Thursday, September 25, 2014

Disaster Recovery for Exchange Server in 30 minutes!

  • Introduction
  • The “Official Microsoft method” for Exchange disaster recovery
  • The “fast way” for Exchange disaster recovery
    • Exchange Server design
    • Disk imaging methodology
    • Backup methodology
    • Recovery procedure
  • Conclusion


Introduction 
What would be your reaction if I told you I intended to format the C partition on your production Microsoft Exchange server to run a quick test?  Your first reaction would probably be to grab the nearest blunt object for use on my head before I even got a chance to explain my self.  Unfortunately, this is no joke and the dire consequences of viruses, incompatible patches, or other malicious events on a companies Exchange server is all too often the worst living nightmare of any Exchange admin and their bosses.  In this article, I’ll show you how to protect your Exchange server with a method that recovers an Exchange server in 30 minutes!  Some of you at this point may wonder, “But I backup my exchange database, why do I even care about this?”  Unfortunately, an Exchange database is useless with out the original Exchange server in the original domain environment.  If anything bad happened to the OS or Exchange application where the server was not recoverable, the data would be worthless because you can’t just mount that database on any old exchange server.  Microsoft Exchange recovery is one trickiest things to execute, this article is meant to make that as painless and reliable as possible.
 
 
The “Official Microsoft method” for Exchange disaster recovery
If you’ve ever hired a Microsoft certified consultant or worked in a large corporation running Exchange, you’ve probably heard of or are using the “official Microsoft” method for Exchange disaster recovery.  Unfortunately, anyone thinking about or running this “official” method is a glutton for punishment.  The method involves maintaining a mirrored parallel universe of your Domain/AD and Exchange infrastructure.  It involves building a backup domain controller on your existing network, and then putting it in an isolated LAN and promoting it to the PDC.  Then you must carefully and meticulously build an Exchange server on that isolated LAN from scratch without making a single mistake in spelling using the identical settings of your production environment.  Only then can this parallel universe be used in the event of a catastrophic failure of your production Exchange environment.  This procedure is complex, prone to error, and expensive.  Needless to say and without getting further into the details of this clumsy formal methodology, you don’t want to go down this road because there is a better way.
 
Background note:  I’ve personally seen a high paid consultant spend 2 weeks implementing and documenting this disaster recovery plan for my company.  In the end, that same consultant could not replicate that environment using the documentation he wrote him self and finally gave up after a day. 
 
 
The “fast way” for Exchange disaster recovery
As a result of my personal experiences above, I refused to believe that this is what I must live with in order to have Exchange recoverability.  Believe me, I got plenty of flack for it from my collogues and the very same consultant who couldn’t read his own documentation and in turn had expected us to use in case of a disaster.  They insisted that this is the “official” way and is how all the big corporations do it.  At the time in year 2000, I was just beginning to use system imaging (a process of coping an entire hard drive or partition on to a single file called an image) to begin a large deployment of new workstations running Windows 2000 and all new applications.  I soon began to wonder, why not use system imaging for servers, and Exchange in particular.  It seemed a daunting challenge because these were high end servers running complex SCSI RAID 5 configurations and it seemed like imaging wouldn’t work.  As it turns out, since hardware RAIDs are completely transparent to the OS and applications, Norton Ghost or Power Quest Disk Image worked just as well on servers as they did on workstations.  Once I managed to get this working, I managed to build a test Domain and Exchange sever in which I took an image of the OS and Applications partition and managed to restore it in less than 30 minutes after I formatted the C drive (data resided else where).  I was confident that this would work to restore the basic Exchange server, but I wondered if the re-imaged Exchange server would recognize a more recent database if some additional emails were sent after the system image was taken.  I tried this in the lab and indeed it was possible, the image-restored Exchange server would even mount a newer database with more recent data.  What this meant was, even if I had made a month’s worth or any amount of updates to the database by just everyday usage, the Exchange server would have come up and brought up all the old and new data.  I realized had come across the ultimate disaster recovery procedure for servers and all that were needed was some refinement in the process.
 
The following refinements are what I came up with:
  • Exchange Server design
  • Disk imaging methodology
  • Backup methodology
  • Recovery procedure

Exchange Server architecture 
To make this recovery method feasible, a fundamental design must be followed on the Exchange Server.  Data must reside on a separate partition (physical preferred but logical is ok) from the OS and Application partition.  The last thing you want to image is 1 Gigabyte of OS/Apps plus 100 Gigabytes of data on a single partition.  You loose the granularity and convenience of being able to recover OS and Applications without affecting the Data.  For existing servers that already have data mixed in with the OS and Applications, you could add an additional storage device and move the data store and log files to separate partitions on the newly added device.  Ideally, one would go by the following guidelines for maximum safety, scalability, manageability and performance.

