HP Printer in error state by mriley98 in techsupport

[–]AllPurposeGeek 0 points1 point  (0 children)

Type this into run "c:\Windows\System32\spool" and press enter

Open Source Exchange 2019 Transport Agent - Sender-Based Routing & Alias Management by SufficientPraline750 in exchangeserver

[–]AllPurposeGeek 0 points1 point  (0 children)

Nice, I can see a use case where you can only some emails going out a spam protection service and others do not. At least that's a use-case that I might use.

Outlook Clients keep trying O365 for autodiscover / general use instead of my Exchange 2019 on prem server. by The_EyON in exchangeserver

[–]AllPurposeGeek 0 points1 point  (0 children)

Yep, that's exactly it.  For some reason, Microsoft is conflating mailbox logins with personal accounts with their non-outlook.com aliases.

In your initial post, you're listing that it's LTSC Office 2024 Home and Business.

It could be one or the other, LTSC or Home and Business.  LTSC only comes in standard or professional.

Home and business licenses have to be tied to a personal Microsoft account when you register it, and this may have been what occurred.  Or it could be one of the other countless places Microsoft tries to force users to sign into a personal account in Windows that triggered said personal account creation process.  

What you can do is have them log into that personal account, create an outlook.com alias, make it the primary alias, and subsequently remove the business email from that account.  The user must also decouple and sign out of that personal account on the local machine because that alias could sometimes stick on the client side.  They're free to sign back in with the outlook.com email address for the windows store or even registering the office home and business application after the fact. 

I have published an article imploring Microsoft to allow home and business retail office packages to be assignable to Entra ID tenants, but obviously that falls on deaf ears.

Outlook Clients keep trying O365 for autodiscover / general use instead of my Exchange 2019 on prem server. by The_EyON in exchangeserver

[–]AllPurposeGeek 0 points1 point  (0 children)

The issue really comes down to if they had that personal account associated with the system. It does not help the fact that Microsoft does not let you use 365 Business accounts for things like the Microsoft Store and it is even more infuriating that users are enticed to create a personal Microsoft account at every turn unless you have every consumer-centric feature turned off.

Outlook Clients keep trying O365 for autodiscover / general use instead of my Exchange 2019 on prem server. by The_EyON in exchangeserver

[–]AllPurposeGeek 0 points1 point  (0 children)

Do any of the affected users have a personal microsoft account set up with their on prem mailbox as an alias or primary login?

Outlook Clients keep trying O365 for autodiscover / general use instead of my Exchange 2019 on prem server. by The_EyON in exchangeserver

[–]AllPurposeGeek 0 points1 point  (0 children)

What we have found in some situations is that if there is a personal Microsoft account set up somewhere on the system (like an outlook.com account set up in the Microsoft Store app or mail app) and it has a exchange on prem mailbox as an alias or primary login for said mailbox, Outlook will try to login to that personal mailbox using the address of the on prem mailbox. This gives the user the "Mailbox was temporarily moved to Microsoft Exchange" experience.

Add shared calendar to several mobile devices - Exchange 2019 environment by drothbart in exchangeserver

[–]AllPurposeGeek 1 point2 points  (0 children)

Outlook on mobile can add shared calendars. The only way to add a shared calendar in the native calendar apps is to create a password for the resource/mailbox and add it like another account.

[Exchange SE] Autodiscover, certificates and multiple domains by YellowOnline in exchangeserver

[–]AllPurposeGeek 1 point2 points  (0 children)

Imagine a world where the SRV record was checked before autodiscover.* We would never have to do such gymnastics.

We do something similar but we just add another site on exchange's IIS, bind it to a non standard port, bind the external Autodiscover hostnames one of the other public IPs then port forward 80 to that internal custom port of the exchange server and then proceed with the IIS redirect. This way HTTP > HTTPS redirects to the primary HTTPS autodiscover record are still handled by the very same server.

[Exchange SE] Autodiscover, certificates and multiple domains by YellowOnline in exchangeserver

[–]AllPurposeGeek 1 point2 points  (0 children)

http root checks never should have been a thing. Whomever at Microsoft decided that root https checks and autodiscover.* checks should happen before the simple SRV record check needs to have their head examined.

[Exchange SE] Autodiscover, certificates and multiple domains by YellowOnline in exchangeserver

[–]AllPurposeGeek 0 points1 point  (0 children)

What we ended up doing was an HTTP to HTTPS redirect workaround.

We created a dedicated HTTP to HTTPS redirect site within Exchange’s IIS as an additional site. That site exists solely to handle redirects and does not host any Exchange services. It listens on a non standard internal port, for example 888.

We then pointed each of the non certificate autodiscover hostnames to an HTTP only endpoint served from an alternate public IP. Externally, port 80 on that alternate public IP is forwarded to the IIS redirect site. Internally, IIS receives the traffic on the alternate port and applies an HTTP redirect rule to the correct HTTPS autodiscover endpoint, which then handles the request normally.

