Events
Apr 29, 2 PM - Apr 30, 7 PM
Join the ultimate Windows Server virtual event April 29-30 for deep-dive technical sessions and live Q&A with Microsoft engineers.
Sign up nowThis browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Using Service Manager notifications, you can generate emails for almost any kind of change. For example, you can configure notifications to be sent to an analyst when changes occur to a work item or configuration item that pertains to email problems.
Before notifications are sent, first configure each notification channel, such as the settings for Simple Mail Transfer Protocol (SMTP). Notification messages are sent based on a notification template. Therefore, you must create a notification template. You can then use the Notification Subscription Wizard to subscribe a group of users to a notification that will be sent whenever the changes that you specify occur. Finally, you can verify that a notification is sent by manually generating the change.
Note
You must add the Service Manager workflow account to the Service Manager Administrators user role for notifications to function properly.
Substitution strings are special tokens or system variables that are used in notification templates in Service Manager. These strings retrieve properties from an instance that is related to the instance for which the template was created. The strings then display the value in the notification email. Notification templates in Service Manager include substitution strings. Although you should avoid modifying the predefined templates, you can duplicate them and then modify the duplicates.
For example, the end-user notification template includes a substitution string in the message body that represents the user's first name. If you want to add the user's last name, you can easily do so by using the Insert button, which is available when you edit a notification template, and then browsing the available strings that are available for the class of template that you're modifying. In this example, you would browse and then select Affected User and then select Last Name to insert the string into the template. Later, when the notification is sent to the user, their first and last name is included in the message as a salutation.
While this example is simple, Service Manager includes substitution strings for almost every property that you might need to create notifications that can inform end-users and other Service Manager users with very timely and relevant information. You can easily view the substitution strings that are available in Service Manager by opening an existing notification template and then, in the template design area, selecting the Insert button to view the classes and properties.
You can use the following procedures to configure notification channels and validate the configuration. Notification channels are the method by which notification messages are sent to users. You use the Configure E-Mail Notification Channel dialog to configure and enable email notifications that Service Manager sends to a Simple Mail Transfer Protocol (SMTP) server.
Note
Only email notification is supported.
You can use a Windows PowerShell command to complete these tasks, as follows:
Microsoft Entra ID implements OAuth protocol for secure authentication of its users and applications. Here's how the connection establishes when the activity runs:
Obtains user credentials from IP configuration.
Uses the credentials to authenticate with Azure AD using OAuth.
After authentication, you will receive an OAuth token from Azure AD.
Activity performs operations on the EWS endpoint using the OAuth token.
To create an Azure AD app, do the following:
Sign in to the Azure portal and search for Microsoft Entra ID admin center.
On the Microsoft Entra ID admin center dashboard, select Microsoft Entra ID.
On the Overview page, under Manage > App registrations, select New registration.
On the Register an application page, do the following:
Name: Enter the desired name.
Supported account types: Select the supported account type based on your scenario.
Redirect URI (optional): From the Select a platform dropdown, select Public client/native (mobile & desktop), and set the URI to https://login.microsoftonline.com/common/oauth2/nativeclient.
Select Register.
After successful registration, under Overview > Essentials, ensure to note the Application (client) ID and Directory (tenant) ID.
On the Overview page, under Manage, select Authentication, and do the following:
Ensure that the Platform configurations is set to Mobile and desktop applications with at least https://login.microsoftonline.com/common/oauth2/nativeclient as one of the Redirect URIs. Shape screenshot of authentication page.
Under Advanced settings, ensure Allow public client flows is set to Yes.
Select Save.
On the Overview page, under Manage, select API Permissions.
On the API permissions page, select Add a permission > APIs my organization uses.
Enter Office in the search bar and select Office 365 Exchange Online, and then select Delegated permissions > EWS > EWS.AccessAsUser.All permission.
Remove redundant permissions and select Grant admin consent.
To enable TLS 1.2, do the following:
Open Windows PowerShell in Administrator mode in Service Manager Console machine.
Run the following script to enable TLS 1.2 version.
New-Item 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319' -Force | Out-Null
New-ItemProperty -path 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319' -name 'SystemDefaultTlsVersions' -value '1' -PropertyType 'DWord' -Force | Out-Null
New-ItemProperty -path 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319' -name 'SchUseStrongCrypto' -value '1' -PropertyType 'DWord' -Force | Out-Null
New-Item 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319' -Force | Out-Null
New-ItemProperty -path 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319' -name 'SystemDefaultTlsVersions' -value '1' -PropertyType 'DWord' -Force | Out-Null
New-ItemProperty -path 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319' -name 'SchUseStrongCrypto' -value '1' -PropertyType 'DWord' -Force | Out-Null
New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -Force | Out-Null
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -name 'Enabled' -value '1' -PropertyType 'DWord' -Force | Out-Null
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -name 'DisabledByDefault' -value 0 -PropertyType 'DWord' -Force | Out-Null
New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -Force | Out-Null
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -name 'Enabled' -value '1' -PropertyType 'DWord' -Force | Out-Null
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -name 'DisabledByDefault' -value 0 -PropertyType 'DWord' -Force | Out-Null
Write-Host 'TLS 1.2 has been enabled. You must restart the Windows Server for the changes to take effect.' -ForegroundColor Cyan
To use OAuth for notifications, do the following:
Open the Service Manager Console and navigate to Notifications > Channels > Properties.
