Autodiscover mail settings outlook

I hope you’re configuring it as IMAP mail account and not Exchange account (or anything like that)? Did you try adding it by going to the Control Panel -> Mail -> Email Accounts and adding it from there?


… are there any configurable options on Outlook, that would let you disable autodiscover and let setup account manually? Just to be clear – is there a way to setup IMAP account on Outlook manually in anyway or it just fails, unless autodiscover.json works?

That would be super simple for us to return to Outlook with autodiscover.json something like:

{
  "account": {
    "user": "username",
    "domain": "domain.com"
  },
  "server": {
    "imap": {
      "host": "imap.domain.com",
      "port": 993,
    },
    "smtp": {
      "host": "smtp.domain.com",
      "port": 587,
    }
  }
}

… but it’s not documented in any way. It’s not clear what it expects and what to fix. It’s not clear if autodiscover.json is needed for EAC or for IMAP as well.

I will unroll the previous patch until there will be more information available.

Try this test with your Virtualmin IMAP account. I have a feeling that you’re setting up EAC account instead …

This is the result, tested with server mail.liena.be, and user ‘liena’:

Testing IMAP for user liena on host mail.liena.be:993:SSL.

IMAP was tested successfully.

Additional Details

Elapsed Time: 3049 ms.

Test Steps

Attempting to resolve the host name mail.liena.be in DNS.

The host name resolved successfully.

Additional Details

IP addresses returned: 213.136.87.116, 2a02:c207:2026:8400::1

Elapsed Time: 0 ms.

Testing TCP port 993 on host mail.liena.be to ensure it's listening and open.

The port was opened successfully.

Additional Details

Elapsed Time: 27 ms.

Testing the SSL certificate to make sure it's valid.

The certificate passed all validation requirements.

Additional Details

Elapsed Time: 2768 ms.

Test Steps

The Microsoft Connectivity Analyzer is probing the TCP endpoint 213.136.87.116 on port 993 to detect which SSL/TLS protocols and cipher suites are enabled.

We were able to detect the enabled protocols and cipher suites.

Additional Details

TLS Protocol: SSL v3, Not enabled. TLS Protocol: TLS 1.0, Not enabled. TLS Protocol: TLS 1.1, Not enabled. TLS Protocol: TLS 1.2, Enabled cipher suites: TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA, TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256, TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256, TLS_DHE_RSA_WITH_SEED_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256, TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_128_CCM, TLS_DHE_RSA_WITH_AES_256_CCM, TLS_DHE_RSA_WITH_AES_128_CCM_8, TLS_DHE_RSA_WITH_AES_256_CCM_8, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256

The Microsoft Connectivity Analyzer is attempting to obtain the SSL certificate from remote server mail.liena.be on port 993.

The Microsoft Connectivity Analyzer successfully obtained the remote SSL certificate.

Additional Details

Remote Certificate Subject: CN=liena.be, Issuer: CN=R3, O=Let's Encrypt, C=US.

Validating the certificate name.

The certificate name was validated successfully.

Additional Details

Host name mail.liena.be was found in the Certificate Subject Alternative Name entry.

Certificate trust is being validated.

The certificate is trusted and all certificates are present in the chain.

Test Steps

The Microsoft Connectivity Analyzer is attempting to build certificate chains for certificate CN=liena.be.

One or more certificate chains were constructed successfully.

Additional Details

A total of 1 chains were built. The highest quality chain ends in root certificate CN=DST Root CA X3, O=Digital Signature Trust Co..

Analyzing the certificate chains for compatibility problems with versions of Windows.

The test passed with some warnings encountered. Please expand the additional details.

Additional Details

The Microsoft Connectivity Analyzer can only validate the certificate chain using the Root Certificate Update functionality from Windows Update. Your certificate may not be trusted on Windows if the "Update Root Certificates" feature isn't enabled.

Testing the certificate date to confirm the certificate is valid.

Date validation passed. The certificate hasn't expired.

Additional Details

The certificate is valid. NotBefore = 12/15/2020 9:54:50 AM, NotAfter = 3/15/2021 9:54:50 AM

The IMAP service is being tested.

The IMAP service was tested successfully.

Additional Details

Successfully tested the IMAP4 service C: 1 CAPABILITY S: * OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ AUTH=PLAIN AUTH=LOGIN] Dovecot (Ubuntu) ready. S: * CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ AUTH=PLAIN AUTH=LOGIN S: 1 OK Pre-login capabilities listed, post-login capabilities have more. C: 2 LOGIN liena ******** S: * CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE SORT SORT=DISPLAY THREAD=REFERENCES THREAD=REFS THREAD=ORDEREDSUBJECT MULTIAPPEND URL-PARTIAL CATENATE UNSELECT CHILDREN NAMESPACE UIDPLUS LIST-EXTENDED I18NLEVEL=1 CONDSTORE QRESYNC ESEARCH ESORT SEARCHRES WITHIN CONTEXT=SEARCH LIST-STATUS BINARY MOVE SNIPPET=FUZZY PREVIEW=FUZZY LITERAL+ NOTIFY SPECIAL-USE S: 2 OK Logged in C: 3 LIST "" * S: * LIST (\HasNoChildren \UnMarked \Drafts) "." Drafts S: * LIST (\HasNoChildren \Sent) "." Sent S: * LIST (\HasNoChildren \Trash) "." Trash S: * LIST (\HasNoChildren) "." INBOX S: 3 OK List completed (0.002 + 0.000 + 0.001 secs). C: 4 LOGOUT S: * BYE Logging out S: 4 OK Logout completed (0.001 + 0.000 secs).

Elapsed Time: 253 ms.

