?
Solved

How do you create mail enabled contacts from csvde?

Posted on 2009-04-21
4
Medium Priority
?
4,173 Views
Last Modified: 2012-06-21
I exported users from one domain into a csv file.  I then modified the csv to import it into another domain as contacts.  What format do you need to import a user as a mail enable contact?

A sample of the csv file I currently have is shown below:

DN,objectclass,displayName,mail,mail,
"CN=Gray\\, Eric ,OU=Embarkable,DC=cool,DC=com",contact,"Gray, Eric",eric.gray@cool.com,smtp:,smtp:eric.gray@cool.com
"CN=Jim\\, Aleyda M. OU=Embarkable,DC=cool,DC=com",contact,"Salinas, Jim M." ,aleyda.jim@cool.com,smtp:,smtp:aleyda.jim@cool.com
"CN=amy.buchs,OU=Embarkable,DC=cool,DC=com",contact,"Buchs, Amy J ",amy.buchs@cool.com,smtp:,smtp:amy.buchs@cool.com

0
Comment
Question by:necromiser
  • 2
4 Comments
 
LVL 11

Expert Comment

by:Zuhir Elgmati
ID: 24201961
0
 

Author Comment

by:necromiser
ID: 24203415
The microsoft knowledge base does not show me which object to use to establish a email enabled contact through a csv file.
0
 
LVL 15

Accepted Solution

by:
abhaigh earned 2000 total points
ID: 24203437
Excerpted from

Bulk contact import to AD using CSVDE
http://redmondmag.com/forums/forum_posts.asp?tid=1074&pn=2

¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬
If you are just creating mail-enabled contacts, here is the format for the minimal amount of information for a test user into the OU Domain.com\Distribution\Categories:
-----------------------
objectClass,displayName,DN,mailNickname,targetAddress,proxyAddresses,msExchPoliciesExcluded,mail
contact,Aaron Adams,"CN=Aaron Adams,OU=Category,OU=Distribution,DC=Domain,DC=com",aadams,SMTP:aadams@domain.com,SMTP:aadams@domain.com,{26491CFC-9E50-4857-861B-0CB8DF22B5D7},aadams@domain.com
-----------------------

Copy all of the text between the lines and paste it into Excel (you may have to separate out the columns manually). There are two rows - first is the HEADERS which defines the attributes we are importing; second is the actual data. (You can paste into a text editor like Notepad or Word if you want to do a lot of manual work!) Excel will allow you to create formulas and "fill down" so you only have to put in the name and e-mail once and it will generate the other columns for you. Using this template, you can modify the values for your environment and put in all the users, then save as a CSV file and import it into Active Directory using "CSVDE -I -F IMPORT.CSV".

If you want to see the exact DN you need, based on your domain, dump all of your existing contacts using the following command (typed as one line):
CSVDE -F CONTACTS.CSV -R "(objectclass=contact)" -L objectClass,displayName,DN,mailNickname,targetAddress,proxyAddresses,msExchPoliciesExcluded,mail

That weird looking value for the import "{26491CFC...}" means "remove the checkbox to automatically update e-mail address based on recipient policy" on the e-mail address tab for the object.
¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬
0
 

Author Closing Comment

by:necromiser
ID: 31573114
Thank you!  That was exactly what I was looking for.
0

Featured Post

NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Steps to fix “Unable to mount database. (hr=0x80004005, ec=1108)”.
Transferring FSMO roles is done when an admin wants to split roles between certain Domain Controllers or the Domain Controller holding the Roles has been forcefully demoted using dcpromo / forceremoval
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

850 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question