Configure Exchange Server 2016
This article is for those looking for a detailed and clear guide on how to configure Exchange Server 2016.
You can read more about how to configure Exchange Server 2019 in my guide Configure Exchange Server 2019.
IMPORTANTWe will consider the case when you already have two servers with the Windows Server 2012 R2 operating system installed on them. In addition, one of the servers must have the Active Directory Domain Services role installed, and the second server must have Exchange Server 2016 installed.
NOTEFor details on installing Exchange Server 2016 on Windows Server 2012 R2, refer to my guide: Install Exchange Server 2016 on Windows Server 2012 R2.
NOTETo learn how to install Active Directory Domain Services on Windows Server 2012 R2, see my guide: Install Active Directory Domain Services on Windows Server 2012 R2.
Open the Exchange Admin Center control panel, which is located at the link https://us-boston-ex-01/ecp, where us-boston-ex-01 is the name of my Exchange server. Accordingly, you need to provide the name or IP address of your server.
Specify the username and password of an account with Exchange administrator rights and click on the âSign inâ button.

Welcome to the âExchange Administration Centerâ.
You can start working with the Exchange server.

Letâs create a mailbox database.
In the âServersâ section, select the âDatabasesâ subsection and click on the â+â button.

Next, you need to specify a name for the new database and select an Exchange server with the âMailboxâ role.
Specify the name of the database and click on the âBrowseâ button.

Select the Exchange server with the âMailboxâ role and click on the âOKâ button.

Now you need to specify in which folder the mailbox database and its logs will be stored.
NOTEYou need to first create folders on the server in which you plan to store the database and its logs. In addition, it is better to store the database on a disk specially allocated for this task.

In the âDatabase file pathâ field, specify the folder in which the database will be stored.
In the âLog folder pathâ field, specify the folder in which the database logs will be stored.
Check the âMount this databaseâ box and click on the âSaveâ button.

Now you need to restart the Microsoft Exchange Information Store service on the Exchange server.
Click on the âOKâ button.

Open âServer Managerâ on the server with Exchange Server 2016 installed, then click on the âToolsâ button in the upper right corner of the screen and select âServicesâ.

Right-click on the âMicrosoft Exchange Information Storeâ service and select âRestartâ.

The service has restarted successfully and the new database is ready to go.
Next, in the âServersâ section, select the âDatabasesâ subsection, then select a new database and double-click on it with the left mouse button.

In the âLimitsâ section, you can configure the retention time for deleted mailboxes and letters.
Specify the required values and click on the âSaveâ button.

Now letâs create a database for shared folders.
In the âServersâ section, select the âDatabasesâ subsection and click on the â+â button.

Specify a name for the shared folder database and click the Browse button.

Select the Exchange server with the âMailboxâ role and click on the âOKâ button.

Now you need to specify in which folder the database for public folders and its logs will be stored.
NOTEYou need to first create folders on the server in which you plan to store the database and its logs. In addition, it is better to store the database on a disk specially allocated for this task.

In the âDatabase file pathâ field, specify the folder in which the database will be stored.
In the âLog folder pathâ field, specify the folder in which the database logs will be stored.
Check the âMount this databaseâ box and click on the âSaveâ button.

Now you need to restart the Microsoft Exchange Information Store service on the Exchange server.
Click on the âOKâ button.

Return to âServer Managerâ on the server with Exchange Server 2016 installed, click on the âToolsâ button in the upper right corner of the screen, and select âServicesâ.

Right-click on the âMicrosoft Exchange Information Storeâ service and select âRestartâ.

The service has restarted successfully and the new database is ready to go.

Next, go to the âPublic Foldersâ section.
In the âPublic Foldersâ section, select the âPublic Folder Mailboxesâ subsection and click on the â+â button.

Specify a name for the public folder mailbox and in the âMailbox databaseâ section click on the âBrowseâ button.

Select the database for shared folders and click on the âOKâ button.

Nothing can be changed in the âOrganization unitâ section.
Click on the âSaveâ button.

After the public folder mailbox is created, it appears under the Public Folder Mailboxes subsection.

Now letâs add the trusted domain.
In the âMail Flowâ section, select the âAccepted Domainsâ subsection and click on the â+â button.

In the âNameâ and âAccepted Domainâ fields, specify the domain that you want to add to the trusted ones, then select âAuthoritative Domain: E-mail is delivered only to valid recipients in this Exchange organizationâ.
Click on the âSaveâ button.

