Following on from my OWA synthetic logon post yesterday, I thought it a good time to talk about the OWACHECK.EXE tool available from Microsoft PSS.

It can be quite difficult to troubleshoot the OWA synthetic logons that MOM 2005 performs within your Exchange environment.  The OWACHECK.EXE tool can help you here, so let me explain what it does.  The tool is just a single executable file which is available from Microsoft PSS as I said earlier.  Copy it to the Exchange front-end server that contains the MOM 2005 agent performing the synthetic logon.  Next, enable debugging on this Exchange server by adding the following registry key:

Key: HKEY_LOCAL_MACHINE\Software\Microsoft\Exchange MOM
Value Name: DebugLS
Value Data: 1

Now go to a command prompt and execute OWACHECK.EXE using the following command line:

owacheck.exe MailboxName URL

MailboxName = MOM test mailbox name.  You can check the BEAccount registry parameter in HKLM\Software\Microsoft\Exchange MOM\FEMonitoring\servername on the Exchange front-end server to determine what this is.  Typically it's the first MOM test mailbox created on that server.  For example, if the server name is "SERVER", then the first MOM test mailbox would be called SERVERMOM.

URL = the URL that you want to test.  For example,

Therefore a sample command line would read:

owacheck.exe SERVERMOM

OWACHECK.EXE tells you where the output file has been created, typically in the \documents and settings\name\local settings\temp folder.  Examine the output file, owacheck.log, for evidence of either success or failure.  Here are some sample output files:

A successful logon file:

[17/10/2006 12:01:31]  Starting OWACHECK
[17/10/2006 12:01:31]  --------------------
[17/10/2006 12:01:31]  No credential override.
[17/10/2006 12:01:31]  Mailbox SERVERMOM is going to be used.
[17/10/2006 12:01:31]  CustomerUrl:
[17/10/2006 12:01:31]  Url:
[17/10/2006 12:01:31]  Calling GetCredential.
[17/10/2006 12:01:31]  Entering GetCredential
[17/10/2006 12:01:31]  Decrypting the credentials...
[17/10/2006 12:01:31]  Decryption complete. Domain = DOMAIN, Username = MOMMBX.
[17/10/2006 12:01:31]  GetCredential call returned success.
[17/10/2006 12:01:31]  Starting Basic Auth Logon
[17/10/2006 12:01:31]  Entering GetPage.
[17/10/2006 12:01:31]  Adding credentials to the request.
[17/10/2006 12:01:31]  GETPAGE - HttpTimeout set to 30 seconds.
[17/10/2006 12:01:31]  Calling GetResponse...
[17/10/2006 12:01:32]  GETPAGE - HTTP Response Code: OK
[17/10/2006 12:01:32]  Response stream received
[17/10/2006 12:01:32]  Logon Successful! - <FRAMESET...>
[17/10/2006 12:01:32]  Basic Auth Logon Successful

And here's an example of a failure logon file:

[17/10/2006 11:55:51]  Starting OWACHECK
[17/10/2006 11:55:51]  --------------------
[17/10/2006 11:55:51]  No credential override.
[17/10/2006 11:55:51]  Mailbox SERVERMOM is going to be used.
[17/10/2006 11:55:51]  CustomerUrl:
[17/10/2006 11:55:51]  Url:
[17/10/2006 11:55:51]  Calling GetCredential.
[17/10/2006 11:55:51]  Entering GetCredential
[17/10/2006 11:55:51]  Decrypting the credentials...
[17/10/2006 11:55:51]  Decryption complete. Domain = DOMAIN, Username = MOMMBX.
[17/10/2006 11:55:51]  GetCredential call returned success.
[17/10/2006 11:55:51]  Starting Basic Auth Logon
[17/10/2006 11:55:51]  Entering GetPage.
[17/10/2006 11:55:51]  Adding credentials to the request.
[17/10/2006 11:55:51]  GETPAGE - HttpTimeout set to 30 seconds.
[17/10/2006 11:55:51]  Calling GetResponse...
[17/10/2006 11:55:51]  WebException caught. WebExcetion: TrustFailure.
[17/10/2006 11:55:51]  Basic Auth Logon Failed

Here you can see the errors highlighted in bold.  Now you can troubleshoot the certificate trust failure.

Account Deleted on October 18, 2006 at 05:31 AM in Tools & Utilities
« MOM OWA Synthetic Logon Error | Main | IE7, OWA and S/MIME »


TrackBack URL for this entry:

Listed below are links to weblogs that reference The OWACHECK Tool:


I called Microsoft PSS and they do not anything of this tool. Where can this be downloaded?

Posted by: Peter Van Engelandt at Dec 14, 2006 7:16:45 AM