Back

Outlook Profile Autodiscover and SCP for Office 365 Migrations

When you install the Client Access server role on a computer running Exchange 2010 a default virtual directory named Autodiscover is created under th...

2 min read
Published on Oct 7, 2011
Outlook Profile Autodiscover and SCP for Office 365 Migrations

When you install the Client Access server role on a computer running Exchange 2010, a default virtual directory named Autodiscover is created under the default Web site in Internet Information Services (IIS). This virtual directory handles Autodiscover service requests from Outlook 2007 or Outlook 2010 clients and supported mobile phones under the following circumstances:

  • When a new user account is configured or updated
  • When an Outlook client periodically checks for changes to the Exchange Web Services URLs
  • When underlying network connection changes occur in your Exchange messaging environment

Additionally, a new Active Directory object named the service connection point (SCP) is created on the server where you install the Client Access server role. The SCP object contains the authoritative list of Autodiscover service URLs for the forest. You can use theĀ Set-ClientAccessServerĀ cmdlet to update the SCP object. For more information, seeĀ Set-ClientAccessServer. For more information about SCP objects, seeĀ Publishing with Service Connection Points.

The following figure shows how a client connects to a Client Access server the first time from inside the internal network. For external access, or using DNS, the client locates the Autodiscover service on the Internet by using the primary SMTP domain address from the user’s e-mail address.

The Autodiscover service process for internal access The Autodiscover service process for internal access

If the SCP is not available, the client looks for a valid SSL certificate typically a CNAME record for autodiscover.outlook.com for Office 365 Ā 

The Autodiscover service process for external access The Autodiscover service process for external access

To Disable SCP, on a forest that is migrating to hosted exchange or Office 365, and you’re NOTĀ using the Microsoft Online Migrations Tool(web based Office 365 tool), you may need to disable the SCP in your Active Directory by running the following command in the Echange Server Management Shell:

Set-ClientAccessServer -Identity ā€œSERVERNAMEā€ -AutoDiscoverServiceInternalUri $NULL

If you have multiple Exchange servers, You may need to run this replacing SERVERNAME with all the Exchange servers in the directory. If you don’t have access to the Exchange server, and it was not uninstalled properly, you can delete the SCP entries using ADSIEdit in the following container: CN=Autodiscover,CN=Microsoft Exchange,CN=Services, [Configuration Naming Context].

This post has matured and its content may no longer be relevant beyond historical reference. To see the most current information on a given topic, click on the associated category or tag.

Related Posts

Microsoft 365 Backup Access Control Best Practices

Managing Access Controls for Backup Data in Microsoft 365

Learn how to manage access controls for Microsoft 365 backup data. Protect sensitive data and ensure compliance with role-based permissions and audit logging.

Dec 18, 2025
5 min read
Why Hire an MSP for CMMC Certification Support

Why Hire an MSP for CMMC Certification Support?

Learn why partnering with an MSP for CMMC certification support can streamline your path to compliance, reduce costs, and improve cybersecurity posture.

Dec 17, 2025
7 min read
SharePoint GCC High Migration: Step-by-Step Guide

How to Migrate SharePoint Data to GCC High

Learn how to migrate SharePoint data to GCC High to meet CMMC, NIST, and ITAR compliance requirements with this practical guide.

Dec 15, 2025
7 min read
FedRAMP & Microsoft Cloud Tenant Migrations

Understanding FedRAMP Implications for Microsoft Cloud Tenant Migrations

Learn how FedRAMP requirements impact Microsoft cloud tenant migrations and what regulated organizations must do to stay compliant.

Nov 25, 2025
6 min read
Cloud Backup Strategies for Ransomware Protection

Protecting Against Ransomware with Cloud Backup Strategies

Explore effective cloud backup strategies to defend against ransomware attacks. Learn best practices for recovery, redundancy, and data resilience.

Nov 20, 2025
6 min read
Implement Azure Backup Encryption for Data Security

Implementing Encryption for Azure Backup Data

Learn how to implement encryption in Azure Backup to protect your cloud data. Discover key methods, tools, and best practices to ensure data confidentiality and compliance.

Nov 19, 2025
6 min read

Ready to Secure and Defend Your Data
So Your Business Can Thrive?

Fill out the form to see how we can protect your data and help your business grow.

Loading...
Secure. Defend. Thrive.

Let's start a conversation

Discover more about Agile IT's range of services by reaching out.

Don’t want to wait for us to get back to you?

Schedule a Free Consultation

Location

Agile IT Headquarters
4660 La Jolla Village Drive #100
San Diego, CA 92122