On the Configure E-mail Notification Channel pop-up, select Enable e-mail notifications checkbox, and select Add.
On the Add SMTP Server page, do the following:
Authentication method: Select External E-mail Authentication from the dropdown.
Client Id: Enter the client ID created in the previous steps.
Tenant Id: Enter the tenant ID created in the previous steps.
Mail Id: Enter the mail ID that acts as a sender for notifications.
Password: Enter the corresponding password.
Select OK to save the changes.
Enter Return e-mail address and set Retry primary after as required and select OK.
Use this channel for sending notifications/outgoing e-mails.
An additional setup of connector/SMTP relay and SMTP details such as FQDN and port number are not required while you use External E-mail Authentication mode for sending notifications. Therefore, FQDN and port number values are set to random values as NA and 65534 when a channel is created using this authentication method.
Each time Notification part runs, it logs events into the event viewer. In case of unexpected behavior, check events to troubleshoot. For more information or for debugging purposes, refer EWS Traces in events. To display trace and logs in the event viewer, open command prompt in administrator mode in the Service Manager Console machine and set the env var EXTERNALEWSLogs value to 1 (setx /m EXTERNALEWSLogs 1).
Setting EXTERNALEWSLogs to 1 enables trace and logs to be shown in event viewer as follows:
You can use the following procedures to create notification templates for many types of information records or work items that Service Manager records or keeps track of, such as incidents, change requests, activities, release records, and configuration items. After you create the notification templates, you can use a notification subscription to send email messages based on the templates. The notification template determines the type and format of the messages to send.
Note
Manually copying and pasting substitution strings from other notification templates won't generally work. Therefore, you should avoid copying them to prevent errors. Instead, you can easily browse for and insert available substitution strings into any notification template that you're creating or updating.
The following two templates are prerequisites for other procedures:
Note
Notifications are sent only by email.
You can use Windows PowerShell commands to complete these and other related tasks, as follows:
After you create a notification template, and after you've enabled at least one notification channel, you can use the following procedure to subscribe to notifications by using the Notification Subscription Wizard. Then, notifications will be sent when an object is created or updated or periodically when other criteria that you specify are met.
The scenarios in this article center on the Create E-Mail Notification Subscription Wizard. The condition that you choose to notify will dynamically change the wizard pages that are available.
In the first procedure, you set up a subscription so that a messaging analyst is notified when a new incident that pertains to an email problem is opened. In the second procedure, you set up a subscription so that daily status updates are sent to the release manager while the HR web application is in development, testing, and deployment.
Note
Some notification criteria values might not change. If you want to receive a notification when a change occurs, ensure that you choose a value for an object that is likely to change. For example, the Incident ID for an incident doesn't change.
In the Service Manager console, select Administration.
In the Administration pane, expand Notification, and select Subscriptions.
In the Tasks pane, select Create Subscription.
On the Before You Begin page of the Create E-mail Notification Subscription Wizard, select Next.
On the General page, in the Notification subscription name box, enter a name. For example, enter New Incident for E-mail Problem Notification Subscription. Optionally, in the Description box, you can enter a description for the subscription that you're creating.
Next to the Targeted class box, select Browse.
In the When to notify box, select When an object of the selected class is created.
In the Choose Class dialog, choose a class. For example, select Incident. Then, select OK.
Ensure that an unsealed management pack of your choice is selected, and select Next. For example, select the Sample Management Pack.
On the Additional Criteria page, select Incident. In the Available Properties list, select Classification Category, and select Add.
On the Additional Criteria page, select the Criteria tab. In the Criteria area, next to [Incident] Classification Category, select equals. In the list, select E-mail Problems, and select Next.
On the Template page, next to the E-mail template box, select Select.
In the Select Objects dialog, in the Templates list, select a notification template. For example, select New E-mail Incident Template, select OK, and select Next.
On the Recipient page, select Add.
In the Select Objects dialog, search for the appropriate user, and then select the user. Select Add, select OK, and select Next. For example, select the user account for a messaging analyst or messaging administrator.
Note
The notification address must be configured for the user account of the messaging analyst or messaging administrator.
On the Related Recipients page, select Add.
In the Select Related Recipient dialog, search for the appropriate class, and then select the appropriate substitution string that represents the user. Select Add, select OK, and select Next. For example, select additional user accounts that you want to send the notification to.
