the%20AD%20site%20with%20the%20least%20cost%20path%20that%20%3CU%3Eis%3C%2FU%3E%20Internet%20facing.%20The%20receiving%20server%20then%20compiles%20the%20values%20and%20returns%20them%20in%20the%20form%20of%20a%20single%20Autodiscover%20response%20to%20the%20client.%20If%20your%20brand%20new%20Exchange%20server%20resides%20in%20the%20same%20AD%20site%20as%20the%20user%E2%80%99s%20mailbox%20or%20the%20chosen%20Internet%20facing%20site%2C%20then%20your%20clients%20have%20a%20chance%20of%20seeing%20certificate%20popups%20due%20to%20your%20new%20server%E2%80%99s%20virtual%20directories%20and%20Outlook%20Anywhere%20configuration%20still%20having%20the%20default%20FQDN%20values%20in%20place.%20For%20example%20if%20Outlook%20where%20to%20attempt%20to%20download%20your%20Offline%20Address%20Book%20using%20the%20new%20server%E2%80%99s%20default%20setting%20of%20%3CA%20href%3D%22https%3A%2F%2Fexch2016-01.corp.contoso.com%2Foaby%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Ehttps%3A%2F%2Fexch2016-01.corp.contoso.com%2Foaby%3C%2FA%3E%2C%20then%20the%20client%20would%20see%20a%20certificate%20prompt.%3C%2FP%3E%3CP%3EWith%20this%20understanding%20we%20now%20should%20understand%20there%20are%20two%20things%20required%20to%20prevent%20a%20new%20server%20from%20introducing%20certificate%20warnings%20in%20an%20environment.%20First%2C%20we%20must%20prevent%20the%20new%20server%20from%20getting%20any%20requests%20directly%20from%20clients.%20Second%2C%20we%20must%20prevent%20this%20server%E2%80%99s%20default%20values%20from%20being%20used%20in%20a%20response%20generated%20by%20any%20other%20Client%20Access%20Servers%20(or%20Exchange%202016%20servers)%20that%20receives%20an%20Autodiscover%20request.%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CH2%20id%3D%22toc-hId-1759219872%22%20id%3D%22toc-hId-1767502877%22%3EHow%20to%20avoid%20this%20situation%3C%2FH2%3E%20%3CP%3EAD%20is%20smart%20enough%20to%20be%20%E2%80%98most%20restrictive%E2%80%99%20when%20a%20site%20subnet%20is%20defined.%20If%20you%20have%20a%20192.168.0.x%2F24%20subnet%20defined%20to%20an%20AD%20Site%20and%20a%20more%20restricted%20subnet%20of%20192.168.0.1%2F32%20to%20a%20different%20AD%20Site%2C%20the%20most%20restricted%20value%20is%20defined%20for%20that%20AD%20Site.%20(Note%3A%20a%20%2F32%20is%20a%20single%20IP%20address%2C%20which%20would%20be%20enough%20for%20a%20single%20server%20deployment.)%3C%2FP%3E%3CP%3ESome%20options%20exist%20that%20you%20can%20leverage%3A%3CUL%3E%20%3CLI%3EKeep%20reusing%20the%20same%20IP%20to%20deploy%20a%20server%2C%20and%20then%20change%20the%20IP%20of%20that%20server%20once%20the%20URL%E2%80%99s%20are%20configured%20and%20the%20certificate%20is%20installed.%3C%2FLI%3E%3CLI%3EChange%20the%20subnet%20definition%20in%20AD%20Sites%20and%20Services%20for%20each%20server%20you%20build%20and%20its%E2%80%99%20specific%20IP%20address.%3C%2FLI%3E%3CLI%3EUse%20a%20small%20subnet%20with%20several%20IP%E2%80%99s%20available%2C%20like%20a%20%2F29%20subnet%2C%20which%20has%206%20IP%20addresses%20(192.168.0.128%2F29)%20(range%3A%20192.168.0.129-192.168.0.134)%2C%20and%20setup%20up%20to%206%20new%20Exchange%20servers.