  • Put the OS and Applications on the C partition.
  • Log files (AKA transaction logs) on D partition.
  • DO NOT put log files on same physical device as the Exchange Data Store (Database), if that device failed and you lost the database, you would also loose the ability to recover data made after the tape backup from the Exchange transaction logs.  I’ve seen bad designs that do this and they paid dearly for it loosing a whole day’s worth of data because the storage device they housed the data store and log files on failed.  Their tape backups managed to restore everything up to the previous night, but loosing a day’s worth of emails in a large corporation is potentially a “resume producing event”.
  • Put the Data store on it’s own physical drive or block-level storage device such as a Fiber Channel or iSCSI (new IP based storage standard) SAN (Storage Area Network).  Better yet, use Exchange 2000 and break it up into multiple chunks along departmental lines and put them on separate physical RAID partitions.  The more separate physical partitions you use, the faster it performs.  This is due to the fact that a RAID partition can only seek one thing at a time without jumping around at a heavy cost to performance.  Two physical devices can seek two things at once without jumping back and forth between two tasks, and every physical partition you add gives you another simultaneous data seeker giving you a linear gain in performance.
  • In practice, this could easily and cheaply be accomplished on typical midsize servers with hardware RAID and six drives.  Three pairs of drives can be configured for RAID 1 mirroring to create three physical partitions.  The first partition could be broken down in to logical C and D partitions for OS/Apps and Log files respectively, and the second two physical partitions can be set as the E and F partition for housing multiple data stores.  Higher end solutions can use external SAN based solutions using a similar approach in RAID setup, this opens the possibility of clustering your Exchange 2000 server.  Do not just lump all 6 drives into one massive RAID 5 array and chop it up into multiple logical partitions, this method is cheaper because only one drive is lost to redundancy but it is at a horrible expense to seek time (three fold loss in seek times to be exact because all 6 drives must act in unison).  Hardware and Drives are so cheap now that it isn’t worth the savings.  In general, database applications are best described as death by a thousand tiny requests, simultaneous seeks capability is heavily favored over the improved sequential transfer rates that RAID 5 offers.
  • For Exchange 2000, put three data stores on the E partition and three data stores on the F partition.  Doing this makes recoverability and maintenance a snap.  If you put one large data store on one partition, you cannot safely use more than half the space on that partition.  If you need to compact a database during maintenance or if you needed to do a database repair in the event one of your data stores got corrupted, the minimum free space on that partition needed must be equal to the size of the data store you are compacting or repairing.  Three data stores on one partition means you would only need to reserve 25% of the partition for maintenance or repair jobs.  Database corruptions are common with any sort of database, having 6 data stores makes repairs 6 times faster and easier because the stores are 6 times smaller.  Additionally, the 5 remaining stores are not affected when the 6th data store is being compacted or repaired, allowing zero down time for most of the company.  I highly recommend Exchange 2000 or up because of this feature.

 
Disk imaging methodology
Before you start, be sure your Exchange server is in full operational order with all database store structure, anti-virus, backup agents, and anything else installed.  In order to image a system, you generally need a dump your image onto a separate physical partition from DOS mode, you cannot image a boot partition while that partition is loaded.  The easiest way to do this is to dump an image to a network file share. To avoid writing an entire 10 page chapter on how to create a TCP/IP network boot disk with SMB client capabilities and save you a ton of time, I’m going to say just one word; bootdisk.com.  www.bootdisk.com is the one stop place you can freely download pre-made bootable images that pretty much work with all common network adapters.  From there, you only need to make a few minor modifications to the drive mapping batch file to mount your network drives onto a drive letter.  I would then recommend that you make a bootable CDROM image of the modified floppy disk for vastly improved boot times.  Then you would simply boot up the CD with the network drivers and automatically map the network share.  That network share should also contain a recent copy of Norton Ghost or PQDI (Power Quest Drive Image).  From there, you simply run Ghost or PQDI and dump the C partition onto the network share.  Additionally, I would create an image backup of all the Log file and Data Partitions as well with just the database structure and no data.  Although imaging the data partitions is not mandatory, it will save you a lot of trouble by recreating the entire partition and database directory structures when doing a bare metal restore (starting from scratch with a new piece of identical or flushed hardware) of your Exchange Server.  Note:  The bare bone database structure partition images will be very small because they are almost all compressible.
 
