Hosted Exchange to Exchange Online (Microsoft 365) Migration Guide

This article will guide you through the steps for migrating mailboxes from a Hosted Exchange Provider to Microsoft 365.

App passwords are not supported for the Microsoft 365 endpoint. We are not able to support migrations with two-factor or multifactor authentication. 

There are some tools and resources that will make the migration easier.

First migration?

We’ve created a guide on scoping, planning, and managing the migration process for your use. If this is your first migration, we recommend reading this guide carefully.

Exchange questions and troubleshooting

Our Exchange Mailbox FAQExchange Migration Setup and Planning, and Exchange Mailbox Migration Troubleshooting guides contain a number of common questions and concerns, along with more information, guidance, and steps to resolve issues such as throttling.

The maximum file size for migration through MigrationWiz varies by migration type and environment, but may never exceed 60GB.

What items are and are not migrated?

Migrated items vary by version of Exchange. The following list is for Exchange Server 2010 SP1+. If you are using an alternate version of Exchange, please refer to the Migrated and Not Migrated Items list and check for your version of Exchange.

Exchange Server 2010 SP1+

Migrated

  • Inbox
  • Inactive inboxes
  • Folders
  • Email
  • Contacts
  • Calendars
  • Tasks
  • Journals
  • Notes
  • Post (when the destination is Exchange or Microsoft 365)
  • Server-Side Rules
  • Folder Permissions

Not Migrated

  • Email templates
  • Email flags (if the destination is G Suite)
  • Safe Sender/Block Lists
  • Mail Settings
  • Standalone documents stored in Mailbox Folders or Public Folders (Example: IPM.Document item types)
  • System Public Folders
  • StickyNote folders
Note: If Exchange is the Source, and an account exists in the destination that matches
the UPN prefix of an account with Calendar Permissions in the Source prior to
submitting a migration, Calendar Permissions will be migrated, except for Resource
Calendars. Resource Calendars permissions are not migrated. 
If Exchange is the Source, and an account does not exist in the destination that
matches the UPN prefix of an account with Calendar Permissions in the Source
prior to submitting a migration, Calendar Permissions will not be migrated.

DeploymentPro & DMA

DeploymentPro currently can only officially be used with migration projects where Microsoft 365 is the Destination. If using DeploymentPro with Exchange (either On-Premises or Hosted) as a Destination, then a Proof of Concept should be run first. We do recommend using DeploymentPro in this scenario.

Exchange environments can have complex AutoDiscover settings, along with UPN and SMTP address mis-matches, which can require troubleshooting and reconfiguration before DeploymentPro can be made to work against such environments.

DeploymentPro is included with the User Migration Bundle license. DeploymentPro cannot be purchased as a standalone service license, and it cannot be added to the single-use mailbox migration license. If you wish to remotely configure Outlook mail profiles using DeploymentPro after a migration, purchase the User Migration Bundle license.

The DeploymentPro Guide and DeploymentPro FAQ will guide you through the proof of concept, as well as any other DeploymentPro questions, while the DMA Installation and Introduction to DMA articles provide resources and guidance on DMA.

MigrationWiz

MigrationWiz is a migration tool, not a syncing tool. If changes are made at the source after migration, they will not sync to the destination, nor will changes made at the destination sync to the source. We do not have “live” monitoring of changes (as with a sync agent) and we cannot handle scenarios such as conflict resolution without user interaction.

MigrationWiz supports the capability to share migration projects across a Workgroup. When the Project Sharing feature is turned on, all Agents besides those who are Inactive can view all migrations projects. 

We are not able to support migrations with two-factor or multifactor authentication. 

Prepare the Source Environment

Create access account

Ask the Hosted Exchange Provider to create an account for migration purposes (e.g., named MigrationWiz) and grant full access rights to each mailbox, by running this PowerShell script against the newly created account:
Get-Mailbox -ResultSize Unlimited | Add-MailboxPermission -AccessRights FullAccess -User MigrationWiz

Some Hosted Exchange providers allow this access to be granted via their web portal. In this case, you could log in to each mailbox via their portal and then grant the migration account (e.g., MigrationWiz) to have read/write access to each mailbox. This is laborious and time-consuming, and so it is preferred that the Hosted Exchange provider run the PowerShell script above, particularly if you have a large number of users.