%20Then%20once%20they%20are%20fully%20configured%2C%20just%20remove%20the%20%2F29%20subnet%20from%20AD%20Sites%20and%20Services%2C%20bounce%20the%20Exchange%20servers%2C%20reset%20the%20AutoDiscoverSiteScope%20values%2C%20and%20then%20they%E2%80%99ll%20answer%20proper%20values%20to%20your%20clients.%3C%2FLI%3E%3C%2FUL%3E%20%3C%2FP%3E%3CH3%20id%3D%22toc-hId--989450594%22%20id%3D%22toc-hId--981167589%22%3EWhat%20AD%20Site%20is%20the%20server%20in%3F%3C%2FH3%3E%20%3CP%3EBefore%20you%20install%20Exchange%2C%20check%20to%20see%20what%20AD%20site%20the%20server%20is%20in.%20In%20PowerShell%20on%20the%20local%20Exchange%20server%3A%3C%2FP%3E%3CP%20class%3D%22code%22%3Enltest%20%2Fdsgetsite%3C%2FP%3E%20%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Flegacyfs%2Fonline%2Fmedia%2FTNBlogsFS%2Fprod.evol.blogs.technet.com%2FCommunityServer.Blogs.Components.WeblogFiles%2F00%2F00%2F00%2F31%2F06%2Fmetablogapi%2Fimage_0441F81F.png%22%20original-url%3D%22http%3A%2F%2Fblogs.technet.com%2Fcfs-file.ashx%2F__key%2Fcommunityserver-blogs-components-weblogfiles%2F00-00-00-31-06-metablogapi%2Fimage_5F00_0441F81F.png%22%20target%3D%22_blank%22%3E%3CIMG%20title%3D%22image%22%20style%3D%22border-left-width%3A0px%3Bborder-right-width%3A0px%3Bbackground-image%3Anone%3Bborder-bottom-width%3A0px%3Bpadding-top%3A0px%3Bpadding-left%3A0px%3Bdisplay%3Ainline%3Bpadding-right%3A0px%3Bborder-top-width%3A0px%3B%22%20border%3D%220%22%20alt%3D%22image%22%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Flegacyfs%2Fonline%2Fmedia%2FTNBlogsFS%2Fprod.evol.blogs.technet.com%2FCommunityServer.Blogs.Components.WeblogFiles%2F00%2F00%2F00%2F31%2F06%2Fmetablogapi%2Fimage_thumb_5ACDB6DE.png%22%20original-url%3D%22http%3A%2F%2Fblogs.technet.com%2Fcfs-file.ashx%2F__key%2Fcommunityserver-blogs-components-weblogfiles%2F00-00-00-31-06-metablogapi%2Fimage_5F00_thumb_5F00_5ACDB6DE.png%22%20width%3D%22250%22%20height%3D%2253%22%20%2F%3E%3C%2FA%3E%3C%2FP%3E%3CP%3EAfter%20you%20install%20Exchange%2C%20you%20can%20change%20the%20IP%20or%20change%20the%20AD%20Site%20subnet%20definition%2C%20restart%20the%20server%2C%20and%20update%20the%20AutoDiscoverSiteScope%20value.%20Check%20the%20server%20again%20to%20ensure%20it%20is%20in%20the%20correct%20AD%20Site%20and%20also%20check%20to%20see%20if%20the%20other%20Exchange%20servers%20think%20it%20is%20in%20the%20correct%20AD%20Site%20by%20running%3A%3C%2FP%3E%3CP%20class%3D%22code%22%3EGet-ExchangeServer%20%7C%20FT%20Name%2CSite%20%E2%80%93Autosize%3C%2FP%3E%20%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Flegacyfs%2Fonline%2Fmedia%2FTNBlogsFS%2Fprod.evol.blogs.technet.com%2FCommunityServer.Blogs.Components.WeblogFiles%2F00%2F00%2F00%2F31%2F06%2Fmetablogapi%2Fimage_4A5545E3.png%22%20original-url%3D%22http%3A%2F%2Fblogs.technet.com%2Fcfs-file.ashx%2F__key%2Fcommunityserver-blogs-components-weblogfiles%2F00-00-00-31-06-metablogapi%2Fimage_5F00_4A5545E3.png%22%20target%3D%22_blank%22%3E%3CIMG%20title%3D%22image%22%20style%3D%22border-left-width%3A0px%3Bborder-right-width%3A0px%3Bbackground-image%3Anone%3Bborder-bottom-width%3A0px%3Bpadding-top%3A0px%3Bpadding-left%3A0px%3Bdisplay%3Ainline%3Bpadding-right%3A0px%3Bborder-top-width%3A0px%3B%22%20border%3D%220%22%20alt%3D%22image%22%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Flegacyfs%2Fonline%2Fmedia%2FTNBlogsFS%2Fprod.evol.blogs.technet.com%2FCommunityServer.Blogs.Components.WeblogFiles%2F00%2F00%2F00%2F31%2F06%2Fmetablogapi%2Fimage_thumb_4ECE575B.png%22%20original-url%3D%22http%3A%2F%2Fblogs.technet.com%2Fcfs-file.ashx%2F__key%2Fcommunityserver-blogs-components-weblogfiles%2F00-00-00-31-06-metablogapi%2Fimage_5F00_thumb_5F00_4ECE575B.png%22%20width%3D%22458%22%20height%3D%2277%22%20%2F%3E%3C%2FA%3E%3C%2FP%3E%3CP%3EAnd%20to%20see%20the%20Exchange%20AutoDiscoverSiteScope%20values%3A%20(pre-2016%20server)%3C%2FP%3E%3CP%20class%3D%22code%22%3EGet-ClientAccessServer%20%7C%20FT%20Name%2CAutoDiscoverSiteScope%20%E2%80%93Autosize%3C%2FP%3E%20%3CP%3EOr%202016%20and%20above%3A%3C%2FP%3E%3CP%20class%3D%22code%22%3EGet-ClientAccessService%20%7C%20FT%20Name%2CAutoDiscoverSiteScope%20%E2%80%93Autosize%3C%2FP%3E%20%3CP%3E%3CA%20href%3D%22%2Flegacyfs%2Fonline%2Fmedia%2FTNBlogsFS%2Fprod.evol.blogs.technet.com%2FCommunityServer.Blogs.Components.WeblogFiles%2F%2000%2F00%2F00%2F31%2F06%2Fmetablogapi%2Fimage_39DF6599.png%22%20original-url%3D%22http%3A%2F%2Fblogs.technet.com%2Fcfs-file.ashx%2F__key%2Fcommunityserver-blogs-components-weblogfiles%2F00-00-00-31-06-metablogapi%2Fimage_5F00_39DF6599.png%22%20target%3D%22_blank%22%3E%3CIMG%20title%3D%22image%22%20style%3D%22border-left-width%3A0px%3Bborder-right-width%3A0px%3Bbackground-image%3Anone%3Bborder-bottom-width%3A0px%3Bpadding-top%3A0px%3Bpadding-left%3A0px%3Bdisplay%3Ainline%3Bpadding-right%3A0px%3Bborder-top-width%3A0px%3B%22%20border%3D%220%22%20alt%3D%22image%22%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Flegacyfs%2Fonline%2Fmedia%2FTNBlogsFS%2Fprod.evol.blogs.technet.com%2FCommunityServer.Blogs.Components.WeblogFiles%2F00%2F00%2F00%2F31%2F06%2Fmetablogapi%2Fimage_thumb_4D8C4F2D.png%22%20original-url%3D%22http%3A%2F%2Fblogs.technet.com%2Fcfs-file.ashx%2F__key%2Fcommunityserver-blogs-components-weblogfiles%2F00-00-00-31-06-metablogapi%2Fimage_5F00_thumb_5F00_4D8C4F2D.png%22%20width%3D%22522%22%20height%3D%2275%22%20%2F%3E%3C%2FA%3E%3C%2FP%3E%3CP%3EOne%20last%20step%20after%20you%E2%80%99ve%20either%20changed%20the%20IP%20of%20the%20server%2C%20or%20removed%20the%20AD%20site%2C%20you%20need%20to%20update%20the%20AutoDiscoverSiteScope.%20In%20PowerShell%3A%3C%2FP%3E%3CP%20class%3D%22code%22%3ESet-ClientAccessService%20%3CSERVER%20name%3D%22%22%3E%20%E2%80%93AutoDiscoverSiteScope%20%3CNAME%20of%3D%22%22%20ad%3D%22%22%20site%3D%22%22%3E%3C%2FNAME%3E%3C%2FSERVER%3E%3C%2FP%3E%20%3CP%3EYou%20can%20then%20re-run%20the%20Get%20cmdlet%20to%20confirm%20that%20the%20values%20are%20what%20you%20need%20for%20your%20environment.%20This%20will%20help%20ensure%20that%20you%20typed%20the%20correct%20AD%20Site%20information%20in%20the%20previous%20cmdlet.%3C%2FP%3E%3CH2%20id%3D%22toc-hId-949873246%22%20id%3D%22toc-hId-958156251%22%3EConclusion%3C%2FH2%3E%20%3CP%3EThis%20process%20helps%20to%20ensure%20that%20clients%20will%20not%20be%20getting%20annoying%20pop-ups%20while%20you%20are%20installing%20additional%20Exchange%20servers%20into%20your%20production%20environment.%20It%20is%20still%20best%20to%20follow%20your%20companies%20change%20process%20and%20inform%20end%20users%20of%20potential%20notifications%2C%20but%20this%20should%20eliminate%20any%20unexpected%20Outlook%20interruptions.%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22author%22%3EMike%20O'Neill%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E