After the domain is added to the trusted ones, it will appear in the âAccepted Domainsâ section.

Now you need to create a policy for generating mailing addresses.
In the âMail Flowâ section, select the âEmail Address Policiesâ subsection and click on the â+â button.

Next, you need to specify a name for the new policy and choose who it will be applied to, and then determine how mail addresses will be generated in your organization.
NOTEIn this tutorial, mailing addresses will be based on âAliasâ.
Specify a name for the policy for generating postal addresses and click the â+â button.

Specify the main domain and select â[email protected]â.
Click on the âSaveâ button.

Now letâs add a second domain so that users can receive mail using the second domain name as well.
Click on the â+â button.

Specify the second domain and select â[email protected]â.
Click the âSaveâ button.

After you have determined how mail addresses will be formed in your organization, click on the âSaveâ button.

Pay attention to the warning. In order for the policy to take effect, you must click on the âApplyâ button in the âE-mail Address Policiesâ subsection.

After the policy is added, it will appear in the âE-mail Address Policiesâ subsection with the âUnappliedâ status.
To apply a policy, select it and click on the âApplyâ button.

Next, a warning will appear stating that applying the policy may take a long time and you will not be able to perform other tasks while the policy is being applied.
Click on the âYesâ button.

The policy for generating postal addresses has been successfully applied.
Click on the âCloseâ button.

After the policy is applied, it will appear in the âE-mail Address Policiesâ subsection with the âAppliedâ status.

Now you need to create a send connector: to be able to send mail outside the organization.
In the âMail Flowâ section, select the âSend Connectorsâ subsection and click on the â+â button.

Specify a name for the new Send Connector and select âInternetâ in the âTypeâ section.
Click on the âNextâ button.

NOTEIn this example, mail will be sent according to MX records.
Select âMX record associated with recipient domainâ and click on the âNextâ button.

Next, you need to specify for which domains the new connector will work.
Click on the â+â button.

In the âFull Qualified Domain Name (FQDN)â field, enter *. This way, the new Send Connector will handle all domains except yours.
Click on the âOKâ button.

After you have specified for which domains the new connector will work, click on the âNextâ button.

Next, you need to specify on which Exchange server the Send connector will be created.
Click on the â+â button.

Select the Exchange server on which the Send Connector will be created and click on the âOKâ button.

Everything is ready to create a send connector.
Click on the âFinishâ button.

Next, in the âMail Flowâ section, select the âSend Connectorsâ subsection, then select a new send connector and double-click on it with the left mouse button.

In the âGeneralâ section of the âMaximum send message size (MB)â menu, you can configure the maximum size of mail attachments to be sent.

Further, in the âScopingâ section, in the âSpecify the FQDN this connector will provide in response to HELO or EHLOâ field, specify the name by which your mail server is accessible from the Internet.
Click on the âSaveâ button.

Now letâs see the transport settings.
In the âMail Flowâ section, select the âSend Connectorsâ subsection. Then click on the ââŚâ button and select âOrganization transport settingsâ.

In the âLimitsâ section, you can configure the maximum size of mail attachments for sending and receiving.
Specify the required values and click on the âSaveâ button.

Now you need to provide your Exchange Server 2016 license key.
In the âServersâ section, select the âServersâ subsection and click on the âEditâ button.

In the âGeneralâ section, specify the Exchange Server 2016 license key and click on the âSaveâ button.

Now you need to configure DNS records for the domain. To do this, you need to open a web browser and go to the control panel for external DNS records for your domain.
This tutorial uses âcPanelâ to manage external DNS records for a domain.
Enter the login and password you received when purchasing hosting.

In the âDomainsâ section, select the âAdvanced DNS Zone Editorâ item.

Select the domain for which you want to configure DNS records.

Letâs add an A record.
In the âNameâ field, enter âmailâ.
In the âTTLâ field, enter â14400â.
In the âTypeâ field, select âAâ.
In the âAddressâ field, indicate the IP address by which your mail server is accessible from the Internet and click on the âAdd recordâ button.

Letâs add one more A-record.
In the âNameâ field, specify âautodiscoverâ.
In the âTTLâ field, enter â14400â.
In the âTypeâ field, select âAâ.
In the âAddressâ field, indicate the IP address by which your mail server is accessible from the Internet and click on the âAdd recordâ button.

