How to install an exchange server and SSL certificate in on-premises?
How to install an exchange server and SSL certificate in on-premises?
Exchange 2019 prerequisites for preparing Active Directory
You can use any member of the Active Directory domain to prepare Active Directory for Exchange 2019.
The computer requires the following software:
a. .NET Framework 4.8
b. Visual C++ Redistributable Package for Visual Studio 2012
C. Install-WindowsFeature RSAT-ADDS ( run this command in PowerShell)
Exchange 2019 Mailbox servers on Windows Server 2019 & Windows Server 2022
Install the following software:
a. .NET Framework 4.8
b. Visual C++ Redistributable Package for Visual Studio 2012
c. Visual C++ Redistributable Package for Visual Studio 2013
PowerShellCopy
Install-WindowsFeature Server-Media-Foundation
b. Install Unified Communications Managed API 4.0. This package is available for download and in the
Desktop Experience:
PowerShell
Copy:
Install-WindowsFeature Server-Media-Foundation, NET-Framework-45-Core, NET-Framework-45-ASPNET, NET-WCF-HTTP-Activation45, NET-WCF-Pipe-Activation45, NET-WCF-TCP-Activation45, NET-WCF-TCP-PortSharing45, RPC-over-HTTP-proxy, RSAT-Clustering, RSAT-Clustering-CmdInterface, RSAT-Clustering-Mgmt, RSAT-Clustering-PowerShell, WAS-Process-Model, Web-Asp-Net45, Web-Basic-Auth, Web-Client-Auth, Web-Digest-Auth, Web-Dir-Browsing, Web-Dyn-Compression, Web-Http-Errors, Web-Http-Logging, Web-Http-Redirect, Web-Http-Tracing, Web-ISAPI-Ext, Web-ISAPI-Filter, Web-Lgcy-Mgmt-Console, Web-Metabase, Web-Mgmt-Console, Web-Mgmt-Service, Web-Net-Ext45, Web-Request-Monitor, Web-Server, Web-Stat-Compression, Web-Static-Content, Web-Windows-Auth, Web-WMI, Windows-Identity-Foundation, RSAT-ADDS
Download - Exchange Server 2019 CU13 (2023H1) - cumulative update 13 exchange server
tinyurl.com/exchange2019pre ( download one file)
================================================================================
Installed all pre-requires tools
Exchange 2019 installation media or setup files.
Windows Server 2019 operating system installation media or ISO file.
Microsoft .NET Framework 4.8 (or later) and the .NET Framework 4.7.2 or later Cumulative Update.
Microsoft Unified Communications Managed API 4.0, Core Runtime 64-bit.
Microsoft Visual C++ 2013 Redistributable Package (x64).
Microsoft Visual C++ 2015-2019 Redistributable (x64).
Windows Management Framework 5.1.
Windows Remote Management (WinRM) 2.0 or later.
Internet Information Services (IIS) with the required components and features.
Windows Server roles and features necessary for Exchange Server operation, such as the Mailbox Server role, Client Access Server role, Edge Transport Server role (if required), and so on.
Active Directory and Domain Controller setup with the necessary configurations, including DNS and Active Directory preparation for Exchange.
The Exchange 2019 product key or licensing information.
The latest cumulative update for Exchange 2019 (if available).
Exchange Server 2019 CU13 (2023H1)
(Cumulative Update 13 for Exchange Server 2019 (KB5020999) - Download
tinyurl.com/exechange2019pre
https://medium.com/Beepin
Create folder inside the E: drive
Program Files>Microsoft>Exchange Server > V15
Download root certificate:
Go to DC1 server
Add roles and features : Active Directory Certificate Services
Certification Authority
Certification authority Web Enrollment
Click on Triangle button, and configure certificate
Go to open DNS
Make sure inside the domain, there are
Dc1, mail and autodiscover hosts are available or not.