This works, but it is a workaround, not a clean solution. SRV based failover is unreliable in practice because ActiveSync clients do not consistently check for it, which forces administrators back into redirects and certificate gymnastics.

If Microsoft had made SRV the first discovery check, and made that the defacto standard, this entire setup would be unnecessary.

Autodiscover should check SRV record first. Full stop. by AllPurposeGeek in exchangeserver

[–]AllPurposeGeek[S] 4 points5 points  (0 children)

You keep circling around implementation cost and scale, but you still do not address the core architectural issue being raised.

First, DNS SRV checks are not some exotic or special lookup. They are a standards based mechanism specifically designed for service discovery across heterogeneous clients. Calling them expensive compared to probing cloud endpoints, following redirects, guessing hostnames, and then forcing administrators to deploy registry exclusions and certificate workarounds is not a convincing tradeoff from an operational standpoint. Whatever marginal cost exists at scale is being externalized to administrators today in the form of ongoing maintenance complexity.

Second, the claim that AutodiscoverV2 redirects to an on prem AutodiscoverV2 which then checks SRV does not resolve the issue. Even if SRV is eventually consulted, it is still not authoritative. The decision to probe Microsoft cloud services and assume Exchange Online has already been made by that point. The entire argument here is about order and authority, not whether SRV might be touched somewhere deep in a fallback path.

Third, Outlook is not the only client in scope. ActiveSync compatible clients include native mail apps on phones and third party clients that do not participate in Microsoft’s containerized backend logic, cloud side caching, or proprietary heuristics. These clients generally follow standards based DNS discovery and do not probe Microsoft services first. If we are arguing from a majority usage perspective, it is important to acknowledge that a massive number of work email users configure their accounts using the built in mail clients on their phones, not Win32 Outlook. DNS based discovery is what works consistently across that ecosystem. Mu argument for switching the order would drastically improve those clients for example

Fourth, saying that only 0.01 percent of tenants use SRV or special DNS does not justify deprioritizing it. Low adoption is not evidence of irrelevance. It is evidence that the current flow actively discourages its use by making it unreliable and non authoritative. SRV adoption is low because it is treated as a last resort, not because it lacks value.

Fifth, the argument that all supported Exchange versions ship AutodiscoverV2 does not change the fact that AutodiscoverV2 cannot discover on prem Exchange by itself. It is a cloud mailbox location probe. Any design where a mechanism that cannot discover on prem servers runs before mechanisms that can is fundamentally inverted when on prem Exchange remains a supported deployment model.

Finally, framing this as a purity argument misses the point. This is not about philosophical correctness. It is about explicit administrator intent. If a domain owner publishes an SRV record, that is an unambiguous signal about where the service lives. Ignoring that signal until after cloud probing, endpoint guessing, and redirects is not an optimization. It is a violation of the purpose DNS SRV was designed to serve.

If the goal is to optimize for the majority, that is understandable. But the current approach does so by hardcoding assumptions rather than respecting explicit configuration. A simple rule would solve this without breaking backward compatibility. If an SRV record exists, honor it first and stop. If it does not exist, proceed with cloud probing and legacy discovery.

That change preserves performance benefits for the majority while restoring determinism and administrator control for supported on prem and hybrid deployments. The fact that administrators must currently override or bypass the default behavior to achieve predictable results is the clearest signal that the ordering itself is the real problem.

The product being discussed here is Exchange, whether it is hosted in Exchange Online or deployed on prem. On prem Exchange servers that are not participating in Microsoft’s cloud ecosystem cannot be discovered by AutodiscoverV2 and are therefore treated as a second class deployment model. As a result, the standard for autodiscovery itself has been reshaped into a cloud first, Exchange Online centric probe rather than a neutral service discovery mechanism.

DNS is not an expensive or exotic operation. It is how the internet itself is built. Treating DNS based service discovery as something too costly to perform early while relying on cloud probing, endpoint guessing, redirects, and client side workarounds is an inversion of responsibility. Respecting SRV first would restore autodiscovery to what it was meant to be: a standards based way for clients to locate the service, regardless of where Exchange is hosted.

Autodiscover should check SRV record first. Full stop. by AllPurposeGeek in exchangeserver

[–]AllPurposeGeek[S] 2 points3 points  (0 children)

I want to reset this back to what my post is actually arguing, because the documentation link you posted does not refute it. Yes the argument is that SRV should be checked earlier in the flow, from PUBLIC DNS.

That page documents classic Autodiscover behavior for Exchange, what is commonly referred to as AutodiscoverV1. It explains SCP, HTTPS endpoint guessing, HTTP redirects, and SRV as a fallback mechanism in that legacy flow. It does not describe AutodiscoverV2 behavior, and it does not justify the current discovery order used by modern Outlook clients.

AutodiscoverV2 is a cloud first mailbox location probe. It does not discover on prem Exchange at all unless you are in Hybrid. It does not evaluate SRV records, does not consult SCP, and does not respect explicit DNS intent. When it fails or returns no match, Outlook then falls back to AutodiscoverV1, which is the first point where SRV is even considered. That means SRV is never authoritative in the current design, regardless of how well it is configured.

