Solved

How can you find out what Exchange recipient mail policies have been applied and what does the priority order do?

Posted on 2009-07-13
3
283 Views
Last Modified: 2012-05-07
Question: I have just started at a new company and notice a number of recipient policies have been created.
My question is, is there an easy way to find out which of these recipient policies have been applied and which have not?
My understanding is that only the system policies that have been applied will be listed under the policies tag. You know.....when you right click the mailbox store and see the tags there.
But I want to see what recipient policies have been applied.

Also does the recipient and system policies work in principle the same way as they do in AD?
i.e. you can have multiple policies but as long as there is no conflict in them they will all apply?
0
Comment
Question by:MichaelK2
  • 2
3 Comments
 
LVL 58

Expert Comment

by:tigermatt
ID: 24838725

Recipient Policies do not work on a basis that they all apply.

Recipient Policies have an Active Directory filter property. This defines the users/groups/objects which that policy can apply to. Exchange searches the policies starting with the highest priority, working down. If it finds a filter on a policy which registers true for the user it is processing, it stops and applies that particular policy. It then does not continue further.

So, to answer your question, no - only 1 Recipient Policy will EVER apply to a user at one time.

It sounds like you are running Exchange 2000 with the notorious 'System Policies' container. I believe this is located inside the Server object in Exchange System Manager; from there you can see each policy and the settings it is applying.

-Matt
0
 

Author Comment

by:MichaelK2
ID: 24838764
Ok, thanks.
Does the same apply for system policies.i.e. only 1 System policy will ever apply to a mailbox store?
0
 
LVL 58

Accepted Solution

by:
tigermatt earned 500 total points
ID: 24838776

I believe so, yes.

-Matt
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Resolve DNS query failed errors for Exchange
This article explains in simple steps how to renew expiring Exchange Server Internal Transport Certificate.
To show how to generate a certificate request in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.:  First we need to log into the Exchange Admin Center. Navigate to the Servers >> Certificates…
To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now