Hey guys.
brama wrote:
[...]I have an issue with Lansweeper and Exchange scanning[...]
Me too - at least I _had!_ an issue with it...
😉[...]Please advice![...]
I'll try to.
😉First of all, instructions for Exchange scanning are hard to find as the original article from Lansweeper's KB is rubbish - scan acoount DOES NOT! need to be a domain admin but for proper scanning has to be member of the AD's "Domain Administrators" and "Organization Management" groups.
As long as you have your Windows firewalls turned off there is no problem at all with Exchange scanning. The fun part starts with firewalls enabled on either of your systems. For proper exchange scanning the
requirements from the KB article are not complete -
you need to configure your Exchange server(s) as well as your domain controller(s)!Combining all links and infos from this thread the following setup worked (at least for me). This is the quick n' dirty solution. If you e.g. have an internal Root-CA you can automate some of these steps concerning certificates. Further on, with the proper use of GPOs you can automate the steps for WSMan/WinRM configuration.
In a nutshell:
- Create self signed certificates on your DCs and Exchange servers (or use/export existing ones) - purpose is "Client Authentication"
- Import these certificates to "Trusted root" store on your scanning server
- Create a WinRM https listener on each DC and Exchange
- Trigger "Rescan Asset" for your Exchange server(s)
I used Powershell to configure my setup, will just leave those lines here - feel free to adapt them to your needs:
#Creating and exporting certificates
$hostName = $env:COMPUTERNAME
$serverCert = New-SelfSignedCertificate -CertStoreLocation Cert:\LocalMachine\My -DnsName $hostName
Export-Certificate -Cert $serverCert -FilePath \\server\share\PSR<hostname>.cer
#Configure WinRM on DC(s) and Exchange server(s)
Enable-PSRemoting -Force
New-Item -Path WSMan:\localhost\Listener\ -Transport HTTPS -Address * -CertificateThumbPrint $serverCert.Thumbprint -Force
New-NetFirewallRule -Displayname 'WinRM - Powershell remoting HTTPS-In' -Name 'WinRM - Powershell remoting HTTPS-In' -Profile Any -LocalPort 5986 -Protocol TCP
Restart-Service WinRM
#Import certificates on your scanning server
Import-Certificate -FilePath \\server\share\PSR<hostname>.cer -CertStoreLocation Cert:\LocalMachine\My
HTH!
😉Cheers,
Joerg
EDIT:
Just as an addition - I have one Exchange server where Exchange Management Shell does NOT! load the Exchange CMDlets. As expected, this server CAN NOT! be scanned by LanSweeper. Have to fix EMS and will try again. Pretty sure it'll work then.