Letâs add one more A-record.
In the âNameâ field, enter âmx01â.
In the âTTLâ field, enter â14400â.
In the âTypeâ field, select âAâ.
In the âAddressâ field, indicate the IP address by which your mail server is accessible from the Internet and click on the âAdd recordâ button.

Next, you need to register MX records in the hosting control panel.
We return to the hosting control panel.
In the âMailâ section, select the âMX Recordâ item.

Next, in the domain field, you must specify the domain for which the MX records will be configured. Then in the item âEmail Routingâ you need to select âRemote Mail Exchangerâ and click on the âChangeâ button.

Now delete all the old MX records in the MX Records section.
Select the entry and click on the âDeleteâ button.

In the âPriorityâ field, enter â1â.
In the âDestinationâ field, specify the previously created A-record with the name âmx01â and click on the âAdd New Recordâ button.

Next, you need to make a request to your ISP to create a PTR record for your external IP address, where your mail server is accessible from the Internet. This is necessary in order for your IP address to resolve to a name.
NOTEIn this example, IP 188.244.46.91 is being converted to the name mail.vmkh.org.
Now you need to create an SPF (Sender Policy Framework) and write its value to the TXT record.
Thanks to SPF, you can check if the senderâs domain has been tampered with. SPF allows you to specify a list of servers capable of sending mail messages on behalf of your domain.
You can get the parameters for recording SPF using the SPF Wizard.
SPF example: v=spf1 mx ptr:mail.vmkh.org mx:mx01.vmkh.org ip4:188.244.46.91 -all
Return to the âAdvanced DNS Zone Editorâ section.
In the âDomainsâ section, select the âAdvanced DNS Zone Editorâ item.

Next, in the domain field, you must specify the domain for which the A-records will be configured.

Add TXT record.
In the âNameâ field, specify the domain.
In the âTTLâ field, enter â14400â.
In the âTypeâ field, select âTXTâ.
In the âTXT Dataâ field, specify the SPF parameters obtained using the SPF Wizard and click on the âAdd Recordâ button.

Now you need to register the A-record on the internal DNS server.
Open âServer Managerâ on the domain controller, then click on the âToolsâ button in the upper right corner of the screen and select âDNSâ.

In the âForward Lookup Zonesâ section, select the main domain and right-click on it, then select âNew Host (A or AAAA)â.

In the âName (uses parent domain name if blank)â field, specify âMailâ.
In the âIP addressâ field, specify the IP address of the server on which Exchange Server 2016 is installed and click on the âAdd Hostâ button.

A record has been successfully added.
Click on the âOKâ button.

After the A-record is added, it will appear in the list with the rest of the records.

For further configuration, you need a certification authority.
NOTEIn this tutorial, the Active Directory Certificate Services role will be installed on a domain controller.
Go back to the âServer Managerâ on the domain controller, then click on the âManageâ button in the upper right corner of the screen and select âAdd Roles and Featuresâ.

Click on the âNextâ button.

Select the installation type âRole-based or feature-based installationâ and click on the âNextâ button.

Next, select the server on which the role will be installed.
Click on the âNextâ button.

Select the Active Directory Certificate Services role.

In the next step, the Role Installation Wizard will warn you that several components need to be installed to install the Active Directory Certificate Services role.
Click on the âAdd Featuresâ button.

Click on the âNextâ button.

At the stage of adding components, we leave all the default values.
Click on the âNextâ button.

Next, the Role Installation Wizard invites you to learn more about the Active Directory Certificate Services role.
Click on the âNextâ button.

Now you need to select the required services.
We select âCertification Authority Web Enrollmentâ.

In the next step, the Install Roles Wizard will warn you that several components need to be installed to install the Certification Authority Web Enrollment.
Click on the âAdd Featuresâ button.

Next, select âOnline Responderâ.

The Role Installation Wizard will warn you that several components need to be installed to install Online Responder.
Click on the âAdd Featuresâ button.

After all the necessary services are selected, click on the âNextâ button.

In the next step, the Role Installation Wizard will warn you that the Internet Information Services webserver role will be additionally installed for the Active Directory Certificate Services role.

At the stage of adding components, we leave all the default values.
Click on the âNextâ button.

In order to start the installation of the selected role, click on the âInstallâ button.

The installation of the selected role and the components required for it began.

Installation of the Active Directory Domain Services role is now complete.
Click on the âCloseâ button.