With newer versions of Ghost or PQDI, they support a new hot backup feature where new changes to the OS and Application could be tracked while the system was operational.  Note that you must first create an initial image of the C partition in DOS mode.  Then you would track any changes to a production server even while the system is running by backing up all deltas to the OS and Applications with this new feature.  This is a valuable feature because it is not feasible to down your server just to do a cold image backup every other week.  Once all of this is in place, you can put your exchange server into production and start populating the Exchange data stores.
 
Backup methodology
Up to this point, everything has been focused on backing up the OS and Application partition using disk imaging software.  Backing up the data is equally important for an Exchange server.  For anyone serious about performing hot backups of an Exchange server, you must use a reliable 3rd party enterprise solution that hooks into Exchange with a backup and restore agent.  One of the better solutions I have seen is from Legato.  Some other solutions that I have worked with were utter nightmares and never worked consistently and couldn’t always successfully restore, which meant someone’s head was going to roll.  Since this article is not specifically about data backups, I will move on.  For the large enterprises that can’t even afford to loose an hour’s worth of data, I would recommend that you go the extra mile of continuously making copies of the log files onto a separate physical device with some automated hourly batch process.  Tape backup covers you up to the previous night and log files can cover you up to the last few minutes just before a database disaster.
 
Recovery procedure
There are several types of disasters that can happen to an Exchange Server such as database corruption and server corruption of the OS or Application.  In some cases you may be able to recover from a database corruption by running the repair operation on the affected data store or calling Microsoft and finding a way to fix a severe OS or Application error on the Exchange server.  However, in the even that the that a system completely dies where neither of the above options work or you simply loose an entire machine including all of the OS, Applications, Log files, and Data due to some catastrophic disaster, following the guidelines mentioned above is what is going to save you.  In the even of a catastrophe, you would run the following procedures.

  • If Exchange server can’t boot, or the Exchange Services refuse to load normally, proceed to the following steps.
  • Boot system with DOS disk with network support (same one you used to make image of C drive).
  • Load the C image with the image of the good exchange server from the network share where you keep all server image backups onto the corrupted C partition and reboot when complete.
  • If you were maintaining hot update backups with Power Quest Delta Deploy or Norton’s Ghost, apply those updates to your OS and Applications.  Reboot if needed.
  • If you had not lost the data partition or corrupted the database, then all should be well at this point.  The Exchange server should recognize and mount the database automatically.  This whole process up to this point can be done in 30 minutes.
  • If you lost the data as well, or you are doing a bare metal restore, you need to re-image the data partitions with the bare data structure images.  If you didn’t bother to do that, you will need to create the identical partitions and directory structure manually which may be very difficult.  (If you had put the data on a separate physical device, the odds of this happening simultaneously with an OS/App failure are slim).  Reboot if you re-imaged that log and database partitions.
  • Once rebooted, your Exchange server will be fully operational with an empty database.
  • Invoke the data recovery application and proceed to recover data from tape.
  • If you were wise enough to have copied the log files to another physical server/device before the disaster, now would be the time to copy those log files back and apply those logs to recover data up to the last couple of minutes before the Exchange server crashed.


Note, it is rare that you would need to do a bare metal recovery of an Exchange server, but following the above procedure ensures you have maximum recoverability of your business critical Exchange servers in any event.  On a last note, you should keep an off site tape copy of your images and database, this goes for any other critical server or application. 


Conclusion
The above procedure is the easiest and most reliable of way of recovering from an Exchange disaster.  However, you should note that the concepts apply to any other server or application.  Some may ask “but Microsoft doesn’t support this do they?” or “Microsoft does not support disk imaging”.  The truth is, I use disk imaging on all my servers and I have never been turned down for support at Microsoft, nor do they even ask if you using disk imaging at all.  I even maintain a library of generic system images of every type of system configuration I have so that I can deploy or redeploy any new server rapidly and have never been turned down for support.  Microsoft support is one of the more reasonable solutions out there, where else can you get unlimited attention until an issue is resolved for $250.  Additionally, Microsoft has already announced their own image deployment strategy with a new API called ADS (Automated Deployment Services) in which major players have already pledged their support.  Bottom line, disk imaging makes eminent sense and can be applied to any type of server or workstation.

