Categories Exchange 2010

Exchange Legacy API Scanner for Mail-Enabled Apps

Microsoft Exchange Server has a long history of creating APIs that administrators can use to extend and integrate applications with Exchange. Some Exchange programming technologies that are available in versions of Exchange earlier than Exchange 2010 are now obsolete and have been replaced with other technologies. However, it is not always clear which API is used in an application to communicate with Exchange. Under certain circumstances, it might not even be clear which application in a company network interact with Exchange, which makes a transition to Exchange 2010/2013 difficult.

The Exchange Legacy API Scanner project aims to help administrators identify applications which interact with Exchange using API which are deemphasized or obsolete in Exchange 2010.

Currently, the scanner finds these types of dependencies:

  • Organization wide: Exchange store Event sinks on public and private folders as well as globally registered event sinks;
  • Server wide: Event bindings on a locally installed SMTP Server (i.e. ISMTP_OnArrival) and DLL Dependencies for ExOleDB, CDO, CDOEx and MAPI.
Nuno Mota

Nuno Mota is an Exchange MVP working as a Microsoft Messaging Specialist for a financial institution. He is passionate about Exchange, Lync, Active Directory, PowerShell, and Security. Besides writing his personal Exchange blog,, he regularly participates in the Exchange TechNet forums and is the author of the book “Microsoft Exchange Server 2013 High Availability.”

Published by
Nuno Mota

Recent Posts

Lizard Squad threatening UK Labour Party with cyberattacks

Lizard Squad, cybercriminals who most notably target gaming servers with DDoS attacks, have turned their attention to the United Kingdom’s…

5 hours ago

WMI or CIM in your PowerShell scripts: Which should you use?

Should you be using WMI in your PowerShell scripts, or is it better to use CIM? The answer is not…

9 hours ago

Using JSON with PowerShell: A guide for IT professionals

Here’s a tutorial on how IT pros can use JSON in their daily activities and make it even more useful…

12 hours ago

Eyes on the prize: Top 7 open-source network monitoring tools

Network monitoring tools let you know how your systems, apps, and devices are performing in real-time. These seven open-source tools…

1 day ago

Protect and restore Microsoft Azure VMs using snapshots

Here is a step-by-step tutorial that will save you some time. It includes a script to address the process of…

1 day ago

More or less: Can Moore’s Law work again today?

Moore’s Law, which every computer scientist knows well, has become somewhat distorted over the years. Is it still germane in…

2 days ago