Sembee Blog of Exchange MVP Simon Butler

Approving Quarantined ActiveSync Devices with Exchange Management Shell

For some reason, the act of approving a quarantined device using EMS isn't immediately obvious. It took me a little while to work out how to do it. 

This command will show you what devices are quaranted:

Get-ActiveSyncDevice -filter {deviceaccessstate -eq 'quarantined'} | select identity, deviceid | fl

Therefore it would seem that set-activesyncdevice would be the correct command to use to approve the device. 

Not so. 

It is actually set-casmailbox. 

Take the device ID from the first command, you use it to complete this second command: 

Set-CASMailbox –Identity –ActiveSyncAllowedDeviceIDs DEVICEID

Give it about 15 minutes and the device will start to get email. 

Kemp Release Free Load Balancer Virtual Appliance

Kemp have released a free load balancing virtual appliance. If you have a small environment and don't need the high availability of two load balancers, then this could be an ideal solution. 

There are some limitations, particularly around the throughput (only 20mps) but if you are using a small environment or a lab, then it could be all that you need. Absolutely no reason to use Windows Network Load Balancing any more. 

If you have Kemp load balancers in your production environment, then it is an ideal way to have the same in your test environment. It will also make this a valuable learning tool for Exchange and server administrators. 

No support included, but that is to be expected. 

It looks like it is pretty much the complete feature-set from Kemp, including:

Layer 4/7 load balancing
Content switching
Caching, compression engine
MS Exchange 2010/2013 optimized
Pre-configured virtual service templates

The only thing it is missing features wise is Active/Hot Standby redundant operation.

If you are going to use this in a production site, then I would watch that maximum throughput though. 

Update for Visual Studio 2010 Tools for Office Runtime (KB3001652) Install Hang

10. February 2015 21:00 by Simon Butler in
Looks like the updates for today (10th Feb 2015) has an update that isn't installing correctly.

KB3001652 Update for Visual Studio 2010 Tools for Office Runtime.

On Windows 8.1 machines it seems to just hang.
However on a Windows 7 machine, I got a runtime installer appear, which required me to click through a few steps to install. 

Therefore it looks like it is hanging because the setup installer is hidden in the background. 

This was further confirmed by trying to reset the Windows Update system using my script from here:

In the command prompt window it said that a file couldn't be deleted because it was held open by another process. 

Looking in Task Manager, I found a setup.exe process running. Killing that process immediately brought up the Reboot now windows in Windows Update. I ran the script again and it was successful. A reboot also passed without incident, taking just a couple of minutes which was normal for the VM I was using. 

As the lab system I am testing against uses a WSUS, I declined the update. For home users, you should probably hide it. I expect it will get pulled by Microsoft very shortly. 

So the complete method to deal with this stuck update.

1. In task manager, find the setup.exe that is running in the background which you cannot see and end the task. 
2. Run the script from my web site above, to clean out Windows Update.
3. Reboot. 
4. Re-run Windows Update. When you see the update listed, hide it. 

Install all other updates as normal and reboot. 

Did Blackberry EZPass? Watch for automatic enrolment in support programme

20. January 2015 14:00 by Simon Butler in Blackberry, Blackberry 10
If you took advantage of the Blackberry EZ-Pass programme earlier this year to get free licences for BES 10 and then BES 12, you should have been receiving emails asking you to renew the support. For all EZPass upgraders, support expires on Jan 31st. 

However it is easy to miss in these emails is that if you do not opt out, then you will be invoices for the renewal automatically. This could end up being very expensive. For my four licences, Blackberry were asking for over £700!

"Important information on opting out 

If you do not wish to renew your Advantage Level Technical Support, you must opt-out of the program in order to avoid being invoiced following the close of the program. Please contact BlackBerry to receive instructions regarding the opt-out process."

What are the options here? 

There are a number of options available, depending on your own needs. 

  1. Renew. 
    The price quoted is for support on all of your Silver CALS that you got for free via the EZPASS programme. They also include support, so when BES 12.1 or higher is released, then you will be able to upgrade. 
  2. Opt out and pay nothing else.
    The EZPASS programme provided Silver Perpetual CALs. Therefore if you opt out, then you will stay on the version that you have now. You will be unable to upgrade to new versions of BES for free and will not get any support. You need to contact Blackberry for the opt out. You will then get an email with a link to a web site to click on and confirm the opt out. If you have not had that email then you have not opted out.
  3. Re-Purchase the licences fresh. 
    All new licences are annual subscription, so you need to pay to renew each year. This is what I am doing. New silver licences here in the UK are £15 a year, therefore I could renew my four licences for 10 years and still save money.
    However another client was quoted the equivalent of £12 a user, so it made sense to renew. 
    Furthermore, if after 12 months they decided not to renew, then their licences are still valid, as they are perpetual. There would simply be no further support available. 
Make a decision - doing nothing is not an option. 