Applying "Personal Tags" from user end in outlook / OWA 2013

  • Personal tags   Personal tags are available to Outlook 2010 and Outlook Web App users as part of their retention policy. Users can apply personal tags to folders they create or to individual items, even if those items already have a different tag applied. In Outlook 2010 and Outlook Web App, personal tags with the Move to Archive action appear as Archive Policy, and personal tags with the Delete and Allow Recovery or Permanently Delete actions appear as Retention Policy, as shown in the following figure.
    Personal tags in Outlook 2010 and Outlook Web App
    Messages that have a personal tag applied are always processed based on the personal tag's settings. Depending on the personal tags you create, users can apply a personal tag to a message so that it's moved or deleted sooner or later than the settings specified in the DPT or RPTs applied to that user's mailbox. You can also create personal tags with retention disabled. This allows users to tag items so they're never moved to an archive or never expire.
    NoteNote:
    Users can apply archive policies to default folders, user-created folders or subfolders, and individual items. Users can apply a retention policy to user-created folders or subfolders and individual items (including subfolders and items in a default folder), but not to default folders.
    Users can also use the Exchange Administration Center (EAC) to select additional personal tags that aren't linked to their retention policy. The selected tags then become available in Outlook 2010 and Outlook Web App. To enable users to select additional tags from the EAC, you must add the MyRetentionPolicies role to the user's role assignment policy. To learn more about role assignment policies for users, see Understanding management role assignment policies. If you allow users to select additional personal tags, all personal tags in your Exchange organization become available to them.
    NoteNote:
    Personal tags are a premium feature. Mailboxes with policies that contain these tags (or as a result of users adding the tags to their mailbox) require an Exchange Enterprise client access license (CAL).

Monday, September 22, 2014

Exchange Server + Autodiscover

  • From :- http://www.dominikhoefling.com/Blog/Post/8/Autodiscover

  • Autodiscover


    Autodiscover is a critical service to understand, because it automatically configures email profiles for Microsoft Outlook email clients, mobile devices like smartphones, tablets, and so on. It also provides the client URLs for features such as free/busy, Unified Messaging, the Out of Office assistant, shared and site mailboxes, and the OAB. Because Autodiscover information is refreshed when the email client is started and at regular intervals (every 60 minutes), it allows the administrator to move mailboxes without having to manually reconfigure every email client. The interval at which the client is expected to refresh its configuration can be changed with the Set-OutlookProvider cmdlet by setting the TTL parameter to the number of hours for the interval. Some clients, such as Windows Mobile devices, use Autodiscover for initial profile creation, but do not refresh the configuration once the profile has been created. Also, the email clients find the URL for Autodiscover differently based on whether the client has internal access or external access. The Autodiscover service is not used by Outlook versions prior to Outlook 2007.

    Internal Autodiscover Process

    Internal email clients are clients that are domain joined and that can successfully query an Active Directory server for Autodiscover information. The following figure shows the process for how internal email clients use Autodiscover.
     
    As you can see, the internal Autodiscover process includes the following steps:
    1. Clients search Active Directory for a Service Connection Point (SCP) object in the local domain.
    2. Active Directory returns all SCPs, and the client figures out which is the closest one and best to connect to.
    3. If querying the SCP was unsuccessful, the Autodiscover client attempts to use DNS to locate Autodiscover (Autodiscover A-record or SRV-record).
    4. The Client Access server returns the available service URLs to the client.
    5. An SCP object is created in Active Directory during the Exchange installation of the Client Access Server role with an AutodiscoverServiceInternalURI value equal to that of the fully qualified domain name (FQDN) of the server itself. You can view this value by entering the following command in the Exchange Management Shell: Get-ClientAccessServer | fl AutodiscoverServiceInternalURI, AutodiscoverServiceInternalUri: https://denver-ex01.fabrikam.com/Autodiscover/Autodiscover.xml.