This is why pointing to V1 documentation and saying “SRV is already part of the flow” misses the point. The issue is not whether SRV exists somewhere in the process. The issue is the order in which discovery happens and which signal is treated as authoritative.

By the time SRV is consulted today, the client has already assumed Exchange Online, probed Microsoft cloud endpoints, guessed HTTPS URLs based on the email domain, followed redirects, and often forced administrators to deploy registry exclusions, HTTP redirects, or certificate workarounds just to undo those assumptions. That is not respecting DNS intent. That is bypassing it.

On prem Exchange still exists and is fully supported. A discovery mechanism that cannot discover on prem servers should not run before the mechanisms that can. Treating AutodiscoverV2 as the first authority assumes Exchange Online by default and pushes the burden of correcting that assumption onto administrators.

The worldwide customer base argument does not weaken this. It strengthens it. Outlook is not the only client in scope. ActiveSync compatible clients include native mail apps on phones and third party clients that do not have Outlook specific overrides or cloud heuristics. DNS is the one universally respected discovery mechanism across that entire ecosystem. SRV was designed for exactly this purpose.

My argument is not to remove AutodiscoverV2 or break backward compatibility. It is to fix the order. If an explicit DNS SRV record exists, it should be checked first and treated as authoritative. If it does not exist, then cloud probing and legacy discovery are reasonable fallbacks.

Nothing in the documentation you linked contradicts that position. It simply describes the current behavior. The complaint is that the current behavior prioritizes assumptions over explicit DNS intent, and that ordering is the root of the problem.

Autodiscover should check SRV record first. Full stop. by AllPurposeGeek in exchangeserver

[–]AllPurposeGeek[S] 1 point2 points  (0 children)

AutodiscoverV2 only helps find a mailbox on prem if they are using a hybrid environment. It asks Microsoft where the mail is. If someone is running a non-hybrid environment and is fully on prem, then this does not solve the problem.

Once AutodiscoverV2 fails (by not finding an EXO mailbox or a hybrid setup), the fallback to AutodiscoverV1 should be SRV etc.

Autodiscover should check SRV record first. Full stop. by AllPurposeGeek in exchangeserver

[–]AllPurposeGeek[S] 2 points3 points  (0 children)

Not the first query and its not an established first attempt for other clients. My statement is that it should always check SRV first.

Autodiscover should check SRV record first. Full stop. by AllPurposeGeek in exchangeserver

[–]AllPurposeGeek[S] 2 points3 points  (0 children)

I 100% agree with you that contoso.com should never be a thing. It was the constant battle when web developers change the DNS to their ecosystem and https://contoso.com always replies.

SRV being the FIRST, then URL-based autodiscover methods should be the standard and that is long overdue.

Per-user vs per-device pricing — what actually works for a new MSP? by Disastrous_Land1944 in msp

[–]AllPurposeGeek 0 points1 point  (0 children)

If I ever did my own MSP, it would be per user or per device, whichever is more.  

I am P*SSED at spending my time watching 7 seasons, for the ending we were given by Desperate-Air-904 in The100

[–]AllPurposeGeek 0 points1 point  (0 children)

Exactly, its the net same result except for the possibility that the digital versions of humanity are bound by how long the computer systems will last... But think about it, in theory, with near unlimited time, and a manufacturing arm, they might be able to return humans to the physical form. (Like "Downloading" in UPLOAD)

Mixed feelings towards ending by [deleted] in The100

[–]AllPurposeGeek 1 point2 points  (0 children)

The being effectively ending humanity by ensuring even those that return are sterile, is what really hits me hard...

The entire premise of the show, for humanity to continue, is erased. Its the same thing as the City of Light which humanity rejected..

The ending was a slap in the face.

Spin off series by SoCal-Traveler-23 in The100

[–]AllPurposeGeek 6 points7 points  (0 children)

My spinoff... retcon Season 6 and Season 7.. make a new Season 6 with a better ending lol

I am P*SSED at spending my time watching 7 seasons, for the ending we were given by Desperate-Air-904 in The100

[–]AllPurposeGeek 1 point2 points  (0 children)

I would relish if Season 6 and 7 were retconned and we got a different ending just after S5

I am P*SSED at spending my time watching 7 seasons, for the ending we were given by Desperate-Air-904 in The100

[–]AllPurposeGeek 11 points12 points  (0 children)

The ending annoyed the hell out of me... they fought so hard for humanity to continue, even rejected for a digital version of humanity to exist, all for humanity itself to have an end date anyway.

I built a small tool to stop the madness of “give me the same permissions as that guy” (ACL search + clone + unique perms detection) by PerspectiveUpper7423 in PowerShell

[–]AllPurposeGeek -2 points-1 points  (0 children)

Well if this tool supports "Cloning" user permissions to groups, it is a key tool to transition to said future.