Categories Exchange 2010

Exchange Legacy API Scanner for Mail-Enabled Apps

Microsoft Exchange Server has a long history of creating APIs that administrators can use to extend and integrate applications with Exchange. Some Exchange programming technologies that are available in versions of Exchange earlier than Exchange 2010 are now obsolete and have been replaced with other technologies. However, it is not always clear which API is used in an application to communicate with Exchange. Under certain circumstances, it might not even be clear which application in a company network interact with Exchange, which makes a transition to Exchange 2010/2013 difficult.

The Exchange Legacy API Scanner project aims to help administrators identify applications which interact with Exchange using API which are deemphasized or obsolete in Exchange 2010.

Currently, the scanner finds these types of dependencies:

  • Organization wide: Exchange store Event sinks on public and private folders as well as globally registered event sinks;
  • Server wide: Event bindings on a locally installed SMTP Server (i.e. ISMTP_OnArrival) and DLL Dependencies for ExOleDB, CDO, CDOEx and MAPI.
Nuno Mota

Nuno Mota is an Exchange MVP working as a Microsoft Messaging Specialist for a financial institution. He is passionate about Exchange, Lync, Active Directory, PowerShell, and Security. Besides writing his personal Exchange blog, LetsExchange.blogspot.com, he regularly participates in the Exchange TechNet forums and is the author of the book “Microsoft Exchange Server 2013 High Availability.”

Share
Published by
Nuno Mota

Recent Posts

IFA 2019: All the top smartphone announcements and unveilings

IFA 2019, this year’s version of the annual consumer electronics trade show, did not disappoint. Is one of these smartphones…

27 mins ago

Outlook connectivity: Troubleshooting and solving common issues

IT professionals all dread getting this fevered message from employees and clients: “I’m having Outlook connectivity issues!” Here’s what you…

5 hours ago

Using tags with Azure runbook automation to control your costs

Here’s a script designed to start and stop virtual machines based on tags associated at the resource group level. It…

8 hours ago

Software-defined perimeter solutions: Why this is the future of security

Traditional VPNs are showing their age in the modern cloud-powered workplace. That’s why software-defined perimeter solutions are in your future.

3 days ago

Why you need to check your virtualization host’s NUMA configuration

Should you disallow NUMA spanning in your Hyper-V architecture? There are two sides to this story, and you’ll get both…

3 days ago

Getting started with Visual Studio Code and integrating with Azure DevOps

Coding may not be the No. 1 job duty for cloud admins, but it is often a part of the…

3 days ago