?
Solved

NDR report from non-invited ex-employee when acknowledging meeting requests

Posted on 2008-10-28
7
Medium Priority
?
355 Views
Last Modified: 2012-05-05
We have an issue whereby when we acknowledge (accept, tentative accept, decline) a meeting request from a particular user, we get an NDR from a former PA who is no longer with the company (see attached);
We have checked permissions on the user's AD account - no delegation or redirection, the ex-employee is not a member of any groups (we have also checked the groups that the user who is sending the meeting request is a member of, and there is no sign in these of the ex-employee), we have checked permissions on the resources (meeting room), we have checked the local outlook settings for delegation or permissions, but cannot find anything that would point to the ex-employee.
Any ideas on how to resolve this would be appreciated.
Thanks


NDRerror.jpg
0
Comment
Question by:RobinHuman
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
7 Comments
 
LVL 6

Expert Comment

by:MikeeMiracle
ID: 22820409
Have seen this several times in the past.

The group membership has been cached by the local copy of outlook used to send the invite.  Ask whoever is sending the invites to select the group from the gobal address list (actually press the To button and select the group from the list.)

0
 
LVL 12

Author Comment

by:RobinHuman
ID: 22820530
The requesting user is not selecting a group - he is selecting individual users from the GAL
0
 
LVL 32

Accepted Solution

by:
gupnit earned 1000 total points
ID: 22825067
Hi,
Can you ask the user to create Meeting request via OWA. Now once he does that please reply via OWA. After this please do give me a Messge Tracking Log of the Message Flow.
Also please see these 2:
Let me know
Thanks
Nitin
0
Does Powershell have you tied up in knots?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

 
LVL 12

Author Comment

by:RobinHuman
ID: 22849614
The user is only back next week, so I'll only be able to try this then..
I'll keep you posted
Thanks
0
 
LVL 32

Expert Comment

by:gupnit
ID: 22851939
Sure No problems....
Cheers
Nitin
0
 
LVL 12

Author Closing Comment

by:RobinHuman
ID: 31510668
Thanks for your help - seems to have resloved it;
I'll contact you if this changes...
:-)
0
 
LVL 32

Expert Comment

by:gupnit
ID: 22888717
Glad to help, feel free to contact me .... I am unable to answer from here, contact me at http://www.nitingupta.in/contact/
Cheers
Nitin
0

Featured Post

Office 365 Training for Admins - 7 Day Trial

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you troubleshoot Outlook for clients, you may want to know a bit more about the OST file before doing your next job. IMAP can cause a lot of drama if removed in the accounts without backing up.
Microsoft Office 365 is a subscriptions based service which includes services like Exchange Online and Skype for business Online. These services integrate with Microsoft's online version of Active Directory called Azure Active Directory.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
Suggested Courses
Course of the Month10 days, 10 hours left to enroll

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question