Now you need to reboot the server.
On the keyboard, press the key combination âWinâ and âxâ, in the menu that opens, select âShut down or sign outâ, then âRestartâ.

Next, the server will start to reboot.

Now you need to configure the role.
Open the âServer Managerâ, in the upper right corner of the screen, click on the plug and select âSettingsâ. Then select âConfigure Active Directory Certificate Services on the destination serverâ in order to configure the role.

Click on the âNextâ button.

Next, you need to select the services that you want to configure.
Select âCertification Authorityâ, âCertification Authority Web Enrollmentâ and âOnline Responderâ and click on the âNextâ button.

The server is a member of the domain, so select âEnterprise CAâ and click on the âNextâ button.

There are no other servers with the Active Directory Certificate Services role in the domain, so select âRoot CAâ and click on the âNextâ button.

Next, you need to create a new private key.
Select âCreate a new private keyâ and click on the âNextâ button.

Next, you can select the cryptography settings.
Leave the settings unchanged and click on the âNextâ button.

Specify a name for the new certification authority and click on the âNextâ button.

Now we select the validity period of the certificate and click on the âNextâ button.

Next, you can specify where the certificate database and its logs will be stored.
Leave the settings unchanged and click on the âNextâ button.

Everything is ready to configure the role.
Click on the âConfigureâ button.

The configuration for the Active Directory Certificate Services role has been completed successfully.
Click on the âCloseâ button.

Now you need to enable the SAN (Subject Alternative Name) function on the CA server. This feature is useful when publishing the âAutodiscoverâ service.
On the certification authority server, on the âTaskbarâ, right-click on âWindows PowerShellâ and select âRun as administratorâ.

We enable the SAN function using the command:
certutil -setreg policy\EditFlags +EDITF_ATTRIBUTESUBJECTALTNAME2
Now you need to restart the âCertSvcâ service.
Stop the âCertSvcâ service using the command:
net stop certsvc
We start the âCertSvcâ service using the command:
net start certsvc
Service âCertSvcâ restarted successfully.

Now letâs make a request to create a new Exchange certificate.
We return to the Exchange Admin Center control panel.
In the âServersâ section, select the âCertificatesâ subsection and click on the â+â button.

Select âCreate a request for a certificate from a certification authorityâ and click on the âNextâ button.

Specify a name for the new certificate and click on the âNextâ button.

Then leave the settings unchanged and click on the âNextâ button.

Now you need to specify the Exchange server where the certificate request will be stored.
Click on the âBrowseâ button.

Select the Exchange server where the certificate request will be stored and click on the âOKâ button.

After the Exchange server is specified, click on the âNextâ button.

Now you need to specify the domain names that need to be included in the certificate for all types of access.
Select âOutlook Web App (when accessed from the Internet)â and click on the âEditâ button.

Specify the name by which your mail server is accessible from the Internet for the âOutlook Web Appâ access type, and click on the âOKâ button.

Select OAB (when accessed from the Internet) âand click on theâ Edit â(Pencil) button.

We indicate the name by which your mail server is accessible from the Internet for the âOABâ access type and click on the âOKâ button.

Select âExchange Web Services (when accessed from the Internet)â and click on the âEditâ button.

Specify the name by which your mail server is accessible from the Internet for the âExchange Web Servicesâ access type, and click on the âOKâ button.

Select âExchange ActiveSync (when accessed from the Internet)â and click on the âEditâ button.

Specify the name by which your mail server is accessible from the Internet for the âExchange ActiveSyncâ access type, and click on the âOKâ button.

Select âPOPâ and click on the âEditâ button (Pencil).

We indicate the name by which your mail server is accessible from the Internet for the âPOPâ access type, and click on the âOKâ button.

Select âIMAPâ and click on the âEditâ button.

Specify the name by which your mail server is accessible from the Internet for the âIMAPâ access type, and click on the âOKâ button.

Select âOutlook Anywhereâ and click on the âEditâ button.

Specify the name by which your mail server is accessible from the Internet for the âOutlook Anywhereâ access type, and click on the âOKâ button. Then click on the âNextâ button.

Below is a list of domains that will be included in the certificate.
Click on the âNextâ button.

Next, you must specify the name of the organization, department, and geographic location of the company.
This guide deals with an organization located in Russia, in the city of Moscow.
We indicate the necessary information and click on the âNextâ button.

