See the following sections for the steps to configure email notifications:
1 |
On the Configuration page, under Email Notifications, click Manage email notifications. |
2 |
For service type, select SMTP. |
5 |
1 |
On the Configuration page, click Manage email notifications. |
2 |
For service type, select Exchange Online. |
• |
Application (client) ID: The application (client) ID for the Microsoft Entra ID application created for Enterprise Reporter email notifications. |
• |
Directory (tenant) ID: The directory (tenant) ID for the Microsoft Entra ID application created for Enterprise Reporter email notifications. |
• |
Certificate Thumbprint: The certificate thumbprint for the certificate that was uploaded to the registered app. |
• |
Cloud instance: Select the type of cloud instance to use for notifications - Azure Cloud (default), US Government Cloud L4, or US Government Cloud L5 (DoD). |
3 |
Click View address format errors and fix any errors. |
1 |
Select Send notifications on node state changes. |
2 |
If you selected Send notifications on discovery state changes: |
• |
Select Send all to send email notifications for every discovery state change. |
For information on the New-SelfSignedCertificate cmdlets, see https://learn.microsoft.com/en-us/powershell/module/pki/new- selfsignedcertificate?view=windowsserver2022-ps.
Before you create the certificate, the Powershell PKI module must be installed.
NOTE: For the -dnsname you enter the name of the computer that hosts Enterprise Reporter server service (Configuration Manager) and C:\exchange online\ is a folder location on that computer.
1 |
2 |
3 |
4 |
5 |
Expand Certificate | Personal | Certificate. Ensure that the newly created certificate is listed. |
6 |
Select the certificate, right-click and select All Tasks | Export. |
8 |
9 |
In the Export File Format page, select DER encoded binary X.509 (.CER) as the format, unless you require a different format, and click Next. |
2 |
Scroll down and select Thumbprint. |
1 |
2 |
3 |
Open the Certificate Import Wizard. |
4 |
5 |
6 |
2 |
2 |
In the Microsoft Azure dashboard, click Microsoft Entra ID. |
3 |
In the left navigation pane, scroll down and click App registrations | New registration. |
• |
Name: Enter a name for the application that identifies its use such as Enterprise Reporter for Exchange Online. |
• |
Supported account types: Select Accounts in this organizational directory only (tenant name only - Single tenant) for the accounts that can access the application API. |
5 |
Click Register. |
1 |
In the left navigation pane, scroll down and click API Permissions. |
2 |
3 |
4 |
5 |
Click Add Permissions. |
6 |
In the center of the API Permissions page, notice the Grant admin consent for tenant name.Click Grant admin consent for tenant name to apply the permissions. |
7 |
Click Yes to confirm. |
8 |
On the Overview page (top left) you can find Application (client) ID and the Directory (tenant) ID. Copy these values as you will need them when you set up Exchange Online for OAuth authentication in Enterprise Reporter. |
9 |
10 |
In the left navigation pane, click Roles and administrators and browse through the roles to find Exchange Administrator (or enter Exchange Administrator in the search window). |
11 |
13 |
When the application appears, select Add at the bottom on the right side. |
14 |
15 |
Select App registrations and either browse to your new app or enter the name the application in the search window. |
Your Microsoft Entra ID application requires a certificate for authentication.
1 |
In the left navigation pane, click Certificates & secrets. |
2 |
5 |
Click Add at the bottom of the screen. Notice the certificate information is displayed including the thumbprint. |
© ALL RIGHTS RESERVED. Terms of Use Privacy Cookie Preference Center