Solved

User lost shared Calendar option

Posted on 2008-06-25
10
277 Views
Last Modified: 2008-07-10
I have a enduser that has had access to another users calendar up till this week. When she tries to view his calendar if gives the " You do not have sufficient permission yada yada" error. I have 2 users setup to view his calendar and they are setup exactly the same. I have tried her account under a different outlook profile and even from a different machine and she gets the same error message.

Any help would be greatly helpful.
0
Comment
Question by:mmicklon
  • 5
10 Comments
 
LVL 23

Expert Comment

by:Stacy Spear
ID: 21875052
Remove and readd her access to the original calendar. Not the glamorous fix but usually works.
0
 

Author Comment

by:mmicklon
ID: 21875953
I have already tried that. didn't work.
0
 

Author Comment

by:mmicklon
ID: 21898488
Also to add to the twist, I can login to a domain admin and setup her emial profile account under my domain account and it works. not sure what is causing it not to work under her domain account.
0
Too many email signature changes to deal with?

Are you constantly being asked to update your organization's email signatures? Do they take up too much of your time? Wouldn't you love to be able to manage all signatures from one central location, easily design them and deploy them quickly to users. Well, you can!

 

Accepted Solution

by:
mmicklon earned 0 total points
ID: 21918662
Problem resolved. Not 100% sure what the cause it but it does have to do with how group policy is applied once the user logs in. I cleared the local security databases and that seemed to fix the problem. That is why I could setup the user email account under somoene elses login account and everything worked fine.  Wasn't tied to the computer though cause I did try other Pcs to test her account. Just a strange problem that is hopefully resolved.
0
 

Author Comment

by:mmicklon
ID: 21944549
None
0
 

Author Comment

by:mmicklon
ID: 21944555
No Comment
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Follow this checklist to learn more about the 15 things you should never include in an email signature from personal quotes, animated gifs and out-of-date marketing content.
This process describes the steps required to Import and Export data from and to .pst files using Exchange 2010. We can use these steps to export data from a user to a .pst file, import data back to the same or a different user, or even import data t…
In this video we show how to create a mailbox database in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Servers >> Data…
how to add IIS SMTP to handle application/Scanner relays into office 365.

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now