Now you need to specify the folder where the Exchange certificate request will be saved.
NOTEIn this tutorial, the certificate request will be saved to the local âCâ drive on the Exchange server.
Specify where the Exchange certificate request will be saved and click on the âFinishâ button.

After the certificate request is created, it will appear in the âCertificatesâ subsection with the âPending requestâ status.

Now you need to validate your Exchange certificate with a CA.
On the Exchange server, go to the link http://us-boston-dc-01/certsrv, where us-boston-dc-01 is the name of my certification authority server. Accordingly, you need to specify the name of your server.
We go under an account with administrator rights and click on the âOKâ button.

Now letâs add the address of the certification server to âTrusted sitesâ.
Click on the âAddâ button.

In the âAdd this website to the zoneâ field, specify the address of the certification server and click on the âAddâ button.

Click on the âCloseâ button.

Now select âRequest a certificateâ.

Next, select âAdvanced certificate requestâ.

Now select âSubmit a certificate request by using a base-64-encoded CMC or PKCS #10 file, or submit a renewal request by using a base-64-encoded PKCS #7 fileâ.

Next, open âExplorerâ and go to the local drive âCâ where the Exchange certificate request was saved.
Click on the certificate request file twice with the left mouse button.

Click on the âMore optionâ button.

We select âNotepadâ.

Copy the contents of the request file.

Next, insert the contents of the request file into the âSaved Requestâ field, then in the âCertificate Templateâ section, select âWeb Serverâ and click on the âSubmitâ button.

In the âSaveâ menu, select âSave asâ.

Select âDER encodedâ and click on the âDownload certificateâ button.

Assign a name and save the Exchange certificate to the Downloads folder.
Click on the âSaveâ button.

Now you need to download the certificate of the certification authority.
Click on the âHomeâ button in the upper right corner of the screen.
Select âDownload a CA certificate, certificate chain, or CRLâ.

In the âEncoding methodâ section, select âDERâ and click on the âDownload CA certificateâ button.

In the âSaveâ menu, select âSave asâ.

We assign a name and save the certificate of the certification authority in the âDownloadsâ folder.
Click on the âSaveâ button.

To successfully validate your Exchange certificate request, you must import the CA certificate into the Trusted Root Certification Authorities on the Exchange server.
Press âStartâ, specify âmmcâ in the search bar.
Launch Microsoft Management Console.

Now letâs add the Certificates snap-in.
Next, in the âFileâ menu, select âAdd/Remove Snap-inâ.

In the âAvailable snap-insâ section, select âCertificatesâ and click on the âAddâ button.

Next, select âComputer accountâ and click on the âNextâ button.

Select âLocal computerâ and click on the âFinishâ button.

The snap-in has been added successfully.
Click on the âOKâ button.

In the âCertificates (Local Computer)â section, select the âTrusted Root Certification Authoritiesâ subsection, then right-click on the âCertificatesâ subsection and select âAll Tasksâ, then âImportâ.

Click on the âNextâ button.

Next, you need to specify the path to the certificate of the certification authority.
Click on the âBrowseâ button.

Select the certificate of the certification authority and click on the âOpenâ button.

After the path to the certificate of the certification authority is indicated, click on the âNextâ button.

Then leave the settings unchanged and click on the âNextâ button.

Everything is ready to import the certificate into the âTrusted Root Certification Authoritiesâ.
Click on the âFinishâ button.

The CA certificate has been successfully imported.
Click on the âOKâ button.

We return to the Exchange Admin Center control panel.
In the âServersâ section, select the âCertificatesâ subsection. Then select the new Exchange certificate and click on the âCompleteâ button on the right.

Next, you need to specify the path to the Exchange certificate.
Specify the path to the Exchange certificate and click on the âOKâ button.

After the certificate is confirmed, it will appear in the âCertificatesâ subsection with the âValidâ status.
Now you need to assign a new Exchange certificate for SMTP and IIS services.
Select a new certificate and double-click on it with the left mouse button.

In the âServicesâ section, check the boxes for âSMTPâ, âIMAPâ, âPOPâ, and âIISâ, then click on the âSaveâ button.

Next, a warning will appear asking you to overwrite the existing certificate for SMTP.
Click on the âYesâ button.

After the Exchange certificate is assigned to the services, the list of services in the âAssigned to servicesâ field is updated.

Now letâs take a look at the Outlook Web App settings.
In the âServersâ section, select the âVirtual Directoriesâ subsection and select the âowa (Default Web Site)â virtual folder, and then double-click on it with the left mouse button.

