We had a Server 2012 r2, exchange 2013 sp1, trend worry free business all up and running, receiving mail connecting outlook ecp & owa working.
Unfortunately we installed rds, and it seems to have broken it, so we uninstalled rds, which still didn’t fix it. So we reinstalled Exchange 2013, still no access to ecp,owa,outlook, but all services running
We REMOVED ANTIVIRUS, no improvement so I Ran powershell as follows
Remove -OwaVirtualDirectory -Identity Server\ecp (Default Web Site)
new-OwaVirtualDirectory -InternalUrl https://Server/ecp -WebSiteName Default Web Site
Remove -OwaVirtualDirectory -Identity Server\owa (Default Web Site)
new-OwaVirtualDirectory -InternalUrl https://Server/owa -WebSiteName Default
and
set-Owavirtualdirectory -identity "server\owa (Exchange Back End)" -WindowsAuthentication $True -Basicauthentication $false -Formsauthentication $false
Set-EcpVirtualDirectory -Identity "server\ecp (Exchange Back End)" -WindowsAuthentication $true -FormsAuthentication $false
Still nothing, but everything else on the server is ok, checked csa role is installed.
I get HTTP Error 404. The requested resource is not found. When trying to get tohttps://server/owa or https://%computername%/ecp/?ExchClientVer=15 https://server/ecp/default.aspx etc. in internet explorer and firefox and with firewall off and enabled. The system event log is clear,the event log looks innocuous
I have the following outputs and cert info as well.
PS C:\Windows\system32> Get-EcpVirtualDirectory -Server Server
Name Server
---- ------
ecp (Default Web Site) SERVERCPC
all exchange services are running except the imap and pop3 services
PS C:\Windows\system32> Get-ExchangeCertificate -Server servercpc
Thumbprint Services Subject
---------- -------- -------
D420DB1A820ABD3B55F860000993F4A7B4DC3260 ...WS.. CN=Microsoft Exchange S...
8CFCF1631DACA22C17CC097B75B577EC1C15BB2E IP..S.. CN=SERVERCPC
2223E4BEEEAF667BD8CA12A81F08C4BEB3369489 ....... CN=SERVERCPC.cpcl.local
FC7F2D580F3E82ADF0EF6C40F8A427808EE9BB09 IP..S.. CN=SERVERCPC
PS C:\Windows\system32> Get-ExchangeCertificate -DomainName "cpcl.local"
PS C:\Windows\system32> Enable-ExchangeCertificate
cmdlet Enable-ExchangeCertificate at command pipeline position 1
Supply values for the following parameters:
Thumbprint: D420DB1A820ABD3B55F860000993F4A7B4DC3260
Services: IIS
PS C:\Windows\system32>
which seem to match the iis cert thumbprints/binding