a meeting request and notification of acceptance

Posted on 2011-10-03
Last Modified: 2012-08-14
I have a meeting request and notification of acceptance that is cycling over and over.  I have deleted the meeting and so has the recipient, yet I keep getting a response.

See below image.  This is just this morning’s notifications, I have deleted about 100 from last week already.
 Files keep comming
Question by:cc-main
    LVL 47

    Accepted Solution

    Might check that both Outlook clients do not have cached exchange mode on
    If it is, turn it off.
    Rename or Delete the OST

    Once done, If Cached Exchange mode is actaully needed (i.e. Laptop Users or Locations with Network Connectivity issues) you can turn it back on. A new OST will be created with only the current info

    Need to also check to see if eigther user, LIkely the one who responded, is using a Mobile DEvice to Sync to outlook. POssible this device is responsible for the continued acceptance notifications


    Author Comment

    My client that "sent" the meeting request is using POP/SMTP, but I am not sure if Exchange is involved at the other end. I will check it out in the morning and report back to you regarding the rest...

    Thank you for your reply....



    Author Comment

    One more thought here that may help, if the message is actually sent by recipients mobile, should not my clients notebook also receive (and his blackberry) this message. Why just on his desktop? I have even created his same account on my notebook, and I get his normal mail, but that “rogue” message does not come to me, but it does appears as new unread message on his desktop Outlook, dated September 27th12:21PM. Since I send in my question to Exchange, I have about 150 more of them.


    Author Comment

    It was a "sync" issue with ISP provider. They did not provide the deatails but it is fixed.

    Thank you for your help.


    Author Closing Comment

    Thank you....

    Featured Post

    What Should I Do With This Threat Intelligence?

    Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

    Join & Write a Comment

    Learn more about how the humble email signature can be used as more than just an electronic business card. When used correctly, a signature can easily be tailored for different purposes by different departments within an organization.
    Find out how to use dynamic social media in email signatures with this top 10 DOs & DON’Ts.
    Get people started with the process of using Access VBA to control Outlook using automation, Microsoft Access can control other applications. An example is the ability to programmatically talk to Microsoft Outlook. Using automation, an Access applic…
    This Experts Exchange video Micro Tutorial shows how to tell Microsoft Office that a word is NOT spelled correctly. Microsoft Office has a built-in, main dictionary that is shared by Office apps, including Excel, Outlook, PowerPoint, and Word. When …

    755 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    19 Experts available now in Live!

    Get 1:1 Help Now