How should you set the AutoDiscoverServiceInternalUri?

How should you set the AutoDiscoverServiceInternalUri?

Currently it is set to the local server name:  

How should it be set? External URL?
Who is Participating?
IvanConnect With a Mentor System EngineerCommented:

If you are using public certificate, then there is no more support for .local name, so you can use only public names, eg. .com, .org and so on.

If you have .local domain name internally, then you need to create DNS zone (on your internal DNS) for your public name and setup autodiscover as you said. This way there will be no certificate error when Outlook is configured.

To change autodiscover uri:

[PS] C:\>Set-clientaccessserver –identity <servername> -autodiscoverserviceinternaluri ""

PS: Creating DNS zone for on local DNS, and pointing to you internal exchange would automatically redirect you internal users to Exchange. No need for them to exit first to internet, to contact public DNS.

cyberservicesAuthor Commented:
One last thing.
I know you have to create an A record for the public URL such as but do you also create a CNAME too that goes along with the SAN certificate?
Alexander KireevIT ArchitectCommented:

Do you use only one CAS server or several with balancing? If you are usng CAS Array (with balancing) you should set a link with common DNS name like "".

There is a good article regarding your question:
Easily manage email signatures in Office 365

Managing email signatures in Office 365 can be a challenging task if you don't have the right tool. CodeTwo Email Signatures for Office 365 will help you implement a unified email signature look, no matter what email client is used by users. Test it for free!

cyberservicesAuthor Commented:
the CAS and mailbox server are together. Small network.
IvanSystem EngineerCommented:
On certificate you need only 2 names (exchange 2013).

One is for, and second is
There is option to use SRV record on public DNS in stead of A for autodiscover, but I would go with 2 names on cert.

So only 2 A DNS records as well.. No need to create CNAME or such.

A for
A for
cyberservicesAuthor Commented:
Great I have both of those on my SSL SAN certificate. I was just trying to figure out what type of records to create from our public DNS manager. I handle the internal and they handle the external so I need to ensure to give them the right information to create what ever records are necessary. thanks.
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.