Some Hosted Exchange Providers will not grant this access. If that is the case, then you can request credentials from your end users during the migration. 

Request user credentials

Create a project without admin credentials, and request credentials from users.

  1. Create a MigrationWiz mailbox migration project. When entering the Source information, do not click on the checkbox to enter admin credentials.
  2. Click on the green bar Bulk Add.
  3. Click on the checkbox I don't know the login name and password for the Source mailboxes.
  4. Click on the Upload bar.
  5. Click on the Choose File button, and select and upload your CSV file that contains the list of mailbox names.
  6. Click on the Save button.

When you submit the mailbox for migration, we will send an email with a secure link in which allows the end user to provide their credentials directly to the system. The sequence of steps are as follows:

  1. You submit the item for migration.
  2. An email is sent to the email address configured with a secure link to provide the credentials.
  3. The end user clicks on the provided link, which opens a secure web page.
  4. The end user provides their credentials directly to our system.
  5. The credentials are verified.
  6. The item is immediately submitted for migration.

The status of the migration will remain as "Waiting For End User" until the end user provides their credentials to the system.

Optional - Large Projects

If this is a very large project, the best results will be achieved by setting the project to use impersonation at the Source. In order to enable this, the PowerShell script below needs to be run by your Hosted Exchange provider, if they are willing.
New-ManagementRoleAssignment -Role ApplicationImpersonation -User <admin_user_name>

The second part of this process is to set your MigrationWiz project Advanced Options to use impersonation at the Source. This step is included in the MigrationWiz section in this guide.

Prepare Mailboxes

  1. Test mailbox access
  2. Export mailboxes to CSV file(s).
    • Ask the Hosted Exchange provider to provide them. 
    • If the provider has an admin console which includes this capability, run their tool to export the user list (and, if necessary, the passwords) to the CSV file.
    • If you have admin credentials on the Hosted Exchange environment, you only need a list of the email addresses. You do not need the password for each mailbox being migrated (because MigrationWiz will use delegation and perform the migration based on the admin credentials).
    • If you do not have admin credentials on the Hosted Exchange environment (which is common), you must obtain all the email addresses and passwords for the users.
    • If the list of mailboxes and passwords from the Hosted Exchange provider is not available, request that the users send these to MigrationWiz as part of the migration process.

Prepare the Destination Environment

Create the admin account

  1. Create a user in Office 365
  2. Connect to Exchange Online by using remote PowerShell
  3. Type the following command, and then press Enter:
    Get-Mailbox -ResultSize unlimited -Filter {(RecipientTypeDetails -eq 'UserMailbox') -and (Alias -ne 'Admin')} | Add-MailboxPermission -User AdministratorAccount@mydomain.com -AccessRights fullaccess -InheritanceType all

After you perform these steps, the specified user will be able to access all user mailboxes in Office 365. The user will be able to view the contents of the mailboxes from either Outlook or Outlook Web App.

Set up accounts in Microsoft 365

  1. Set up accounts on Microsoft 365 and assign licenses. These can be created in several ways:
Prepare the Tenant to Receive Large Items
Microsoft has increased the size limits on migrated items. To customize this in the tenant, see the Item Size Limits documentation from Microsoft.


Modern Authentication Requirements

Exchange Online EWS Modern Authentication Requirements (click on this box to expand required steps)

The steps listed below apply to both the source and/or destination tenant when they are Exchange Online, in regards to Exchange Web Services (EWS) in mailbox, archive mailbox, and public folder projects. Use a Global Administrator for the configuration steps.

 

For setup steps that include images, see under Enabling Modern Authentication for EWS between MigrationWiz and your Exchange Online Tenant in the following KB: Authentication Methods for Microsoft 365 (All Products) Migrations

Important: Failure to perform the steps for your Microsoft 365 endpoints, can result in failed jobs with 401 errors like the following in your project: Http POST request to 'autodiscover-s.outlook.com' failed - 401 Unauthorized


The administrator account being used for the project needs to be excluded from any MFA/2FA policies or Conditional Access policies that can block access for the administrator account. This requirement does not apply to the items or users being migrated in the project.

