PrepAway - Latest Free Exam Questions & Answers

Which cmdlet should you run?

You have an Exchange Server 2010 organization. All users connect to their mailbox by using
Microsoft Outlook 2013 and Outlook Web App. All client connections to Exchange Server use the
name mail.contoso.com. You deploy Exchange Server 2013 to the organization, you move all of the
users to Exchange Server 2013, and then you decommission all of the Exchange Server 2010 servers.
The users report that when they open Outlook 2013, they receive a certificate warning message. The
users do not receive a certificate error message or a certificate warning message when they open
Outlook Web App. You need to prevent the certificate warning message from occurring when the
users open Outlook 2013. Which cmdlet should you run?

PrepAway - Latest Free Exam Questions & Answers

A.
Set-ClientAccessServer

B.
New-ExchangeCertficiate

C.
New-ClientAccessArray

D.
Import-ExchangeCertificate

Explanation:
UNABLE TO ASSOCIATE SET-CLIENTACCESSSERVER WITH CERTIFICATE ERROR
D LOOKS LIKE A BETTER RESPONSE.
IMPORT THE SSL CERTIFICATE AND THEN ASSIGN IT TO OUTLOOK 2013
Self-signed Certificate
When you install Exchange 2013, a self-signed certificate is automatically configured on the Mailbox
servers. A self-signed certificate is signed by the application that created it. The subject and the
name of the certificate match. The issuer and the subject are defined on the certificate. This selfsigned certificate is used to encrypt communications between the Client Access server and the
Mailbox server. The Client Access server trusts the self-signed certificate on the Mailbox server
automatically, so no third-party certificate is needed on the Mailbox server. When you install
Exchange 2013, a self-signed certificate is also created on the Client Access server.
This self-signed certificate will allow some client protocols to use SSL for their communications.
Exchange
ActiveSync and Outlook Web App can establish an SSL connection by using a self-signed certificate.
Outlook Anywhere won’t work with a self-signed certificate on the Client Access server. Self-signed
certificates must be manually copied to the trusted root certificate store on the client computer or
mobile device. When a client connects to a server over SSL and the server presents a self-signed
certificate, the client will be prompted to verify that the certificate was issued by a trusted authority.
The client must explicitly trust the issuing authority. If the client confirms the trust, then SSL
communications can continue.
Note:

By default, the digital certificate installed on the Mailbox server or servers is a self-signed certificate.
You don’t need to replace the self-signed certificate on the Mailbox servers in your organization with
a trusted third-party certificate. The Client Access server automatically trusts the self-signed
certificate on the Mailbox server and no other configuration is needed for certificates on the Mailbox
server.
Outlook 2013
When connecting to an Exchange server using Outlook 2013 you may encounter an SSL trust error.

This error occurs when the Exchange server is configured with a self-signed SSL certificate.

Outlook makes connections to the Exchange server over HTTPS and therefore must trust the SSL
certificate that is configured on the server, otherwise it will display those error messages to the end
user.
To resolve the issue install a valid SSL certificate on the Exchange server from a trusted certificate
authority.
See Exchange Server 2013 SSL certificates for more details on this as well as step by step
instructions.
A
Set-ClientAccessServer
Use the Set-ClientAccessServer cmdlet to set properties on specified Client Access server objects.
For information about the parameter sets in the Syntax section below, see Syntax.
EXAMPLE 1
This example sets two properties on the Client Access server CAS-01.
Set-ClientAccessServer -Identity “CAS-01” -AutoDiscoverServiceInternalUri
“https://cas01.contoso.com/autodiscover/autodiscover.xml” -AutoDiscoverSiteScope “Mail”
EXAMPLE 2
This example sets two properties on the Client Access server CASMail.
Set-ClientAccessServer -Identity “CASMail” -AutoDiscoverServiceInternalUri
“https://casmail.contoso.com/
autodiscover/autodiscover.xml” -AutoDiscoverSiteScope “Mail”
NOT B
New-ExchangeCertficiate
Not an Exchange 2013 command or any other Exchange version command
NOT C
Exchange 2010 command
Use the New-ClientAccessArray cmdlet to create an object that represents a load balanced array of
Client Access servers within a single Active Directory site.
EXAMPLE 1
This example creates the Client Access server array server.contoso.com.
New-ClientAccessArray -Fqdn server.contoso.com -Site “Redmond” -Name “server.contoso.com”
NOT D
Exchange 2013 command
Use the Import-ExchangeCertificate cmdlet to import a certificate or chain of certificates.
For information about the parameter sets in the Syntax section below, see Syntax.
EXAMPLE 1
This example imports an existing certificate and private key from the PKCS #12 file ExportedCert.pfx.
Import-ExchangeCertificate -FileData ([Byte[]]$(Get-Content -Path c:\certificates\ExportedCert.pfx Encoding
byte -ReadCount 0)) -Password:(Get-Credential).password

18 Comments on “Which cmdlet should you run?

  1. John says:

    The answer seems to be B.

    A — would be correct if the issue was the certificate name. You could then change AutoDiscover to point to the proper CAS:
    Set-ClientAccessServer -Identity “CAS1” -AutoDiscoverServiceInternalUri $NULL

    B — The issue is with the trust factor of the certificate, and not the name or expiration date. It appears to be a default self-signed cert created when the new 2013 servers were installed. New servers = new certs.
    Run New-Exchangecertificate (which is a valid Exchange command by the way) to start generating a cert request to send to a 3rd party trusted provider. Install the new trusted cert and chain to Exchange 2013 CAS, and the warning goes away.
    https://technet.microsoft.com/en-us/library/aa998327%28v=exchg.150%29.aspx

    C — New-clientaccessarray — no longer needed or used in Exchange 2013, besides being irrelevant to the problem.

    D — Implies there is an existing Trusted Certificate chain somewhere with the same name that can be imported to the new servers. The question mentions specifically that the Exchange 2010 servers have all been de-commissioned. The very fact that that is mentioned in the question implies that there are no trusted certs to import.




    0



    0
  2. BigHaig says:

    Assumption is that since OWA works via mail.contoso.com that it is not a certificate issue. This eliminates B and D. Exchange 2013 no longer uses CAS Array’s, so the only viable option is to set-clientaccessserver. You use set-clientaccesserver to specify what “name/dns name” to use for Outlook. So you would set this to match the certificate name or one of the SAN names (such as mail.contoso.com. By default it would be the servers name.




    0



    0
  3. Steven says:

    My understanding is that since OWA works correctly, then it is not a certificate issue.

    I have seen this sort of issue in the past, but it was more of an Exchange 2010-2007 coexist scenario rather than Exchange 2013-2010 coexist scenario, but I think the fundamentals are still similar. The issue was that they get a certificate warning when using Outlook, but not so when using OWA, and the issue turns out to be the SCP points are registered using the wrong URLs.

    Once we used Set-ClientAccessServer to point the SCP to the correct URL, this warning disappeared.

    So I think it is the same scenario here.




    0



    0

Leave a Reply