• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • Disclaimer & Policy

Elan Shudnow's Blog

MVP Logo
  • Azure
  • Exchange
  • Lync

Lync Server 2010 RC and Snooper.exe

October 25, 2010 by Elan Shudnow 9 Comments

Lync Server 2010 RC currently has no Resource Kit. Until it does, follow these instructions to grant Snooper.exe the ability to automatically analyze your Lync Logger traces. Keep in mind, this blog article will not be needed anymore once the Lync Resource Kit Tools are released.

For those of you working in a lab environment, you may need to do some more thorough troubleshooting besides looking at Event Logs. These tools that provide the ability to do further troubleshooting are located in the Resource Kit Tools. As stated above, Lync 2010 RC does not have Resource Kit Tools, yet. I’m sure most of you would then think of doing the following: to install the OCS 2007 R2 Resource Kit. But, there’s a problem. If you go to install the OCS 2007 R2 Resource Kit, you get the following error:

Thankfully, there is a way to get Snooper installed so that we may do some deeper analysis of Lync Server 2010 RC.  The first thing we will need to do, is take the OCS 2007 R2 Resource Kit Tools, and extract the tools using msiexec.  To do this, I will put the OCSResKit.msi in the C:\ volume at the root level.

We now want to build our msiexec command to extract this MSI file.  The command utilized will structured as such:

msiexec /a MsiPath /qb TARGETDIR=FullPathToExtractDirectory

Because our cmd.exe is in the same location as the MSI file we will be extracting and we want our folder to also be located on C:\, we will use the following command:

msiexec /a OCSResKit.msi /qb TARGETDIR=C:\OCSResKit

After running the command, we will see the MSI Extraction processes which looks as if the OCS Resource Kit is installing.

Let’s navigate to the location of our Snooper.exe.  This is located in “C:\OCSResKit\BuiltIn\Microsoft Office Communications Server 2007 R2\ResKit\Tracing”

Copy the Snooper.exe executable and navigate to and paste the file in the following directory “C:\Program Files\Common Files\Microsoft Lync Server 2010\Tracing”

Now when you are doing tracing with The Lync Server 2010 Logging Tool and click Analyze, it will have the ability to automatically launch Snooper.exe just like with OCS after you had installed the OCS 2007 R2 Resource Kit in OCS 2007 R2.

Share this:

  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Reddit (Opens in new window) Reddit

Filed Under: Lync Tagged With: Lync

Reader Interactions

Comments

  1. Amanda Debler says

    February 13, 2014 at 2:01 pm

    Yay! This helped me install LyncDebugTools (for Lync Server 2013) on Windows 8.1 (not pro). Snooper runs like a champ!

    Reply
  2. @barakariki says

    February 26, 2013 at 3:47 am

    That was very helpful

    Reply
  3. B.Model says

    December 5, 2011 at 4:22 am

    Thank you very much. That helped a lot!

    Reply
  4. Chris Lehr says

    October 29, 2010 at 12:53 pm

    I just installed the OCS R2 Reskit – no real issue doing so.

    Reply
  5. Sachin says

    October 27, 2010 at 9:23 pm

    You can simply copy snooper.exe or tracing folder from any resource kit installed machine. it will work.

    Reply
    • Elan Shudnow says

      October 27, 2010 at 10:36 pm

      I would hope that'd be pretty obvious to anybody that already uses snooper.

      Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

  • GitHub
  • LinkedIn
  • RSS
  • YouTube

More to See

Azure AD User Settings

Pre-creating Azure AD App for Azure Migrate

January 24, 2023 By Elan Shudnow

Azure Runbooks Connecting to Exchange Online and Microsoft Graph

July 22, 2022 By Elan Shudnow

Using Python 3.8.0 Azure Runbooks with Python Packages

July 11, 2022 By Elan Shudnow

Preserving UNC Path after Azure Files Migration using DFS-N

April 10, 2022 By Elan Shudnow

Tags

ACR Always Encrypted Ansible Automation Availability Sets Availability Zones Azure Azure Active Directory Azure Application Gateway Azure Files Azure Firewall Azure Key Vault Azure Load Balancer Azure Migrate Azure Monitor Azure Web App CDN Cluster DevOps DFS Docker DPM Event Grid Exchange Exchange 2010 Exchange Online Function App ISA iSCSI Log Analytics Logic App Lync Microsoft Graph OCS Office Personal PowerShell Proximity Placement Groups Runbook SCOM Storage Accounts Symantec Virtual Machines Windows Server 2008 Windows Server 2008 R2

Footer

About Me

Microsoft Cloud Solution Architect focused on Azure IaaS, PaaS, DevOps, Ansible, Terraform, ARM and PowerShell.

Previously a 6x Microsoft MVP in Exchange Server and Lync Server.

My hobbies include watching sports (Baseball, Football and Hockey) as well as Aviation.

Recent

  • GRS Storage and BCDR Considerations
  • Pre-creating Azure AD App for Azure Migrate
  • Azure Runbooks Connecting to Exchange Online and Microsoft Graph
  • Using Python 3.8.0 Azure Runbooks with Python Packages
  • Preserving UNC Path after Azure Files Migration using DFS-N

Search

Tags

ACR Always Encrypted Ansible Automation Availability Sets Availability Zones Azure Azure Active Directory Azure Application Gateway Azure Files Azure Firewall Azure Key Vault Azure Load Balancer Azure Migrate Azure Monitor Azure Web App CDN Cluster DevOps DFS Docker DPM Event Grid Exchange Exchange 2010 Exchange Online Function App ISA iSCSI Log Analytics Logic App Lync Microsoft Graph OCS Office Personal PowerShell Proximity Placement Groups Runbook SCOM Storage Accounts Symantec Virtual Machines Windows Server 2008 Windows Server 2008 R2

Copyright © 2025 · Magazine Pro on Genesis Framework · WordPress · Log in