Configuring Modern Authentication to work with MigrationWiz for mailbox, archive mailbox, and public folder projects in Exchange Online is now the default method after Microsoft discontinued support for Basic Authentication in Exchange Online after December 2022. The following Microsoft documentation outlines this change in more detail. Should you have additional questions on how this change may impact your tenant, please contact Microsoft to assist with providing that information: Deprecation of Basic authentication in Exchange Online

The Azure Security Defaults must also be disabled in the tenant. (This is often enabled by default for all new Exchange Online tenants and there is no workaround for this requirement). For steps on where to enable/disable the Azure Security Defaults, see Enabling security defaults in the following Microsoft documentation. To disable, set Enable Security defaults to No: Security defaults in Azure AD

Modern Authentication Steps
  • Log in to the Azure AD admin console with a Global Administrator login.
  • Select Azure Active Directory in the Azure Active Directory Admin Center.
  • Select App Registrations, which is found under Manage.
  • Select New Registration at the top of the screen.
  • Give the app a distinct name. You can change this later if necessary.
  • Select the Accounts in any organizational directory button.
  • Under Redirect Uri, select Public Client (mobile & desktop) and set it to urn:ietf:wg:oauth:2.0:oob
  • Click Register.
  • Go back to App registrations.
  • Select the App you just created.
  • In the Overview, you will find a ClientId (aka Application) and Directory (Tenant) ID.
  • Copy both of these to another application, such as Notepad, for use later in this process.
  • Under the Manage menu, select Authentication.
  • Set the option Allow public client flows to Yes
  • Click Save.
  • From the Manage menu, select API permissions.
  • If API permission named User.Read under Microsoft Graph is already present, this can be removed. The Microsoft Graph API is not applicable to this project type and is not used.
  • Select Add a Permission.
  • Select APIs my organization uses

  • Scroll down and select Office 365 Exchange Online

  • Then select Delegated Permissions

  • Select EWS

  • Check the box under EWS for EWS.AccessAsUser.All.
  • Click Add permissions. This permission only allows the OAuth application (MigrationWiz) to be associated with EWS.
      • Important: This does not grant access to all mailbox data.
  • Click Grant admin consent.
  • Click Yes to confirm the settings.
  • In MigrationWiz, select the project that needs to be configured for Modern Authentication.
  • Click the Edit Project menu.
  • Select Advanced Options.
  • Under Support Options enter the ClientID and TenantID information you saved earlier in the following format:
    • If enabling Modern Authentication for the Source:
      • ModernAuthClientIdExport=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
      • ModernAuthTenantIdExport=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
    • If enabling Modern Authentication for the Destination:
      • ModernAuthClientIdImport=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
      • ModernAuthTenantIdImport=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx 
        • Enter the specific ClientID and TenantID for your tenant in place of the xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx.
        • These options can be entered for either the Source or the Destination, or both, depending on the settings on the tenants.
        • These options need to be configured for each MigrationWiz project that needs to have Modern Authentication enabled.

  • Run a Verify Credentials to confirm that MigrationWiz can connect using Modern Authentication. 
  • Click on the item that was verified. There will be a message in the MigrationWiz Migration Information page that Modern Authentication is being used. This message will show in the “Migration Errors” box; however, it is not an error. This is just a message confirming that Modern Authentication is now active and being used for the connection.

MSPComplete Steps

Create Customer

  1. Click the Add button in the top navigation bar
  2. Click the Add Customer button on the All Customers page
  3. In the left navigation pane, select the appropriate workgroup and then click All Customers.
  4. Click Add Customer.
  5. Enter the new customer’s information in the Add Customer form. Primary Email Domain and Company Name are required. The rest are optional.
  6. Click Save.
  7. Repeat steps 1 through 4 for each customer you want to add. 

