meeting requests to certain user generate NDR of old email address

Posted on 2008-11-05
Last Modified: 2010-04-21
Anytime someone copies a specific user (we'll call her UserA) as an invite to a meeting in Outlook - the meeting organizer recieves an NDR from the System Administrator.  Somehow it is trying to copy an old user on all meeting requests sent to UserA.  The old user is not setup as a delegate nor do they have permission to access the inbox, calendar, or any other items of UserA to my knowledge.  The old user does not even exist in Active Directory or Exchange anymore - see details of NDR below.   UserA still recieves the meeting request - but it is unecessarily copying the old user on all meeting request creating a very annoying chain reaction of NDRs to other meeting organizers.  

The following recipient(s) cannot be reached:

      "Old User" on 11/5/2008 2:26 PM
            The e-mail account does not exist at the organization this message was sent to.  Check the e-mail address, or contact the recipient directly to find out the correct address.
Question by:KevinITadmin
    LVL 3

    Expert Comment

    I have the same problem but have tried all kinds of way to try and resolve this but no luck. I will be interested in the outcome of this one.
    LVL 6

    Accepted Solution

    The mystery user used to be a delegate of UserA, but when they were deleted, it doesn't automatically remove the delegate entry in UserA's mailbox.

    Delegate functionality is achieved by 'hidden' mailbox rules being added by the system.  If the hidden system folder in the mailbox that stored the Inbox rules (the Associated Messages folder) becomes corrupted in some way - more common that you'd think - then the ability to 'see' the rules in the Delegates tab of Outlook disappears - but the rule still fires anyway.

    You should be able to remove the corrupt rules using this procedure:  Be careful, you can badly mess up a mailbox unless you follow the instructions carefully.

    Author Closing Comment

    Right on!  This fixed it.  Thanks a ton.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Granting full access permission allows users to access mailboxes present in their database. By giving full access permission one can open and read the content of any mailbox but cannot send emails from that mailbox.
    Sometimes Outlook might have problems sending a message. There may be various causes- corrupted PST, AV scanner etc. The message, instead of going to the Sent Items folder, sits in the Outbox indefinitely. To remove it you can use a free tool cal…
    In this video we show how to create a Contact in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Recipients >> Contact ta…
    In this Micro Video tutorial you will learn the basics about Database Availability Groups and How to configure one using a live Exchange Server Environment. The video tutorial explains the basics of the Exchange server Database Availability grou…

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    14 Experts available now in Live!

    Get 1:1 Help Now