Solved

Microsoft Exchange Server

Posted on 2013-05-14
7
281 Views
Last Modified: 2013-05-15
Client is running Exchange 2010.    They want to setup a shared calendar that when they create a apt on there personal calendar they can select the conference room calendar and invite that person as a attendee.  What I am looking to do is to have the appointment automatically go on the conference room calendar without a user accepting the appointment.    Any ideas?
Jon
0
Comment
Question by:jboyle00
  • 3
  • 3
7 Comments
 
LVL 6

Expert Comment

by:BurundiLapp
ID: 39164727
Doesn't it do this automatically if it is created as a resource?
0
 
LVL 52

Expert Comment

by:Manpreet SIngh Khatra
ID: 39164735
Are you saying the Appointment automatically accepted or declined by the Room mailbox as per availability ?

Set-CalendarProcessing "Resource Mailbox Name" -AutomateProcessing AutoAccept

- Rancy
0
 

Author Comment

by:jboyle00
ID: 39164764
Yes I am, Let me try that .
Thanks
Jon
0
Backup Your Microsoft Windows Server®

Backup all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

 

Author Comment

by:jboyle00
ID: 39164852
Rancy,
That worked out perfect.  Is there away that in the shared calendar I can change the blocked time from showing Busy to showing the actually appointment name?
I am assuming that may be a permissions issue that I will look into now.
JB
0
 
LVL 52

Accepted Solution

by:
Manpreet SIngh Khatra earned 500 total points
ID: 39164895
For that you will have to configure the Outlook profile for the Room mailbox and then go to properties of the Calendar and check permissions tab and select the Dropdown to be Free-Busy\Time\Subject and so on.

Your smart like me :)

- Rancy
0
 
LVL 52

Expert Comment

by:Manpreet SIngh Khatra
ID: 39164904
0
 

Author Closing Comment

by:jboyle00
ID: 39168214
Thanks that worked
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Utilizing an array to gracefully append to a list of EmailAddresses
This process describes the steps required to Import and Export data from and to .pst files using Exchange 2010. We can use these steps to export data from a user to a .pst file, import data back to the same or a different user, or even import data t…
In this video we show how to create a Resource Mailbox in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: Navigate to the Recipients >> Resources tab.: "Recipients" is our default selection …
This video discusses moving either the default database or any database to a new volume.

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now