Purchase licenses

We recommend that you purchase the User Migration Bundle license for this migration scenario. User Migration Bundle licenses allow multiple types of migrations to be performed with a single license. They also allow DeploymentPro to be used to configure Outlook email profiles. For questions on licensing, visit MigrationWiz Licenses

To purchase licenses:

  1. Sign in to your BitTitan account. 
  2. In the top navigation bar, click Purchase.
  3. Click the Select button and choose User Migration Bundle licenses.
  4. Enter the number of licenses you want to purchase. Click Buy Now.
  5. Enter a Billing address if applicable.
  6. Click Next.
  7. Review the Order Summary and enter a payment method.
  8. Click Place Your Order.

Apply licenses

  1. Select the correct workgroup on the top of the left navigation pane. This is the workgroup that the customer and migration project were created under. Your account must be part of the workgroup if the project was not created under your account.
  2. On the left navigation pane, click Customers.
  3. Click the customer that employs the user to whom you want to apply a User Migration Bundle license.
  4. Click the Users tab at the top of the page.
  5. Check the box to the left of the email for the user(s) to whom you want to apply a license.
  6. Click the Apply User Migration Bundle License button at the top of the page. It is recommended that users be added to the Customer page with the vanity domain. Then have the User Migration Bundle Licenses applied, before editing to show the .onmicrosoft domain, if the .onmicrosoft domain will be used for the migration.
  7. If there is at least one unassigned User Migration Bundle license available for each selected user, click Confirm. Important: If there are no User Migration Bundle licenses currently available to be assigned and your role in the workgroup is Manager or higher, the form that appears provides all the necessary information and will walk you through the steps of purchasing User Migration Bundle licenses.

Deploy DMA to users

GPO is the recommended methodology because no end user interaction is required. However, DMA may also be deployed via email, which requires users to manually install it on their computers.

Via GPO
  1. Download the DMA setup file from MSPComplete.
    1. In MSPComplete, click on All Customers from the navigation sidebar. 
    2. Click on the customer name for which you wish to deploy DMA.
    3. On the horizontal menu bar, click Users.
    4. Click Add Users, and then click Add Users via Device Management Agent
    5. On the Add Users via Device Management panel, click Device Management setup file to download the DMA setup file to your local drive. Please note that this file should not be renamed or altered in any way or it could cause issues when DMA is installed. These instructions are more detailed than those listed in the Add Users via Device Management Agent panel. 
  2. Step 2: Create a network share that is accessible to all of your customer’s computers and put the DMA setup file in the share folder.
    1. Log on to the file server as an administrator.
    2. Click Start and search for Server Manager.
    3. Click Server Manager from the search results.
    4. Click File and Storage Services
    5. Click Shares
    6. Next to Shares, click Tasks
    7. Click New Share
    8. Continue through the New Share Wizard prompts until finished, then click Create
    9. Right-click on the new share in Server Manager, and click Open Share
    10. Put the DMA setup file in the share.
    11. Write down the share's network path. This will be needed when creating the scheduled task.
  3. Step 3: Create a Group Policy Object that forces the domain joined computers in a security filter to execute the DMA setup file through a scheduled task.
    1. Log on to the Active Directory Domain Controller as an administrator.
    2. Click Start and search for Group Policy Management.
    3. Click Group Policy Management
    4. Right-click on the desired Active Directory domain, and then click Create a GPO in this domain, and link it here.
    5. Enter a name for the GPO, and then click Ok. By default, the GPO will apply to all users and computers that successfully authenticate to the Active Directory domain.
  4. To narrow the scope of computers that install DMA, select Authenticated Users, and click Remove
    1. To confirm the removal, click Ok.
  5. To add a new security filter, click Add.
    1. Type the name of the security group that the target computers are a member of and click Check names
    2. Click Ok.
  6. Right-click on the new GPO, and then click Edit
    1. In the console tree, under Computer Configuration, click PreferencesControl Panel > Scheduled Tasks.
    2. Right-click Scheduled Tasks and click on New, and then click on Immediate Task (At least Windows 7).
    3. Enter a name and a description for the Scheduled Task.
    4. Click Change User or Group
    5. Type "system" in the Object name text box.
    6. Click Check Names. Make sure that the system object name resolves to NT Authority\System.
    7. Under Security options, click Run whether a user is logged on or not and add a check next to Run with highest privileges.
    8. In the Configure for drop-down menu, select Windows 7, Windows Server 2008 R2
    9. Click the Actions tab
    10. Click on New.
    11. In the Action drop-down menu, select Start a program
    12. In the Programs/script text box, enter the network path for the DMA setup file. If you use the Browse button to find the location of the script, then it will add the path as c:\xxxx. This is incorrect since the script needs to include the UNC path and not the local path. Be sure to replace the c:\ format with the \\servername\sharename\ format.​
    13. If the customer's computers use a proxy, you must add a command line parameter into the Add arguments field to ensure that DMA is able to transmit data through the proxy. Read the How do I deploy the Device Management Agent on computers that use a proxy?​​ article for more information.​
    14. Click Ok.
    15. Click the Conditions
    16. Add a checkmark next to Start only if the following network connection is available, and then select Any connection.
    17. Click Ok
  7. Close Group Policy Management Editor, and then close Group Policy Management.
  8. The DMA setup file will execute on user computers at the next Group Policy refresh, typically every 90 minutes, with a random offset of 0 to 30 minutes.
Via Email