Remember though, I am not an employee of Blackberry and therefore the advice above is my interpretation of the licencing of BES. If you are unclear, you should speak to Blackberry Sales. 

Outlook 2010 MAPI over HTTPS Support

15. January 2015 20:15 by Simon Butler in Exchange 2013, MS Exchange Server, Outlook
The hotfix for MAPI over HTTP support for Outlook 2010 has been released at last. 

Currently requiring a manual request and installation, no word on whether it will be available through any of the automated distribution methods. 

(This replaces kb2899591 released in December which was withdrawn). 

On the server, MAPI over HTTP requires Exchange 2013 SP1 (aka CU4) or higher. It is a new communication protocol for Exchange/Outlook communication which will eventually replace RPC over HTTP. 

For the client the hot fix requires Outlook 2010 SP2 to be installed. 

Lots more background on MAPI over HTTP on the Exchange team blog:

Changes to SSL Certificates

There have been a lot of changes to the way that SSL certificates are issued and the impact of those changes are now being particularly felt within the Exchange community. 

What has changed?

The CA/Browser forum (made up of the companies that issue the certificates and the browser developers who use them) decided that that all certificates issued with an expiry date after 1st November 2015 will be restricted to internet resolvable FQDN's only. 
This means that you cannot have an SSL certificate with:
- Single name hosts - such as intranet, server, exch01
- Internal only domains - such as server.example.local
- Internal IP addresses (both Ipv4 and Ipv6). 
This applies to both the common name and any additional names on the certificate. 

Furthermore, if you have a certificate that is still in force with an invalid name from the list above, then it will be revoked on 1st October 2016. 

How does this affect Exchange?

Exchange 2003 isn't really affected by this, because most people simply purchased standard single name SSL certificates. 

Exchange 2007 and later however are being impacted. 
During the early life of Exchange 2007 the advice for SSL certificates was to include both the internal and external host names of the Exchange server. This was because the default configuration of Exchange uses the server's real name and therefore did not require additional modification.

However it quickly became apparent that this wasn't the best way to deploy Exchange web services, as end users were entering the same address internally as they were externally. Split DNS was the answer there

Following the changes to the guidelines for issuing certificates, the changes to Exchange, including setup of a split DNS system is almost mandatory.
I have instructions on how to do that on my main web site at 

Going Forwards

With this change, you can now get away with just two host names on an SSL certificate for full client support:
With our own certificates coming with five "names" available by default, and unlimited server licence, this means you can use the other slots to secure additional services. Once the certificate has been installed on the Exchange server, export it and then import the certificate in to other servers that need it - along side the required intermediate certificate. 
If your DNS provider supports SRV records, then you can even use a standard single name SSL certificate. However mobile devices in particular seem to have some problems with the SRV autodiscover method, so if you are going to deploy mobile devices, stick with a UC (Unified Communications) type certificate. One of the cheapest sources for those is our own site

If you have a certificate with internal names that expires after 1st October 2016, then you should get it rekeyed with the internal names removed, so the certificate is not revoked. 

What else is changing?

From April 2015, the maximum period a certificate can be issued for is being reduced to 39 months. This is to ensure that the names on certificates are checked frequently that they still belong to the original purchaser.

SHA-1 certificates are being phased out very quickly and in 2017 Microsoft will stop trusting them. However a lot of browsers will start showing warning messages on these kinds of certificates in 2016. Therefore to protect yourself, ensure that you are requesting SHA-2 certificates and have replaced any SHA-1 certificates by the end of 2015.

Action Points

What should you do about your own SSL certificates?

  1. Check whether they are SHA-1 or SHA-2. 
    To do that, browse to the SSL site, then open the SSL certificate. Click on the Details tab and then look for Signature Hash Algorithm. It should NOT say SHA1. 
    Do not confuse with Thumbprint Algorithm, which will always say SHA1, no matter the type of the certificate.
    If they are SHA1, then get them rekeyed to SHA-2. If your provider doesn't allow that, then change provider.

  2. Check your server configuration and start to move everything over to use the same host name internally and externally. This is easily done by setting up a split DNS system, then changing the Exchange configuration. If your certificate still contains the internal names they will continue to work until you change the SSL certificate, providing a time to educate the end users about the names to use. 
Remember if you replace a certificate before it has expired, revoke the old one. This will often happen automatically when you get a certificate rekeyed, but it does no harm to do that yourself anyway. 