Note: This article received a major revision on 12/4/2019.

When installing a brand-new Exchange server, there are several things that you should consider. One of them is that the process will go smoother if you deploy a new Exchange server into a live production environment by leveraging an Active Directory (AD) deployment site design option.

There has been some confusion on what is required for a deployment site to work properly and therefore this information has been updated. Before we get into the prerequisites for a successful deployment site, let’s review how Autodiscover works with Outlook. If you want a deeper dive, here is a good white paper on the subject. Don’t be alarmed by the Exchange 2007 reference, the core functionality of Autodiscover has remained essentially unchanged and everything in the document is still accurate. Newer versions of Exchange have some added Autodiscover functionality but none of that effects this deployment site discussion.

When Outlook wants to make an Autodiscover query, it first contacts Active Directory (AD) looking for all SCP (Service Connection Point) objects. Every time a new Exchange server is installed, it is going to create a new SCP object that contains two pieces of information, the serviceBindingInformation attribute and the keywords attribute. The serviceBindingInformation attribute is a URL that points to either the Exchange server that created the SCP object or what URL is set using the Set-ClientAccessService command with the –AutoDiscoverServiceInternalUri attribute. The keywords attribute is a list of AD Sites that the SCP object is authoritative for. After Outlook obtains and enumerates the instances of the Autodiscover service, the client connects to the first Client Access service in the enumerated and sorted list that has a keywords match to its own site. If Outlook can’t find its own site in the list of SCP objects keywords attributes, it will use the newest SCP object created. Which just happens to be the SCP object of that shiny new Exchange server you just installed.

It is important to understand the server receiving the Autodiscover request does not simply use its own settings to create the response. Instead, the receiving server identifies what version mailbox the user has, identifies what Active Directory site the user’s mailbox is currently mounted in, identifies information about the client being used, and identifies whether or not the user’s mailbox site is Internet facing. Once the receiving server has all of the information it needs, it will then determine where to obtain the values it will use to create the Autodiscover response, some of the values will be chosen from a random server in the same AD site as the user’s mailbox, and if necessary due to the mailbox site being non-Internet facing, other values will be from a random server in the AD site with the least cost path that is Internet facing. If your brand new Exchange server resides in the same AD site as the user’s mailbox, the chosen Internet facing site, or is the newest SCP record and the Outlook client is not in a defined site then your clients have a chance of seeing certificate popups due to the new server’s virtual directories and Outlook Anywhere configuration still having the default FQDN values in place.

With this understanding of why Outlook finds that new Exchange server, it is easier to explain how to fix it. Often, there are many AD sites defined in AD that are not covered by an AutoDiscoverSiteScope. And those sites can contain Outlook clients. So, whenever you install a new Exchange server, all the Outlook clients associated with a site that is not part of an AutoDiscoverSiteScope will use the SCP record of the newest Exchange server. This will cause Outlook certificate prompts as well as incorrect URLs being given out for other Exchange services. When incorrect URLs are given, it will cause connection failures to a user’s mailbox.

With this understanding, there are three tasks required to prevent a new server from introducing certificate warnings and incorrect URLs to end users within an environment. First, the new server must be prevented from getting any requests directly from clients. Second, the new server’s default values must be prevented from being used in a response generated by any other Client Access Servers that receive an Autodiscover request. Third, all other AD sites must be defined in AutoDiscoverSiteScope values of Exchange servers.

