Solved

Exchange Logon Problems

Posted on 2004-08-04
5
129 Views
Last Modified: 2013-12-04
We have a new member of staff who is a direct replacement for the guy tha has left.I want to give him the same access via the profile but need him to access exchange so he can pick up mail.Have tried variuos things without success.Any help much appreciated.
0
Comment
Question by:resolveitltd
  • 3
  • 2
5 Comments
 

Author Comment

by:resolveitltd
ID: 11714556
Just to clarify a bit all i want to do is change his logon details and pick up mail via exchange.Unsure of the next step.
0
 
LVL 3

Expert Comment

by:eveljkov
ID: 11718212
just connect outlook to the old guy's user name. or if old guy was storing emails in a pst, just connect the old guys pst to the new guys Outlook.  Or you could delegate the new guy to view the old guys inbox
0
 

Author Comment

by:resolveitltd
ID: 11723928
Craeted a new user on the server and logged on which creates a new profile,copied old users profile via c:\Docs and Settings\username,everything seemes ok after that.Thanks for the assistance eveljkov.
0
 
LVL 3

Accepted Solution

by:
eveljkov earned 500 total points
ID: 11727098
did you copy the hidden files too?  

glad to help.
0
 

Author Comment

by:resolveitltd
ID: 11727227
Set to view all files and that solved the last piece of the puzzle!!Thanks for your help.
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Join & Write a Comment

Recently, a new law in my state forced us to get a top-to-bottom analysis of all of our contract client's networks. While we have documentation, it was spotty at best for some - and in any event it needed to be checked against reality. That was m…
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now