?
Solved

Exchange Meeting requests being sent to uninvited people

Posted on 2012-04-12
2
Medium Priority
?
82 Views
Last Modified: 2015-08-17
User A will invite UserB and UserC to a meeting.  When the invite is sent, UserD (Ex Employee who was very nosy) gets invited also.  (Since UserD is no longer here, an undeliverable message comes back to UserA, which is very annoying.)  This happens for every invite sent by UserA and UserC - it never happens for UserB!

I am fairly certain this is something stored in the server somewhere, because since UserD has left, all of the workstations have been changed.  I want to stop this activity, but dont know where in exchange to look.
0
Comment
Question by:Banacek
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 35

Accepted Solution

by:
Robert Schutt earned 2000 total points
ID: 37844185
If you're willing to install the Exchange SDK on your server you should be able to view Event sinks in the Exchange Explorer. I haven't used it myself but I suspect that's where you'll find the culprit.

You should also be able to do it with a script that's available at the bottom of this page: http://support.microsoft.com/kb/324021 

But you'll need to be careful a bit, spam and virus killers also use these I believe so you don't want to delete those.
0
 

Author Closing Comment

by:Banacek
ID: 40933641
Thanks - sorry for being so late with the response.
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

by Batuhan Cetin Within the dynamic life of an IT administrator, we hold many information in our minds like user names, passwords, IDs, phone numbers, incomes, service tags, bills and the order from our wives to buy milk when coming back to home.…
A quick step-by-step overview of installing and configuring Carbonite Server Backup.
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question