How to avoid this situation

You need to create a “deployment” AD site. AD is smart enough to be ‘most restrictive’ when a site subnet is defined. If you have a 192.168.0.x/24 subnet defined to an AD Site and a more restricted subnet of 192.168.0.1/32 to a different AD Site, the most restricted value is defined for that AD Site. (Note: a /32 is a single IP address, which would be enough for a single server deployment.)

Here are choices when deploying new Exchange servers:

  • Keep reusing the same IP to deploy an Exchange server, and then change the IP of that server once the URL’s are configured and the certificate is installed.
  • Change the subnet definition in AD Sites and Services for each server you build and its’ specific IP address.
  • Use a small subnet with several IP’s available, a /29 subnet for example, which has 6 IP addresses (192.168.0.128/29) (range: 192.168.0.129-192.168.0.134), and setup to 5 new Exchange servers already available in the deployment site. Then once they are fully configured, just remove the /29 subnet from AD Sites and Services, bounce the Exchange servers, reset the AutoDiscoverSiteScope values, and then they’ll answer proper values to your clients.

Reminder, you’ll also need a Domain Controller (DC) in the same site as the new Exchange server(s) for the installation to work properly for each of these scenarios.

AutoDiscoverSiteScope for an organization

Now it is clear how Outlook finds that new server and that the AutoDiscoverSiteScope needs to be set, it is now able to be corrected in all AD sites that must be defined in the AutoDiscoverSiteScope per Exchange server. It can be a daunting task to find all your AD sites and make sure they are associated with an AutoDiscoverSiteScope for every Exchange server in an organization. Is there a solution available?

Yes, there is a fully functional solution to solve this AutoDiscoverSiteScope issue. In the Exchange_AddIn PowerShell module, the Set-AutoDiscoverSiteScopeExchangeServers function is available. (Didn’t want the noun to be confused with any other cmdlet, hence the long name.) At the easiest step, you can just run this function in an Exchange organization, it’ll scan all AD sites, exclude any deployment sites (that is a parameter that can be modified), and assign the rest of the AD sites to every Exchange server in the environment. This would be the easiest process for most customers.

Install the PowerShell module by running this code at a PowerShell elevated prompt:

 

Install-Module –Name Exchange_AddIn

 

If you set every single Exchange server, with the scope of every single AD site (minus the deployment one(s)), then when you stand up a new Exchange server (in a deployment site), that Exchange server will be ignored by Outlook clients. Since the AD sites are scoped correctly into the Exchange/AD forest, the clients will get a proper answer from a properly provisioned server and thus not fallback to the newest SCP record. Problem solved!

 

Set-AutoDiscoverSiteScopeExchangeServers

 

By using no parameters, this will set all AD sites in the forest, excluding anyone(s) with a search value of *deploy*, to every Exchange server AutodiscoverSiteScope value in the organization.

This line of code below will set all AD Sites in the forest, excluding the AD site of test, to all Exchange servers AutodiscoverSiteScope setting.

 

Set-AutoDiscoverSiteScopeExchangeServers -DeployADSiteExclusion 'test'

 

But what if you have a very large, complex environment? Fear not, the function can handle that request also. A bit more work on your part, but that’s a good thing. You can use the Export-CSVAllADSites function that creates a CSV file with 4 columns of data, one of them fully populated with AD sites in the AD forest. The other three columns, you must fill out: Identity, RegionForServers, and RegionForClients.

  • Identity: This is the Exchange server NETBIOS/FQDN names that the PowerShell code will read in, to set on specific servers.
  • RegionForServers: This column will be the regions that you want to assign Exchange servers to cover the Outlook client requests.
  • RegionForClients: This column needs to match the server regions as being defined on where the client AD sites reside, to which servers will handle the request.

Example CSV file:

Identity

RegionForServers

ADSite

RegionForClients

East-MBX01

East

E-ATL

East

East-MBX02

East

E-MCO

East

West-MBX01

West

E-BOS

East

West-MBX02

West

E-BWI

East

APAC-MBX01

APAC

W-LAX

West

APAC-MBX02

APAC

W-SFO

West

EMEA-MBX01

EMEA

W-SEA

West

EMEA-MBX02

EMEA

W-PHX

West

 

 

A-HND

APAC

 

 

A-HKG

APAC

 

 

A-MEL

APAC

 

 

A-SYD

APAC

 

 

M-LHR

EMEA

 

 

M-MUC

EMEA

 

 

M-FRA

EMEA

 

 

M-HAM

EMEA

Once this CSV file is filled out, you can import it into the Set-AutoDiscoverSiteScopeExchangeServers and it’ll set the Exchange severs, to the region that you define, to cover the Outlook clients closest to the Exchange serves, in the data center that makes sense for your organization. Therefore, any Outlook client, calling into a defined Exchange Autodiscover site scoped server, will avoid any new Exchange server SCP objects, since the AD site the client is claiming to be in, is defined in the Exchange servers. Problem solved. No more certificate prompts from Outlook clients when standing up new Exchange server where the services are not fully configured yet.