To deploy the BitTitan Device Management Agent (DMA) through email, you ask users to manually install the agent. We recommend installing DMA through a group policy object because it’s automated and non-intrusive.

  1. Click Customers on the navigation sidebar.
  2. Click the customer name for which you wish to deploy DMA.
  3. Click Users.
  4. Add a checkmark next to the user(s) that should receive the email.
  5. Click the Enable Device Management Through Email button.
  6. In the Enable Device Management via Email panel, enter your email address in the Reply-To Address field.
  7. Confirm that all of the users you chose are listed in the To field.
  8. To personalize the email message that the customer's users will receive, type your changes into the message body text box. If the customer's computers use a proxy, you must add instructions to run the DMA installer with command line parameters that ensure DMA is able to transmit data through the proxy.
  9. Click Send Agent Email.
  10. Important: DO NOT change the name of the DMA setup file sent via email, or let users share the file. Each file is only for the user and machine it is sent to.
  11. The customer’s users will receive the email asking them to manually install the agent.​ The users and their computer information will start populating in MSPComplete under the customer’s context soon after the agent is installed and running.

Once DMA has been deployed to users, check the Users tab in MSPComplete. This will be populated with the user accounts that have DMA installed.

DeploymentPro Steps

  1. Launch DeploymentPro.
    1. Go to All Products > Device Management, click on DeploymentPro on the far left and follow the prompts to launch.
    2. Select a customer from the list by clicking on the customer name. The status column will show Enabled when a customer account has had DMA deployed to users.
    3. Configure customer DeploymentPro module:
    4. Enter the Domain.
    5. Select the Destination endpoint.
    6. Checkmark the Auto-populate option. 
    7. In the Client Interface Configurations section, upload your company logo and add supporting text. We strongly recommend doing this because this is the logo and text that end users will see in a desktop pop-up when they are prompted to reconfigure their Outlook profiles. If you do not upload your own logo, the default BitTitan logo will be included instead.
    8. Save and continue.
  2. Activate DeploymentPro module for users by either selecting all users (by check-marking the box to the left of the Primary Email column heading), or select individual users (by check-marking the boxes to the left of the user email addresses).
  3. Click the Schedule Cutover
  4. Schedule the profile cutover date.
  5. Set the date and time for the Outlook profile configuration to occur, and click the Schedule Cutover 
    1. The DeploymentPro module will install on user devices immediately and then run silently until this date.
    2. The profile cutover date should be set to a date and time that is shortly after MX record cutover.
    3. On the profile cutover date, users will be guided through the reconfiguration of their Outlook profile.

 

MigrationWiz Steps

Create a Mailbox Migration project

  1. Click the Go to My Projects button.
  2. Click the Create Project button.
  3. Click on the type of project that you wish to create. For this migration:
    • Mailbox: Mailbox projects are used to migrate the contents of the primary user mailbox from the previous environment to the new environment. Most mailbox migrations can migrate email, calendars, and contacts.

