Send Meeting Requests As a Delegate Without Becoming An Organizer

Posted on 2011-05-11
Last Modified: 2012-05-11
Is it possible to create meeting requests in Outlook 2007 on behalf of another user without subsequently being listed as an organizer for that meeting? In our current configuration, when a delegate creates a request on behalf of another user, that delegate is listed in the organizer field as the creator of the meeting "on behalf of" the owner of the calendar. Can a delegate create a meeting as another user so that only that other user (the delegator) is shown as the organizer?

I have had a difficult time finding a definitive answer one way or another; perhaps I am not using the correct language to describe what I am trying to accomplish. Any direction would be much appreciated.

Thanks in advance.
Question by:thaumaturgist
    LVL 23

    Accepted Solution

    I replicated this before replying... although the Organizer line in the Appointment tab has Delegate's name on behalf of Main_Account, the Scheduling tab has Main_Account as the Meeting Organizer (and not Delegate's name).  

    The only way that I know of getting around this is to provision the Delegate in question with Mailbox rights to Main_Account's Outlook account and then having an additional Outlook profile (a Main_Account profile) created on the Delegate's machine. With the Prompt for a profile to be used option set in the Mail setup from Control Panel, the Delegate can launch Outlook, select either his/her own Outlook profile or dropdown to select  the Main_Account Outlook profile in order to send items (in this case, Meeting Request items) for Main_Account without ever having the on behalf of wording show up on Meeting Requests.

    Author Comment

    You're right, meetings arranged by delegates do appear to show the delegator as the organizer. I suspect the confusion arose from the delegator having configured requests and responses to forward to the delegate without the delegates knowledge. From the delegates perspective, it appeared that they were being made the organizer.

    Thanks so much for your assistance with this, yobri.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Set up iPhone and iPad email signatures to always send in high-quality HTML with this step-by step guide.
    Easy CSR creation in Exchange 2007,2010 and 2013
    To show how to generate a certificate request in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.:  First we need to log into the Exchange Admin Center. Navigate to the Servers >> Certificates…
    In this Micro Video tutorial you will learn the basics about Database Availability Groups and How to configure one using a live Exchange Server Environment. The video tutorial explains the basics of the Exchange server Database Availability grou…

    737 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    22 Experts available now in Live!

    Get 1:1 Help Now