The code for importing a file named ADSiteInfo.csv from the c:\temp folder:

 

Set-AutoDiscoverSiteScopeExchangeServers -ImportFile C:\temp\ADSiteInfo.csv

 

The function has risk mitigation options built in, so you can run both or either of the -whatif switch and/or the -confirm parameter switches, before you blast this into production. With this CSV import, it is an all or nothing option. All servers listed, will use the regional values you set, by design. If there are any values already set, this function resets them to what you want. But this is what you need, as AD sites come and go, you wouldn’t want to retain older out of date values (or previously mis-typed ones), hence the reason you need to be careful and conscience with the values you put into the CSV file.

Even if you assign an AD site to a region that the mailbox is not optimal with bandwidth to attach to, by at least having them defined, the clients will get a proper response and ignore the non-configured SCP objects, since the AD site scope is properly answering a valid AD Site of where the client resides. As mentioned above, the Outlook client will search the keywords values of the list of Exchange server(s) in its’ own site, if it exists, else it uses AD Site link cost values to then get to the closest Exchange server. The key we are talking about here is, IF you don’t have all AD Sites listed for Exchange servers to answer, THEN you have a potential for certificate issues when deploying new Exchange servers.

New Exchange Server installation process.

Before performing a new Exchange Server installation, check to see what AD site the server Operating System thinks it is in. In PowerShell on the local Exchange server run:

nltest /dsgetsite

image

Once the Exchange Server application is installed, the IP can be changed or change the AD Site subnet definition, restart the server, and update the AutoDiscoverSiteScope value. Check the server again to ensure it is in the correct AD Site and check to see if the other Exchange servers think it is in the correct AD Site by running:

Get-ExchangeServer | FT Name,Site –Autosize

image

And to see the Exchange AutoDiscoverSiteScope values: (2010+)

Get-ClientAccessServer | FT Name,AutoDiscoverSiteScope –Autosize

Or 2013+ versions:

Get-ClientAccessService | FT Name,AutoDiscoverSiteScope –Autosize

image

One last step after you’ve either changed the IP of the server, or removed the AD site, you need to update the AutoDiscoverSiteScope. In PowerShell:

Set-ClientAccessService <server name> –AutoDiscoverSiteScope <name of AD Site>

You can then re-run the ‘Get’ cmdlet to confirm that the values are what you need for your environment. This will help ensure that you typed the correct AD Site information in the previous cmdlet.

If you are using the CSV file option to maintain records of Exchange servers, don’t forget to update it with servers you add or remove from the organization. You can re-run the Set-AutoDiscoverSiteScopeExchangeServers function whenever you want, just to ensure all servers are correct. Use reasonable judgment on how often to update the values, usually when AD sites are added/removed, or Exchange servers are added/removed.

Conclusion

There you go, a detailed explanation on how to fix this issue. Yes it sounds like more work, yes you need to be aware of any AD site updates, but it will solve your new Exchange server installs as the Outlook clients will have fully defined Autodiscover site scope values, excluded new Exchange server installs, and therefore will not have any unexpected interruptions presented to your end users.

Mike O'Neill and David Fife

16 Comments
Not applicable
My workaround is to immediately change SCP on the new server after installing a new server and point SCP to existing server/namespace:

Set-ClientAccessServer -AutoDiscoverServiceInternalUri https:///Autodiscover/Autodiscover.xml


It would be nice if MS could implement a new 'Put in production' feature. After installing a new server 'Put in production' is disabled and SCP is not returned from autodiscover requests for the new server.


After configuring (certificate etc) the new server, 'Put in production' is enabled so the new server returns SCP requests to clients.

Not applicable
Copy/paste error. Correction:"

Set-ClientAccessServer -AutoDiscoverServiceInternalUri https:///Autodiscover/Autodiscover.xml

Not applicable
The shortcoming to this approach is that it requires a site with an actual domain controller assigned to it since Exchange checks for that on setup.