And this is the autodiscovery test:

Testing Outlook connectivity.

The Outlook connectivity test failed.

Additional Details

Elapsed Time: 1006 ms.

Test Steps

The Microsoft Connectivity Analyzer is attempting to test Autodiscover for info@wiender.be.

Autodiscover was tested successfully.

Additional Details

Elapsed Time: 1005 ms.

Test Steps

Attempting each method of contacting the Autodiscover service.

The Autodiscover service was tested successfully.

Additional Details

Elapsed Time: 1005 ms.

Test Steps

Attempting to test potential Autodiscover URL https://wiender.be:443/Autodiscover/Autodiscover.xml

Testing of the Autodiscover URL was successful.

Additional Details

Elapsed Time: 1005 ms.

Test Steps

Attempting to resolve the host name wiender.be in DNS.

The host name resolved successfully.

Additional Details

IP addresses returned: 213.136.87.116

Elapsed Time: 96 ms.

Testing TCP port 443 on host wiender.be to ensure it's listening and open.

The port was opened successfully.

Additional Details

Elapsed Time: 70 ms.

Testing the SSL certificate to make sure it's valid.

The certificate passed all validation requirements.

Additional Details

Elapsed Time: 570 ms.

Test Steps

The Microsoft Connectivity Analyzer is probing the TCP endpoint 213.136.87.116 on port 443 to detect which SSL/TLS protocols and cipher suites are enabled.

We were able to detect the enabled protocols and cipher suites.

Additional Details

TLS Protocol: SSL v3, Not enabled. TLS Protocol: TLS 1.0, Not enabled. TLS Protocol: TLS 1.1, Not enabled. TLS Protocol: TLS 1.2, Enabled cipher suites: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256

The Microsoft Connectivity Analyzer is attempting to obtain the SSL certificate from remote server wiender.be on port 443.

The Microsoft Connectivity Analyzer successfully obtained the remote SSL certificate.

Additional Details

Remote Certificate Subject: CN=wiender.be, Issuer: CN=R3, O=Let's Encrypt, C=US.

Validating the certificate name.

The certificate name was validated successfully.

Additional Details

Host name wiender.be was found in the Certificate Subject Common name.

Certificate trust is being validated.

The certificate is trusted and all certificates are present in the chain.

Test Steps

The Microsoft Connectivity Analyzer is attempting to build certificate chains for certificate CN=wiender.be.

One or more certificate chains were constructed successfully.

Additional Details

A total of 1 chains were built. The highest quality chain ends in root certificate CN=DST Root CA X3, O=Digital Signature Trust Co..

Analyzing the certificate chains for compatibility problems with versions of Windows.

The test passed with some warnings encountered. Please expand the additional details.

Additional Details

The Microsoft Connectivity Analyzer can only validate the certificate chain using the Root Certificate Update functionality from Windows Update. Your certificate may not be trusted on Windows if the "Update Root Certificates" feature isn't enabled.

Testing the certificate date to confirm the certificate is valid.

Date validation passed. The certificate hasn't expired.

Additional Details

The certificate is valid. NotBefore = 12/17/2020 7:49:06 AM, NotAfter = 3/17/2021 7:49:06 AM

Checking the IIS configuration for client certificate authentication.

Client certificate authentication wasn't detected.

Additional Details

Accept/Require Client Certificates isn't configured.

Elapsed Time: 152 ms.

Attempting to send an Autodiscover POST request to potential Autodiscover URLs.

The Microsoft Connectivity Analyzer successfully retrieved Autodiscover settings by sending an Autodiscover POST.

Additional Details

Elapsed Time: 116 ms.

Test Steps

The Microsoft Connectivity Analyzer is attempting to retrieve an XML Autodiscover response from URL https://wiender.be:443/Autodiscover/Autodiscover.xml for user info@wiender.be.

The Autodiscover XML response was successfully retrieved.

Additional Details

Autodiscover Account Settings XML response: <?xml version="1.0"?> <Autodiscover xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://schemas.microsoft.com/exchange/autodiscover/responseschema/2006"> <Response xmlns="http://schemas.microsoft.com/exchange/autodiscover/outlook/responseschema/2006a"> <Account> <AccountType>email</AccountType> <Action>settings</Action> <Protocol> <Type>IMAP</Type> <Server>mail.wiender.be</Server> <Port>993</Port> <DirectoryPort>0</DirectoryPort> <ReferralPort>0</ReferralPort> <SSL>yes</SSL> <TTL>24</TTL> <LoginName>info@wiender.be</LoginName> <DomainRequired>off</DomainRequired> <AuthRequired>on</AuthRequired> </Protocol> <Protocol> <Type>SMTP</Type> <Server>mail.wiender.be</Server> <Port>587</Port> <DirectoryPort>0</DirectoryPort> <ReferralPort>0</ReferralPort> <SSL>yes</SSL> <TTL>24</TTL> <LoginName>info@wiender.be</LoginName> <DomainRequired>off</DomainRequired> <AuthRequired>on</AuthRequired> </Protocol> </Account> </Response> </Autodiscover> HTTP Response Headers: Vary: Accept-Encoding Keep-Alive: timeout=5, max=100 Connection: Keep-Alive Transfer-Encoding: chunked Content-Type: text/xml Date: Thu, 17 Dec 2020 09:56:39 GMT Server: Apache

Elapsed Time: 116 ms.

Autodiscover settings for Outlook connectivity are being validated.

The Microsoft Connectivity Analyzer wasn't able to validate Outlook Autodiscover settings.

Additional Details

No account settings were returned from the Autodiscover response.

Elapsed Time: 0 ms.

This topic was automatically closed 30 days after the last reply. New replies are no longer allowed.