On the Summary page, review the settings that you selected for the notification subscription, and select Create.
On the Completion page, select Close.
In the Service Manager console, select Administration.
In the Administration pane, expand Notifications, and select Subscriptions.
In the Tasks pane, select Create Subscription.
On the Before You Begin page of the Create E-mail Notification Subscription Wizard, select Next.
On the General page, in the Notification subscription name box, enter a name. For example, enter Daily Notification for Deploy HR Web 2.0 Release Record. Optionally, in the Description box, you can enter a description for the subscription that you're creating. For example, enter This subscription sends a daily notification of the status for the HR Web 2.0 release record.
In the When to notify box, select Periodically notify when objects meet a criteria.
Next to the Targeted class box, select Browse.
In the Choose Class dialog, choose a class, and select OK. For example, select Release Record.
Ensure that an unsealed management pack of your choice is selected, and select Next. For example, select the Sample Management Pack.
On the Additional Criteria page, select Release Record. In the Available Properties list, select Status, and select Add.
In the Criteria area, next to [Release Record] Status, select does not equal. In the list, select Closed, and select Next.
On the Recurring Notification page under Recurrence pattern, select Notify every TimeInterval and then choose an interval. For example, set the recurrence pattern to every one day.
On the Recurring Notification page under Range of recurrence, select a range of recurrence or choose no end date. For example, select No end date.
On the Template page, next to the E-mail template box, select Select.
In the Select Template dialog, in the Templates list, select a notification template that you've created for release record notifications.
On the Recipient page, select Add.
In the Select Objects dialog, search for the appropriate user, and then select the user. Select Add, select OK, and select Next. For example, select the user account for the release manager.
Note
The notification address must be configured for the user account of the messaging analyst or messaging administrator.
On the Related Recipients page, select Add.
In the Select Related Recipient dialog, search for the appropriate class, and then select the appropriate substitution string that represents the user. Select Add, select OK, and select Next. For example, select additional user accounts that you want to send the notification to.
On the Summary page, review the settings that you selected for the notification subscription, and select Create.
On the Completion page, select Close.
You can use a Windows PowerShell command to complete these tasks and other related tasks, as follows:
You can use the following procedure to verify that you've correctly configured notifications. Generate the type of change that activates the notification subscription that was previously created. When you do this, the subscription generates and then sends a notification. Receipt of the notification verifies success. For example, create a test incident that generates an email notification. The notification informs the recipient that an incident was opened.
If you're verifying a recurring notification subscription, you must wait for the time interval that you set previously to elapse until the notification is sent. When the notification is received, the configuration of the notification is verified.
To verify a notification configuration, follow these steps:
In some situations, you may want to use a group rather than an individual user in Service Manager as a work item stakeholder. For example, you might want to assign an incident to a team of people, such as an initial response team that routes incidents, and then notify everyone in the initial response team that an incident has been assigned to their team.
Messaging-enabled universal security groups in Microsoft Exchange Server are the key to this task. This article describes how to accomplish this using the Exchange Server Exchange Management console for incidents. You can use the following procedures to create a messaging-enabled universal security group, create a workflow to notify stakeholders when an incident is created, and then test for success.
In Exchange Server, the Require that all senders are authenticated setting is enabled by default for mail-enabled universal security groups. You can modify the setting in the distribution group properties, in Mail-Flow settings, in the Message Delivery Restrictions dialog. If your outgoing Simple Mail Transfer Protocol (SMTP) server specified in the Service Manager settings (Under Administration > Notifications Channels > Edit) is using Anonymous as the Authentication Method (either in Service Manager or the SMTP settings), then given the above default setting in exchange, the email wouldn't be sent out. If you've Anonymous Access configured on the SMTP side, it's necessary either to clear the Require that all senders are authenticated setting in exchange for the Mail Enabled Universal Security Group, or change the SMTP authentication settings (in Service Manager or the outgoing SMTP Server settings) from anonymous to Windows Integrated, so that the user is authenticated, allowing the email to be sent.
As an alternative, you can avoid using Assigned to and instead use Support Group changing as a triggering field. To set this up, create a new email notification subscription, and under additional criteria, use the following:
Use whatever template you want, and add the recipient of the mailing distribution list for Tier 1. Now Tier 1 is notified whenever a ticket is sent to them, even if it's done by means of a template at portal ticket creation.
Setting up one of these for each support group will ensure that all your groups are informed of incoming incidents that require their attention.
Events
Apr 29, 2 PM - Apr 30, 7 PM
Join the ultimate Windows Server virtual event April 29-30 for deep-dive technical sessions and live Q&A with Microsoft engineers.
Sign up nowTraining
Module
In this module, you'll practice how to meet specific business policies by creating relevant policies to disable GIFs, enable the lobby for all external users and disable desktop sharing remote control.