Comments on: Certificate Warnings in Outlook After Installing Exchange Server 2016 https://practical365.com/outlook-certificate-warning-exchange-2016/ Practical Office 365 News, Tips, and Tutorials Wed, 30 Nov 2022 12:56:35 +0000 hourly 1 https://wordpress.org/?v=6.3.2 By: Richard Artes https://practical365.com/outlook-certificate-warning-exchange-2016/#comment-247726 Wed, 30 Nov 2022 12:56:35 +0000 https://www.practical365.com/?p=9024#comment-247726 Great article Paul, thanks! I spent 2 days trying to fix this. Now I found your helpful suggestions I fixed it.
Richard.

]]>
By: Wayne Hanks https://practical365.com/outlook-certificate-warning-exchange-2016/#comment-233007 Tue, 19 Jan 2021 03:47:21 +0000 https://www.practical365.com/?p=9024#comment-233007 Hi Paul,
Just a quick update on this. When I ran your script on exchange 2019 I got the following warning.

WARNING: The Set-ClientAccessServer cmdlet will be removed in a future version of Exchange. Use the Set-ClientAccessService cmdlet instead. If you have any scripts that use the Set-ClientAccessServer cmdlet, update them to use the Set-ClientAccessService cmdlet. For more information, see http://go.microsoft.com/fwlink/p/?LinkId=254711.

]]>
By: ChrisK https://practical365.com/outlook-certificate-warning-exchange-2016/#comment-230535 Wed, 05 Aug 2020 10:41:21 +0000 https://www.practical365.com/?p=9024#comment-230535 In reply to Paul Cunningham.

MS could have avoided this broken by design approach by making all new Exchange server installs put into a Deployed state, leaving them excluded from the AutoDiscover process until they’re properly configured, validated and put into a Production state. Scripting an AD Site /32 hack for the new server is the best workaround to avoid unnecessary helpdesk calls.

]]>
By: Jon Rixon https://practical365.com/outlook-certificate-warning-exchange-2016/#comment-230043 Sun, 21 Jun 2020 16:48:38 +0000 https://www.practical365.com/?p=9024#comment-230043 In reply to David.

Just to add to and clarify this answer, you can add a forward lookup zone of external.com in your internal Windows DNS servers, and then add an A record for mail.external.com in the forward lookup zone, pointing at your internal server IP address. This way when clients locally lookup mail.external.com they are instead returned the INTERNAL IP of your mail server. Since they are requesting the DNS name mail.external.com, the certificate is valid. As long as your internal URL is the same as the external, the clients won’t be asking for the server.internal.local address, because the SCP specifies the external DNS name, and the Autodiscover will too.

The trick is to use the cert for your external namespace by using the external namespace internally, by adding that namespace as a new forward lookup zone in your on-premise DNS. Optionally if you use the router for DNS, add another conditional rule which points at the internal DNS server for your external domain name.

The problem you will have is when you change web server, you need to remember to update the www record in you internal DNS as well.

]]>
By: Steve de Munck https://practical365.com/outlook-certificate-warning-exchange-2016/#comment-228757 Tue, 28 Jan 2020 19:24:15 +0000 https://www.practical365.com/?p=9024#comment-228757 Hi Paul,
You adviced to use a SAN certificate instead of an wildcard.

I re-used the wildcard cert from the previous server. all namespaces are correct, also all dns records are present and resolvable.

but still internal Outlook users gets the certificate warning from the internal servername. when you check the connectionsettings it points to the correct namespace. (mail.domein.nl)

could the warning be displayed because of the wildcard certificate?

]]>
By: David https://practical365.com/outlook-certificate-warning-exchange-2016/#comment-228623 Thu, 02 Jan 2020 17:08:59 +0000 https://www.practical365.com/?p=9024#comment-228623 In reply to Phil Tyler.

Hi Phil,

From my understanding, you cannot include any “.local” domain names in SSL certs anymore. Folks used to include them in the SAN field of the certificate (a security risk).

You could use DNS to control the resolution I believe if you setup a DNS forwarding zone (and it’s corresponding reverse lookup zone). Basically, the additional DNS forward zone will route DNS lookups of “.local” to whatever you specify. Basically, the DNS lookup for “.local” will go out your firewall and then back in, where it will routed appropriately, just like all other external users.

]]>
By: Maxwell Dumb https://practical365.com/outlook-certificate-warning-exchange-2016/#comment-228290 Mon, 28 Oct 2019 23:43:39 +0000 https://www.practical365.com/?p=9024#comment-228290 In reply to Udi Kappon.

Bingo. thanks!

]]>
By: Phil Tyler https://practical365.com/outlook-certificate-warning-exchange-2016/#comment-204148 Sat, 20 Apr 2019 15:03:31 +0000 https://www.practical365.com/?p=9024#comment-204148 For legacy reasons, we are stuck with a .local internal DNS name. You said in a comment above to “Use split DNS to control where it resolves to for internal vs external clients”. We have Exchange 2019 up-and-running; how do I stop the certificate error coming up every time Outlook 2019 starts? Our external domain name has a valid GoDaddy certificate which I’ve imported into Exchange and the OWA works fine from an internet connected PC as do iPhones connecting to Exchange, but the domain PCs throw up an error every time because “The name on the security certificate is invalid or does not match the name of the site”.

Our internal Exchange server name is like this…
fbvexch.domain.local

Our external domain for OWA is like this…
remote.domain.co.uk
this resolves to the internet address of our SonicWALL firewall that routes the traffic through to the IP address of the Exchange server.

#desperatecryforhelp #willhavelotsofgrumpyusers

]]>
By: Vasil https://practical365.com/outlook-certificate-warning-exchange-2016/#comment-198021 Sat, 30 Mar 2019 16:45:01 +0000 https://www.practical365.com/?p=9024#comment-198021 Thank you very much for all articles. You are the best!

]]>
By: Udi Kappon https://practical365.com/outlook-certificate-warning-exchange-2016/#comment-191296 Mon, 18 Feb 2019 13:52:55 +0000 https://www.practical365.com/?p=9024#comment-191296 Paul,

I think the most common mistake is that most of the people don’t change the Clietnaccess Server settings on the 2010 server to point to the New Exchange serverand that’s why they get the Certificate warning
i.e (As your settings)
set-clientaccessserver -identity EXHANGE2010 -AutoDiscoverServiceInternalUri https://mail.exchange2016demo.com/Autodiscover/Autodiscover.xml

]]>