Solved

Server duplicating mail

Posted on 2008-06-16
11
194 Views
Last Modified: 2012-05-05
Howdy Experts,

Using Exchange 2003 and Outlook 2003 clients.  I have one user reporting that when she replies or forwards the recipient receives multiple copies.  Usually one copy, but sometimes more.  I have checked her Sent Items in Outlook and she is only sending one, but the Exchange logs show multiples.  User reports this is only occuring on internal addresses (recipients on the same domain) but can not verify.  

Problem does NOT occur every time - have been unable to isolate the specific cause.  Any suggestions?

-Thorin
0
Comment
Question by:Thorin
  • 6
  • 5
11 Comments
 
LVL 13

Expert Comment

by:Richard_de_groot
ID: 21796911
Have you tried to switch of antivirus/antispam or security on server and/or workstation? What are you using for security?

Richard.
0
 
LVL 2

Author Comment

by:Thorin
ID: 21798078
Hi Richard,

Thanks for the reply.  We use Symantec AV Corp Ed on the desktops, and server (centrally managed) plus an external 3rd party for spam/malware.  Internal mail is not routed through external 3rd party, and disabling AV is above my pay grade.  However all users have Symantec and only one is intermittently reporting this issue.  I have been trying to track it for several days, but have had only one report.  

Does that help at all?

-Thorin
0
 
LVL 13

Expert Comment

by:Richard_de_groot
ID: 21798101
Symantec is notorious for thee kind of problems

>>AV is above my pay grade
See if someone is able to make this an option to try for temp. disbale Symantec.

Can you try and test then?

Richard.
0
 
LVL 2

Author Comment

by:Thorin
ID: 21798216
Hi Richard,

I will give it a shot.  Because the problem is intermittent I do not know how to force the issue for testing.  This'll mean leaving AV down for a few days.  While testing that....any other suggestions to try?

-Thorin
0
 
LVL 2

Author Comment

by:Thorin
ID: 21857110
Ok...so AV has been off for a week....and the user is still sending dupes and triples.  It is not just for internal mail users either - external users are reporting receiving dupes.  Only happens to this one user.

AV is back on....any other suggestions?  Thanks.
0
What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

 
LVL 13

Expert Comment

by:Richard_de_groot
ID: 21858000
Are you maybe using pop-boxes in combination with an Exchange connector in Outllook on the clients?
0
 
LVL 2

Author Comment

by:Thorin
ID: 21858381
Hi Richard,

Nope, no pop on the exchange server or the client.  

I just completely uninstalled Symantec from the machine also - it was just disabled before.  Wierd one, huh?

-Thorin
0
 
LVL 13

Expert Comment

by:Richard_de_groot
ID: 21890217
Sorry for my absence but I'm back from a short break, hardly needed :-)

Is it a possibility (now we know it's server related) to offline defragement the priv1.edb on the server?

Richard.
0
 
LVL 2

Author Comment

by:Thorin
ID: 21900204
Hi Richard,

No apologies necessary!  I'll take your help whenever you have free time to give it.  Hope your break was pleasant and restful.  And thanks for getting back to me on this.

Yes, this can be done, however I might need a little prodding in the right direction.  Can you provide a little more detail on what needs to be done?  Or a doc reference?

-Thorin

0
 
LVL 13

Accepted Solution

by:
Richard_de_groot earned 500 total points
ID: 21901387
Thanks. Sure here's something you can use:

http://www.msexchange.org/tutorials/Exchange-ISINTEG-ESEUTIL.html

Hope this helps.

Richard.
0
 
LVL 2

Author Closing Comment

by:Thorin
ID: 31467714
Hey Richard,

Well...before I could try this solution the PC was updated to Office 2007, which seems to have alleviated the problem.  I am giving you the points though because of all the help.  I will try your suggestion is this issue crops up again.  Thanks!
-Thorin
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

This process describes the steps required to Import and Export data from and to .pst files using Exchange 2010. We can use these steps to export data from a user to a .pst file, import data back to the same or a different user, or even import data t…
Is your Office 365 signature not working the way you want it to? Are signature updates taking up too much of your time? Let's run through the most common problems that an IT administrator can encounter when dealing with Office 365 email signatures.
In this Micro Video tutorial you will learn the basics about Database Availability Groups and How to configure one using a live Exchange Server Environment. The video tutorial explains the basics of the Exchange server Database Availability grou…
To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now