How to Run Remonitor.exe as Local System Account in Inject Mode

 

Remonitor.exe is a tool that can inject a custom routing packet into an Exchange Server organization. The custom packet is a modified version of the deleted routing group packet. This modified version does not have server or connector entries, which significantly reduces the size of the routing group object. Also, this version eliminates the possibility of a malfunction or delay in routing that can occur due to a connector entry in which the routing group is deleted. Because the tool injects a modified packet that does not have connector entries, there cannot be a connector entry in which the routing group is deleted. Finally, Remonitor.exe updates the version number of the modified routing group so that no server or connection entries can be added to this deleted routing group.

To use Remonitor.exe, you must first request the tool from Microsoft® Product Support Services. You must copy Remonitor.exe to the Exchsrvr\bin directory on an Exchange server.

Note

You cannot inject a routing packet on the same server on which you run the Remonitor tool. You must run the tool on a separate server.

Note

After you delete a routing group, you must wait for this change to be replicated to all Microsoft Active Directory® directory service servers in the organization before you run Remonitor.exe.

You must run the tool with an account that has SendAs permissions on the Exchange server, such as the local system account.

Note

You only need to run Remonitor.exe against one server in the Exchange Server organization. The packet injection is propagated to the remaining servers in your organization.

After running Remonitor.exe, the routing packet no longer contains any server members or connectors. The routing group addresses are now prefaced by the key word deleted. Also, the version number of the routing group object is incremented.

Before You Begin

Before you perform the procedure in this topic, read Troubleshooting Routing.

Procedure

To run Remonitor.exe as local system account in inject mode

  1. At the command prompt, type the following:

    at <time> /interactive "cmd.exe"

    where <time> is any time of day.

  2. Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Scheduled Tasks.

  3. In Scheduled Tasks, right-click the At job you just created, and then click Run.

    Note

    The At task you created appears as At<ID> where ID is the task ID assigned when you created the task.

  4. A new command prompt window opens, running as the local system account.

  5. In this window, navigate to the .\Exchsrvr\bin directory in your Exchange installation directory. By default, this directory is <drive letter:>\Program Files\Exchsrvr\bin.

  6. Type the following command:

    remonitor -i <server to inject>

  7. In Scheduled Tasks, right-click the At task, and then click Delete.