For organizations that don't create Exchange servers often it probably isn't worth modifying the config of production sites/DCs just for this or to build out new DCs just for the dummy site.


I agree with Martijn that some kind of default pre-production status on new servers would be great.

Not applicable
Thx for the great ideas but having a workaround article is just like saying that this is to be expected. A larger organization will likely not allow the Exchange admin to change any settings in AD sites and services, especially on the fly. It means that

a reserve set of IP addresses for a staging environment in production will have to exist. Then when the IP address changes, I'm not sure if this would potentially cause communication issues for other Exchange servers in the same site without having to restart

their AD services. At least that is what I have faced in the past.


There are other things that have to be set on a new Exchange server in the same AD site as others, such as mail transport settings (client limits).



I third the motion that Martijn has proposed. It is simple and makes the most sense. I think it should be the other way though, default would be production, override setting during install would allow the new Exchange server to hold back from participation

until all configuration settings are completed.

Not applicable
Another option is to use my Set-AutodiscoverSCP.ps1 script. See

http://www.expta.com/2015/10/set-autodiscoverscpps1-script-is-now-on.html

Not applicable
Great Article Mike!. Something that many knew, but didn't had a good reference.
Not applicable
Excellent article; I wish there were more like it. Your articles are always informative and practical.
Not applicable
Thanks for putting this good article
Not applicable
I agree with Martjin and Ecmaster76. Setting up a Deployment Site is not practicable for many customers and a "pre-production" switch would be ideal.


Anyway, unfortunately, the script from Jeff does also not cover the issue, that immediately after installing the first Exchange 2016 server, his default FQDN set on all the virtual directories, used by the client will be published.

>>See topic "list" under the section "namespaces and Active Directory Site Topologies" in the article by Ross IV.:

http://blogs.technet.com/b/exchange/archive/2015/10/06/namespace-planning-in-exchange-2016.aspx


This situation will bring up instantly the issue that Outlook clients receives a Exchange Proxy URL with the mentioned FQDN of the new Exchange 2016 server until you change it and before you'll get time to finalyze other configuration "Exchange admin" tasks.


Today we had the problem described by Martjin here again with a customer:

https://social.technet.microsoft.com/Forums/en-US/d37afaed-da76-4201-9d3d-5eee834b6ebc/outlook-20102...



It would be good if the product group checks again other variants...

Senior Member

An old thread I know but I'm on the cusp of 54 new servers to build (Exchange 2016 CU13) and in a 24x7 company with 200k mailboxes and hundreds of AD sites, I'm now going to cause significant popup outage again with the infamous untrusted cert.  1st thing we do post build is to update the SCP record but it's still time for hundreds of clients to be given the popup warning whilst I wait for the install to complete then our script to republish the correct Load Balancer URL... This is an appalling design here and we're 4 years down the line from the original request not to publish SCP by default yet nothing has been done .. Sigh..................... 

Occasional Contributor
We are just about to implement Exchange 2016 (Current exchange environment is Exchange 2010) If we were to follow the the method of the article - do we need an additional Domain Controller for each Exchange Active Directory Deployment Site?
Occasional Visitor

I do not understand why it is not possible to put an option to the setup which configures the scp correctly. This is a MUST HAVE feature in my eyes since Exchange 2007. The documenation ist just an workaround.

Microsoft

Excellent work

Senior Member

I really appreciate you taking the time to clarifying the process required and recognising it's not easy to install a new server unless the AD Sites is set up correctly... I look forward to posting about how we corrected our own sites collection in the near year as it's definitely foo bar'd at the moment given we light up the helpdesk like a Xmas tree every time we install a new server..

Occasional Visitor

The even easier solution is to delete the serviceBindingInformation SCP information for the new server using adsiedit.msc before the server first boots its IIS services, then from the get go it wont be a problem. You can always add it back in with the proper URL once you've put the certificates on the box. This way you don't need to do any of the above.

Occasional Visitor
My solution is to enable firewall on the new server and explicitly block HTTPS (TCP/443) for all profiles. This prevents the clients to be able to connect to the autodiscover service (which causes the man issue). After the server is installed, on can just set the right service endpoint settings, wait for them to be applied and then remove the firewall block for HTTPS.