In the âGeneralâ section, in the âExternal URLâ field, specify the name by which your mail server is accessible from the Internet, and also specify â/owaâ.

Now letâs configure user authorization by login without having to specify a domain.
In the âAuthenticationâ section in the âUse forms-based authenticationâ section, select âUser name onlyâ.
Next, you need to select the main domain, click on the âBrowseâ button.

Select the main domain and click on the âOKâ button.

After the domain is specified, click on the âSaveâ button.

Next, a warning will appear asking you to restart IIS.
IIS will restart later.
Click on the âOKâ button.

Now letâs write the address where your mail server is accessible from the Internet into the Exchange server configuration.
In the âServersâ section, select the âVirtual Directoriesâ subsection and select the âecp (Default Web Site)â virtual folder, and then double-click on it with the left mouse button.

In the âGeneralâ section, in the âExternal URLâ field, specify the name by which your mail server is accessible from the Internet, and also specify â/ecpâ.
Click on the âSaveâ button.

In the âServersâ section, select the âVirtual Directoriesâ subsection and select the âEWS (Default Web Site)â virtual folder, and then double-click on it with the left mouse button.

In the âGeneralâ section, in the âExternal URLâ field, specify the name by which your mail server is accessible from the Internet, and also specify â/EWS/Exchange.asmxâ.
Click on the âSaveâ button.

In the âServersâ section, select the âVirtual Directoriesâ subsection and select the âmapi (Default Web Site)â virtual folder, and then double-click on it with the left mouse button.

In the âGeneralâ section, in the âExternal URLâ field, specify the name by which your mail server is accessible from the Internet, and also specify â/mapiâ.
Click on the âSaveâ button.

In the âServersâ section, select the âVirtual Directoriesâ subsection and select the âMicrosoft-Server-ActiveSync (Default Web Site)â virtual folder, and then double-click on it with the left mouse button.

In the âGeneralâ section, in the âExternal URLâ field, specify the name by which your mail server is accessible from the Internet, and also specify â/Microsoft-Server-ActiveSyncâ.
Click on the âSaveâ button.

In the âServersâ section, select the âVirtual Directoriesâ subsection and select the âOAB (Default Web Site)â virtual folder, and then double-click on it with the left mouse button.

In the âGeneralâ section, in the âExternal URLâ field, specify the name by which your mail server is accessible from the Internet, and also specify â/OABâ.
Click on the âSaveâ button.

In the âServersâ section, select the âVirtual Directoriesâ subsection and select the âPowerShell (Default Web Site)â virtual folder, and then double-click on it with the left mouse button.

In the âGeneralâ section, in the âExternal URLâ field, specify the name by which your mail server is accessible from the Internet, and also specify â/powershellâ.
Click on the âSaveâ button.

Now letâs configure the Outlook Anywhere service. This service is used to connect to the Exchange server via the Internet using âOutlookâ.
In the âServersâ section, select the âServersâ subsection, select the Exchange server, and double-click on it with the left mouse button.

Next, in the âSpecify the external hostname such as contoso.com that users will use to connect to your organizationâ field, specify the name by which your mail server is accessible from the Internet. Then, in the âSpecify the authentication method for external clients to use when connecting to your organizationâ menu, select âNTLMâ and uncheck the âAllow SSL offloadingâ checkbox.
Click on the âSaveâ button.

Pay attention to the warning.
Click on the âOKâ button.

Now letâs restart IIS.
On the Exchange server, on the âTaskbarâ select âWindows PowerShellâ and after clicking the right mouse button click on âRun as administratorâ.

Restart IIS using the command:
iisreset /noforce
IIS restarted successfully.

Now letâs configure the ability to receive mail.
In the âMail Flowâ section, select the âReceive Connectorsâ subsection, select the âDefault Frontend us-boston-ex-01â receive connector, where us-boston-ex-01 is the name of my Exchange server. Then click on it twice with the left mouse button.

In the âGeneralâ section, in the âMaximum receive message sizeâ field, you can configure the maximum allowable size of mail attachments for receiving.

In the âSecurityâ section, check for a checkmark on the âAnonymous usersâ item.
Click on the âSaveâ button.

Now letâs create a new user with a mailbox.
In the âRecipientsâ section, select the âMailboxesâ subsection and click on the â+â button.

Now we specify the alias, first and last name for the new user.
Then you need to select the organization unit in which you plan to create a new user.
Click on the âBrowseâ button.