    Configuring AutodiscoverSiteScope

    The AutodiscoverSiteScope property defines the Active Directory site or sites for which the Client Access server provides services. The property is set to the Active Directory site where the Client Access server was located during installation. The property is never updated automatically, even if the host is moved to a different Active Directory site. You must change this property if your Active Directory configuration changes or the Client Access servers are moved to another Active Directory site.
    Another key concept to understand is that the client attempts to connect to the closest Client Access server; however, the URLs and the configuration that the server returns to the client are for a Client Access server in the Active Directory site closest to the mailbox. Starting with the release of Exchange 2010 SP2 RU1, there is one exception to this behavior, and it's for the Offline Address Book (OAB) URL.
    Very few organizations have configurations where a Client Access server will need to service over 800 Active Directory sites; however, the upper limit of the number of entries in the AutodiscoverSiteScopeproperty is 800 entries. If you attempt to configure more than the limit using the Set-ClientAccessServer cmdlet, you will receive an ADMIN_LIMIT_EXCEEDED error. One way to work around this limit is to deploy more than one Client Access server in the Active Directory site and split up the AutodiscoverSiteScope entries between the Client Access servers. For example, assign 400 Active Directory sites to the AutodiscoverSiteScope property for one Client Access server and 400 to the other Client Access server. To ensure this works, you will also change theAutodiscoverServiceInternalURI parameter to reference a load-balanced name that includes all Client Access servers within the Active Directory site.
    Note If you have a large number of sites that do not have Exchange servers, check out Brad Hugh's blog for a script that automates site assignment:http://blogs.msdn.com/b/brad_hughes/archive/2008/05/20/autodiscover-and-client-only-sites-revisited.aspx.
    The SCP property AutodiscoverSiteScope for the Client Access server in the Denver site are set toDenver. Likewise, the AutodiscoverSiteScope property for the Client Access servers in the Miami site are set to Miami. The client computers in Denver will use Autodiscover from the Client Access servers in the Denver site, and the client computers in Miami will use the Client Access servers in Miami for Autodiscover. Client computers in Portland will use a Client Access server in either Denver or Miami because none of the Client Access servers are configured with Portland in the AutodiscoverSiteScope. This causes client computers in Portland to use Client Access servers in a site that is not optimal. To correct this issue, just set the AutodiscoverSiteScope on the Client Access servers in Denver to cover both Denver and Portland. Afterward, clients in those sites will use only the Client Access servers in Denver for Autodiscover. The picture shows the settings of AutodiscoverSiteScope in every Active Directory site where Client Access servers are located.
    2.png 
    You can see three Active Directory sites, with Client Access servers and Mailbox servers located in the Denver and Miami sites. Users using Outlook 2013 clients are located in all the sites. Remember that the configuration information the Client Access server returns is for the server closest to the user's mailbox, regardless of the location of the client computer. All subsequent Autodiscover requests still go to the Client Access server closest to the client computer—not the Client Access server closest to the mailbox. To achieve this configuration, you add the Active Directory site names by running a command such as the following:
    Set-ClientAccessServer –Identity DenverCAS –AutodiscoverSiteScope "Denver", "Portland"

    External Autodiscover Process

    If the client is external or non-domain joined, there is a different process for Autodiscover, as shown in the following figure:
     3.png
    The process goes like this:
    The client attempts to search Active Directory for a SCP and fails, because the client computer is not a domain member.
    The client attempts to connect to the Autodiscover service using a well-known URL made with the user's primary SMTP address (just the domain parts after the @). These well-known URLs include the following:
    • https://<domain-smtp-address>/Autodiscover/Autodiscover.xml, which tries the following URL
    • https://Autodiscover.<smtp-address-domain>/Autodiscover/Autodiscover.xml
    • If the previous attempt was unsuccessful, Outlook checks for a local XML file. If PreferLocalXML is set in the registry, the XML file settings override any other settings,
    • If no XML file is found, Outlook looks for an SRV record using the mailbox email address. (This applies only to Outlook 2007 clients with Service Pack 1 or later.)
    • Once Outlook finds the settings, it connects to the specified Client Access server, processes the request, and returns the best available service URLs for the user.

    Deploying a Static Autodiscover XML File

    As mentioned in the previous section, you can configure Autodiscover by deploying an XML-based file to the Outlook client computers. This might be required when an acquired company starts using the parent company's domain, resulting in two Exchange organizations in two Active Directory forests that use the same SMTP domain. In this situation, all the Outlook clients connect to the same Exchange organization. Use an XML file to configure the Outlook clients to connect to the correct Exchange organization. If you want the Autodiscover clients to use the XML file, you need to add the registry entry PreferLocalXML as DWORD value name with the value data 1 to force the static XML to be preferred over any other method. The following shows the configuration for Office 2013, for Office 2010 replace 15.0 by 14.0, for Office 2007 replace it by 12.0:
    • HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Autodiscover\
      PreferLocalXML
    Then you need to customize the path to the local XML file:
    • HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Autodiscover\
      [Domain Name]
    The value term of the key must be the full path to the XML file and the type must be a string. For example, the full path to the following XML file for the fabrikam.com organization is:
    C:\Program Files\Microsoft\Office15\OutlookAutodiscover\fabrikam.com.XML
    Of course, you need a way to deploy this XML file to all your client computers. A sample XML file and the schema for it is explained in the TechNet article: "Plan to automatically configure user accounts in Outlook 2010" found at http://technet.microsoft.com/en-us/library/cc511507.aspx.
    You might also use products such as System Center Configuration Manager or Active Directory Group Policies to push it out.
    Note A static Autodiscover XML file should be set only for two forests using the same SMTP name. After you perform the migration, we recommend that you delete the XML file and use Autodiscover.

