25.9 C
Wednesday, December 7, 2022

Replacing Send Connector Certificate

A special Rpc error occurs on server EXCH1: These certificates are tagged with following Send Connectors : Outbound to Office 365. Removing and replacing certificates from Send Connector would break the mail flow. If you still want to proceed then replace or remove these certificates from Send Connector and then try this command.

$cert = Get-ExchangeCertificate -Thumbprint XXXXXX 
$tlscertificatename = "<i>$($cert.Issuer)<s>$($cert.Subject)"

To Replace Send Connector –

Set-SendConnector "Outbound to Office 365" -TlsCertificateName $tlscertificatename

To Replace Receive Connector –

Set-ReceiveConnector "EXCH1\Default Frontend EXCH1" -TlsCertificateName $tlscertificatename

if you don’t update receive connector you can see hybrid mail flow stops with TLS error

Reason: [{LED=450 4.4.317 Cannot connect to remote server [Message=451 5.7.3 STARTTLS is required to send mail] [LastAttemptedServerName=] [LastAttemptedIP=] [DX2ARE01FT002.eop-are01.prod.protection.outlook.com]};{MSG=451 5.7.3 STARTTLS is required to send mail};{FQDN=};{IP=};. OutboundProxyTargetIP:

Satheshwaran Manoharan
Satheshwaran Manoharanhttps://www.azure365pro.com
Specialized in Microsoft Azure - Office 365 / Microsoft Exchange; conducted numerous projects worldwide in designing, supporting, and implementing messaging and virtualization infrastructure for medium-sized and large enterprises. Further, I am a Cloud Architect and Technical Advisor for various start-ups.

Related Articles


  1. I ran into this problem today, and unfortunately this did not fix the issue. Here is how i fixed it.

    First (fail) I re-ran the HCW and linked the send connector to the new certificate and tried to remove the old one. Still failed with the same message.

    Luckily, we are still in the testing phase of O365 mail, so I just deleted the ‘Outbound to Office 365’ send connector, deleted the old certificate and re-ran the HCW.

    In a full production environment, this will break mail flow, so use wisely! Hope this helps someone else out.

      • Hi Satheshwaran Manoharan

        I had the issue where my connector “Outbound to Office 365” was using a expired certificate,

        Once I did the following
        copied the thumbprint from new cert

        get-sendconnector “outbound to office 365” |fl
        verify what cert it was using

        ran your Cmd
        $cert = Get-ExchangeCertificate -Thumbprint XXXXXX
        $tlscertificatename = “$($cert.Issuer)$($cert.Subject)”
        Set-SendConnector “Outbound to Office 365” -TlsCertificateName $tlscertificatename

        get-sendconnector “outbound to office 365” |fl

        new certificate was applied

        1376 emails began flowing

        thankyou so much , your website got me up and running again.


  2. I tried this method and Set-SendConnector returned a message that it had completed successfully but not made any changes. Unfortunately the issuer and subject of my old and new certificates are exactly the same, so I assume Set-SendConnector isn’t able to tell the difference. What I ended up doing was temporarily setting the connector to use one of the other Exchange certificates so that the identifiers WERE different, long enough to delete the expired certificate and then set the connector back to the correct and non-expired certificate. As warned above, this will probably stop mail flow but should take only a minute or two to accomplish.

    • Thank you for this, I’ve spent over a week trying to figure out why we couldn’t delete our old cert after assigning the new one to the send connectors. I can confirm this works, even if it does break mail flow for a bit.

  3. I am getting an error

    WARNING: The source Transport servers specified for the connector aren’t in the same Active Directory site.

    we have 4 servers split across two AD sites. how do I go around this error?

    Thank you


  4. You saved my ass today đŸ™‚ our sysadmin left, and I got put in charge of mail servers. Our hybridext cert expired yesterday and even though I had renewed it, I didn’t realize the send connector would need updated (since we didn’t request an identical replacement with the same thumbprint). MS documentation was way too involved for me to find this little tidbit that I needed. Thanks a million.

  5. Thank you, thank you, thank you. 2 Hours on the phone with M365 support getting nowhere when I finally came across this post and it worked like a charm!

  6. This will update all send and receive connectors to the same certificate:
    $cert = Get-ExchangeCertificate -Thumbprint XXXXXX
    $tlscertificatename = “$($cert.Issuer)$($cert.Subject)”
    $connectors = Get-SendConnector | Where-Object {$_.TlsCertificateName -ne $Null}
    foreach ($connector in $connectors){Set-SendConnector -Identity $connector -TlsCertificateName $tlscertificatename}
    $connectors = Get-ReceiveConnector | Where-Object {$_.TlsCertificateName -ne $Null}
    foreach ($connector in $connectors){Set-ReceiveConnector -Identity $connector -TlsCertificateName $tlscertificatename}

  7. You just saved my butt today. I had two Receive Connectors that wouldn’t enable STARTTLS because they could find the old expired certificate. Used your instructions to update the TlsCertificateName and they’re now online and happy. Thanks!

  8. Thanks you, this worked like a charm. however the old certificate is still showing that it is in use by the SMTP service, how would we find out what is using it

  9. I’m so glad I looked into this before trying to wing it! We indeed have the same issuer/subject as the old certificate, so it was good to have a plan going in. I appreciated the pointers on that piece, and the idea to assign a random certificate, so you can delete the old one, then set the new one.
    On a different post I saw someone suggest setting it to null, and I did do that and I can confirm that it did work. Not a ton easier, but a little easier than assigning a different cert so I figured I’d mention it.

    Set-SendConnector “Outbound to Office 365” -TlsCertificateName $NULL

    Thanks again this was a life saver!


Please enter your comment!
Please enter your name here

× How can I help you?