Select the OU in which you want to place the new user, and click on the âOKâ button.

In the âUser logon nameâ field, specify the login for the new user.
Next, specify a strong password and click on the âMore optionsâ button.

Now you need to select the database in which the mailbox for the new user will be created.
In the âMailbox databaseâ section, click on the âBrowseâ button.

Select the mailbox database and click on the âOKâ button.

Everything is ready to create a user with a mailbox.
Click on the âSaveâ button.

After the user with the mailbox is created, it will appear in the âMailboxesâ section.

Now you need to import the Exchange certificate into Trusted Root Certification Authorities on all computers in the domain.
Go to the domain controller, create a folder and copy the Exchange certificate into it.

NOTEIn this tutorial, the certificate was copied to the âExchangeCertificateâ folder on the âCâ drive.

Go back to âServer Managerâ on the domain controller, then click on the âToolsâ button in the upper right corner of the screen and select âGroup Policy Managementâ.

Now letâs create a new Group Policy to import the certificate into Trusted Root Certification Authorities on all computers in the domain.
Right-click on the domain name and select âCreate a GPO in this domain, and Link it hereâ.

Specify a name for the new group policy and click on the âOKâ button.

Next, click on the new policy with the right mouse button and select âEditâ.

In the Group Policy Editor, go to the âComputer Configurationâ section, then to the âWindows Settingsâ subsection, then find the âSecurity Settingsâ section and select âPublic Key Policiesâ, now right-click on âTrusted Root Certification Authoritiesâ and select â Import â.

Click on the âNextâ button.

Next, you need to specify the path to the Exchange certificate.
Click on the âBrowseâ button.

Go to the folder with the Exchange certificate and click on the âOpenâ button.

After the path to the certificate is specified, click on the âNextâ button.

Then leave the settings unchanged and click on the âNextâ button.

Everything is ready to import the certificate into the âTrusted Root Certification Authoritiesâ for all computers in the domain.
Click on the âFinishâ button.

The Exchange certificate has been successfully imported into Group Policy settings.
Click on the âOKâ button.

After the certificate is imported into Group Policy settings, it will appear in the âTrusted Root Certification Authoritiesâ section.
The Exchange certificate will now be imported to all computers covered by this policy.

Now you need to restart your mail server.
We return to the server with Exchange Server 2016 installed.
On the keyboard, press the key combination âWinâ and âxâ, in the menu that opens, select âShut down or sign outâ, then âRestartâ.

Patreon Exclusives
đ Join my Patreon and dive deep into the world of Docker and DevOps with exclusive content tailored for IT enthusiasts and professionals. As your experienced guide, I offer a range of membership tiers designed to suit everyone from newbies to IT experts.
Tools I Personally Trust
If youâre building, breaking, and trying to keep your digital life sane (like every good DevOps engineer), these are tools I actually use every day:
đ¸ Proton VPN (60% off link) - my shield on the internet. Keeps my Wi-Fi secure, hides my IP, and blocks trackers. Even on sketchy cafĂŠ Wi-Fi, Iâm safe.
đ Proton Pass (50% off link) - my password vault. End-to-end encrypted logins, 2FA, and notes - all mine and only mine.
đŚ GitKraken Pro (50% off link) - my visual Git sidekick. Beautiful commit graph, easy merges, and fewer âWTF just happened?â moments.
đ These links give you discounts - and help support the channel at no extra cost.
Gear & Books I Trust
đ Essential DevOps books
đĽď¸ Studio streaming & recording kit
đĄ Streaming starter kit
Social Channels
đŹ YouTube
đŚ X (Twitter)
đ¨ Instagram
đ Mastodon
đ§ľ Threads
đ¸ Facebook
đŚ Bluesky
đĽ TikTok
đť LinkedIn
đŁ daily.dev Squad
âď¸ Telegram
đ GitHub
Community of IT Experts
đž Discord
Is this content AI-generated?
No. Every article on this blog is written by me personally, drawing on decades of hands-on IT experience and a genuine passion for technology.
I use AI tools exclusively to help polish grammar and ensure my technical guidance is as clear as possible. However, the core ideas, strategic insights, and step-by-step solutions are entirely my own, born from real-world work.
Because of this human-and-AI partnership, some detection tools might flag this content. You can be confident, though, that the expertise is authentic. My goal is to share road-tested knowledge you can trust.