For mailbox migrations, use administrative credentials to access the mailboxes being migrated. In most migration scenarios, the admin account needs to have full access rights to the Source mailboxes. 

  1. Click Next Step.
  2. Enter a Project name and select a Customer.
  3. Click Next Step.
  4. Select a Source Endpoint or create a new endpoint.
  5. To create a new source endpoint:
    1. Click New
    2. Name endpoint
    3. Select type Exchange Server 2003+
    4. Enter the OWA URL
    5. Provide credentials: Click the Provide Credentials radio button, and enter the admin account credentials for the account that was set up under the “Prepare the Destination Environment” section of this guide.
    6. Click Add
    7. Click Next Step
  6. Select or create a new destination endpoint.
  7. To create a new destination endpoint:
    1. Click New
    2. Name endpoint
    3. Select type Office 365
    4. Provide credentials.
    5. Click Add
  8. Click Next Step
  9. Click Save and Go to Summary.

Add Users

Add the user accounts that will be migrated to the project. MigrationWiz allows you to bulk import mailboxes into the system. Bulk Add uses a CSV containing the source and destination email addresses for the users to add the users to the project.

Use the Bulk Add option, and then import from the CSV file that you prepared when following the steps under the Prepare the Source section of this guide.

To import one or more mailboxes:

    1. Sign in to your MigrationWiz account.
    2. Select the Project for which you want to perform the bulk import.
    3. Click Add.
    4. Click Bulk Add.
    5. Follow the instructions on the page.

Add the accounts (also referred to as "items") that will be migrated to the project.

If the list of mailboxes and passwords from the Hosted Exchange provider is not available, request that the users send these to MigrationWiz as part of the migration process.

Advanced Options

Under Support/Support Options

  • If using impersonation, the value for Maximum concurrent migrations​, under the Performance section, can be set to a very high value, e.g.,1000. There is no limit for this value if using impersonation.​
  • If not using impersonation, we recommend that you set the Maximum concurrent migrations​ value to a low number, such as 20.
  • If this is a very large project, the best results will be achieved by setting the project to use impersonation at the Source (as documented in the Prepare Source Environment section of this guide). However, many Hosted provider will not accommodate this request. If they do, checkmark the box for Use impersonation at source. Exchange impersonation (not delegation) utilizes per-user throttling quotas, which allows for a very large number of users to be migrated concurrently.
  • Set to use impersonation at the Destination. Checkmark the Use impersonation at Destination box. 

Run Verify Credentials

  1. ​Sign in to your MigrationWiz account​.
  2. Open the Project containing items you wish to validate​.
  3. Select the items you wish to validate.
  4. Click on the Start button in your dashboard.
  5. Select Verify Credentials from the drop-down list.

Once complete, the results of the verification will be shown in the Status section.​ 

Notify Users

Notify users that a migration is occurring. Send email to all users telling them the time and date of the migration.

Run Migration

Pre-Stage pass

  1. Select the users you wish to migrate
  2. Click the Start button from the top
  3. Select Pre-Stage Migration
  4. Under the Migration Scheduling section, from the drop-down list, select 90 days ago
  5. Click Start Migration.

MX Record Cutover

Change over MX records on the DNS provider's portal.

Also, include the AutoDiscover (CName) setting.

Send email to end users to let them know what to expect for their Outlook profile reconfiguration. 

Notify users

Send email to end users to let them know what to expect for their Outlook profile reconfiguration. Samples and screenshots can be found in our DeploymentPro documentation, if you are utilizing that tool. 

Full (Delta) pass

  1. Select the users
  2. Click the Start button from the top
  3. Select Full Migration
  4. Click Start Migration

Run Retry Errors

Look through the user list and click any red "failed migration" errors. Review the information and act accordingly.

If problems persist, contact Support.

Outlook Configuration

If not using DeploymentPro, then users must now create new Outlook profiles, and set up their signatures again, and reattach any PST files that were attached to their previous profile.

Request Statistics

Click the pie chart icon in the MigrationWiz dashboard to receive an email containing all the project migration statistics.

 

Was this article helpful?
6 out of 14 found this helpful