All Windows/IIS SMTP components became deprecated ever since Windows Server 2003 went end of life,
So, use search engines to see what alternatives (likely from third parties) you can migrate to.
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
We use an IIS SMTP server to relay emails from older scanners that don't support TLS to MS365 anonymous relay, which requires TLS. We're replacing an existing WS2012R2 server with SMTP with a new WS2022 server with the SMTP feature installed.
The WS2012R2 SMTP server finds its TLS cert. The WS2022 server does not.
We have a CNAME for the WS2022 server in internal DNS, 'relay.domain.net'.
We have a self-cert whose subject is 'relay.domain.net' in the Personal and Trusted Root CA's stores of Certificates.msc. When I open the cert, it shows, "You have a private key that corresponds to this certificate.", and Certificate Status is "This certificate is OK."
In the SMTP Virtual Server, Delivery-->Advanced-->Fully-qualified domain name is set to 'relay.domain.net', and Check DNS reports the name is valid.
Pretty sure that's all I've ever had to do to get the cert to be used by SMTP service on any other Windows Server in the past.
But here, I restarted the SMTP service--and for that matter, the server--and the Access tab still reports "TLS is not available without a certificate," and the Windows Service event log shows smtpsvc event 2001, "No usable TLS server certificate for SMTP virtual server instance '1' could be found. TLS will be disabled for this virtual-server." as the SMTP service starts.
Am I missing something? If not, is there a place I can kick it to make it work?
All Windows/IIS SMTP components became deprecated ever since Windows Server 2003 went end of life,
So, use search engines to see what alternatives (likely from third parties) you can migrate to.
For me, the only way was create certificate request in IIS MMC and sign it in internal CA. Because I have two balanced SMTP servers, I have to use only the balanced common name in the request and do it twice. Even though such certificate has no SAN (IIS request does not allow to add SAN), it works.