Right click on DC1 > “Update server data files”
Again Right click on DC1> All Tasks>Restart
Now go to “Exchange server or mail server
Try to “ping to mail.akshrestha.com -4” and “ping to autodiscover.akshrestha.com
(should be ping both”)
Now Mount this file in Exchange server (Mail server):
NOW in exchange server or mail server:
Download root certificate: http://dc1/certsrv
Try to open this linkL: https://mail.akshrestha.com/ecp
Open browser: type http://dc1/certsrv
Click on “Download a CA certificate” option
Click on “Download CA certificate” option and click on “Keep” button
Finally you will see the “certnew” certificate (note: don’t rename it)
Now double click the “certnew” certificate > Open
Click on “Install certificate” button
Choose “Local Machine” > Next
Choose “Place all certificates in the following store > click on “Browse button”
Choose “Trusted Root Certification Authorities”> OK>Next>Finish
You will see below message “The import was successful” > click ok.
Now open “Run” Type “mmc” >OK
Click File>Add/Remove Snap-in…
Choose “Certificates” option > click on “Add “> OK
Choose “Computer account” option > Next
Click finish > Click on OK
You can see “root "certificate like below (Yellow shadow)
Now Open DC1 server:
And add that certificate in GPO
Open “Group Policy Management” - choose Default Domain Policy”
Right click on “Default domain policy”>Edit
Now choose “Policies>windows settings>security settings>Public key policies>Trusted Root Certification Authorities
Right click on right column and choose “Import”
Import the “certnew”
Open cmd : as administrator and gpUpdate
You also do gpUpdate in “exchange mail server also” and in every pc also.
Exchange admin center:
3. Now open an exchange management shell to create an exchange certificate.
4. Create Certificate file - certificate request - create zebras file use below command
$txtrequest = New-ExchangeCertificate -GenerateRequest -SubjectName "c=US,o=akshrestha,cn=mail.domain.com" -DomainName autodiscover.domain.com, mail.domain.com
[System.IO.File]::WriteAllBytes(‘\\mail\certs\rootcertnew.cer’, [system.text.Encoding]::Unicode.GetBytes($txtrequest))
2. Import Certificate
Import-ExchangeCertificate -Server mail -FileData "\\mail\certs\ExchangeCert.cer" -Password (Get-Credential).password
3. Enable Certificate : (Do notForget to replace Thumb print )
Enable-ExchangeCertificate -Server "mail" -Thumbprint 75AF5AF6FAEE0A07FB84B4F7B0980873F49F703A -Services IIS
4. [PS] C:\Windows\system32>Set-ExecutionPolicy Unrestricted
5. [PS] C:\Windows\system32>IISreset
5. Import that certificate:
Import-ExchangeCertificate -Server mail -FileName "\\mail\certs\ExchangeCert.cer" -Password (Get-Credential).password
7. Create NEW certificate
“Exchange 2019 certificate request with subject alternative name”
8. Search the cert folder in c: and check the req. certificate
9. Check the new certificate thumbprint # and copy that Thumbprint (selected one in below)
10. Go to edge browser and download the certificate:
Select a task:
Request a certificate
Click on advance certificate request
Now paste the code certificate here.
Submit
ping mail.akshrestha.com -4here what is -4 means
In the command "ping mail.akshrestha.com -4", the "-4" option is used to force the ping command to use IPv4 addresses only. By default, the ping command can use either IPv4 or IPv6, depending on the availability of the network infrastructure.
Download your cert. This is a private certificate
Now go to http://dc1/cersrv Now we can request a certificate in Certificate Server.
And click on “request a certificate” option
Click on “advance certificate request”
Paste the zibrics certificate in save request text area
Choose certificate template: web serve
Click on submit.
Now download the “Exchange Cert” by clicking on “Download certificate”
Share the certs folder before run the import command.
Now Import-exchange certificate by using below command:
Now run below command:
C:\Windows\system32>Set-ExecutionPolicy Unrestricted
Then run: C:\Windows\system32>IISresetNow open one PC with the user.
In Exchange 12 server, open browser and type https://mail.akshrestha.com/ecp (ecp is use for admin operator)
(and https://mail.akshrestha.com/owa for client or user)Log in
Click on servers > certificates and double click on “Microsoft Exchange”
You should see (SAN = subject alternative names:)
Mail.akshrestha.com
Autodiscover.akshrestha.com
Now open one PC with User and open browser and type below link:
And try to send the mail.
Install office software and choose outlook app
Choose “Exchange” option
Don’t forget to RESTART the WWW (world wide web publishing) in services.
Comments