Remote Management Enablement for EXCHANGESE (contoso.com)
It’s been a challenging process, but we identified the specific Group Policy Object (GPO) settings that were preventing the Exchange Health Check and Management Tools from functioning correctly when accessed remotely from a new server—other than the original EXCH1. The configuration below now enables remote management from the SCOM server, allowing it to check health status, report accurately, and run both the Exchange Management Shell and Exchange Toolbox to manage the EXCHANGESE server as needed.
With remote monitoring and management now operational, I’m shifting focus to getting the tools to work locally. I suspect the issue is related to Credential Passing and may require a similar solution. Meanwhile, I’ve begun the decommissioning process for the EXCH2016 server.
Understanding the Kerberos Double-Hop Issue in EMS
When accessing the Exchange Management Shell (EMS), the Kerberos double-hop issue becomes a critical factor—especially when launching EMS remotely or even locally if it attempts to authenticate to itself or another service.
What Happens During EMS Launch:
- EMS uses remote PowerShell to connect to the Exchange server—even for local launches.
- Authentication is attempted via Kerberos, which is secure but strict.
- If EMS needs to access another service (e.g., Active Directory), it must delegate your credentials.
- Without proper delegation, Kerberos blocks the second hop—causing EMS to hang or fail.
Configuration Changes for Secure Remote Management of EXCHANGESE
To overcome the Kerberos double-hop limitation and enable secure remote management, the following GPO and Active Directory configurations were applied:
- Enable Credential Delegation via Group Policy
On the client machine or via domain-level GPO:
Navigate to: Computer Configuration → Administrative Templates → System → Credentials Delegation
Enable these policies:
HTTP/exchangese.contoso.com
RPC/exchangese.contoso.com
HOST/exchangese.contoso.com
WSMAN/exchangese
HTTP/exchangese
RPC/exchangese
HOST/exchangese
```
These SPNs cover WinRM, HTTP endpoints, RPC services, and host-level authentication for both the FQDN and short hostname of the Exchange server.
- Configure Constrained Delegation in Active Directory
On the computer or user account initiating the remote session:
- Open Active Directory Users and Computers
- Locate the account, open Properties
- Go to the Delegation tab
- Select:
HTTP/exchangese.contoso.com
RPC/exchangese.contoso.com
HOST/exchangese.contoso.com
WSMAN/exchangese
HTTP/exchangese
RPC/exchangese
HOST/exchangese
```
- Verify SPN Registration
Ensure the EXCHANGESE server’s computer account in Active Directory has these SPNs registered:
WSMAN/exchangese.contoso.com
HTTP/exchangese.contoso.com
RPC/exchangese.contoso.com
HOST/exchangese.contoso.com
WSMAN/exchangese
HTTP/exchangese
RPC/exchangese
HOST/exchangese
Missing SPNs can result in failed authentication or session hangs during remote PowerShell sessions.
- Configure WinRM for HTTPS (Optional)
If Kerberos trust cannot be established or constrained delegation isn’t feasible, configure WinRM to use HTTPS with a valid SSL certificate:
PS E:\Program Files\Microsoft\Exchange Server\V15\bin> winrm get winrm/config/client
Client
NetworkDelayms = 5000
URLPrefix = wsman
AllowUnencrypted = false
Auth
Basic = true [Source="GPO"]
Digest = true
Kerberos = true
Negotiate = true
Certificate = true
CredSSP = false
DefaultPorts
HTTP = 5985
HTTPS = 5986
TrustedHosts = *.contoso.com [Source="GPO"]
spn_prefix = HOST
✅ Outcome
With these configurations in place:
- Remote PowerShell sessions to EXCHANGESE authenticate successfully
- EMS launches without delays or credential errors
- Credential delegation is secure, compliant, and scalable for enterprise use