    DNS SRV Record

    An option was introduced in an Outlook 2007 hotfix (and is included in Service Pack 1 and later) to find the Autodiscover service by querying for a DNS SRV record. This change in Outlook 2007 is extremely useful for Exchange organizations that have a large number of SMTP domains or that frequently change SMTP domains. For this example, we will use Litware as one of these vanity domains. One opportunity is to purchase a Subject Alternative Name (SAN) certificate with each SMTP domain name and point all the Autodiscover.<domain name>.com DNS records to one address; however, this can become expensive and it's a configuration that's difficult to maintain.
    To reduce the complexity of requesting certificates, a DNS service record for "Autodiscover" is created for the Litware.com domain on the Litware internal DNS servers and Autodiscover.fabrikam.com is set as the service host for Autodiscover. The end user will be prompted and must accept the request to allow the redirected site to configure the client, as shown in the screenshot:
    4.png 
    This request can be disabled if you use Outlook for Windows by creating a registry key on the Outlook 2013 client:
    • HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Autodiscover\RedirectServers
    If you want to disable it for Outlook 2010, replace 15 .0 with 14.0 in the registry key or 12.0 for Outlook 2007. Add a new String Value with the name of the HTTPS server to which Autodiscover can be redirected without prompting for confirmation from the user. For Fabrikam, the first String Value (REG_SZ) name would be fabrikam.com.
    With either method, the connection to the Client Access server is secured using SSL and certificates. For a secure connection to succeed, the certificate must be valid, meaning it must be trusted by the client computer, have a name that matches the URL the client connects to, and must not be expired. For Outlook 2007 domain-joined clients, Outlook will ignore the requirement for trusting the root certificate, allowing the out-of-box self-signed certificate to work. Regardless, it is recommended under all circumstances to replace the self-signed certificate with a valid commercial or internal public key infrastructure (PKI)-generated certificate. For further information to plan to automatically configure user accounts in Outlook 2010, visit the following TechNet link:http://technet.microsoft.com/en-us/library/cc511507.aspx.
    Note Outlook 2010 and Outlook 2013 reverse this behavior and will display a warning to the user if there is a self-signed certificate—even for domain-joined clients. This reinforces the best practice to replace the self-signed certificates with trusted certificates.
    If the default Autodiscover behavior is not satisfactory, you can customize the order—or even exclude specific steps—of the Autodiscover process. To change the settings, you must add one or more of the registry values listed in the table to the following key if you are using Outlook 2013 – remember, if you are using a different Outlook version, just exchange the version number:
    • HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Autodiscover

    DWord NameDescription
    PreferLocalXMLForces Outlook to prefer the XML file to all other information it receives
    ExcludeHttpRedirect
    Excludes lookups for a redirect from HTTP against the SMTP domain
    Example:http://Autodiscover.Contoso.com/Autodiscover/Autodiscover.xml
    ExcludeHttpsAutodiscoverDomain
    Excludes lookups for Autodiscover.[SMTP domain].com/
    Autodiscover/Autodiscover.xml
    Example:https://Autodiscover.Contoso.com/Autodiscover/Autodiscover.xml
    ExcludeHttpsRootDomain
    [SMTP Domain]/Autodiscover/Autodiscover.xml
    Example: https://Contoso.com/Autodiscover/Autodiscover.xml
    ExcludeScpLookupExcludes the Active Directory query for the SCP object
    ExcludeSrvRecordExcludes the DNS SRV record check


    Autodiscover Summary

    Autodiscover provides the necessary links to the clients for the services listed in the following table:
    ServiceDescription
    OutlookAnywhereRPC-over-HTTPS / MAPI-over-HTTPS Outlook connection endpoint
    Exchange Web ServicesHandles out-of-office messages, Availability Service, MailTips, third-party applications, among other things
    Exchange ActiveSyncResponsible for the automatic configuration of mobile devices
    Offline Address BookNecessary to connect the client to the correct OAB in the Exchange organization
    Unified MessagingUsed to collect information about Unified Messaging, voice mail, and so on