Net Framework 3.5 Installation errors Windows 2012/2012 R2

13. December 2014 10:30 by Simon Butler in Networking General
Recently tried to install Net Framework 3.5 on to an existing server which had been in production for a few months. 
Constantly failing with an error about being unable to find the source files, even though it was using an ISO which was used to build this and many other servers in the past. 

Clutching at straws, discovered that the server had a Windows Update installed, released in September 2014 for Net Framework 3.5, even though it wasn't installed. Some research on the internet indicated that it was one of these three:


Removing the update then attempting the installation again was successful. 

Once Net Framework had been installed, I ran Windows Update to reinstall the update I removed, plus numerous others that were required for Net Framework. 

Exchange 2010 Service Pack 2 End of Life

17. April 2014 10:45 by Simon Butler in Exchange 2010, MS Exchange Server

Completely forgot to mention last week that as well as Exchange 2003 going end of life, so did Exchange 2010 Service Pack 2. Therefore to continue to receive updates and support for Exchange 2010, you need to be on Exchange 2010 Service Pack 3. 

This follows Exchange 2010 RTM going end of life in October 2011 and Service Pack one in January 2013.

You can see the full list of Microsoft Exchange end of support dates on the Microsoft Lifecycle web site.

Farewell Exchange 2003

8. April 2014 14:55 by Simon Butler in Exchange 2003, MS Exchange Server

Today is the day that support for Windows XP ends, but it is also the end of another product that was much loved in its day and even now is still in widespread use, and that is Exchange 2003.


Exchange 2003 was where I really got heavily involved with the Exchange product. I had played around a bit with Exchange 5.5 and 2000 at previous employers, but it was around the time of Exchange 2003 SP1 release that I really started to spend time with it.


I was thrown in to a migration from Exchange 2000 to 2003 within weeks of starting a new job, and having built my first server, interest in the product grew very quickly. It was working on Exchange 2003 problems within the community that first got me recognition from Microsoft via their MVP programme - which I have just been received for the ninth year.


Getting RPC over HTTPS to work was my first major achievement, and it became one of the most popular articles on my web site. Documentation wasn't great and it required manual registry changes to work correctly.


I remember the joy of having the 16gb database limit increased to 18gb initially, up to 75gb with a registry change that was introduced with one of the service packs.


By the time we got to service pack 2, Exchange 2003 was a pretty rock solid product. Reliable, with plenty of third party support. The introduction of ActiveSync over HTTP was particularly important, as just a short time later the iPhone was released which took advantage of it. Until that point, mobile sync support was limited to Windows Mobile devices or Blackberry.
There was a version of ActiveSync at RTM, but until the HTTP version came out, it only really worked for users in the USA, who had free email to text services.


Looking at it now, Exchange 2003 is a fairly basic email application, but for many companies it does all that they need. However it is starting to show its age. There are problems with some modern ActiveSync devices and OWA does not like the modern browsers and unless you are using Internet Explorer, the OWA experience is pretty painful. The limitation of 75gb on a database in standard edition is very limiting for all but the smallest of companies.


It was also the last version of Exchange that was administrated purely through a GUI. However with email platforms becoming bigger all the time, a GUI only approach quickly showed its weaknesses and the move to a modern scripting language like PowerShell was overdue.



As with many things, it was good for its time, but the more modern versions of Exchange, particularly Exchange 2010 are simply much better, more feature rich and a lot more suitable for the demands of a modern IT infrastructure. 

Exchange 2007/2010/2013 Outbound SMTP Banner Testing

Back in 2009 I posted that automated tools like those at mxtoolbox will return false negative results on the SMTP banner tests. (


This is because the SMTP banner presented for inbound email is different to outbound email.


This is still the case with Exchange 2010 and 2013. You shouldn't try and change the Receive Connector configuration to "fix" this problem as will cause further issues with Exchange.


However with those tools providing false information, it raises the question of how do you easily test the banner so that you can see how a remote server will see your server?


Of course one way is to simply send an email to a remote server which you have control over, and check the headers. That isn't always practical and if you don't have your own server, using something Gmail or Hotmail might mean the message gets block because you haven't configured things correctly.


One of the blacklist operators has setup a system that will show you exactly what you are sending back, in the form of an NDR.

The details are here:


After sending the message, you will get an NDR back similar to this: rejected your message to the following e-mail addresses: ( gave this error:

*** The HELO for IP address was '' (valid syntax) ***


 A problem occurred during the delivery of this message to this e-mail address. Try sending this message again. If the problem continues, please contact your helpdesk.


Diagnostic information for administrators:


Generating server: #550 *** The HELO for IP address was '' (valid syntax) *** ##


Original message headers: 



This service is a quick and easy way to verify the server is configured correctly.